|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
Recent | 13: May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
CryptographyBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 05/09/2013 > 11 patent applications in 7 patent subcategories.
20130114805 - Encryption system using discrete chaos function: Provided is an encryption system, which includes: an encryption round calculation unit for encrypting a plain text; and a substitution unit provided at the encryption round calculation unit and having a plurality of S-boxes defined by a discrete chaos function using each of a plurality of key values as a... Agent: Dongguk University Industry-academic Cooperate Foundation
20130114806 - Method for encrypting a message through the computation of mathematical functions comprising modular multiplications: providing a first parameter; generating a random number; calculating a Montgomery parameter based on said first parameter and on a integer multiple of said random number; generating a representation of the message to be encrypted in a Montgomery domain through a Montgomery conversion function applied to the message and to... Agent: Stmicroelectronics S.r.l.
20130114807 - Information sharing method and module, device and electronic product using the same: An exemplary information sharing method is provided. The information sharing method includes a step of: broadcasting predetermined sharing information to a user terminal(s) within a preset region on a client side in response to a sharing request while an information sharing function is enable. An information sharing module, device and... Agent: National Taiwan University
20130114808 - System and method for providing an indication of randomness quality of random number data generated by a random data service: A system and method for providing an indication of randomness quality of random number data generated by a random data service. The random data service may provide random number data to one or more applications adapted to generate key pairs used in code signing applications, for example. In one aspect,... Agent: Research In Motion Limited
20130114809 - Unique surrogate key generation using cryptographic hashing: The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as selecting a field or group of fields that is or are unique among all records in the database and... Agent: International Business Machines Corporation
20130114810 - Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium: A cryptographic communication technology that is based on functional encryption and that can operate flexibly is provided. A conversion rule information pair is determined in advance, which has attribute conversion rule information prescribing a conversion rule for converting attribute designation information to attribute information used in a functional encryption algorithm... Agent: Nippon Telegraph And Telephone Corporation
20130114812 - Demand based encryption and key generation and distribution systems and methods: Systems and methods providing a key management platform that generates and distributes demand-based encryption and decryption keys are described.... Agent:
20130114811 - Method for privacy preserving hashing of signals with binary embeddings: A hash of signal is determining by dithering and scaling random projections of the signal. Then, the dithered and scaled random projections are quantized using a non-monotonic scalar quantizer to form the hash, and a privacy of the signal is preserved as long as parameters of the scaling, dithering and... Agent:
20130114814 - Adding randomness internally to a wireless mobile communication device: An electronic device is provided with an integral transducer used to update a random data pool without connection to an external source of new random data. In one embodiment, there is provided a method for providing random data on an electronic device, the method comprising: storing random data in a... Agent: Research In Motion Limited
20130114813 - Method and apparatus for refreshing key: A method for refreshing a key is provided, wherein when a counter in a PDCP layer of a RB reaches a threshold, a mobile device receives a cell handover message, re-establishes PDCP layers and RLC layers for all RBs, keeps Uplink Time Alignment Information, uplink grant resources for uplink shared... Agent: Huawei Technologies Co., Ltd.
20130114815 - Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium: A sharing apparatus independently shares a value corresponding to each element θ(ψ, i, β)·g2 of basis vectors bi*(θ) among each subset SUB(α) consisting of H(α) share management apparatuses PA(α, 1), . . . , PA(α, H(α)) to generate share information SH(ψ, i, β, α, h(α)) corresponding to each element θ(ψ,... Agent: Nippon Telegraph And Telephone Corporation05/02/2013 > 15 patent applications in 9 patent subcategories.
20130108039 - Lightweight stream cipher cryptosystems: There is disclosed an apparatus and method for generating a keystream with ideal two-level autocorrelation, which can be efficiently implemented in both software and hardware on mobile devices requiring high security protection and in resource limited smart devices such as RFID chips. In one embodiment, a 16-bit Welch-Gong (WG) transformation... Agent:
20130108038 - System and method for a collatz based hash function: Disclosed herein are systems, methods, and non-transitory computer-readable storage media for generating a hash based on the Collatz conjecture. The Collatz conjecture is based on a set of operations for a given number n that are performed iteratively on n, with one operation performed if n is even, and another... Agent: Apple Inc.
20130108040 - Method and apparatus for providing identity based encryption in distributed computations: An approach is provided for providing identity based encryption in distributed computations. An identity based encryption platform causes, at least in part, a segmentation of a computation closure into at least a first part and one or more second parts. The identity based encryption platform also causes, at least in... Agent: Nokia Corporation
20130108041 - Methods and systems for personal authentication: A method for creating personal authentication keys includes the steps of determining a number of RFID tags, generating a key, partitioning the key into a number of parts, the number of parts corresponding to the number of determined RFID tags, and writing each of the plurality of key parts to... Agent:
20130108042 - Managing media content decryption keys in encrypted media content distribution systems and methods: Exemplary systems and methods for managing media content decryption keys in encrypted media content distribution systems and methods are described. An exemplary method includes a user device 1) accessing a set of decryption keys, 2) storing the set of decryption keys in local memory, 3) accessing an encrypted media content... Agent: Verizon Patent And Licensing Inc.
20130108043 - Method and apparatus for providing broadcast service using encryption key in a communication system: A method and apparatus for receiving a broadcast service in a communication system is provided. The method includes receiving a key pair comprising a first key and a second key from a network, generating at least one of encryption keys using the key pair, receiving encrypted broadcast service data broadcasted... Agent: Samsung Electronics Co. Ltd.
20130108044 - Multi-platform communication system providing real-time point to point encrypted communication: A communication system providing point to point data encryption including one or more mobile end points, each mobile end point includes mobile equipment and an encryption module. The communication system also includes a network, a first gateway coupled to a Private Branch Exchange (PBX) telephone system, and a second gateway... Agent: Cellcrypt Limited
20130108045 - Methods, networks and nodes for dynamically establishing encrypted communications: Methods, networks and nodes for dynamically establishing encrypted communications between a first node having a first identification and a first private key and a second node having a second identification and a second private key. A first signal comprising information indicative of the first identification of the first node is... Agent: Architecture Technology, Inc.
20130108046 - Establishing secure communication between an implantable medical device and an external device: Establishing secure communication between an implantable medical device and an external device includes: accessing, at the implantable medical device, biological data; utilizing the biological data, at the implantable medical device, to generate a public cryptographic key; and utilizing the public cryptographic key, at the implantable medical device, to generate a... Agent:
20130108049 - Method for accessing to radio frequency communication with low-frequency electromagnetic communication: A method for accessing to radio frequency communication with low-frequency electromagnetic communication includes the steps that a request side sends an activation request including first random data via a low frequency channel; a requested side receives the activation request, generates an activation response message including second random data and an... Agent: Nationz Technologies Inc.
20130108047 - Wireless network connection method, wireless network apparatus and wireless network access point (ap) applying the method: A wireless network connection method includes the following steps: a wireless network access point (AP) that receives apparatus identification information of a wireless network apparatus through a wireless network. The wireless network AP generates a temporary encryption key according to the apparatus identification information and AP identification information of the... Agent: Accton Technology Corporation
20130108048 - Wirelessly communicating a data file: A method begins by a dispersed storage (DS) processing module sending a plurality of undecodeable portions of a plurality of data files via a public wireless communication network to one or more targeted devices of a private wireless communication network. The method continues with the DS processing module sending data... Agent: Cleversafe, Inc.
20130108051 - Code diversity method and system: A software diversity system including an executable provider to provide an executable program including component blocks such that different combinations of blocks are operative to perform a functionally encryption keys functionally equivalent data transformation, a cipher to encrypt the component blocks with cryptographic keys, a key selector to select a... Agent: Nds Limited
20130108050 - Network having multicast security and method therefore: A method for conducting encrypted communication in a network and a network having a plurality of nodes organized into a plurality of groups which initiates encrypted communication between a first one of the plurality of nodes of a first one of the plurality of groups and a second one of... Agent: Archtecture Technology, Inc.
20130108052 - Secure transport of domain-specific cryptographic structures over general purpose application program interfaces: A method of distributing cryptographic keys includes determining functional keys of domain-specific cryptographic service provider (DCSP); providing the functional keys to a fused cryptographic API (FCAPI) provided on a first computing device; encoding the functional keys with key encoding keys to produced encoded keys, the encoded keys including wrap or... Agent: International Business Machines Corporation04/25/2013 > 11 patent applications in 7 patent subcategories.
20130101112 - Method and apparatus for minimizing differential power attacks on processors: A method of masking a cryptographic operation using a secret value, comprising the steps of dividing the secret value into a plurality of parts; combining with each part a random value to derive a new part such that the new parts when combined are equivalent to the original secret value;... Agent:
20130101111 - Method for scrambling shaped data: A method includes, in a data storage device, receiving data having a particular proportion of zero values and one values and scrambling the data to generate scrambled data that has the particular proportion of zero values and one values.... Agent: Sandisk Technologies Inc.
20130101114 - Apparatus and method for generating identification key: Provided is an apparatus for generating an identification key by a probabilistic determination of a short occurring between nodes constituting a circuit, by violating a design rule provided during a semiconductor manufacturing process. The identification key generating apparatus may include an identification key generator to generate an identification key based... Agent:
20130101113 - Encrypting data objects to back-up: Provided are a computer program product, system, and method for encrypting data objects to back-up to a server. A client private key is intended to be maintained only by the client. A data object of chunks to store at the server is generated. A first portion of the chunks in... Agent: International Business Machines Corporation
20130101115 - Method, apparatus, and system for processing and delivering media content: A method for facilitating the live broadcast of special events includes receiving an equipment rental request, dispatching the equipment including a live media transmitter, receiving a live digital video transmission from the live media transmitter, watermarking the live digital video transmission, and transmitting the live digital stream. A method includes... Agent: Playnsite, LLC
20130101118 - Method and apparatus for providing broadcast service using encryption key in a communication system: A method and apparatus for providing a broadcast service in a communication system is provided. The method includes generating a key pair comprising a first key and a second key, generating at least one of forward encryption keys by applying a forward hash chain to the first key, generating at... Agent: Samsung Electronics Co. Ltd.
20130101117 - Private overlay for information networks: A private overlay is provided for information networking that puts the user in charge of the user's personal information. User identity is separated from a numeric tag that points to the cell in which the user equipment can be paged. The private overlay is created by addition of a registration... Agent: Cornell University
20130101116 - Wired communications systems with improved capacity and security: Provided are methods and systems of using division-free duplexing (DFD) in a cable communication network. Techniques for applying DFD in a cable communication network may enable data to be transmitted and received over a coaxial cable without using division duplexing techniques. For example, the cable communication network may include DFD... Agent: General Electric Company
20130101119 - Quantum key distribution using card, base station and trusted authority: Techniques and tools for quantum key distribution (“QKD”) between a quantum communication (“QC”) card, base station and trusted authority are described herein. In example implementations, a QC card contains a miniaturized QC transmitter and couples with a base station. The base station provides a network connection with the trusted authority... Agent: Los Alamos National Security LLC
20130101120 - Method for secure data exchange between two devices: This invention concerns a safe data exchange method between two devices locally connected to one another. In a preferred embodiment, the first device is a security module containing a first encrypting key, said private key of a pair of asymmetric encrypting keys. The second device is a receiver comprising at... Agent:
20130101121 - Secure multi-party communication with quantum key distribution managed by trusted authority: Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution (“QKD”) are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines... Agent: Los Alamos National Security LLC04/18/2013 > 4 patent applications in 4 patent subcategories.
20130094648 - Apparatus and method for producing a bit sequence: A method for reconstructing a physically unclonable function (PUF) A for use in an electronic appliance is provided. The method includes producing a checksum C, producing a defective PUF B and reconstructing the PUF A from the defective PUF B using an error correction algorithm. The algorithm produces a plurality... Agent: Infineon Technologies Ag
20130094649 - Public key cryptosystem based on goppa codes and puf based random generation: This invention provides improved security of the McEliece Public Key encryption system adding features which make full use of random number generation for given message and cryptogram parameters, using this invention the encrypted message (i.e. the cryptogram) is a truly random function, not a pseudo random function of the message... Agent:
20130094650 - Secure data transfer using random ordering and random block sizing: Encrypted information is conventionally broken into blocks which are transmitted sequentially. Because the order and the size of such blocks can be easily determined, an eavesdropper can gain valuable information regarding the content of the communication. More specifically, if known types of information exist within a block, the encryption key... Agent: Broadcom Corporation
20130094651 - Field programming of a mobile station with subscriber identification and related information: Apparatuses and methods for field programming a private security key into a mobile station are described herein. The methods may include a server initially accepting in a wireless network a connection from a mobile station that is without a factory programmed subscriber identification module (SIM). The server may then collaborate... Agent:Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20130509:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
FreshPatents.com Support - Terms & Conditions
Results in 0.27963 seconds