Images List Premium Download Classic

Private Key

Private Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW Enhanced secure provisioning for hotspots
Avago Technologies General Ip (singapore) Pte. Ltd
January 18, 2018 - N°20180020353

A ticket-based shared secret authentication is provided. A client device receives a ticket, and performs an authentication with an access point using the ticket. The access point deploys a first public key-private key pair to an intermediate device. The intermediate device and access point share a master secret to protect information in the ticket. The access point receives an association ...
NEW Authentication and key agreement with perfect forward secrecy
Qualcomm Incorporated
January 18, 2018 - N°20180020347

Systems and methods for providing authentication key agreement (aka) with perfect forward secrecy (pfs) are disclosed. In one embodiment, a network according to the disclosure may receive an attach request from a ue, provide an authentication request including a network support indicator to a network resource, receive an authentication token from the network resource, such that the authentication token includes ...
NEW Secure asynchronous communications
Fugue, Inc.
January 18, 2018 - N°20180020008

Techniques for securing and authenticating asynchronous messages using a key manager are provided. A first component sending an asynchronous message to a second component may identify itself to a key manager by a private key and may receive an encrypted signing key from the key manager. The first component may then hash message content, encrypt the hashed message content using ...
NEW Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Systems and methods for a secure payment terminal without batteries
Maxim Integrated Products, Inc.
January 18, 2018 - N°20180018673

Various embodiments of the present disclosure provide systems and methods for securing electronic devices, such as financial payment terminals, to protect sensitive data and prevent unauthorized access to confidential information. In embodiments, this is achieved without having to rely on the availability of backup energy sources. In certain embodiments, tampering attempts are thwarted by using a virtually perfect puf circuit ...
NEW Method and device for accessing a service
Gemalto Sa
January 18, 2018 - N°20180018665

In a method for accessing a service, a device receives data. The device gets, based upon the received data, transaction data. The device signs the transaction data by using a private key relating to a transaction processing, a signature operation result being a transaction signature. The device generates a transaction analysis result. The device stores the transaction data and the ...
Transport layer security latency mitigation
Facebook, Inc.
January 11, 2018 - N°20180013727

Some embodiments include a method of utilizing a proxy device to mitigate latency related to a transport layer security (tls) handshake protocol. The proxy device can be an untrusted proxy of a server or a client. The proxy device can negotiate cipher suites on behalf of its principal (e. G., the server or the server) without storing private keys of ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Data transmission method and apparatus
Tencent Technology (shenzhen) Company Limited
January 11, 2018 - N°20180013555

A data transmission method and apparatus are disclosed that resolves a technical problem where an existing data encryption algorithm offers poor security during transmission of data. The solution includes obtaining, by a first terminal, a data transmission request sent by a second terminal, the data transmission request at least carrying first encrypted data that is obtained by encrypting first exchange ...
Shared secret communication system with use of cloaking elements
Securerf Corporation
January 11, 2018 - N°20180013554

Systems and methods to produce cloaked keys and shared secret data are described. A first device may select a private key, for the first device, based on a first set of rewritten conjugates. The first device may receive a public key from a second device. The public key may be based on a private key of the second device. The ...
Encrypted collaboration system and method
Pageproof.com Limited
January 11, 2018 - N°20180012032

A method of sharing collaborative data between registered users in an online collaboration system. The collaboration system has a server and one or more electronic user devices that are capable of data communication with the server over a data network. Each registered user is allocated a unique asymmetric key pair comprising a user public key and a user private key ...
Recording data and using the recorded data
International Business Machines Corporation
January 11, 2018 - N°20180012027

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A ...
Recording data and using the recorded data
International Business Machines Corporation
January 11, 2018 - N°20180012026

A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium. Second encrypted data, obtained by encrypting the medium key using a public key, is recorded in the recording medium. A ...
Key management for wireless communication system for communicating engine data
Ge Aviation Systems Llc
January 04, 2018 - N°20180007547

Systems and methods for recording and communicating engine data are provided. One example aspect of the present disclosure is directed to a method for key management. The method includes generating a pair of keys, wherein one of the pair of keys is a private key, and wherein one of the pair of keys is a public key. The method includes ...
Transaction-specific shared secret in one-time password device
January 04, 2018 - N°20180007037

Embodiments are directed to generation and verification of one-time passwords. A one-time password is generated by an apparatus of an authenticating party in response to a one-time password production request. The one-time password is based on a secret value shared between the apparatus and a relying party. The shared secret value is based on a private key of the apparatus ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Public key infrastructure using blockchains
Intel Corporation
January 04, 2018 - N°20180006826

Techniques for implementing public key infrastructure using blockchains are described. An apparatus may receive, from a introducee principal, a proof-of-work. The apparatus may combine the proof-of-work with an identifier of the introducee principal. The apparatus may generate an introduction of the introducee principal. The introduction may include signing, using an asymmetric private key assigned to the apparatus, the combination of ...
Multi-hop secure content routing based on cryptographic partial blind signatures and embedded terms
Qualcomm Incorporated
January 04, 2018 - N°20180006823

At a transmitter node, a commitment value c is obtained as a function of a message m. The commitment value c and transmitter terms of use ta for the message m are then sent to a receiver node without disclosing the message m. A cryptographic receiver signature sb over the commitment value c and the transmitter terms of use ta ...
Arbitrary base value for epid calculation
Intel Corporation
January 04, 2018 - N°20180006822

Systems and methods for using an arbitrary base value for epid calculations are provided herein. A system to use arbitrary base values in enhanced privacy id (epid) calculation, where the system includes a microcontroller; and a memory coupled to the microcontroller; wherein the microcontroller is to: obtain an arbitrary value at a member device, the member device being a member ...
Session key repository
Hewlett Packard Enterprise Development Lp
January 04, 2018 - N°20180006816

In one implementation, a system for a session key repository includes a monitor engine to monitor communication between a first computing device and a second computing device that is encrypted with a private key, an identification engine to determine a number of session keys and session ids that correspond to the encrypted communication, a rules engine to determine a number ...
Information sharing system, computer, and information sharing method
Hitachi, Ltd.
January 04, 2018 - N°20180006810

It is provided an information sharing system, comprising a server, and an in-vehicle system. The server includes: a first storage part; a first key generation part configured to generate a first private key and a first public key, if keys can be exchanged with the in-vehicle system; and a signature generation part configured to generate a signature value of the ...
Electronic voting system
January 04, 2018 - N°20180005476

A method is described that involves creating a private key and a public key cryptographic key pair, generating a unique and random identifier for a voter's vote and accepting an election vote from said voter. The vote and identifier are electronically signed with the private key to create a digital signature. The vote and identifier are provided in a human ...
Process management
Intel Corporation
January 04, 2018 - N°20180004931

Particular embodiments described herein provide for a network element that can be configured to determine that an application begins to execute, receive credentials for the application, where the credentials are located in an immediate field of the application, receive a request from the application to access a secure resource, and block access to the secure resource if the credentials for ...
Attribute-based access control
International Business Machines Corporation
December 28, 2017 - N°20170374060

A received security token includes first access control attributes and a signature of a first identity provider of a first security domain. Additional access control attributes provided by a second identity provider of a second security domain are added into the received security token. The received security token with the added additional access control attributes is re-signed, with a private ...
Loading