Cryptography patents - Monitor Patents Logo icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents

USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14: Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |


Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
08/07/2014 > 12 patent applications in 6 patent subcategories.

20140219442 - Secure crypto key generation and distribution: This document discusses, among other things, a method of distributing authentication keys that can prevent certain forms of circuit fabrication piracy. In an example, a method can include selecting a number of authentication keys for generation at a key generation computer, generating a random number using a random number generator... Agent: Fairchild Semiconductor Corporation

20140219443 - Generation of cryptographic keys: A method is provided of generating and distributing secret random data. The method requires a plurality of participating parties each to own an identical private-key generation device and to request a random signal over a shared publication communication network. At each iteration of the method, the parties process the public... Agent: Universite Libre De Bruxelles

20140219444 - Method for generating a random output bit sequence: A method and a random bit generator for generating a random output bit sequence. In this method, a configuration of 2n state machines is used, the state machines each including n state bits, each state machine always assuming a different state than the other state machines of the configuration, an... Agent:

20140219445 - Processors including key management circuits and methods of operating key management circuits: A system on chip includes a central processing unit and a key manager coupled to the central processing unit. The key manager includes a random number generator configured to generate a key and a key memory configured to store the key and a user setting value associated with the key.... Agent: Samsung Electronics Co., Ltd.

20140219446 - Method and apparatus for use in a downloadable conditional access system: In a downloadable conditional access system (DCAS), preferably all DCAS-specific code is implemented in a configurable secure (CS) processor that is in communication with the host processor. Preferably, no DCAS-specific code is executed in the host processor. The host processor delivers commands to the CS processor, which the CS processor... Agent: General Instrument Corporation

20140219447 - Method for managing profile of embedded uicc, and embedded uicc, embedded uicc-equipped terminal, provision method, and method for changing mno using same: The present invention provides a method wherein an MNO receives a secret key allocated to a corresponding embedded UICC (eUICC) through SM-SR (secure routing) in an environment where SM is divided and implemented as SM-SR and SM-DP (data preparation), that is, provided is a method wherein the MNO dynamically acquires... Agent: Kt Corporation

20140219448 - Authenticating a telecommunication terminal in a telecommunication network: A method for authenticating a telecommunications terminal having an identity module includes: storing a first private key, a first public key and a first signature, the first signature being based on signing the first public key using a second private key; generating identity information and a second signature, the second... Agent: Deutsche Telekom Ag

20140219451 - Adaptive security apparatus and method for updating security parameter: An adaptive security apparatus is arranged for updating a security parameter in a database. The adaptive security apparatus includes a message receiver, a data processor, a security processor, and an adaptive parameter processor. The message receiver is arranged for receiving a message. The data processor is arranged for receiving the... Agent: Mediatek Inc.

20140219452 - Authentication of a chemical sensor in a portable electronic device: A chemical sensor (11) of a portable electronic device (1) is authenticated by reading a cryptographic sensor identifier from a memory of the chemical sensor and transmitting sensor-related data from the portable electronic device to a remote evaluation unit (6), the sensor-related data comprising the cryptographic sensor identifier. The sensor-related... Agent: Sensirion Ag

20140219449 - Lpi/lpd communication systems: A node in a first network requests a communication channel from a second network. Upon receiving a channel assignment, nodes in the first network employ the assigned channel for communicating in a manner that is transparent to the second network. A transmitting node selects a decoy data signal as a... Agent:

20140219453 - System and method for nfc peer-to-peer authentication and secure data transfer: A reader device may generate a first identifier. The reader device may transmit the first identifier to a mobile device. The reader device may receive encrypted data and unencrypted data from the mobile device in which the encrypted data includes a second identifier. The reader device may evaluate whether the... Agent:

20140219450 - Wireless sensor network and central node device thereof: The invention is directed to a wireless sensor network system. The wireless sensor network system is adapted for a medication information security environment, and the wireless sensor network system comprising a first sensor node, a second sensor node and a central node. The first sensor node sends a request for... Agent: I-shou University

07/31/2014 > 12 patent applications in 6 patent subcategories.
07/24/2014 > 17 patent applications in 8 patent subcategories.

20140205086 - Apparatus for encrypting data: An apparatus for encrypting data is provided. The apparatus is capable of symmetrically encrypting data and then encrypting the symmetrically encrypted data with the aid of a bit string. The bit string has a maximum entropy. Encryption of the symmetrically encrypted data is designed such that a section of the... Agent: Compugroup Medical Ag

20140205084 - Instructions to perform jh cryptographic hashing in a 256 bit data path: A method is described. The method includes executing one or more JH_SBOX_L instructions to perform S-Box mappings and a linear (L) transformation on a JH state and executing one or more JH_P instructions to perform a permutation function on the JH state once the S-Box mappings and the L transformation... Agent:

20140205085 - Preventing pattern recognition in electronic code book encryption: In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ECB) encryption. The resulting ciphertext does not include recognizable patterns from the content as is typical... Agent:

20140205083 - System for applying and reading out an information field identifying and protecting an object: A hard/software system for applying and reading out an information field identifying and protecting an item, comprises an applying unit, a reading unit, a control unit, and a database unit. The applying unit (for example, a laser or printer) generates the information field and transports it to the item. The... Agent:

20140205088 - Information processing apparatus and information processing method: Provided is an information processing apparatus including a message generating unit that generates a message based on a multi-order multivariate polynomial set F=(f1, . . . , fm) defined on a ring K and a vector s that is an element of a set Kn, a message providing unit that... Agent: Sony Corporation

20140205087 - Information processing apparatus, information processing method, program, and recording medium: Provided is an information processing apparatus including a message generating unit that generates messages of N times (where N≧2) based on a multi-order multivariate polynomial set F=(f1, . . . , fm) defined on a ring K and a vector s that is an element of a set Kn, and... Agent: Sony Corporation

20140205090 - Method and system for securely computing a base point in direct anonymous attestation: A method and system computes a basepoint for use in a signing operation of a direct anonymous attestation scheme. The method and system includes computing a basepoint at a host computing device and verifying the base point at a trusted platform module (TPM) device.... Agent:

20140205091 - Method for a key generation using genomic data and its application: A method generates an alphanumeric or numeric key linked to personal genomic data. In a first step genomic data from a single genome are analyzed. Genetic markers are retrieved from the data and associated with various informations like, but not exclusively, their name, identification number, polymorphism frequency distribution in various... Agent: Portable Genomics, Inc.

20140205092 - Secure provisioning in an untrusted environment: Embodiments include methods for securely provisioning copies of an electronic circuit. A first entity (e.g., a chip manufacturer) embeds one or more secret values into copies of the electronic circuit. A second entity (e.g., an OEM): 1) embeds a trust anchor in a first copy of the electronic circuit; 2)... Agent: Freescale Semiconductor, Inc.

20140205089 - System and method for differential encryption: Some embodiments include a Trusted Security Module that creates secure connections using a set of split keys. Some embodiments include the creation of remote and local keys that are distributed to multiple devices. When the devices wish to communicate with each other, the remote and local keys are combined into... Agent: Raytheon Company

20140205093 - Method and system for generating a random number: For generating a seed, such as for a random number, a plurality of data storage location identifiers, such as sectors, can be combined. A random number can be calculated using the seed. The selection of the data storage location identifiers can be time varied based on commands received from a... Agent: Seagate Technology LLC

20140205094 - Video receiving apparatus and broadcast receiving apparatus: An video receiving apparatus which reduces waiting time till image is displayed on a monitor include: a plurality of authentication executing units which perform respectively an authentication process to the external devices connected to each of the plurality of input terminals; a terminal selecting unit which selects one of the... Agent: Funai Electric Co., Ltd.

20140205095 - Authentication system and authentication code convertor: The authentication system includes a to-be-authenticated device for generating a first authentication data; an authentication code convertor for converting the first authentication data generated by the to-be-authenticated device into a second authentication data; and an authentication device for performing authentication of the to-be-authenticated device based on the second authentication data.... Agent: Canon Kabushiki Kaisha

20140205098 - Adding randomness internally to a wireless mobile communication device: An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a method for providing random data on an electronic device, the method comprising: storing random data in a... Agent: Blackberry Limited

20140205097 - Location brokering for providing security, privacy and services: Location brokering technique embodiments are presented that employ sensor data captured by a user's mobile device to determine the device's location, encrypt the location data and store it in a database. The location data is encrypted in such a way that it is possible to determine when a user's mobile... Agent: Microsoft Corporation

20140205096 - Un-ciphered network operation solution: The present invention relates to a solution for handling security issues of non access stratum (NAS) signaling in a telecommunications network. The NAS signaling is performed between a user equipment (UE) and a mobility management node, e.g. a mobility management entity (MME). The solution is realized in a device and... Agent: Telefonaktiebolaget L M Ericsson (publ)

20140205099 - Inter-module authentication for securing application execution integrity within a computing device: Systems and methods for recognizing and reacting to malicious or performance-degrading behaviors in a mobile device include observing mobile device behaviors in an observer module within a privileged-normal portion of a secure operating environment to identify a suspicious mobile device behavior. The observer module may generate a concise behavior vector... Agent: Qualcomm Incorporated

07/17/2014 > 6 patent applications in 5 patent subcategories.

20140198912 - Block cipher modes of non-malleable operation: A method and system for producing at least one ciphertext block from at least one plaintext block using a block cipher is described, the block cipher including an encryption function Enc, the method and system including receiving n plaintext blocks, wherein n is an integer greater than 0, for each... Agent: Cisco Technology Inc.

20140198911 - Sharing a secret via linear interpolation: A method and system distributes shares of a secret among cooperating entities using linear interpolation. In one embodiment, a linear equation is formed using the secret and random elements. The linear equation represents a K-dimensional hyperplane, where K is the number of shares to reconstruct the secret. Shares of the... Agent: Red Hat, Inc.

20140198913 - Method and apparatus for a computable, large, variable and secure substitution box: One feature pertains to methods for generating cryptographic values associated with substitution boxes (S-box). The methods includes first obtaining an input value and a first value. One method includes generating an S-box output value by performing an exclusive OR (XOR) operation on the input value and the first value to... Agent:

20140198914 - Method and apparatus for establishing a key agreement protocol: A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each... Agent: Securerf Corporation

20140198915 - Method and apparatus for selective communication signal deciphering: Selective deciphering of a received signal, as taught herein, provides a number of advantages, including greater efficiency through the elimination or at least reduction of wasted decoding cycles. The technique, such as practiced in a user equipment or other wireless communication device, capitalizes on the advantageous recognition herein that the... Agent: Telefonaktiebolaget Lm Ericsson (publ)

20140198916 - Method and device for managing encrypted group rekeying in a radio network link layer encryption system: Disclosed is a radio system, method, and device for a mobile station to indicate to an authentication controller, in an authentication response message, which of a plurality of group key link layer encryption keys (GKEK)s it currently has in its possession, and to work with the authentication controller to more... Agent: Motorola Solutions, Inc

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


RSS FEED for 20140807: xml
Integrate into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.


Thank you for viewing Cryptography patents on the website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.

Results in 0.15252 seconds