Images List Premium Download Classic

Decryption

Decryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Password-based authentication
International Business Machines Corporation
August 17, 2017 - N°20170237725

A system has λ≧2 servers. At least each of a set of authentication servers stores a key-share ski of secret key sk, shared between q of the λ servers, of a key-pair (pk, sk). An access control server sends an authentication value to a subset of the authentication servers. The authentication value was formed using a predetermined ...
Secure session capability using public-key cryptography without access to the private key
Cloudflare, Inc.
August 17, 2017 - N°20170237571

A server establishes a secure session with a client device where a private key used in the handshake when establishing the secure session is stored in a different server. During the handshake procedure, the server receives a premaster secret that has been encrypted using a public key bound with a domain for which the client device is attempting to establish ...
Multiply-encrypting data requiring multiple keys for decryption
Cloudflare, Inc.
August 17, 2017 - N°20170237566

A server receives a piece of data for encryption. The server encrypts the piece of data such that no single key can decrypt the encrypted piece of data and any combination of a first multiple of unique keys taken a second multiple at a time are capable of decrypting the encrypted piece of data. Each of the first multiple of ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Providing access to content
Irdeto B.v.
August 17, 2017 - N°20170237551

A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at ...
Secure cloud-based clipboard for touch devices
Adobe Systems Incorporated
August 10, 2017 - N°20170230343

Methods and systems for securely transferring assets via a cloud-based clipboard are provided. In an embodiment, input is indicating an asset is received from an input device at a computing device, which transmits to asset to cloud-based storage. The method stores a reference to a storage location of the asset in the cloud-based storage in the input device. The method ...
Password triggered trusted encrytpion key deletion
Adobe Systems Incorporated
August 10, 2017 - N°20170230179

A method of evaluating secrets in a computer system's trusted execution environment, wherein after evaluation of secrets, a securely stored encryption key is either retrieved or deleted upon entering corresponding secret (password, graphical password, biometric information, data sequence, security token, etc.) or secrets. Deletion of the encryption key can happen in a verifiable manner or in a non-verifiable manner. If ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for encrypting and decrypting data
Seagate Technology Llc
August 10, 2017 - N°20170230175

A method and system is disclosed for encrypting and decrypting data, with decryption contingent upon user-defined conditions being met. The encryption process comprises a method for using pointers to indicate the locations and sizes of encryption components, utilizing randomly determined patterns to be used for a random number of characters of text data being encrypted. For each randomly determined block ...
Method and apparatus for accessing wireless local area network
Beijing Xiaomi Mobile Software Co., Ltd.
August 03, 2017 - N°20170223532

A method and an apparatus are provided for accessing a wireless lan. The method includes: accessing a first wireless lan generated by a routing device when a smart device is in a station mode, in which the access permission of the first wireless lan is restricted such that accessing other addresses except for that of a target server for the ...
Hypersphere-based multivariable public key encryption/decryption system and method
South China University Of Technology
August 03, 2017 - N°20170222807

Disclosed is a hypersphere-based multivariable public key encryption/decryption system, which is composed of an encryption module and a decryption module, wherein the encryption module comprises a processor, and a public key transformation component for transforming plaintext into ciphertext; and the decryption module comprises a processor, a first affine transformation inversion component, a trapdoor component and a second affine transformation ...
Inline cryptographic engine (ice) for peripheral component interconnect express (pcie) systems
Qualcomm Incorporated
August 03, 2017 - N°20170220494

Aspects disclosed in the detailed description include inline cryptographic engine (ice) for peripheral component interconnect express (pcie). In this regard, in one aspect, an ice is provided in a pcie root complex (rc) in a host system. The pcie rc is configured to receive at least one transport layer packet (tlp), which includes a tlp prefix, from a storage device. ...
System and method for content streaming with feature detection
Amarone Partners, Llc
July 27, 2017 - N°20170214729

A system and method for content streaming with feature detection, comprising determining a streaming format compatibility criteria of a remote web browser, determining a content selection from a list of one or more content selections, receiving at a content server a streaming request, streaming the content selection, the streaming including dividing a source content into a plurality of segment files, ...
Method for encrypting and decrypting data with a one-time-key
Befine Solutions Ag
July 27, 2017 - N°20170214671

A method for encrypting and decrypting data with a session key is proposed. The data is exchanged between a first data processing device and a second data processing device via a communications link that is equipped with a communications server. The method exhibits process steps concerning the generation of a permanent common start value and the provision of a formation ...
Encryption method for an instructions stream and execution of an instructions stream thus encrypted
Commissariat A L'energie A Tomique Et Aux Energies Al Ternatives
July 27, 2017 - N°20170214523

A method of encrypting a program instructions stream and a method of executing an instructions stream thus encrypted. Instructions are translated into binary code before being encrypted by a stream cipher method. When the program contains a conditional or unconditional branch instruction, an instruction is inserted in the program to initialise the pseudo-random sequence generator using an initialisation vector, the ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Security systems and methods for social networking
Wave Systems Corp.
July 20, 2017 - N°20170206380

Data may be masked on public networks, such as social networking sites. At a publishing node, the system may monitor data input fields in a webpage that are processed by an internet browser. The system may intercept data, such as text, images, and video input at the data input fields, prior to the data being posted online. The publishing node ...
Decrypting content protected with initialization vector manipulation
Amazon Technologies, Inc.
July 20, 2017 - N°20170206364

Disclosed are various embodiments for generating encrypted media content items as well as decrypting encrypted media content items. A content type is embedded in an initialization vector corresponding to an encrypted sample. Upon decryption of encrypted content, the content type is identified and an action taken based upon the detected content type.
System and method for protecting plain text scripting language programs in a mainframe rehosting platform
Oracle International Corporation
July 20, 2017 - N°20170206363

In accordance with an embodiment, described herein is a system and method for protecting a scripting language application in a computing environment. An encryption-decryption module in the computing environment can use a native encryption-decryption library to encrypt the application. The encrypted application can be installed in an environment specific to a user of the computing environment. At runtime, the encryption-decryption ...
Memory architecture with ecc and method for operating memory with ecc
Ememory Technology Inc.
July 20, 2017 - N°20170206134

A circuit architecture for operating error-correction code (ecc) in a memory apparatus includes a control circuit and an ecc circuit. The ecc circuit is coupled with the control circuit. The control circuit receives a first data of a set of bits to invert the first data as an inverted data. The ecc circuit receives the inverted data for encryption or ...
Mobility management entity, terminal, and identity authentication method
Yulong Computer Telecommunication Scientific (shenzhen) Co., Ltd.
July 13, 2017 - N°20170201884

A mobility management entity (mme), a terminal and an identity authentication method are disclosed. The mme comprises: a sending unit, configured to send an identity authentication request, an encryption key and a corresponding digital certificate to a terminal when detecting that a mapping relation between a globally unique temporary terminal identity and an international mobile subscriber identity code is lost, ...
Authentication stick
Fraunhofer-gesellschaft Zur Foerderung Der Angewandten Forschung E.v.
July 13, 2017 - N°20170201513

A communication adapter for authentication of a user includes a receiving unit for receiving encrypted credentials, a decryption unit for decrypting the encrypted credentials and an output unit for outputting the decrypted credentials to a terminal device.
Method and system for secure private communications
Acronis International Gmbh
July 13, 2017 - N°20170201500

A system and method for providing secure private electronic communications. An exemplary method includes encrypting a hidden message using an encryption scheme; encoding the encrypted hidden message in a source message; providing the source message having the encoded hidden message by a first electronic device; and transmitting a decryption key to a second electronic device. Moreover, the second electronic device ...
Homomorphic public-key encryption scheme
Empire Technology Development Llc
July 13, 2017 - N°20170201371

Technologies are generally described for providing a fully homomorphic public key encryption scheme. In some examples, a method performed under control of a transmitter may include receiving, from a server, a system parameter; selecting a secret decryption key corresponding to the transmitter; generating a first public encryption key for the transmitter, based at least in part on the secret decryption ...
Loading