POST QUANTUM CRYPTOGRAPHIC SYSTEM COMPRISED

Brand Owner Address Description
IRONCAP 01 COMMUNIQUE LABORATORY INC. 1450 Meyerside Drive Suite 500 Mississauga L5T2N5 Canada post-quantum cryptographic system comprised of computer hardware and software for performing cryptographic operations for data encryption, data decryption, digital signature, verification of digital signature, keypair generation, hashing, random number generation, and computer hardware and software for detecting and preventing computer network security breaches; software featuring application programming interface (API) for developing integrators, recorded on media; software recorded on an USB device for performing of cryptographic operations independent of the host computer; downloadable software applications for use in post-quantum cryptographic system comprised of computer hardware and software for performing cryptographic operations for data encryption, data decryption, digital signature, verification of digital signature, keypair generation, hashing, random number generation; software downloadable to mobile devices featuring applications for use in post-quantum cryptographic system comprised of computer hardware and software for cryptographic operations for data encryption, data decryption, digital signature, verification of digital signature, keypair generation, hashing, random number generation;IRON CAP;designing post quantum cryptographic computer system;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The invention is directed to a data-processing system comprising a processor, a second encrypted cryptographic key stored in a first persistent memory, and a cryptographic co-processor that comprises a first register and a second register. The cryptographic co-processor serves for decrypting in a decryption step the second encrypted cryptographic key, thereby generating therefrom a second unencrypted cryptographic key that is usable by the processor for executing an operation. For the decryption step the first register is loadable with the second encrypted cryptographic key and the second register is loadable with a first cryptographic key. The resulting second unencrypted cryptographic key is maintainable in one of the registers for being used by the cryptographic co-processor for decrypting encrypted information or encrypting unencrypted information for the operation.