|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
Recent | 14: Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
CryptographyBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 09/04/2014 > 8 patent applications in 6 patent subcategories.
08/28/2014 > 6 patent applications in 4 patent subcategories.
20140241522 - Encrypted data processing: The technology includes processes, computer program products, and systems for encrypted data processing. In a system of the technology, an arithmetic logic unit is arranged to receive encrypted data presented at said inputs, generate encrypted data based upon data presented at said inputs and provide said generated encrypted data to... Agent:
20140241523 - Installable secret functions for a peripheral: There is provided a pluggable secure device identity module (SDIM) attached to a peripheral where the SDIM includes one or more secret functions provided by a third party that are used by the peripheral to provide additional security features or functions that can only be authenticated by the third party.... Agent: Ncr Corporation
20140241524 - System and methods for permitting open access to data objects and for securing data within the data objects: A system and methods for permitting open access to data objects and for securing data within the data objects is disclosed. According to one embodiment of the present invention, a method for securing a data object is disclosed. According to one embodiment of the present invention, a method for securing... Agent: Blue Spike, Inc.
20140241525 - Random number generator based wireless transmission encoding control methodology: The present invention relates to an algorithm methodology control means for creating esoteric unique encrypted key coding generation, by a random number generator means, for wireless transmitter and receiver communications pairing and identification.... Agent:
20140241526 - Data sampling and data encryption/decryption method and electronic device utilizing the methods: In one embodiment of the present invention, a signal sampling method is provided. It comprises: (a) sampling an input signal with respect to a sampling clock signal; (b) calculating a maximum transition timing and a minimum transition timing of the input signal according to a relation between the sampling in... Agent: Mstar Semiconductor, Inc.
20140241527 - Device and authentication method therefor: According to one embodiment, an authentication method includes generating, by the memory, first authentication information by calculating secret identification information with a memory session key in one-way function operation, transmitting encrypted secret identification information, a family key block, and the first authentication information to a host, and generating, by the... Agent: Kabushiki Kaisha Toshiba08/21/2014 > 15 patent applications in 9 patent subcategories.
20140233729 - Cryptographic processing apparatus and cryptographic processing method, and computer program: There is provided a highly secure cryptographic processing apparatus and method where an analysis difficulty is increased. In a Feistel type common key block encrypting process in which an SPN type F function having a nonlinear conversion section and a linear conversion section is repeatedly executed a plurality of rounds.... Agent: Sony Corporation
20140233726 - Decryption method, recording medium storing decryption program, decryption device, key generation method, and recording medium storing key generation program: A decryption method includes receiving an input of an n-dimensional vector whose elements other than a first element are all zero, or of the first element. The vector is a ciphertext obtained by encrypting a plaintext being an integer not less than 0 and less than s with a public... Agent: Fujitsu Limited
20140233727 - Method for secure substring search: A system and method for secure substring search, using fully homomorphic encryption, or somewhat homomorphic encryption. In one embodiment, a first string is homomorphically compared to trial substrings of a second string, each comparison producing a ciphertext containing an encrypted indication of whether the first string matches the trial substrings.... Agent:
20140233728 - Method for secure symbol comparison: A method for secure comparison of encrypted symbols. According to one embodiment, a user may encrypt two symbols, share the encrypted symbols with an untrusted third party that can compute algorithms on these symbols without access the original data or encryption keys such that the result of running the algorithm... Agent: Raytheon Bbn Technologies Corp.
20140233730 - Multiple transform utilization and application for secure digital watermarking: Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital... Agent:
20140233731 - Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm: There is proposed a method of generating secret and public keys vDGHV with enhanced security, implemented in a device including at least one microprocessor and a memory. The method includes generating a secret key SK corresponding the generation of a prime random number p or product of prime numbers.... Agent: Campagnie Industrielle Et Financiere D'ingenierie "ingenico"
20140233732 - Mobile paytv drm architecture: A secure element operating in conjunction with a secure partition of a system-on-a-chip (SoC) having set top box (STB) functionality allows for digital rights management (DRM) key handling in a mobile platform. The secure element can include a secure processing system (SPS) to be implemented as a hard macro, thereby... Agent: Broadcom Corporation
20140233733 - Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems: A method for processing a data packet before transmission over a radio communications network as a succession of waveforms transmitted at positions defined by hopping codes, which are time positions or frequency positions. The packet is transmitted over a communications channel of the network by a transmitter node to a... Agent: Orange
20140233735 - Encryption method, decryption method, and related apparatus: Embodiments of the present application provide an encryption method, a decryption method, and a related apparatus. The encryption method includes: generating a keystream, where the keystream is used to encrypt a part of data to be encrypted in an initial layer-3 message, and the part of data to be encrypted... Agent: Huawei Technologies Co., Ltd.
20140233736 - Method and related device for generating group key: Embodiments of the present invention provide a method and a related device for generating a group key. The method includes: obtaining a group ID of a group where a machine type communication MTC device is located; obtaining a group communication root key corresponding to the group ID; generating a group... Agent: Huawei Technologies Co., Ltd.
20140233734 - Restricting broadcast and multicast traffic in a wireless network to a vlan: Traffic broadcast to a VLAN is restricted. To do so, a plurality of stations are associated with a BSSID (basic service set identifier). A first VLAN is configured by sending a first group key to each station from the plurality of stations that is a member of the first VLAN,... Agent:
20140233737 - Method and system for generating an identifier of a key: A method for generating an identifier of a key includes that: when a user equipment (UE) transfers from an evolved UMTS terrestrial radio access network (EUTRAN) to a universal terrestrial radio access network (UTRAN) or a global system for mobile communications (GSM), or an enhanced data rate for GSM evolved... Agent:
20140233738 - Mechanism for co-ordinated authentication key transition for is-is protocol: An automated key transition method is executed by a node in a network. The network includes a set of nodes utilizing a current key identifier provided by a group key management server or provisioned manually. A key identifier specifies an authentication protocol and an authentication key for use in the... Agent: Telefonaktiebolaget L M Ericsson (publ)
20140233739 - Method for adding nodes to a quantum key distribution system: An improved quantum key distribution (QKD) system and method are provided. The system and method introduce new clients at intermediate points along a quantum channel, where any two clients can establish a secret key without the need for a secret meeting between the clients. The new clients perform operations on... Agent:
20140233740 - Secure distribution of content: Methods and systems are described for secure delivery of a content item from at least a first content distribution network (CDN1) to at least one content receiving entity using a split-key cryptosystem comprising encryption and decryption algorithms E and D, a cipher algorithm for generating encryption and decryption keys e,d... Agent: Koninklijke Kpn N.v.08/14/2014 > 11 patent applications in 8 patent subcategories.
20140226811 - Multiple transform utilization and application for secure digital watermarking: Multiple transform utilization and applications for secure digital watermarking. In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital... Agent:
20140226812 - Multiple transform utilization and application for secure digital watermarking: Multiple transform utilization and applications for secure digital watermarking In one embodiment of the present invention, digital blocks in digital information to be protected are transformed into the frequency domain using a fast Fourier transform. A plurality of frequencies and associated amplitudes are identified for each of the transformed digital... Agent:
20140226813 - Physics-based key generation: In some examples, a controller is configured to generate a key based on a physics-based output of a component. The controller may, for example, use the key to authenticate communication between at least two nodes, to encrypt data, or to decrypt data, may be generated based on a physics-based output... Agent: Honeywell International Inc.
20140226814 - Methods and apparatus for independent decryption of encrypted video frames: Techniques for generating an encrypted video bitstream include encrypting media data using a plurality of encryption keys and generating metadata associated with the encrypted media data. The metadata includes a first list based on the plurality of encryption keys and a second list based on initialization vector/feedback vector (IV/FV) information... Agent: Zte (usa) Inc.
20140226816 - A method for attribute based broadcast encryption with permanent revocation: The invention is a method for broadcast encryption that allows a broadcaster to send encrypted data to a set of users such that only a subset of authorized users can decrypt said data. The method comprises modifications to the four stages of the basic Cipher-text Policy Attribute-Based Encryption techniques. The... Agent:
20140226815 - System and method for a secure display module: A system for a secure display module includes a display element array, a driver controller, a communication interface, a host controller and a cryptographic engine. The display element array includes one or more segments, and the driver outputs are configured to drive the one or more segments, respectively. The host... Agent: Bbpos Limited
20140226818 - Access point device and system for wireless local area network, and related methods: The present invention provides an access point device and system for a wireless local area network, and related methods thereof. On the access point device, a same ESS is divided into a plurality of VLANs, wherein the access point device comprises a broadcast key management module which is used for... Agent: Yokogawa Electric Corporation
20140226817 - Apparatus and method to register wi-fi clients on a wi-fi network: Techniques are provided to enable the registration of an embedded device with a wireless network, such as a Wi-Fi network. An established client of the wireless network formulates one or more data packets having an unencrypted multicast address, where at least a portion of the multicast address is unnecessary for... Agent: Broadcom Corporation
20140226819 - Wireless security configuration: An apparatus, method and computer-readable storage medium to efficiently connect to wireless access point(s). An electronic device may capture coded information. The coded information may include a security key to connect to a wireless access point, and the coded information may be an image, an audio clip, text, or a... Agent:
20140226820 - Infrastructure level lan security: Techniques are disclosed for securing traffic flowing across multi-tenant virtualized infrastructures using group key-based encryption. In one embodiment, an encryption module of a virtual machine (VM) host intercepts layer 2 (L2) frames sent via a virtual NIC (vNIC). The encryption module determines whether the vNIC is connected to a “secure... Agent: Vmware, Inc.
20140226821 - Electronic key management using pki to support group key establishment in the tactical environment: Method for distributing a group session cryptographic key includes initiating at least one pairwise key distribution session including a root node (100) and at least one communication node (101-107). The method further includes performing at a communication node which has received the group session cryptographic key a propagated pairwise key... Agent: Harris CorporationPrevious industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20140904:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
Results in 0.14064 seconds