Cryptography patents - Monitor Patents Logo icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents

USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14:  | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |


Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
11/13/2014 > 4 patent applications in 3 patent subcategories.

20140334622 - Authentication device, output device, verification device and input device: According to an authentication device is for authenticating the validity of a subject ciphertext generated by encrypting a plaintext using homomorphic encryption. The authentication device includes a commitment generator and a response generator. The commitment generator is configured to generate a commitment from a randomly selected verification value, and transmit... Agent: Kabushiki Kaisha Toshiba

20140334621 - Method for complete atomic blocks for elliptic curves in jacobian coordinates over prime fields countermeasure for simple-side channel attacks and c-safe-fault attacks for left-to-right algorithms: The present invention describes a method which improves the safety aspects of the previously published atomic blocks. This method builds new sets of atomic blocks designed to protect against both simple side-channel attacks and C-safe fault attacks for scalar multiplication for elliptic curves over prime fields. These atomic blocks are... Agent: Universidad De Santiago De Chile

20140334623 - Rapid data encryption and decryption for secure communication over open channels with plausible deniability: Technologies are generally described for providing rapid data encryption and decryption for secure communication over an open channel with plausible deniability. In some examples, a single bit of information may be encoded by many alternative combinations of bits thus providing high security as well as enabling a single ciphertext to... Agent:

20140334624 - Simplified management of group secrets by group members: A method for key management is disclosed, wherein in adding a new device to a device group, the device group including a plurality of devices, wherein each device in the device group possesses device keys of all other devices in the device group for encryption of messages, except its own... Agent:

11/06/2014 > 3 patent applications in 2 patent subcategories.

20140328482 - Encryption evaluation device, encryption evaluation method, and encryption evaluation program: An encryption evaluation device 100 is a device evaluating the security of a block cipher encrypting data of a predetermined size for each block by repeatedly executing, a predetermined number of rounds, a round process using a round function converting data based on a key. The encryption evaluation device 100... Agent: Nec Software Hokuriku, Ltd.

20140328481 - Identification information generation device and identification information generation method: Provided is an identification information generation device capable of generating identification information with its complete individual identifiability guaranteed. The identification information generation device comprises: an information separation means for separating a cryptographic key of k bits (k is an integer equal to or larger than 1) and second identification information... Agent: Nec Corporation

20140328483 - Method for producing a hardware device and hardware device: A method for producing a hardware device, in particular a trusted platform module for the execution of at least one cryptographic algorithm, the hardware device corresponding to a real-time class, i.e., it fulfils specifiable run-time requirements for real-time applications, wherein the method comprises preparing at least one cryptographic algorithm in... Agent:

10/30/2014 > 15 patent applications in 8 patent subcategories.

20140321640 - Apparatus and method for generating digital images: An apparatus and a method are arranged for generating a digital image. The apparatus comprises an image generation unit for generating the digital image having a first security module adapted for cryptographically linking a first secret unambiguously identifying the first security module, and securely deposited therein, with the digital image... Agent: Giesecke & Devrient Gmbh

20140321638 - Apparatus and method to prevent side channel power attacks in advanced encryption standard: Apparatus and method for obscuring round 1 power consumption of hardware implementation of the Advanced Encryption Standard (AES) algorithm. Additional hardware circuitry will provide consistent power consumption during round 1 of the AES algorithm. This prevents the opportunity to determine the AES key value during a side channel power attack.... Agent:

20140321639 - Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation: Apparatus and method for obscuring round 1 power consumption of hardware implementation of the AES algorithm. By simultaneously executing a processor floating point operation while executing round 1 of the AES algorithm power consumption of the AddRoundKey transformation is obscured. This prevents the opportunity to determine the AES key value... Agent:

20140321637 - Secure time and crypto system: A system that performs time dependent cryptographic operations on input material resulting in outputs valid only over limited preconfigured life times to mitigate the security drawbacks of unattended operations while capturing the benefits of automation. Tamper protection circuitry is used to ensure the integrity of the system's internal independent source... Agent:

20140321642 - Group encryption methods and devices: The present invention improves on prior art group encryption schemes by encrypting an alias of a recipient's public key instead of the public key itself. A Group Manager publishes the encryption of the alias,the corresponding public key and a corresponding certificate on a public database DB. The alias is a... Agent:

20140321641 - Method and system for decoupling user authentication and data encryption on mobile devices: A method for decoupling user authentication and data encryption on mobile devices includes generating an encryption key (“EK”) for encrypting data and a key encryption key (“KEK”) for encrypting the EK, obtaining an encrypted EK by encrypting the EK using the KEK, storing the encrypted EK on a data container... Agent:

20140321643 - Method of generating multi-dimensional key: A method of generating multi-dimensional key comprises both generating three-dimensional coordinate sequences and generating public key and private key, wherein generating three-dimensional coordinate sequences is: setting the base of three-dimensional key as M comprising of m×l×h key elements, each layer in a three-dimensional matrix being a two dimension matrix sized... Agent:

20140321645 - Apparatus and method for converting random binary sequence into random integer: An apparatus and method for converting a random binary sequence into a random integer is provided. The present invention converts a random binary sequence into a random integer, and determines whether the corresponding random integer falls within a preset integer interval. Further, if it is determined that the random integer... Agent: Electronics And Telecommunications Research Institute

20140321644 - Method and system for calculations on encrypted data: A method and device for generating a communal decryption key among participants to permit sharing of sensitive data, the method at a current participant includes generating a secret value; adding the generated secret value to an in progress key to create a modified in progress key; and forwarding the modified... Agent: Her Majesty The Queen In Right Of Canada, As Represented By The Minister Of National Defence

20140321646 - Method for the authentication of applications: Authentication method of at least one application using resources stored in a security module associated to an equipment connected to a control server via a network. The control server receives via the network, analyses and verifies identification data comprising at least an identifier of the equipment and an identifier of... Agent:

20140321647 - Method and arrangement for providing a wireless mesh network: A method and an arrangement for providing a wire-free mesh network are provided. An approval procedure is carried out in situations in which a subscriber who is registering on the mesh network transmits an MAC address which already exists in the mesh network, such that two different subscribers within the... Agent:

20140321648 - Method and system for providing information using agreement procedure executed by using proximity communication: A method and system for providing information using a prior agreement procedure via proximity communication is provided. Upon receiving a request for an information providing agreement from a mobile terminal which is capable of proximity communication, the information providing method transmits the information providing agreement. Accordingly, since the mobile terminals... Agent: Sk C&c Co., Ltd.

20140321650 - Key-based content management and access systems and methods: An exemplary method includes receiving data representative of a content instance over a network from an access device associated with a first user, encrypting the content instance in response to a command initiated by the user by way of one or more graphical user interfaces, providing a key configured to... Agent: Verizon Patent And Licensing Inc.

20140321649 - Method and apparatus for distributing a quantum key: A method for distributing a quantum key is provided, including sending a first photon to a first receiver; sending a second photon to a second receiver, the first and second photons being a pair of time-energy entangled photons; and providing a coding scheme comprising a plurality of time bins and... Agent: The Trustees Of Columbia University In The City Of New York

20140321651 - Distribution of keys for encryption/decryption: Methods of encryption and decryption are described which use a key associated with an event to encrypt/decrypt data associated with the event. The method of encryption comprises identifying a key associated with an event and encrypting data using the identified key. The encrypted data is then published along with details... Agent:

10/23/2014 > 8 patent applications in 6 patent subcategories.

20140314229 - Cryptography on a simplified elliptical curve: A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X) and from polynomials satisfying: −f(X1(t)).f(X2(t))=U(t)2 in the finite body Fq, irrespective of the parameter t, q=3 mod 4. A value of the parameter t is obtained and the point P is determined by:... Agent: Morpho

20140314230 - Cryptography on an elliptical curve: A cryptographic calculation includes obtaining a point P(X,Y) from a parameter t on an elliptical curve Y2=f(X); and from polynomials X1(t), X2(t), X3(t) and U(t) satisfying: f(X1(t))·f(X2(t))·f(X3(t))=U(t)2 in Fq, with q=3 mod 4. Firstly a value of the parameter t is obtained. Next, the point P is determined by: (i)... Agent: Morpho

20140314231 - System and methods for encrypting data: A system and associated methods for encrypting data are disclosed. In at least one embodiment, a key manager is located in memory on an at least one computing device and configured for creating and managing an at least one encryption key to be used for encrypting the data. An at... Agent: Risoftdev, Inc.

20140314232 - Pc secure video path: A system and method are disclosed for creating a secure video content path, or a protected media content bus, within an unsecure personal computer. A portable security module, or electronic key safe, may be inserted into a personal computer that has different internal components for processing secure and unsecured content.... Agent: Comcast Cable Communications, LLC

20140314233 - Protected media decoding using a secure operating system: Disclosed herein are representative embodiments of tools and techniques for facilitating decoding of protected media information using a secure operating system. According to one exemplary technique, encoded media information that is encrypted is received at a secure process of a secure operating system of a computing system. At least a... Agent: Microsoft Corporation

20140314234 - Recoverable digital content degradation: The disclosure relates generally to processing audio and video signals. One claim recites an apparatus comprising: electronic memory for storing a media signal, the media signal comprising degradation introduced through use of a key, in which the key corresponds to detection criteria in the media signal, and in which the... Agent: Digimarc Corporation

20140314235 - Apparatus for generating trusted image data, an apparatus for authentication of an image and a method for generating trusted image data: An apparatus for generating trusted image data includes an image data generator, a processor and an output unit. The image data generator generates image data of an image to be taken of a three-dimensional scene and trust data of the three-dimensional scene. The trust data indicates a depth information of... Agent: Infineon Technologies Ag

20140314236 - Radio base station initialization: It is presented a user equipment (20), UE, for assisting the initialization of a radio base station. The UE (20) comprises a reader (21) arranged to read an optical representation of data associated with the radio base station, a communication interface (22) arranged for wireless communication; a processor (23); and... Agent: Telefonaktiebolaget L M Ericsson (publ)

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


RSS FEED for 20141113: xml
Integrate into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.


Thank you for viewing Cryptography patents on the website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.

Results in 0.24332 seconds