Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Exclusive preshared key authentication
Aerohive Networks, Inc.
August 10, 2017 - N°20170230824

Preshared keys are assigned to client devices, users, or user groups. The set of valid preshared keys or keys derived therefrom is distributed to network devices such as wireless access points. A client device attempts to establish a secure network connection with a network device using its assigned preshared key. A network device identifies the client device's preshared key by ...
Granting access through app instance-specific cryptography
Ebay Inc.
August 10, 2017 - N°20170230184

In one example embodiment, a system for registering an application installable on a client device is provided. The system comprises processors and a memory storing instructions that, when executed by at least one processor among the processors, cause the system to perform operations comprising, at least, registering the application at a consumer registry service; receiving, in association with a client ...
Technologies for remote attestation
Intel Corporation
August 10, 2017 - N°20170230182

Technologies for remote attestation include a group member device to generate a signature of a message using a cryptographic key assigned to the group member device by a group manager and determine an authentication path that indicates a plurality of cryptographic hashes necessary to compute a group public key of a group associated with a plurality of group member devices. ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Computationally efficient transfer processing and auditing apparatuses, methods and systems
Fmr Llc
August 10, 2017 - N°20170228731

The computationally efficient transfer processing and auditing apparatuses, methods and systems (“cetpa”) transforms transaction record inputs via cetpa components into matrix and list tuple outputs for computationally efficient auditing. A blockchain transaction data auditing apparatus comprises a blockchain recordation component, a matrix conversion component, and a bloom filter component. The blockchain recordation component receives a plurality ...
Encrypted code execution
Intel Corporation
August 10, 2017 - N°20170228548

Embodiments of an invention for encrypted code execution are disclosed. In one embodiment, a processor includes a private key, a code decryptor, and an encryption unit. The code decryptor is to decrypt the encrypted code to generate decrypted code, the encrypted code encrypted with a public key corresponding to the private key. The execution unit is to execute the decrypted ...
Methods and systems for transmission of arbitrary data via bluetooth hfp audio connections with low ...
Nagravision S.a.
August 03, 2017 - N°20170223487

A wireless-communication device includes a user interface configured to receive audio signals; a cryptographic module configured to encrypt the audio signals into a binary data sequence; a generator module configured to: receive a bit pattern representative of the binary data sequence; and generate a byte sequence representative of the bit pattern by generating a byte that is greater than the ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Managing authenticators in a computer system
Ssh Communications Security Oyj
August 03, 2017 - N°20170222995

Certain embodiments provide means for managing automated access to computers, e. G., using ssh user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, kerberos credentials, and cryptographic keys. Certain embodiments provide for remediating legacy ssh key problems and for automating configuration of ssh keys, as well as for continuous monitoring.
Method for securing user data with drm keys
Apple Inc.
August 03, 2017 - N°20170222992

Some embodiments provide convenient auto-authentication for user data on a primary device, while still providing a significant level of security, by taking advantage of existing security and cryptographic measures used to communicate with a secondary device. The primary device of some embodiments encrypts the user data on the primary device using a cryptographic key based on a set of keys ...
Device, system, and method for processor-based data protection
Intel Corporation
August 03, 2017 - N°20170222988

A device, system, and method for providing processor-based data protection on a mobile computing device includes accessing data stored in memory with a central processing unit of the mobile computing device and determining that the accessed data is encrypted data based on a data included in one or more control registers of the central processing unit. If the data is ...
Key distribution in a distributed network environment
Cisco Technology, Inc.
August 03, 2017 - N°20170222981

A system including a controller and a pool of computing resources to run virtual machines are configured to automatically provision each virtual machine with unique cryptographic constructs. The controller receives a request to instantiate a virtual machine based on an image/template. The controller determines an authentication credential for a registration authority that the virtual machine will use. The controller ...
Secure crypto module including conductor on glass security layer
International Business Machines Corporation
August 03, 2017 - N°20170222816

A conductor on glass security layer may be located within a printed circuit board (pcb) of a crypto adapter card or within a daughter card upon the crypto adapter card. The conductor on glass security layer includes a glass dielectric layer that remains intact in the absence of point force loading and shatters when a point load punctures or otherwise ...
Systems and methods for managing digital identities
Cambridge Blockchain, Llc
August 03, 2017 - N°20170222814

Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: using a plurality of measurements taken from a user to generate an identifier for the user, the identifier comprising a cryptographic proof of the plurality of measurements; instantiating a digital identity representation associated with the identifier for the user, the digital identity representation ...
Reconstructable content objects
Cisco Technology, Inc.
August 03, 2017 - N°20170222812

One embodiment of the present invention provides a system for delivering a content piece over a network using a set of reconstructable objects. During operation, the system obtains a metadata file that includes a set of rules; generates the set of reconstructable objects for the content piece based on the set of rules included in the metadata file; cryptographically signs ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Communication device, cryptographic communication system, cryptographic communication method, and computer program product
Kabushiki Kaisha Toshiba
August 03, 2017 - N°20170222803

A communication device according to an embodiment is a communication device that communicates with another communication device using an encryption key shared through a quantum key distribution and includes a communication unit, an encrypting unit, a first checking unit, and a communication control unit. The communication unit performs communication of data with the another communication device. The encrypting unit encrypts ...
Cryptographic key distribution
Amazon Technologies, Inc.
August 03, 2017 - N°20170222802

An hsm management hub coordinates the distribution and synchronization of cryptographic material across a fleet of connected hardware security modules (“hsms”). Cryptographic material is exchanged between hsms in the fleet in a cryptographically protected format. In some examples, the cryptographic material is encrypted using a common fleet key maintained by the hsms in the fleet. In ...
Computationally efficient transfer processing and auditing apparatuses, methods and systems
Fmr Llc
August 03, 2017 - N°20170221052

The computationally efficient transfer processing, auditing, and search apparatuses, methods and systems (“socoact”) transforms smart contract request, crypto currency deposit request, crypto collateral deposit request, crypto currency transfer request, crypto collateral transfer request inputs via socoact components into transaction confirmation outputs. Also, socoact transforms transaction record inputs via socoact components into matrix and list tuple outputs ...
Information transaction infrastructure
Mastercard International Incorporated
August 03, 2017 - N°20170221022

A method of transferring information with verification from a first party to a second party using suitably programmed computing apparatus is described. Information from a first party private address to a first party public address. This information is then sent from the first party public address to a second party address. The information is also provided for public recordal on ...
Method and system for digital currency creation and marketing
Mastercard International Incorporated
August 03, 2017 - N°20170221021

A method and system which allow an actor/user to create new cryptocurrency, designed to motivate people to an active lifestyle in various fields by making certain activities or actions, which can be measured and verified using smartphones or other telecommunication devices. The method creates two kinds of universal cryptocurrency, namely: cryptocurrency/time, based on a time during which the ...
Access control for encrypted data in machine-readable identifiers
Wonderhealth, Llc
August 03, 2017 - N°20170220917

Disclosed are various embodiments for providing access control to the underlying data of a single machine-readable identifier when read by various reader devices. A client device may receive a first cryptographic key associated with a first device profile and a second cryptographic key associated with a second device profile. Data provided through an ingestion process is formatted into at least ...
Group based complete and incremental computer file backup system, process and apparatus
Hybir Inc.
August 03, 2017 - N°20170220820

The present invention is capable of determining the rights to a file based on providing a descriptor. The descriptor can be calculated using an algorithm, which may be cryptographic and/or non-cryptographic. The descriptor may further be based on the file contents, metadata of the file, other file data, or any combination thereof to uniquely identify the file in a ...
Loading