Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Cryptographic key exchange over an electrostatic channel
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180014186

Various embodiments relating to exchanging a cryptographic key between a display device and an input device via electrostatic communication are disclosed. In one embodiment, an interactive communication device includes one or more electrodes and a radio transceiver. The one or more electrodes may be excited to capacitively couple with one or more electrodes of a proximate communication device so as ...
Information processing apparatus, method of controlling the same, and storage medium
Canon Kabushiki Kaisha
January 11, 2018 - N°20180013766

The information processing apparatus stores a cryptographic module and a key that the cryptographic module generated. The information processing apparatus determines whether or not the stored key is a key that a cryptographic module for which integrity is not verified generated. If so, the information processing apparatus updates the key determined to be the key that the cryptographic module for ...
Password manipulation for secure account creation and verification through third-party servers
Airbnb, Inc.
January 11, 2018 - N°20180013748

A method and system for deterring attacks at potential breach points between servers and an account and login server for creating and subsequent verification of accounts. Various cryptographic primitives are used to manipulate passwords to generate verifiers. The verifiers are used with external hardware security modules (hsms) to eliminate hsms and intermediate steps between the hsm and login servers as ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Multiple cryptographic key generation for two-way communication
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180013559

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. Each of the communicating devices determines the information without communicating key information related to the encryption key with the other. Each device receives a setup signal sent by the other device. Each device samples the received signal, generates sampling results, ...
Cryptography method
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180013558

The embodiments provide cryptography that is performed in each of two communicating devices and is based on information known only to the devices. The information is determined in each of the devices at the time of communications. Each of the devices determines the information without communicating key information related to the encryption key with each other. Channel characteristic reciprocity between ...
Cryptography using rf power measurement
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180013553

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. The information may only be determined by the devices. Each device determines the information without communicating key information related to the encryption key with the other. Channel characteristic reciprocity between the devices allows creation of identical keys in each device. ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Computation of historical data
At&t Intellectual Property I, L.p.
January 11, 2018 - N°20180013547

Secure computation of enterprise data in a cloud is provided, by a third party, such that values and data manipulation processes are encrypted through use cryptographic processes that are secure. A method can comprise performing operations including receiving security data representing an attribute included in a log file, generating encoded attribute data as a function of the attribute, a hash ...
System and method for processing an online transaction request
The Toronto-dominion Bank
January 11, 2018 - N°20180012208

A computer server includes a transaction processor that is configured to receive from a pos terminal an incoming authorization request that includes an original numeric value, a token cryptogram and an identification number identifying an identity token; confirm that the token cryptogram was generated from the original numeric value and a cryptographic key associated with the token; determine primary and ...
Automated schedule systems and methods
The Toronto-dominion Bank
January 11, 2018 - N°20180012195

Automated matching, notification, and acceptance/rejection of appointment or opening in a calendar/schedule via network-based systems and methods, including application over social networks and website based connection between users and service providers. Notifications include offers of rewards and/or incentives, which are in the form of discounts, promotions, and/or a currency such as a cryptocurrency.
Secure operation apparatuses and methods therefor
Nxp B.v.
January 11, 2018 - N°20180012037

As may be implemented in accordance with one or more embodiments, and apparatus and/or method may involve a first circuit that initiates secure operations by interfacing with a user and providing operation trigger data that is signed cryptographically and secured from alteration, based on the interfacing. A second circuit, including a secure element, stores data secured from access by ...
Application code hiding apparatus by modifying code in memory and method of hiding application code ...
Soongsil University Research Consortium Techno-park
January 11, 2018 - N°20180011997

An application code hiding apparatus includes a secret code dividing part, a secret code caller generating part, a code analyzing part, a dummy code generating part, a code encrypting part, a code disposing part, a code decryptor generating part, a disposed code importer generating part, a code loader generating part, a memory inner code modifier generating part and a decrypted ...
Application-driven storage systems for a computing system
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180011801

Systems and methods that allow secure application-driven arbitrary compute in storage devices in a cloud-based computing system are provided. A computing system including a compute controller configured to: (1) provide access to host compute resources, and (2) operate in at least one of a first mode or a second mode is provided. The computing system may further include a storage controller configured ...
Method for key rotation
Duo Security, Inc.
January 04, 2018 - N°20180007025

A method for key rotation includes initiating key rotation for a user account of a multi-factor authentication platform enabling one-time password authentication using a first symmetric cryptographic key; generating, at an authenticating device, a second symmetric cryptographic key; transmitting, at the authenticating device, the second symmetric cryptographic key to the multi-factor authentication platform; configuring the multi-factor authentication platform and the ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Perimeter encryption
Sophos Limited
January 04, 2018 - N°20180007014

Encryption keys for an enterprise are stored at a perimeter device such as a gateway, and rules are applied at the network perimeter to control whether and how these keys are used for cryptographic processing of communications passing through the perimeter device. The encrypted status of communications, e. G. Whether and how files are encrypted with the encryption keys, may ...
Pufs from sensors and their calibration
Arizona Board Of Regents Acting For And On Behalf Of Northern Arizona University
January 04, 2018 - N°20180006830

Several methods may be used to exploit the natural physical variations of sensors, to generate cryptographic physically unclonable functions (puf) that may strengthen the cybersecurity of microelectronic systems. One method comprises extracting a stream of bits from the calibration table of each sensor to generate reference patterns, called puf challenges, which can be stored in secure servers. The authentication of ...
Secure communication of iot devices for vehicles
T-central, Inc.
January 04, 2018 - N°20180006829

Method for establishing secure communication between a plurality of iot devices in one or more vehicles include: provisioning the plurality of iot devices by providing a unique identification, a digital identity token and a cryptographic key to each of the plurality of iot devices; establishing a secure communication line between the plurality of iot devices by authenticating respective communication lines ...
Numeric pattern normalization for cryptographic signatures
Centurylink Intellectual Property Llc
January 04, 2018 - N°20180006824

A system for numeric pattern normalization for cryptographic signatures is provided. The system includes a resolving client, and an at least one signature server. The at least one signature server includes at least one processor and non-transitory computer readable media having encoded thereon computer software comprising a set of instructions executable by the at least one processor. The set of ...
Multi-hop secure content routing based on cryptographic partial blind signatures and embedded terms
Qualcomm Incorporated
January 04, 2018 - N°20180006823

At a transmitter node, a commitment value c is obtained as a function of a message m. The commitment value c and transmitter terms of use ta for the message m are then sent to a receiver node without disclosing the message m. A cryptographic receiver signature sb over the commitment value c and the transmitter terms of use ta ...
Token and cryptogram using transaction specific information
Visa International Service Association
January 04, 2018 - N°20180006821

Systems and methods for token processing are disclosed. An access device can provide access device data to a mobile communication device. The communication device generates a token request including the access device data and communication device data and sends the token request to a server computer. The server computer returns a token and a token cryptogram to the mobile communication ...
Controlling verification of key-value stores
Microsoft Technology Licensing, Llc
January 04, 2018 - N°20180006820

Deferred verification of the integrity of data operations over a set of data that is hosted at an untrusted module (um) is controlled. The controlling includes generating a request for a data operation on the set of data. The request includes an authentication portion. The request is sent to the um. A response to the request is received from the ...
Cryptographic key production from a physical unclonable function
Intrinsic Id B.v.
January 04, 2018 - N°20180006813

Some embodiments are directed to an electronic cryptographic device configured to determine a cryptographic key. The cryptographic device has a physically unclonable function, a debiasing unit, and a key reconstruction unit. The puf is configured to produce a first noisy bit string during an enrollment phase and a second noisy bit string during a reconstruction phase. The debiasing unit (120) is ...
Loading