Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW System for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash
Bank Of America Corporation
May 17, 2018 - N°20180139186

Embodiments of the present invention provide a system for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash. In particular, the invention uses cryptographic keys and hashes to combine and dissociate blockchain records from the private blockchains two or more entities. The system provides a mechanism by which blockchains owned by distinct entities may be multiplexed upon formation of a ...
NEW Systems and methods for cryptography having asymmetric to symmetric key agreement
May 17, 2018 - N°20180139184

A system and method for generating data for use in cryptography or secure modulation is provided. The method may include randomly generating a public code using a secret key, wherein the public code includes an interior matrix and a summing matrix, both having a predetermined dimension of rows and columns. After receipt of the public code and the rule of ...
NEW Apparatus and method to perform secure data sharing in a distributed network by using a ...
Fujitsu Limited
May 17, 2018 - N°20180139056

An apparatus serves as a node device included in a distributed data sharing network, and shares, by using a blockchain, a piece of event information related to an event generated in a terminal, among node devices included in the distributed data sharing network, where the blockchain is a continuously growing list of blocks which are linked and secured using cryptography. ...
NEW Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Cryptographic key control based on debasing condition likelihood estimation
Venafi, Inc.
May 17, 2018 - N°20180139047

In representative embodiments, systems and methods to calculate the likelihood that presented cryptographic key material is untrustworthy are disclosed. A predictive model based on a debasing condition and a dataset is created by evaluating the dataset relative to the debasing condition. For example, if certificate revocation is selected as the debasing condition, the dataset is analyzed to produce a predictive ...
NEW Data encryption apparatus and method, and data decryption apparatus and method
Samsung Sds Co., Ltd.
May 17, 2018 - N°20180139041

Provided are a data encryption apparatus and method, and a data decryption apparatus and method. A data encryption apparatus according to an embodiment of the present embodiments includes a divider configured to divide data into a plurality of plaintext blocks, an encryptor configured to encrypt at least one among some blocks of the plurality of plaintext blocks and an initial ...
NEW Protecting cryptographic systems from cold boot and other side channel attacks
International Business Machines Corporation
May 17, 2018 - N°20180139037

An electrical signal indicative of an intrusion is detected at an application executing in a cryptographic data processing system. In response to the detection, an instruction is constructed in the application for the cryptographic data processing system. Using a processor, the instruction causes a cryptographic data item to be removed from a portion of a memory device installed in the ...
NEW Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW System for authenticating an electronic device by means of an authentication server
Gemalto Sa
May 17, 2018 - N°20180137511

A system for authenticating an electronic device by means of an authentication server in order to authenticate a user of said electronic device. The system is adapted to perform an authentication based on a fictive payment transaction and includes the authentication server which is adapted to execute a fictive payment transaction with a predetermined transaction amount with said electronic device ...
NEW Programming on-chip non-volatile memory in a secure processor using a sequence number
Acer Cloud Technology, Inc.
May 17, 2018 - N°20180137307

A method may be executed by a secure processor having secure cryptography hardware implemented thereon. The method may be executed in a security kernel of a secure on-chip non-volatile (nv) memory coupled to the secure processor. The method may include: storing a rewritable state and a device private key based at least in part on a programmed secret seed and ...
NEW Encryption for xip and mmio external memories
Cypress Semiconductor Corporation
May 17, 2018 - N°20180137294

Techniques for multiplexing between an execute-in-place (xip) mode and a memory-mapped input/output (mmio) mode for access to external memory devices are described herein. In an example embodiment, an ic device comprises a serial interface and a controller that is configured to communicate with external memory devices over the serial interface. The controller comprises a control register and a cryptography ...
NEW System and method for implementing cryptography in a storage system
Storageos Limited
May 17, 2018 - N°20180137293

A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key, generating a user key, generating a volume initialization vector, generating an intermediate key, generating a user volume key, and performing cryptography operations on data blocks within an individual volume of data using the volume master key, ...
NEW Cryptographic-based initialization of memory content
Hewlett Packard Enterprise Development Lp
May 17, 2018 - N°20180137062

A technique includes receiving a request to initialize a region of a memory. Content that is stored in the region is encrypted based at least in part on a stored nonce value and a key. The technique includes, in response to the request, performing cryptographic-based initialization of the memory, including altering the stored nonce value to initialize the region of ...
Method of pushing passwords, and pushing system
Guangdong Oppo Mobile Telecommunications Corp., Ltd.
May 10, 2018 - N°20180131682

A method of pushing passwords, and a pushing system are provided. The method includes establishing a sharing cryptographic library which stores a plurality of application program identification codes, account names and passwords, receiving first biological characteristic information of a user, and simultaneously receiving a push request including second biological characteristic information and a current application program identification code. An account ...
Configuration based cryptographic key generation
Honeywell International Inc.
May 10, 2018 - N°20180131528

In some examples, a programmable device may load configuration data into a configuration storage to configure programmable logic of the programmable device. The programmable device may include a key generation logic that may read at least a portion of the configuration data from the configuration storage. The key generation logic may generate a cryptographic key based at least in part ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure database featuring separate operating system user
Sap Se
May 10, 2018 - N°20180131517

Embodiments manage access to cryptography keys for database data, within a secure key store of a local key server owned by a new (security) operating system (os) user separate from an original default os user. Existing principles governing distinct os user access privileges engrained within the os itself, are leveraged to preclude the default os user from accessing files of ...
Use of error information to generate encryption keys
Microsoft Technology Licensing, Llc
May 10, 2018 - N°20180131510

The embodiments provide cryptography keys for communicating devices that are based on information known only to the devices. Each device determines the information without communicating key information related to the key with the other. In an implementation, a first device sends a first signal to a second device, the second device loops back the first signal to the first device ...
Extended blockchains for event tracking and management
Ledgerdomain, Llc
May 10, 2018 - N°20180130050

Blockchain-based systems and methods incorporate secure wallets; enhanced, randomized, secure identifiers for uniquely identifying discrete items; and cryptographically secure time-stamped blockchains. Role-based secure wallets include private cryptographic keys for digitally signing transactions for recording in a blockchain. Operations to be performed using role-based wallet can be permitted or restricted based on privileges associated with the respective wallets. Multiple blockchains can ...
Extended blockchains for event tracking and management
Ledgerdomain, Llc
May 10, 2018 - N°20180130034

Blockchain-based systems and methods incorporate secure wallets; enhanced, randomized, secure identifiers for uniquely identifying discrete items; and cryptographically secure time-stamped blockchains. Role-based secure wallets include private cryptographic keys for digitally signing transactions for recording in a blockchain. Operations to be performed using role-based wallet can be permitted or restricted based on privileges associated with the respective wallets. Multiple blockchains can ...
Techniques for leveraging multiple cryptographic algorithms for authenticating data
Qualcomm Incorporated
May 10, 2018 - N°20180129826

Techniques for authenticating data on a computing device are provided. An example method according to these techniques includes generating a first cryptographic output by applying a first cryptographic algorithm to each block of a first subset of the plurality of blocks of data to be authenticated, combining a last block of the first cryptographic output with a second subset of ...
Protection of the ue identity during 802.1x carrier hotspot and wi-fi calling authentication
Apple Inc.
May 03, 2018 - N°20180124597

This disclosure relates to techniques for performing wi-fi authentication in a wireless communication system. Public key cryptography may be used to enhance the confidentiality of the user's permanent identity in transit. In some embodiments, a rsa-oaep (sha-256) encryption scheme may be used to protect the permanent identity when the eap client needs to send the user's permanent identity to the ...
Facilitating encrypted persistent storage in browsers
Salesforce.com, Inc.
May 03, 2018 - N°20180124027

Disclosed are some implementations of systems, apparatus, methods and computer program products for encrypting and securely storing session data during a browser session using a session-based cryptographic key. The session data may be decrypted during the browser session or other browser sessions using the session-based cryptographic key or other backwards compatible session-based cryptographic keys. In addition, session-based cryptographic keys may ...
Apparatus and method for generating a key in a programmable hardware module
Siemens Aktiengesellschaft
May 03, 2018 - N°20180123789

A method for generating a key in a programmable hardware module is provided, wherein the programmable hardware module has a bitstream containing configuration settings of the programmable hardware module. The device has a readout unit for reading at least one part of the bit stream, a generating unit for generating a key based on a cryptographic function and the at ...
Loading