11 patents
Utility
System and Method for Operating Pseudorandom Generators
9 Dec 20
A method for operating a pseudorandom generator is disclosed.
Robert John LAMBERT, Nevine Maurice Nassif EBEID, Daniel Richard L. BROWN, Atsushi YAMADA
Filed: 4 Jun 19
Utility
Elliptic Curve Random Number Generation
18 Nov 20
An elliptic curve random number generator avoids escrow keys by choosing a point Q on the elliptic curve as verifiably random.
Daniel Richard L. BROWN, Scott Alexander VANSTONE
Filed: 23 Jul 20
Utility
Method and Apparatus for Providing an Adaptable Security Level in an Electronic Communication
29 Jul 20
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a frame type, and including an indication of the frame type in a header of the message.
Marinus STRUIK
Filed: 16 Apr 20
Utility
Method and System for Cheon Resistant Static Diffie-hellman Security
10 Jun 20
A method for providing Cheon-resistance security for a static elliptic curve Diffie-Hellman cryptosystem (ECDH), the method including providing a system for message communication between a pair of correspondents, a message being exchanged in accordance with ECDH instructions executable on computer processors of the respective correspondents, the ECDH instructions using a curve selected from a plurality of curves, the selecting including choosing a range of curves; selecting, from the range of curves, curves matching a threshold efficiency; excluding, within the selected curves, curves which may include intentional vulnerabilities; and electing, from non-excluded selected curves, a curve with Cheon resistance, the electing comprising a curve from an additive group of order q, wherein q is prime, such that q−1=cr and q+1=ds, where r and s are primes and c and d are integer Cheon cofactors of the group, such that cd≤48.
Daniel Richard L. BROWN
Filed: 18 Oct 18
Utility
Method and System for Single Purpose Public Keys for Public Ledgers
15 Apr 20
A method at a computing device in a public ledger cryptography system, the method including creating a purpose string, the purpose string defining transaction parameters for an account within the public ledger cryptography system; using the purpose string to create a private key and associated public key for an account within the public ledger cryptography system; and providing the purpose string for use in verification of a transaction from the account within the public ledger cryptography system.
Daniel Richard L. Brown
Filed: 11 Oct 18
Utility
Implicitly Certified Digital Signatures
22 Jan 20
Methods, systems, and computer programs for using an implicit certificate are disclosed.
Gregory Marc ZAVERUCHA, David William KRAVITZ, Daniel Richard L. BROWN
Filed: 2 Oct 18
Utility
Method and Aparatus for Providing an Adaptable Security Level in an Electronic Communication
25 Dec 19
A method of communicating in a secure communication system, comprises the steps of assembling a message at a sender, then determining a security level, and including an indication of the security level in a header of the message.
Marinus STRUIK
Filed: 30 Jun 19
Utility
System and Method for Managing Electronic Assets
4 Dec 19
An asset management system is provided which comprises one or more controllers, which operate as main servers and can be located at the headquarters of an electronic device manufacturer to remotely control their operations at any global location.
Keelan SMITH, Richard Gwynn JONES, Chinh Khac NGUYEN, Thomas Rudolf STIEMERLING
Filed: 9 Jul 19
Utility
Generating Cryptographic Function Parameters From Compact Source Code
20 Nov 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. BROWN
Filed: 31 Jul 19
Utility
Generating Cryptographic Function Parameters Based on an Observed Astronomical Event
16 Oct 19
Methods, systems, and computer programs for generating cryptographic function parameters are described.
Daniel Richard L. Brown
Filed: 20 Jun 19
Utility
Securing Method for Lawful Interception
9 Oct 19
A method is presented for secure communication, the method including generating a signature using a private key, a nonce, and at least one of an identifier and a key component; and transmitting the signature, the nonce, a security parameter, and the at least one of the identifier and the key component, wherein the security parameter associates a user identity with a public key, the public key being associated with the private key.
Michael Eoin BUCKLEY, Michael Charles HOLLATZ, Robert John LAMBERT, Nevine Maurice Nassif EBEID
Filed: 22 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first