new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)





Similar
Filing Names

Certicom Corp
Certicom Corporation
Certicom Corp_20100121
  

Certicom Corp patents

Recent patent applications related to Certicom Corp. Certicom Corp is listed as an Agent/Assignee. Note: Certicom Corp may have other listings under different names/spellings. We're not affiliated with Certicom Corp, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Certicom Corp-related inventors




Date Certicom Corp patents (updated weekly) - BOOKMARK this page
11/08/12Managing data for authentication devices
10/04/12Identity-based decryption
09/27/12Interrogating an authentication device
02/16/12Method of compressing a cryptographic value
04/27/17 new patent  Providing security assurance information
03/02/17Generating cryptographic function parameters from compact source code
03/02/17Generating cryptographic function parameters from a puzzle
03/02/17Generating cryptographic function parameters based on an observed astronomical event
01/12/17Public key encryption algorithms for hard lock file encryption
01/12/17Securing lawful interception
12/15/16Method and encoding security status information
11/24/16Method and providing an adaptable security level in an electronic communication
11/24/16System and lawful access to secure communications
11/17/16Method for validating messages
11/03/16Systems and methods for managing lost devices
09/08/16Challenge-response authentication using a masked response value
09/08/16Local area network
08/25/16Method and verifiable generation of public keys
06/09/16System and performing serialization of devices
05/05/16Method and synchronizing an adaptable security level in an electronic communication
03/24/16Cryptographic method and apparatus
02/18/16System and hardware based security
02/11/16Methods and use in transferring an assignment of a secure chip between subscription managers
01/28/16Method and providing an adaptable security level in an electronic communication
11/05/15System and connecting client devices to a network
10/29/15System and managing electronic assets
09/24/15Method for validating messages
08/13/15Data card verification system
06/04/15Elliptic curve random number generation
05/21/15Key agreement for wireless communication
05/07/15Public key encryption algorithms for hard lock file encryption
02/12/15Method and providing an adaptable security level in an electronic communication
01/01/15System and authenticating rfid tags
12/25/14Securing lawful interception
12/18/14Disabling header compression over point-to-point protocol (ppp)
12/18/14Method to calculate square roots for elliptic curve cryptography
12/18/14Hashing prefix-free values in a signature scheme
12/11/14Generating digital signatures
11/27/14Url-based certificate in a pki
11/20/14Key validation scheme
10/30/14Method and verifiable generation of public keys
10/02/14Hybrid signature scheme
09/18/14Accelerated signature verification on an elliptic curve
09/18/14Cryptographic method and apparatus
08/14/14Using a single certificate request to generate credentials with multiple ecqv certificates
07/31/14Modified elliptic curve signature algorithm for message recovery
07/17/14Method and providing an adaptable security level in an electronic communication
07/17/14Incorporating data into an ecdsa signature component
06/26/14Two factor authentication using near field communications
06/26/14Method and synchronizing an adaptable security level in an electronic communication
06/19/14Methods and use in transferring an assignment of a secure chip subscription managers
06/19/14Local area network
06/05/14Challenge-response authentication using a masked response value
06/05/14Challenge-response authentication using a masked response value
01/30/14Key agreement and transport protocol
01/02/14Authentication of a mobile device by a network and key generation
12/26/13Methods and devices for establishing trust on first use for close proximity communications
11/28/13Method and system for generating implicit certificates and applications to identity-based encryption (ibe)
10/31/13Multiple hashing in a cryptographic scheme
10/31/13Hashing prefix-free values in a signature scheme
10/31/13Hashing prefix-free values in a certificate scheme
09/19/13Secure interface for versatile key derivation function support
09/12/13System and remote device registration
09/05/13System and connecting client devices to a network
08/29/13Method and entropy decoding
Patent Packs
08/29/13Self-signed implicit certificates
07/04/13Elliptic curve random number generation
06/06/13System and mounting encrypted data based on availability of a key on a network
06/06/13Masked digital signatures
05/30/13Assessing cryptographic entropy
05/16/13Cryptographic document processing in a network
05/02/13Integrated circuit with logic circuitry and multiple concealing circuits
04/18/13Verifying implicit certificates and digital signatures
04/11/13Generating implicit certificates
03/21/13Hybrid encryption schemes
03/21/13One way authentication
03/21/13Method for strengthening the implementation of ecdsa against power analysis
03/14/13Incorporating data into an ecdsa signature component
03/14/13Incorporating data into cryptographic components of an ecqv certificate
03/14/13Data card verification system
Patent Packs
01/31/13Url-based certificate in a pki
01/17/13Method and computing a shared secret key
01/17/13Mobile certificate distribution in a pki
01/10/13Method and verifiable generation of public keys
01/03/13Simultaneous scalar multiplication method
01/03/13System and controlling features on a device
12/13/12Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
12/06/12Squaring binary finite field elements
11/29/12Randomness for encryption operations
11/15/12Accelerated signature verification on an elliptic curve
11/08/12Resilient cryptographic scheme
11/08/12Validating a batch of implicit certificates
11/08/12Method and synchronizing an adaptable security level in an electronic communication
10/25/12System for detecting a reset condition in an electronic circuit
10/11/12Efficient implementation of hash algorithm on a processor
10/11/12Split-key key-agreement protocol
09/20/12Multi-dimensional montgomery ladders for elliptic curves
09/20/12Keyed pv signatures
09/13/12Issuing implicit certificates
09/13/12Hybrid signature scheme
08/30/12System and reducing computations in an implicit certificate scheme
08/30/12Accelerated key agreement with assisted computations
08/23/12Aggregate signature schemes
05/31/12Key agreement and transport protocol
05/24/12System and authenticating a gaming device
04/26/12Method for the application of implicit signature schemes
04/26/12System and hardware based security
04/19/12Authenticated encryption for digital signatures with message recovery
04/19/12Authenticated encryption for digital signatures with message recovery
04/12/12One way authentication
Social Network Patent Pack
03/29/12Systems and methods for managing lost devices
03/29/12Key agreement and transport protocol with implicit signatures
02/23/12Implicit certificate verification
01/26/12Parallel entropy encoder and parallel entropy decoder
01/12/12System and performing device authentication using key agreement
12/15/11Masking the output of random number generators in key generation protocols
11/03/11Method of public key generation
11/03/11Method and providing flexible bit-length moduli on a block montgomery machine
10/27/11Simultaneous scalar multiplication method
09/22/11Accelerated signature verification on an elliptic curve
Patent Packs
09/15/11Device and implementing a cryptographic hash function
09/01/11System for detecting a reset condition in an electronic circuit
09/01/11Customizable public key infrastructure and development tool for same
09/01/11Elgamal signature schemes
08/25/11Digital signature and key agreement schemes
08/11/11Accelerated verification of digital signatures and public keys
06/16/11System and providing credentials
04/14/11Self-signed implicit certificates
03/17/11System and performing serialization of devices
03/17/11Split-key key-agreement protocol
03/10/11Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
01/20/11System and reducing the computation and storage requirements for a montgomery-style reduction
01/20/11Data card verification system
01/13/11System and managing electronic assets
01/13/11System and performing key injection to devices
12/09/10System and authenticating rfid tags
12/09/10Partial revocation list
12/02/10Mobile certificate distribution in a pki
11/11/10Resilient cryptographic scheme
11/04/10Method and performing elliptic curve arithmetic
11/04/10Method and minimizing differential power attacks on processors
11/04/10Key agreement and transport protocol with implicit signatures
10/14/10Method and generating a key stream
09/30/10Privacy-enhanced e-passport authentication protocol
09/23/10System and securely communicating with electronic meters
09/02/10System and performing exponentiation in a cryptographic system
08/12/10System and remote device registration
07/29/10Privacy-enhanced e-passport authentication protocol
07/01/10Implicit certificate scheme
06/17/10Acceleration of key agreement protocols
Patent Packs
06/10/10Method and modulus reduction
05/06/10System for detecting a reset condition in an electronic circuit
05/06/10Collision-resistant elliptic curve hash functions
01/21/10Strengthened public key protocol
12/24/09Method and encoding security status information
12/24/09Masked digital signatures
11/26/09Device authentication in a pki
10/22/09Method for strengthening the implementation of ecdsa against power analysis
03/19/09Accelerated signature verification on an elliptic curve
01/21/10Strengthened public key protocol







ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Certicom Corp in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Certicom Corp with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###




';