Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW Methods and apparatus for naming video content chunks
Telefonaktiebolaget Lm Ericsson (publ)
June 22, 2017 - N°20170180774

A method for generating a filename for a chunk of streamed video content is disclosed. The method comprises performing a cryptographic hash function on data associated with the chunk of video content (100a) and setting the output hash value of the cryptographic hash function as the chunk filename (100b). A method for recording broadcast video content by a user device ...
NEW Enhanced data security through uniqueness checking
Amazon Technologies, Inc.
June 22, 2017 - N°20170180412

A system records use of values used in cryptographic algorithms where the values are subject to uniqueness constraints. As new values are received, the system checks whether violations of a unique constraint has occurred. If a violation occurs, the system performs actions to mitigate potential compromise caused by exploitation of a vulnerability caused by violation of the uniqueness constraint.
NEW Method and device for transmitting software
Robert Bosch Gmbh
June 22, 2017 - N°20170180392

A method for transmitting software in which a checker generates two random numbers. The checker calculates a cryptographic key based on the second random number based on a measured hardware function of the device. The checker encrypts the software into a cryptogram using the key, and transmits the cryptogram to the device. The checker transmits the first random number to ...
NEW Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Cryptographic protocol for portable devices
Nymi Inc.
June 22, 2017 - N°20170180130

Embodiments are directed towards communicating using a mobile device that performs actions including. A mobile device may be provisioned with an access point such that a provisioning key and a provisioning token for each of the provisioned access points may be stored on the mobile device. The mobile device may be determined to be in the presence of a provisioned ...
NEW Method for implementing encrypted client-server communication
Volkswagen Ag
June 22, 2017 - N°20170180126

A method for implementing an encrypted client-server communication, wherein the server includes an entry point, service systems behind the entry point, and a secure system. The method includes incorporating common cryptographic material into the client and into the secure system, deriving key material from the common cryptographic material in the client for an encrypted communication between the client and a ...
NEW Device and method for the personalized provision of a key
Deutsche Post Ag
June 22, 2017 - N°20170180125

A device and a method is disclosed for the personalized provision of a key for processing target information. The device comprises an information receiving means to receive biometric information about the user, a storage device for storing biometric reference information, an authentication means to compare the user's biometric information, which was received by the biometric information acquisition means, to the ...
NEW Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Wide encoding of intermediate values within a white-box implementation
Nxp B.v.
June 22, 2017 - N°20170180119

A method for a method for mapping an input message to an output message by a keyed cryptographic operation in a cryptographic system, the keyed cryptographic operation including a plurality of substitution layers and state data, including: mapping the input message to first state data in a first substitution layer of the keyed cryptographic operation, wherein the first substitution layer ...
NEW One-time pad communications network
Nxp B.v.
June 22, 2017 - N°20170180117

A system and method for providing secure and anonymous communication between a plurality of individuals relying on the cryptographic method of the one-time pad (otp) is described. Unique, randomly generated blocks of data are generated to serve as one-time pads, and each is given a unique identification that serves as a system address. One-time pads are anonymously distributed to communicants ...
NEW Countermeasure method for an electronic component implementing an elliptic curve cryptography algorithm
Secure-is Sas
June 22, 2017 - N°20170180114

The subject of the invention is a countermeasure method for an electronic component implementing a public-key cryptography algorithm on an elliptic curve e defined over a field and comprising an iterative scalar multiplication operation making it possible to obtain a point [k]p on the basis of a point p of the curve e and of an integer k that ...
NEW Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
Myport Technologies, Inc.
June 22, 2017 - N°20170178271

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and ...
NEW Computer implemented frameworks and methods configured to create and manage a virtual currency
Dragonfly Fintech Pte Ltd
June 22, 2017 - N°20170178237

Described herein are computer implemented frameworks and methods configured to create and manage a virtual currency bearing characteristics of both a cryptocurrency and fiat money at the same time. The virtual currency bridges the gap between fiat currency of the real world commerce, trade, and finance and cryptocurrency by way of a self-adjusting extrinsic value that is influenced by cross ...
NEW Biometric cryptography using micromachined ultrasound transducers
Intel Corporation
June 22, 2017 - N°20170177917

An embodiment includes an ultrasonic sensor system comprising: a backend material stack including a first metal layer between a substrate and a second metal layer with each of the first and second metal layers including a dielectric material; a ultrasonic sensor including a chamber, having a negative air pressure, that is sealed by first and second electrodes coupled to each ...
NEW Personal ledger blockchain
International Business Machines Corporation
June 22, 2017 - N°20170177898

A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a request is received at a computing node. The request is typically cryptographically signed by a user system to include a new transaction with additional data in the blockchain. The additional data is previously encrypted with an ...
NEW Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Techniques to compress cryptographic metadata for memory encryption
Intel Corporation
June 22, 2017 - N°20170177505

Examples include techniques for compressing counter values included in cryptographic metadata. In some examples, a cache line to fill a cache included in on-die processor memory may be received. The cache arranged to store cryptographic metadata. The cache line includes a counter value generated by a counter. The counter value to serve as version information for a memory encryption scheme ...
NEW Method for verifying the functionalities of a software intended to be integrated into a cryptographic ...
Airbus Ds Slc
June 22, 2017 - N°20170177467

The method for validating the status of a memory of a simulator of a cryptographic component able to save data generated by a cryptographic function, includes a step carried out in the simulator including a first execution of a first cryptographic function generating: a first status of the first memory, and a first result of the first command; a step ...
NEW Technologies for protecting audio data with trusted i/o
Airbus Ds Slc
June 22, 2017 - N°20170177293

Technologies for cryptographic protection of i/o audio data include a computing device with a cryptographic engine and an audio controller. A trusted software component may request an untrusted audio driver to establish an audio session with the audio controller that is associated with an audio codec. The trusted software component may verify that a stream identifier associated with the ...
NEW Medical systems, devices and methods
Airbus Ds Slc
June 22, 2017 - N°20170173262

There is disclosed a medical system comprising one or more sensors associated with one or more actuators. Various embodiments describe sensors and/or actuators, logic circuits, user interfaces, association schemes, communication schemes, security schemes, cryptographic schemes, medical management rules, social mechanisms, energy management schemes, time and/or space schemes, body analytes and/or biomarkers, blood glucose and/or interstitial glucose ...
NEW Tumor cell-inhibited composition
Airbus Ds Slc
June 22, 2017 - N°20170173094

A composition utilizing natural materials is selected from a group of plant extract comprising: taiwan cypress, stout camphor tree, taiwan incense cedar, cinnamomum camphora, cymbopogon nardus, litsea cubeba, cinnamomum zeylanicum, taiwan cunninghamia lanceolatavar, melaleuca alternifolia, eucalyptus robusta smith, cryptomeria japonica and acacia confuse. The tumor cell-inhibited composition having the efficiency of inhibiting the growth of tumor cells is formed by ...
Signed envelope encryption
Amazon Technologies, Inc.
June 15, 2017 - N°20170171219

Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust another client to read, but not modify, a message. Clients may utilize a cryptography service to generate a message protected against improper modification. Clients may utilize a cryptography service to verify whether a protected message has been improperly modified.
Allowing varied device access based on different levels of unlocking mechanisms
Intel Corporation
June 15, 2017 - N°20170171218

Systems and methods may provide for receiving runtime input from one or more unlock interfaces of a device and selecting a level of access with regard to the device from a plurality of levels of access based on the runtime input. The selected level of access may have an associated security policy, wherein an authentication of the runtime input may ...
Bidirectional cryptographic io for data streams
Intel Corporation
June 15, 2017 - N°20170171194

Various configurations and techniques for enabling bidirectional cryptographic input output (io) operations with an io device of a computing system are disclosed herein. In an example, electronic operations of a computing system to enable a secure direct memory access (dma) transaction including writing information to enable the secure dma transaction to memory, reading and verifying the information from memory, performing ...
Loading