Images List Premium Download Classic

Private Key

Private Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Service processing method and electronic device
Tencent Technology (shenzhen) Company Limited
April 12, 2018 - N°20180103017

The present disclosure relates to the field of terminal technologies, and discloses a service processing method and an electronic device. In the present disclosure, a plaintext message used for performing a service operation is provided in a second electronic device. In this case, when needing to perform service processing, a first electronic device may obtain, by means of encryption transmission ...
Authenticating features of virtual server system
International Business Machines Corporation
April 12, 2018 - N°20180102899

Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that executes the hypervisor. The method also includes receiving, in response ...
Checkout and payment
Coinbase, Inc.
April 12, 2018 - N°20180102898

A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are combined to store an operational master key. The operational master key is used for private key encryption during a checkout process. The operational private key is used for private key decryption for transaction signing in a payment ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Detecting malicious usage of certificates
Microsoft Technology Licensing, Llc.
April 05, 2018 - N°20180097803

The misuse of public key, private key, and public/private key certificates poses significant security challenges to computer networks that are addressed by certificate monitoring. Certificate monitoring allows network administrators to detect and remedy poor security practices related to public key certificates and to detect and combat the malicious use of public key certificates in a centralized environment. Best practices ...
Methods and apparatus for providing blockchain participant identity binding
Entrust, Inc.
April 05, 2018 - N°20180097635

A method and apparatus provides a blockchain that includes one or more blocks that contain a cryptographic binding of a signature-verification public key and/or a data encryption public key to the identity of the holder of the corresponding private key. The binding is performed by one or more key binding entities, referred to herein as a blockchain identity binder. ...
Signature generation and verification system
Securerf Corporation
April 05, 2018 - N°20180097633

Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor. The methods may comprise generating a random number by a random number generator. The methods may comprise forwarding, by the processor, the random number to a cloaking element generator. The methods may comprise forwarding, by the processor, ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Distributed electronic ledger with metadata
The Toronto-dominion Bank
April 05, 2018 - N°20180096349

A system has a storage medium encoded with program instructions, and a processor coupled to access the program instructions. The instructions configure the processor for: receiving a first request at a pos terminal to surrender a previously purchased first asset in exchange for at least a portion of a second asset that was used to purchase the first asset, receiving ...
Method for payment authorization on offline mobile devices with irreversibility assurance
Matera Systems Inc.
April 05, 2018 - N°20180096348

A methods for payment authorization (10) on mobile devices (dm) such as smartphones, tablets or any others available, which may be offline; the method for payment authorization (10) comprises the compilation of sequential steps of method (m1) of the payer (20) with method (m2) of the operational system (50) or application that constitutes a logical structure for alignment with the method (m3) of the ...
System and method for transforming channel id communications in man-in-the-middle context
International Business Machines Corporation
March 29, 2018 - N°20180091552

Embodiments can provide a computer implemented method in a data processing system comprising a processor and a memory comprising instructions, which are executed by the processor to cause the processor to implement a system for transforming a channel id communication, the method comprising: generating, by a ssl/tls inspector, a secret; receiving, from a client, a channel id communication comprising ...
Electronic device, server and communication system for securely transmitting information
Synology Incorporated
March 29, 2018 - N°20180091487

An electronic device, server, and communication system are disclosed. The electronic device includes a processor and a storage medium. The storage medium is configured to store a plurality of instructions to allow the processor to generate a public key and a private key, to encrypt the private key, and to send the public key and the encrypted private key through ...
Logic repository service using encrypted configuration data
Amazon Technologies, Inc.
March 29, 2018 - N°20180091484

The following description is directed to a logic repository service. In one example, a method of a logic repository service can include receiving a first request to generate configuration data for configurable hardware using a specification for application logic of the configurable hardware. The method can include generating the configuration data for the configurable hardware. The configuration data can include ...
System and method of providing a multi-validator oracle
Shapeshift Ag
March 29, 2018 - N°20180091316

Disclosed is a system and method of implementing a multi-validator oracle. The method includes receiving a notification at a multi-validator oracle from an external smart contract that requests data from the multi-validator oracle to be provided to the external smart contract according to a set of parameters to yield requested data, gathering the requested data from at least one application ...
Printing apparatus, control method of printing apparatus, and network system
Seiko Epson Corporation
March 29, 2018 - N°20180091307

A printing apparatus includes: a printing apparatus storage unit that stores firmware to which a public key is added, the public key being information related to a public key encryption method; a printing apparatus network-communication unit that receives signature information obtained by encrypting a hash value of overwriting firmware with a private key corresponding to the public key, from the ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method of providing a contract-creator application
Shapeshift Ag
March 29, 2018 - N°20180089758

Disclosed is a system and method of creating a smart contract on a blockchain. The approach includes receiving, from a user, one or more parameters via a user interface, each of the one or more parameters being associated with a creation of a customized smart contract. The approach also includes authenticating the one or more parameters via a public/private ...
Boot images for units under test
Hewlett Packard Enterprise Development Lp
March 29, 2018 - N°20180089438

Example implementations relate to boot images for units under test. In an example implementation, responsive to a unit under test (uut) being booted to a default boot image, a system receives a key pair from the uut, creates a unique boot image that includes a private key of the key pair, associates the unique boot image with an identification of ...
Method and apparatus for non-interactive information dispersal
International Business Machines Corporation
March 29, 2018 - N°20180089029

Methods and apparatus for use in a dispersed storage network (dsn) to enable non-interactive information dispersal. In various examples, a computing device dispersed storage error encodes a data segment of a data object to produce a set of encoded data slices. Utilizing a secret key, the computing device encrypts an encoded data slice of the set of encoded data slices ...
Multi-session authentication
Ebay Inc.
March 22, 2018 - N°20180083955

An approach for multi-session authentication of multiple networked devices is disclosed. A user can create a public key-encrypted message on a client device using biometric data and a one-time password (e. G., one-time password). A door control box can transmit the public key-encrypted message to an authentication server. The authentication server can validate the user by decrypting the encrypted message ...
Stateless server-based encryption associated with a distribution list
Red Hat Israel, Ltd.
March 22, 2018 - N°20180083947

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. The encrypted electronic messages are derived from a common electronic message sent by ...
Method for operating server and client, server, and client apparatus
2ip Co., Ltd.
March 22, 2018 - N°20180083938

Disclosed is a method for operating a server supporting peer-to-peer communication. One embodiment comprises the steps of: issuing a public key in response to a public key request received from a client and transmitting the public key to the client; receiving a private key from the client and mapping the public key and private key as a key pair; receiving, ...
Decentralized credentials verification network
Sap Se
March 22, 2018 - N°20180082256

A credentials verification network utilizes blockchain technology to track/verify credentials for candidates that can later be used in the hiring verification process. As implemented by nodes of a distributed network, a candidate receives from a first network node a secure credential generated by a credentialing source from an original credential document. The first node processes the secure credential according ...
Countersigning updates for multi-chip devices
Apple Inc.
March 22, 2018 - N°20180082065

A device facilitating countersigning updates for multi-chip devices includes at least one processor configured to receive, from a collocated chip, a data item and a software update, the data item being signed using a private key corresponding to a primary entity associated with the collocated chip and the data item comprising an authentication code generated using a symmetric key corresponding ...
Loading