Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Cryptomathic Ltd
Cryptomathic Limited
Cryptomathic A s

Cryptomathic patents

Recent patent applications related to Cryptomathic. Cryptomathic is listed as an Agent/Assignee. Note: Cryptomathic may have other listings under different names/spellings. We're not affiliated with Cryptomathic, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cryptomathic-related inventors

Method and system for encryption

There is described a validation and authentication system and method for authenticating and validating messages. The system comprises a data store storing one or more digital fingerprints associated with user imaging devices. ... Cryptomathic

System and method for encryption

A method for validating a signature request for a first message m, comprising: receiving, a validation challenge (vc) from a signature creation device (scd), the vc created by the scd, in response to receiving the signature request and message m from a user, using a second message m′ which is based on message m and a secret shared between the scd and user, the vc generated by encrypting message m′ using the secret; generating, the message m′ from the vc by decrypting the vc using the secret; displaying the message m′ to the user; receiving confirmation from the user that the displayed message m′ corresponds to the message m; generating, a validation code confirming the signature request to create a signature; and outputting the code to the scd, to cause the scd to generate the signature for the user for message m based on successfully verifying the code.. . ... Cryptomathic

Systems and method for enabling secure transaction

Embodiments of the present invention provide systems and methods of generating a secure transaction, particularly when the transaction is made using a mobile computing device. This is achieved by eliminating the need for cryptographic keys to be stored on the mobile computing device, by firstly creating a strong link between users and their devices, and storing this pre-defined link with a trusted authentication service (i.e. ... Cryptomathic

Secure mobile user interface

The invention provides systems and method for securely inputting user data from a user into a mobile device and also for generating user data to be input by a user into a mobile device. For example, there is provided a mobile device case for securely inputting user data from a user into a mobile device, the case comprising: a microcontroller, a communication module for communicating with the mobile device and a user interface to enable the user to input the user data. ... Cryptomathic

System and method for enabling secure authentication

Broadly speaking, embodiments of the present invention provide systems and methods to provide a solution to the sim swap attack problem for users that possess smartphones. In particular, the systems and methods require an online banking customer to authenticate a transaction using a combined one-time password (otp) formed of a remotely generated otp (generated remote to the smartphone) and a locally generated otp (generated on the smartphone).. ... Cryptomathic

Secure data cache

This invention is generally concerned with methods, apparatus and computer program code for securely caching \ data, in particular for caching data stored on smart card systems such as those used in icao-compliant eu electronic passports. A caching system for providing a secure data cache for data stored in an electronic document, the comprising: an input to receive data to be cached; a processor configured to use all or part of said received data to calculate a unique cryptographic key for said data; encrypt all or part of said data with said unique cryptographic key; and discard said unique cryptographic key after encryption and an output to send said encrypted data to a data cache, with decryption of encrypted data requiring said unique cryptographic key to be recalculated from said electronic document whereby said data cache is secure. ... Cryptomathic

Crm security core

A security core supports a networked banking app for a client application device communicating with a server, such as e.g. A smartphone. ... Cryptomathic

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Cryptomathic in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cryptomathic with additional patents listed. Browse our Agent directory for other possible listings. Page by