|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
03/2012 | Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
Cryptography March listing by industry category 03/12Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 03/29/2012 > 11 patent applications in 9 patent subcategories. listing by industry category
20120076293 - Hybrid mode cryptographic method and system with message authentication: An encryption and authentication technique that achieves enhanced integrity verification through assured error-propagation using a multistage sequence of pseudorandom permutations. The method generates intermediate data-dependent cryptographic variables at each stage, which are systematically combined into feedback loops. The encryption technique also generates an authentication tag with minimal post processing that... Agent:
20120076294 - Arithmetic method and apparatus for supporting aes and aria encryption/decryption functions: Provided are an arithmetic method and apparatus for supporting Advanced Encryption Standard (AES) and Academy, Research Institute and Agency (ARIA) encryption/decryption functions. The apparatus includes: a key scheduler for generating a round key using an input key; and a round function calculator for generating encrypted/decrypted data using input data and... Agent: Electronics And Telecommunications Research Institute
20120076295 - Message key generation: The disclosure relates to message encoding. One claim recites an apparatus comprising: electronic memory for storing a digital watermark plural-bit message; an electronic processor programmed for: providing a plural-bit seed; randomizing the plural-bit seed; and encoding the randomized plural-bit seed with convolutional encoding, the encoded, randomized plural-bit seed comprising a... Agent:
20120076296 - Method and apparatus for a high bandwidth stream cipher: A method and apparatus for a high-bandwidth stream cipher. In one embodiment of the invention, the stream cipher has an output function that receives secret state bits from a block cipher and generates an encryption mask. In one embodiment of the invention, the encryption mask has a lesser or smaller... Agent:
20120076297 - Terminal for use in associating an annotation with an image: There is also provided a terminal for use in associating an annotation with an image. The terminal can comprise a processor, one or more computer readable storage mediums, an imaging assembly, first program instructions to obtain an annotation from a source in response to the terminal capturing an image, second... Agent: Hand Held Products, Inc.
20120076300 - Key information management method, content transmission method, key information management apparatus, license management apparatus, content transmission system, and terminal apparatus: The present invention aims to reliably prevent illegal use of content when the content is encrypted and transmitted with a cipher key. A content transmission method of the present invention includes: a basic key creating step of creating a basic key K1; a cipher key creating step of creating a... Agent: Ntt Docomo, Inc.
20120076299 - Method for the encrypted transmission of data from a mobile date storage device to a stationary device as well as data encryption adapter: The present invention relates to a method for the encrypted transmission of data from a mobile, first data storage device (300) to a stationary device (200, 200a, 200b) which comprises a second data storage device or a second data evaluation unit, or for preparing an encrypted transmission between the mobile,... Agent:
20120076298 - Unified architecture for crypto functional units: In described embodiments, a unified Crypto Functional Unit (CFU) block architecture provides a capability for advanced communication processors to provide parallel and concurrent processing of multiple crypto operations/transactions within high-speed hardware to support different security standards (e.g. from IPsec, 3GPP). In particular, each CFU block of the unified CFU block... Agent:
20120076301 - Optical system with imparted secure codes: A secure optical communication system and method are disclosed. Short optical pulses are first modulated with data, then dispersed in time so that they spread out over multiple bit periods, then the desired code is applied to the dispersed pulses. The encoding may include frequency shifts or phase shifts or... Agent: Nucrypt LLC
20120076302 - Leakage-resilient garbled circuit generation using reduced memory hardware token: A garbled circuit is generated for a client in a leakage-resilient manner with a reduced memory requirement. The garbled circuit is used for secure function evaluation between the client and a server. The garbled circuit is generated with a reduced storage requirement by obtaining a token from the server; querying... Agent: Alcatel-lucent Usa Inc
20120076303 - Intercept access point for communications within local breakouts: Embodiments of the present disclosure provide for the capability within a gateway to dynamically monitor communications and protocols from a targeted user in a local breakout. A gateway product with this capability thus performs the function of an intercept access point (IAP). Communications to and from the targeted user are... Agent: Rogers Communications Inc.03/22/2012 > 13 patent applications in 9 patent subcategories. listing by industry category
20120069991 - Method for authenticating access to a secured chip by test device: A method for authenticating access to a secured chip SC by a test device TD, the test device storing at least one common key CK and one test key TK, the secured chip SC storing the same common key CK and a reference digest F(TK) resulting from a cryptographic function... Agent: Nagravision S. A.
20120069993 - Cryptographic apparatus and memory system: According to one embodiment, a cryptographic apparatus includes: cryptographic cores (“cores”), an assigning unit, a concatenating unit, and an output controlling unit. If a CTS flag thereof is on, each core encrypts using a symmetric key cipher algorithm utilizing CTS, while using a symmetric key. When an input of a... Agent: Kabushiki Kaisha Toshiba
20120069994 - Method for genertaing a digital signature: A method for generating a digital signature includes calculating a first magnitude representative of the inverse of a random number raised to the power two; obtaining a first element of the digital signature by executing scalar multiplication between an established point of the elliptic curve and the random number; obtaining... Agent: Stmicroelectronics S.r.l.
20120069992 - Product authentication using end-to-end cryptographic scheme: A system is provided for inside-to-outside or outside-to-inside cryptographic coding that facilitates product authentication along a distribution channel. An association of authenticated, secured codes is generated between inner items (e.g., pharmaceutical doses such as pills, capsules, tablets) and outer items (e.g., packaging containing inner items). For instance, an inner code... Agent: Qualcomm Incorporated
20120069995 - Controller chip with zeroizable root key: The present invention is a data storage device that includes a control chip with a zeroizable root key. In one embodiment, the control chip comprises a digital memory, the zeroizable root key being a derived root key obtained by applying a firmware root key to a different root key stored... Agent: Seagate Technology LLC
20120069996 - System and method for encrypting traffic on a network: According to embodiments of the present invention a system and method for encrypting traffic on a network is disclosed. Encrypted data is transmitted between a first network element and a second network element by: acquiring an encryption seed at the first network element, the encryption seed being substantially similar to... Agent:
20120069997 - Encription device and decryption device: According to one embodiment, an encryption device includes a storage unit, an input unit, first to fourth partial encryption units, a generation unit, and an output unit. The first partial encryption unit calculates first intermediate data from input plain data to store in the storage unit. The generation unit generates... Agent:
20120069998 - Encryption device: According to one embodiment, in an encryption device, a segmentation unit segments masked plain data into pieces of first segmented data. A first processing unit generates pieces of second segmented data from the pieces of first segmented data. A nonlinear transform unit generates pieces of third segmented data transformed from... Agent:
20120069999 - Image forming apparatus, computer readable medium and medium: The image forming apparatus includes: a random number information generation part that generates random number information; a first encryption part that encrypts the random number information generated by the random number information generation part with using a first encryption key; a second encryption key generation part that newly generates a... Agent: Fuji Xerox Co., Ltd.
20120070000 - Securing two-party computation against malicious adversaries: Methods and apparatus are provided for securing two-party computations against malicious adversaries. A method is provided for secure function evaluation. The disclosed method is performed by a garbled circuit evaluator for the transfer of private information, and comprises receiving from a constructor (i) s garbled circuits (GCs), wherein each of... Agent: Alcatel-lucent Usa Inc
20120070001 - Method and device for archiving a document: The method for archiving a document includes a step of encryption of the document with a symmetric key, a step of transmission of said encrypted document to an archiving operator, and a step of transmission of the symmetric encryption key of said document to an escrow operator distinct from the... Agent: Trustseed Sas
20120070002 - Protecting information in an untethered asset: The technology described herein for protecting secure information includes a method. The method includes storing, by a plurality of data store devices, the secure information. Each of the data store devices stores at least one part of the secure information. The method further includes receiving, by at least one of... Agent: Angel Secure Networks, Inc.
20120070003 - Use of a private key to encrypt and decrypt a message: The invention includes a method for encrypting and transmitting a message M from a first location to a second location. Random numbers P and Q are initially selected, each of them being either a prime or a non-prime number. P and Q are both furnished to a sender and a... Agent: International Business Machines Corporation03/15/2012 > 11 patent applications in 10 patent subcategories. listing by industry category
20120063592 - Apparatus for encrypting data: An apparatus for encrypting data is provided. The apparatus has a means for symmetrically encrypting data and a means for encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. The means for encrypting the symmetrically encrypted data is designed such... Agent: Compugroup Holding Ag
20120063594 - Method for creating asymmetrical cryptographic key pairs: The invention relates to a method for creating a set of asymmetrical cryptographic key pairs, wherein the set of key pairs has a first key pair (K1) and a second key pair (K2), wherein the first key pair is formed by a first private (G1) and a first public key... Agent: Compugroup Holding Ag
20120063593 - Oblivious transfer with hidden access control lists: A method, apparatus, and a computer readable storage medium having computer readable instructions to carry out the steps of the method for anonymous access to a database. Each record of the database has different access control permissions (e.g. attributes, roles, or rights). The method allows users to access the database... Agent: International Business Machines Corporation
20120063595 - Method and apparatus for selective data encryption: A layered audiovisual packet data stream, such as one obtained by a JPEG2000 encoder, is received together with information (metadata) about the contribution of each packet to the reduction of image distortion. The distortion-to-rate ratio for each packet is calculated and the packets are ordered in descending ratio. The non-encrypted... Agent:
20120063596 - Characterization of an entangled photon system: A quantum key distribution system comprises a source of entangled photon pairs and two single-photon detectors. The source is coupled to each of the single-photon detectors by optical fiber. Operational systems parameters include the efficiency of the first single-photon detector, the efficiency of the second single-photon detector, and the maximum... Agent: At&t Intellectual Property I, L.p.
20120063597 - Apparatus and associated methodology for managing content control keys: A method of exchanging secret session keys in symmetric encryption communication includes storing random number tables in both the sending and receiving devices. The sending device then determines the secret session key utilizing the random number table, and transmits to the receiving device information for locating the secret session key... Agent: Uponus Technologies, LLC.
20120063598 - Bluetooth® device and method of connecting bluetooth® devices using a bluetooth® channel: Provided are a method of connecting BLUETOOTH® devices using a single BLUETOOTH® channel and a BLUETOOTH® device using the method. A public key may be exchanged via a predefined single BLUETOOTH® channel, thereby preventing a Man-in-the-middle (MITM) attack. For example, when an MITM attacker intercepts the public key and attempts... Agent:
20120063599 - Key agreement and re-keying over a bidirectional communication path: A key agreement method is carried out by a first system in conjunction with a second system over a bidirectional communication path, including generating a first key pair having a first public key and a first private key, sending the first public key to the second system, receiving a second... Agent: Research In Motion Limited
20120063600 - Appraising systems with zero knowledge proofs: A system, method, and computer program product are provided for requesting a proof of a security policy in a Ghent system. Additionally, a system, method, and computer program product are provided for proving a security policy to an interrogator system.... Agent: The Mitre Corporation
20120063601 - Systems and methods for remotely loading encryption keys in card reader systems: Systems and methods for remotely loading encryption keys in card reader systems are provided. One such method includes storing, at a card reader, a device identification number for identifying the card reader, a first magnetic fingerprint of a data card, and a second magnetic fingerprint of the data card, wherein... Agent:
20120063602 - Method and apparatus for maintaining key information area in file system: A method and an apparatus for maintaining a key information area in a file system are provided, which can provide effective maintenance to the key information area in the file system used by a storage device, and be applied to maintaining various file systems. The method for maintaining a key... Agent: Zte Corporation03/08/2012 > 14 patent applications in 12 patent subcategories. listing by industry category
20120057695 - Circuits for modular arithmetic based on the complementation of continued fractions: A method for calculating a modular multiplication of integers a and b or polynomials a(x) and b(x) for a modulus N. The method including (i) calculating a supplemental product continued fraction c=(ab+jN)/t by supplementing particular numerators of a product fraction (ab)/t represented as a continued fraction, and (ii) calculating a... Agent:
20120057696 - Multi-key cryptography for encrypting file system acceleration: Embodiments of methods and systems for encrypting and decrypting with encryption attributes are presented. An encryption attribute contains information to identify one or more segments of a file to be encrypted. An encryption process encrypts those one or more segments to generate a partly encrypted file instead of encrypting the... Agent:
20120057697 - Security of a multimedia stream: A method including receiving encrypted multimedia information of a multimedia broadcast multicast service streaming session, wherein the multimedia information is encrypted using an encryption key. An indication allowing to switch the receiving of the encrypted multimedia information to a peer-to-peer streaming session is received and receiving of the encrypted multimedia... Agent: Nokia Corporation
20120057699 - Method and apparatus for establishing a key agreement protocol: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each... Agent:
20120057698 - Organic keyed encryption: An encryption technique that creates a unique encryption key or fingerprint based on unique physical and electrical characteristics of a target electronic assembly to be protected. The encryption key can be constructed by exploiting the manufacturing variances present in all electronic elements including active elements and passive elements. Active elements... Agent: Lockheed Martin Corporation
20120057700 - Protecting video content using virtualization: Generally, the present disclosure provides a system and method configured to prevent unauthorized copying of video content in a mobile device. The method may use virtualization technology to prevent unauthorized copying of the premium video content. A user OS may operate in a virtual machine. A hypervisor may be configured... Agent:
20120057701 - Mobile terminal with encryption chip and related network locking/unlocking method: A mobile terminal is provided with a network lock functionality for a network. The mobile terminal includes a subscriber identity module (SIM) slot configured to host a SIM card or an unlocking device, a control chip, an encryption chip, and a network locking module. The control chip is coupled to... Agent: Nationz Technologies Inc.
20120057702 - Tag generation apparatus, tag verification apparatus, communication system, tag generation method, tag verification method, and recording medium: The tag generation apparatus of the present invention includes a hash unit (12) that applies a hash function to a message to generate a hash value, a random number encryption unit (14) that applies an encryption function having a first key to a random number that is independent of the... Agent:
20120057703 - Techniques for transmitting control channel information: Techniques for protecting information elements transmitted to mobile stations from intruders. The technique can involve applying a randomized mask over an information element and then providing a scrambled cyclic redundancy check (CRC) value. A seed for the randomized mask can be different from a seed for the scrambled CRC value.... Agent:
20120057704 - System and method for providing security in a wireless communications system: A system and method for providing security in a wireless communications system are provided. A method for device operations includes generating a security key from an initial key, producing secured information by applying the security key to radio resource allocation information, and transmitting the secured information to the communications device.... Agent: Futurewei Technologies, Inc.
20120057705 - Two-way authentication between two communication endpoints using a one-way out-of-band (oob) channel: Techniques for two-way authentication between two communication endpoints (e.g., two devices) using a one-way out-of-band (OOB) channel are presented. Here, in embodiments, both communication endpoints may be securely authenticated as long as the one-way OOB channel is tamper-proof. Embodiments of the invention do not require the one-way OOB channel to... Agent:
20120057706 - Method and system for optimizing authentication procedures in media independent hanodver services: A method and system for establishing security association mechanism between a Mobile Node (MN) and a plurality of Point of Services (PoS) are provided. The method includes sending a first request from primary PoS to secondary PoS. The primary PoS then receives a first response along with a derived first... Agent:
20120057707 - Method of abolishing unauthorized copying of digital data stored on an optical disc: A method of abolishing unauthorized copying of digital data stored on an optical disc includes the steps of distributing overwrite modules of a copy protection module into a data file that is to be protected against illegal copying, so as to form a copy-protected data file; and writing the copy-protected... Agent:
20120057708 - Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus: In digital content including; data in which digital copyrighted work is stored, and a plurality of separation data separated from the data, a header of the data stores position information for specifying a separation region in which one of the separation data is separated. Moreover each separation region in which... Agent: Fujitsu Limited03/01/2012 > 9 patent applications in 4 patent subcategories. listing by industry category
20120051538 - Appending pseudo-random sub-lsb values to prevent intensity banding: Embodiments of the present invention provide a test and measurement instrument that displays acquired data on a logarithmic scale without intensity banding. The test and measurement instrument processes the acquired data before it is displayed by appending pseudo-random sub-LSB (least significant bit) values to it. When the processed acquired data... Agent: Tektronix, Inc
20120051540 - Conditional access system and method of using conditional access image: Provided are a conditional access system and a method of using a conditional access image. The conditional access system according to an exemplary embodiment of the present invention includes: a service key management client allocated with a service key from a service key management server using a service key distribution... Agent: Electronics And Telecommunications Research Institute
20120051539 - Transport of partially encrypted media: A method of facilitating transport of partially encrypted video is disclosed. The method re-packetizes or otherwise de-concatenates packets carrying the partially encrypted video into packets where all the video in each packet is either encrypted or unencrypted. The re-packetized video packets may include data that identifies whether the packet is... Agent:
20120051541 - Method and system for providing conditional access in broadcasting network: A method and system for providing conditional access (CA) between a headend and a receiver include scrambling media data of broadcast programs and encrypting control words according to a CA system used on the headend. The receiver includes a CA virtual machine. The receiver receives the broadcast program and encrypted... Agent: Ambit Microsystems (shanghai) Ltd.
20120051542 - Remote communication apparatus including security function and remote electric power metering system using the same: There are provided a remote communication apparatus including a security function and a remote electric power metering system using the same. The remote communication apparatus including a security function includes: a security algorithm application unit decrypting a receiving signal received from a communication network in the case in which the... Agent: Samsung Electro-mechanics Co., Ltd.
20120051546 - Data transmitting method and apparatus, and data communication method and apparatus: A data communication system and method in which a need to store a frame count value in a non-volatile memory and update the frame count value is obviated, and in which the effect resulting when a frame with its frame count value altered to a value close to a full... Agent: Sony Corporation
20120051545 - Secure remote control for audio/video receiver/decoder: In order to limit the use of generic remote control devices, the invention relates to a system comprising a remote control device and a security device, both sharing a common key, algorithms or protocol specific to a pair formed by the remote control device and the security device. The remote... Agent: Nagravision S.a.
20120051543 - System and method for providing synchronized broadcast and simulcast of media content: A system and method of receiving a radio broadcast and simulcast of media content, including: receiving a digital radio broadcast comprising digital radio content over a terrestrial radio broadcast spectrum; receiving media content separately over a multicast network; time synchronizing the media content to the digital radio broadcast; and presenting... Agent: Lemi Technology, LLC
20120051544 - System and method for securing wireless transmissions: A system and method for securing wireless communications are provided. A method for transmitting a message by a transmitter includes partitioning the message into N sub-messages, where N is a positive integer value greater than or equal to two, encoding the N sub-messages into a plurality of packet groups with... Agent: Futurewei Technologies, Inc.Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130516:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.59964 seconds