|Cryptography patents - Monitor Patents|
USPTO Class 380 | Browse by Industry: Previous - Next | All
Recent | 13: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 12: Dec | Nov | Oct | Sep | Aug | July | June | May | April | Mar | Feb | Jan | 11: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | 10: Dec | Nov | Oct | Sep | Aug | Jul | Jun | May | Apr | Mar | Feb | Jan | | 09: Dec | Nov | Oct | Sep | Aug | Jl | Jn | May | Apr | Mar | Fb | Jn | | 2008 | 2007 |
CryptographyBelow are recently published patent applications awaiting approval from the USPTO. Recent week's RSS XML file available below.
Listing for abstract view: USPTO application #, Title, Abstract excerpt,Patent Agent. Listing format for list view: USPTO National Class full category number, title of the patent application. 02/27/2014 > 5 patent applications in 5 patent subcategories.
20140056424 - Manufacturing method: According to one embodiment, a manufacturing method of a device to be authenticated, wherein the device includes a first memory area which is prohibited from data-reading and data-writing after shipping from a memory vendor; a second memory area which is allowed to data-read from outside after shipping from the memory... Agent: Kabushiki Kaisha Toshiba
20140056425 - One pad communications: c
20140056426 - Adaptable encryption device and methods for use therewith: A video processing device includes a data segmentation generator that receives a domain selection, n, and that segments input A/V data into n data blocks. An encryption processing device receives an encryption depth selection, k, and a range selection, m, and sequentially encrypts each of the n data blocks m... Agent: Vixs Systems, Inc.
20140056427 - Apparatus and method for providing secure communications in a network: A secure communication channel is established between the communication network and a first automation controller. The first automation controller is located remotely from the communication network. First data is transmitted between the communication network and the first automation controller or second data is transmitted between the first automation controller and... Agent: Ge Intelligent Platforms, Inc.
20140056428 - Methods and systems for securely accessing translation resource manager: The disclosed embodiments relate to systems and methods for securely accessing a phrase table. One or more records in the phrase table are encrypted using a first set of keys. The first set of keys is encrypted using a second key. A decoder module is compiled based on the second... Agent: Xerox Corporation02/20/2014 > 8 patent applications in 4 patent subcategories.
20140050316 - Method and apparatus for nonlinear iv setup in keystream generators: The invention concerns the contact-less technology MIFARE, and describes a method to update a state by injecting an IV using a non-linear feedback shift register that makes use of only look-up tables and basic operations on 8-bit words.... Agent: Gemalto Sa
20140050317 - Cloud key management system: This invention uses a cloud-based key management system to store, retrieve, generate, and perform other key operations. The cloud-based system ensures security of the keys while preventing their loss or destruction. Using this invention, a company can now manage, audit, and maintain control and security around their keys. Security event... Agent: Digicert, Inc.
20140050318 - Re-encryption key generator, re-encryption apparatus, and program: A re-encryption key generator according to an embodiment generates a re-encryption key required to re-encrypt, without decrypting, ciphertext data obtained by encrypting plaintext data by means of a first public key of a first user device to obtain re-encrypted text data which can be decrypted by a second private key... Agent: Kabushiki Kaisha Toshiba
20140050322 - Authentication in a roaming environment: One embodiment of the invention provides a mobile communication network architecture that includes a first base station (e.g., a first base station controller and/or a first transceiver station), a second base station a second base station controller and/or a second transceiver station), a mobile client, and a server coupled to... Agent: Broadcom Corporation
20140050320 - Enhancements to enable fast security setup: WTRUs, ARSs, APs, WLG/AAA proxies, networks, and methods thereon are disclosed for fast security setup on a multi-RAT WTRU. Methods of sharing security associations between RATs on a multi-RAT WTRU are disclosed. Methods of caching security associations are disclosed. Methods are disclosed for alerting an ANDSF server of an AP... Agent: Interdigital Patent Holdings, Inc.
20140050323 - Information processing apparatus, information processing method, operation terminal, and information processing system: Provided is an information processing apparatus including a security level determination section which determines a security level at a time of transmitting a key to an operation terminal, as a transmission security level, a transmission power determination section which determines a transmission power in accordance with the transmission security level... Agent: Sony Corporation
20140050319 - Method and device for setting up wireless network connection: The present invention provides a method and device for setting up a wireless network connection. The second device sets up a connection with the wireless network according to the network configuration information. With the present invention, user participation when a terminal is connected to the wireless network is reduced, and... Agent: Huawei Device Co., Ltd.
20140050321 - Ultrasonic transmission of signals: Described herein are devices and systems that transmit data from a first device using an ultrasonic digital modem to a second device that receives the ultrasonic signal and can interpret the ultrasonic signal. The second device may be a telecommunications device such as a smartphone running an ultrasonic digital modem... Agent:02/13/2014 > 8 patent applications in 6 patent subcategories.
20140044258 - Methods and systems for cryptographic access control of video: Methods and systems for cryptographic access control of multimedia video, include embedding as metadata access control policy (ACP) information, including authorization rules and cryptographic information tied to an encryption policy, into encrypted video. An authorized receiver device having credentials and/or capabilities matched to the authorization rules is able to extract... Agent:
20140044259 - Job processing system, job processing method, and non-transitory computer-readable medium: A system for processing a job including one or a plurality of tasks, comprises: a management service server which manages a job generated by receiving the designation; and one or a plurality of task processing service servers which process one or a plurality of tasks forming the job, in order... Agent: Canon Kabushiki Kaisha
20140044260 - Communication apparatus, communication method, computer-readable medium, and communication system: According to an embodiment, a communication apparatus includes a finding unit; a negotiating unit; and a communicating unit. The finding unit is configured to, in response to a request from an application that makes use of key information, find out a key generating device that generates the key information. The... Agent: Kabushiki Kaisha Toshiba
20140044261 - Method and system of cryptographic processing of a message: In one aspect, the present invention relates to a method of cryptographic processing of a message, the method comprising: —establishing communication between a first communication unit and a second communication unit in a communication domain comprising a communication channel; —defining, by the second communication unit, an integer a as a... Agent: Caporali Raphael Lorenzo
20140044262 - Low latency encryption and authentication in optical transport networks: Data to be transmitted across an Optical Transport Network (OTN) is encrypted with a non-malleable encryption algorithm. An authentication code configured to allow authentication of the data with a low latency encryption algorithm is generated. A packet is generated which is configured to be transferred across the OTN and contains... Agent: Cisco Technology, Inc.
20140044263 - Centralized key generation: A first network device is configured to receive a request for a secret key, generate the secret key, and send the secret key to a second network device, a third network device, and a wireless user device. The second network device may send content, encrypted with the secret key, to... Agent: Verizon Patent And Licensing Inc.
20140044264 - Communications system: A method performed by a mobile communications node at a setup or a reconfiguration of a radio link control unacknowledged mode (RLC-UM) radio bearer includes receiving a radio bearer setup message from a network communications node, the radio bearer setup message being applied in configuring an RLC-UM radio bearer within... Agent: Nec Corporation
20140044265 - Secure feature and key management in integrated circuits: A mechanism for providing secure feature and key management in integrated circuits is described. An example integrated circuit includes a secure memory to store a secret key, and a security manager core, coupled to the secure memory, to receive a digitally signed command, verify a signature associated with the command... Agent: Cryptography Research, Inc.02/06/2014 > 8 patent applications in 6 patent subcategories.
20140037087 - Communication device and cryptographic key creation method in cryptographic key sharing system: A communication device and a cryptographic key creation method are provided that enable efficient creation of cryptographic keys of which different error rates are required. A communication device (11) that performs communication with another communication device (12) through a transmission link includes a cryptographic key sharing section (1103) that share... Agent: Nec Corporation
20140037088 - Cryptographic method, cryptographic device, and cryptographic program: K-sequence-data randomizing processing is performed a predetermined number of times. One round of the processing includes steps of: performing conversion processing on k pieces (k is an even number of 6 or more) of n-bit sequence data obtained by dividing n×k bit block data so that i-th sequence data and... Agent: Nec Corporation
20140037086 - Memory system generating random number and method generating random number: In a memory of non-volatile memory cells, a random number is generated by programming non-volatile memory cells, reading the programmed non-volatile memory cells using a random number read voltage selected in accordance with a characteristic of the non-volatile memory cells to generate random read data, and generating the random number... Agent:
20140037089 - Encryption processing device and method: An encryption processing device includes: a memory configured to store a first secret key and a first agitation value operated with the first secret key; and a processor coupled to the memory and configured to: receive a first random number, generate a second agitation key based on the first secret... Agent:
20140037090 - System and method of digital rights management: A method and a system of digital right management on a computer system. Protected video content is decrypted where encoded frames of data are buffered and overwritten after decoding to prevent the unauthorized copying. The system includes a software client that has a user identifiable key for tracing any unauthorized... Agent: Media Speed Tech LLC, A Delaware Limited Liability Company
20140037091 - System and method for hybrid multiple source decryption: Systems and methods are disclosed to improve performance of a communications device receiving encrypted communications from multiple sources. The communications device is configured to increase the amount of decryption performed using a hardware-based process as compared to a software-based process by reprogramming the hardware to store a shared security key... Agent: Qualcomm Atheros, Inc.
20140037092 - Method and system of reconstructing a secret code in a vehicle for performing secure operations: A method is provided for constructing a secret code in a processing unit when in communication with a portable security unit. Mutual authentication messages are exchanged between a linked portable security unit and processing unit. A first portion of the secret code is communicated to the processing unit. The processing... Agent: Gm Global Technology Operations, Inc.
20140037093 - Method of managing key for secure storage of data and apparatus therefor: A method and apparatus for managing a key for secure storage of data. The apparatus includes a main controller configured to process a command, a cipher unit configured to encrypt a first key to form an encrypted key or encrypt data to form encrypted data based on a result of... Agent: Samsung Electronics Co., Ltd.Previous industry: Telephonic communications
Next industry: Electrical audio signal processing systems and devices
RSS FEED for 20140227:
Integrate FreshPatents.com into your RSS reader/aggregator or website to track weekly updates.
For more info, read this article.
Thank you for viewing Cryptography patents on the FreshPatents.com website. These are patent applications which have been filed in the United States. There are a variety ways to browse Cryptography patent applications on our website including browsing by date, agent, inventor, and industry. If you are interested in receiving occasional emails regarding Cryptography patents we recommend signing up for free keyword monitoring by email.
Results in 0.16448 seconds