Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method for providing a space puzzle
Nec Laboratories Europe Gmbh
July 12, 2018 - N°20180198632

A method for providing a space puzzle includes computing, by a puzzle generating entity (pge), a master secret key (msk), a public key (pk), a random predicate (rp), and a secret key (sk) using the computed msk and the computed rp; providing, by the pge, a challenge comprising the pk and the sk to a proving computing entity; computing, by ...
Verified boot and key rotation
Google Llc
July 12, 2018 - N°20180198629

Methods, systems, and apparatus, including computer-readable media, for verified boot and key rotation. In some implementations, a device extracts a public key from a secure data storage area of the device.
Techniques for genuine device assurance by establishing identity and trust using certificates
Honeywell International Inc.
July 12, 2018 - N°20180198628

A method includes verifying that firmware of a device is trusted and contains a root of trust. The method also includes verifying that a protected storage of the device contains a private or secret key associated with a device certificate that is stored in a persistent storage of the device.
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and authentication system for automatic re-authentication
I.x Innovation Co., Ltd.
July 12, 2018 - N°20180198625

A method for automatic re-authentication is provided. The method includes: transmitting, by a client device, a challenge to a key device; signing, by the key device, the challenge with a digital signature generated by using a private key and transmitting the digital signature of the challenge to the service server when the key device is connected to the client device; ...
Strong resource identity in a cloud hosted system
Microsoft Technology Licensing, Llc
July 12, 2018 - N°20180198612

Aspects of the present disclosure relate to systems and methods for providing strong resource identification. When a resource is created, saved, or re-based, a cryptographic key pay may be generated and associated with the resource.
Confidential communication management
July 12, 2018 - N°20180198606

Systems and methods are provided for confidential communication management. For example, a client computer can determine a client key pair comprising a client private key and a client public key.
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
Institutional Cash Distributors Technology, Llc
July 12, 2018 - N°20180196950

Functional data for use in one or more digital transactions are secured by using an encapsulated security token (est). In certain embodiments, the est is created by encapsulating digital data including the functional data using at least two cryptographic systems of two parties.
Providing low risk exceptional access with verification of device possession
July 05, 2018 - N°20180192287

A method and system for providing unencrypted access to encrypted data that may be stored on a device, sent as a message, or sent as a real-time communications stream. The method may include using public key cryptography to securely enable accessing the encrypted data stored on a device or communicated by a device.
Secure registration and ignition of network nodes on a multi-hop wireless network
Facebook, Inc.
July 05, 2018 - N°20180191694

In one embodiment, a method includes receiving from a requesting network node identifying information, and accessing registration information of previously registered network nodes of a multi-hop wireless network. The registration information includes a firmware hash or a serial number of the previously registered network node.
Creating and utilizing black keys for the transport layer security (tls) handshake protocol and method ...
Cyphre, Llc
July 05, 2018 - N°20180191691

A non-transitory computer-readable medium comprising a black zone and a plurality of other electronic components for protecting a data exchange from a malicious attack on the data, that when executed on a processor, perform the steps comprising receiving a client hello message from a client, transmitting a server hello message, receiving a pre-master secret message encrypted with a server public ...
Systems and methods for bootstrapping ecosystem certificate issuance
Cable Television Laboratories, Inc
July 05, 2018 - N°20180191508

An ecosystem for managing a public key infrastructure (pki) includes an electronic device having at least one silicon component, an ecosystem manager configured to create at least one pki keypair, a root certificate, and a bootstrapping certificate, and a device manufacturer configured to integrate into the electronic device the at least one silicon component. The device manufacturer is further configured ...
Accelerated encryption and decryption of files with shared secret and method therefor
Cyphre, Llc
July 05, 2018 - N°20180191495

A non-transitory computer-readable medium for sharing protected content, comprising instruction stored thereon. When executed on a processor, the instruction performs steps of deriving a shared secret, processing the shared secret using a secure hash algorithm 256 cryptographic hash to produce a primary encryption key, and encrypting a secondary encryption key using the primary encryption key.
Method for providing united point service using updated status of balance database with blockchain and ...
Coinplug, Inc.
July 05, 2018 - N°20180189878

A method of registering a point distributor and an exchange rate for a united point service is provided. The method includes steps of: a system managing server (a) verifying a registration transaction trxa or a confirmation transaction trxb if (i) a condition that the trxa having a public key of a point managing server, and a first xea, an exchange ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure boot sequencer and secure boot device
Samsung Electronics Co., Ltd.
July 05, 2018 - N°20180189495

A boot secure device that performs a secure booting operation of a semiconductor system includes an external memory interface that provides an interface with an external memory, a first internal memory that stores a boot image stored in the external memory, a second internal memory that stores a hash of a first public key, a secure accelerator that verifies the ...
Key revocation
Amazon Technologies, Inc.
June 28, 2018 - N°20180183771

A signature authority generates revocable one-time-use keys that are able to generate digital signatures. The signature authority generates a set of one-time-use keys, where each one-time-use key has a secret key and a public key derived from a hash of the secret key.
Control system and control method
Industrial Technology Research Institute
June 28, 2018 - N°20180183769

A control system comprises a server and a gateway. The server is configured to encrypt a control signal according to a public key for generating a first encrypted signal.
Systems and methods for privacy in distributed ledger transactions
Jpmorgan Chase Bank, N.a.
June 28, 2018 - N°20180183768

Systems and methods for privacy in distributed ledger transactions are disclosed. In one embodiment, in an information processing apparatus comprising at least one computer processor for a first node in a computer network comprising a plurality of nodes, a method for generating a key directory in a network comprising a plurality of nodes may include: (1) advertising a public key for ...
Verifying authenticity of computer readable information using the blockchain
Wal-mart Stores, Inc.
June 28, 2018 - N°20180183606

A method for ensuring that a computer readable information is authentic, including: generating a public key associated with the computer readable information, hashing the computer readable information to obtain a hashed computer readable information, encrypting the hashed computer readable information with a private key to create a digital signature, wherein the hashed computer readable information and the digital signature are ...
Cloud authentication of layer 2-connected member devices via an ip-connected active device
Brocade Communications Systems, Inc.
June 28, 2018 - N°20180183604

Techniques for enabling cloud authentication of layer 2-connected member devices via an ip-connected active device are provided. In one set of embodiments, the member device can transmit, to the active device, a request to authenticate the member device with a cloud management platform.
Signature delegation
Amazon Technologies, Inc.
June 28, 2018 - N°20180183602

A signature authority generates a master seed value that is used as the root of a seed tree of subordinate nodes. Each subordinate node of the seed tree is generated from the value of its parent node using a cryptographic hash or one-way function.
Location aware cryptography
Cryptography Research, Inc.
June 28, 2018 - N°20180183593

A first entity may provide a request to transmit data from the first entity to a second entity. The first entity may receive a session key from the second entity in response to the request where the session key is encrypted by a second key that is based on a combination of a public key and a location associated with ...
Loading