Search Patents
  • Publication number: 20240061942
    Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
    Type: Application
    Filed: October 27, 2023
    Publication date: February 22, 2024
    Applicant: Intel Corporation
    Inventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
  • Publication number: 20170208040
    Abstract: Systems and methods for sharing data between a first node and second node are disclosed. The methods may include sharing a first initialization vector between a first node and a second node using a multi-stage cryptography protocol. A first bit stream of first information may be passed from the first node to the second node using a single-stage cryptography protocol that encodes a message with the first initialization vector.
    Type: Application
    Filed: July 11, 2014
    Publication date: July 20, 2017
    Inventors: Pramode Verma, Bhagyashri Darunkar, Nikhil Punekar
  • Patent number: 9735955
    Abstract: Systems and methods for sharing data between a first node and second node are disclosed. The methods may include sharing a first initialization vector between a first node and a second node using a multi-stage cryptography protocol. A first bit stream of first information may be passed from the first node to the second node using a single-stage cryptography protocol that encodes a message with the first initialization vector.
    Type: Grant
    Filed: July 11, 2014
    Date of Patent: August 15, 2017
    Assignee: The Board of Regents of the University of Oklahoma
    Inventors: Pramode Verma, Bhagyashri Darunkar, Nikhil Punekar
  • Publication number: 20160365982
    Abstract: The present invention provides an efficient secure end-to-end messaging system utilizing encrypted ephemeral messages. The method comprises the steps of using a combination of HTTPS for transport security, using symmetric key cryptography with rotating temporary keys for individual message security, and using elliptic curve cryptography for key derivation and message authentication. The key rotation scheme used provides forward secrecy between messages and sessions.
    Type: Application
    Filed: July 29, 2016
    Publication date: December 15, 2016
    Inventors: Timothy Tutt, John Richard Sherwood
  • Publication number: 20250254041
    Abstract: An encoded human readable datum (EHRD) can be generated wherein the creator of the EHRD maintains control over the metadata associated with the EHRD. This metadata can be used to inform service providers how to send and receive communications with the owner of the EHRD. The metadata data associated with this EHRD can be updated. Controlling who can update the metadata associated with the EHRD is secured using cryptography, blockchain technology, or cryptography and blockchain technology.
    Type: Application
    Filed: April 4, 2023
    Publication date: August 7, 2025
    Applicant: 3NUM Inc.
    Inventor: Christopher Daniel Boscolo
  • Patent number: 10411891
    Abstract: A method for computing the distance between two encrypted data vectors using elliptic curve cryptography.
    Type: Grant
    Filed: June 28, 2017
    Date of Patent: September 10, 2019
    Assignee: NXP B.V.
    Inventors: Marc Joye, Yan Michalevsky
  • Patent number: 7805601
    Abstract: Disclosed is a computerized apparatus and method for version control and management. The apparatus includes a cryptography boot loader, a control module on key usage, and one or more agents. After the user's device is powered on, the cryptography boot loader stores a user key, and checks an operating system (OS) certificate for an OS and an application certificate for an application to determine whether these certificates are valid. Then, a right object is obtained with a user certificate through an agent. The control module on key usage compares the OS version and the application version with the version required by the right object. The permission access to the user key is determined by the comparison result. This invention associates the cryptography component with the boot loader to develop a security mechanism performed by OS and application for using a secret key.
    Type: Grant
    Filed: July 23, 2007
    Date of Patent: September 28, 2010
    Assignee: Industrial Technology Research Institute
    Inventors: Yaudeh Tseng, Shin-Yan Chiou
  • Patent number: 11387978
    Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
    Type: Grant
    Filed: September 23, 2020
    Date of Patent: July 12, 2022
    Assignee: Live Nation Entertainment, Inc.
    Inventor: Adam Meghji
  • Publication number: 20200136816
    Abstract: An example authentication server system comprising: a processor; and a memory resource storing machine readable instructions executable by the processor to: receive an input from a device indicating a request to log into the system; verify the input from the device using an asymmetric cryptography key pair; deny access to the device in response to the input failing to correspond to the asymmetric cryptography key pair; and inactivate an account of the device based on a number of attempt failures exceeding a failure threshold.
    Type: Application
    Filed: October 29, 2018
    Publication date: April 30, 2020
    Inventors: Bhagya Prasad Nittur, Pattabhi Attaluri
  • Patent number: 12184753
    Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
    Type: Grant
    Filed: July 11, 2022
    Date of Patent: December 31, 2024
    Assignee: Live Nation Entertainment, Inc.
    Inventor: Adam Meghji
  • Patent number: 11816229
    Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
    Type: Grant
    Filed: August 13, 2021
    Date of Patent: November 14, 2023
    Assignee: Intel Corporation
    Inventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
  • Patent number: 12299143
    Abstract: An apparatus is described including cryptography circuitry to generate authentication tags to provide integrity protection for plaintext and ciphertext.
    Type: Grant
    Filed: October 27, 2023
    Date of Patent: May 13, 2025
    Assignee: Intel Corporation
    Inventors: Reuven Elbaum, Gyora Benedek, Avinash L. Varna, David Novick
  • Patent number: 11062046
    Abstract: Systems, methods, and computer-executable instructions for protecting data that includes receiving a request for a first data value. A data store is queried for a first stored data value. The first stored data value is received which contains a security prefix and encrypted data. From the security prefix, a cryptography algorithm and a key are determined. The encrypted data is decrypted using the cryptography algorithm and the key. The decrypted data is returned.
    Type: Grant
    Filed: January 11, 2021
    Date of Patent: July 13, 2021
    Assignee: DeCurtis LLC
    Inventor: Ajay Thapar
  • Publication number: 20210119764
    Abstract: The present disclosure generally relates to securing access to resource and access rights using cryptography and the blockchain. Certain embodiments of the present disclosure generally relate to systems and methods that enhance the security of resource access using hierarchical deterministic (HD) cryptography and the blockchain. Certain embodiments of the present disclosure relate to systems and methods that securely and anonymously represent the identity of a user and the user's access code data on a distributed ledger represented across the blockchain.
    Type: Application
    Filed: September 23, 2020
    Publication date: April 22, 2021
    Inventor: Adam Meghji
  • Publication number: 20240195640
    Abstract: Solutions and methods are disclosed herein for generating a key from outputs of a Physically Unclonable Function (PUF) and using the key for a cryptographic algorithm. In one embodiment, a device generates the key, which comprises (i) receiving a request to generate a key comprising a defined number of bits for a particular cryptography algorithm and (ii) responsive to receiving the request, generating a valid key for the particular cryptography algorithm. The step of generating the valid key further comprises (a) generating one or more first challenges for a PUF, which is one or more of a plurality of challenges in a challenge space of the PUF, (b) generating a first potential key based on one or more first responses by the PUF responsive to the one or more first challenges, and (c) determining whether the first potential key satisfies one or more predefined criteria for the particular cryptography algorithm.
    Type: Application
    Filed: April 23, 2021
    Publication date: June 13, 2024
    Inventors: Niklas Lindskog, Håkan Englund
  • Publication number: 20180137293
    Abstract: A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key, generating a user key, generating a volume initialization vector, generating an intermediate key, generating a user volume key, and performing cryptography operations on data blocks within an individual volume of data using the volume master key, the user key, the volume initialization vector, the intermediate key, and the user volume key.
    Type: Application
    Filed: November 15, 2017
    Publication date: May 17, 2018
    Applicant: StorageOS Limited
    Inventors: André Lucas, Alex Chircop
  • Patent number: 10733305
    Abstract: A method for performing cryptography operations on data blocks within a volume of data is disclosed. The method involves generating a volume master key, generating a user key, generating a volume initialization vector, generating an intermediate key, generating a user volume key, and performing cryptography operations on data blocks within an individual volume of data using the volume master key, the user key, the volume initialization vector, the intermediate key, and the user volume key.
    Type: Grant
    Filed: November 15, 2017
    Date of Patent: August 4, 2020
    Assignee: StorageOS Limited
    Inventors: André Lucas, Alex Chircop
  • Patent number: 7519178
    Abstract: A method, system and apparatus are described for ensuring a uniform random distribution of keys generated for cryptography. These generated keys, are depicted utilizing a trusted third party, or Certification Authority (CA) in the generation of a reliable seed to be used in the generation of prime numbers used in public key cryptography. The inclusion of the trusted third party allows for an independent third party to police against first party attacks on the security of the system without increasing the overhead of the system significantly.
    Type: Grant
    Filed: February 24, 1999
    Date of Patent: April 14, 2009
    Assignee: International Business Machines Corporation
    Inventors: Stephen Michael Matyas, Jr., Allen Roginsky
  • Publication number: 20040123096
    Abstract: Methods and apparatus are provided for handling data at a cryptography accelerator output interface. A shared resource such as a shared output buffer is provided at the cryptography accelerator output interface having multiple output ports. The output interface shared resource can be allocated amongst the various output ports based on characteristics and requirements of the various input ports. References to data in the shared resource allow processing and ordering of data following processing by cryptographic processing cores.
    Type: Application
    Filed: January 23, 2003
    Publication date: June 24, 2004
    Applicant: Broadcom Corporation
    Inventors: Mark Buer, Donald P. Matthews
  • Patent number: 9300639
    Abstract: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The service may utilize multiple security modules. A coordinator may coordinate the security modules to ensure that the security modules operate with consistent operational parameters. A security module may propose a set of parameters for acceptance by the coordinator. If accepted, the coordinator may update the security modules in accordance with the proposal.
    Type: Grant
    Filed: June 13, 2013
    Date of Patent: March 29, 2016
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt
Narrow Results

Filter by US Classification