Images List Premium Download Classic

Private Key

Private Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Generating and sending encrypted payment data messages between computing devices to effect a transfer of ...
Mastercard International Incorporated
July 13, 2017 - N°20170200155

Encrypted payment data messages are sent via a communication network. A payment data message is generated including a primary account number of the account associated with the sender device and a transaction amount. The payment data message is encrypted with a public key of the receiver device. The payment data message is transmitted to the receiving server via the communication ...
Java store television
Oracle America, Inc.
July 06, 2017 - N°20170193476

A non-transitory computer readable storage medium including computer readable code that, when executed by a processor, is configured to receive, from a user network device, a first request to execute an application on the user network device. The first request includes a user identification, routing information, and requested application information, encrypted using a public key. The user network device is ...
Set of servers for "machine-to-machine" communications using public key infrastructure
M2m And Iot Technologies, Llc
June 29, 2017 - N°20170188231

A set of servers can support secure and efficient “machine to machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of modules in a shared module database. The set of servers can (i) access the internet to communicate with a module using a module identity, (...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Hardware-generated dynamic identifier
Mcafee, Inc.
June 29, 2017 - N°20170187525

In an example, there is disclosed an electronic apparatus, comprising: a hardware-encoded internal private key; and one or more logic elements comprising a key generation engine to: receive an third-party key; and operate on the third-party key and the internal private key to generate a hardware-generated dynamic identifier (hgdi). There is also disclosed a method of providing an hgdi engine, ...
Epid attestation using rfid
Mcafee, Inc.
June 29, 2017 - N°20170185814

Technologies for verification include storage with private keys, wherein each private key is associated with a group affiliation. The storage also includes characteristic information about an apparatus. The technologies also include a wireless interface configured to receive a request from a reader for verification of membership of the apparatus within a group affiliation. The technologies further include a controller with ...
Secure vehicle communication system
Security Innovation, Inc
June 22, 2017 - N°20170180989

A secure vehicle communication system relies on credentials to provide security. A credential includes a private key and a digital certificate. A generic credential file format that is generalized to hold information from multiple credential file formats is provided. Various optimizations enhance the efficiency of the security system, keys may be pre-derived to reduce latency and digital certificates may be ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and system for blockchain variant using digital signatures
Mastercard International Incorporated
June 22, 2017 - N°20170180134

A method for using digital signatures for signing blockchain transactions includes: generating a domain key pair comprising a domain private key and a domain public key, wherein the domain public key is signed after generation; receiving a plurality of member public keys, wherein each member public key is received from an associated member of a blockchain network and is a ...
Method for managing a trusted identity
Gemalto Inc.
June 22, 2017 - N°20170180128

The invention is a method for deploying a trusted identity for a user issued by an issuer. The user has a user device configured to send a request for signature to an issuer device handled by the issuer. The request comprises a user public key allocated to the user. The issuer device is configured to compute an issuer signature by ...
Method and apparatus for establishing a key agreement protocol
Securerf Corporation
June 22, 2017 - N°20170180124

A system and method for generating a secret key to facilitate secure communications between users. A first and second and a function between the two monoids are selected, the function being a monoid homomorphism. A group and a group action of the group on the first monoid is selected. Each user is assigned a submonoid of the first monoid so ...
Privacy preserving group formation with distributed content key generation
Intel Corporation
June 22, 2017 - N°20170180122

An embodiment includes a method executed by at least one processor of a first computing node comprising: form a first group of computing nodes, wherein forming the first group comprises providing (a)(i) a public key and a first seed value to each of second and third nodes, (a)(ii) second and third private keys, which both correspond to the ...
Proxy system mediated legacy transactions using multi-tenant transaction database
International Business Machines Corporation
June 22, 2017 - N°20170178127

One embodiment provides a method for proxy system mediated legacy transactions using multi-tenant transaction database, including: utilizing at least one processor to execute computer code that performs the steps of: ascertaining, using a processor associated with a proxy system, that a first transacting entity and a second transacting entity have placed a transaction on a multi-tenant transaction database, the transaction ...
Security system for handheld wireless devices using time-variable encryption keys
Mlr, Llc.
June 15, 2017 - N°20170171750

In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as pda, smartphone, cellular telephone or the like, characterized by a relatively robust data ...
Authenticating features of virtual server system
International Business Machines Corporation
June 15, 2017 - N°20170171164

Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that executes the hypervisor. The method also includes receiving, in response ...
Private Key Patent Pack
Download 123+ patent application PDFs
Private Key Patent Applications
Download 123+ Private Key-related PDFs
For professional research & prior art discovery
inventor
  • 123+ full patent PDF documents of Private Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Data analytics on encrypted data elements
Hewlett Packard Enterprise Development Lp
June 15, 2017 - N°20170170960

Data analytics on encrypted data elements is disclosed. One example is a system including a first data system, a second data system, and a data analytics system. The first data system includes a first data element and a first encryption module with a first private key. The second data system includes a plurality of second data elements and a second ...
Authentication of a gateway device in a sensor network
Samsara
June 08, 2017 - N°20170164193

A method in a wireless sensing device for authenticating a gateway device of a sensor network is described. The method includes receiving a certificate where the certificate was generated by the management server upon a determination that the gateway device and the wireless sensing device are associated and is a digital document including data and a digital signature, where the ...
Mic verification method in d2d communications and d2d communications system
Xi'an Coolpad Software Scientific Co., Ltd.
June 08, 2017 - N°20170164189

An mic verification method in d2d communications and a d2d communications system include: a monitoring ue receives a discovery announcement message from an announcing ue, in which the discovery announcement message carries a 32-bit mic, and the mic is a signature value obtained when the announcing ue conducts, by using a private key, a digital signature on a ...
A trusted geolocation beacon and a method for operating a trusted geolocation beacon
"billennium" Spolka Z Ograniczona Odpowiedzialnoscia
June 08, 2017 - N°20170164142

A method for operating a trusted geolocation beacon, the method comprising the steps of: generating (101) a public and private keys pair associated with the beacon; associating a unique identifier with the beacon; transmitting (104) the public key associated with the unique identifier to an external device; cyclically transmitting (201) beacon's identifier as well as its transmitter's signal power (202); transmitting (302) a signal comprising ...
System, apparatus and method for providing privacy preserving interaction with a computing system
Mcafee, Inc.
June 08, 2017 - N°20170163616

In one embodiment, a system including one or more hardware processors is: to receive a user request to access a website; sign a nonce with at least some of the plurality of group private keys, the at least some of the plurality of group private keys corresponding to personalization attributes of the website; and send the signed nonce to a ...
Method and device for cryptographic key generation
Thomson Licesing
June 08, 2017 - N°20170163420

A method and a device for generation of a cryptographic key pair for use in a (generalized) goldwasser-micali cryptosystem. The device generates a first prime p≡1 (mod 2k), where k≧1 is an integer, and a second prime q≡3 (mod 4) or q≡1 (mod 4); computes a modulus n=pq; picks an integer y∈n\n, where n ...
Secure remote kernel module signing
Red Hat, Inc.
June 08, 2017 - N°20170161502

Implementations for a secure remote kernel module signing are disclosed. In one example, the method includes receiving an indicator of a public key associated with a client computing device, determining that the public key associated with the client computing device is in common with a public key associated with a first server computing device, compiling the script, signing the compiled ...
Trusted platform module (tpm) protected device
Microsoft Technology Licensing, Llc
June 01, 2017 - N°20170155513

Example apparatus and methods provide a device (e. G., smartphone) that is more secure for electronic commerce. An example device includes a trusted platform module (tpm) that stores a public key and a private key. The device is provisioned with account information, user information, and device information. The tpm uses the account, user, and device information to acquire attestation credentials ...
Loading