Images List Premium Download Classic

Decryption

Decryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW Method to generate pattern data over garbage data when encryption parameters are changed
Western Digital Technologies, Inc.
January 18, 2018 - N°20180018287

A memory device including at least one memory location for storing information representing data written using a first encryption/decryption method, and a read channel using a second encryption/decryption method for reading and decrypting information as written is disclosed. The memory device also includes an apparatus that prevents the reading of the at least one memory location using the ...
Method and system for managing encrypted data of devices
Nec Europe Ltd.
January 11, 2018 - N°20180013830

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access ...
Method for dynamic encryption and signing, terminal and server
Tencent Technology (shenzhen) Company Limited
January 11, 2018 - N°20180013735

A method for dynamic encryption and signing, a terminal and a server are provided. The method includes that: at least one key and at least one signature are generated through native data; a first predetermined key index and a first random signature index are selected during session connection; a first key and a first signature are located from the at ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011867

An apparatus includes a processor component of a first node device caused to receive data block encryption data and an indication of size of an encrypted data block distributed to the first node device for decryption, and in response to the data set being of encrypted data: receive an indication of the quantity of sub-blocks within the encrypted data block, ...
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011866

An apparatus may include a processor component caused to: generate map entries in map data descriptive of encrypted data blocks within a data file; use first map block encryption data to encrypt a first map extension of the map data; transmit the encrypted first map extension for storage within the data file; store the first map block encryption data within ...
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011865

An apparatus including a processor caused to: receive sizes and data block encryption data for multiple encrypted data blocks from multiple node devices, wherein data block encryption data is separately generated and used by each node device to encrypt a portion of a data set to generate one of the multiple encrypted data blocks; for each encrypted data block, generate ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Selective memory encryption
Hewlett Packard Enterprise Development Lp
January 11, 2018 - N°20180011802

In one example in accordance with the present disclosure, a method may include receiving, by a processor on a system on a chip (soc), a request to encrypt a subset of data accessed by a process. The method may also include receiving, at a page encryption hardware unit of the soc, a system call from an operating system on behalf ...
Data encryption and decryption method and encryption and decryption device
Guangdong Oppo Mobile Telecommunications Corp., Ltd.
January 04, 2018 - N°20180007015

An encryption method for data includes acquiring data to be encrypted and user information set relevant to the encryption, sending a key acquisition instruction to a terminal corresponding to the user information, receiving a key returned from the terminal corresponding to the user information, encrypting the data to be encrypted by using the key, and transmitting encrypted data to the ...
Electronic signature framework with enhanced security
Adobe Systems Incorporated
January 04, 2018 - N°20180006825

Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories. The electronic signature server optionally retains an encrypted copy of ...
Method and system for group-oriented encryption and decryption with selection and exclusion functions
University Of Science And Technology Beijing
January 04, 2018 - N°20180006811

A method and system for group-oriented encryption and decryption that supports the implementation of the designation and revocation functions of decryption users in a large-scale group. During the encryption, the system acquires a corresponding aggregate function according to an encryption mode; acquires any selected subset s and public parameters, and outputs an aggregate value of the subset s; generates a ...
Electronic and paper combined data submission, printing, and retrieval method and its system
Fujian Foxit Software Development Joint Stock Co., Ltd.
January 04, 2018 - N°20180004983

An electronic and paper combined data submission, printing, and retrieval method includes: completing an application in a client terminal, sending the user-entered data in the client terminal to a remote storage server; printing the completed application together with a barcode containing a unique identification code; retrieving the electronic data stored in the remote storage server by scanning said identification code. ...
Systems and methods for cloud data security
Docusign, Inc.
December 28, 2017 - N°20170374048

Techniques for providing data security services with respect to cloud-based services are described. Examples include a security service provider (“ssp”) configured to perform or provide one or more security-related services or functions with respect to or on behalf of some other system or service. The other system or service may be, for example, a cloud-based system ...
Locking and unlocking system and key unit
Toyota Jidosha Kabushiki Kaisha
December 28, 2017 - N°20170374047

A locking and unlocking system includes: a portable terminal; a key unit; and a locking and unlocking device of a vehicle or facilities. The portable terminal includes a first sending unit sending first authentication information to the key unit. The key unit includes: a first storage unit; a first authentication unit performing authentication based on the first authentication information; a ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Aes hardware implementation
December 28, 2017 - N°20170373836

Aes encryption or decryption, modifying the current key values and modifying the current state array by: processing the current state array using at least a portion of the current key values; generating key values based upon the current key values for use in a subsequent round; and updating the current key values to replace at least a portion of the ...
Using secure key storage to bind a white-box implementation to one platform
Nxp B.v.
December 28, 2017 - N°20170373828

A method for performing a secure function in a data processing system is provided. In accordance with one embodiment, the method includes generating and encoding an encryption key. The encoded encryption key may be encrypted in a key store in a trusted execution environment (tee) of the data processing system. The encrypted encryption key may encrypted, stored, and decrypted in ...
Information processing system, terminal, and determination apparatus
Fujitsu Limited
December 28, 2017 - N°20170372092

An information processing system including an information processing apparatus, a terminal, and a determination apparatus, wherein the information processing apparatus is configured to generate first information and second information based on first decryption information and specified condition information, an encrypted data file is decrypted by using the first decryption information, transmit the first information to the terminal, and transmit the ...
Leakage prevention apparatus, leakage prevention method and program
Nippon Telegraph And Telephone Corporation
December 28, 2017 - N°20170372086

An assumed use permission range storage stores a predetermined assumed use permission range. An unavailable state storage stores an information asset in an unavailable state by encryption. An available state storage stores an information asset in an available state by decryption. A leakage-concerned state storage stores an information asset in a leakage-concerned state. When use of an information asset in ...
Printing system, encryption key change method, printer, and program
Konica Minolta, Inc.
December 28, 2017 - N°20170372084

A printing system includes: a program of a printer drive; and printers, wherein the printing system encrypts part of a print job and transmits the print job to the printer, the printer includes a setting unit configured to receive a setting of a new encryption key, a storage unit, an encryption unit configured to generate new encryption key information, a ...
Secured data transmission using identity-based cryptography
The Boeing Company
December 21, 2017 - N°20170366520

A system is provided for secure data transmission. The system stores a public master key, private decryption key and secure messaging module for securely transmitting and receiving a digital model data file for transmission via a work order message. For transmitting and receiving the work order message, the system generate public encryption keys using a key generation algorithm in which ...
Proofs of plaintext knowledge and group signatures incorporating same
International Business Machines Corporation
December 21, 2017 - N°20170366349

Systems and methods are provided for proving plaintext knowledge of a message m, encrypted in a ciphertext, to a verifier computer. The method includes, at a user computer, encrypting the message m via a predetermined encryption scheme to produce a ciphertext u, and generating a plurality l of challenges ci, i=1 to l, dependent on the ciphertext u. For each ...
Method and system for providing encrypted data
Nec Europe Ltd.
December 21, 2017 - N°20170366338

A method for providing encrypted data on a client, a cloud or the like includes, providing, for each user, a user-specific encryption key for encrypting user-specific plaintext. A common decryption key is computed with a pre-determined f netion using the user-specific encryption keys as input for the function, the function is a polysized function supporting poly-many additions and a single ...
Loading