20 patents
Utility
Generating cryptographic function parameters based on an observed astronomical event
26 Apr 22
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 21 Jun 19
Utility
System and method for operating pseudorandom generators
19 Apr 22
A method for operating a pseudorandom generator is disclosed.
Robert John Lambert, Nevine Maurice Nassif Ebeid, Daniel Richard L. Brown, Atsushi Yamada
Filed: 5 Jun 19
Utility
Method and system for single purpose public keys for public ledgers
1 Mar 22
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
Daniel Richard L. Brown
Filed: 12 Oct 18
Utility
System and method for managing electronic assets
14 Sep 21
An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location.
Keelan Smith, Richard Gwynn Jones, Chinh Khac Nguyen, Thomas Rudolf Stiemerling
Filed: 10 Jul 19
Utility
Method and apparatus for providing an adaptable security level in an electronic communication
13 Jul 21
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message.
Marinus Struik
Filed: 1 Jul 19
Utility
In-vehicle networking
30 Mar 21
A system and method for securing communication across an in-vehicle bus, includes establishing a connection between a gateway in a vehicle and the in-vehicle bus; generating a session key at the gateway within the vehicle; transmitting a public key certificate and ephemeral key to the gateway and an electronic control unit of the vehicle; generating a shared secret at the gateway and the electronic control unit, respectively; encrypting the session key with the shared secret at the gateway; receiving the encrypted session key through the in-vehicle bus at the electronic control unit; and decrypting the encrypted session key based on the shared secret generated at the electronic control unit.
James Robert Alfred, Sergei Sidorov, Ming Chee Tsang, Scott Lee Linke
Filed: 16 Apr 19
Utility
Generating cryptographic function parameters from compact source code
9 Mar 21
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 1 Aug 19
Utility
System and Method for Operating Pseudorandom Generators
9 Dec 20
A method for operating a pseudorandom generator is disclosed.
Robert John LAMBERT, Nevine Maurice Nassif EBEID, Daniel Richard L. BROWN, Atsushi YAMADA
Filed: 4 Jun 19
Utility
Elliptic Curve Random Number Generation
18 Nov 20
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random.
Daniel Richard L. BROWN, Scott Alexander VANSTONE
Filed: 23 Jul 20
Utility
Method for validating messages
19 Oct 20
A method of processing a notification that is broadcast by a source server is disclosed.
Michael Eoin Buckley, Robert John Lambert, Nevine Maurice Nassif Ebeid
Filed: 28 Mar 19
Utility
Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication
29 Jul 20
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message.
Marinus STRUIK
Filed: 16 Apr 20
Utility
Method and System for Cheon Resistant Static Diffie-hellman Security
10 Jun 20
A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
Daniel Richard L. BROWN
Filed: 18 Oct 18
Utility
Method and system for key agreement utilizing semigroups
27 Apr 20
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
Daniel Richard L. Brown
Filed: 27 Nov 17
Utility
Method and System for Single Purpose Public Keys for Public Ledgers
15 Apr 20
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
Daniel Richard L. Brown
Filed: 11 Oct 18
Utility
Implicitly Certified Digital Signatures
22 Jan 20
Methods, systems, and computer programs for using an implicit certificate are disclosed.
Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN
Filed: 2 Oct 18
Utility
Method and Aparatus for Providing an Adaptable Security Level in an Electronic Communication
25 Dec 19
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message.
Marinus STRUIK
Filed: 30 Jun 19
Utility
System and Method for Managing Electronic Assets
4 Dec 19
An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location.
Keelan SMITH, Richard Gwynn JONES, Chinh Khac NGUYEN, Thomas Rudolf STIEMERLING
Filed: 9 Jul 19
Utility
Generating Cryptographic Function Parameters From Compact Source Code
20 Nov 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. BROWN
Filed: 31 Jul 19
Utility
Generating Cryptographic Function Parameters Based on an Observed Astronomical Event
16 Oct 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 20 Jun 19
Utility
Securing Method for Lawful Interception
9 Oct 19
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Michael Eoin BUCKLEY, Michael Charles HOLLATZ, Robert John LAMBERT, Nevine Maurice Nassif EBEID
Filed: 22 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first