|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
08/2011 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography August inventions list 08/11Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 08/25/2011 > 8 patent applications in 7 patent subcategories. inventions list
20110206200 - Method and apparatus for applying recipient criteria in identity-based encryption: An approach is provided for reducing communication traffic and cost by applying recipient criteria in identity-based encryption. A recipient criterion application selects one or more recipient criteria for data, and encrypts the data using the selected one or more recipient criteria as a public key of identity-based encryption.... Agent: Nokia Corporation
20110206201 - Method of generating a cryptographic key, network and computer program therefor: The present invention relates to security systems for communication networks. More precisely, the invention relates to a method for generating a shared key between a first node (D1) and a second node (D2) for secure communication in a network (1), the first node storing a first node keying material share... Agent: Koninklijke Philips Electronics N.v.
20110206202 - Method and apparatus for supporting broadcast efficiency and security enhancements: A method and apparatus for providing conditional access to media programs is described. An exemplary method comprising the steps of transmitting media information encrypted according to a control word (CW) to a receiver station, transmitting entitlement management information (EMI) to the receiver station, the EMI comprising a service bitmap, and... Agent: Syphermedia International, Inc.
20110206204 - Methods and devices of quantum encoding on dwdm (roadm) network and fiber optic links .: The invention solves the following complicated problems. Elaboration of the procedure for secret key extraction from the lower layer optic signal even in a presence of noise in fiber-optic cable. The realization of the quantum protection amplification scheme to clean states of the entangling polarized photons against noise in optical... Agent:
20110206203 - Subchannel security at the optical layer: The present invention includes various novel techniques, apparatus, and systems for optical WDM communications that involve dynamically modifying certain aspects of the WDM transmission (and corresponding receive) process at the optical (physical) layer to significantly enhance data/network security. These various dynamic modifications can be employed individually or in combination to... Agent: Vello Systems, Inc.
20110206205 - Encryption key distribution method in mobile broadcasting system and system for the same: A method and a system for distributing an encryption key for service protection and content protection in a mobile broadcasting system are provided where a network generates a first encryption key when a broadcasting service is first provided to the terminal, and transmits a long term key message including the... Agent: Samsung Electronics Co., Ltd.
20110206206 - Key management in a communication network: A method and apparatus for key management in a communication network. A Key Management Terminal KMS Terminal Server (KMS) receives from a first device a request for a token associated with a user identity, the user identity being associated with a second device. The KMS then sends the requested token... Agent: Telefonaktiebolaget Lm Ericsson (publ)
20110206207 - Papr reduction in multi-carrier transmission: A multi-carrier data communication is selectively operable in one of different communication modes which result in differently structured communication signals, the communication being configured for processing a data item intended to be transmitted to generate different transmission candidate data; selecting one of the transmission candidate data for transmission; selecting one... Agent:08/18/2011 > 10 patent applications in 8 patent subcategories. inventions list
20110200185 - Method of performing elliptic polynomial cryptography with elliptic polynomial hopping: The method of performing elliptic polynomial cryptography with elliptic polynomial hopping allows for the encryption of messages through elliptic polynomial cryptography, i.e., using elliptic polynomials with multi x-coordinates, and particularly with the utilization of elliptic polynomial hopping based upon both the elliptic polynomial and its twist, regardless of whether the... Agent:
20110200187 - Elliptic polynomial cryptography with secret key embedding: Elliptic polynomial cryptography with secret key embedding is a method that allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the embedding of secret keys in the message bit string. The method of performing elliptic polynomial cryptography is based on the elliptic polynomial discrete logarithm problem.... Agent:
20110200186 - Method of cipher block chaining using elliptic curve cryptography: The method of cipher block chaining using elliptic curve cryptography allows for the encryption of messages through elliptic curve cryptography and, particularly, with the performance of cipher block chaining utilizing both the elliptic curve and its twist, regardless of whether the elliptic curve and its twist are isomorphic with respect... Agent:
20110200188 - Method of performing cipher block chaining using elliptic polynomial cryptography: The method of performing cipher block chaining using elliptic polynomial cryptography allows for the encryption of messages through elliptic polynomial cryptography and, particularly, with the utilization of cipher block chaining based upon both the elliptic polynomial and its twist, regardless of whether the elliptic polynomial and its twist are isomorphic... Agent:
20110200189 - Encoder and decoder apparatus and methods with key generation: Embodiments provide remote control encoders and decoders, encryption algorithms, key generation, systems and methods, singularly and in combination, and not limited thereto.... Agent: Linx Technologies, Inc.
20110200190 - Cryptography processing device and cryptography processing method: A cryptography processing device has: a round processing unit configured to obtain a processing-object data and generate an intermediate data by applying round processing to the processing-object data; a random number generation unit configured to generate a random number data; a memory circuit in which the intermediate data or the... Agent: Renesas Electronics Corporation
20110200191 - Storage system executing encryption and decryption processing: A storage system includes a channel interface (IF) unit having an interface with a server, a disk IF unit having an interface with a hard disk group, a memory unit for storing data to be read/written from/to the server or the hard disk group, a switching unit, and the hard... Agent:
20110200192 - Secure key distribution for optical code division multiplexed based optical encryption: An optical communications network incorporating photonic layer security, with secure key exchange without loss of data, and a method of operating the network are disclosed. The network comprises a transmit side and a receive side. The transmit side includes first and second scramblers and a transmit side switch; and the... Agent: Telcordia Technologies, Inc.
20110200193 - Method and apparatus for controlling the recharging of electric vehicles and detecting stolen vehicles and vehicular components: In a system for preventing automobile theft, select automotive components are embedded with digital information and devices, including a unique public key, a unique private key, a decryption/encryption module, and a network address. Upon assembly of a vehicle, the components form addressable nodes of that vehicle. Relevant digital information of... Agent:
20110200194 - Ambulatory repeater for use in automated patient care: An ambulatory repeater for use in automated patient care is presented. A local memory store includes a cryptographic key, sensitive information, and physiological measures. The cryptographic key is uniquely assigned to the implantable medical device prior to implant of the implantable medical device into a patient. The sensitive information is... Agent: Cardiac Pacemakers, Inc.08/11/2011 > 13 patent applications in 9 patent subcategories. inventions list
20110194686 - Method of encrypting and transmitting data and system for transmitting encrypted data: A method of encrypting and transmitting data and a system for transmitting encrypted data. The method includes one or more different encryption algorithms, and may include employing different encryption algorithms to achieve multiple levels of encryption. A first encryption algorithm is based upon multiple rearrangements of bits representing data to... Agent: Encryption Solutions, Inc.
20110194687 - Data-conditioned encryption method: A system and method for encryption of data is disclosed. At least one block of the data is received. The at least one block of data is modified to cause each unique data element within the at least one block to appear with a respective predetermined frequency ratio. The block... Agent:
20110194689 - Encrypted signal detection circuit and video device using the same: A video device includes a video signal generation circuit, an encrypted signal detection circuit and a central processing unit (CPU). The encrypted signal detection circuit detects encrypted messages in video signals output from the video signal generation circuit and outputs stable trigger control signals to the CPU, which includes an... Agent: Hon Hai Precision Industry Co., Ltd.
20110194690 - Data adaptive message embedding for visible watermarking: A watermarking system uses distinct bit patterns to identify a logic 0, a logic 1, and a marker bit, which demarcates segments of logic bit information. Marker bits, which are printed on both foreground and background areas of an image, outline message blocks. In message extraction, a preprocessing step removes... Agent:
20110194694 - Accelerated verification of digital signatures and public keys: Accelerated computation of combinations of group operations in a finite field is provided by arranging for at least one of the operands to have a relatively small bit length. For example, a technique for verifying a signature of a message can include applying a first mathematical function to a combination... Agent: Certicom Corp.
20110194693 - Cryptographic processing apparatus and method: A cryptographic processing apparatus that encrypts plaintext using a fixed-value common key that is shared with other cryptographic processing apparatus, includes an acquiring unit that acquires random information being used within the cryptographic processing apparatuses, an encrypting unit that encrypts encryption target data using key information and outputs encrypted data... Agent: Fujitsu Limited
20110194691 - Method for privacy-preserving computation of edit distance of symbol sequences: Embodiments of the invention discloses a system and a method for determining an encrypted edit distance as an encryption of a minimum cost of transformation of a first sequence into a second sequence based on an insertion cost, a deletion cost, and a substitution cost. The method determines recursively a... Agent:
20110194695 - System and method of creating and sending broadcast and multicast data: A method of encrypting broadcast and multicast data communicated between two or more parties, each party having knowledge of a shared key, is provided. The key is calculated using values, some of which are communicated between the parties, so that the shared key is not itself transferred. Avoiding the transfer... Agent: Koolspan, Inc.
20110194692 - Voice-over internet protocol (voip) scrambling mechanism: Systems and methods are disclosed for securing VoIP communication. A VoIP device sends a multiple pipe scrambling request, wherein the multiple pipe scrambling request includes (1) a numeric value indicating the number pipes, (2) an IP address for each pipe, and (3) a port number for each pipe. The VoIP... Agent: International Business Machines Corporation
20110194696 - Secure protocol terminal adapter: A system and method for a terminal adapter including a telephony station interface, a data communications interface, and a processing unit. The processing unit is configured to establish a first connection over the data communications interface and a second connection over the telephony station interface. The processing unit is configured... Agent: Information Assurance Specialists, Inc.
20110194697 - Multicase key distribution method, updated method, and base station based on unicast conversation key: A multicast key distribution method, an update method, and a base station based on unicast conversation key, the distribution method includes the following steps: 1) the base station composes groups of multicast key distribution; 2) the base station broadcasts the groups of multicast key distribution to all terminals; 3) the... Agent: China Iwncomm Co. Ltd.
20110194698 - Key sharing system: When each apparatus generates session information needed for calculating a session key used in a simultaneous communication, an encrypting apparatus and a key processing apparatus according to the present invention causes each piece of session information to include a value dependent upon a private key unique to each apparatus, which... Agent:08/04/2011 > 9 patent applications in 6 patent subcategories. inventions list
20110188651 - Key rotation for encrypted storage media using a mirrored volume revive operation: Encryption key rotation is performed in computing environments having mirrored volumes by initializing a target storage media with a new key, performing a mirror revive operation from a first storage media to the target storage media, and configuring the first storage media and the target storage media to comprise a... Agent:
20110188652 - Encryption apparatus, decryption apparatus, encryption method, and decryption method: An encryption part (103) inputs a picture data packet (110) including I slice data which is used for intra-frame prediction and a processing on which starts from leading data at a time of data decompression. The encryption part (103) extracts, from the leading portion of the I slice data, data... Agent: Mitsubishi Electric Corporation
20110188653 - Communication system and device: A communication device receives secure communication frames on which a security transform has been performed to permit authentication. The communication device maintains an authentication history and a local time varying parameter. In multi-hop communication, the communication device provisionally verifies the freshness of a received secure communication frame by verifying that... Agent: Oki Electric Industry Co., Ltd.
20110188654 - Communication terminal using a temporary network key for assembling a secure communication frame: A communication terminal generates a temporary network key based on a managed master network key and on key identification used for security processing on a communication frame. The security processing is performed on the communication frame using the temporary network key. A secure communication frame is produced in which the... Agent: Oki Electric Industry Co., Ltd.
20110188655 - Method to manage members of at least one group of decoders having access to broadcast data: A method to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according... Agent: Nagravision Sa
20110188656 - Key management in a wireless network using primary and secondary keys: A primary key may be used for a first attempt by a remote node to decrypt incoming messages from a master. In the event the decrypt attempt fails at the remote node, a secondary key may then be used to attempt to decrypt the message. Initially, the primary and secondary... Agent: Elster Solutions, LLC
20110188657 - Method for connecting wireless communications, wireless communications terminal and wireless communications system: A method for connecting wireless communications, a wireless communications terminal and a wireless communications system are provided. The method includes receiving a first signal including assumed configuration data; determining an availability of a wireless communications connection using the assumed configuration data; sending an association request message, if it is determined... Agent: Samsung Electronics Co., Ltd.
20110188658 - Communication apparatus, communication method, and computer program: Communication parameters can be appropriately set without deteriorating user operability even if roles are not determined in advance when automatically setting the communication parameters. The invention includes a communication method when apparatus C newly joins a network formed of apparatuses A and B. The method is characterized by including a... Agent: Canon Kabushiki Kaisha
20110188659 - Method of integrating quantum key distribution with internet key exchange protocol: A method of integrating quantum key distribution with Internet key exchange protocol, wherein the method comprises exchanging quantum-shared secret index from a cryptographic key database in Phase 1 of the Internet key exchange protocol between an initiator and a responder (100), integrating a number of quantum-shared secret from the cryptographic... Agent: Mimos BerhadPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.39705 seconds