Cryptography patents - Monitor Patents Logo icons
Monitor Keywords Patent Organizer File a Provisional Patent Browse Inventors Browse Industry Browse Agents

USPTO Class 380  |  Browse by Industry: Previous - Next | All     monitor keywords
Recent  |  14:  |  |  | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan |  | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn |  | 2008 | 2007 |


Below are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application.
02/05/2015 > 7 patent applications in 5 patent subcategories.

20150036819 - Quantum-key-distribution receiving device and method for using single-photon detector: There is provided a quantum-key-distribution receiving device used in a quantum key distribution system that utilizes a pair of quantum-entangled photons including a signal photon and an idler photon, the quantum-key-distribution receiving device including a single-photon detector in which a secure-key generation rate is dependent on a first performance index... Agent: Oki Electric Industry Co., Ltd.

20150036820 - Probability durable entropic advantage: A method used by two strangers subject to comprehensive eavesdropping, and in need for establishing privacy and secrecy, or more generally, an entropic advantage. Unlike the prevailing one-way functions, like RSA, and ECC which are subject to a breach via advanced mathematical insight, the method herein is based on durable... Agent:

20150036822 - Information processing apparatus and information processing method: According to at least one embodiment, an information processing apparatus includes: a content acquiring module configured to receive or store a content according to a first copyright protection method; a filter configured to acquire PIDs from first packets of the content; an analyzing module configured to acquire a PAT/PMT from... Agent:

20150036821 - Physical layer encryption for mimo communication networks: Systems and methods are provided for encrypting a data transmission from a base station at the physical layer, such that the data transmission can only be decoded successfully by an intended UE. In an embodiment, a desired signal component, including a data signal for an intended UE, is combined with... Agent: Broadcom Corporation

20150036823 - Apparatus and method for securing beacons: A short-range communication tag includes a transmitter, a clock circuit providing a clock value and a memory containing a unique identification value. The tag further includes a processor which generates encryption keys with a period of K seconds and combines the unique identification value with the encryption key, according to... Agent:

20150036825 - Communication apparatus, computer program product, and communication system: According to an embodiment, a communication apparatus includes a cryptographic key storage, a transmitter, a receiver, and a sharing controller. The cryptographic key storage stores therein one or more cryptographic keys shared with an external device. The transmitter transmits specifying information that specifies at least one of the cryptographic keys... Agent: Kabushiki Kaisha Toshiba

20150036824 - Transmitter, receiver, quantum key distribution (qkd) system and quantum key distribution method: According to an embodiment, a transmitter transmits first transmission key data and second transmission key data as quantum information. The transmitter includes a first privacy amplifier and a second privacy amplifier. The first privacy amplifier generates first secure key data by performing privacy amplification to remove information that has possibly... Agent: Kabushiki Kaisha Toshiba

01/29/2015 > 6 patent applications in 3 patent subcategories.

20150030154 - Method and system for scrambling and descrambling a digital image: The present invention refers to a method for scrambling an original digital image into a scrambled image and for descrambling the scrambled image into a reconstructed image. The method firstly comprises a scrambling operation for substituting a plurality of original coefficients by dummy coefficients, while safeguarding the coding format, and... Agent: Nagravision S.a.

20150030153 - Repeatable application-specific encryption key derivation using a hidden root key: Embodiments of an invention for repeatable application-specific encryption key derivation are disclosed. In one embodiment, a processor includes a root key, an encryption engine, and execution hardware. The encryption engine is to perform an encryption operation using the root key, wherein the root key is accessible only to the encryption... Agent: Intel Corporation

20150030155 - Surveillance server, method of processing data of surveillance server, and surveillance system: A surveillance server connected to a camera through a network is provided, the camera acquiring an image of a surveillance area. The surveillance server includes: a data acquisition unit configured to acquire from the camera image data of the image that is encrypted; a mode selection unit configured to select... Agent: Samsung Techwin Co., Ltd.

20150030156 - Multi-factor caller identification: A method and apparatus for authenticating directory information is described. The method includes: receiving a request to initiate a voice communication session over a signaling network that includes a data network, the request including directory information specifying origination of the voice communication session; determining verification information associated with the directory... Agent: Verizon Patent And Licensing Inc.

20150030158 - Sensor network, sensor management server, key updating method and key updating program: A sensor network includes a sensor management server which is mutually connected with many sensor terminals. The sensor management server includes: a key delivery module for transmitting a key update message to the respective sensor terminals; a communication volume detection module for detecting a communication volume used for transmitting the... Agent:

20150030157 - Techniques for trusted location application and location provider communications: Various embodiments are generally directed to techniques for conveying location information between a location provider and a trusted location application within a mobile device through trusted communications to preclude its provision to an untrusted location application. An apparatus includes a processor component; and a location provider for execution by the... Agent:

01/22/2015 > 10 patent applications in 4 patent subcategories.

20150023495 - Change-tolerant method for generating identifier for collection of assets in computing environment using error-correction code scheme: A secure and change-tolerant method for obtaining an identifier for a collection of assets associated with a computing environment. Each asset has an asset parameter and the computing environment has a fingerprint based on an original collection of assets and on a codeword generation algorithm on the original collection of... Agent: Irdeto B.v.

20150023496 - Pairing computation apparatus, pairing computation method, and computer program product: According to an embodiment, a pairing computation apparatus receives two points on a predetermined elliptic curve defined on a finite field, and outputs a pairing value that is an element on an extension field of the finite field. The apparatus includes a Miller function computation unit and a final exponentiation... Agent: Kabushiki Kaisha Toshiba

20150023497 - Apparatus and method for key update for use in a block cipher algorithm: A method herein is for encryption key update in a station. In the method, a first data block is encrypted using a first plurality of round keys over a first plurality of rounds to generate a first encrypted data block, wherein the first plurality of round keys are generated based... Agent: Qualcomm Incorporated

20150023500 - Apparatus and method for skein hashing: Described herein are an apparatus and method for Skein hashing. The apparatus comprises a block cipher operable to receive an input data and to generate a hashed output data by applying Unique Block Iteration (UBI) modes, the block cipher comprising at least two mix and permute logic units which are... Agent:

20150023498 - Byzantine fault tolerance and threshold coin tossing: A coin share generator (5) is employed in a system for performing a threshold coin tossing scheme. The coin share generator (5) comprises a coin determining unit (6) for determining a coin value, and a coin share generating unit (7) for generating a coin share based on a coin value... Agent: Koninklijke Philips A Corporation

20150023499 - Cryptographic key generation: A technique for generating a cryptographic key is provided. The technique is particularly useful for protecting the communication between two entities cooperatively running a distributed security operation. The technique comprises providing at least two parameters, the first parameter comprising or deriving from some cryptographic keys which have been computed by... Agent:

20150023501 - Method and apparatus for hardware-accelerated encryption/decryption: An integrated circuit for data encryption/decryption and secure key management is disclosed. The integrated circuit may be used in conjunction with other integrated circuits, processors, and software to construct a wide variety of secure data processing, storage, and communication systems. An embodiment of the integrated circuit includes a run-time scalable... Agent:

20150023503 - Apparatus and method for transmitting secure data in wireless communication system: An apparatus and method for transmitting secure data in a wireless communication system are provided. The apparatus includes a key generation unit, and a transmission and reception unit. The key generation unit generates an encryption key stream that is used to convert plain text data into an encrypted data signal.... Agent:

20150023502 - Communicating rf fingerprint-based geofences: Systems, apparatus and methods for communicating and using a geofence while maintaining privacy are presented. A geofence is based on at least one RF fingerprint. The RF fingerprints include absolute information that is transformed into a one-way matrix (A) by application of a one-way function. The absolute information may identify... Agent: Qualcomm Incorporated

20150023504 - Correcting deciphering mis-synchronization in a mobile communication terminal: A method includes, in a mobile communication terminal, receiving a signal, which carries media content that has been encrypted after being compressed in accordance with a compression protocol having a plurality of predefined configurations. Each configuration specifies a respective compression mode of the compression protocol. The received signal is decrypted,... Agent:

01/15/2015 > 11 patent applications in 8 patent subcategories.

20150016603 - Device and method for managing electronic facilities of buildings: A device and a method for managing electronic facilities of buildings. The device may include one or more interface elements for connecting the device to one or more electronic facilities of a building, a connection element for the connection of a portable storage device, and a control unit for reading... Agent:

20150016602 - Method and apparatus for providing secure image encryption and decryption: Methods, non-transitory computer readable media and apparatuses for decrypting an image are disclosed. For example, a method captures a portion of an encrypted image and decrypts the portion of the image using a decryption key. The portion of the image contains partial information for an adjacent portion of the image.... Agent:

20150016604 - Systems and methods for distributing and securing data: A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using... Agent:

20150016605 - Unique surrogate key generation using cryptographic hashing: The present invention relates to a method or system of generating a surrogate key using cryptographic hashing. One embodiment of the method of the present invention may have steps such as selecting a field or group of fields that is or are unique among all records in the database and... Agent:

20150016606 - Generating device, re-encrypting device, method, and computer program product: According to an embodiment, a generating device includes a first key generator, a second key generator, an output unit, and an update unit. The first key generator is configured to generate a first key that is a sequence of bits according to a first key rule on the basis of... Agent: Kabushiki Kaisha Toshiba

20150016607 - Systems and methods for performing transport i/o: Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be... Agent:

20150016608 - Systems and methods for performing transport i/o: Systems and methods for implementing a Transport I/O system are described. Network encrypted content may be received by a device. The device may provide the network encrypted content to a secure processor, such as, for example, a smart card. The secure processor obtains a network control word that may be... Agent:

20150016609 - Authentication in heterogeneous ip networks: The invention proposes a system for authenticating and authorizing network services comprising: a mobile device being adapted to, upon receipt of an information message indicating at least one network access type, determine the network access type, to create a start message containing at least a user identity, and to encapsulate... Agent:

20150016610 - Optical cryptography systems and methods: Systems and methods for encoding a message are disclosed. A message may be passed from a first node to a second node via a communication link using a multi-stage cryptography algorithm distributed between the first node and the second node and applied by circuitry within the first node and the... Agent:

20150016611 - Method of handling data transmission and reception in device to device communication in wireless communication systems: A method of handling data transmission and reception in device to device communication for a first communication device in a wireless communication system is disclosed. The method comprises connecting to a network of the wireless communication system, using a first ciphering key to cipher a first plurality of data blocks... Agent:

20150016612 - System and method for remote reset of password and encryption key: Data is secured on a device in communication with a remote location using a password and content protection key. The device stores data encrypted using a content protection key, which itself may be stored in encrypted form using the password and a key encryption key. The remote location receives a... Agent:

Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices


RSS FEED for 20150205: xml
Integrate into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.


Thank you for viewing Cryptography patents on the website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.

Results in 0.14963 seconds