Images List Premium Download Classic

Decryption

Decryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Checkout and payment
Coinbase, Inc.
April 12, 2018 - N°20180102898

A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are combined to store an operational master key. The operational master key is used for private key encryption during a checkout process. The operational private key is used for private key decryption for transaction signing in a payment ...
Trust-enhanced attribute-based encryption
Intel Corporation
April 12, 2018 - N°20180101688

Embodiments are directed to protecting, and recovering protected information, with attribute-based encryption. A predefined attribute policy defines one or more combinations of recipient attributes that entitle the recipient entity to attain access to the protected information. A set of at least one trust criterion is derived from the predefined attribute policy. The at least one trust criterion represents a measure ...
Encryption system, encryption method and encryption device
Fujitsu Limited
April 12, 2018 - N°20180101687

An encoding unit encodes at least a part of items of a csv file including a plurality of records having a plurality of items with a unit of items of respective records. A creation unit creates an encrypted dictionary in which an encoded dictionary having been used for the encoding is encrypted with a unit of dictionary. A transmission unit ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Secure unattended network authentication
Hand Held Products, Inc.
April 12, 2018 - N°20180101675

A system for secure network access by unattended devices is described. The system describes how unattended devices that have encrypted data at rest and/or require secure authentication to an open network may procure the access credentials for authentication and/or decryption. With these access credentials, then the unattended devices may exchange information with and/or receive updates from servers ...
Imaging systems with data encryption and embedding capabalities
Semiconductor Components Industries, Llc
April 05, 2018 - N°20180097636

An imaging system may embed encrypted data into image data. The imaging system may generate image data in response to light received at a pixel array. The imaging system may include encryption circuitry that accesses an encryption key. The encryption circuitry may receive data related to the imaging system and/or to an environment in which an image is captured ...
Data transmission method and computer program
Semiconductor Energy Laboratory Co., Ltd.
April 05, 2018 - N°20180097622

Provided are a novel data transmission method and a novel computer program. A mobile terminal (the device 14a) includes the display unit 114 in which the liquid crystal layer 115 and the el layer 116 are stacked with a reflective layer positioned therebetween. The device 14a transmits information of the device 14a, such as unique information, location information, and time information, to the ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for symmetric block encryption or decryption
March 29, 2018 - N°20180091297

Application of the inverse of said function (f, g) to data dependent on the data produced by the permutation step (100, 104) using the generated permutation table (pc1′, pc2′).
Digital rights management for http-based media streaming
Mobitv, Inc.
March 29, 2018 - N°20180089400

Techniques and mechanisms described herein facilitate the management of digital rights for media content item presentation. According to various embodiments, a request for a content decryption key may be received at a media application implemented at a computing device. The request may be transmitted by a media content player implemented at the computing device. The request may be transmitted in ...
Secure computing
March 29, 2018 - N°20180089108

Techniques and logic are presented for encrypting and decrypting applications and related data within a multi-processor system to prevent tampering. The decryption and encryption may be performed either between a system bus and a processor's individual l1 cache memory or between a processor's instruction and execution unit and their respective l1 caches. The logic may include one or more linear ...
Virtualizing non-volatile storage at a peripheral device
Amazon Technologies, Inc.
March 29, 2018 - N°20180088804

A peripheral device may implement storage virtualization for non-volatile storage devices connected to the peripheral device. A host system connected to the peripheral device may host one or multiple virtual machines. The peripheral device may implement different virtual interfaces for the virtual machines or the host system that present a storage partition at a non-volatile storage device to the virtual ...
Stateless server-based encryption associated with a distribution list
Red Hat Israel, Ltd.
March 22, 2018 - N°20180083947

An example method of decrypting electronic messages includes receiving, by an authentication module of a decryptor device, authentication requests from a plurality of destination clients. The method also includes receiving, by a decryption module of the decryptor device, encrypted electronic messages from the plurality of destination clients. The encrypted electronic messages are derived from a common electronic message sent by ...
System and methods for point to point encryption and tokenization in a hosted environment
Wal-mart Stores, Inc.
March 22, 2018 - N°20180083936

Mechanisms for providing point to point encryption and tokenization enabling decryption, tokenization and storage of sensitive encrypted data on one system are discussed.
Systems and methods for protecting internet advertising data
Oath Inc.
March 22, 2018 - N°20180083928

Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a user in a first communication session between a host server and a client device, and generating a user profile associated with the user. The method further may include encrypting the user profile to produce encrypted user profile ...
Decryption Patent Pack
Download 205+ patent application PDFs
Decryption Patent Applications
Download 205+ Decryption-related PDFs
For professional research & prior art discovery
inventor
  • 205+ full patent PDF documents of Decryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and methods for point to point encryption and tokenization using a mobile device
Wal-mart Stores, Inc.
March 22, 2018 - N°20180082289

Mechanisms for providing point to point encryption and tokenization enabling decryption, tokenization and storage of sensitive encrypted data on one system are discussed.
Confidential data processing system
Hitachi, Ltd.
March 22, 2018 - N°20180082078

Encryption methods allowing encrypted data to be stored in a database and processed in the encrypted state have been proposed. However, since it is necessary for an application to use plaintext data, usage is only possible where security is assured. When an application for processing encrypted data stored in a database is used from a user system, the application is ...
Cloud storage encryption
Zettaset, Inc.
March 22, 2018 - N°20180082076

Techniques are disclosed for securing data in a cloud storage. Plaintext files are stored as secured, encrypted files in the cloud. The ciphering scheme employs per-block authenticated encryption and decryption. A unique file-key is used to encrypt each file. The file-key is wrapped by authenticated encryption in a wrapping-key that may be shared between files. A centralized security policy contains ...
Methods and systems for link-based enforcement of routing of communication sessions via authorized media relays
Nagravision S.a.
March 15, 2018 - N°20180077126

Disclosed herein are methods and systems for link-based enforcement of routing of communication sessions via authorized media relays. In an embodiment, a media relay receives encrypted first payloads from a first endpoint and encrypted second payloads from a second endpoint as part of a session. The encrypted first payloads require a first key for decryption and the encrypted second payloads ...
Data management apparatus, data management method and computer readable recording medium
Nec Solution Innovators, Ltd.
March 15, 2018 - N°20180077123

A data management apparatus (10) is for managing data shared by a plurality of users. The data management apparatus (10) includes: an encryption processing unit (11) that encrypts the shared data; a coordinate acquisition unit (12) that, when one of the plurality of users has transmitted coordinates that have been pre-allocated thereto together with a request for decryption of the shared data, requests each ...
Input authentication method
March 15, 2018 - N°20180075225

An input authentication method for verifying an accuracy of a password data inputted by a user, comprising the steps providing a sensing unit for sensing and reading a decryption data inputted by the user; providing a timing unit used for calculating decryption time intervals lapsed between decryption passwords of the decryption data; providing a recording unit for recording predefined encryption ...
System and method for controlling manufacturing of an item
Leo Lane Ltd
March 15, 2018 - N°20180075167

A system and method for controlling manufacturing of one or more items may include providing a first 3d design representation, the first 3d design representation usable by a manufacturing device for manufacturing the item; encrypting the first 3d design representation to produce an encrypted 3d design representation; associating a set of tokens with the encrypted 3d design representation and providing ...
Multi-stage memory integrity method and apparatus
Intel Corporation
March 15, 2018 - N°20180074975

Embodiments of apparatus, method, and storage medium associated with multi-stage memory integrity for securing/protecting memory content are described herein. In some embodiments, an apparatus may include multiple stages having respective encryption engines to encrypt data in response to a write or restore operation; wherein the encryption engines are to successively encrypt the data in a plurality of encryption stages ...
Loading