Follow us on Twitter
twitter icon@FreshPatents


Crypto patents

      

This page is updated frequently with new Crypto-related patent applications.




new patent Provisioning systems for installing credentials
Certain embodiments provide means for managing automated access to computers, e.g., using ssh user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, kerberos credentials, and cryptographic keys.
Ssh Communications Security Oyj


new patent Provisioning new virtual machine with credentials
Certain embodiments provide means for managing automated access to computers, e.g., using ssh user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, kerberos credentials, and cryptographic keys.
Ssh Communications Security Oyj


new patent System and wireless data protection
Disclosed herein are systems, methods, and non-transitory computer-readable storage media for wireless data protection utilizing cryptographic key management on a primary device and a backup device. A system encrypts a file with a file key and encrypts the file key twice, resulting in two encrypted file keys.
Apple Inc.


new patent Device key security
A device, method or server having memory configured to store cryptographic material required to execute one or more device functions. A communications interface for communicating over a network.
Vodafone Ip Licensing Limited


new patent Method and quantum cryptography
Methods and apparatus for use in quantum cryptographic applications are disclosed. An optical signal having a first wavelength is encoded for quantum cryptography at a stage where the optical signal is on at least two signal paths.
Nokia Technologies Oy


new patent Authentication server-based payments
A method of performing a payment transaction employing a two-factor authentication mechanism. The method includes engaging in cryptographic processing with a cryptographic function having a secret key encoded therein.
Mastercard International Incorporated


new patent Device, method, and system of detecting multiple users accessing the same account
Devices, systems, and methods of detecting user identity, differentiating between users of a computerized service, and detecting a possible attacker. The methods include monitoring of user-side input-unit interactions, in general and in response to an interference introduced to user-interface elements.
Biocatch Ltd.


Communication device having an identifier
A device for communicating over a network, comprising a radio subsystem for acquiring a network identifier from a signal representative of a wireless network and an identifier subsystem for assigning the device an identifier derived from said acquired network identifier. The identifier subsystem is preferably configured to use the acquired network identifier as one of plural inputs to a cryptographic function whose output is the assigned identifier..
Avocadoninja Bv


Automated access, key, certificate, and credential management
Certain embodiments provide means for managing automated access to computers, e.g., using ssh user keys and other kinds of trust relationships. Certain embodiments also provide for managing certificates, kerberos credentials, and cryptographic keys.
Ssh Communications Security Oyj


Multi-user strong authentication token
A strong authentication token supporting multiple instances associated with different users and protected by a user identity verification mechanism is disclosed. A multi-instance strong authentication token may be adapted to generate dynamic credentials using cryptographic secrets that are specific to a particular instance stored in the token.
Vasco Data Security, Inc.


System and associated software for providing advanced data protections in a defense-in-depth system by integrating multi-factor authentication with cryptographic offloading

The advanced data protection system is implemented by distributing encrypted data across multiple isolated computing systems and using multi-factor authentication to access remote, protected decryption material. Architectural components include: client application software reading/writing from/to a client data store executing on a client host computer, client application plug-ins communicating with external authentication devices, server application software reading/write data from/to a server data store executing on a host computer which is physically or virtually isolated from the client host computer, authentication devices, components, or systems integrated with or connected to the client computer and exposing programmatic interfaces to client application software, and secure networking components executing on both hosts that provide secure data exchange.
Definitive Data Security, Inc.

A solution for generating and issuing security codes with guaranteed issuer authenticity and origin

A method of generating, emitting and validating a security code, in qr code or data matrix formats, which may be printed in physical media, displayed in electronic display or stored in electronic chips through technologies of radio-frequency identification (rfid) or near field communication (nfc). This code is generated using encryption, authenticated cryptography and digital identities or certificates emitted in the standard of public key infrastructure (pki) by a reliable certification authority, providing to validate the code, with (online) or without connectivity (offline) to a data network, by one application installed, by a reading process, cryptographic validation and decryption, allowing to open the security code content.
Rd2buzz Brasil Consultoria E Internet Ltda.

Systems and methods for trading, clearing and settling securities transactions using blockchain technology

The present invention relates to a securities trading system that utilizes a distributed blockchain ledger to conduct security transactions. Users are provided with cryptographic wallets that enable the users to access a peer-to-peer network of computing nodes on which the distributed blockchain ledger is managed.
Ouisa, Llc

Cryptographic security for mobile payments

A base key that is stored at a mobile device may be received. A first dynamic key that is based on the base key may be generated.
Cryptography Research, Inc.

Method, device and non-transitory computer-readable medium for cryptographic computation

A method, a device and a non-transitory computer-readable medium for cryptographic computation are provided. The method for computation includes: receiving, in a montgomery multiplier circuit having a predefined block size, a pair of operands a and b and a modulus m for computation of a montgomery product of a and b mod m; specifying a number n of blocks of the predefined block size to be used in the computation; computing a blinded modulus m′ as a multiple of the modulus m by a random factor r, m′=r*m, while selecting r so that the length of m′ is less than n times the block size by at least two bits; and operating the montgomery multiplier circuit to compute and output the montgomery product of a and b mod m′..
Winbond Electronics Corp.

Entropy source with magneto-resistive element for random number generator

An entropy source and a random number (rn) generator are disclosed. In one aspect, a low-energy entropy source includes a magneto-resistive (mr) element and a sensing circuit.
Qualcomm Incorporated

Data encryption service

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Key export techniques

A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material.
Amazon Technologies, Inc.

Systems and methods for authentication based on physically unclonable functions

Presented are systems, devices, and methods for reliably authenticating asymmetric cryptography-based ics based on physically unclonable functions (pufs) that are immune to reverse engineering. Various embodiments of the invention enhance the level of security in ic architectures without the need to connect to a remote certification authority, thereby, eliminating shortfalls associated with online authentication.
Maxim Integrated Products, Inc.

Systems and methods for distributing and securing data

A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares.
Security First Corp.

Devices and methods for facilitating generation of cryptographic keys from a biometric

Electronic devices are adapted to generate cryptographic keys from one or more biometrics. According to one examples, an electronic device can obtain a non-encoded bit string associated with biometric information for an individual.
Qualcomm Incorporated

Optical cryptography for high speed coherent systems

A pseudo-random cipher stream is used to band-spread an optical carrier signal with coded data. A legitimate receiver uses an agreed-upon key to modulate its local oscillator and a resulting beat signal uncovers the band-spread signal.
Massachusetts Institute Of Technology

Data encryption service and customized encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Monitoring and alert services and data encryption management

A centralized framework for managing the data encryption of resources is disclosed. A data encryption service is disclosed that provides various services related to the management of the data encryption of resources.
Oracle International Corporation

Reducing re-association time for sta connected to ap

A method and apparatus for re-associating a station (sta) to an access point (ap). The sta sends a re-association request to the ap to initiate a re-association process with the ap.
Qualcomm Incorporated

Host card emulation systems and methods

A system is configured for detecting a point of sale, receiving a personal identification number (pin), generating a pin based key using a message digest of the pin, decrypting a data encryption key (dek) using the pin based key, and generating a dek based dynamic key using the pin based key. The system may also decrypt a session key using the dek based dynamic key, generate a cryptogram from the session key, and send the cryptogram to the point of sale..
American Express Travel Related Services Company, Inc.

Tokenization using multiple reversible transformations

Technologies for tokenizing data including a computing device to extract plaintext data from an input file to be tokenized. The computing device performs data domain-specific format-preserving encryption on the extracted plaintext data based on a first cryptographic key to generate encrypted data and replaces one or more portions of the encrypted data with corresponding portions of alternative data based on a mapping table that maps encrypted data to alternative data.
Intel Corporation

Binding a trusted input session to a trusted output session

According to an embodiment provided herein, there is provided a system that binds a trusted output session to a trusted input session. The system includes a processor to execute an enclave application in an architecturally protected memory.
Intel Corporation

Numeric pattern normalization for cryptographic signatures

A system for numeric pattern normalization for cryptographic signatures is provided. The system includes a resolving client, and an at least one signature server.
Centurylink Intellectual Property Llc

Keyed-hash message authentication code processors, methods, systems, and instructions

A processor of an aspect includes a decode unit to decode a keyed-hash message authentication code instruction. The keyed-hash message authentication code instruction is to indicate a message, to indicate at least one value that is to represent at least one of key information and key indication information, and to indicate a destination storage location.
Intel Corporation

System and hash-based data stream authentication

An authentication system and a method of creating a secure check value used by the system to verify the integrity and authenticity of data. The authentication system comprises one or more processors, data stores, and network interfaces that can communicate among themselves and with other devices.

Skc-jju256 encryption using knights tour solutions as the main key to create a cryptosystem

The solutions of open knight's tours identified in the galois's field (gf) are used to encrypt any volume of data. The solution meaning all moves of the knight's tour which continues to link the next active node bringing about a knight's tour solution within any specified scope of gf elements.

System, performing cryptographic operations in a trusted execution environment

In one embodiment, an apparatus includes a calculation logic to receive a plurality of wait certificates, each associated with a validated block of transactions of a distributed ledger system, and to generate a local mean value based thereon; a timer generation logic to generate a wait time for a proof of wait associated with a first block of transactions of the distributed ledger system based at least in part on the local mean value; a timer logic to identify when the wait period has expired; and a certificate generation logic to generate a wait certificate for the first block of transactions responsive to expiration of the wait period, the wait certificate to validate the first block of transactions. Other embodiments are described and claimed..
Intel Corporation

Systems and methods for in-application and in-browser purchases

A system may receive a transaction request from a user device, and request an in-app cryptogram from a network software development kit (sdk) on the user device. The in-app cryptogram may include an unpredictable number, an application transaction counter (atc), and a card verification result (cvr), and the atc may be extracted from a limited use payment credential (lupc).
American Express Travel Related Services Company, Inc.

Method of generating a bank transaction request for a mobile terminal having a secure module

The invention provides a method of generating a bank transaction request and a mobile payment terminal hosting a payment application using a secure token for the transaction request and including a secure module. The method comprises the payment application executing a payment protocol with a trader application in order to generate the transaction request, and the payment application requesting an authorization cryptogram from an encryption application hosted in the secure module for verifying authorization of the transaction request in compliance with the payment protocol.
Oberthur Technologies Of America Corp.

Cryptographic assurances of data integrity for data crossing trust boundaries

A data integrity system generates a transaction signature associated with a transaction based on transaction data received from a data producer. The transaction signature is unique to the transaction and is generated by applying a hash function to the transaction data.
Peernova, Inc.

Goal-oriented, socially-connected, task-based, incentivized to-do list application system and method

A system may provide a socially connected application for managing a list of tasks, assignable by one or more assignors to be performed by one or more assignees. The method may provide a multi-platform application, including a method when executed on a processor include receiving a plurality of tasks to be performed, tracking completion, and tracking points associated with successful completion.
Qwest.me, Llc

Protecting communications with hardware accelerators for increased workflow security

To protect customer data and provide increased workflow security for processing requested by a customer, a secure communicational channel can be established between a customer and one or more hardware accelerators such that even processes executing on a host computing device hosting such hardware accelerators are excluded from the secure communicational channel. An encrypted bitstream is provided to hardware accelerators and the hardware accelerators obtain therefrom cryptographic information supporting the secure communicational channel with the customer.
Microsoft Technology Licensing, Llc

Handshake offload

Cryptographically protected communications sessions are established using a distributed process. A server proxies handshake messages to another computer system that negotiates a cryptographically protected communications session with the client.
Amazon Technologies, Inc.

Load balancing with handshake offload

Cryptographically protected communications sessions are established using a distributed process. A load balancer proxies handshake messages to a first computer system that negotiates a cryptographically protected communications session with the client.
Amazon Technologies, Inc.

Communication device, communication system, communication method, and computer program product

A first determining unit determines a period of time during which there is possibility of wiretapping of data present in a data communication channel connected to another communication device. A second determining unit determines, with a length of the period of time as unit of time, size of a cryptographic key used for encrypting data to be transmitted to the other communication device via the data communication channel during each unit of time.
Kabushiki Kaisha Toshiba



Crypto topics:
  • Digital Signature
  • Hash Function
  • Private Key
  • Public Key
  • Computer Program
  • Certificate
  • Coordinates
  • Camera Module
  • Executable
  • Network Device
  • Access Rights
  • Cell Phone
  • Network Server
  • Hypertext Transfer Protocol
  • Virtual Private Network


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Crypto for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Crypto with additional patents listed. Browse our RSS directory or Search for other possible listings.


    1.1603

    file did exist - 2201

    1 - 1 - 51