Images List Premium Download Classic

Private Key

Private Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method and system of user authentication and end to end encryption using device synchronization
November 09, 2017 - N°20170325089

In one aspect, a computerized method for implementing user authentication using, device synchronization to match that includes the step of accessing a web page. The web page includes an agent. The computerized method includes the step of loading the agent in the background. The computerized method, includes the step of, generating, with the agent, an agent-generated token in background. The ...
Autonomous key update mechanism with blacklisting of compromised nodes for mesh networks
Freescale Semiconductor, Inc.
November 09, 2017 - N°20170324716

Various embodiments described herein relate to network key manager which is configured to manage keys in nodes in the network, wherein the network key manager including a memory configured to store an update data structure; a processor configured to: determine which nodes are blacklisted; generate the update data structure of volatile private keys for each node that is not blacklisted, ...
Method for establishing, securing and transferring computer readable information using peer-to-peer public and private key ...
Freescale Semiconductor, Inc.
November 09, 2017 - N°20170324711

Establishing file space requires that the owner links it to a centralized or decentralized peer-to-peer cryptographic block chain protocol. This secures and locks files for subsequent confirmation and transfer. Confirmation and transfer of the file is processed with a cryptographic hash function of crypto currency block chain process. The system and method requires that the transferee obtain the file using ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure application attachment
Avaya Inc.
November 09, 2017 - N°20170324561

To secure an application, a request to establish a communication session with a client is received from the application, at a server. The server sends the request to establish the communication session to the client. The request to establish the communication session generates a request for a user to approve the application. If the request is approved, a client token ...
Public key cryptosystem based on partitioning of galois field elements
Pq Solutions Limited
November 09, 2017 - N°20170324554

A post-quantum, public key cryptosystem is described which is polynomial based and where the private key polynomial has coefficients from a sub-set of galois field elements and plain text message polynomials have coefficients from a second sub-set of galois field elements. The public key polynomial is constructed using the inverse of the private key polynomial and a randomly chosen polynomial ...
Shared secret data production system
Securerf Corporation
November 09, 2017 - N°20170324548

Systems and methods for producing shared secret data are generally described. A first device may receive a public key from a second device. The public key may be based on a first secret element. The first device may generate a first ephemeral private key based on a second secret element, and may generate a second ephemeral private key based on ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Storage device tampering detection
Seagate Technology Llc
November 09, 2017 - N°20170323121

Apparatus (400, 500) and method (200, 220, 240, 260, 280, 300) for detecting unauthorized tampering with a data storage device (100, 110, 140, 520). In some embodiments, the data storage device has a housing (112, 142) and a memory (192) supported by the housing. A first identifier value (202a, 222a, 242a, 262a, 282a, 306a) is stored on an external surface of the housing and a second identifier value (202b, 222b, 242b, 262b, 282b, 306b) is ...
Methods and systems of providing verification of the identity of a digital entity using a ...
Seagate Technology Llc
November 02, 2017 - N°20170317997

Methods and systems of providing verification of the identity of a digital entity are provided, including receiving information and a public key of the digital entity, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address, the centralized or distributed ledger providing a record of transactions; deriving ...
Apparatus and method for managing virtual subscriber indentity module
Seagate Technology Llc
November 02, 2017 - N°20170317990

An electronic device is provided. The electronic device includes at least one processor that is configured to execute a first application in an ree, to execute a second application in a tee, and to execute an agent that performs data transmission between the first application and the second application, a communication circuit configured to communicate with a server, and a ...
Methods and systems of providing verification of information using a centralized or distributed ledger
Seagate Technology Llc
November 02, 2017 - N°20170317834

A method and system of providing verification of information of a user relating to an attestation transaction is provided, and includes sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction stored within a centralized or distributed ledger at an attestation address; receiving at a processor associated with a verifier ...
Systems and methods for enhancing confidentiality via logic gate encryption
Seagate Technology Llc
November 02, 2017 - N°20170317677

Presented are systems and methods that allow hardware designers to protect valuable ip and information in the hardware domain in order to increase overall system security. In various embodiments of the invention this is accomplished by configuring logic gates of existing logic circuitry based on a key input. In certain embodiments, a logic function provides results that are dependent not ...
Methods and systems of executing a business transaction from a commercial website using a centralized ...
Seagate Technology Llc
November 02, 2017 - N°20170316409

Methods and systems of executing a business transaction from a commercial website are provided, including sending a request for information of the user, wherein the information has been previously attested to in an attestation transaction; receiving the information of the user; sending a cryptographic challenge nonce; receiving the cryptographic challenge nonce signed by the user's private key; verifying user identity ...
Internet of things datapoint engine
Adobe Systems Incorporated
October 26, 2017 - N°20170310645

Techniques allow owners of internet of things (iot) devices to provide specific access to data from their iot devices to requesters of data. A request for data from one or more iot devices is received from one or more requesters, and the request is provided to the owner of the one or more iot devices. An indication of acceptance by ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Data aggregation/analysis system and method therefor
Hitachi, Ltd.
October 26, 2017 - N°20170308580

This data aggregation/analysis system includes a user terminal and a database server. The user terminal comprises, a private key generation unit, an encrypted tabulated data generation unit which encrypts cells of tabulated data, an encrypted analysis query generation unit which generates an encrypted analysis query by encrypting item names of an analysis subject using a private key, and a ...
Autonomous coordination of resources amongst robots
Invia Robotics, Inc.
October 26, 2017 - N°20170308070

A synchronization primitive provides robots with locks, monitors, semaphores, or other mechanisms for reserving temporary access to a shared limited set of resources required by the robots in performing different tasks. Through non-conflicting establishment of the synchronization primitives across the set of resources, robots can prioritize the order with which assigned tasks are completed and minimize wait times for resources ...
Identity authentication method and apparatus
Invia Robotics, Inc.
October 19, 2017 - N°20170302646

Embodiments of the present invention disclose an identity authentication method and apparatus. The nfv system includes a vnf including a first virtual network function component vnfc and a second vnfc. The method includes: generating a public key and a private key of the first vnfc and a public key and a private key of the second vnfc; writing or sending ...
Device specific cryptographic content protection
Invia Robotics, Inc.
October 19, 2017 - N°20170302456

Techniques to facilitate protecting control data used in an industrial automation environment are disclosed herein. In at least one implementation, an encryption key pair is generated for an industrial controller, wherein the encryption key pair comprises a public key and a private key. The private key is stored within a secure storage system of the industrial controller. Controller program content ...
Identity management service using a blockchain providing certifying transactions between devices
Invia Robotics, Inc.
October 19, 2017 - N°20170302450

Logic on a first remote device receives a first transaction number and personal data transmitted from a second remote device. The first transaction number was received from a distributed public database in response to a transmission, from the second remote device, of a signed hash value and a first public key associated with a first private key on the second ...
Power management and security for wireless modules in "machine-to-machine" communications
Invia Robotics, Inc.
October 19, 2017 - N°20170302447

Methods and systems are provided for power management and security for wireless modules in “machine-to-machine” communications. A wireless module operating in a wireless network and with access to the internet can efficiently and securely communicate with a server. The wireless network can be a public land mobile network (plmn) that supports wireless wide area network technology ...
Smartcard
Invia Robotics, Inc.
October 19, 2017 - N°20170300799

Card including a substrate, at least one biometric data entry device on the substrate to receive biometric data about an individual holding the substrate, a memory component on the substrate and containing biometric data about an individual possessing the card and at least one private key, and a processor configured to compare biometric data received via the biometric data entry ...
Metrics authorization based on a certificate
Invia Robotics, Inc.
October 19, 2017 - N°20170300708

In one implementation, a system can include a tenant engine to maintain a plurality of tenant profiles with access to a first set of metrics of a plurality of metrics based on authorization via a certificate, a metrics engine to maintain a plurality of metrics derived from instrumentation of a plurality of applications, and a report engine to provide the ...
Loading