Featured patents

System and Method for Secure Broadcast Communication
US 08761394 B2, June 24, 2014, Wireless communication, William Michael Beals et al. / EchoStar Technologies L.L.C. (Englewood, US)
A method for enabling providing a communication device to decrypt and decode…

Key Creation and Rotation for Data Encryption
US 08774403 B2, July 8, 2014, Multiple key level, Jeffrey Earl MacMillan et al. / Dark Matter Labs, Inc. (Victoria, BC, CA)
A method for cryptographic processing of data using a network device that is…

Method of Providing a Portable True Random Number Generator Based on the Microstructure and Noise Found in Digital Images
US 08750504 B1, June 10, 2014, Having particular key generator, Marie Lise Lavoie et al. / Cape Light Institute Incorporated (Grand Barachois, New Brunswick, CA)
A method of generating true random numbers, said method comprising steps of:…

Elliptic Curve Cryptography With Fragmented Key Processing and Methods for Use Therewith
US 08705730 B2, April 22, 2014, Particular Algorithmic Function Encoding, Zeev Lieber et al. / Morega Systems Inc. (Toronto, Ontario, CA)
A cryptography module comprising:…

Endecryptor Capable of Performing Parallel Processing and Encryption/Decryption Method Thereof
US 08666064 B2, March 4, 2014, Particular Algorithmic Function Encoding, Hong-Mook Choi et al. / Samsung Electronics Co., Ltd. KR
An encryption/decryption method of an endecryptor, comprising:…

Key Agreement and Re-Keying Over a Bidirectional Communication Path
US 08615086 B2, Dec. 24, 2013, Key Management, Herbert Anthony Little et al. / BlackBerry Limited (Waterloo, Ontario, CA)
A method to be carried out by a first system, the method comprising:…

System and Method for Performing Exponentiation in a Cryptographic System
US 08577028 B2, Nov. 5, 2013, Public key, Nevine Maurice Nassif Ebeid et al. / Certicom Corp. (Mississauga, Ontario, CA)
A method of computing an exponentiated message of the form s=m d mod n…

Recovery From Decryption Errors in a Sequence of Communication Packets
US 08582768 B2, Nov. 12, 2013, Communication System Using Cryptography, Danny Alexander et al. / Marvell World Trade Ltd. (St. Michael, BB)
A method, comprising:…

Method for Real-Time Compositing of Encrypted Video Streams Without Decryption
US 08526609 B1, Sept. 3, 2013, Video Cryptography, Andrew Shane Huang / BBY Solutions, Inc. (Richfield, US)
A method for real-time compositing of an encrypted video stream without…

Managing User Access in a Communications Network
US 08462947 B2, June 11, 2013, Cellular Telephone Cryptographic Authentication, Mats Näslund et al. / Telefonaktiebolaget L M Ericsson (publ) (Stockholm, SE
A method of operating an authentication proxy in a visited network for performing…

Patentorg has 1263 documents under Cryptography Patents.

Narrow down the browsing criteria below to see more patents.

Select a subcategory
Quick navigation
New documents
  • Process for the Production of the Actinobacillus Pleuropneumoniae Toxins APXI or APXIII in a Liquid Culture Medium Under Supply of Air Enriched in Carbon Dioxide
  • Method for Manufacturing Nonvolatile Memory Device
  • Supply Chain Demand Satisfaction
  • Supply-Line Management Device
  • Storage Control Device and Method for Managing Snapshot