|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
10/2011 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography October categorized by USPTO classification 10/11Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 10/27/2011 > 12 patent applications in 9 patent subcategories. categorized by USPTO classification
20110261953 - Method for testing cryptographic circuits, secured cryptographic circuit capable of being tested, and method for wiring such circuit: The present invention relates to a method for testing cryptography circuits. It also relates to a secure cryptography circuit capable of being tested. The cryptography circuit includes registers and logic gates, and a test thereof performs a differential power analysis on the registers of the circuit. A cryptography circuit being... Agent: Institut Telecom-telecom Paris Tech
20110261954 - Diffusion oriented method and apparatus for stream cryptography: The present invention applies with a diffused mechanism, as such, a variable series of diffusion functions embedded within a diffusion-medium, to generate a maximum diffusion-cycle and nonlinear complexity; additionally, it performs in a serial process for simple design, further, in a parallel process for saving time, or even in a... Agent:
20110261955 - Scalar multiplier and scalar multiplication program: Provided are a scalar multiplier and a scalar multiplication program for performing a scalar multiplication at a high speed. In computing a scalar multiplication [s]P of a rational point P of an additive group E(Fp) including rational points on an elliptic curve where a characteristic p, an order r, and... Agent: National University Corporation Okayama University
20110261956 - Simultaneous scalar multiplication method: In computing point multiples in elliptic curve schemes (e.g. kP and sQ) separately using, for example, Montgomery's method for the purpose of combining kP+sQ, several operations are repeated in computing kP and sQ individually, that could be executed at the same time. A simultaneous scalar multiplication method is provided that... Agent: Certicom Corp.
20110261957 - Technique for handling media content to be accessible via multiple media tracks: A technique for protecting media content that is to be accessible via multiple media tracks of a media file is provided. A method implementation of this technique comprises the step of providing a set of one or more first layer data items that are to be accessible via a first... Agent:
20110261958 - Table splitting for cryptographic processes: For a defined cryptographic process including an original substitution table, split masked substitution tables are provided to resist cryptographic attacks. The split masked substitution tables are defined with reference to a set of random value data words and a mask value. An entry in the split masked substitution tables is... Agent: Research In Motion Limited
20110261959 - Method and apparatus for remotely inserting watermark into encrypted compressed video bitstream: A method and apparatus for remote watermarking of a media program is disclosed. The method inserts a pattern of substituted second versions of media program portions that are invisible to the viewer, into reproduced copies of the media program. The method permits the watermarking of encrypted media programs.... Agent: The Directv Group, Inc.
20110261960 - Method for allocating authorization key identifier for wireless portable internet system: A method and authentication apparatus for sharing information for identifying an Authorization Key (AK) with a Base Station (BS) in a subscriber station are provided. The method includes, in the subscriber station, sharing a root key with the BS by performing an authentication with the BS, sharing an AK derived... Agent: Kt Corporation
20110261961 - Reduction in bearer setup time: A method and apparatus are provided for reducing latency and/or delays in performing a security activation exchange between a communication device and a network entity. The communication device may pre-compute a plurality of possible keys using a base key and a plurality of possible inputs in anticipation of receiving an... Agent: Qualcomm Incorporated
20110261962 - Method and system for distributing cryptographic keys in a hierarchized network: A method is presented for distributing cryptographic keys in a hierarchized network including at least one device in charge of a higher group of devices, wherein at least one of the devices of the group of devices is also in charge of a lower group of devices. The method includes... Agent: Eads Defence And Security Systems
20110261963 - Method for sharing an information ciphering and deciphering key, a key sharing system and an access control system applying this method: This method is characterized in that it includes the following steps, a step for establishing a key root database in the transmitter and said at least one receiver, a step for generating in the transmitter a sequence of bits called an index, a step for having this index bit sequence... Agent:
20110261964 - Redundant key server encryption environment: Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one device to at least one remote key server. The key server receives from the at least one remote key... Agent: International Business Machines Corporation10/20/2011 > 10 patent applications in 9 patent subcategories. categorized by USPTO classification
20110255687 - Data transformation system using cyclic groups: An asymmetric (dual key) data obfuscation process, based on the well known ElGamal cryptosystem algorithm, and which uses multiplicative cyclic groups to transform (obfuscate) digital data for security purposes. In the present system the data need not be a member of the cyclic group, unlike in the ElGamal cryptosystem algorithm.... Agent: Apple Inc.
20110255688 - Method and system for monitoring online computer network behavior and creating online behavior profiles: A method and system for monitoring users on one or more computer networks, disassociating personally identifiable information from the collected data, and storing it in a database so that the privacy of the users is protected. In one embodiment, the system generates an anonymized identifier and associates that anonymized identifier... Agent: Hitwise Pty. Ltd.
20110255689 - Multiple-mode cryptographic module usable with memory controllers: In one embodiment, a multi-mode Advanced Encryption Standard (MM-AES) module for a storage controller is adapted to perform interleaved processing of multiple data streams, i.e., concurrently encrypt and/or decrypt string-data blocks from multiple data streams using, for each data stream, a corresponding cipher mode that is any one of a... Agent: Lsi Corporation
20110255690 - Reprogrammable security for controlling piracy and enabling interactive content: Technologies are disclosed to transfer responsibility and control over security from player makers to content authors by enabling integration of security logic and content. An exemplary optical disc carries an encrypted digital video title combined with data processing operations that implement the title's security policies and decryption processes. Player devices... Agent: Rovi Solutions Corporation
20110255691 - Apparatus and method for transitioning enhanced security context from a utran-based serving network to a geran-based serving network: Disclosed is a method for transitioning an enhanced security context from a UTRAN-based serving network to a GERAN-based serving network. In the method, the remote station the remote station generates first and second session keys, in accordance with the enhanced security context, using an enhanced security context root key and... Agent: Qualcomm Incorporated
20110255693 - Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node: Disclosed is a method for transitioning a remote station from a current serving network node having an enhanced security context to a new serving network node. In the method, the remote station provides at least one legacy key, and generates at least one session key based on an information element... Agent: Qualcomm Incorporated
20110255692 - Power savings through cooperative operation of multiradio devices: Trust establishment in short range protocol pairing between client and proxy devices includes a first aspect in which application level security is used to encrypt all packets transmitted between the client and proxy. An application-based security derives a public key from the General Bootstrapping Architecture (GBA) and used that public... Agent: Qualcomm Incorporated
20110255694 - Encoding/decoding circuit: An encoding/decoding operation portion includes an encoding/decoding operation circuit and an avoiding path for detouring the encoding decoding operation circuit and can select between encoding or decoding input data in the encoding/decoding operation circuit and detouring the encoding/decoding operation circuit to output the input data without change. Only one wire... Agent: Renesas Electronics Corp.
20110255695 - Key management method: The present invention relates to a key management method to establish selective secret information in multiple disjoint groups, more specifically to a method of reducing the broadcast size in access hierarchies and localize and facilitate management in said access hierarchies. The key management method selects a number of subgroups. Each... Agent:
20110255696 - Key distribution method and system: The present invention discloses a key distribution method and system, and the method includes: a card issuer management platform generating initial keys of a supplementary security domain corresponding to an application provider, importing the initial keys and a Trust Point's public key for external authentication to the supplementary security domain,... Agent: Zte Corporation10/13/2011 > 5 patent applications in 3 patent subcategories. categorized by USPTO classification
20110249814 - Device and a method for performing a cryptographic function: The present invention provides a method and an apparatus for encrypting and decrypting digital information while imparting a high level of security on the encrypted digital information. A mixed-mode digital-analogue encryption and decryption technique is proposed, which minimises the probability of an unintended recipient of the thus encrypted information being... Agent: Nagravision S.a.
20110249813 - Method for embedding secret message into png image: A method for embedding a secret message into a PNG image comprises steps: converting a secret message into a plurality of secret codes; converting the secret codes into a plurality of secret shares; using a mapping process to modify values of the secret shares to approach a full-transparent value of... Agent: National Chiao Tung University
20110249815 - Method of implementing a block cipher algorithm: A method is provided of implementing a block cipher algorithm by a device storing a fixed initialization datum, comprising, before execution of a first iteration of the algorithm in the course of a session, a step of determining a modified initialization datum by way of a determined function supplied as... Agent: France Telecom
20110249816 - Hybrid key management method for robust scada systems and session key generation method: Disclosed is a hybrid key management method for a supervisory control and data acquisition (SCADA) system in which a master terminal unit (MTU), a plurality of sub-master terminal units (sub-MTUs), and a plurality of remote terminal units (RTUs) are sequentially and hierarchically structured, the hybrid key management method comprising the... Agent: The Industry & Academic Cooperation In Chungnam National University (iac)
20110249817 - Method of managing group key for secure multicast communication: A group key management method for secure multicast communication includes: creating a tree having a root node, internal nodes and leaf nodes to manage group keys of a receiver group by a group key management server; generating user keys of all nodes excluding the root node in the tree on... Agent: Electronics And Telcommunications Research Institute10/06/2011 > 14 patent applications in 13 patent subcategories. categorized by USPTO classification
20110243319 - Data converter, data conversion method, and computer program: A data conversion algorithm achieving efficient data diffusion is achieved. For example, in a configuration where a various processes are executed on two data segments which are resultants of dividing a rectangular matrix of data containing arranged one-byte data blocks into two parts to perform data conversion, efficient data scrambling... Agent:
20110243320 - Efficient homomorphic encryption scheme for bilinear forms: In one exemplary embodiment, a computer readable storage medium tangibly embodying a program of instructions executable by a machine for performing operations including: receiving information B to be encrypted as a ciphertext C in accordance with an encryption scheme having an encrypt function; and encrypting B in accordance with the... Agent: International Business Machines Corporation
20110243321 - Scrambling of a calculation performed according to an rsa-crt algorithm: A method and a circuit for scrambling an RSA-CRT algorithm calculation by an electronic circuit, in which a result is obtained from two modular exponentiation calculations, each providing a partial result, and from a recombination step, and in which a first step adds a digital quantity to at least one... Agent: Stmicroelectronics S.a.
20110243322 - Security in telecommunications systems: Security of communications between a mobile terminal 1 and a cellular network node (base station 3) is enhanced. A communication session transmitted on a first traffic channel ‘0’ is encrypted using a key ‘KA’. The security is enhanced by causing the communication channel to change to a second communication channel... Agent: Vodafone Group PLC
20110243323 - Endoscope apparatus and connection unit therefor: An endoscope apparatus includes an endoscope apparatus body portion which includes a first connector, and which is connectable to an insertion portion having an image pickup device disposed at a distal end portion. The endoscope apparatus further includes a connection unit which includes a second connector which is removably connectable... Agent: Olympus Corporation
20110243324 - Secure network coding for multi-resolution wireless video streaming: Described herein is a method and system for hierarchical wireless video with network coding which limits encryption operations to a critical set of network coding coefficients in combination with multi-resolution video coding. Such a method and system achieves hierarchical fidelity levels, robustness against wireless packet loss and efficient security by... Agent:
20110243325 - Display system, control apparatus, display method, and program: A display system includes display terminals (1-1-1-4) that display pictures, a display control apparatus (3) that controls the display of pictures on the display terminals (1-1-1-4), and optical shutters (2-1-2-4) that are provided corresponding to each of the display terminals (1-1-1-4) and that enter a state of transmitting incident light... Agent: Nec Corporation
20110243326 - Hardcopy document security: A method for securing data in hardcopy documents. The method includes obtaining a page image having a private data item; generating an encrypted version of the private data item; obtaining a decoder identification (ID) value of a decoder; generating, using an encoder, a symbol having the encrypted version of the... Agent: Konica Minolta Systems Laboratory, Inc.
20110243327 - System and method to prevent audio watermark detection: A system to prevent audio watermark detection includes content having a video portion and an audio portion, the audio portion having a watermark, an audio/video separator configured to separate the video portion and the audio portion, and a random number generator configured to generate a random number corresponding to a... Agent: Disney Enterprises, Inc., A Delaware Corporation
20110243328 - Data providing process based on an ibpe scheme: The present invention is a method to ensure a secure exchange of crypted numeric data between two entities, where their decryption depends to the approval of a third entity. The solution uses a combination of Identity Based Encryption scheme, and transcription trap use.... Agent: Gemalto Sa
20110243329 - Multi-class switching system and associated method of use: A multi-class switching system that includes a coder/decoder for converting voice between analog and digital; a first switch coupled to the coder/decoder to isolate non-secure entities in a dial-up network, including fiber optic ports to pass classified and unclassified data to one of a classified IP network and an unclassified... Agent: Micro Technologies LLC, D/b/a Microtech
20110243330 - Authentication associated suite discovery and negotiation method: An authentication associated suite discovery and negotiation method for ultra wide band network. The method includes the following steps of: 1) adding a pairwise temporal key PTK establishment IE and a group temporal key GTK distribution IE in an information element IE list of an initiator and a responder, and... Agent: China Iwncomm Co., Ltd.
20110243331 - Shared random numbers management method and management system in secret communication network: In a secret communication network including a center node and multiple remote nodes, the center node is provided with a virtual remote node which functions as a remote node similar to each of the remote nodes. Random numbers shared between the center node and each remote node are managed based... Agent: Nec Corporation
20110243332 - Data processing system, data processing method, source data processing device, destination data processing device, and storage medium: A data processing system comprises a plurality of key production modules each of which stores keys required to encrypt data and decrypt the encrypted data, produces a new key, encrypts the newly produced key by using one of the keys stored therein as a master key, and stores the encrypted... Agent:Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.44351 seconds