Cryptography patents - Monitor Patents Logo icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents

USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14: Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |


Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
04/10/2014 > 10 patent applications in 8 patent subcategories.

20140098951 - Method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis and system thereof: There are provided a method for elliptic curve cryptography with countermeasures against simple power analysis and fault injection analysis, and a system thereof. According to an aspect, there is provided a method for elliptic curve cryptography, in which an elliptic curve point operation is performed to generate an elliptic curve... Agent: Electronics & Telecommunications Research Institute

20140098952 - Communication apparatus and control method: This invention allows connection of an apparatus with a low security level without lowering the security level of a network even when such apparatus issues a connection request. This invention is directed to an access point which makes wireless communications with a station using an encryption method (AES). Upon reception... Agent: Canon Kabushiki Kaisha

20140098953 - Key derivation system: A device generates a content key that depends upon device security state information. For example, the device may retrieve a first content key and a security state, and then derive a content key using the first content key and the security state. Accordingly, if the security state is incorrect, then... Agent: Broadcom Corporation

20140098954 - Digital video protection for authenticity verification: A method for verifying the authenticity and integrity of an ordered sequence of digital video frames, without having access to the original recording, by embedding therein a respective series of digital signatures based on a secret key, or keys, and on the video content of respective frames. Signatures are camouflaged... Agent: Nice-systems Ltd.

20140098955 - Quantum enabled security for optical communications: The present invention provides a quantum-enabled security (QES) protocol which creates a revolutionary new cybersecurity capability: quantum (single-photon) communications are integrated with optical communications to provide a strong, innate security foundation at the photonic layer for optical fiber networks or free-space optical communications. The new protocols will also allow the... Agent: Los Alamos National Security, LLC

20140098957 - Methods and devices for ota management of subscriber identity modules: Methods and devices in a mobile communications system for over the air management of mobile stations contain a secure identification element such as a subscriber identity module. A standard challenge-response authentication procedure is implemented in a mobile communications system not for its intended authentication purpose, but for providing a mobile... Agent: Giesecke & Devrient Gmbh

20140098956 - Simple pairing to generate private keys for different protocol communications: An integrated circuit radio transceiver and associated method comprises a multi-mode device operable to support personal area network communications as well as traditional wireless local area network communications. In one embodiment, IEEE 802.11 protocol IBSS communications are used to transport Bluetooth communication data packets. In another embodiment, a direct link... Agent: Broadcom Corporation

20140098958 - Electronic key registration system: An electronic key registration system includes an electronic key device having a key ID. A controller having a first piece of information is arranged in a communication subject. A registration tool having a second piece of information is configured to write the key ID to the controller. The controller compares,... Agent: Kabushiki Kaisha Tokai Rika Denki Seisakusho

20140098959 - Electronic key registration system: An electronic key registration system includes an electronic key device that stores a key ID and a first piece of information. A controller is arranged in a communication subject. A registration tool writes the key ID to the controller and stores a second piece of information. Encrypted communication between the... Agent: Kabushiki Kaisha Tokai Rika Denki Seisakusho

20140098960 - Ciphertext processing method, apparatus, and system: Embodiments of the present invention disclose a ciphertext processing method, apparatus, and system. The method includes: selecting a random secret value; calculating a private key according to a partial private key acquired by the local end and the random secret value; calculating a proxy key according to the private key... Agent: Huawei Technologies Co., Ltd.

04/03/2014 > 17 patent applications in 10 patent subcategories.

20140093069 - Instruction set for message scheduling of sha256 algorithm: A processor includes a first execution unit to receive and execute a first instruction to process a first part of secure hash algorithm 256 (SHA256) message scheduling operations, the first instruction having a first operand associated with a first storage location to store a first set of message inputs and... Agent:

20140093068 - Instruction set for skein256 sha3 algorithm on a 128-bit processor: According to one embodiment, a processor includes an instruction decoder to receive a first instruction to perform first SKEIN256 MIX-PERMUTE operations, the first instruction having a first operand associated with a first storage location to store a plurality of odd words, a second operand associated with a second storage location... Agent:

20140093070 - Matrix code for encryption, storage, and transmission of data: A computing device utilizes matrix codes to securely communicate information with a variety of servers. The computing device receives public user data, and generates a display of a base matrix code for reading by a scanner associated with a first server, wherein the base matrix code includes the public user... Agent: International Business Machines Corporation

20140093071 - Support of multiple pdn connections over a trusted wlan access: Modifications to authentication and authorization messages are used to allow an authentication server to query both an access network and a terminal device connecting over the access network to determine whether both nodes support the terminal device forming a plurality of packet data network connections that can support tunnels. This... Agent: Telefonaktiebolaget L M Ericsson (publ)

20140093073 - Method and system for a hardware-efficient universal hash function: Disclosed method, system and computer readable storage medium embodiments for providing hardware-efficient universal hashing functions include performing a first hash function on a received input key or a bit sequence derived from the received input key to generate a hashed input key, selecting a plurality of input key portions from... Agent: Broadcom Corporation

20140093072 - Security key generation in link aggregation group topologies: A method, system and computer readable medium for security key generation in link aggregation group topologies. The method can include performing, using one or more processors, authentication on each port of a plurality of ports in a link aggregation group. The method can also include deriving, using the one or... Agent:

20140093074 - Secure provisioning of secret keys during integrated circuit manufacturing: A method, of an aspect, includes challenging a set of Physically Unclonable Function (PUF) cells, of an integrated circuit device, and receiving a set of PUF bits from the PUF cells in response. A PUF key is generated based on the set of PUF bits. An encryption of the PUF... Agent:

20140093075 - Secure transmission method and apparatus for transport stream: Provided are a secure transmission method and apparatus for transport stream (TS). The method is applied to a receiving terminal of a digital television broadcasting system, comprising: after receiving a TS, a first device in the receiving terminal encrypts the received TS using a key already negotiated with a second... Agent:

20140093076 - Bitwise operations and apparatus in a multi-level system: A system uses multi-level encoding where each symbol of a plurality of symbols represents more than one bit of information in a user data symbol stream for transfer using a multilevel transmission channel. The user data symbols are represented in a digital bitwise form such that each symbol is presented... Agent: Micron Technology, Inc.

20140093077 - Zero knowledge proofs for arbitrary predicates over data: A first computing device transfers first and second commitments to a second computing device. The first commitment is for private data and a first random number and the second commitment is for second and third random numbers. The method includes producing a result by evaluating a predicate and a first... Agent: Sap Ag

20140093081 - Authentication in secure user plane location (supl) systems: A particular method includes receiving, at a secure user plane location (SUPL) server, an indication from a mobile device of one or more transport layer security (TLS) cipher suites supported by the mobile device; determining whether the one or more TLS cipher suites include a TLS pre-shared key (TLS-PSK) cipher... Agent: Qualcomm Incorporated

20140093078 - Dynamic loss protection: A method comprises determining a number of radio sources within a region proximate an electronic device and adjusting one or more loss prevention policies based on the number of radio sources within the region proximate the electronic device. Other embodiments may be described.... Agent:

20140093080 - Method and system to differentiate and assigning ip addresses to wireless femto cells h(e)nb (home (evolved) nodeb) and lgw (local gateway) by using ikev2 (internet key exchange version 2 protocol) procedure: A method and a system to differentiate and assign IP addresses of wireless femto cells H(e)NB (Home (evolved) NodeB) by using IKEv2 (Internet Key Exchange Version 2 protocol) procedure when supporting multiple logical entities or service are provided. The present disclosure relates to broad area of IP networks and particularly... Agent: Samsung Electronics Co. Ltd.

20140093079 - Securely joining a secure wireless communications network: Securely joining a secure wireless communications network is described, for example, where a printer or other device is securely added to a home wireless network. In various embodiments, a temporary wireless network is established between a new joiner device and a second wireless communications device which is already a member... Agent: Microsoft Corporation

20140093082 - Traffic encryption key management for machine to machine multicast group: A method for updating a group traffic key used for encrypting and decrypting multicast data in a wireless communication system is described. The method includes receiving, from the base station, a first message comprising a new group security seed; and updating the group traffic key based on the new group... Agent: Lg Electronics Inc.

20140093083 - System, device, and method for securing voice authentication and end-to-end speech interaction: A method, device, and system for secure end-to-end audio recognition is disclosed. A client device launches an application that connects with a server. The client device and server exchange cryptographic keys and establish a secure connection and a shared cryptographic key. The server transmits an encrypted audio prompt to the... Agent:

20140093084 - Secure escrow service: A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the... Agent: Apple Inc.

03/27/2014 > 8 patent applications in 5 patent subcategories.

20140086406 - Key management using security enclave processor: An SOC implements a security enclave processor (SEP). The SEP may include a processor and one or more security peripherals. The SEP may be isolated from the rest of the SOC (e.g. one or more central processing units (CPUs) in the SOC, or application processors (APs) in the SOC). Access... Agent: Apple Inc.

20140086407 - Conditional access to encrypted media content: A method and apparatus for processing encrypted content distributed for end users in multiple services includes receiving entitlement information for a subset of at least two of the services separately from the encrypted content for the services and either calculating decryption key information for the subset of services from the... Agent: General Instrument Corporation

20140086409 - Personalized whitebox descramblers: The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler.... Agent: Irdeto Corporate B.v.

20140086408 - Unique watermarking for digital media: Systems, methods and computer-readable media for uniquely identifying a digital medium by receiving a request for the digital medium, the request corresponding to a requestor, associating a unique identification with the requestor, encoding the digital medium based on the unique identification to provide a watermarked digital medium, the watermarked digital... Agent:

20140086410 - Image forming apparatus: An image forming apparatus includes a memory unit configured to store image data, a mode detecting unit configured to detect a transition from a first operating mode to a second operating mode, and an encryption unit configured to encrypt the image data in the memory unit based on the transition.... Agent: Oki Data Corporation

20140086412 - Encryption device, encryption method, and encryption program: An encryption device that, when voice or image data or the like being encoded is encrypted using a one-time pad (OTP) cipher and then transmitted, reduces a period of time in which a cipher key for the OTP cipher runs out. A first terminal device determines whether to encode transmission... Agent: Mitsubishi Electric Corporation

20140086411 - Semiconductor storage device: According to one embodiment, a device includes a storage and an authenticator. The storage includes a first area, a second area and a third area. The first area stores NKey and SecretID, the second area stores index information. E-SecretID is generated by SecretID. The third area stores FKB including information... Agent: Kabushiki Kaisha Toshiba

20140086413 - Information processing device, information processing method, and program: There is provided an information processing device including a secret key generator that generates a secret key from a random number received from an external device that provides a service, and a given value, a public key generator that generates a public key on the basis of the secret key... Agent: Sony Corporation

03/20/2014 > 9 patent applications in 5 patent subcategories.

20140079213 - Apparatus and method for protecting message data: Disclosed is a method for protecting message data. In the method, the message data is padded with padding bits generated based on a deterministic function performed on the message data. The padded message data is compressed to generate compressed data. A length of the compressed data is dependent on the... Agent: Qualcomm Incorporated

20140079214 - Cryptographic countermeasure method by deriving a secret data: A method of protecting a circuit from attacks aiming to discover secret data used during the execution of a cryptographic calculation by the circuit, by, executing a transformation calculation implementing a bijective transformation function, receiving as input a secret data, and supplying a transformed data, executing a cryptographic calculation receiving... Agent: Stmicroelectronics (rousset) Sas

20140079215 - Efficient cryptographic key stream generation using optimized s-box configurations: Application of a ZUC cryptographic functions in wireless communication includes receiving a data stream at the wireless communication apparatus and applying the ZUC cryptographic function to the data stream. The ZUC cryptographic function includes generating at least one multi-byte pseudo-random number that provides an index to one of a plurality... Agent: Qualcomm Incorporated

20140079216 - Method and system for prevention of control word sharing: A method and system of preventing control word sharing, the method and system including receiving a temporal key, denoted TKi, at a removable security element, receiving an entitlement control message (ECM), the ECM including a control word derivable by the removable security element, deriving the control word from the ECM... Agent:

20140079217 - Method and apparatus for secure pairing of mobile devices with vehicles using telematics system: A method for establishing secure wireless communications between a mobile device and a vehicle, where a user is not required to enter a password, but instead the telematics system is used to bootstrap the trust between the mobile device and the vehicle. The user initiates the process by pressing a... Agent: Gm Global Technology Operations LLC

20140079220 - Streaming alignment of key stream to unaligned data stream: Enhanced cryptographic techniques are provided which facilitate higher data rates in a wireless communication system. In one aspect, improvements to the ZUC algorithm are disclosed which can reduce the number of logical operations involved key stream generation, reduce computational burden on a mobile device implementing ZUC, and extend battery life.... Agent: Qualcomm Incorporated

20140079219 - System and a method enabling secure transmission of sms: The present invention relates to a system (1) and method (100) which enables the SMSs to be sent encrypted and to be opened only in the mobile devices (2), wherein the SIM card belonging to the MSISDN, to which they are sent, is installed. The inventive system (1) comprises a... Agent: Turkcell Iletisim Hizmetleri Anonim Sirketi

20140079218 - System and method for device-to-device (d2d) assisted dynamic traffic control for cellular networks: Method and apparatus are provided for offloading data from a cellular network via a secondary network. The offloaded data may be transported over a connection existing independently from the cellular network, such as a direct device-to-device (D2D) or direct mobile communications (DMC) link. The connection may be established between a... Agent: Futurewei Technologies, Inc.

20140079221 - Managing encrypted data and encryption keys: A data module encrypts a first portion of a drive in a data center using a first encryption key. The data module encrypts the first encryption key using a second encryption key to obtain an encrypted encryption key. The data module stores the second encryption key in a first location... Agent: Red Hat, Inc.

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


RSS FEED for 20140410: xml
Integrate into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.


Thank you for viewing Cryptography patents on the website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.

Results in 0.20568 seconds