Images List Premium Download Classic

Crypto

Crypto-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Internet connection load balancing with direct access to balanced devices
October 04, 2018 - N°20180288103

Sip invite messages received at a load balancer are returned as sip redirect messages which are addressed to an access director and include additional information, such as a tracing token and a cryptographic token. When the access director receives the redirected sip invite, the access director analyzes the included cryptographic token and passes the sip invite if the cryptographic token ...
Secure identity sharing using a wearable device
October 04, 2018 - N°20180288030

Aspects of the embodiments include performing, by a personal computing device, a secure handshake with a secure server accessible through an identity provider to log into the secure server. A temporary identity (tid) token can be received at the personal computing device a from an identity provider system over a telecommunications network.
Device for sending confidential messages using a mobile telephone (gadget)
October 04, 2018 - N°20180288012

The invention relates to the art of confidential communication. The technical result is that of providing a device user with the possibility of selecting one of two modes of communication, namely conventional communication or confidential communication for providing protection against unauthorized access.
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Systems and methods for digital identity management and permission controls within distributed network nodes
October 04, 2018 - N°20180287800

Embodiments disclosed herein provide systems and methods for digital identity management and permission controls within distributed network nodes. A network node may receive a request to generate a new digital identity record for an entity.
Chassis-based cryptographic affinities
October 04, 2018 - N°20180287791

Cryptographic affinities are generated to improve security in data centers. When a blade server is hot swapped, the cryptographic affinities protect electronic data stored within the blade server.
Method and system for spacetime-constrained oblivious transfer
October 04, 2018 - N°20180287788

A method for performing spacetime-constrained oblivious transfer between a party a and a party b. The method includes imposing relativistic signaling constraints on a cryptographic task of one out-of-m oblivious transfer involving parties a and b.
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and system for hierarchical cryptographic key management
October 04, 2018 - N°20180287785

A hierarchical cryptographic key management system encrypts data at a granular level with a data key generated by the system, and the data key is encrypted by a wrap key acquired from a key provider system. The encrypted form of the wrap key, the encrypted form of the data key, and the encrypted form of the data are stored in ...
Method for cryptographic communication based on pure chance
October 04, 2018 - N°20180287781

A cryptographic communications system enables two entities related by an insecure communication channel and having initially no privately shared knowledge, to agree on a shared unconditionally secure information. Each one of the entities has the capability to generate a new form of randomness called deep random, such that any other entity than itself cannot know anything about the probability distribution ...
White-box cryptography method and apparatus for preventing side channel analysis
October 04, 2018 - N°20180287779

Provided is a white-box cryptography method and apparatus for preventing side channel analysis. An input plain text is encrypted and output according to white-box cryptography and, in this case, the value output according to the encryption includes a first value corresponding to a value obtained by masking an intermediate value obtained by encrypting the plain text with a mask and ...
Method for producing a cryptographical signed transaction
October 04, 2018 - N°20180285866

Cryptographically signing the transaction by adding signature information.. .
Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ...
October 04, 2018 - N°20180285839

A data management system is disclosed for data provenance and data storage that allows multiple independent parties (who may not trust each other) to securely share data, track data provenance, maintain audit logs, keep data synchronized, comply with regulations, and handle permissioning and control who can access the data. The system leverages security guarantees derived from the computer systems already ...
Collaboration platform
October 04, 2018 - N°20180285818

Example embodiments described herein relate to an online social content collaboration platform that allows user devices to access content and create derivative works of content. A graph structure defines content and derivative works as nodes and relationships or links between the content and derivative works as edges.
Data processing device
October 04, 2018 - N°20180285602

A data processing device with a processor, a memory and an access control mechanism, the device having secure and non-secure modes, the memory having secure and non-secure regions, the secure region containing cryptographic data, and the access control mechanism preventing the processor from reading the cryptographic data when the device is operating in the non-secure mode. Also, methods of manufacturing ...
Crypto Patent Pack
Download 557+ patent application PDFs
Crypto Patent Applications
Download 557+ Crypto-related PDFs
For professional research & prior art discovery
inventor
  • 557+ full patent PDF documents of Crypto-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Data cryptography engine
October 04, 2018 - N°20180285575

Examples include a system comprising a processing resource and a memory resource. Examples include a cryptography engine arranged in-line with the processing resource and the memory resource.
Visual cryptography and obfuscation using augmented reality
October 04, 2018 - N°20180285573

A method and user device for preventing unauthorized viewing of at least one entity, e.g. Character, digit, image and/or shape, is provided.
Scalable audit analytics
October 04, 2018 - N°20180285479

The present invention provides a method to translate audit record data from nas systems into distributed multi storage and query node structure to allow parallel search and analytical queries to be scaled to millions or billions of records. This invention covers translation and transformation of data, relational query schema and methods to access and analyze audit data for specific patterns ...
Failover response using a known good state from a distributed ledger
October 04, 2018 - N°20180285217

Techniques for repair and/or recovery of computer program(s) installed on a programmable device using a distributed ledger that is based on cryptography and blockchain technology are described. One or more self-reliance logic/modules can commit, to a distributed ledger that resides on interconnected devices, records of watchdog communications between the devices.
Trusted food traceability system and method and sensor network
October 04, 2018 - N°20180284093

A food traceability and alert system utilizing blockchain or similar structures with cryptographic signatures, distributed sensors throughout the supply chain, and cloud infrastructure to provide trusted information from all states of the supply chain is disclosed.. .
Downloadable security and protection methods and apparatus
Time Warner Cable Enterprises Llc
September 27, 2018 - N°20180278597

Methods and apparatus for control of data and content protection mechanisms across a network using a download delivery paradigm. In one embodiment, conditional access (ca), digital rights management (drm), and trusted domain (td) security policies are delivered, configured and enforced with respect to consumer premises equipment (cpe) within a cable television network.
Sending a cryptogram to a pos while disconnected from a network
American Express Travel Related Services Company, Inc.
September 27, 2018 - N°20180278589

A system is configured for detecting a point of sale, receiving a personal identification number (pin), generating a pin based key using a message digest of the pin, decrypting a data encryption key (dek) using the pin based key, and generating a dek based dynamic key using the pin based key. The system may also decrypt a session key using ...
Online/offline signature system and method based on multivariate cryptography
South China University Of Technology
September 27, 2018 - N°20180278426

Disclosed is an offline/online signature system including a key distribution center (kdc) and a signature end, wherein the kdc includes a key generating module, an offline signature module, and a verification module; and the signature end includes an online signature module and a verification module. The key generating module generates a temporary signature required for online signature, and transmits ...
Loading