Patent application number | Description | Published |
20080228280 | Tribological Applications of Polyelectrolyte Multilayers - One aspect of the present invention relates to an implantable medical device comprising a surface coated with a polyelectrolyte multilayer, wherein said surface is glass, metal, plastic, polymer, or fiberglass. Another aspect of the present invention involves a method of preparing a PEM-coated implantable medical device, comprising the step of applying a film to a surface of an implantable medical device, wherein said film comprises a polyelectrolyte multilayer and said surface is glass, metal, plastic, polymer, or fiberglass. Another aspect of the present invention involves a method of reducing the wear between two contacting materials, comprising the step of moving a first material in contact with a second material in an environment, wherein a first surface of said first material is in contact with a second surface of said second material, wherein said first surface, said second surface, or both is coated with a polyelectrolyte multilayer, thereby decreasing the wear of said first material, said second material, or both compared to the wear in the absence of said polyelectrolyte multilayer. | 09-18-2008 |
20100190920 | CROSSLINKED POLYMERS AND METHODS OF MAKING THE SAME - Preforms are described, e.g., preforms in rod, sheet or medical device form, that have non-uniform properties in different regions of a single preform. These “engineered preforms” have predetermined properties that can allow, e.g., some regions of a single preform to be relatively stiff and resistant to wear, while other regions of the same preform are relatively flexible. Methods of making the anisotropic preforms are also described. | 07-29-2010 |
20100292374 | CROSSLINKED POLYMERS AND METHODS OF MAKING THE SAME - Methods are described that include elongating, e.g., by stretching and/or compressing, a polymeric material, such as an ultra-high molecular weight polyolefin (e.g., an ultra-high molecular weight polyethylene (UHMWPE)), below, or above a melt temperature of the polymeric material to disentangle polymeric chains of the polymeric material. The disentangled materials provided can be effectively and efficiently crosslinked, e.g., by using ionizing radiation (e.g., generated by a gamma radiation source and/or an electron beam source). Parts formed from the crosslinked polymeric materials have, e.g., high wear resistance, enhanced stiffness, as reflected in flexural and tensile moduli, a high level of fatigue and crack propagation resistance, and enhanced creep resistance. Some of the crosslinked polymeric materials have a low coefficient of friction. Prior to elongating, it can be desirable to slightly crosslink the polymeric material to impart shape memory into the polymeric material. | 11-18-2010 |
Patent application number | Description | Published |
20090177894 | SYSTEMS AND METHODS FOR SECURING DATA USING MULTI-FACTOR OR KEYED DISPERSAL - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme. | 07-09-2009 |
20090222658 | ROAMING UTILIZING AN ASYMMETRIC KEY PAIR - Techniques for generating a portion of a split private key are provided. A first symmetric key and a second symmetric key different than the first symmetric key are generated at a first location. The generated second symmetric key and a first one of multiple factors for generating the private key portion encrypted with the generated first symmetric key are transmitted. Then, at a second network location, the symmetric keys are again generated. The encrypted first factor is received at the second network location subsequent to a user authentication based upon the second symmetric key generated at the second network location. The received encrypted first factor is then decrypted with the first symmetric key generated at the second network location, the decrypted first factor usable to generate the portion of the split private key of the asymmetric key pair. | 09-03-2009 |
20090310778 | VARIABLE-LENGTH CIPHER SYSTEM AND METHOD - Systems and methods for enciphering data are provided. In one embodiment, information is enciphered using a variable block length cipher that returns the encrypted symbol set in the same format as the plaintext symbol set. The cipher can be based on DES, AES or other block ciphers. In one example implementation a method for enciphering token information the invention provides for enciphering token information by constructing a tweak of a defined length using token information; converting the tweak to a bit string of a defined size to form a first parameter; converting a number of digits of plaintext to a byte string of a defined size to form a second parameter, wherein the number of digits converted varies; defining a data encryption standard key; applying the data encryption standard key to the first and second parameters; computing a specified number of encryption rounds; and receiving enciphered token information. | 12-17-2009 |
20100202609 | SECURING MULTIFACTOR SPLIT KEY ASYMMETRIC CRYPTO KEYS - Techniques for securing an asymmetric crypto-key having a public key and a split private key with multiple private portions are provided. A first one of multiple factors is stored. All of the factors are under the control of a user and all are required to generate a first private portion of the split private key. The first private portion not stored in a persistent state. A second private portion of the split private key under control of an entity other than the user is also stored. The first private portion and the second private portion are combinable to form a complete private portion. | 08-12-2010 |
20100246827 | USER-SPECIFIED SHARING OF DATA VIA POLICY AND/OR INFERENCE FROM A HIERARCHICAL CRYPTOGRAPHIC STORE - The claimed subject matter relates to architectures that can construct a hierarchical set of decryption keys for facilitating user-controlled encrypted data storage with diverse accessibility and hosting of that encrypted data. In particular, a root key can be employed to derive a hierarchical set of decryption keys and a corresponding hierarchical set of encryption keys. Each key derived can conform to a hierarchy associated with encrypted data of the user, and the decryption capabilities of the decryption keys can be configured based upon a location or assignment of the decryption key within the hierarchy. The cryptographic methods can be joined with a policy language that specifies sets of keys for capturing preferences about patterns of sharing. These policies about sharing can themselves require keys for access and the policies can provide additional keys for other aspects of policy and or base-level accesses. | 09-30-2010 |
20120039469 | SYSTEM AND METHOD FOR VARIABLE LENGTH ENCRYPTION - Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device. | 02-16-2012 |
20120163592 | SYSTEMS AND METHODS FOR DISTRIBUTING AND SECURING DATA - A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values. | 06-28-2012 |
20130275773 | SYSTEMS AND METHODS FOR SECURING DATA USING MULTI-FACTOR OR KEYED DISPERSAL - A secure data parser is provided that may be integrated into any suitable system for securely storing and communicating data. The secure data parser parses data and then splits the data into multiple portions that are stored or communicated distinctly. Encryption of the original data, the portions of data, or both may be employed for additional security. The secure data parser may be used to protect data in motion by splitting original data into portions of data, that may be communicated using multiple communications paths. A keyed information dispersal algorithm (keyed IDA) may also be used. The key for the keyed IDA may additionally be protected by an external workgroup key, resulting in a multi-factor secret sharing scheme. | 10-17-2013 |
20130332732 | SYSTEM AND METHOD FOR GENERATING AND MANAGING PRODUCT AUTHENTICATION CODES - A method for generating product authentication codes comprises allocating a lot identification value and a total lot size for an order of a plurality of product authentication codes, generating the plurality of product authentication codes based upon the lot identification value and the total lot size, and updating a counter table on an authentication server with the total lot size for the order of the authentication codes. A method for authenticating product codes comprises receiving a product code from a user of a product, decrypting the product code to obtain a sequence counter number unique to the product code and comparing the decrypted sequence counter number to a table of valid sequence counter number values to determine its authenticity. If the decrypted sequence counter number is authentic, it is added to an authentication table for future reference when operating to confirm a previous authentication of the sequence counter number. | 12-12-2013 |
20140344580 | SYSTEM AND METHOD FOR VARIABLE LENGTH ENCRYPTION - Systems and methods for performing a secure transaction provided. In one embodiment, the method includes: reading data on a command token, reading data on a token; encrypting the token data with a key; encrypting an authentication data with a clear text token data; and transmitting the encrypted authentication data with the encrypted token data to a remote device. | 11-20-2014 |
20150016604 | SYSTEMS AND METHODS FOR DISTRIBUTING AND SECURING DATA - A robust computational secret sharing scheme that provides for the efficient distribution and subsequent recovery of a private data is disclosed. A cryptographic key may be randomly generated and then shared using a secret sharing algorithm to generate a collection of key shares. The private data may be encrypted using the key, resulting in a ciphertext. The ciphertext may then be broken into ciphertext fragments using an Information Dispersal Algorithm. Each key share and a corresponding ciphertext. Fragment are provided as input to a committal method of a probabilistic commitment scheme, resulting in a committal value and a decommittal value. The share for the robust computational secret sharing scheme may be obtained by combining the key share, the ciphertext fragment, the decommittal value, and the vector of committal values. | 01-15-2015 |