Follow us on Twitter
twitter icon@FreshPatents


Encryption patents

      

This page is updated frequently with new Encryption-related patent applications.




 Fast multicast messaging encryption and authentication patent thumbnailFast multicast messaging encryption and authentication
To prevent legitimate message recipients from forging new messages and to encrypt messages for a specific set of recipients (channel), a root key is encrypted and combined with a base session management key to render a combined root key, which in turn is encrypted with a public key of at least one recipient device render a session management key. The public key of each “n” intended recipient device encrypts the combined root key to render “n” session management keys.
Sony Computer Entertainment America Llc


 Data encryption/decryption using neurological fingerprints patent thumbnailData encryption/decryption using neurological fingerprints
In accordance with one embodiment, a method for securing data is disclosed. The method includes sensing multi-dimensional motion of a body part of a user to generate a multi-dimensional signal; in response to the multi-dimensional signal and user calibration parameters, generating a neuro-mechanical fingerprint; and encrypting data with an encryption algorithm using the neuro-mechanical fingerprint as a key..
Aerendir Mobile Inc.


 Encrypted ccnx patent thumbnailEncrypted ccnx
One embodiment provides a system that facilitates selective encryption of bit groups of a message. During operation, the system determines, by a content requesting device or content producing device, a message that includes a plurality of bit groups, each corresponding to a type, a length, and a set of values, wherein one or more bit groups are marked for encryption, and wherein the message indicates a name that is a hierarchically structured variable-length identifier comprising contiguous name components ordered from a most general level to a most specific level.
Palo Alto Research Center Incorporated


 System for providing end-to-end protection against network-based attacks patent thumbnailSystem for providing end-to-end protection against network-based attacks
A plurality of system nodes coupled via a dedicated private network is described herein. The nodes offer an end-to-end solution for protecting against network-based attacks.
Orock Holdings, Llc


 System and  secured content delivery patent thumbnailSystem and secured content delivery
A content delivery platform is provided that includes generating a first content package of content that is encrypted with a unique symmetric key, and a second content package including a link encrypted with the key to the first content package. The first content package is stored in a repository, and a request including the key is transmitted to a first computing device associated with a mail exchange for an encryption key file.
Eco-mail Development Llc


 Method and  secure data transmissions patent thumbnailMethod and secure data transmissions
An apparatus, system, and method are disclosed for secure data transmissions. A method includes receiving a request for data that is encrypted according to a first encryption scheme, and determining a first public ip address associated with the request.
Ciphertooth, Inc


 Stable probing-resilient physically unclonable function (puf) circuit patent thumbnailStable probing-resilient physically unclonable function (puf) circuit
Embodiments include apparatuses, methods, and systems for a physically unclonable function (puf) circuit. The puf circuit may include an array of puf cells to generate respective puf bits of an encryption code.
Intel Corporation


 Wireless communications device and control  wireless communications device patent thumbnailWireless communications device and control wireless communications device
A wireless communications device is constituted from a control station and a slave station that perform encryption communication using an encryption key and changes the encryption key in a predetermined procedure, during a call, and the device includes a controller that operates in such a manner that audio is reduced, if the procedure in which the encryption key is changed is not correctly executed, in a case where a change of the encryption key is made.. .
Panasonic Intellectual Property Management Co., Ltd.


 System and  implementing a one-time-password using asymmetric cryptography patent thumbnailSystem and implementing a one-time-password using asymmetric cryptography
A system, apparatus, method, and machine readable medium are described for authentication with asymmetric cryptography. For example, a method in accordance with one embodiment comprises: generating a challenge at a server; encrypting the challenge at the server using a public encryption key; transmitting the encrypted challenge to a connected device having a first connection over a network with the server; providing the encrypted challenge from the connected device to a user device; decrypting the encrypted challenge using a private encryption key corresponding to the public encryption key to determine the challenge; converting the challenge to a converted challenge, the converted challenge having a different format than the original challenge; receiving the converted challenge at the connected device and providing the converted challenge from the connected device to the server; and validating the converted challenge at the server to authenticate the user..
Nok Nok Labs, Inc.


 Logging encrypted data communications for qoe analysis patent thumbnailLogging encrypted data communications for qoe analysis
A device such as a smartphone may communicate with a server or other network entity using encrypted communications, making it difficult to examine such communications for purposes of identifying communication issues that may affect user qoe (quality of experience). In certain embodiments, an application may be modified to log communication data before encryption and after decryption.
T-mobile Usa, Inc.


Passive encryption of organization data

A data protection policy is implemented on a computing device, the data protection policy indicating how organization data on the computing device is to be protected. Protection of the organization data includes encrypting the organization data, and allowing the organization data to be decrypted only by particular programs and/or under particular circumstances (as indicated by the data protection policy).
Microsoft Technology Licensing, Llc

Encryption policies for various nodes of a file

A computing device may parse a file into a plurality of nodes. The computing device may associate, based on the parsing, at least a first encryption policy with a first node of the plurality of nodes.
International Business Machines Corporation

Detection, protection and transparent encryption/tokenization/masking/redaction/blocking of sensitive data and transactions in web and enterprise applications

A plurality of users connect to an application sending requests over a transport and receiving responses from an application that contain sensitive data. For each user request, the application runs one or more data requests and commands to various data sources or other information systems which return the sensitive data.
Secupi Security Solutions Ltd

Method of processing a ciphertext, apparatus, and storage medium

A method of processing a ciphertext, the method includes: acquiring a part of a plurality of encrypted elements included in the ciphertext, each of the plurality of encrypted elements being an encrypted element in which values of a plurality of elements in a multidimensional determination target vector are respectively encrypted by homomorphic encryption; decrypting the acquired part of the plurality of encrypted elements; and determining validity of the determination target vector based on a relationship between at least one value obtained by the decrypting and both of 0 and 1.. .
Fujitsu Limited

Instantiation of multiple electronic subscriber identity module (esim) instances

Methods are provided for instantiating multiple electronic subscriber identity modules (esims) to an electronic universal integrated circuit card (euicc) using a manufacturer-installed data binary large object (data blob). An esim package including the data blob in encrypted form is securely installed in the euicc in a manufacturing environment.
Apple Inc.

System and data security on big data sets

Systems and methods of securely storing and retrieving data are disclosed. A database may include a table of data with rows and columns and encrypted at rest.
American Express Travel Related Services Company, Inc.

Secure data storage on a cloud environment

A method for secure data storage in a cloud storage infrastructure comprises providing a set of first upload files to be stored in the cloud storage infrastructure, providing a set of first random noise files, splitting each file of the two sets into a group of fragments, recombining the fragments by randomly intermixing fragments from different groups thus generating a set of second upload files, encrypting each second upload file with a first encryption key and storing each first encryption key in a secure storage location, storing reconstruction information about the set of first upload files, the splitting, the recombining and the first encryption keys in the secure storage location, uploading each second upload file to a respective temporary cloud storage location, repeatedly moving each uploaded second upload file to a new temporary cloud storage location in predetermined intervals of time.. .
International Business Machines Corporation

Managing unlinkable identifiers for controlled privacy-friendly data exchange

A method for managing unlinkable database user identifiers includes distributing to a first database a first encrypted user identifier, a first database identifier, and a first database user identifier; distributing to a second database a second encrypted user identifier, a second database identifier, and a second database user identifier; receiving from the first database a third encryption and a fourth encryption, the third encryption being formed from the first encrypted user identifier, the second database identifier, and a message comprised in the fourth encryption; decrypting the third encryption thereby obtaining a decrypted value; deriving a blinded user identifier from the decrypted value; and sending the encrypted blinded user identifier and the fourth encrypted value to the second server thereby enabling the second server to compute the second database user identifier from the encrypted blinded database user identifier and the decrypted fourth encrypted value.. .

Selective encryption delineation

Decoding a partially encrypted data stream may include receiving and scanning the partially encrypted data stream. Scanning the partially encrypted data stream may include identifying an encrypted portion sentinel in the partially encrypted data stream subsequent to a first portion, identifying an encrypted portion in the partially encrypted data stream subsequent to the encrypted portion sentinel, and generating a decrypted data portion by decrypting the encrypted portion.
Servicenow, Inc.

Key storage methods

A method of storing a security key used for encrypting and decrypting data is provided. A host quick response (qr) code host image qro is generated and a security key used with encryption/decryption of data is divided.
Safe Cash Payment Technologies, Inc.

Method and error correcting code based public key encryption schemes

The main difference between the proposed cryptosystem and known variants of the mceliece cryptosystem consists in the way the private generator matrix is disguised into the public one by inserting and mixing random columns within the private generator matrix.. .

Managing security in a computing environment

In response to at least one message received by a processor of a gateway server from a user device wherein each message requests that an encryption key be downloaded to the user device, the processor generates at least one unique encryption key for each message and sends the at least one generated encryption key to the user device, but does not store any of the generated encryption keys in the cloud. For each encryption key having been sent to the user device, the processor receives each encryption key returned from the user device.
International Business Machines Corporation

Scrambled tweak mode of blockciphers for differential power analysis resistant encryption

A system and method for providing a scrambled tweak mode of block cipher encryption for a device that mitigates the effect of side channel attacks based on differential power analysis (dpa). The scrambled tweak mode encryption engine creates noise at the start of the encryption process by obfuscating the counter value with the use of the very fast mixing function, such as a mixing function based on a xor tree, substitution-permutation networks, or double-mix feistel networks.
The Boeing Company

Secure key store derivation and management from a single secure root key

A root key of a computing device that is typically “burned” into the device hardware at time of manufacture is used to establish a master key and if desired a transport layer security pre-shaped key, a wifi configuration key, and application verification keys. The keys established from the root key are stored in a region of flash memory, and this region of flash memory is then encrypted using a random encryption code..
Sony Computer Entertainment America Llc

Construction and uses of variable-input-length tweakable ciphers

Innovations in the construction and use of variable-input-length tweakable ciphers (“viltcs”). In some cases, a viltc uses an initialization vector that is protected from exposure outside an encryption/decryption system in order to provide enhanced security with efficient performance.
Portland State University

Scrambled counter mode for differential power analysis resistant encryption

A system and method for providing a scrambled counter mode encryption for a device that mitigates the effect of side channel attacks based on differential power analysis (dpa). The scrambled counter mode encryption engine creates noise at the start of the encryption process by obfuscating the counter value with the use of the very fast mixing function, such as a mixing function based on a xor tree, substitution-permutation networks, or double-mix feistel networks.
The Boeing Company

Decryption of access codes of diverse protocols in barrier operator systems

Disclosed are alternate embodiments of various components of a barrier operator system. And methods of operation, including of the mechanical drive subsystem with segmented and self-locking rail unit, rail mounting supports, belt and chain drive tensioning, and drive assembly carriage and interface; the electronics and software routines for controlled operation of the various barrier operator functions; wall console communications with the barrier operator; encryption and decryption of access codes; establishment and monitoring of travel limits and barrier speed and force profiles; thermal protection of barrier operator drive motors; and establishment and control of communications from the barrier operator to accessories by way of a wireless adapter..
Microchip Technology Incorporated

System and secure review of audit logs

Audit logs are a fundamental digital forensic mechanism for providing security in computer systems. In one embodiment, a system that enables the verification of log data integrity and that provides searchable encryption of the log data by an auditor includes a key generation center, logging machine, and an auditor computing device.
Robert Bosch Gmbh

Encrypting data for analytical web applications

Methods, systems, and computer-readable storage media for processing queries in analytical web applications over encrypted data. Implementations include actions of receiving, by a database driver executed on a server-side computing device and from a client-side proxy, a query and one or more encryption keys, the one or more encryption keys having been selected by the client-side proxy based on operations required to perform the query, performing at least one operation of the query to provide a query result including encrypted data, and transmitting, by the database driver, the encrypted data to the client-side proxy, the client-side proxy processing the encrypted data to provide plaintext data to an end user..
Sap Se

Method, apparatus, and instructions for safely storing secrets in system memory

Embodiments of an invention for method, apparatus, and instructions for safely storing secrets in system memory are disclosed. In one embodiment, a processor includes a hardware key, an instruction unit, and an encryption unit.
Intel Corporation

Information processing apparatus, information processing method, and recording medium

An information processing apparatus is connected to a plurality of online storages through a network. The apparatus includes a circuitry to divide a file into a plurality of pieces of segment data, encrypt each of the plurality of segment data with an encryption key, and generate a plurality of final generated files, each including the encryption key and at least one piece of the plurality of segment data encrypted with the encryption key, and a transmitter to transmit each one of the plurality of final generated files to a corresponding one of the plurality of online storages.
Ricoh Company, Ltd.

System and obtaining keys to access protected information

A server uses an encryption key to decrypt authentication information thereby facilitating communication with network-accessible applications that may be remotely located from the server. Servers can also use encryption keys to decrypt files containing sensitive data.
Angel Secure Networks, Inc.

Call encryption systems and methods

Techniques described herein may be used to encrypt a telephone call between users. User devices (e.g., smart phones) may be connected to encryption relay devices that operate as relays between headsets worn by the user and the user devices.
Verizon Patent And Licensing Inc.

Peripheral device, wireless communication chip, computer-readable non-transitory storage medium having application program stored therein, information processing system, and information processing method

This first communication section transmits, to an authentication server, an encryption key, identification information capable of uniquely identifying a peripheral device, and signature information of the identification information. A second communication section receives data based on an authentication process performed in the authentication server on the basis of the identification information and the signature information transmitted by the first communication section, then, encrypts second data transmission request information, and transmits the encrypted request information to the authentication server.
Nintendo Co., Ltd.

Secure transmission system with upgraded encryption strength

According to one embodiment, is configured to receive a request to communicate a message comprising a body to an intended recipient and to receive a first public key of the intended recipient and a second public key of the intended recipient. The apparatus is further configured to encrypt the body using a first message key to produce a first encrypted body, to encrypt the first message key using the first public key to produce a first encrypted message key, to encrypt the first encrypted message key and the first encrypted body using a second message key to produce a second encrypted body, and to encrypt the second message key using the second public key to produce a second encrypted message key.
Zixcorp Systems, Lnc.

Method and system for secure document exchange

An application is instrumented with a document protection service provider interface (spi). The interface is used to call an external function, e.g., an encryption utility, to facilitate secure document exchange between a sending entity and a receiving entity.
International Business Machines Corporation

Method for performing similar-information search while keeping content confidential by encryption

A similar-information search method includes obtaining an instruction indicating which of an encrypted search and an unencrypted search a data computation device is to perform; generating an encrypted feature quantity and transmitting the encrypted feature quantity to the data computation device; generating an encrypted similarity value and transmitting the encrypted similarity value; and receiving encrypted reference data from the data computation device and decrypting the encrypted reference data. A homomorphic encryption scheme that makes decryption by the data computation device unsuccessful is used when the encrypted search is performed, whereas an encryption scheme that makes decryption by the data computation device successful is used when the unencrypted search is performed..
Panasonic Intellectual Property Corporation Of America

Frequency-hiding order-preserving encryption

Methods, systems, and computer-readable storage media for encrypting data to provide encrypted data for storage in a database. Implementations include actions of receiving, at client-side computing device, an input set including a plaintext value that is to be encrypted to provide an encrypted value, determining whether the plaintext value is stored in a search tree that is stored by the client-side computing device, if the plaintext value is not stored in the search tree, the encrypted value is provided using deterministic encryption of the plaintext value, and if the plaintext value is stored in the search tree, the encrypted value is provided using randomized encryption of the plaintext value, updating the search tree to include a node including the plaintext value and the encrypted value, and transmitting the encrypted value to a server-side computing device for storage of the encrypted value in the database..
Sap Se

Embedded encryption platform comprising an algorithmically flexible multiple parameter encryption system

A machine-to-machine (m2m) partner automates all program parameter calculations through scripting or programming during an end-to-end encryption and decryption process. A platform dynamically scripts or programs the calculation of the encryption parameters and automatic response to alarms and alerts or to protect data transfers.

Encrypted group communications

Secure data transfers between communication nodes is performed using a group encryption key supplied by a remote management system. A first node transmits a request for secure communications with a second node to the remote management system using a control channel.
Orion Labs

Encryption management, content recording management, and playback management in a network environment

Management of key information as described herein enables a respective service provider to distribute encrypted content to subscribers, preventing improper use of the content without authorization. For example, the service provider can distribute encrypted content for recording by a subscriber at a remote location.
Time Warner Cable Enterprises Llc

Communications system and communications method

An identification information transmitter encrypts identification information for identifying a person or an object using an encryption key, transmits the encrypted identification information, and, after receiving another encryption key, switches the encryption key from the encryption key to the other encryption key. A server receives the encrypted identification information from the identification information transmitter, determines whether the encryption key is to be switched, and, if the encryption key is to be switched, generates the other encryption key.

Onion layer encryption scheme for secure multi-access with single card

A magnetic strip card includes a partial encrypted card payload encrypted with a long shared key to provide a final encrypted payload. A method for encoding the magnetic strip card includes encrypting a card payload with a code key of a access controls with a short key of the access control to generate a partial encrypted payload and encrypting the partial encrypted payload with a long shared key to provide a final encrypted payload..
Carrier Corporation

Secure cloud storage distribution and aggregation

Methods and systems for vendor independent and secure cloud storage distribution and aggregation are provided. According to one embodiment, an application programming interface (api) is provided by a cloud storage gateway device logically interposed between third-party cloud storage platforms and users of an enterprise.
Fortinet, Inc.

Wifi hotspot connection and selection method, communications terminal and system

The present document discloses a method for connecting and selecting a wifi hotpot, a communication terminal and system. A communication terminal selects and connects to a wifi hotpot without encryption; and sends preset verification information to a network server; and after receiving verification information and comparing with locally-preset verification information, the network server feeds back verification information to the communication terminal when the received verification information is consistent with the locally-preset verification information; and the communication terminal receives verification information fed back by the network server and compares with locally-preset verification information, then keeps the connection with the wifi hotpot when the verification information fed back by the network server is consistent with the locally-preset verification information..
Zte Corporation

Enabling emergency access to secure wireless communications networks

Embodiments include a system, method, and computer program product for improving public safety communications and real-time information sharing to enable a public safety user to access available, secure private wireless communications (pwc) networks within a vicinity of an emergency for communications and data-sharing purposes. In an embodiment, a universal encryption key (uek) is stored on a public safety access device.
Mutualink, Inc.

Enabling emergency access to secure wireless communications networks

Embodiments include a system, method, and computer program product for improving public safety communications and real-time information sharing to enable a public safety user to access available, secure private wireless communications (pwc) networks within a vicinity of an emergency for communications and data-sharing purposes. In an embodiment, a universal encryption key (uek) is stored on a public safety access device.
Mutualink, Inc.

Wireless communications device and control wireless communications device

A wireless communications device, that is constituted from a control station and a slave station that perform encryption communication using an encryption key, includes a controller that monitors communication quality of a state of a call to the slave station and, in a case where the communication quality degrades to below the same level as a state that is determined in advance, operates in such a manner that a procedure for changing the encryption key, which is determined in advance, is not activated.. .
Panasonic Intellectual Property Management Co., Ltd.

Device and processing image

A device and a method for processing an image by a multimedia device that supports encryption and decryption are provided. The device includes a thumbnail image of an original image is obtained and the original image is encrypted using a first encryption scheme.
Samsung Electronics Co., Ltd.



Encryption topics:
  • Encryption
  • Decryption
  • Ciphertext
  • Computer Program
  • Private Key
  • Video Camera
  • Parallelizable
  • Hierarchical
  • Public Key
  • Binary File
  • Encryption Algorithm
  • Processing Device
  • Key Generator
  • Data Encryption Key
  • Coded Data


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Encryption for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Encryption with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.5593

    file did exist - file did put2423

    3 - 1 - 52