Images List Premium Download Classic

Decryption

Decryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW System, apparatus and method for safety state management of internet things (iot) devices
Intel Corporation
June 22, 2017 - N°20170180340

In one embodiment, a device includes: at least one processor; at least one sensor to sense an environmental condition; and a storage to store instructions that, when executed by the at least one processor, enable the device to: receive an encrypted nonce from a safety controller; decrypt the encrypted nonce using a value obtained from an entropy multiplexing seed tree ...
NEW Payment system
Kuang-chi Intelligent Photonic Technology Ltd.
June 22, 2017 - N°20170178126

The present application discloses a payment system to enhance security of the entire payment system and ensure fund security in a payment process. The technical solution is: in the entire payment system, designing encryption and decryption solutions at a payment end, a consumer end, and an account management server end separately; performing hierarchical encryption on data transmission and storage, and ...
NEW Personal ledger blockchain
International Business Machines Corporation
June 22, 2017 - N°20170177898

A system, method, and computer readable storage medium configured for storing encrypted data in a blockchain. To write additional data in a blockchain, a request is received at a computing node. The request is typically cryptographically signed by a user system to include a new transaction with additional data in the blockchain. The additional data is previously encrypted with an ...
NEW Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Anonymization system
Toshiba Solutions Corporation
June 22, 2017 - N°20170177683

According to one embodiment, there is provided an anonymization system including at least one encryption apparatus, an anonymization apparatus, and a decryption apparatus. The encryption apparatus store personal data including one or more values for each item, and generates encrypted data from the personal data by encrypting the one or more values for each item included in the personal data. ...
Unmanned aerial vehicle operator identity authentication system
Nuvoton Technology Corporation
June 15, 2017 - N°20170170972

An unmanned aerial vehicle operator identity authentication system is provided, including a flight control module and a license certificate module connected with each other. The flight control module includes a first encryption and decryption unit for generating a random number code, and a first storage unit for storing a license register table. The license certificate module includes a second storage ...
Decoy bits method for direct encryption and key generation
Quantum Advance Technology, Inc.
June 15, 2017 - N°20170170953

A new cryptographic technique is disclosed, called decoy bits method, which can be used to obtain near ideal information theoretic security in both quantum and classical key generation and data encryption, not only for raw security but also under known-plaintext attacks. The technique relates to a method of data encryption by insertion of random bits, called decoy bits, into a ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Devices and methods for encryption and decryption of graphical 3d objects
Thomson Licensing
June 15, 2017 - N°20170169232

A processor of an encryption device obtains a graphical 3d object having a plurality of points, each point being defined by at least three coordinate values, generates a mask, applies the mask, using an operator, to at least selected points of the plurality of points to obtain an encrypted graphical 3d object and outputs the encrypted graphical 3d object. The ...
A trusted geolocation beacon and a method for operating a trusted geolocation beacon
"billennium" Spolka Z Ograniczona Odpowiedzialnoscia
June 08, 2017 - N°20170164142

A method for operating a trusted geolocation beacon, the method comprising the steps of: generating (101) a public and private keys pair associated with the beacon; associating a unique identifier with the beacon; transmitting (104) the public key associated with the unique identifier to an external device; cyclically transmitting (201) beacon's identifier as well as its transmitter's signal power (202); transmitting (302) a signal comprising ...
Methods and apparatus for persistent control and protection of content
Intertrust Technologies Corporation
June 08, 2017 - N°20170164046

A novel method and apparatus for protection of streamed media content is disclosed. In one aspect, the apparatus includes control means for governance of content streams or content objects, decryption means for decrypting content streams or content objects under control of the control means, and feedback means for tracking actual use of content streams or content objects. The control means ...
Encrypted file printing system, encrypted file printing method, and encrypted file print control program
Konica Minolta, Inc.
June 08, 2017 - N°20170163841

An encrypted file printing system includes: a client terminal configured to generate a print file; an authorization management server configured to manage authorization of the print file; and an image forming apparatus configured to perform printing of the print file, the client terminal, the authorization management server, and the image forming apparatus being connected by a communication network, wherein the ...
Secure internet atm
Sampath Bank Plc
June 08, 2017 - N°20170161700

A secure system is described to access atm-enabled financial accounts over the internet so that customers of a financial institution with an atm-enabled account can perform through the internet many of the transactions provided through a physical atm without requiring the user to pre-register with the financial institution. The system of the present invention provides access to an atm-enabled account ...
Three-dimensional design and manufacturing systems
Grow Software Limited
June 08, 2017 - N°20170157859

Embodiments relate to printing a three-dimensional (3d) article from a 3d design file describing a 3d design. A computer processor receives the design file in an encrypted format. The design file includes a design file identifier and a 3d printer identifier identifying a 3d printer capable of printing a 3d article in accordance with the design file. The processor constructs ...
Securing enterprise data on mobile devices
International Business Machines Corporation
June 01, 2017 - N°20170156058

Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by an application disposed on a mobile computing device, a request to access the enterprise data stored on the mobile computing device in an encrypted format and determining whether the mobile computing device is in communication with an enterprise network. ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Securing enterprise data on mobile devices
International Business Machines Corporation
June 01, 2017 - N°20170156056

Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving, by an application disposed on a mobile computing device, a request to access the enterprise data stored on the mobile computing device in an encrypted format and determining whether the mobile computing device is in communication with an enterprise network. ...
Information processing method and device
Beijing Zhigu Rui Tuo Tech Co., Ltd.
June 01, 2017 - N°20170156054

The present application provides an information processing method and device, and relates to the field of information encryption and decryption. The method comprises: sharing first information on a social network; generating a key according to the first information; encrypting second information by using the key, to obtain encrypted information; and wirelessly broadcasting the encrypted information. According to the method, persons ...
Moving content between set top box and end devices in home
Google Technology Holdings Llc
June 01, 2017 - N°20170155951

A content moving device which enables providing content stored on a first user device, such as a dvr, in a first format and resolution to be provided to a second user device, such as a portable media player (pmp) in a second format and resolution. The content moving device identifies content on the first user device as candidate content which ...
Device, system and method for fast and secure proxy re-encryption
Encrypted Dynamics Llc
June 01, 2017 - N°20170155628

A device, system and method for fast and secure proxy re-encryption (pre) using key switching. A first user is assigned first encryption and decryption keys and a second user is assigned second encryption and decryption keys. First encrypted data encrypted with the first encryption key may be re-encrypted using a proxy re-encryption key to simultaneously switch encryption keys by adding ...
Cryptographic communication system and cryptographic communication method
Renesas Electronics Corporation
June 01, 2017 - N°20170155508

Provided is a cryptographic communication system including a first semiconductor device and a second semiconductor device. The first semiconductor device includes a common key generation unit that generates a common key ck(a) by using a unique code uc(a) and correction data cd(a), and an encryption unit that encrypts the common key ck(a) generated in the common ...
Securing enterprise data on mobile devices
International Business Machines Corporation
June 01, 2017 - N°20170155505

Embodiments include method, systems and computer program products for securing enterprise data in a mobile computing environment. Aspects include receiving a request to access the enterprise data stored on the mobile computing device in an encrypted format and determining whether a decryption key is stored in a cache memory of the mobile computing device. Based on determining that the decryption ...
Detecting potential legal decryption of historical data
International Business Machines Corporation
May 25, 2017 - N°20170149841

Systems and methods provide for detecting the potential legal decryption of transmitted data. When a device connects to a server over a network, such as the internet, the device determines whether a cipher without forward secrecy is used. If so, information regarding the connection is stored in a log. When the device subsequently connects to the server and receives a ...
Network bound decryption with offline encryption
International Business Machines Corporation
May 25, 2017 - N°20170149564

A method relates to receiving, by a processing device, a first request to decrypt encrypted data stored on an encrypted portion of a drive, transmitting, to a decryption server, a second request comprising an encrypted first encryption key, wherein the encrypted first encryption key is produced by encrypting a first encryption key using a public key of an asymmetric key ...
Loading