Follow us on Twitter
twitter icon@FreshPatents


Decryption patents

      

This page is updated frequently with new Decryption-related patent applications.

SALE: 270+ Decryption-related patent PDFs



 Data encryption/decryption using neurological fingerprints patent thumbnailData encryption/decryption using neurological fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical fingerprint; and encrypting data with an encryption algorithm using the neuro-mechanical fingerprint as a key..
Aerendir Mobile Inc.


 Providing forward secrecy in a terminating tls connection proxy patent thumbnailProviding forward secrecy in a terminating tls connection proxy
An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server.
Akamai Technologies, Inc.


 Personalized whitebox descramblers patent thumbnailPersonalized whitebox descramblers
The invention prevents intercepted keys from being used in unauthorized whitebox descrambler modules for the decryption of a ciphertext. Hereto a receiver with a personalized whitebox descrambler is proposed, whereby a part of the descrambling operation of the personalized descrambler is performed in a preprocessing module external to the descrambler..
Irdeto B. V.


 Systems and methods for protecting internet advertising data patent thumbnailSystems and methods for protecting internet advertising data
Systems and methods are disclosed for protecting user privacy in, for example, online advertising environments. The method includes receiving data related to a user in a first communication session between a host server and a client device, and generating a user profile associated with the user.
Aol Inc.


 Vorrichtung, die zugriffsschutz fuer strukturhaltige verteilte daten realisiert patent thumbnailVorrichtung, die zugriffsschutz fuer strukturhaltige verteilte daten realisiert
A device for accessing metadata information of a file system is provided. The device includes an interface and a processor.
Fraunhofer-gesellschaft Zur Foerderung Der Angewandten Forschung E.v.


 Logging encrypted data communications for qoe analysis patent thumbnailLogging encrypted data communications for qoe analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such communications for purposes of identifying communication issues that may affect user qoe (quality of experience). In certain embodiments, an application may be modified to log communication data before encryption and after decryption.
T-mobile Usa, Inc.


 Systems and methods for decryption as a service via a message queuing  protocol patent thumbnailSystems and methods for decryption as a service via a message queuing protocol
Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second.
Bluefin Payment Systems, Llc


 Key storage methods patent thumbnailKey storage methods
A method of storing a security key used for encrypting and decrypting data is provided. A host quick response (qr) code host image qro is generated and a security key used with encryption/decryption of data is divided.
Safe Cash Payment Technologies, Inc.


 Construction and uses of variable-input-length tweakable ciphers patent thumbnailConstruction and uses of variable-input-length tweakable ciphers
Innovations in the construction and use of variable-input-length tweakable ciphers (“viltcs”). In some cases, a viltc uses an initialization vector that is protected from exposure outside an encryption/decryption system in order to provide enhanced security with efficient performance.
Portland State University


 Decryption of access codes of diverse protocols in barrier operator systems patent thumbnailDecryption of access codes of diverse protocols in barrier operator systems
Disclosed are alternate embodiments of various components of a barrier operator system. And methods of operation, including of the mechanical drive subsystem with segmented and self-locking rail unit, rail mounting supports, belt and chain drive tensioning, and drive assembly carriage and interface; the electronics and software routines for controlled operation of the various barrier operator functions; wall console communications with the barrier operator; encryption and decryption of access codes; establishment and monitoring of travel limits and barrier speed and force profiles; thermal protection of barrier operator drive motors; and establishment and control of communications from the barrier operator to accessories by way of a wireless adapter..
Microchip Technology Incorporated


Electronic payment validation and authorization system

A system for performing electronic payment validation and authorization wherein a user of an electronic device transmits transaction data to an electronic payment validation and authorization system. The same user of the electronic device may nearly simultaneously transmit a cryptographic hash of transaction data to a merchant who uses a payment processing system to process the transactions.
Aerius, Inc.

Systems and methods for decryption as a service via a configuration of read-only databases

Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second.
Bluefin Payment Systems, Llc

Fingerprint decryption

The present disclosure is applicable to the technical field of fingerprint identification, and provides a fingerprint decryption method and device. The method includes the following steps: receiving n input fingerprints, n being an integer greater than or equal to 2; and decrypting a to-be-decrypted object according to the n input fingerprints, the to-be-decrypted object being encrypted by using n preset fingerprints.
Shenzhen Huiding Technology Co., Ltd.

Method for performing similar-information search while keeping content confidential by encryption

A similar-information search method includes obtaining an instruction indicating which of an encrypted search and an unencrypted search a data computation device is to perform; generating an encrypted feature quantity and transmitting the encrypted feature quantity to the data computation device; generating an encrypted similarity value and transmitting the encrypted similarity value; and receiving encrypted reference data from the data computation device and decrypting the encrypted reference data. A homomorphic encryption scheme that makes decryption by the data computation device unsuccessful is used when the encrypted search is performed, whereas an encryption scheme that makes decryption by the data computation device successful is used when the unencrypted search is performed..
Panasonic Intellectual Property Corporation Of America

Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system

A machine-to-machine (m2m) partner automates all program parameter calculations through scripting or programming during an end-to-end encryption and decryption process. A platform dynamically scripts or programs the calculation of the encryption parameters and automatic response to alarms and alerts or to protect data transfers.

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted by an rsa public key; and performing at least one multiplication operation and at least one square operation according to an rsa private key and the encrypted data to acquire decrypted data. A false square operation is performed in performing one of the at least one multiplication operation, or a false multiplication operation is performed in performing one of the at least one square operation..
Realtek Semiconductor Corporation

Decryption device, method, and circuit

A decryption method includes receiving encrypted data, in which the encrypted data is encrypted according to an rsa public key; and performing a plurality of operations in sequence according to an rsa private key and the encrypted data to acquire a decrypted data. The operations include a plurality of decryption operations and at least one false operation.
Realtek Semiconductor Corporation

Encryption management, content recording management, and playback management in a network environment

Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location.
Time Warner Cable Enterprises Llc

Secure island computing system and method

A mobile computing device includes a secure token, having an embedded processor, a secure persistent storage medium, and a read only memory; and, an application processor and application memory separate from the embedded processor, the secure persistent storage medium, and the read only memory. The application memory stores application instructions for execution by the application processor.
Pacid Technologies, Llc

Device and processing image

A device and a method for processing an image by a multimedia device that supports encryption and decryption are provided. The device includes a thumbnail image of an original image is obtained and the original image is encrypted using a first encryption scheme.
Samsung Electronics Co., Ltd.

Systems and methods for decryption as a service via a hardware security module

Systems and methods for decryption of payloads are disclosed herein. In various embodiments, systems and methods herein are configured for decrypting thousands of transactions per second.
Bluefin Payment Systems, Llc

Smart resource access for decrypted information

In an approach for protecting a resource, a processor receives a resource and a parameter, wherein the parameter indicates a condition upon which the resource will be made accessible. A processor encrypts the resource.
International Business Machines Corporation

Systems and methods for utilizing hardware assisted protection for media content

This disclosure describes systems and methods related to utilizing hardware assisted protection for media content. In some embodiments, a provided method comprises: receiving, from a content server and by a computing device processor of a secure enclave of a device, first encrypted media content; decrypting, by the computing device processor, the first encrypted media content using a first decryption key; generating, by the computing device processor, a second decryption key; encrypting, by the computing device processor, the first decrypted media content using the second key, thereby resulting in second encrypted media content; and sending, by the computing device processor and to one or more graphical processing units (gpus) comprised in a graphics component of the device, the second encrypted media content and the second decryption key..
Mcafee, Inc.

Holographic encryption of multi-dimensional images and decryption of encrypted multi-dimensional images

Cryptographic techniques for encrypting images, and decrypting and reconstructing images, are provided to facilitate preventing unauthorized access to images. A holographic cryptographic component (hcc) generates complex holograms of multi-dimensional source images of a multi-dimensional object scene.
City University Of Hong Kong

Advance decryption key acquisition for streaming media content

Various arrangements are presented for reducing channel change times. A first tuner of a television receiver may tune to a decryption key transponder stream.
Echostar Technologies L.l.c.

Apparatus and exchanging encryption key

Disclosed herein are an apparatus and method for exchanging an encryption key. According to an embodiment of the present disclosure, an encryption key exchange apparatus includes an encryption unit to generate a first diffie-hellman value and a first secret key using a first random integer and a public key of a second communication device and to encrypt certification data by a symmetric key cryptography using the first secret key, a transmitter to transmit the first diffie-hellman value and the encrypted certification data to the second communication device, a receiver to receive, from the second communication device, a second diffie-hellman value generated using a second random integer selected by the second communication device, and an acknowledgement message encrypted by the symmetric key cryptography using a second secret key generated from the second random integer and the first diffie-hellman value, and a decryption unit to generate the second secret key using the first random integer and the second diffie-hellman value and to decrypt the encrypted acknowledgement message using the generated second secret key..
Samsung Sds Co., Ltd.

Secure communications using organically derived synchronized processes

Organically derived synchronized processes provide encryption parameter management in a certificate-less system. A first node generates a parameter data set containing multiple values; uses a seed value stored at the first node to select values from a random parameter data set to form a parameter subset; generates encryption parameters using the subset; encrypts user data using the encryption parameters; generates a signature based at least on the parameter data set; and transmits a start frame including the parameter data set, the encrypted user data, and the signature.
Olympus Sky Technologies, S.a.

Polymorphic encryption key matrices

Space-efficient key allocations in broadcast encryption systems are provided. In some embodiments, a key bundle is read.
International Business Machines Corporation

System and an enhanced xor cipher through extensions

A system and method for providing a rapid, yet highly secure cryptographic technique, to provide enhanced protection for digital data. At least one random value and deterministic sequence generator (dsg) seeds are mathematically processed to create an initialization value (iv).
Secure Channels Sa

Managing privacy of information during shipments

A method for managing privacy of information on a shipping label associated with a shipment is provided. The method includes receiving information associated with the shipment, generating at least two decryption keys associated with at least two pieces of information from the information, generating encrypted messages by encrypting the at least two pieces of information based on the at least two decryption keys including a first and second encrypted message encrypted based on a first and second decryption key, respectively, generating a machine-readable code including the encrypted messages, generating a shipping label including machine-readable code, and providing the first and second decryption keys based on a first and second status of the shipment, respectively..
International Business Machines Corporation

Systems and methods for securing data

Some embodiments of the present invention include an apparatus for securing data and include a processor, and one or more stored sequences of instructions which, when executed by the processor, cause the processor to set a data download threshold, encrypt data to be downloaded by a user based on detecting size of the data violating the download threshold such that the user receives encrypted downloaded data, and manage a decryption key used to decrypt the encrypted downloaded data. The decryption key may be deconstructed into “n” key fragments and may be reconstructed using “k” key fragments where “n” is equal to “2k−1”..
Salesforce.com, Inc.

Mediated secure boot for single or multicore processors

A system and methods are disclosed for securely booting a processing system using a three step secure booting process. Several embodiments are presented, wherein upon power-on-reset, the first boot step uses a secure boot device comprising of a programmable device or an fpga which boots up first, validates its configuration file and then validates the processor(s) configuration data before presenting the configuration data to the processor(s).
Raytheon Company

Column wise encryption for lightweight db engine

An apparatus and method for operating a relational database (db) are provided. The method includes determining a sensitivity classification for a column of a table in the db, performing encryption, using a data encryption key (dek), of sensitive data when writing the sensitive data to the column determined to be sensitive, performing decryption, using the dek, of the encrypted sensitive data when reading the sensitive data from the column determined to be sensitive, and performing writing to the column and reading from the column of unencrypted non-sensitive data when the column is determined to be non-sensitive..
Samsung Electronics Co., Ltd.

Systems and methods for implementing modular digital encryption key management solutions

An encryption key management apparatus receives from an authorized compute device, a raw dataset that is encrypted with at least one asymmetric encryption key. The apparatus can determine, based on the raw dataset, an identifier of a first entity associated with the raw dataset and an identifier of a second entity associated with the raw dataset.
Iaspire, Llc

Group license encryption and decryption

According to an aspect, a computing device may include a media content handler to obtain media content, a group license manager to determine whether or not the media content is part of a license group, and when the media content is determined as part of the license group, the group license manager may determine whether a master key for the license group was previously received. The group license manager may send, over a network, a license request to a license manager when the master key was not previously received.
Google Inc.

Apparatus for controlling copying of broadcast content and recording and playing back broadcast content using the same

Disclosed herein are an apparatus for controlling copying of broadcast content and a method for recording and playing back broadcast content using the apparatus. The broadcast content copying control apparatus includes a communication unit for receiving a request for recording of broadcast content from a drm client, and receiving content management information (cmi) corresponding to the broadcast content from a dmcd server, a security package configuration unit for configuring a dmcd security package using the cmi, a content management unit for recording the broadcast content based on recording permission information included in the cmi, and an encryption/decryption unit for encrypting the broadcast content, wherein the communication unit transmits recording result information to the drm client, wherein the recording result information includes at least one of recording status information of the broadcast content, copy control information (cci) corresponding to the broadcast content, and the cmi..
Electronics And Telecommunications Research Institute

Method and system for device dependent encryption and/or decryption of music content

A method and system is disclosed that provides at least one server device; and at least one remote audio playback device, the remote audio playback device including a unique identifier stored thereon. An encryption key is created by the at least one server device.
Onulas, Llc

System and methods for dynamically and randomly encrypting and decrypting data

A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods.
Plankwalk Corp.

Homomorphically-created symmetric key

One embodiment of the invention includes a method, including performing, a symmetric homomorphic encryption of a secret sa with a cryptographic key h as input yielding a homomorphic encryption result sa*, sending sa* for mathematical combination by at least one device with at least one secret sb yielding g*, the device a not having access to sb, the at least one device not having access to sa and not having access to h, receiving g*, performing a symmetric homomorphic decryption of data based on g* with h as input yielding a first decrypted output, determining a symmetric cryptographic key ka based on the first decrypted output for secure communication with a first device which is operationally connected to, or includes, a tamper resistant security system including sa and sb therein, securing data using ka yielding secured data, and sending the secured data to the first device.. .
Cisco Technology, Inc.

Method and system for providing access to a video content

Disclosed is a method for providing access to a video content. The method comprises providing a first encryption key, recording a first video with at least one video camera and encrypting the first video with the first encryption key.
Teleste Oyj

Authentication of networked devices having low computational capacity

Authentication of a networked device with limited computational resources for secure communications over a network. Authentication of the device begins with the supplicant node transmitting a signed digital certificate with its authentication credentials to a proxy node.
Texas Instruments Incorporated

Anonymous authentification method and authentification system using the same

An anonymous authentication method is implemented by an authentication device that has a key array. The key array has multiple array dimensions each having multiple device keys.
Chang Jung Christian University

Virtualized application performance through disabling of unnecessary functions

Improved virtualized application performance is provided through disabling of unnecessary functions, such as unnecessary encryption and decryption operations. An example method performed by a hypervisor includes the steps of obtaining a request to one or more of encrypt and decrypt a communication between a first virtual machine and a second virtual machine; determining if the first and second virtual machines execute on a same host as the hypervisor (e.g., by evaluating a context of the communication); and processing the communication without encrypting or decrypting the communication if the first and second virtual machines execute on the same host.
Alcatel-lucent Usa Inc.

Electronic signature framework with enhanced security

Improved document processing workflows provide a secure electronic signature framework by reducing attack vectors that could be used to gain unauthorized access to digital assets. In one embodiment an electronically signed document is removed from an electronic signature server after signed copies of the document are distributed to all signatories.
Adobe Systems Incorporated

Multivariate cryptography based on clipped hopfield neural network

The systems and methods disclosed herein, in one aspect thereof, can encrypt and decrypt messages using a multivariate extended clipped hopfield neural network that uses a diffie-hellman like key exchange algorithm. The proposed cryptosystem comprises three stages that are involved in the communication.
City University Of Hong Kong

Key ladder apparatus and method

In one embodiment a method, apparatus and system for is described for receiving a first input including a first decryption key and a second input including an encrypted second decryption key at a cryptographic decryption apparatus, the encrypted second decryption key to be decrypted by the cryptographic apparatus according to the first decryption key, storing a value of a key ladder length in a first register by a cryptographic processor, and using the stored value as a loop index by the cryptographic processor for a number of iterations of the cryptographic decryption apparatus executed as a loop, wherein at one stage in the loop execution of the cryptographic decryption apparatus, the second input includes the key ladder length, wherein the loop operation of the cryptographic decryption apparatus operates for a number of iterations equal to an initial value of the loop index. Related methods, apparatuses and systems are also described..
Cisco Technology, Inc.

Efficient sharing of hardware encryption pipeline for multiple security solutions

A processing or memory device may include a first encryption pipeline to encrypt and decrypt data with a first encryption mode and a second encryption pipeline to encrypt and decrypt data with a second encryption mode, wherein the first encryption pipeline and the second encryption pipeline share a single, shared pipeline for a majority of encryption and decryption operations performed by the first encryption pipeline and by the second encryption pipeline. A controller (and/or other logic) may direct selection of encrypted (or decrypted) data from the first and second encryption pipelines responsive to a region of memory to which a physical address of a memory request is directed.
Intel Corporation

Multiply-encrypting data requiring multiple keys for decryption

A server receives a piece of data for encryption. The server encrypts the piece of data such that no single key can decrypt the encrypted piece of data and any combination of a first multiple of unique keys taken a second multiple at a time are capable of decrypting the encrypted piece of data.
Cloudflare, Inc.

Nado cryptography with key generators

A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key.

System and a self-calculating token vault

A system and method for electronic payment that involves generating and then using a temporary token based on a legacy pan (primary account number) to conduct an electronic transaction. The token is generated by transforming the pan using specific inputs such that the original pan can be recovered by manipulating the token in various ways as disclosed herein.
Sequent Software, Inc.

Modifying a content descriptor to facilitate delivery of token-authorized encrypted data

Described herein are various technologies pertaining to delivery of token-authenticated encrypted data. Content descriptor(s) (e.g., playlist(s)) can be modified to facilitate exchange of a token for a decryption key for browser(s) that do not provide logic to manage a flow of the token..
Microsoft Technology Licensing, Llc

Methods and architecture for encrypting and decrypting data

Methods of securely encrypting and decrypting data stored within computer readable memory of a device are described. Additionally, a memory encryption unit architecture (200) is described.
Nxp B.v.



Decryption topics:
  • Decryption
  • Encryption
  • Data Processing
  • Data Storage
  • Public Key
  • Multimedia
  • Ciphertext
  • Hierarchical
  • Storage Device
  • Data Center
  • Computer Program
  • Network Security
  • Secret Key
  • Digital Certificate
  • Certificate


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Decryption for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Decryption with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.5822

    file did exist - 2389

    2 - 1 - 52