Follow us on Twitter
twitter icon@FreshPatents


Crypto patents

      

This page is updated frequently with new Crypto-related patent applications.




 System and  interrogating a mobile communication terminal patent thumbnailSystem and interrogating a mobile communication terminal
Systems and methods to instruct a mobile device to switch from a first protocol to a second protocol after registering the device on a network associated with the first protocol. This may be done to obtain a cryptographic key used by the device.
Verint Systems Ltd.


 Providing forward secrecy in a terminating tls connection proxy patent thumbnailProviding forward secrecy in a terminating tls connection proxy
An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server.
Akamai Technologies, Inc.


 Method and system for asymmetric key derivation patent thumbnailMethod and system for asymmetric key derivation
A method for asymmetrical key derivation by a signing entity for a terminal including introducing identical cryptographic material into the signing entity and into the terminal; deriving in each case a private key from the cryptographic material in the signing entity and in the terminal; calculating in each case a public key from the private key in the signing entity and in the terminal; generating a signature and/or a signed public key in the signing entity; transferring the signature and/or the signed public key from the signing entity into the terminal; and appending the signature of the signing entity to the public key in the terminal.. .
Volkswagen Ag


 Airplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami) patent thumbnailAirplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami)
The present invention generally relates to one or more line replacement units (“lrus”) for an airplane. The lrus can include airline modifiable information (“ami”) that includes more than one public key certificates, wherein each of the more than one public key certificates uniquely identifies the airplane for ground communication based, at least in part, on a public key or a private key associated with the one or more public/private key pairs generated by a cryptographic key generator..
The Boeing Company


 Systems and methods for managing digital identities patent thumbnailSystems and methods for managing digital identities
Systems and methods for managing digital identities. In some embodiments, a method is provided, comprising acts of: using a plurality of measurements taken from a user to generate an identifier for the user, the identifier comprising a cryptographic proof of the plurality of measurements; instantiating a digital identity representation associated with the identifier for the user, the digital identity representation comprising program code that implements rules for attestation; generating an electronic signature over the digital identity representation; and publishing the digital identity representation and the electronic signature to a distributed ledger system..
Cambridge Blockchain, Llc


 System and  implementing a one-time-password using asymmetric cryptography patent thumbnailSystem and implementing a one-time-password using asymmetric cryptography
A system, apparatus, method, and machine readable medium are described for authentication with asymmetric cryptography. For example, a method in accordance with one embodiment comprises: generating a challenge at a server; encrypting the challenge at the server using a public encryption key; transmitting the encrypted challenge to a connected device having a first connection over a network with the server; providing the encrypted challenge from the connected device to a user device; decrypting the encrypted challenge using a private encryption key corresponding to the public encryption key to determine the challenge; converting the challenge to a converted challenge, the converted challenge having a different format than the original challenge; receiving the converted challenge at the connected device and providing the converted challenge from the connected device to the server; and validating the converted challenge at the server to authenticate the user..
Nok Nok Labs, Inc.


 Blockchain electronic voting system and method patent thumbnailBlockchain electronic voting system and method
We provide a block-chain electronic election system comprising: an election admin client configured to administer an election; a voting client configured to electronically provide data for voter eligibility and voter decisions for one or more contests in the election; a voter identifier server configured to confirm or deny voter eligibility for submitting the voter decisions in the election; a registrar server configured to employ an automated process for disassociating personal identification information provided by the voter client from a public voter key; a blinded token for use in a voter registration process; and a block chain database configured to store election contest data and the voter decisions on the election contests, the voter decisions are cryptographically signed with the public voter key disassociated from the personal identification information provided by the voter client.. .
Follow My Vote, Inc.


 Crypto currency chargeback system patent thumbnailCrypto currency chargeback system
Distributed crypto currency chargeback systems and methods include at least one system provider device receiving, through a network from a payer device associated with a payer, a chargeback report associated with a first transaction of a plurality of transactions performed using a distributed crypto currency, where the first transaction involves the payer and a payee. The at least one system provider device publishes the chargeback report in a chargeback ledger.
Paypal, Inc.


 Crypto multiple security asset creation and redemption platform patent thumbnailCrypto multiple security asset creation and redemption platform
An asset trading system utilizing a distributed ledger and configured to: when a creation request to create a digital fund token representing at least one share of a fund having a plurality of different assets (i) is received, (ii) is electronically signed with a private key associated with a first addressed account, and (iii) indicates a composition of the at least one share of the fund: place the plurality of different assets represented by the at least one share of the fund into an escrow account; create the digital fund token, wherein the digital fund token indicates the composition of the share of the fund; and record the creation of the digital fund token on a distributed ledger.. .
Medici Ventures, Inc.


 Methods and devices for conducting payment transactions patent thumbnailMethods and devices for conducting payment transactions
Methods and devices for of conducting a payment transaction between a mobile terminal and a payment terminal in communication with a payment backend system involve: (a) sending a unique mobile terminal identifier from the mobile terminal to the payment backend system; (b) returning a cryptogram from the payment backend system to the mobile terminal, wherein the cryptogram comprises a unique transaction identifier in encrypted form; (c) transforming the cryptogram into a proximity payment token such that the proximity payment token contains the unique transaction identifier in encrypted form and transmitting the proximity payment token to the payment terminal via a proximity communication channel; (d) forwarding a transaction record including the unique transaction identifier in encrypted form and the amount of the payment transaction from the payment terminal to the payment backend system; and (e) decrypting the unique transaction data identifier in encrypted form and processing the payment transaction.. .
Giesecke & Devrient Gmbh


Computationally efficient transfer processing and auditing apparatuses, methods and systems

The computationally efficient transfer processing, auditing, and search apparatuses, methods and systems (“socoact”) transforms smart contract request, crypto currency deposit request, crypto collateral deposit request, crypto currency transfer request, crypto collateral transfer request inputs via socoact components into transaction confirmation outputs. Also, socoact transforms transaction record inputs via socoact components into matrix and list tuple outputs for computationally efficient auditing.
Fmr Llc

Crypto currency chargeback system

Distributed crypto currency chargeback systems and methods include at least one system provider device receiving, through a network from a payer device associated with a payer, a chargeback report associated with a first transaction of a plurality of transactions performed using a distributed crypto currency, where the first transaction involves the payer and a payee. The at least one system provider device publishes the chargeback report in a chargeback ledger.
Paypal, Inc.

Vehicle system with vehicle report generation and methods for use therewith

Aspects of the subject disclosure may include, for example, a vehicle system including vehicle sensors that collect vehicle data corresponding to a condition in proximity to a vehicle of a user and a geographical location associated with the condition. A processor is configured to perform operations including generating a vehicle report based on the vehicle data; generating in accordance with a cryptocurrency protocol, a digital currency record that is unique to the vehicle report, wherein the digital currency record indicates a digital currency value associated with the vehicle report.
At&t Intellectual Property I, L.p.

Firmware verified boot

Methods and apparatus for verifying a boot process of a computing system are disclosed. An example computer-implemented method includes reading, by a computing system during a boot process, a header section of a read-write portion of firmware of the computing system.
Google Inc.

System and methods for secure firmware validation

An electronic device, such as a dynamic transaction card having an emv chip, that acts as a tpm having a memory, an applet, and a cryptographic coprocessor performs secure firmware and/or software updates, and performs firmware and/or software validation for firmware and/or software that is stored on the electronic device. Validation may compare a calculated checksum with a checksum stored in emv chip memory.
Capital One Services, Llc.

Storing and retrieving cryptographic keys from biometric data

Methods and apparatus, including computer program products, are provided securing information. In some example embodiments, there is provided a method, which may include receiving, at a user equipment, biometric data from a user of the user equipment; receiving, at the user equipment, sensitive data to be encoded and/or decoded; encoding, based on at least one feature detected in the biometric data, the sensitive data, when the user equipment is in a storage mode; and decoding, based on at least the at least one feature detected in the biometric data, the sensitive data, when the user equipment is in a read mode.
Nokia Technologies Oy

User equipment proximity requests authentication

A proximity request is handled within a cellular network, by communicating a map request from the proximity service function to an application server, in response to a first proximity request on behalf of a first user equipment. A map response is then communicated from the application server to the proximity service function, in response to the map request.
Vodafone Ip Licensing Limited

Splicing into an active tls session without a certificate or private key

An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active tls session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point.
Akamai Technologies, Inc.

Security processing engines, circuits and systems and adaptive processes and other processes

An electronic circuit (200) includes one or more programmable control-plane engines (410, 460) operable to process packet header information and form at least one command, one or more programmable data-plane engines (310, 320, 370) selectively operable for at least one of a plurality of cryptographic processes selectable in response to the at least one command, and a programmable host processor (100) coupled to such a data-plane engine (310) and such a control-plane engine (410). Other processors, circuits, devices and systems and processes for their operation and manufacture are disclosed..
Texas Instruments Incorporated

Method and error correcting code based public key encryption schemes

The main difference between the proposed cryptosystem and known variants of the mceliece cryptosystem consists in the way the private generator matrix is disguised into the public one by inserting and mixing random columns within the private generator matrix.. .

Refresh of shared cryptographic keys

One of n≧2 servers, connectable via a network, implements a cryptographic protocol using a secret key k which is shared between the n servers, and includes first and second server compartments. The first is connectable to the network, adapted to implement the cryptographic protocol, and stores a current key share of the secret key k.
International Business Machines Corporation

Use of blockchain based distributed consensus control

A system for the cryptographically-secure, autonomous control of devices comprising, connected to or remotely operating devices in an electrically powered network and the transaction of the benefits, costs or value created by or transacted through the devices in this electrically powered network.. .
Transactive Grid Inc.

Electronic payment validation and authorization system

A system for performing electronic payment validation and authorization wherein a user of an electronic device transmits transaction data to an electronic payment validation and authorization system. The same user of the electronic device may nearly simultaneously transmit a cryptographic hash of transaction data to a merchant who uses a payment processing system to process the transactions.
Aerius, Inc.

Trusted computing

A trusted computing device (tcd) includes an isolated environment, host interface, secure interface, and program instructions. The environment includes an isolated environment processor (iep), memory (secure and non-secure partition), and an auxiliary processor (ap).
Google Inc.

Security and data privacy for lighting sensory networks

In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in communication with a service data platform over a network. The method includes encrypting the sensor data using a certified public key associated with a customer key-pair, the sensor data representing the customer data associated with sensitive identification information.
Sensity Systems Inc.

Encrypted message communication

Computer-implemented methods are provided for communicating message data from a sender computer to a receiver computer via a network. The sender computer encrypts the message data in dependence on a cryptographic key to produce a ciphertext, and establishes an access password for the ciphertext with a host computer connected to the network.
International Business Machines Corporation

Systems and methods for pkcs #8 private file key support

A communications platform may provide asymmetric cryptography using rsa and/or dsa algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (pkcs).
Unisys Corporation

Small form-factor cryptographic expansion device

A cryptographic expansion device that can be attached to a communication component of a communication device to enable the communication device to perform cryptographic operations on communications sent to and from the communication device is described. The cryptographic expansion device can be a small-form factor cryptographic expansion device that can be used with a small-form factor communication component such as a micro-sim (subscriber identity module) card.

Automatically authenticating a host key via a dynamically generated certificate using an embedded cryptographic processor

A network device initiates a transmission control protocol (tcp) connection to establish a tcp session with a management device, and performs, via the tcp session, a secure protocol client/server role reversal for the management device. The network device receives, from the management device, initiation of a secure connection over the tcp session in accordance with a secure protocol, and provides, to the management device, a trusted certificate with an embedded host key that is dynamically generated using a cryptographic processor of the network device, based on the initiation of the secure connection.
Juniper Networks, Inc.

Authentication apparatus based on public key cryptosystem, mobile device having the same and authentication method

An authentication apparatus, included in a device supporting a network communication, includes a certificate handler that receives a certificate of an opponent and parses or verifies the certificate of the opponent. Cryptographic primitives receive an authentication request of the opponent, generate a random number in response to the authentication request, generate a challenge corresponding to the random number, and verify a response of the opponent corresponding to the challenge.
Samsung Electronics Co., Ltd.

Device and discontinuous hashing of digital data

A cryptographic hash value is computed in a hardware processing unit of an apparatus. The cryptographic hash value is computed iteratively processing blocks of data in a predetermined order by, for each block: obtaining at least one intermediate value for the block by applying a function to the block, computing a value of a weight function, and updating at least one hash variable with a corresponding intermediate value only if the value of a weight function is equal to at least one predetermined value.
Thomson Licensing

Using everyday objects as cryptographic keys

This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value.
International Business Machines Corporation

Apparatus and stablizing quantum cryptography system

Disclosed is a method for stabilizing a quantum cryptography system, which includes: determining whether the quantum cryptography system operates in a stabilized state, on the basis of a bit error rate or a key rate of the quantum cryptography system; and readjusting an arrival time of a gate pulse or a laser operation time so that an arrival time of a single photon for a photon detector is aligned with the arrival time of the gate pulse, when the quantum cryptography system does not operate in a stabilized state. Here, the quantum cryptography system may be a two-way quantum cryptography system..
Korea Institute Of Science And Technology

Differential power analysis - resistant cryptographic processing

Information leaked from smart cards and other tamper resistant cryptographic devices can be statistically analyzed to determine keys or other secret data. A data collection and analysis system is configured with an analog-to-digital converter connected to measure the device's consumption of electrical power, or some other property of the target device, that varies during the device's processing.
Cryptography Reserach, Inc.

System and method to record encrypted content with access conditions

A secure detachable utility monitoring device is disclosed, to be appended to a utility metering apparatus for controlling at least one utility usage consumption. A detachable metering monitoring device of at least one embodiment includes: a usage reading interface to acquire a utility consumption value metered by the utility meter; a first memory to store at least a unique identifier id and a personal key, both pertaining to the device; a crypto processor to generate a cryptogram from information data comprising at least the utility consumption value, the cryptogram being encrypted with the personal key; a message generator to generate an information message including at least the cryptogram and the unique identifier id; and a communication network interface including a sending unit to send the information message to a remote management center..
Nagravision S.a.

Method of protecting secret data when used in a cryptographic algorithm

In a general aspect, a method of generating a protected implementation of an algorithm includes: expanding an original source code implementing the algorithm into a single set of real operations; combining each real operation using real data with the real data it uses, to obtain a combination represented in a way which uses an actual real data fragment in a form different from an original form; producing a set of duplicated and mutated decoy operations representing an alternative implementation of the algorithm, applied to decoy data; combining the set of decoy operations with the set of real operations including the combinations, to obtain an implementation where the decoy operations interact with the real operations and the real data processed by the real operations, such that a real data flow of in the implementation is difficult to analyze; and transforming the implementation into a resulting code that can be executed.. .
Metaforic Limited

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.

Event-based securing bios in a trusted computing system during execution

An apparatus is provided for protecting a basic input/output system (bios) in a computing system. The apparatus includes a bios read only memory (rom), an event detector, and a tamper detector.
Via Technologies, Inc.



Crypto topics:
  • Digital Signature
  • Hash Function
  • Private Key
  • Public Key
  • Computer Program
  • Certificate
  • Coordinates
  • Camera Module
  • Executable
  • Network Device
  • Access Rights
  • Cell Phone
  • Network Server
  • Hypertext Transfer Protocol
  • Virtual Private Network


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Crypto for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Crypto with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4367

    file did exist - 2283

    2 - 1 - 53