Cryptography patents - Monitor Patents
FreshPatents.com Logo    FreshPatents.com icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents



USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  15: Apr | Mar | Feb | Jan | 14: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |

Cryptography

Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
  
04/16/2015 > 19 patent applications in 6 patent subcategories.

20150104007 - Flexible architecture and instruction for advanced encryption standard (aes): A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key... Agent: Intel Corporation

20150104008 - Flexible architecture and instruction for advanced encryption standard (aes): A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key... Agent: Intel Corporation

20150104009 - Flexible architecture and instruction for advanced encryption standard (aes): A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key... Agent: Intel Corporation

20150104010 - Flexible architecture and instruction for advanced encryption standard (aes): A flexible aes instruction set for a general purpose processor is provided. The instruction set includes instructions to perform a “one round” pass for aes encryption or decryption and also includes instructions to perform key generation. An immediate may be used to indicate round number and key size for key... Agent: Intel Corporation

20150104004 - Methods, systems, and devices for delivering image data from captured images to devices: Computationally implemented methods and systems include acquiring a device-based encrypted image that is an image that has previously been encrypted through use of a particular device code associated with an image capture device configured to capture the image, wherein the image includes a representation of a feature of an entity,... Agent:

20150104005 - Methods, systems, and devices for handling captured image data that is received by devices: Computationally implemented methods and systems include acquiring a client-based encrypted image that is a captured image that has previously been encrypted through use of a particular client code, wherein said captured image was captured by an image capture device, obtaining an indication that the client-based encrypted image was approved for... Agent:

20150104006 - Methods, systems, and devices for handling image capture devices and captured images: Computationally implemented methods and systems include acquiring an encrypted image that is a captured image that has been encrypted through use of a particular device code associated with an image capture device that captured the captured image, wherein the captured image includes a representation of a feature of an entity,... Agent: Elwha LLC

20150104002 - Methods, systems, and devices for handling image data from captured images: Computationally implemented methods and systems include acquiring an image, wherein said image includes at least one representation of a feature of at least one entity, detecting a presence of a privacy beacon in the acquired image, wherein further image process operation on image data unrelated to detection of the presence... Agent:

20150104003 - Methods, systems, and devices for handling image data from captured images: Computationally implemented methods and systems include acquiring image data that includes an image that contains a representation of a feature of an entity and that has been encrypted through use of a unique device code, wherein said image data further includes a privacy metadata regarding a presence of a privacy... Agent:

20150104011 - Preservation of encryption: An apparatus, method, system and computer-readable medium are provided for preserving an encryption of data when confronted by an attack, such as a side channel analysis (SCA) attack based on a statistical analysis. In some embodiments, hardware, software, and/or firmware associated with an encryption calculation may be exercised or accessed... Agent: Combined Conditional Access Development & Support, LLC

20150104012 - Methods, systems, and devices for delivering image data from captured images to devices: Computationally implemented methods and systems include acquiring a device-based encrypted image that is an image that has previously been encrypted through use of a particular device code associated with an image capture device configured to capture the image, wherein the image includes a representation of a feature of an entity,... Agent:

20150104013 - Methods, systems, and devices for handling captured image data that is received by devices: Computationally implemented methods and systems include acquiring a client-based encrypted image that is a captured image that has previously been encrypted through use of a particular client code, wherein said captured image was captured by an image capture device, obtaining an indication that the client-based encrypted image was approved for... Agent:

20150104014 - Automatic multimedia upload for publishing data and multimedia content: Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile... Agent: Cellspinsoft Inc.

20150104015 - Automatic multimedia upload for publishing data and multimedia content: Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile... Agent: Cellspinsoft Inc.

20150104016 - Automatic multimedia upload for publishing data and multimedia content: Disclosed herein is a method and system for utilizing a digital data capture device in conjunction with a Bluetooth (BT) enabled mobile device for publishing data and multimedia content on one or more websites automatically or with minimal user intervention. A client application is provided on the BT enabled mobile... Agent: Cellspinsoft Inc.

20150104018 - Broadcast replenishment of account parameters for groups of wireless devices: A system and method are provided for the broadcast replenishment of account parameters for select groups of wireless devices, where select groups of wireless devices have their internally-stored account parameters (e.g., prepaid amount of usage authorization) simultaneously updated as a group by a single broadcast message, such as an encrypted... Agent:

20150104019 - Direct link setup method, key updating method and device: A method includes transmitting, by a first station to an access point, a direct link setup request message destined for a second station, where the direct link setup request message is used to request setup of a direct link between the first station and the second station, receiving, by the... Agent:

20150104017 - Secure group key agreement for wireless networks: A method for secure key agreement among a subset of a plurality of transceivers includes generating a first ordered subset of a plurality of keys kλj, where j=0 to S. Each of the subset of the plurality of transceivers may possess at least one of the plurality of keys kλj... Agent: Trellisware Technologies, Inc.

20150104020 - Method, network element, and mobile station for negotiating encryption algorithms: A method, network element, and mobile station (MS) are disclosed. The method includes: obtaining information that a plug-in card of the MS does not support a first encryption algorithm; deleting the first encryption algorithm from an encryption algorithm list permitted by a core network element according to the information that... Agent:

  
04/09/2015 > 8 patent applications in 5 patent subcategories.

20150098563 - Generating multiple secure hashes from a single data buffer: One embodiment provides an apparatus. The apparatus includes a single instruction multiple data (SIMD) hash module configured to apportion at least a first portion of a message of length L to a number (S) of segments, the message including a plurality of sequences of data elements, each sequence including S... Agent:

20150098564 - Masking and unmasking methods and devices: Devices and methods for masking and unmasking sensitive data, based on a standard cryptographic algorithm defining a ciphering algorithm, and a deciphering algorithm using more resources than the ciphering algorithm are described. The masking of sensitive data is done by applying the deciphering algorithm to the sensitive data to obtain... Agent: Oberthur Technologies

20150098566 - Cryptographic system, cryptographic method, cryptographic program, and decryption device: In a functional encryption scheme where a decryption key dk can decrypt a ciphertext encrypted by an encryption key ek, when decrypting the encryption key in which a parameter Φ is set, by the decryption key dk in which a parameter Ψ is set, if and only if a relation... Agent: Nippon Telegraph And Telephone Corporation

20150098567 - Method of managing sensitive data in mobile terminal and escrow server for performing same: A method of managing the sensitive data of a mobile terminal and an escrow server for performing the method are disclosed. In the method of managing the sensitive data of a mobile terminal, an escrow server receives a request for registration from a mobile terminal, a user key is generated... Agent: Electronics And Telecommunications Research Institute

20150098565 - Privacy enhanced spatial analytics: Method, system, and computer program products, implementing and using techniques for processing data representing observations of entities. An anonymized key is generated. The anonymized key represents a spacetime region with which an entity is associated. The spacetime region represents a spatial region and a time interval. The entity is associated... Agent: International Business Machines Corporation

20150098568 - Method for generating a pseudorandom sequence, and method for coding or decoding a data stream: The present invention relates to a method for coding a first data stream and a method for decoding a second data stream wherein the coding is the result of comparing the first data stream with a third data stream formed by a pseudorandom sequence by means of an exclusive comparison... Agent:

20150098569 - Power line communication (plc) network nodes using cipher then segment security: Embodiments of the invention provide systems and methods for a cipher then segment approach in a Power Line Communication (PLC). A node or device generates frames to be transmitted to a destination node in the PLC network. A processor in the node is configured to generate a data payload comprising... Agent: Texas Instruments Incorporated

20150098570 - Apparatus and methods for separated security implementations in wireless communications: Systems, methods, and devices for communicating MPDUs having a plurality of types are described herein. One aspect of the disclosure provides a method of processing a media access control (MAC) protocol data unit (MPDU) in a wireless system. The method includes receiving the MAC protocol data unit, the MAC protocol... Agent:

  
04/02/2015 > 5 patent applications in 5 patent subcategories.

20150092939 - Dark bits to reduce physically unclonable function error rates: Embodiments of an invention for using dark bits to reduce physically unclonable function (PUF) error rates are disclosed. In one embodiment, an integrated circuit includes a PUF cell array and dark bit logic. The PUF cell array is to provide a raw PUF value. The dark bit logic is to... Agent:

20150092940 - Method for complete atomic blocks for elliptic curves in jacobian coordinates over prime fields countermeasure for simple-side channel attacks and c-safe-fault attacks for right-to-left algorithms: The present invention describes a method which improves the safety aspects of the previously published atomic blocks for the right-to-left case. This method builds new sets of atomic blocks designed to protect against both simple side-channel attacks and C-safe fault attacks for scalar multiplication for elliptic curves over prime fields.... Agent: Universidad De Santiago De Chile

20150092941 - Fault tolerant apparatus and method for elliptic curve cryptography: A fault tolerant apparatus and method for elliptic curve cryptography. For example, one embodiment of a processor includes one or more cores to execute instructions and process data; and fault attack logic to ensure that the execution of the instructions and processing of the data is not vulnerable to memory... Agent:

20150092942 - Security key generation for dual connectivity: Techniques for the secure generation of a set of encryption keys to be used for communication between a wireless terminal and an assisting base station in a dual-connectivity scenario. An example method includes generating (810) an assisting security key for the assisting base station, based on an anchor base station... Agent: Telefonaktiebolaget L M Ericsson (publ)

20150092943 - Digital data distribution system: A digital data distribution system and method for distributing a digital data stream to consumer electronic devices is disclosed. The data distribution system is configured to distribute the same media information in a digital data stream to a plurality of consumer electronic devices. The digital data distribution system comprises at... Agent:

  
03/26/2015 > 14 patent applications in 10 patent subcategories.

20150086007 - Compact, low power advanced encryption standard circuit: Embodiments of an invention for a compact, low power Advanced Encryption Standard circuit are disclosed. In one embodiment, an apparatus includes an encryption unit having a substitution box and an accumulator. The substitution box is to perform a substitution operation on one byte per clock cycle. The accumulator is to... Agent:

20150086008 - Method for producing an electronic device with a disabled sensitive mode, and method for transforming such an electronic device to re-activate its sensitive mode: A method is intended for transforming a secure electronic device, associated to a first identifier and having a sensitive mode disabled after production, for a new sensitive use. This method comprises the steps of: (i) externally computing a cipher of the first identifier with a predetermined function fed with this... Agent:

20150086009 - Handling key rotation problems: Example embodiments include centralized systems for managing cryptographic keys and trust relationships among systems. Embodiments may include a centralized key store and a centralized policy store. Key sets comprising public/private keys may be stored in or identified by key objects. Key objects within the key store may be organized into... Agent: Venafi, Inc.

20150086010 - Information processing apparatus, server apparatus, and computer program product: a device key storage unit configured to store a device key; a shared key storage unit configured to store one or more shared keys shared by the external apparatuses; a key generating unit configured to generate a media key from the device key and media key blocks; and an updating... Agent: Kabushiki Kaisha Toshiba

20150086012 - Secure video ouput path: Systems and methods for secure delivery of output surface bitmaps to a display engine. An example processing system comprises: an architecturally protected memory; and a processing core communicatively coupled to the architecturally protected memory, the processing core comprising a processing logic configured to implement an architecturally-protected execution environment by performing... Agent:

20150086011 - Wireless sharing of content between computing devices: A system and method for video content sharing are given. A wireless controller of a first computing device receives a multi-gigabit-per-second transmission of a compressed and encrypted remote frame buffer from a second computing device, and stores the compressed and encrypted remote frame buffer in local memory. An integrated graphics... Agent:

20150086013 - Systems and methods for simultaneous compression and encryption: Embodiments of reversible systems and methods for fast, secure and efficient transmission, storage, and protection of digital multimedia are disclosed. The embodiments may have the ability to simultaneously compress and encrypt digital data in order to concurrently reduce data size and prevent reconstruction without the proper encryption key. Embodiments of... Agent:

20150086014 - Systems and methods of securing operational information associated with an imaging device: The invention is directed to a tamper-evident method of encrypting data relating to one or more print cartridges installed in an imaging device that includes triggering a gathering of data relating to the one or more print cartridges installed in the imaging device; recording a number of instances the triggering... Agent:

20150086015 - Cryptographically protected redundant data packets: The embodiments relate to methods for generating cryptographically protected redundant data packets. N redundant data packets are produced by N different generation units. The respective generation unit is allocated a unique identification. N cryptographically protected redundant data packets are generated by an individual cryptographic function from the N generated redundant... Agent:

20150086016 - Encryption key providing method, semiconductor integrated circuit, and encryption key management device: The first device, which utilize a cipher, generates device unique data by a PUF, and the second device generates one pair of helper data and a device unique ID on the basis of the generated device unique data. The device unique data has fluctuations caused by the generation environment, and... Agent:

20150086017 - Secure near field communication server information handling system lock: Secure NFC interactions with a server information handling system management controller, such as a baseboard management controller, are supported with an NFC application running on a mobile information handling system. A private key is applied by the mobile application to create an application hash that a baseboard management controller verifies... Agent: Dell Products L.p.

20150086018 - Centralized key discovery and management: Example embodiments include centralized systems for managing cryptographic keys and trust relationships among systems. The centralized systems may create rich search criteria that can be used to search managed systems for key information. The search criteria may be coupled with a tag to assign key information that meets the search... Agent: Venafi, Inc.

20150086019 - Creating secure original equipment manufacturer (oem) identification: A processing device implementing creation of secure Original Equipment Manufacturer (OEM) identifiers (IDs) in a processing device is disclosed. A processing device of the disclosure includes a one-time programmable storage device and an execution unit. The execution unit can implement a one-way cryptographic hash function that is to receive a... Agent:

20150086020 - Centralized policy management for security keys: Example embodiments include centralized systems for managing cryptographic keys and trust relationships among systems. Embodiments may include a centralized key store and a centralized policy store. Key sets comprising public/private keys may be stored in or identified by key objects. Key objects within the key store may be organized into... Agent: Venafi, Inc.

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


######

RSS FEED for 20150416: xml
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.

######

Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.



Results in 0.227 seconds

PATENT INFO