Cryptography patents - Monitor Patents
FreshPatents.com Logo    FreshPatents.com icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents



USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  15: Apr | Mar | Feb | Jan | 14: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |

Cryptography

Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
  
05/21/2015 > 8 patent applications in 6 patent subcategories.

20150139418 - Method and apparatus for user identity verification: The present disclosure describes a method and apparatus for user identity verification as a user migrates amongst systems, servers, computing environments and/or segments within a cloud computing environment. A user currently accessing a first system seeks to migrate from the first system to a target system. The target system validates... Agent: At&t Intellectual Property I, L.p.

20150139419 - Systems and methods for playing back alternative streams of protected content protected using common cryptographic information: Systems and methods for performing adaptive bitrate streaming using alternative streams of protected content in accordance with embodiments of the invention are described. One embodiment of the invention includes a processor, and memory containing a client application. In addition, the client application configures the processor to: request a top level... Agent: Sonic Ip, Inc.

20150139420 - Serial transmission having a low level emi: A method for transmitting data in series includes producing a scrambled signal by applying a scrambling using a pseudo-random sequence to an incoming serial signal conveying the data and producing an outgoing serial signal from the scrambled signal. After each sequence of N consecutive bits at the same state in... Agent:

20150139421 - Probabilistic key distribution in vehicular networks with infrastructure support: Method and system of key distribution by trusted nodes for a vehicular ad hoc network, the nodes of said network having at least one pair of public-private keys and the corresponding certificates, issued by a CA, said method comprising each vehicle node, on entering said network region, requesting a set... Agent:

20150139424 - Key agreement for wireless communication: Methods, systems, and computer programs for performing key agreement operations in a communication system are described. In some aspects, a wireless network operator receives a mobile device identifier and accesses a secret key associated with the mobile device. A message authentication code function is evaluated based on the secret key... Agent: Certicom Corp.

20150139422 - Method and apparatus for providing broadcast channel encryption to enhance cellular network security: A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an... Agent: At&t Intellectual Property I, L.p.

20150139423 - Protection for a means of transportation against unauthorised usage or theft: The present invention relates to a method for protection of a means of transportation against unauthorised usage or theft using a lock and an end device that can be operated in a cellular network. Subject of the invention are further a lock for protection of a means of transportation against... Agent:

20150139425 - Key managing system and method for sensor network security: Disclosed are a key managing system and method for sensor network security. The key managing system includes a secret key transmitter configured to transmit a portion of a secret key map, stored in a node, to a correspondent node, and transmit the secret key map of the node to the... Agent: Electronics And Telecommunications Research Institute

  
05/14/2015 > 4 patent applications in 3 patent subcategories.

20150131795 - Cryptographic hash generation system: A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second... Agent: Securerf Corporation

20150131796 - Encryption key generation: A method of generating an encryption key. The method comprises collecting a plurality of user defined variables defined by input from a user and collecting a plurality of environmental variables associated with varying environmental conditions. The method further comprises defining parameters of a plurality of scrambling functions using the user... Agent: Omlis Limited

20150131798 - Enabling packet handling information in the clear for macsec protected frames: Techniques are provided to append packet handling information “in the clear” ahead of security related information in a packet to be routed over a network to optimize wide area network deployments of security-configured equipment. In one form, at a network device that performs connectionless secure communication and network routing of... Agent:

20150131797 - Executing electronic contract on nfc enabled mobile devices: A method, system and/or NFC (Near field communication) enabled mobile device is provided for executing an electronic contract on NFC enabled mobile devices. A first contracting party is provided to apply an electronic signature thereof in an electronic contract provided on a first NFC enabled mobile device used by the... Agent: International Business Machines Corporation

  
05/07/2015 > 11 patent applications in 8 patent subcategories.

20150124960 - Black core network system and method: In a network having an encryptor device having an encryption module, a plaintext interface and a ciphertext interface, wherein the encryption module encrypts data transferred from the plaintext interface to a black network through the ciphertext interface and decrypts data transferred from the ciphertext interface to a plaintext network through... Agent: Raytheon Company

20150124962 - Fast computation of a single coefficient in an inverse polynomial: where ρ0, ρ1, . . . , ρn-1 are roots of the second polynomial fn(x) over a field; outputting the lowest coefficient of g(z) as the resultant; and outputting the second lowest coefficient of g(z) divided by n as the free term of the scaled inverse of the first polynomial... Agent:

20150124961 - Public key encryption algorithms for hard lock file encryption: In some aspects, an encryption method comprises encrypting a first portion of a message using a first secret key. The first secret key is generated based on the public key of an entity. A one-way function is used to generate a second secret key from the first secret key, and... Agent: Blackberry Limited

20150124963 - Authentication: A method in a first entity for authenticating itself to a second entity by proving to the second entity that it is in possession of a full secret without sending the full secret to the second entity, the method comprising: receiving in the first entity an input from a user,... Agent:

20150124964 - Conditional entitlement processing for obtaining a control word: Embodiments of the invention provide an improved method and an improved receiver for obtaining a control word. Two or more subkeys are obtained in a receiver. Each subkey was encrypted under control of a key received in an entitlement message or transformed under control of a seed received in an... Agent:

20150124965 - Document with verification data: Disclosed herein is a method of generating a document comprising verification data, the method comprising: obtaining data for inclusion on a document, wherein the obtained data includes verification data; encrypting the verification data; generating a machine readable code comprising the encrypted verification data; and generating a document comprising both the... Agent:

20150124966 - End-to-end security in an ieee 802.11 communication system: A communication network comprises a front-end network communication device arranged to operate as a front-end access point for establishing at least one data connection, such as an IEEE 802.11 data connection, between at least one mobile communications terminal and at least one back-end network communication device, protected end-to-end with an... Agent:

20150124967 - Method to detect an ota (over the air) standard message affected by an error: A method is to detect a message compatible with the OTA (Over The Air) standard and affected by a wrong ciphering. The method may include receiving the ciphered OTA message; deciphering the OTA message; and reading a counter field of padding bytes in the deciphered OTA message and reading corresponding... Agent:

20150124968 - Securely joining a secure wireless communications network: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member... Agent:

20150124969 - Method and device for obtaining a security key: A method comprises obtaining scan information by scanning a quick response QR code in a quick response key QRkey card, wherein the QR code includes a website link and a public key; opening a network platform page corresponding to the website link in the QR code; and obtaining a private... Agent: Golden Vast Macao Commercial Offshore Limited

20150124970 - Key negotiation method and apparatus according to sm2 key exchange protocol: The invention relates to the technical field of information, and disclosed in the present invention are a key negotiation method and apparatus according to the SM2 key exchange protocol. The method is implemented as follows: two negotiation parties both calculate a parameter W according to the minimum positive integer value... Agent:

  
04/30/2015 > 12 patent applications in 5 patent subcategories.

20150117639 - Secure and privacy friendly data encryption: In one aspect, the present disclosure provide an encryption circuit that performs a method for establishing a secure communication channel. In this regard, the method includes receiving a public encryption key from a transmitting device. In response, a receiving device sends to the transmitting device an index which references a... Agent:

20150117636 - System and method for performing a secure cryptographic operation on a mobile device: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117638 - System and method for performing a secure cryptographic operation on a mobile device based on a contextual variable: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets Which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117637 - System and method for performing a secure cryptographic operation on a mobile device selecting data from multiple sensors: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117640 - Apparatus and method for performing key derivation in closed domain: Provided are an apparatus and method for guaranteeing the safety of a computing device by separating a closed domain from an open domain in the computing device and allowing the closed domain to perform key derivation that is required for encryption/decryption of data. The computing device includes a hypervisor, the... Agent: Electronics And Telecommunications Research Institute

20150117641 - Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer: o

20150117644 - System and method for performing a secure cryptographic operation on a mobile device based on a user action: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117643 - System and method for performing a secure cryptographic operation on a mobile device combining data from multiple sensors: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117642 - System and method for performing a secure cryptographic operation on a mobile device using an entropy pool: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

20150117645 - Medical device communication using encryption based on correlated motion: Devices, systems, and techniques for generating an encryption key using detected motion from a device. In one example, a method may include receiving movement information indicative of motion detected by a first device during a period of time in which the first device and a second device were bumped together,... Agent: Medtronic, Inc.

20150117647 - Storytelling environment: intradevice communications: One embodiment provides a device that includes one or more line of sight transmitters configured to transmit signals over a line of sight communications medium, one or more transmitters configured to transmit signals over another communications medium and a controller. The controller is configured to perform an operation that includes... Agent:

20150117646 - System and method for performing a secure cryptographic operation on a mobile device including an entropy filter: In a mobile communication device, multiple sets of sensor measurement data are obtained, each from a corresponding hardware sensor resident on the device. Insufficiently random data is filtered from each of the data sets to produce random data sets which are combined to produce entropy data which is stored in... Agent: Apriva, LLC

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


######

RSS FEED for 20150521: xml
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.

######

Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.