Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Apparatuses and methods for wireless communication
Qualcomm Incorporated
July 12, 2018 - N°20180199193

One feature pertains to a method operational at a device. The method includes performing key agreement with a core network device, and generating an authentication session key based in part on a secret key shared with a home subscriber server (hss), where the authentication session key is known to the core network device.
Cryptographic network protocol escalation path
Highwinds Holdings, Inc.
July 12, 2018 - N°20180198818

The systems and methods described herein can provide a protocol escalation path in response to a client system's request or in response to a triggering event. For example, the computing system can provide an indication to a client system that the client system can upgrade from a regular connection channel to an upgraded connection channel if the client system can ...
Cryptographic operations in an isolated collection
Microsoft Technology Licensing, Llc
July 12, 2018 - N°20180198627

Examples of the present disclosure describe systems and methods for performing cryptographic operations in an isolated collection. In an example, a user may have an associated user resource within the isolated collection, which may be associated with a cryptographic key.
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method of authenticating communication of an authentication device and at least one authentication server using ...
Aducid S.r.o.
July 12, 2018 - N°20180198615

A method of authenticating the communication of an authentication device and at least one authentication server using a local factor with creation of secret information shared by the authentication device and the authentication server; the reference information is derived from the secret information shared by the authentication device and the authentication server, where the manner of derivation is the same ...
Homomorphic white box system and method for using same
Arris Enterprises Llc
July 12, 2018 - N°20180198613

A method for whitebox cryptography is provided for computing an algorithm (m,s) with input m and secret s, using one or more white-box encoded operations. The method includes accepting an encoded input c, where c=enc(p,m); accepting an encoded secret s′, where s′=enc(p,s); performing one or more operations on the encoded input ...
Strong resource identity in a cloud hosted system
Microsoft Technology Licensing, Llc
July 12, 2018 - N°20180198612

Aspects of the present disclosure relate to systems and methods for providing strong resource identification. When a resource is created, saved, or re-based, a cryptographic key pay may be generated and associated with the resource.
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Biometric security for cryptographic system
Pipa Solutons Ltd
July 12, 2018 - N°20180198609

A method of storing data allowing a seed value for generating an encryption key to be retrieved is provided. The method comprises obtaining, for each of a plurality of biological data sources, a respective set of biometric data from an authorised user.
Optical cryptography systems and methods
The Board Of Regents Of The University Of Oklahoma
July 12, 2018 - N°20180198607

Systems and methods for restoring or recovering linear polarization state of an optical signal as it exits the far end of an optical fiber are disclosed. The optical signal may have an expected pattern of polarization states through a birefringent material of the optical fiber from a first node to a second node.
Event attestation for an electronic device
Trustonic Limited
July 12, 2018 - N°20180198604

A method for validating an electronic device 2 comprises receiving attestation information provided by the electronic device 2 attesting that the electronic device 2 has received a plurality of event attestations, each event attestation providing a cryptographically authenticated attestation to the occurrence of a respective event during a lifecycle of the electronic device, and determining a validation result indicating whether the attestation information ...
Lightweight mitigation against first-order probing side-channel attacks on block ciphers
Qualcomm Incorporated
July 12, 2018 - N°20180198603

Techniques for mitigating side-channel attacks on cryptographic algorithms are provided. An example method according to these techniques includes applying a block cipher algorithm to an input data to generate a cryptographic output, such that applying the block cipher to input data comprises modifying an output of a stage of the block cipher algorithm such that each output of the stage ...
Managing chain-of-ownership for art using cryptocurrency blockchain
July 12, 2018 - N°20180197186

A method of maintaining a chain-of-ownership for art pieces is disclosed. A first record is stored in a chain-of-ownership database which assigns a first art-piece cryptocurrency address to a first art piece, and the internet is used to transfer cryptocurrency from a first artist cryptocurrency address assigned to a first artist to the first art-piece cryptocurrency address.
Managing chain-of-ownership for art using cryptocurrency blockchain
July 12, 2018 - N°20180197159

A method of maintaining a chain-of-ownership for art pieces is disclosed. A first record is stored in a chain-of-ownership database which assigns a first item cryptocurrency address to a first item, and the internet is used to transfer cryptocurrency from a first originator cryptocurrency address assigned to a first originator to the first item cryptocurrency address.
Security certification method for hiding ultra-high frequency electronic tag identifier
Traffic Management Research Institute Of The Ministry Of Public Security
July 12, 2018 - N°20180196973

A security certification method for hiding an ultra-high frequency electronic tag identifier. By encrypting the electronic tag identifier (tid) using a random number, and returning it in the cipher text, this certification method can effectively avoid an illegal reading/writing device from acquiring the tid information and from performing illegal tracking and identity recognition on an object identified by the ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Cryptographically-secure autonomous detection of spoofed gnss signals
Arbiter Systems, Incorporated
July 12, 2018 - N°20180196141

Methods and systems for cryptographically-secure autonomous detection of spoofed gnss signals is provided. A method is provided that includes the steps of: generating a cryptographic code, controlling a motion of at least one antenna of a global navigation satellite system (gnss) receiver system according to the cryptographic code, detecting a plurality of satellite signals during the controlled motion of the ...
Fake base station short message identification
Alibaba Group Holding Limited
July 05, 2018 - N°20180192293

A method includes: extracting a data value of receiver address field from a short message; wherein the short message sent by the short message center includes receiver address field, and the data value of the receiver address field includes the receiver's msisdn; if the short message does not include the receiver address field or the data value is not local ...
Providing low risk exceptional access with verification of device possession
July 05, 2018 - N°20180192287

A method and system for providing unencrypted access to encrypted data that may be stored on a device, sent as a message, or sent as a real-time communications stream. The method may include using public key cryptography to securely enable accessing the encrypted data stored on a device or communicated by a device.
Techniques for multi-domain memory encryption
Intel Corporation
July 05, 2018 - N°20180191716

Various embodiments are generally directed to techniques for multi-domain memory encryption, such as with a plurality of cryptographically isolated domains, for instance. Some embodiments are particularly directed to a multi-domain encryption system that provides one or more of memory encryption, integrity, and replay protection services to a plurality of cryptographic domains.
Encryption filter
Medisite Gmbh
July 05, 2018 - N°20180191692

The invention relates to a method and an apparatus for encrypted communication between a client and a server, wherein the communication comprises request messages, each with request elements, and response messages, each with response elements. Request elements and response elements can comprise data.
Method and system for authentication
Oberthur Technologies
July 05, 2018 - N°20180191511

An authentication method is performed between a first party and a second party. The method includes: i) determining a challenge; ii) sending the challenge to the second party; receiving a response from the second party including a second cryptogram; computing a first cryptogram using the challenge and the key of the first party; determining if the first cryptogram matches the ...
Asynchronous crypto asset transfer and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, ...
Fmr Llc
July 05, 2018 - N°20180191503

The asynchronous crypto asset transfer and social aggregating, fractionally efficient transfer guidance, conditional triggered transaction, datastructures, apparatuses, methods and systems (“socoact”) transforms transfer of assets (toa) initiation request inputs via socoact components into toa confirmation outputs. A crypto asset transfer notification is sent to a first entity from a second entity.
High-speed autocompensation scheme of quantum key distribution
International Center For Quantum Optics & Quantum Technologies Llc
July 05, 2018 - N°20180191496

The invention relates to quantum cryptography, and includes a communication system for transmitting a cryptographic key between the ends of a channel, including a transmitting node (alice) comprising a beam splitter, an electro-optical attenuator, an amplitude modulator, a phase modulator, a storage line, a faraday mirror, a synchronization detector; a receiving node (bob) that includes avalanche photodiodes, a beam splitter, ...
Loading