|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
Recent | 13: Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
CryptographyBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 11/28/2013 > 11 patent applications in 9 patent subcategories.
20130315387 - Encryption method characterized by three dimensional computation, feedback control, and dynamic transition box: An encryption method adopts an encryption principle based on sequential logic and involves performing three dimensional computation on a plaintext data unit having undergone non-linear transition through a dynamic child transition box, system keys, and dynamic feedback keys together to generate dynamic keys. After undergoing non-linear transition through different dynamic... Agent:
20130315388 - Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity: A cryptographic framework embodies modular methods for securing data, both at rest and in motion, via an extensible encryption method. Key derivation and synchronization methods are defined. Using a small set of initialization values (keys), a multi-dimensional geometric form from which two or more entities (participants) may derive the same... Agent:
20130315389 - Traffic encryption key management for machine to machine multicast group: A method for decrypting multicast data by a mobile station in a wireless communication system is described. The method includes receiving an identifier of a group from a base station, receiving parameters for generating a group traffic key from the base station, wherein the parameters include an authentication key for... Agent: Lg Electronics Inc.
20130315390 - Fast computation of a single coefficient in an inverse polynomial: In one exemplary embodiment of the invention, a method for computing a resultant and a free term of a scaled inverse of a first polynomial v(x) modulo a second polynomial fn(x), including: receiving the first polynomial v(x) modulo the second polynomial fn(x), where the second polynomial is of a form... Agent:
20130315391 - Secure communication system and communication apparatus: There is provided a secure communication system comprising first and second communication apparatuses carrying out encrypted communication. The first communication apparatus includes: a first established communication path managing unit managing information on an encrypted communication path established with the second communication apparatus; and a first communication path reestablishing unit notifying... Agent: Oki Electric Industry Co., Ltd.
20130315392 - Method for displaying readable contents on a mobile reading device in a location-restricted manner: The invention relates to a system and method, by means of which the availability of readable contents (books, magazines, documents) can be linked according to location. The invention further relates to an electronic terminal, in particular a mobile reading device, having means for carrying out said method, and to the... Agent: Txtr Gmbh
20130315393 - Authentication system for device-to-device communication and authentication method therefor: An authentication system for device-to-device (D2D) communication and an authentication method thereof are provided. The authentication system further includes first user equipment (UE) and an authentication server. The authentication server is located within a communication range of the first UE. When the first UE sends a connection request to the... Agent: Industrial Technology Research Institute
20130315394 - Data encryption method, data verification method and electronic apparatus: A data encryption method, a data verification method and an electronic apparatus are provided. An encryption key is obtained from original data according to a random sequence so as to transform the original data into replace data by using the encryption key, and the replace data is encrypted to obtain... Agent: Wistron Corporation
20130315395 - Embedded authentication protocol for quantum key distribution systems: In methods and systems to authenticate systems in a quantum key distribution environment based on limited disclosures and identical, re-usable, pre-provisioned authentication keys, each system constructs an encryption key based on a corresponding one of transmitted events and detected events. Basis-sifting, error detection, error correction, and/or privacy amplification (PA) may... Agent: The Johns Hopkins University
20130315396 - Internet communication system for secure restricted access: Methods and apparatus permit a one-way downloadable security for electronic signals such as cable television, free-to-air, direct broadcast satellite, internet, electronic device enablement, and other services. The system can allow a broadcast transmission capability (1) to provide an encrypted signal to an individual reception capability (2) in a manner that... Agent: Beyond Broadband Technology, LLC
20130315397 - System and method to scramble data based on a scramble key: A data storage device includes a memory and a controller. The controller is configured to scramble data using a scramble key to produce scrambled data and to encode the scramble key to produce an encoded scramble key. The controller is further configured to store the encoded scramble key and the... Agent: Sandisk Technologies Inc.11/21/2013 > 10 patent applications in 4 patent subcategories.
20130308775 - Block encryption device, decryption device, encrypting method, decrypting method and program: A block encrypting device of the present invention includes: a mixing means (101) that applies universal hash function-based permutation to the (n+m)-bit plaintext to generate a first intermediate variable of n bits and a second intermediate variable of m bits; a first tweakable unit block encrypting means (102) that encrypts... Agent: Nec Corporation
20130308773 - Capturing video of an image with embedded code to access content: An apparatus for communicating content is disclosed. A system and method also perform the functions of the apparatus. The apparatus includes a capturing module that captures a live video of an image and an environment surrounding the image. The image has an embedded cryptographic representation of a code and the... Agent:
20130308772 - Embedding information in an image: A method for embedding information in an image includes defining a code corresponding to a unit of content where the code includes at least one character. The method includes defining a cryptographic representation for each character of the at least one character in the code. Each cryptographic representation includes a... Agent: Video Expressions LLC
20130308774 - Method and system for conducting high speed, symmetric stream cipher encryption: A method is provided for processing a digital information set having a plurality of information bytes. The method comprises receiving the information set, determining a set of initialization parameters, initializing a set of state variables using the set of initialization parameters, and generating a plurality of cryptors, each cryptor being... Agent:
20130308776 - Method and system for conditional access to a digital content, associated terminal and subscriber device: A secure method for transmitting a control word between a server and a plurality of processing entities so as to respectively produce and utilize the control word. Preferably such a method is applied to the field of conditional access methods and systems for preventing the fraudulent use of compromised decryption... Agent: Cryptoexperts Sas
20130308777 - Cipher communication method and apparatus for the same: A cipher communication method for an encryption apparatus an includes: receiving a second encryption key while performing a cipher communication using a first encryption key; storing encryption key input information on the first and second encryption keys in a static region; copying the stored encryption key input information into a... Agent: Electronics And Telecommunications Research Institute
20130308780 - Apparatus for managing members of at least one group of decoders having access to broadcast data: A technique to manage members of a group of decoders having access to broadcast data, each group member sharing a common broadcast encryption scheme (BES) comprising the steps of, in a stage for a decoder to become a group member, receiving keys pertaining to the position in the group according... Agent: Nagravision S.a.
20130308781 - Method and apparatus for transmitting secure cell broadcast messages in a cellular communication network: A method and apparatus is provided for transmitting a cell broadcast message in a mobile communication network comprising in a message control node receiving a initiation request identifying a first message payload segment to be transmitted, determining an authentication group for which the first message payload segment is intended and... Agent: Telefonaktiebolaget L M Ericsson (publ)
20130308779 - Methods and devices for computing a shared encryption key: Embodiments described herein are generally directed to methods and devices in which computing devices, and mobile devices in particular, establish a shared encryption key for a device group comprising at least three mobile devices. In accordance with one example embodiment, a public key of a mobile device is computed using... Agent: Research In Motion Limited
20130308778 - Secure registration of a mobile device for use with a session: A computer-readable medium embodies a computer program for registering a mobile device. The computer program comprises computer-readable program code for: generating a first message including a first code in response to receiving a request to register the mobile device for use with a future session with an entity, sending the... Agent:11/14/2013 > 9 patent applications in 7 patent subcategories.
20130301827 - Authentication of encrypted data blocks: An authentication-encryption unit provides at least one encryption element, where each encryption element encrypts a plain-data block and accordingly generates a cipher-data block. A common checksum is calculated over each cipher-data block. It is possible to select via a selection unit in each encryption element which data bits in each... Agent: Rohde & Schwartz Gmbh & Co Kg
20130301826 - System, method, and program for protecting cryptographic algorithms from side-channel attacks: A system for protecting algorithms from side-channel attacks includes a digital processor having a first register, a second register, and a third register; an execution unit; and a processing unit. The execution unit executes an iterative loop for computing a value of a variable and sets a value of the... Agent: Intel Corporation
20130301829 - Electronic key registration system: An electronic key registration system includes a controller of a communication subject, an initial electronic key that communicates with the communication subject and has an initial encryption key generation code, an additional electronic key that communicates with the communication subject, and an information center including an additional encryption key. The... Agent: Kabushiki Kaisha Tokai Rika Denki Seisakusho
20130301828 - Method for establishing a secure communication channel: The present invention provides a method for establishing a secure communication channel between a client (C) and a remote server (S), said client (C) and remote server (S) exchanging data through an intermediate entity (G), said client (C) having a long-term key pair (skc,pkc), said remote server generating an ephemeral... Agent: Gemalto Sa
20130301830 - Device, system, and method of secure entry and handling of passwords: Devices, system, and methods of secure entry and handling of passwords and Personal Identification Numbers (PINs), as well as for secure local storage, secure user authentication, and secure payment via mobile devices and via payment terminals. A mobile electronic device includes: a secure execution environment (SEE) to securely execute code;... Agent:
20130301831 - Data structure of multimedia file format, encrypting method and device thereof, and decrypting method and device thereof: In a data structure of a multimedia file format, a movie box and a media data box are provided. In each box, a non-encrypted size field, a non-encrypted type field and box data field are provided. In box data of the movie box, information data regarding multimedia data is stored.... Agent:
20130301832 - Fingerprint scanning systems and methods: Embodiments relate to methods and systems for gathering, archiving, transmitting, and processing forensic and latent fingerprints. An integrated forensic fingerprint scanning system is provided that includes a number of features for use with forensic-quality fingerprinting. One set of features of embodiments of the portable forensic fingerprint scanning system provides real-time... Agent:
20130301833 - System and method for establishing a secure connection in communications systems: A method for establishing a secure connection between a station and an access point includes transmitting a communications system management message to the station, the communications system management message including an access point nonce. The method also includes receiving a station nonce from the station, and determining a first security... Agent: Futurewei Technologies, Inc.
20130301834 - Electronic key registration system: An electronic key registration system registers a key ID and an encryption key of an electronic key to a controller installed in a communication subject that communicates with the electronic key through wireless connection. The electronic key includes a monitoring unit that monitors whether or not registration of the electronic... Agent: Kabushiki Kaisha Tokai Rika Denki Seisakusho11/07/2013 > 6 patent applications in 5 patent subcategories.
20130294599 - Pluggable cryptography: Mechanisms are provided for allowing pluggable encryption in an operating system. Modules such as proprietary cipher modules connect to a kernel cryptographic framework using cryptographic cipher adapters. Supported cryptographic ciphers as well as proprietary cryptographic ciphers can be used in a transparent manner during file system access, key management, and... Agent: Dell Products L.p.
20130294600 - Public key encryption with digital signature scheme: An improved encryption and digital signature system and method in accordance with the invention reuses an encryption ephemeral key pair from an encryption process in a digital signature process. The reuse of the encryption ephemeral key pair in the digital signature process advantageously results in reduced byte size of the... Agent:
20130294601 - Efficient multivariate signature generation: A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a first vector Y of verification values from a message, computing over the first vector, using a processor, a digital signature X including a second vector... Agent: Nds Limited
20130294602 - Small form-factor cryptographic expansion device: A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform cryptographic operations on communications sent to and from the communication device is described. The cryptographic expansion device can be a small-form factor cryptographic expansion device that can... Agent:
20130294603 - Centralized key management in embms: A split architecture eMBMS with distributed BMSCs providing the same eMBMS service allows for a centralized key service where each BMSC is able to derive a set of MTKs from the MSK using the MTK-IDs as the differentiating input. This avoids the need to send MTKs to the BMSCs.... Agent: Telefonaktiebolaget L M Ericsson (publ)
20130294604 - Distributed key-based encryption system: A distributed key-based encryption system comprises a sending side and a receiving side. The sending side comprises a key-data generation unit, an encryption unit, a first wireless-transfer unit, and a second wireless-transfer unit. The receiving side comprises a third wireless-transfer unit, a fourth wireless-transfer unit, and a decryption unit. The... Agent:Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20131128:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.16178 seconds