Featured patents

Methods and Apparatus for Protecting Digital Content
US 08831213 B2, Sept. 9, 2014, Particular Algorithmic Function Encoding, Gary L. Graunke et al. / Intel Corporation (Santa Clara, US)
A processing system capable of receiving and presenting protected digital…

Encryption of Large Amounts of Data Using Secure Encryption Methods
US 08867743 B1, Oct. 21, 2014, Symmetric key synchronization, Rajeshwar Salvaji et al. / MGM Resorts International (Las Vegas, US)
A method for encrypting data, comprising:…

Production of Cryptographic Keys for an Embedded Processing Device
US 08761390 B2, June 24, 2014, Nonlinear, Sethu K. Madhavan et al. / General Motors (Detroit, US)
A method of producing cryptographic keys for use in communicating…

Subchannel Security at the Optical Layer
US 08705741 B2, April 22, 2014, Fiber optic network, Karl May et al. / Vello Systems, Inc. (Menlo Park, US)
A method of providing security at the physical layer of an optical network by…

Direct Delivery of Content Descrambling Keys Using Chip-Unique Code
US 08693692 B2, April 8, 2014, Key distribution center, Howard Pinder / Cisco Technology, Inc. (San Jose, US)
A method comprising:…

System and Method for Decryption of Content Including Disconnected Encryption Chains
US 08687809 B2, April 1, 2014, Transmitting a seed, sequence, or initial value, Saayan Mitra et al. / Adobe Systems Incorporated (San Jose, US)
A computer-implemented method, comprising:…

Architecture and Instruction Set for Implementing Advanced Encryption Standard (AES)
US 08634550 B2, Jan. 21, 2014, Particular Algorithmic Function Encoding, Shay Gueron et al. / Intel Corporation (Santa Clara, US)
Non-transitory computer-usable memory that stores an instruction to be decoded…

Method for Partially Encrypting Program Data
US 08577033 B2, Nov. 5, 2013, Encrypted code control signal, Howard G. Pinder et al.
A method for providing a plurality of programs in a conditional access system,…

Controlling the Validity Period of a Decryption Key
US 08520856 B2, Aug. 27, 2013, Key Management, Steeve Huin / Irdeto B.V. NL
A method for controlling a validity of a decryption key in a broadcast system…

XZ-elliptic Curve Cryptography System and Method
US 08509426 B1, Aug. 13, 2013, Particular Algorithmic Function Encoding, Mohammad K. Ibrahim et al. / King Fahd University of Petroleum and Minerals (Dhahran, SA)
A computerized method of performing XZ-elliptic curve cryptography, comprising…

Patentorg has 1263 documents under Cryptography Patents.

Narrow down the browsing criteria below to see more patents.

Select a subcategory
Quick navigation
New documents
  • Process for the Production of the Actinobacillus Pleuropneumoniae Toxins APXI or APXIII in a Liquid Culture Medium Under Supply of Air Enriched in Carbon Dioxide
  • Method for Manufacturing Nonvolatile Memory Device
  • Supply Chain Demand Satisfaction
  • Supply-Line Management Device
  • Storage Control Device and Method for Managing Snapshot