Follow us on Twitter
twitter icon@FreshPatents


Crypto patents

      

This page is updated frequently with new Crypto-related patent applications.




 Crypto captcha and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems patent thumbnailCrypto captcha and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems
The crypto captcha and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms login request, external feature add request, verification response inputs via socoact components into verification request, verification confirmation outputs. An external feature add request that identifies an external feature may be obtained from an authenticated user.
Fmr Llc


 Social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems patent thumbnailSocial aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems
The social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms smart contract request, crypto currency deposit request, crypto collateral deposit request, crypto currency transfer request, crypto collateral transfer request inputs via socoact components into transaction confirmation outputs. An aggregated crypto 2-party transaction trigger entry that specifies at least one associated aggregated blockchain oracle may be instantiated.
Fmr Llc


 Cryptographic device with detachable data planes patent thumbnailCryptographic device with detachable data planes
A system for performing encryption and/or decryption may include a parent cryptographic device. The parent cryptographic device may be configured to receive a first cryptographic key.
L-3 Communications Corporation


 Crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems patent thumbnailCrypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems
The crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms mkadsd generation request, trigger event message inputs via socoact components into transaction confirmation, recovery notification outputs. A multiple key account data structure datastore (mkadsd) generation request may be obtained from a user.
Fmr Llc


 Methods for facilitating secure communication patent thumbnailMethods for facilitating secure communication
According to a first aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: encrypting, by a source node in the network, a new cryptographic key using a current cryptographic key as an encryption key; transmitting, by said source node, the encrypted new cryptographic key to a destination node in the network. According to a second aspect of the present disclosure, a method for facilitating secure communication in a network is conceived, comprising: receiving, by a destination node in the network, an encrypted new cryptographic key from a source node in the network; decrypting, by said destination node, the encrypted new cryptographic key using a current cryptographic key as a decryption key.
Nxp B.v.


 Systems and  tracking subdivided ownership of connected devices using block-chain ledgers patent thumbnailSystems and tracking subdivided ownership of connected devices using block-chain ledgers
The disclosed embodiments include computerized systems and methods for generating secured block-chain-based ledger data structures that track subdivide ownership and usage of one or more assets, such as internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured block-chain-based ledger may detect an occurrence of a triggering event related to at least one of partial ownership interests in the assets, and may access and decrypt a set of rules hashed into the secured block-chain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank


 User authentication  for credentials back-up service to mobile devices patent thumbnailUser authentication for credentials back-up service to mobile devices
Back-up credentials data is stored for a user. A communication channel is established with a mobile device.
Mastercard International Incorporated


 Systems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers patent thumbnailSystems and methods for establishing and enforcing transaction-based restrictions using hybrid public-private blockchain ledgers
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a rules authority of the secured blockchain-based ledger may obtain data indicative of an initiated transfer of funds between parties, and may access and decrypt a set of restrictions imposed on the initiated transfer and a set of rules associated with the restrictions, which may hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank


 Systems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers patent thumbnailSystems and methods for detecting and resolving data inconsistencies among networked devices using hybrid private-public blockchain ledgers
The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank


 Crypto voting and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems patent thumbnailCrypto voting and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems
The crypto voting and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms vote request, vote input inputs via socoact components into vote ui, vote confirmation outputs. A crypto vote request associated with a poll may be obtained from a user.
Fmr Llc


Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers

The disclosed embodiments include computerized systems and methods that generate secured blockchain-based ledger structures that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured blockchain-based ledger may detect an occurrence of an event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank

Systems and tracking behavior of networked devices using hybrid public-private blockchain ledgers

The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track an ownership and usage of one or more assets, such as internet-connected devices. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank

Systems and tracking enterprise events using hybrid public-private blockchain ledgers

The disclosed embodiments include computerized systems and methods for generating secured blockchain-based ledger data structures that track occurrences of events across fragmented and geographically dispersed lines-of-business of an enterprise. In one instance, an apparatus associated with a rules authority of the secured blockchain-based ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured blockchain-based ledger using a confidentially-held master cryptographic key.
The Toronto-dominion Bank

System and implementing hybrid public-private block-chain ledgers

The disclosed embodiments include computerized systems and methods that generate secured distributed storage ledger structures, such as block-chain-based ledger structures, that facilitate event-based control of tracked assets. In one embodiment, an apparatus associated with a centralized authority of the secured distributed storage ledger may detect an occurrence of a triggering event, and may access and decrypt a set of rules hashed into the secured distributed storage ledger using a confidentially-held master cryptographic key.
Td Bank Group

Methods and efficient computation of one-way chains in cryptographic applications

Techniques are disclosed for efficient computation of consecutive values of one-way chains and other one-way graphs in cryptographic applications. The one-way chain or graph may be a chain of length shaving positions i=1, 2, .
Crypto Research, Llc

Novel anti-fungal composition

The present invention discloses novel antifungal herbal composition comprising standardized ethyl acetate extracts or active ingredients isolated from ethyl acetate extract of lawsonia inermis, for the management of fungal infections, including those caused by (candida sp., cryptococcosis sp., aspergillus sp., penicillium sp, tinea sp and blastomyces sp.). More particularly, the present invention discloses herbal composition comprising ethyl acetate extracts of lawsonia inermis or the compositions comprising at least one of active ingredients selected from lawsone & lawsoniaside and luteoline, for the management of fungal infections..

Community-based communication network services

A method for accessing communication networks includes receiving by a device an identification of a communication network; determining whether the identification corresponds to a registered communication network; if the identification corresponds to a registered communication network, generating a password for accessing the communication network by applying a cryptographic function parameterized with a secret value associated with the communication network to the identification; and automatically establishing a connection of the device to the communication network using the generated password. Furthermore, methods for managing access to communication networks and providing communication networks are disclosed.
Calay Venture S.à R.l.

Installing configuration information on a host

Certain embodiments provide means for managing automated access to computers, e.g., using ssh user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, kerberos credentials, and cryptographic keys.
Ssh Communications Security Oyj

Systems and methods for controlling email access

Embodiments of the disclosure relate to proxying one or more email resources in transit to the client devices from the email services, removing one or more email attachments from the email resources, and encoding the stripped email attachments based at least in part on one or more cryptographic keys.. .
Airwatch, Llc

System for transparent authentication across installed applications

A system for authenticating mobile device users transparently is disclosed. This invention improves on the existing flaws by deriving encryption keys from environmental condition data when the user and device are trusted.
Trusted Mobile, Llc (d/b/a Sentegrity)

Cryptographic ignition key (cik) embedded in removable data cartridge

Systems and methods using a removable data storage device having an embedded cryptographic ignition key (cik) are provided. In one embodiment, a cik device is embedded into a removable data cartridge used to transfer information for cryptographic processing to a host system.
Ge Aviation Systems Llc

Configuring cryptographic systems

Systems and methods for configuring a cryptographic system, such as an avionic data transfer system associated with an aircraft, are provided. More particularly, systems and methods can be used to assemble a cryptographic key configuration (ckc) for use in a cryptographic system.
Ge Aviation Systems Llc

Cryptographic key server embedded in data transfer system

Systems and methods for managing cryptographic keys in an avionic data transfer system are provided. A host device associated with the avionic data transfer system can receive one or cryptographic keys via a key fill interface.
Ge Aviation Systems Llc

Cryptographic key loader embedded in removable data cartridge

Systems and methods using a cryptographic key loader embedded in a removable data storage device are provided. In one embodiment, the removable data storage device can include a dedicated key memory storing one or more cryptographic keys for cryptographic processing of data by a host system.
Ge Aviation Systems Llc

Secure comparison of information

The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.

Secure comparison of information

The technology encompasses new uses of already-known cryptographic techniques. The technology entails computer-based methods of sharing information securely, in particular an asymmetric method of secure computation that relies on the private-key/public key paradigm with homomorphic encryption.
Openeye Scientific Software, Inc.

Root of trust

First transistor logic is arranged by a first logic provider in circuit form and provides a minimum of functionality of the semiconductor device employed to bring up the semiconductor device, wherein the minimum of functionality is encrypted using a first encryption key. Second transistor logic is arranged by a second logic provider, different than the first logic provider, in circuit form to include security keys capable to perform cryptographic capabilities using a second encryption key.
Lantiq Beteiligungs-gmbh & Co. Kg

In-vehicle content delivery system operable in autonomous mode and non-autonomous mode

Multimedia content may be delivered to content consumer devices via a content-delivery network. Encrypted content and cryptography keys for decrypting the content may be distributed from a data center to various nodes of the content-delivery network, each node acting as a semi-independent content-delivery system.
Gogo Llc

System, for consistently configuring and securing devices installed in close physical proximity

It is an object of the present invention that trust between devices is enhanced by distributing a shared secret (e.g. An x.509 certificate or other cryptographic or shared secret mechanisms), utilizing a short range communication mechanism, thereby permitting those devices to securely authenticate and authorize sensitive commands to each other in communication over the internet or an untrusted network.
Masterpeace Solutions Ltd.

System and integrating an authentication service within a network architecture

A system and method are described for integrating an authentication service within an existing network infrastructure. One embodiment of a method comprises: configuring a gateway to restrict access to an internal network; configuring an authentication client of a client device to establish a communication channel with the authentication server and to register one or more authentication devices with the authentication server; authenticating the user with the authentication server using one or more of the registered authentication devices in response to an attempt to gain access to the internal network via the gateway; providing the client device with a cryptographic data structure in response to a successful authentication; providing the cryptographic data structure to the gateway as proof of the successful authentication; validating the cryptographic data structure with the authentication server; providing access to the gateway upon receiving an indication from the authentication server that the cryptographic data structure is valid..
Nok Nok Labs, Inc.

Method for a dynamic perpetual encryption cryptosystem

Communication links previously established by system nodes with central authorities may be used for secure node authentication and registration, whilst allowing the central authority to broker and synchronize communication channels and providing mutual authentication and other security functions between the system nodes.. .

Method for key rotation

A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the authenticating device to disable authentication that uses the first symmetric cryptographic key; and configuring the multi-factor authentication platform and the authenticating device to enable authentication that uses the second symmetric cryptographic key.. .
Duo Security, Inc.

Migrating authenticated content towards content consumer

Techniques involving migrating authenticated content on a network towards the consumer of the content. One representative technique includes a network node receiving an encrypted seed having at least a location of the user data at a network service that stores the user data, and a cryptographic key to access the user data.
Microsoft Technology Licensing, Llc

User authentication over networks

Methods are provided for authenticating user authentication data, associated with a user id, at an authentication system. The authentication system comprises an authentication server connected to a network, and a secure cryptoprocessor operatively coupled to the authentication server.
International Business Machines Corporation

Privacy-preserving attribute-based credentials

The invention relates to an obfuscated program logic of machine executable instructions and a hardcoded cryptographic signing key. The obfuscated program logic further comprising a hardcoded first attribute value wherein execution of the machine executable instructions by the processor causes the obfuscated program logic to receive a request and in response to receiving the request evaluate whether the request is related to the hardcoded first attribute value.
International Business Machines Corporation

Cryptographic hash generation system

A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements.
Securerf Corporation

Instructions and logic to provide simd sm4 cryptographic block cipher functionality

Instructions and logic provide for a single instruction multiple data (simd) sm4 round slice operation. Embodiments of an instruction specify a first and a second source data operand set, and substitution function indicators, e.g.
Intel Corporation

Distributed vpn service

For a network that includes host machines for providing computing and networking resources and a vpn gateway for providing external access to those resources, a novel method that distributes encryption keys to the hosts to encrypt/decrypt the complete payload originating/terminating at those hosts is described. These encryption keys are created or obtained by the vpn gateway based on network security negotiations with the external networks/devices.
Nicira, Inc.

Method for performing a sensitive data encryption with masking, and corresponding encryption apparatus and computer program product

Cryptographic circuitry masks sensitive data values. The masking includes extracting unique combinations of random mask values from one or more sets of random mask values.
Stmicroelectronics S.r.l.

Balanced encoding of intermediate values within a white-box implementation

A method of implementing a keyed cryptographic operation using a plurality of basic blocks, includes: generating a balanced encoding function; applying the balanced encoding function to the output of a first basic block; and applying an inverse of the encoding function to the input of a second basic block, wherein the second basic block receives the encoded output of first basic block as an input.. .
Nxp B.v

Encoding values by pseudo-random mask

A method for a keyed cryptographic operation by a cryptographic system mapping an input message to an output message, including: receiving input data for the keyed cryptographic operation; calculating a first mask value based upon the input data; and applying the first mask value to a first intermediate value of the keyed cryptographic operation.. .
Nxp, B.v.

Crypto-currency-based accrued value interoperability

A crypto-currency based value interoperability computing system for transferring closed-loop value within an accrued value system using crypto-currency is provided. The cyrpto currency based system may include an integration tier operable for managing mobile wallet sessions while maintaining integrity of the session.
Mozido, Inc.

Focal plane array processing method and apparatus

A digital focal plane array includes an all-digital readout integrated circuit in combination with a detector array. The readout circuit includes unit cell electronics, orthogonal transfer structures, and data handling structures.

Systems and methods for improving precision of a location sensor

Systems and methods of cryptographically protecting location data transferred between servers via a network to tune a location engine are described herein. A first encryption module determines a first hash value for each location determination, encrypts the first hash value for each location determination using a first encryption protocol to generate a first encrypted data set, and transmits the first encrypted data set to a server.
Google Inc.

Method and providing secure communication among constrained devices

In one example, an apparatus such as an authorization server and method for secure communication between constrained devices issues cryptographic communication rights among a plurality of constrained devices. Each of the plurality of constrained devices comprises no more than one cryptographic algorithm code module per cryptographic function.
Entrust, Inc.

Technologies for trusted i/o for multiple co-existing trusted execution environments under isa control

Technologies for secure programming of a cryptographic engine include a computing device with a cryptographic engine and one or more i/o controllers. The computing device establishes one or more trusted execution environments (tees).

Method and database system for secure storage and communication of information

A secure communications system for the secure storage and communication of authenticated user identity and personal information. The system includes a database of anonymised, individually encrypted user records.
Qredo Limited

Computational method, computational device andcomputer software product for montgomery domain

In elliptic curve cryptography (ecc), one performs a great number of modular multiplications. These are usually done by montgomery multiplication algorithm, which needs the operands to be preprocessed (namely, converted to the montgomery domain), which is normally done by an equivalent of a long division.
Winbond Electronics Corp.

Vehicular entropy for random number generation

A method is provided for producing cryptographic keys, while a vehicle is in operation, for use in secure vehicle communications. The method may include obtaining unique entropy data from an entropy source based on dynamically changing, transient variables related to the operation of the vehicle, optionally in a driving mode.
Toyota Motor Engineering & Manufacturing North America, Inc.

Cryptographic protection of i/o data for dma capable i/o controllers

Technologies for cryptographic protection of i/o data include a computing device with one or more i/o controllers. Each i/o controller may be coupled to one or more i/o devices.
Intel Corporation

Memory device, host device, and memory system

A control circuit causes a first cryptographic module to perform a dummy operation in a command processing period and a data processing period in which a second cryptographic module performs a normal operation while the first cryptographic module does not perform a normal operation.. .
Megachips Corporation

Slow hopping anti-jam waveform (shaw)

A method of transmitting a message using a slow hopping anti-jam waveform, includes generating a sequence with a cryptographic hash function; transmitting, for a predetermined dwell time, a first portion of the message on a first channel having a first baseline frequency; choosing a second channel having a second baseline frequency based on the generated sequence, the second baseline frequency being offset from the first baseline frequency; and transmitting, for the predetermined dwell time, a second portion of the message on the second channel having the second baseline frequency; wherein the two transmitting steps occur sequentially.. .
The Government Of United States Of America, As Represented By The Secretary Of The Navy



Crypto topics:
  • Digital Signature
  • Hash Function
  • Private Key
  • Public Key
  • Computer Program
  • Certificate
  • Coordinates
  • Camera Module
  • Executable
  • Network Device
  • Access Rights
  • Cell Phone
  • Network Server
  • Hypertext Transfer Protocol
  • Virtual Private Network


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Crypto for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Crypto with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.587

    file did exist - 2421

    0 - 1 - 57