The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 20, 2022

Filed:

Jan. 25, 2021
Applicant:

Cord3 Innovation Inc., Ottawa, CA;

Inventors:

Glen Arthur Henderson, Ottawa, CA;

Brent Eric Nordin, Ottawa, CA;

Daniel Marcel Joseph Seguin, Navan, CA;

Prateek Srivastava, Ottawa, CA;

Ian Hugh Curry, Collex, CH;

Assignee:

CORD3 INNOVATION INC., Ottawa, CA;

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/00 (2022.01); H04L 9/08 (2006.01); G09C 1/00 (2006.01); G06F 21/60 (2013.01); H04L 9/14 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); H04L 9/06 (2006.01);
U.S. Cl.
CPC ...
H04L 9/0869 (2013.01); G06F 21/602 (2013.01); G09C 1/00 (2013.01); H04L 9/088 (2013.01); H04L 9/0861 (2013.01); H04L 9/0891 (2013.01); H04L 9/14 (2013.01); H04L 9/3213 (2013.01); H04L 63/0435 (2013.01); H04L 63/10 (2013.01); H04L 9/0618 (2013.01); H04L 2209/04 (2013.01);
Abstract

Many-to-many cryptographic systems and methods are disclosed, and a network employing the same, including numerous industry applications. The embodiments of the present invention can generate and regenerate the same symmetric key from a random token. The many-to-many cryptographic systems and methods include two or more cryptographic modules being in communication with each other and may be located at different physical locations. The cryptographic modules are configured to encrypt and/or decrypt data received from other cryptographic modules and to provide encrypted and/or decrypted data to other cryptographic modules. Each cryptographic module includes a key generator configured to use two or more inputs to reproducibly generate the symmetric key and a cryptographic engine configured to use the symmetric key for encrypting and decrypting data. Corresponding methods, and network employing the same, are also provided.


Find Patent Forward Citations

Loading…