Matches 1 - 50 out of 232 1 2 3 4 5 >


Match Document Document Title Score
US20170118017 SYSTEMS AND METHODS FOR CRYPTOGRAPHY USING FOLDING UNIT COMPUTATIONS  
The systems and methods described herein provide computationally effective ways to calculate cryptography key pairs for a variety of cryptography applications, including but not limited to...
1000
US20170063566 INTERNET OF THINGS (IOT) INTELLIGENT ELECTRONIC DEVICES, SYSTEMS AND METHODS  
The present disclosure is directed to an intelligent electronic device (IED) configured for use in an Internet of Things (IoT) environment. The IoT environment of the present disclosure may...
906
US20170078087 DEVICE AND METHOD FOR RESONANT CRYPTOGRAPHY  
A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator,...
851
9425954 Device and method for resonant cryptography  
A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator,...
825
9660803 Device and method for resonant cryptography  
A system for secure communications using resonate cryptography includes a resonator that has a random number generator (RNG). The RNG can be at least one of a true random number generator,...
823
9614668 Conversion schemes for cryptography systems  
In a general aspect, a conversion scheme is used with a cryptographic system. In some aspects, a pad bit vector is generated based on a size of a message bit vector, and a record bit vector is...
745
9548860 Asymmetric-computing type shared key establishing method suitable for cloud computing and IoT  
An asymmetric-computing type shared key establishing method suitable for cloud computing and IoT has the following advantages. The realization efficiency and the security level are high, and a...
678
US20170177917 Biometric Cryptography Using Micromachined Ultrasound Transducers  
An embodiment includes an ultrasonic sensor system comprising: a backend material stack including a first metal layer between a substrate and a second metal layer with each of the first and second...
615
9645794 Homogeneous atomic pattern for double, add, and subtract operations for digital authentication using elliptic curve cryptography  
A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and...
588
US20160277933 Secure Data Communication system between IoT smart devices and a Network gateway under Internet of Thing environment  
It is secure to send/receive data with encrypted in IoT circumstance. This invention disclosure describes protocols that guarantees a secure communication and even, secure decoding even inside a...
578
US20170180340 System, Apparatus And Method For Safety State Management Of Internet Things (IoT) Devices  
In one embodiment, a device includes: at least one processor; at least one sensor to sense an environmental condition; and a storage to store instructions that, when executed by the at least one...
578
US20160087802 Homogeneous Atomic Pattern for Double, Add, and Subtract Operations for Digital Authentication Using Elliptic Curve Cryptography  
A method of performing finite field addition and doubling operations in an elliptic curve cryptography (ECC) authentication scheme as a countermeasure to side-channel attack. The addition and...
541
US20160149878 PROTECTING USER IDENTITY AND PERSONAL INFORMATION BY SHARING A SECRET BETWEEN PERSONAL IOT DEVICES  
A wearable device provides protection for personal identity information by fragmenting a key needed to release the personal identity information among members of a body area network of wearable...
497
US20160366181 SYSTEM, APPARATUS AND METHOD FOR SECURITY INTEROPERABILITY PATH ANALYSIS IN AN INTERNET OF THINGS (IOT) NETWORK  
In one embodiment, an apparatus comprises a first logic to receive security attribute information from a plurality of devices, generate a connectivity graph of the plurality of devices based at...
454
US20160378996 ESTABLISHING HARDWARE ROOTS OF TRUST FOR INTERNET-OF-THINGS DEVICES  
An Internet-of-Things (IoT) device platform to communicate in a trusted portion of an IoT network is disclosed. The trusted IoT platform can include a secure IoT system-on-chip (SoC) and can be...
398
US20170099353 Design and Systems Architecture for Internet of Things  
The description relates to managing physical locations with IoT devices. One example can include a sensor array assembly comprising an enclosure and a mounting element. The mounting element can...
379
9673977 Refreshing public parameters in lattice-based cryptographic protocols  
In a general aspect, a parameter is refreshed in a lattice-based cryptography system. In some aspects, a first value of a public parameter is obtained. The first value of the public parameter may...
372
US20160330285 HVAC CONTROLLER WITH INTEGRATED WIRELESS NETWORK PROCESSOR CHIP  
A controller in a building management system (BMS) includes an integrated wireless network processor chip. The integrated wireless network processor chip includes a wireless radio, a processor,...
314
9612930 Providing autonomous self-testing of a processor  
In an embodiment, a processor includes at least one core, a power management unit having a first test register including a first field to store a test patch identifier associated with a test patch...
296
US20170111333 System, Apparatus And Method For Migrating A Device Having A Platform Group  
In one embodiment, an apparatus comprises a processor to execute instructions and having at least a first logic to execute in a trusted execution environment, a secure storage to store a platform...
292
US20160366102 Self-Configuring Key Management System For an Internet of Things Network  
In one embodiment, a method includes receiving, in a first device, at least one of a first symmetric key and a first asymmetric key in a common key management structure, the common key management...
291
US20160364308 PROVIDING AUTONOMOUS SELF-TESTING OF A PROCESSOR  
In an embodiment, a processor includes at least one core, a power management unit having a first test register including a first field to store a test patch identifier associated with a test patch...
283
US20160323143 Method and apparatus for neuroplastic internet of things by cloud computing infrastructure as a service incorporating reconfigurable hardware  
IoT embedded systems as well as cloud computing infrastructure may merge processor soft cores with programmable logic (FPGAs) to yield a heterogeneous hardware-software processing ecosystem...
250
US20160072839 FACILITATING DYNAMIC MANAGEMENT OF PARTICIPATING DEVICES WITHIN A NETWORK IN AN ON-DEMAND SERVICES ENVIRONMENT  
In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic management of devices participating in a network in an on-demand services environment in an...
203
US20170118196 ENFORCING SERVER AUTHENTICATION BASED ON A HARDWARE TOKEN  
A method may include receiving, by a hardware token from a client device, a chain of certificates including a server certificate and a first root certificate authority (CA) certificate. The method...
203
9641327 Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)  
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the...
191
9319223 Key derivation for a module using an embedded universal integrated circuit card  
A module with an embedded universal integrated circuit card (eUICC) can include a first eUICC profile and a set of cryptographic algorithms. The first eUICC profile can include an initial shared...
190
US20160149709 Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)  
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the...
189
US20160321081 Embedded systems of internet-of-things incorporating a cloud computing service of FPGA reconfiguration  
IoT embedded systems as well as cloud computing infrastructure may merge processor soft cores with programmable logic (FPGAs) to yield a heterogeneous hardware-software processing ecosystem...
176
9276740 Systems and methods for “machine-to-machine” (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)  
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the...
173
US20160352732 System and Method for Continuous Authentication in Internet of Things  
A system for continuous authentication of internet of things (IoT) devices in a communication network utilizes lightweight authentication for a sequence of message transmissions in a specific...
170
9118464 Set of servers for “machine-to-machine” communications using public key infrastructure  
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of...
162
US20150106616 Systems and Methods for "Machine-to-Machine" (M2M) Communications Between Modules, Servers, and an Application using Public Key Infrastructure (PKI)  
Methods and systems are provided for supporting efficient and secure “Machine-to-Machine” (M2M) communications using a module, a server, and an application. A module can communicate with the...
160
US20150067329 METHOD AND SYSTEM FOR ESTABLISHING A SESSION KEY  
A system and a method is provided for establishing a session key in a context of communications between entities, the identifiers of which are generated cryptographically and for which one of the...
158
9608967 Method and system for establishing a session key  
A system and a method is provided for establishing a session key in a context of communications between entities, the identifiers of which are generated cryptographically and for which one of the...
158
US20160164678 Secure PKI Communications for "Machine-To-Machine" Modules, Including Key Derivation by Modules and Authenticating Public Keys  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module...
155
US20160234020 Key Derivation for a Module Using an Embedded Universal Integrated Circuit Card  
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial...
155
US20150121066 Set of Servers for "Machine-to-Machine" Communications using Public Key Infrastructure  
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of...
152
US20150304113 Set of Servers for "Machine-to-Machine" Communications Using Public Key Infrastructure  
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of...
152
9288059 Secure PKI communications for “machine-to-machine” modules, including key derivation by modules and authenticating public keys  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module...
151
9660978 Using a digital certificate with multiple cryptosystems  
In a general aspect, a digital certificate can be used with multiple cryptography systems (“cryptosystems”). In some cases, the digital certificate includes a public key field, which contains a...
149
US20150095648 Secure PKI Communications for "Machine-to-Machine" Modules, including Key Derivation by Modules and Authenticating Public Keys  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. A module can communicate with a server by accessing the Internet, and the module...
149
9596078 Set of servers for “machine-to-machine” communications using public key infrastructure  
A set of servers can support secure and efficient “Machine to Machine” communications using an application interface and a module controller. The set of servers can record data for a plurality of...
141
9300473 Module for “machine-to-machine” communications using public key infrastructure  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. The module and server can utilize public key infrastructure (PKI) such as public...
133
US20170180349 METHOD AND APPARATUS FOR PROVIDING A PROFILE  
A method for downloading a profile by a terminal and the terminal for performing the same are provided. The method includes acquiring information including an access token for transmitting a...
128
US20150296379 Embedded Universal Integrated Circuit Card Supporting Two-Factor Authentication  
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a...
124
US20150143125 Key Derivation for a Module using an Embedded Universal Integrated Circuit Card  
A module with an embedded universal integrated circuit card (eUICC) can include a received eUICC profile and a set of cryptographic algorithms. The received eUICC profile can include an initial...
121
US20150180653 Module for "Machine-to-Machine" Communications using Public Key Infrastructure  
Methods and systems are provided for efficient and secure “Machine-to-Machine” (M2M) between modules and servers. The module and server can utilize public key infrastructure (PKI) such as public...
119
US20160197934 SECURE DATA MANAGEMENT TECHNIQUES  
The present disclosure relates generally to secure data management techniques. Techniques are described for pairing devices and using the pairing information for granting or denying requests...
117
9100175 Embedded universal integrated circuit card supporting two-factor authentication  
A module with an embedded universal integrated circuit card (eUICC) can include a profile for the eUICC. The profile can include a first and second shared secret key K for authenticating with a...
108


Search
Matches 1 - 50 out of 232 1 2 3 4 5 >
« search again