Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method and system of user authentication and end to end encryption using device synchronization
November 09, 2017 - N°20170325089

In one aspect, a computerized method for implementing user authentication using, device synchronization to match that includes the step of accessing a web page. The web page includes an agent. The computerized method includes the step of loading the agent in the background. The computerized method, includes the step of, generating, with the agent, an agent-generated token in background. The ...
Relating private data of different entities
Linkedin Corporation
November 09, 2017 - N°20170324712

Aspects of the present disclosure relate to cryptography. In particular, example embodiments relate to computing a relationship between private data of a first entity and private data of a second entity, while preserving privacy of the entities and preventing inter-entity data sharing. A server includes a first component to compute an intersection of two datasets, without directly accessing either dataset. ...
Method for establishing, securing and transferring computer readable information using peer-to-peer public and private key ...
Linkedin Corporation
November 09, 2017 - N°20170324711

Establishing file space requires that the owner links it to a centralized or decentralized peer-to-peer cryptographic block chain protocol. This secures and locks files for subsequent confirmation and transfer. Confirmation and transfer of the file is processed with a cryptographic hash function of crypto currency block chain process. The system and method requires that the transferee obtain the file using ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Unified encryption configuration management and setup system
Pacific Star Communications, Inc.
November 09, 2017 - N°20170324566

The present technology relates to the field of configuration and setup of encrypted computer network transmission systems. In particular, the present technology relates to setting up and configuring network encryption systems, including macsec, internet protocol security (ipsec), and tls protocols, in heterogeneous networks over wireless area networks (wan), wireless local area network (wlan) or cellular links. In some embodiments, the ...
Method and system for cheon resistant static diffie-hellman security
Certicom Corp.
November 09, 2017 - N°20170324556

A method for providing cheon-resistance security for a static elliptic curve diffie-hellman cryptosystem (ecdh), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ecdh instructions executable on computer processors of the respective correspondents, the ecdh instructions using a curve selected from a plurality of curves, the selecting including ...
Public key cryptosystem based on partitioning of galois field elements
Pq Solutions Limited
November 09, 2017 - N°20170324554

A post-quantum, public key cryptosystem is described which is polynomial based and where the private key polynomial has coefficients from a sub-set of galois field elements and plain text message polynomials have coefficients from a second sub-set of galois field elements. The public key polynomial is constructed using the inverse of the private key polynomial and a randomly chosen polynomial ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Mobile device having quantum cryptographic security function for mobile commerce, and authentication method
University Of Seoul Industry Cooperation Foundation
November 09, 2017 - N°20170324552

Disclosed herein are technologies regarding a communication device and server which are capable of cryptographic communication based on quantum cryptography. The communication device includes: a quantum signal generation unit configured to generate a series of first quantum signals by using a first quantum filter; an optical transmission unit configured to send the series of first quantum signals to a server; ...
Mobile commerce and authentication method having improved security based on quantum cryptography
University Of Seoul Industry Cooperation Foundation
November 09, 2017 - N°20170324551

Disclosed herein are technologies regarding a communication device and server which are capable of cryptographic communication based on quantum cryptography. A communication device for quantum cryptography authentication includes: an optical communication unit configured to receive a series of first quantum signals generated by passing through a first quantum filter of the communication device; a quantum signal generation unit configured to ...
Method for testing and hardening software applications
Giesecke & Devrient Gmbh
November 09, 2017 - N°20170324547

Methods are provided for testing and hardening software applications for the carrying out digital transactions which comprise a white-box implementation of a cryptographic algorithm. The method comprises the following steps: (a) feeding one plaintext of a plurality of plaintexts to the white-box implementation; (b) reading out and storing the contents of the at least one register of the processor stepwise ...
Hardened white box implementation 1
Giesecke & Devrient Gmbh
November 09, 2017 - N°20170324543

The invention provides a processor device having an executable, white-box-masked implementation of a cryptographic algorithm implemented thereon. The white-box masking comprises an affine mapping a, which is so designed that every bit in the output values w of the affine mapping a depends on at least one bit of the obfuscation values y, thereby attaining that the output values w ...
Hardened white box implementation
Giesecke & Devrient Gmbh
November 09, 2017 - N°20170324542

A processor device has an executable implementation of a cryptographic algorithm implemented thereon that is white-box-masked by a function f the implementation comprises an implemented computation step s by which input values x are mapped to output values s=s[x], and which is masked to a white-box-masked computation step t′ by means of an invertible function f. As ...
Securely booting a computer from a user trusted device
International Business Machines Corporation
November 09, 2017 - N°20170323104

A method for allowing a computer to boot from a user trusted device is provided. The computer includes a long-term data storage device storing operating system (os) services. The user trusted device is connectable to the computer and stores a boot loader detectable and executable by a firmware of the computer, an os loader designed to load an os of ...
Method for retrieving encrypted graph, system for retrieving encrypted graph, and computer
Hitachi, Ltd.
November 09, 2017 - N°20170322977

A system for retrieving an encrypted graph, in which a first computer generates an encrypted graph, and a second computer retrieves the encrypted graph, wherein: the first computer generates a secret key, encrypts a graph that includes a start point, an edge, and an end point to generate an encrypted graph, generates an encryption query, transmits encrypted graph data in ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method for computing message digests
Intel Corporation
November 09, 2017 - N°20170322746

A data de-duplication approach leverages acceleration hardware in ssds for performing digest computations used in de-duplication operations and support on behalf of an attached host, thereby relieving the host from the computing burden of the digest computation in de-duplication (de-dupe) processing. De-dupe processing typically involve computation and comparison of message digests (md) and/or hash functions. Such md functions are ...
Method and apparatus for supporting multiple broadcasters independently using a single conditional access system
Intel Corporation
November 02, 2017 - N°20170318263

A method and apparatus for brokering the enablement of the communication of encrypted media programs from a plurality of independent broadcasters to a plurality of receivers is disclosed. The system makes use of a pairing key for each provided service, which is differently encrypted by a pairing server and by the broadcaster providing the service. The encrypted versions of the ...
Methods and systems of providing verification of the identity of a digital entity using a ...
Intel Corporation
November 02, 2017 - N°20170317997

Methods and systems of providing verification of the identity of a digital entity are provided, including receiving information and a public key of the digital entity, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a record of transactions; deriving ...
Methods and systems of providing verification of information using a centralized or distributed ledger
Intel Corporation
November 02, 2017 - N°20170317834

A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier ...
Cryptographic encryption key escrow and recovery
Intel Corporation
November 02, 2017 - N°20170317824

Various features described herein may include supervision or control of a cryptographic signal necessary for encryption or decryption. Specifically, key management may be performed, wherein the key is deposited or retrieved to or from a third party. For example, data may be encrypted. The encrypted data may be unencrypted by using a key, which may be stored on a different ...
Rate line suppression using chaotic spreading codes
Intel Corporation
November 02, 2017 - N°20170317712

A system, method, and computer program product for chaotically generating a pseudorandom number sequence, such as for use in spread spectrum communications systems and in cryptographic systems. Chaotically generated pseudorandom numbers are not cyclostationary in nature, so output values encoded via such non-cyclostationary bases have no clear correlations. Spread signal communications systems using chaotically generated spreading codes thus operate without ...
Methods and systems of executing a business transaction from a commercial website using a centralized ...
Intel Corporation
November 02, 2017 - N°20170316409

Methods and systems of executing a business transaction from a commercial website are provided, including sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction; receiving the information of the user; sending a cryptographic challenge nonce; receiving the cryptographic challenge nonce signed by the user's private key; verifying user identity ...
Methods and systems of revoking an attestation transaction using a centralized or distributed ledger
Intel Corporation
November 02, 2017 - N°20170316390

A method and system of revoking an attestation transaction regarding information of a user is provided. The method is implemented on a computer system having one or more physical processors configured by machine-readable instructions which, when executed perform the method, including generating a signed revocation transaction to revoke the previously attested information, wherein the information has been previously attested to ...
Loading