20 patents
Utility
Generating cryptographic function parameters based on an observed astronomical event
26 Apr 22
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 21 Jun 19
Utility
System and method for operating pseudorandom generators
19 Apr 22
A method for operating a pseudorandom generator is disclosed.
Robert John Lambert, Nevine Maurice Nassif Ebeid, Daniel Richard L. Brown, Atsushi Yamada
Filed: 5 Jun 19
Utility
zbka6kue4pnmnzkud6c61g2d6j964b6hp2n 0c15mcm7d
1 Mar 22
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
Daniel Richard L. Brown
Filed: 12 Oct 18
Utility
88il9x8ibktrg067bzm1lntiib7n27ogyla9xna7x72zznzftb53v9il6
14 Sep 21
An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location.
Keelan Smith, Richard Gwynn Jones, Chinh Khac Nguyen, Thomas Rudolf Stiemerling
Filed: 10 Jul 19
Utility
gsva91bxfvfe1sgr 31t40lwlee2q1xzkn89765ngvnztt30t
13 Jul 21
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message.
Marinus Struik
Filed: 1 Jul 19
Utility
zgzzj3tdoq1kgorobdza67roussryrvq9sc3
30 Mar 21
A system and method for securing communication across an in-vehicle bus, includes establishing a connection between a gateway in a vehicle and the in-vehicle bus; generating a session key at the gateway within the vehicle; transmitting a public key certificate and ephemeral key to the gateway and an electronic control unit of the vehicle; generating a shared secret at the gateway and the electronic control unit, respectively; encrypting the session key with the shared secret at the gateway; receiving the encrypted session key through the in-vehicle bus at the electronic control unit; and decrypting the encrypted session key based on the shared secret generated at the electronic control unit.
James Robert Alfred, Sergei Sidorov, Ming Chee Tsang, Scott Lee Linke
Filed: 16 Apr 19
Utility
ndzmey880ykz5ux0qg jcov4ux44s9i2rydqzl
9 Mar 21
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 1 Aug 19
Utility
1hjs620cgb834gepa16apl4cy0k8u pjs060ks2xeaslw
9 Dec 20
A method for operating a pseudorandom generator is disclosed.
Robert John LAMBERT, Nevine Maurice Nassif EBEID, Daniel Richard L. BROWN, Atsushi YAMADA
Filed: 4 Jun 19
Utility
ivta 5qqgu4x3d2ugz3j5zozxpq1ybk1fn2kyajd
18 Nov 20
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random.
Daniel Richard L. BROWN, Scott Alexander VANSTONE
Filed: 23 Jul 20
Utility
ces0uur5ue73krx g9x7lijrf06nc0iat1xl8fuvsozyc
19 Oct 20
A method of processing a notification that is broadcast by a source server is disclosed.
Michael Eoin Buckley, Robert John Lambert, Nevine Maurice Nassif Ebeid
Filed: 28 Mar 19
Utility
yx48w3hjeur0w7u1w2sf3m8o8r4oy6dhb3qke38u8az6nkc 3p
29 Jul 20
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message.
Marinus STRUIK
Filed: 16 Apr 20
Utility
eguxj992tlap8ifq3w5qwtd6gspetvw67u3dy7ype rg7
10 Jun 20
A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
Daniel Richard L. BROWN
Filed: 18 Oct 18
Utility
fgzoltly9eouoteszumwspgxg
27 Apr 20
A method for key agreement between a first party and a second party over a public communications channel, the method including selecting, by the first party, from a semigroup, a first value “a”; multiplying the first value “a” by a second value “b” to create a third value “d”, the second value “b” being selected from the semigroup; sending the third value “d” to the second party; receiving, from the second party, a fourth value “e”, the fourth value comprising the second value “b” multiplied by a fifth value “c” selected by the second party from the semigroup; and creating a shared secret by multiplying the first value “a” with the fourth value “e”, wherein the shared secret matches the third value “d” multiplied by the fifth value “c”.
Daniel Richard L. Brown
Filed: 27 Nov 17
Utility
3p9pan3ctjinv39zhoztdw1cedvb
15 Apr 20
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
Daniel Richard L. Brown
Filed: 11 Oct 18
Utility
mx9520zam5d9jeefro7e0k 1g8mngf0ywuhxqphla9alu
22 Jan 20
Methods, systems, and computer programs for using an implicit certificate are disclosed.
Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN
Filed: 2 Oct 18
Utility
oeqjw0nr9s1mvw81mbvkgrokq
25 Dec 19
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message.
Marinus STRUIK
Filed: 30 Jun 19
Utility
o6pc18p86pjvvrvqh6eucocgbdw92
4 Dec 19
An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location.
Keelan SMITH, Richard Gwynn JONES, Chinh Khac NGUYEN, Thomas Rudolf STIEMERLING
Filed: 9 Jul 19
Utility
l3hkbqrbac7gf7mi9j3yp
20 Nov 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. BROWN
Filed: 31 Jul 19
Utility
cbe1b5yp6pvqgxtjs72kwjqtbf2iyy4l2o3uhadcmrw33xnwt8ndm8jg
16 Oct 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 20 Jun 19
Utility
d609hp7t8axs1igkhzmdy
9 Oct 19
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Michael Eoin BUCKLEY, Michael Charles HOLLATZ, Robert John LAMBERT, Nevine Maurice Nassif EBEID
Filed: 22 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first