Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Wwan-wlan aggregation security
Qualcomm Incorporated
September 14, 2017 - N°20170265069

One feature pertains to a method for secure wireless communication at an apparatus of a network. The method includes receiving a user equipment identifier identifying a user equipment and a cryptographic key from a wireless wide area network node, and using the cryptographic key as a pairwise master key (pmk). A pmk identifier (pkmid) is generated based on the pmk ...
Cryptographic key generation and distribution
Callware Technologies, Inc.
September 14, 2017 - N°20170264430

Methods, apparatuses, systems, and program products are disclosed for cryptographic key generation and distribution. A method includes generating a cryptographic key that may be divided into a plurality of key segments such that the key is re-constructed by combining each of the plurality of key segments. A method includes assigning each of a plurality of users to one or more ...
Network payment tokenization for processing payment transactions
Facebook, Inc.
September 14, 2017 - N°20170262842

The present disclosure relates to systems, methods, and devices for network payment tokenization for processing payment transactions. In particular, the message system allows a consumer to initiate a payment transaction with a merchant. For example, one or more implementations involve identifying a payment authorization number associated with a user account and sending a request for a payment token to a ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System, apparatus and method for license key permutation
Iii Holdings 12, Llc
September 14, 2017 - N°20170262643

A system and method of dynamically altering the encoding, structure or other attribute of a cryptographic key, typically a license activation key, to render useless keys that have been created by illegal key generation “cracks”. An encoding/decoding engine provides a plurality of key obfuscation algorithms that may alter the structure, encoding or any other attribute ...
Method and apparatus for triggering machine type communications applications
Interdigital Patent Holdings, Inc.
September 07, 2017 - N°20170257843

A method and apparatus for machine type communication (mtc) authentication and triggering may be performed by an mtc interworking function (mtc-iwf). On a condition an internet protocol (ip) connection does not exist between a services capability server (scs) and an mtc device, a device trigger message may be received by the mtc device over a tsp interface. The device trigger ...
Cryptographic hash generation system
Securerf Corporation
September 07, 2017 - N°20170257218

A first module divides a string into a number of blocks. A second module associates the blocks with monoid elements in a list of first monoid elements to produce second monoid elements. A third module applies a first function to an initial monoid element and a first of the second monoid elements producing a first calculated monoid element and evaluates ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Cryptographic apparatuses and methods for encrypting and decrypting data using automata
Pannon Szoftver Kft.
September 07, 2017 - N°20170257212

The invention is, firstly, a cryptographic apparatus for encrypting unencrypted data, comprising an input module for inputting the unencrypted data and an output module for outputting encrypted data, and a key automaton (44) adapted for converting the unencrypted data into the encrypted data, and the key automaton (44) is an composition of automata said composition of automata having a set of states ...
System and method for one-time chinese-remainder-theorem exponentiation for cryptographic algorythms
Gemalto Sa
September 07, 2017 - N°20170257211

A system, method and computer-readable storage medium with instructions for protecting an electronic device against fault attack. The technology includes operating the electronic device to determine two half-size exponents, dp and dq, from the exponent d; to split the base m into two sub-bases mp and mq determined from the base m; and to iteratively compute a decryption result s ...
Exponent splitting for cryptographic operations
Cryptography Research, Inc.
September 07, 2017 - N°20170257210

A first share value and a second share value may be received. A combination of the first share value and the second share value may correspond to an exponent value. The value of a first register is updated using a first equation that is based on the first and second share values and the value of a second register is ...
Systems and methods for providing block chain state proofs for prediction market resolution
Forecast Foundation Ou
September 07, 2017 - N°20170255950

An outcome reported by a first prediction market may be determined. A state root hash from a given block in a block chain created during or after a resolution process of the first prediction market may be obtained. A proof that the value of an outcome obtained from the block chain is the same as reported by the first prediction ...
Systems and methods for domain restriction with remote authentication
Forecast Foundation Ou
September 07, 2017 - N°20170255932

A process for combining domain restriction and remote authentication may include receiving a token from a plug-in application to conduct a transaction associated with a user of a communicating device. The process may include sending an authentication request to a remote access control sever to authenticate the user, and receiving, from the remote access control server, an authentication tracking value ...
Systems and methods for media codecs and containers
1usf, Inc.
September 07, 2017 - N°20170255912

Systems and methods for enabling and enforcing cryptocurrency transactions associated with at least a portion of data are provided. Systems and methods may include a cryptocurrency transaction service, the cryptocurrency transaction service including one or more transaction servers and one or more ledger processing devices. At least one streaming server configured to associate at least a portion of data with ...
Method for communicating in a network comprising a virtual network , and a communication node comprising ...
Philips Lightings Holding B.v.
September 07, 2017 - N°20170255785

The invention relates to a method of a communication node communicating in a network comprising a plurality of nodes, said nodes belonging to at least one virtual network, wherein the method comprises the communication node identifying whether a first data packet belongs to said virtual network based on at least one of:—a cryptographic key used for the data ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Instructions and logic to provide simd sm3 cryptographic hashing functionality
Lntel Corporation
September 07, 2017 - N°20170255469

Instructions and logic provide simd sm3 cryptographic hashing functionality. Some embodiments include a processor comprising: a decoder to decode instructions for a simd sm3 message expansion, specifying first and second source data operand sets, and an expansion extent. Processor execution units, responsive to the instruction, perform a number of sm3 message expansions, from the first and second source data operand ...
Communication processing system, processing device, and non-transitory recording medium for computer readable program
Konica Minolta, Inc.
September 07, 2017 - N°20170255423

The first processing device includes a first communication unit for performing cryptographic communication and plaintext communication, a determination portion for determining whether to set the cryptographic communication, and a communication unit controller. The second processing device includes a second communication unit for performing the cryptographic communication and the plaintext communication with the first communication unit. The second communication unit includes ...
System and method for shared parameter-level data
Konica Minolta, Inc.
August 31, 2017 - N°20170251024

A computationally implemented method includes, but is not limited to: configuring a centrally administered data template including one or more data parameters, each of the one or more data parameters configured to be exchanged between one or more remote computing environments; assigning access permissions for each of the one or more data parameters to enable one or more requestors to ...
Systems and methods for certification of data units and/or certification verification
Stampery Inc.
August 31, 2017 - N°20170250815

In some implementations, a data unit may be hashed to generate a hash. A cryptographic structure, such as a merkle tree or other cryptographic structure, maybe generated based on the hash and published on a block chain or distributed ledger. A proof associated with the data unit may be provided. The proof may allow for independent verification that the data ...
Device provisioning service
Stampery Inc.
August 31, 2017 - N°20170250814

A computing device is provisioned to be remotely managed by a current owner. The device has an initial cryptographic basis of trust, and an owner identifier that facilitates establishment of communication with the current owner of the device. The ownership may change one or more times while the device may remain inoperative. Later, the device receives a transfer-of-ownership indication, which ...
Cryptographic key storage in a dispersed storage network
International Business Machines Corporation
August 31, 2017 - N°20170250809

Methods for use in a storage unit of a dispersed storage network (dsn) to securely store cryptographic key information. In various examples, the storage unit receives a slice access request relating to a key slice generated by performing a dispersed storage error encoding function on an encryption key. When the slice access request includes a request to store the key ...
Methods and resources for generating secure communications
Arm Ip Limited
August 31, 2017 - N°20170250806

A method of generating wireless communications from a transmit-only device, the method comprising: generating, at the transmit-only device, a first current session key; generating, at the transmit-only device, operational data; generating, at the transmit-only device, crypto-data by performing a cryptographic operation on the operational data using the first current session key; transmitting, from the transmit-only device, a first identifier to ...
Reconfigurable free-space quantum cryptography system
Duke University
August 31, 2017 - N°20170250805

A system, and methods, for transmitting encrypted information as a quantum transmission between a first node and a second node, or among more than two nodes. Each node is characterized by an instantaneous spatial position, and the instantaneous spatial position of the second node is repositionable within a frame of reference associated with the first node. A hovering drone is ...
Loading