Inventors list

Assignees list

Classification tree browser

Top 100 Inventors

Top 100 Assignees


Cryptography

Patent class list (only not empty are listed)

Deeper subclasses:

Class / Patent application numberDescriptionNumber of patent applications / Date published
380277000 KEY MANAGEMENT 1284
380255000 COMMUNICATION SYSTEM USING CRYPTOGRAPHY 1066
380028000 PARTICULAR ALGORITHMIC FUNCTION ENCODING 679
380200000 VIDEO CRYPTOGRAPHY 331
380287000 ELECTRIC SIGNAL MODIFICATION 63
380247000 CELLULAR TELEPHONE CRYPTOGRAPHIC AUTHENTICATION 54
380243000 FACSIMILE CRYPTOGRAPHY 35
380252000 ELECTRIC SIGNAL MASKING 30
380054000 BY MODIFYING OPTICAL IMAGE (E.G., TRANSMISSIVE OVERLAY) 16
380002000 EQUIPMENT TEST OR MALFUNCTION INDICATION 12
380001000 CRYPTANALYSIS 10
380251000 ELECTRONIC GAME USING CRYPTOGRAPHY 6
380055000 HAVING PRODUCTION OF PRINTED COPY (E.G., CRYPTOGRAPHIC PRINTER OR TYPEWRITER) 5
20090141892SECURITY PRINTING METHOD AND SYSTEM FOR ENHANCING SECURITY PRINTING - A security printing method includes generating a security file having a plurality of metadata fields and an information field concatenated together in an initial sequence. A security file identification is generated from the plurality of metadata fields and the information field. The security file identification corresponds to the initial sequence and is a one-way function of the plurality of metadata fields and the information field. The method further includes selecting a custom scrambling technique based on the security file identification, and scrambling the initial sequence using the selected custom scrambling technique, thereby creating a scrambled sequence of the plurality of metadata field and the information field.06-04-2009
20090220077UNIT USING OPERATING SYSTEM AND IMAGE FORMING APPARATUS USING THE SAME - A chip mountable on a customer replaceable unit monitoring memory (CRUM) unit used in an image forming job includes a central processing unit (CPU) with an operating system (OS) thereof, which is separate from an OS of the image forming apparatus, to perform at least one of authentication and cryptographic data communication with a main body of an image forming apparatus by executing one cryptographic algorithm corresponding to a set state from among a plurality of pre-provided cryptographic algorithms, using the OS thereof. The security of a unit on which the chip is mounted can thereby be reinforced and random changes of data of the unit can be prevented.09-03-2009
20090257586Image processing apparatus and image processing method - An image processing apparatus sections an image to be processed into a plurality of blocks, rearranges the blocks into positions specified by an encryption key that uniquely specifies the positions of the blocks in the image, determines a computing method used to convert pixel values of pixels that form a minimum area included in each of the blocks after the blocks are rearranged based on the pixel values of predetermined pixels that do not belong to the minimum area, and converts the pixel values based on the computing method.10-15-2009
20080240430Graphic Code Application Apparatus and Method - A machine readable code comprises at least a portion of a graphical indicium, the graphical indicium comprising a random arrangement of spots. At least some of the spots comprising the graphical indicium may have a dimension of less than one micrometre. The spots comprising the graphical indicium may vary in size and/or shape. The portion of the graphical indicium comprising the code may be delimited by a boundary, the boundary may be a temporary boundary which may be generated by a reading machine relative to a fixed trigger point only when the code is being read. Alternatively, the portion of the graphical indicium comprising the code may be delimited by a graphically represented boundary.10-02-2008
20100067691Document certification and authentication system - This invention safeguards the integrity of a machine-printed paper document by entangling a characteristic signature derived from the document's paper grain structure with the identities of the printing device and the person or organization which issued the document. This protection is achieved using a certification phase performed by an augmented document printer and an authentication phase performed by an augmented document scanner. In the certification phase, the grain structure of a specific area of the original paper is imaged and processed to generate a unique signature for the paper. This signature is doubly encrypted using the private keys of the augmented printer and the certifier. These encryption steps entangle the signature of the paper with its source information in a way that thwarts counterfeiting attacks which either copy the document or falsely attribute its source to a specific printer and/or certifier.03-18-2010
380059000 MISCELLANEOUS 3
20100054468VALIDATING COMPRESSED ARCHIVE KEYS - An apparatus and a method for validating compressed encrypted archive keys is described. In one embodiment, a pseudo-stream is generated for an archive. The pseudo-stream is made of a small amount of random text. The pseudo-stream is attached to a stream of the archive. The pseudo-stream and stream are compressed using the compression algorithm that includes validation data. The compressed pseudo-stream is then enciphered with an archive key.03-04-2010
20090116643ENCRYPTION APPARATUS, DECRYPTION APPARATUS, AND CRYPTOGRAPHY SYSTEM - Provided is a technology with which an electronic document including a plurality of elements such as texts and images may be partially encrypt and decrypt. An encryption-processing control unit receives a selection of electronic data included in an electronic document and a selection of an encryption key for encrypting the electronic data from among encryption keys stored in a storing unit. The encryption-processing control unit generates encrypted area data including partially encrypted data obtained by encrypting the selected electronic data with the selected encryption key, positional information for specifying a position of the selected electronic data in the electronic document, and decryption information including information that may specify a decryption key with which the partially encrypted data may be decrypted, and adds the encrypted area data to the electronic document.05-07-2009
20090129593Semiconductor device and method for operating the same - It is an object of the present invention to provide a wireless chip in which a hardware thereof is not required to be modified in each time that encryption algorithm with higher security is developed. In a wireless chip, a circuit capable of communicating information by wireless communication, a CPU, and a memory are included. In the memory, two or more regions, of each a region to which an encryption program is assigned and a region to which a decryption is assigned, are included. Accordingly, a wireless chip in which an encryption/decryption program can be rewritten without modifying a hardware structure can be provided.05-21-2009
380056000 SELECTIVELY MOVABLE ELEMENT HAVING CODE CHARACTERS 1
20090080652SYSTEM AND METHOD FOR PASSWORD GENERATION AND STORAGE - A mechanical device may have one or more user inputs and one or more password outputs to provide a plurality of secure passwords. A user may set and recover passwords by transposing one or more mechanical components of the device. A user may carry the device, but if the device is lost or stolen another individual may be unable to access any of the stored passwords.03-26-2009

Patent applications in all subclasses Cryptography