Images List Premium Download Classic

Decryption

Decryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method and apparatus for acquiring sip signaling decryption parameters
Zte Corporation
October 12, 2017 - N°20170295204

Disclosed in the embodiment of the present invention is a method for acquiring session initiation protocol (sip) signaling decryption parameters and the method comprises the following steps: the authentication information of the gm interface and the authentication information of the cx interface are acquired; a security association (sa) decryption table is created according to the acquired authentication information of the ...
Data security for content delivery networks
Facebook, Inc.
October 12, 2017 - N°20170295144

Various embodiments implement a secure content distribution architecture involving a content delivery network (cdn). A web server system can encrypt a content file and store the encrypted content file in an origin data center. The web server system can store a decryption key for decrypting the content file. The cdn can fetch the encrypted content file after the content file ...
Encryption device, encryption method, decryption device, and decryption method
Technical University Of Denmark
October 12, 2017 - N°20170294148

There is provided an encryption device including a data encryption unit configured to conduct encryption on the basis of a white box model in which at least a part of a plurality of round functions for sequentially conducting encryption processing on an input value is tabulated, and input and output values of the round function are recognizable from an outside. ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for distributing encryption and decryption processes between network devices
Cisco Technology, Inc.
October 05, 2017 - N°20170289104

In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host, receiving decrypted data at the security device from the client device, inspecting the decrypted data at the security device, encrypting the decrypted data at the security device, and transmitting encrypted data to the end host. ...
Systems and methods for quick start-up of playback
Sonic Ip, Inc.
October 05, 2017 - N°20170288865

Systems and methods for quick start-up of playback in accordance with embodiments of the invention are disclosed. Media content may be encoded in a plurality of alternative streams and a quick start-up stream. The quick start-up stream may include media content that is encoded at a lower quality that the alternative streams and may be encrypted with a different, less ...
Terminal, terminal decryption method, and storage medium
Xi'an Zhongxing New Software Co., Ltd.
October 05, 2017 - N°20170288864

Embodiments of the present disclosure disclose a terminal, a method for decrypting a terminal and a storage medium. The method includes that: when the terminal is in an encrypted state, the terminal receives a first proximity state sequence of a first object within a first time threshold value; the terminal compares the first proximity state sequence with a preset reference ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Avoiding redundant memory encryption in a cryptographic protection system
Intel Corporation
October 05, 2017 - N°20170286320

This disclosure is directed to avoiding redundant memory encryption in a cryptographic protection system. Data stored in a device may be protected using different encryption systems. Data associated with at least one trusted execution environment (tee) may be encrypted using a first encryption system. Main memory in the device may comprise data important to maintaining the integrity of an operating ...
Three-dimensional forming data management system and method
Canon Kabushiki Kaisha
October 05, 2017 - N°20170285601

A management system that manages forming data to be used in forming of a three-dimensional object. The management system encrypts the forming data such that a forming control apparatus, which controls a forming apparatus managed by the management system, performs decryption processing. The management system notifies a request source of a forming request of the forming data of a forming ...
Encryption and decryption of data in a cloud storage based on indications in metadata
International Business Machines Corporation
September 28, 2017 - N°20170279812

Provided are a method, a system, and a computer program product in which metadata associated with encrypted data is maintained in a cloud computing environment, wherein the metadata indicates whether reading of information in the encrypted data is restricted geographically. A controller provides a decryption code for decrypting the encrypted data to a cloud server located in a geographical location, ...
Analysis system, analysis method, and storage medium
Nec Corporation
September 28, 2017 - N°20170279601

An analysis system that is able to obtain correct encryption key is provided. The analysis system includes a processing circuitry configured to function as a cryptanalysis processing unit. The cryptanalysis processing unit includes: a key candidate extraction unit that is configured to extract, from second data, one or more candidates of key data that include an encryption key that enables ...
System and method for providing defence to a cryptographic device against side-channel attacks targeting the ...
Gemalto Sa
September 28, 2017 - N°20170279600

A system, method and computer-readable storage medium for decrypting a code c using a modified extended euclidean algorithm (eea) having an iteration loop independent of the hamming weight of inputs to the eea and performing a fixed number of operations regardless of the inputs to the eea thereby protecting a cryptographic device performing the decryption from side-channel attacks.
Hardware-locked encrypted backup
Analog Devices, Inc.
September 28, 2017 - N°20170277580

A hardware-locked encrypted backup (hwle-bu) that is locked to a single hardware device using the device's unique hardware identity, based on a physically-unclonable function (puf) or other suitable means providing a unique hardware identity. The hwle-bu is bound to a specific hardware identity such that only the physical device that created the hwle-bu can decrypt it, i. E., restoring hwle-bu ...
Secure start system for an autonomous vehicle
Uber Technologies, Inc.
September 21, 2017 - N°20170272943

A secure start system for an autonomous vehicle (av) can detect startup of the av and transmit credentials to a backend system. When the credentials are authenticated, the secure start system can receive a tunnel key from the backend system. Using the tunnel key, the secure start system can establish a private communications session with a backend vault of the ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Public-key encryption system
Koninklijke Philips N.v.
September 21, 2017 - N°20170272244

A key generation device (100) configured to generate a public key (126) for use in a public key encryption device and a corresponding private key (114) for use in a private key decryption device, the key generation device comprising a private key generator (110) configured for obtaining in electronic form a private random value (112, s), and generating the private key (114), the private key comprising ...
Encryption apparatus, decryption apparatus, cryptography processing system, encryption method, decryption method, encryption program, and decryption ...
Nec Corporation
September 21, 2017 - N°20170272243

An acquisition unit (2020) acquires a plaintext block sequence and a first cryptographic key. The plaintext block sequence is constituted by a plurality of plaintext blocks. A second-cryptographic-key generation unit (2040) generates a second cryptographic key. A third-cryptographic-key generation unit (2060) generates a third cryptographic key. The third cryptographic key is calculated as exclusive or between the first cryptographic key and a portion ...
Authentication encryption method, authentication decryption method, and information-processing device
Nec Corporation
September 21, 2017 - N°20170272239

An information-processing device is provided with: a plaintext input unit for inputting plaintext; an initial vector generation unit for generating an initial vector; a common key block encryption unit for performing common key block encryption on the initial vector and generating an encrypted initial vector; a pseudorandom number generation unit which, accepting the encrypted initial vector as input, generates a ...
Data processing apparatus and data processing method
Fuji Electric Co., Ltd.
September 21, 2017 - N°20170272238

A data processing apparatus that encrypts or decrypts data by aes in which a plurality of key data are respectively prepared for a plurality of round processes that are performed in order, includes a selector that selects sub-round data of 4 bytes from input data that is a process target of a first round process; a converter that converts each data ...
Key encryption and decryption
International Business Machines Corporation
September 21, 2017 - N°20170270057

Provided is a data storage drive for encrypting data, comprising a microprocessor and circuitry coupled to the microprocessor and adapted to receive a session encrypted data key and to decrypt the session encrypted data key using a session key, wherein a result is a data key that is capable of being used to encrypt clear text and to decrypt cipher ...
Secure start system for an autonomous vehicle
Uber Technologies, Inc.
September 21, 2017 - N°20170269940

A secure start system for an autonomous vehicle (av) can include a compute stack and a communications router. The communications router can include an encrypted router drive and an input interface to receive a boot-loader that includes a basic decryption key to decrypt the encrypted router drive and enable network communications with a backend system. The secure start system can ...
File encryption, decryption and accessvia near field communication
Intel Corporation
September 14, 2017 - N°20170265078

Methods and devices for nfc-tap file encryption, decryption and access via near field communication (nfc) are disclosed. A user can select an unencrypted file stored in a computing device for encryption. Upon encryption, the file name of the selected file and the encryption key used to encrypt the selected file are transmitted to an nfc-enabled wireless device for storage. The ...
Systems and methods for detecting and reacting to malicious activity in computer networks
Cyber-ark Software Ltd.
September 14, 2017 - N°20170264617

Described herein are systems and methods for performing detection operations on secure ticket data to detect potentially malicious activity. Embodiments may involve obtaining encrypted data from an encrypted portion of a secure ticket, the obtained encrypted data having been communicated over a network; obtaining a decryption key corresponding to the encrypted data; decrypting the encrypted data using the obtained decryption ...
Loading