Follow us on Twitter
twitter icon@FreshPatents


Private Key patents

      

This page is updated frequently with new Private Key-related patent applications.




 Fast multicast messaging encryption and authentication patent thumbnailFast multicast messaging encryption and authentication
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted and combined with a base session management key to render a combined root key, which in turn is encrypted with a public key of at least one recipient device render a session management key. The public key of each “n” intended recipient device encrypts the combined root key to render “n” session management keys.
Sony Computer Entertainment America Llc


 Method for certification by a control unit of a vehicle patent thumbnailMethod for certification by a control unit of a vehicle
A method for performing certification by a control device of a vehicle including generating a first signed certificate, which has at least one public key, and generating an associated private key; single-time introduction of the first signed certificate and of the associated private key into the control device; producing a second certificate; signing a further public key in the control device, using the private key and the second certificate; and making available the signed further public key together with the first signed certificate.. .
Volkswagen Ag


 System,  migrating a device having a platform group patent thumbnailSystem, migrating a device having a platform group
In one embodiment, an apparatus comprises a processor to execute instructions and having at least a first logic to execute in a trusted execution environment, a secure storage to store a platform group credential, and a first logical device comprising at least one hardware logic. The platform group credential may be dynamically provisioned into the apparatus and corresponding to an enhanced privacy identifier associated with the apparatus.
Mcafee, Inc.


 Method and system for asymmetric key derivation patent thumbnailMethod and system for asymmetric key derivation
A method for asymmetrical key derivation by a signing entity for a terminal including introducing identical cryptographic material into the signing entity and into the terminal; deriving in each case a private key from the cryptographic material in the signing entity and in the terminal; calculating in each case a public key from the private key in the signing entity and in the terminal; generating a signature and/or a signed public key in the signing entity; transferring the signature and/or the signed public key from the signing entity into the terminal; and appending the signature of the signing entity to the public key in the terminal.. .
Volkswagen Ag


 Providing forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange patent thumbnailProviding forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange
An infrastructure delivery platform provides a proxy service as an enhancement to the tls/ssl protocol to off-load to an external server the generation of a digital signature, the digital signature being generated using a private key that would otherwise have to be maintained on a terminating server. Using this service, instead of digitally signing (using the private key) “locally,” the terminating server proxies given public portions of ephemeral key exchange material to the external server and receives, in response, a signature validating the terminating server is authorized to continue with the key exchange.
Akamai Technologies, Inc.


 Method for protected communication of a vehicle patent thumbnailMethod for protected communication of a vehicle
A method for protected communication by a vehicle which includes generating a key pair consisting of a private key and a public key and/or of one or more symmetric keys for the vehicle or for a controller of the vehicle in the area of influence of the vehicle manufacturer, generating a first certificate using the key pair, introducing the key pair and the first certificate and/or the symmetric key into the vehicle or the controller, authenticating the vehicle or the controller to a new communication partner by generation of a new key pair for this communication path and sending a signed message together with the certificate, and authenticating a new communication partner to the vehicle or the controller using a signed message and a public key, which are produced by the new communication partner on the basis of a certification by the vehicle manufacturer.. .
Volkswagen Ag


 Airplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami) patent thumbnailAirplane identity management with redundant line replaceable units (lrus) and composite airplane modifiable information (ami)
The present invention generally relates to one or more line replacement units (“lrus”) for an airplane. The lrus can include airline modifiable information (“ami”) that includes more than one public key certificates, wherein each of the more than one public key certificates uniquely identifies the airplane for ground communication based, at least in part, on a public key or a private key associated with the one or more public/private key pairs generated by a cryptographic key generator..
The Boeing Company


 Systems and methods for revoking and replacing signing keys patent thumbnailSystems and methods for revoking and replacing signing keys
In accordance with embodiments of the present disclosure, an information handling system may include a processor, an information handling resource communicatively coupled to the processor, and a management controller communicatively coupled to the processor and the information handling resource and configured to provide out-of-band management of the information handling system. The management controller may further configured to receive a message indicating that an existing private key associated with the information handling resource is compromised, the message including a replacement public key for replacing an existing public key associated with the information handling resource and associated with the existing private key and responsive to the message, cause the existing public key associated with the information handling resource to be replaced with the replacement public key..
Dell Products L.p.


 Crypto multiple security asset creation and redemption platform patent thumbnailCrypto multiple security asset creation and redemption platform
An asset trading system utilizing a distributed ledger and configured to: when a creation request to create a digital fund token representing at least one share of a fund having a plurality of different assets (i) is received, (ii) is electronically signed with a private key associated with a first addressed account, and (iii) indicates a composition of the at least one share of the fund: place the plurality of different assets represented by the at least one share of the fund into an escrow account; create the digital fund token, wherein the digital fund token indicates the composition of the share of the fund; and record the creation of the digital fund token on a distributed ledger.. .
Medici Ventures, Inc.


 Recording data and using the recorded data patent thumbnailRecording data and using the recorded data
A method and system for recording data including content in a recording medium on a computer apparatus. First encrypted data, obtained by encrypting the data using a medium key created for each recording medium, is recorded in a recording medium.
International Business Machines Corporation


Splicing into an active tls session without a certificate or private key

An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active tls session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point.
Akamai Technologies, Inc.

Storing decrypted body of message and key used to encrypt and decrypt body of message

A non-transitory computer-readable storage medium comprising instructions stored thereon. When executed by at least one processor, the instructions may be configured to cause a computing system to at least receive a message, the message including a header, an encrypted symmetric key, and an encrypted body, decrypt the encrypted symmetric key using a private key to generate a decrypted symmetric key, decrypt the encrypted body using the decrypted symmetric key to generate a decrypted body, and store the header, the decrypted symmetric key, and the decrypted body in long-term storage..
Google Inc.

System and digital key sharing for access control

A communication system involving an access point, a vehicle and a user is provided. The vehicle and user possess a registration code, the user possesses a public and private key pair, and the access point and vehicle possess certificates and associated private keys.
Trustpoint Innovation Technologies, Ltd.

Security and data privacy for lighting sensory networks

In one example, a method of protecting customer data in a networked system comprises collecting sensor data available at sensor nodes within a sensor network in communication with a service data platform over a network. The method includes encrypting the sensor data using a certified public key associated with a customer key-pair, the sensor data representing the customer data associated with sensitive identification information.
Sensity Systems Inc.

Systems and methods for pkcs #8 private file key support

A communications platform may provide asymmetric cryptography using rsa and/or dsa algorithms using a public and private key pair. The communications platform and corresponding cryptographic function library may be modified to add compatibility with multiple public-key cryptography standards (pkcs).
Unisys Corporation

Securely authorizing client applications on devices to hosted services

A client application of a device queries/interrogates a secure device identity module of the device to obtain a device identifier of the device and a signed string generated by the security device identity module using a private key unique to the device. The client application of the device sends to an authorization server a request containing the device identifier and the signed string.
Cisco Technology, Inc.

Methods, networks and nodes for dynamically establishing encrypted communications

Methods, networks and nodes for dynamically establishing encrypted communications between a first node having a first identification and a first private key and a second node having a second identification and a second private key. A first signal comprising information indicative of the first identification of the first node is transmitted, then, upon receipt of the first signal by the second node, a second signal comprising information indicative of the second identification of the second node and a first portion of a symmetric key is transmitted, then, upon receipt of the second signal by the first node, a third signal comprising a second portion of the symmetric key is transmitted..
Architecture Technology, Inc.

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted by an rsa public key; and performing at least one multiplication operation and at least one square operation according to an rsa private key and the encrypted data to acquire decrypted data. A false square operation is performed in performing one of the at least one multiplication operation, or a false multiplication operation is performed in performing one of the at least one square operation..
Realtek Semiconductor Corporation

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted according to an rsa public key; and performing a plurality of operations in sequence according to an rsa private key and the encrypted data to acquire a decrypted data. The operations include a plurality of decryption operations and at least one false operation.
Realtek Semiconductor Corporation

Using everyday objects as cryptographic keys

This disclosure involves the notion of using physical objects to generate public key-based authenticators and, in particular, to use “everyday” physical objects to create a generator seed for a key generator that will use that seed to generate a key pair comprising a public key, and its associated private key. In a preferred approach, the physical object is used to create a digital representation (of the physical object) that, together with some uniqueness associated to the user, gives rise to a key generator seed value.
International Business Machines Corporation

Secure connection network device, related apparatus, and system

A secure connection method for a network device includes: acquiring a public key operation value of a second device in an out-of-band manner; sending public key information of a first device to the second device; receiving public key information of the second device that is sent by the second device, and decrypting the public key information of the second device by using a private key of the first device, to obtain the public key of the second device; and performing a preset-algorithm operation on the public key of the second device to obtain a copy of the public key operation value of the second device, and after the copy of the public key operation value of the second device matches the public key operation value of the second device, accepting received connection information sent by the second device.. .
Huawei Device Co., Ltd.

Composite document access

According to one example, a first computer system receives at least one request by at least one workflow participant to access a composite document content-part from a second computer system. The first computer system retrieves at least one encrypted bundle from the composite document for the at least one workflow participant, decrypts the encrypted bundle using a private key, and ascertains whether at least one rule retrieved from the decrypted bundle is satisfied.
Hewlett-packard Development Company, L.p.

Hipaa compliant communications system

A hipaa compliant communications systems (10) that enables the transfer of patient information from a repository (20) of such information to a device (30, 30′, 30″) at a location (40) where the information is needed. An initial dialogue between the repository and end user is established using a public key; but after that, each authorized transmission (at) is accomplished using a private key (pk) which is changed for each communication..

Network authorization system

A system includes a key repository and a network node. The key repository is configured to generate a private key and a public key of the network node, to communicate the private key and the public key to the network node, to verify whether the network node is authorized to operate on a network, to generate a first message indicating whether the network node is authorized to operate on the network, to encrypt the first message using the public key, and to communicate the encrypted first message to the network node.
Bank Of America Corporation

Security token for certificate authentication and driving method therefor

The present invention relates to a security token for certificate authentication and a driving method thereof. The security token for certificate authentication, according to the present invention, comprises a security chip comprising: a key pair generation module for generating a pair of a private key and a public key for an authentication certificate; a digital signature module for generating a digital signature on the basis of the authentication certificate; an internal memory for storing the authentication certificate, the private and the public key; a near field communication (nfc) module for performing nfc with a wireless terminal; and a controller for controlling the key pair generation module, the digital signature module, the internal memory, and the nfc module..
Keypair Co., Ltd.

Code signing service

A facility for enrolling a software implementer in a code signing. In one example facility, the facility receives information identifying the implementer, and credentials authenticating the implementer.
Microsoft Technology Licensing, Llc

Shared data encryption and confidentiality

Embodiments relate to deduplication and compression on data performed downstream from where the data is encrypted. Confidentiality of data is maintained, and the ability of storage systems to perform data reduction functions is supported.
International Business Machines Corporation

Pre-personalization of electronic subscriber identity modules

Methods for provisioning electronic subscriber identity modules (esims) to electronic universal integrated circuit cards (euiccs) are provided. One method involves a provisioning server configured to encrypt the esim with a symmetric key (ke).
Apple Inc.

Image processing apparatus, controlling the same, and storage medium

When this image processing apparatus accepts an initial connection request from a mobile terminal, it displays a generated pin code on a console unit 210, and when it accepts information corresponding to the pin code from the mobile terminal, it compares that information with the generated pin code, and performs authentication. When the authentication is successful, it generates a public key and a private key, and transmits the generated public key to the mobile terminal..
Canon Kabushiki Kaisha

Entity authentication

Disclosed are an entity authentication method and device, involving: sending, by an entity a, a first identity authentication message to an entity b; inspecting, by the entity b after receiving the first message, the validity of a certificate of the entity a; sending, by the entity b, a second identity authentication message to the entity a; inspecting, by the entity a after receiving the second message, the correctness of field data therein; calculating, by the entity a, a secret information and message authentication code using a private key thereof and a temporary public key of the entity b, and sending a third message to the entity b; inspecting, by the entity b after receiving the third message, the correctness of field data therein; calculating, by the entity b, a secret information and message authentication code using a private key thereof and a public key of the entity a.. .
China Iwncomm Co., Ltd.

Signature generation and verification system

Technologies are generally described for methods and devices for generating a final signature. The methods may comprise receiving a message by a processor.
Securerf Corporation

Consensus adding data to a blockchain

A method and apparatus is presented for reaching consensus on adding data to a distributed ledger system in which no central trusted authority is available, comprising sending an announcement message by a network connected device to a plurality of network connected devices over a peer-to-peer network, said message providing an identification of the network connected device using a public key of a public/private key pair, a unique address identifier, and a hash. Subsequently, after a waiting period measured in, for example, time or blocks of data, the network connected device may submit data for inclusion in the distributed ledger.

Personal secure event recording device

A device may passively record or transmit data characterizing the environment of a user and/or the physiological condition of the user. The device may encrypts and/or cryptographically sign data for storage and/or transmission.

Location aware cryptography

Encrypted data transmitted from a second entity to a first entity may be received. The encrypted data may be encrypted by a location based public key based on a public key and a location associated with the second entity.
Cryptography Research, Inc.

Method of managing credentials in a server and a client system

A method for deploying credentials in a server and a client system including three devices. The second device has primary credentials including a public key, a private key and a primary certificate.
Gemalto Inc.

Authentication of networked devices having low computational capacity

Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node.
Texas Instruments Incorporated

Visp authentication service for third party applications

An authentication device receives, from an application executing at a mobile device, a request for an authentication token, the request including an application identifier and an encrypted session identifier (sid). The application identifier identifies the application and the sid uniquely identifies a session between the application and a destination network device.
Verizon Patent And Licensing Inc.

Methods and systems for distributing encrypted cryptographic data

A method for distributing encrypted cryptographic data includes receiving, by a key service, from a first client device, a request for a first public key. The method includes transmitting, by the key service, to the first client device, the first public key.
Virtru Corporation

Shared symmetric key encryption

A method for encrypting a message is described in which a public key and a private key are generated. The public key is encrypted using a shared symmetric key shared with an agent.
Hewlett-packard Development Company, L.p.

Authentication system and device including physical unclonable function and threshold cryptography

An authentication system and device including physical unclonable function (puf) and threshold cryptography comprising: a puf device having a puf input and a puf output and constructed to generate, in response to the input of a challenge, an output value characteristic to the puf and the challenge; and a processor having a processor input that is connected to the puf output, and having a processor output connected to the puf input, the processor configured to: control the issuance of challenges to the puf input via the processor output, receive output from the puf output, combine multiple received puf output values each corresponding to a share of a private key or secret, and perform threshold cryptographic operations. The system and device may be configured so that shares are refreshable, and may be configured to perform staggered share refreshing..
Sypris Electronics, Llc

Secure digital signature apparatus and methods

The invention is a secure digital signature device which generates digital signature key pairs using a hardware random number generator. It transmits public keys to one or more smart devices and signs bit strings at the request of smart devices without exposing private keys.

Multivariate cryptography based on clipped hopfield neural network

The systems and methods disclosed herein, in one aspect thereof, can encrypt and decrypt messages using a multivariate extended clipped hopfield neural network that uses a diffie-hellman like key exchange algorithm. The proposed cryptosystem comprises three stages that are involved in the communication.
City University Of Hong Kong

Crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems

The crypto key recovery and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms mkadsd generation request, trigger event message inputs via socoact components into transaction confirmation, recovery notification outputs. A multiple key account data structure datastore (mkadsd) generation request may be obtained from a user.
Fmr Llc

Secure key storage systems, methods and apparatuses

The systems, methods and apparatuses described herein provide a computing environment that manages private key storage. An apparatus according to the present disclosure may comprise a first non-volatile storage for storing a private root key for signing digital certificates, an input device for receiving manual input from an operator, a communication interface consisting of a one-way transmitter for transmitting information from the apparatus, and a processor.
Ologn Technologies Ag

Secure escrow service

A method of restoring confidential information items of a first device to a second device by using a set of servers. The method generates a public and private key pair and ties the private key to the hash of executable code of the servers at the time of generating the public and private keys.
Apple Inc.

Validating authorization for use of a set of features of a device

A device obtains proof of its authority to use a first set of selectively activated features (first proof). An authorization server signs the first proof with its private key.
Qualcomm Incorporated

Secure certificate distribution

Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (url) is sent to a client device, wherein the url represents an address from which the client device can request a user certificate.
Airwatch Llc

Bootstrapping without transferring private key

A machine implemented method of communication between server and remote device, the method comprising: determining an availability and address of the remote device on a network for communication with the server; obtaining a public key attributed to the remote device; signing the public key attributed to the remote device with a private key of the server and so generating a digitally signed certificate to verify the ownership of the public key as the remote device; and transmitting the digitally signed certificate to the remote device.. .
Arm Ltd

Server and authentication method based on a time stamp

An authentication method based on a time stamp is executed by at least one processor of a server. At least two force renew messages are generated in turn when a configuration of dynamic host configuration protocol (dhcp) of the server is changed.
Hon Hai Precision Industry Co., Ltd.

User authentication over networks

Methods are provided for authenticating user authentication data, associated with a user id, at an authentication system. The authentication system comprises an authentication server connected to a network, and a secure cryptoprocessor operatively coupled to the authentication server.
International Business Machines Corporation

Secure access to virtual machines in heterogeneous cloud environments

Systems, methods, and computer-readable media provide for secure access to virtual machines in heterogeneous cloud environments. In an example embodiment, client credentials, such as a public key of a public-private key pair, are provided to a virtual machine in a first cloud, such as a private cloud.
Cisco Technology, Inc.

Mutable fields in digital certificates

By implementing a mutable certificates approach, a server to which a digital certificate has been issued may update one or more certificate fields without the need for a new certificate or other intervention from the issuing certificate authority. A certificate authority uses extensions to identify fields that a server may update, and to identify a set or range of allowable values for those fields.
Digicert, Inc.

Method, device, and system for establishing secure connection

A method includes: securely obtaining, by a first device, a first public key estimated value of a second device in an out-of-band manner; encrypting an asymmetric encryption public key by using the first public key estimated value; sending the encrypted asymmetric encryption public key to the second device; receiving an encrypted first key-exchange public key sent by the second device; decrypting the encrypted first key-exchange public key by using an asymmetric encryption private key; performing an operation based on the decrypted first key-exchange public key, to obtain a second public key estimated value; and when the first public key estimated value is consistent with the second public key estimated value, determining that the decrypted first key-exchange public key is correct, generating a shared key by using a key-exchange private key and the first key-exchange public key, and establishing a secure connection to the second device by using the shared key.. .
Huawei Device Co., Ltd.



Private Key topics:
  • Private Key
  • Public Key
  • Encryption
  • Certificate
  • Computer Program
  • Digital Signature
  • Hash Function
  • Authentication
  • Communications
  • Secret Key
  • Binary File
  • Publishing
  • Decryption
  • Smart Card
  • Instantiate


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Private Key for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Private Key with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.4639

    file did exist - 2488

    0 - 1 - 53