Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Cyph Inc patents


Recent patent applications related to Cyph Inc. Cyph Inc is listed as an Agent/Assignee. Note: Cyph Inc may have other listings under different names/spellings. We're not affiliated with Cyph Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cyph Inc-related inventors


Encrypted group communication method

Embodiments herein include, for example, a method, comprising: generating a shared symmetric key to begin a communication session among a group of users by a first user; distributing, by the first user, the generated shared symmetric key to each user in the group of users; communicating within the communication session among a group of users, where each user encrypts a message to the group of users to be distributed through the communication session using the generated shared symmetric key, and each user decrypts a message received from the communication session using the generated shared symmetric key.. . ... Cyph Inc

System and method for detecting and classifying malware

A network device may include a memory and one or more processors configured to analyze execution of suspicious data; detect one or more states of execution of the suspicious data; determine that the one or more states of execution are to be assigned a priority level; and extract at least a portion of the suspicious data from one or more locations based on determining that the one or more states of execution are to be assigned a priority level.. . ... Cyph Inc

System and method to process packets in a transmission control protocol session

A device may include one or more memories and one or more processors communicatively coupled to the one or more memories to: receive a plurality of data packets of a transmission control protocol (tcp) session; determine that a particular tcp segment, of the tcp session that includes a synchronization acknowledgment (syn-ack) flag, has been received before a corresponding tcp segment of the tcp session that includes a synchronization (syn) flag; store a sequence number of the particular tcp segment as an initial sequence number for a stream of the tcp session; and reassemble or rearrange a set of data packets of the tcp session based on the initial sequence number for the stream and based on one or more sequence numbers of the set of data packets.. . ... Cyph Inc

Creating and utilizing black keys for the transport layer security (tls) handshake protocol and method therefor

A non-transitory computer-readable medium comprising a black zone and a plurality of other electronic components for protecting a data exchange from a malicious attack on the data, that when executed on a processor, perform the steps comprising receiving a client hello message from a client, transmitting a server hello message, receiving a pre-master secret message encrypted with a server public key, storing the pre-master secret, protecting the black zone from malicious attacks on data by isolating hardware of the black zone from the plurality of other electronic components, calculating a master secret in the black zone, storing the master secret as a black key in the black zone, receiving a changed cipher specification and finished message encrypted with a session key, and transmitting a finished message encrypted with a symmetric key. The server hello message comprises a certificate.. ... Cyph Inc

Accelerated encryption and decryption of files with shared secret and method therefor

A non-transitory computer-readable medium for sharing protected content, comprising instruction stored thereon. When executed on a processor, the instruction performs steps of deriving a shared secret, processing the shared secret using a secure hash algorithm 256 cryptographic hash to produce a primary encryption key, and encrypting a secondary encryption key using the primary encryption key. ... Cyph Inc

Adaptive thrust vector unmanned aerial vehicle

A method for unmanned delivery of an item to a desired delivery location includes receiving, at an unmanned vehicle, first data representative of an approximate geographic location of the desired delivery location, receiving, at the unmanned vehicle, second data representative of a fiducial expected to be detectable at the desired delivery location, using the first data to operate the unmanned vehicle to travel to the approximate geographic location of the desired delivery location, upon arriving at the approximate geographic location of the desired delivery location, using the second data to operate the unmanned vehicle to detect the fiducial; and upon detecting the fiducial, using the fiducial to operate the unmanned vehicle to deliver the item.. . ... Cyph Inc

Math skill game

Described herein is a math card capture game comprising providing a plurality of players, and a deck of cards comprising at least two series of cards numbered consecutively from 1 to 10, each card bound by a face side and a back side, the face side displaying a numerical value; dealing a plurality of table cards face side up and dealing a plurality and equal number of hand cards face side down to each player; capturing cards during each player's turn by formulating an equation using at least one table card, at least one hand card and one or more available mathematical operators; discarding a hand card to be placed face side up as a table card if the player is unable to formulate an equation during the player's turn; counting captured cards for each player to determine a winner. The math card capture game may optionally include a random generator device—such as a coin, spin wheel or die—displaying a mathematical operator. ... Cyph Inc

Fixed rotor thrust vectoring

An aerial vehicle includes a body having a center and a number of spatially separated thrusters. The spatially separated thrusters are statically coupled to the body at locations around the center of the body and are configured to emit thrust along a number of thrust vectors. ... Cyph Inc

Multi-fit cap

A screw cap for sealing containers with threaded necks includes an outer body, having a cylindrical outer wall closed at one end by a circular lid and an interior neck seal adjacent to the circular lid. A female thread extends around an inner surface of the cylindrical outer wall. ... Cyph Inc

System and method of cryptographically signing web applications

Embodiments disclosed herein provide a method that includes receiving, at a client-side web browser, a minimal bootstrap payload from an application server; storing, by a client-side processor, the minimal bootstrap payload in a client-side local cache, where the locally cached minimal bootstrap payload is executed by the client-side processor before executing an application from the application server; the minimal bootstrap payload includes at least one public key and at least one uniform resource location (url) address of an application code payload.. . ... Cyph Inc

System and method of cryptographically signing web applications

Embodiments disclosed herein provide a method that includes receiving, at a client-side web browser, a minimal bootstrap payload from an application server; storing, by a client-side processor, the minimal bootstrap payload in a client-side local cache, where the locally cached minimal bootstrap payload is executed by the client-side processor before executing an application from the application server; the minimal bootstrap payload includes at least one public key and at least one uniform resource location (url) address of an application code payload.. . ... Cyph Inc

System and method of encrypting authentication information

Embodiments herein provide, for example, a method that includes generating a shared symmetric key to exchange authentication information among a communications group; distributing the generated shared symmetric key to each communicating party in the communications group; exchanging authentication information among members of the communications group, where each communicating party: encrypts the authentication information using the generated shared symmetric key and sends the encrypted authentication information to other members of the communications group, and receives encrypted authentication information from another communicating party in the communications groups and decrypts the received encrypted authentication information using the generated shared symmetric key.. . ... Cyph Inc

Unmanned delivery

A method for unmanned delivery of an item to a desired delivery location includes receiving, at an unmanned vehicle, first data representative of an approximate geographic location of the desired delivery location, receiving, at the unmanned vehicle, second data representative of a fiducial expected to be detectable at the desired delivery location, using the first data to operate the unmanned vehicle to travel to the approximate geographic location of the desired delivery location, upon arriving at the approximate geographic location of the desired delivery location, using the second data to operate the unmanned vehicle to detect the fiducial; and upon detecting the fiducial, using the fiducial to operate the unmanned vehicle to travel to the delivery location and deliver the item.. . ... Cyph Inc

Spooler for unmanned aerial vehicle system

In an aspect, in general, a spooling apparatus includes a filament feeding mechanism for deploying and retracting filament from the spooling apparatus to an aerial vehicle, an exit geometry sensor for sensing an exit geometry of the filament from the spooling apparatus, and a controller for controlling the feeding mechanism to feed and retract the filament based on the exit geometry.. . ... Cyph Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Cyph Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cyph Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###