Images List Premium Download Classic

Encryption

Encryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Counter check and reconfiguration method, apparatus, and system
Huawei Technologies Co., Ltd.
October 12, 2017 - N°20170295153

The present invention relates to a reconfiguration method and a terminal for receiving reconfiguration information (including an encryption algorithm) sent by a primary base station, updating a local key according to the received encryption algorithm and using the received encryption algorithm and the updated key to communicate with the secondary base station, and further sending reconfiguration complete information to the ...
Utility meter for metering a utility consumption and optimizing upstream communications and method for managing ...
Nagravision S.a.
October 12, 2017 - N°20170295146

A utility meter and method for metering consumption of at least one utility including: a metering unit, a communication unit for sending/receiving messages to/from a management center, a memory to store a unique identifier pertaining to the utility meter and a first key, an encryption unit for encrypting the utility consumption as a first cryptogram, a message generator ...
Apparatus and method for processing authentication information
Ictk Co., Ltd.
October 12, 2017 - N°20170295027

Provided is an information processing apparatus including a physical unclonable function (puf) to generate a unique key using a process variation in a semiconductor manufacturing process, and an encryption unit to encrypt a password and/or bio-information received from a user using the unique key.
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for authenticating device and for sending/receiving encrypted information
University Of Maryland, College Park
October 12, 2017 - N°20170295014

Methods and apparatuses for authenticating communication devices and securely transmitting and/or receiving encrypted voice and data information. A biometric scanner, for example a fingerprint scanner, is utilized for authenticating the communication device and for generating the encryption key. The fingerprint scanner can be an area or swipe type of scanner is registered to a particular user and has unique ...
Encryption device, encryption method, decryption device, and decryption method
Technical University Of Denmark
October 12, 2017 - N°20170294148

There is provided an encryption device including a data encryption unit configured to conduct encryption on the basis of a white box model in which at least a part of a plurality of round functions for sequentially conducting encryption processing on an input value is tabulated, and input and output values of the round function are recognizable from an outside. ...
Authentication method and system to verify the authenticity of a product
1trueid S.r.l.
October 12, 2017 - N°20170293918

Authentication method to verify the authenticity of products, including associating to each product an electronic identification device having a unique identification code, selecting at least one piece of product information suitable to describe the product, associating to each identification code at least one respective and unique encryption key, encrypting the identification code and the product information, storing the encrypted content ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for updating a firmware component and device of measurement and control technology
Endress+hauser Conducta Gmbh+co. Kg
October 12, 2017 - N°20170293484

The present disclosure relates to a method for updating a firmware component of a measurement and control technology device. The method includes: a segment-by-segment reception of a first firmware image; an authentication of the first firmware image based upon a first encryption method; a creation of a second authentication datum for the first firmware image via an algorithm that differs ...
Trusted wlan connectivity to 3gpp evolved packet core
Intel Corporation,
October 05, 2017 - N°20170289587

Systems, devices, and configurations to implement trusted connections within wireless networks and associated devices and systems are generally disclosed herein. In some examples, a wireless local area network (wlan) may be attached to a 3gpp evolved packet core (epc) as a trusted access network, without use of an evolved packet data gateway (epdg) and overhead from related tunneling and encryption. ...
Interleaved watermarking
Cisco Technology, Inc.
October 05, 2017 - N°20170289561

In one embodiment, a system includes a headend apparatus including a watermark processor to generate secondary video streams from sections of a primary video stream, group the secondary video streams in groups of at least two secondary video streams, the secondary video streams including units of data for use in watermarking across cryptoperiods in an end-user device which selects one ...
Encryption device, computer-readable recording medium, and encryption method
Megachips Corporation
October 05, 2017 - N°20170289390

An encryption circuit includes a fundamental vector generation circuit configured to generate a random number sequence for serving as a fundamental vector based on an initial vector, an image mask generation circuit configured to generate an image mask with a mask value set for each pixel in a region to be encrypted smaller than a frame size of the image, ...
Establishing trust between two devices
Microsoft Technology Licensing, Llc
October 05, 2017 - N°20170289157

Techniques described herein leverage a trusted entity within a domain to enable devices to establish trust with one another so they can securely discover each other and connect to one another. In various examples discussed herein, a device is configured to provide trust information to, and/or receive trust information from, the trusted entity. The trust information may include, for ...
Secure archival and recovery of multifactor authentication templates
Intel Corporation
October 05, 2017 - N°20170289153

Systems, apparatuses and methods may provide for generating, at a computing device, a challenge message in response to a recovery request and conducting a verification of one or more responses to the challenge message based on an encryption key stored in a hardware-based trusted execution environment (tee) of the computing device. Additionally, an authentication template associated with a multifactor authentication ...
Communicating messages with intermittently available encryption credentials
Apple Inc.
October 05, 2017 - N°20170289112

Some embodiments relate to a device that transmits/receives encrypted communications with another device. A first device, such as a smart phone or smart watch, may generate a message associated with a certain data class, which may determine the security procedure used in the communication of the message. The first device may establish an encryption session for the purpose of ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and apparatus for distributing encryption and decryption processes between network devices
Cisco Technology, Inc.
October 05, 2017 - N°20170289104

In one embodiment, a method includes establishing at a security device, a secure session for transmitting data between a client device and an end host, receiving decrypted data at the security device from the client device, inspecting the decrypted data at the security device, encrypting the decrypted data at the security device, and transmitting encrypted data to the end host. ...
Cryptographic protection for trusted operating systems
Intel Corporation
October 05, 2017 - N°20170288874

This disclosure is directed to cryptographic protection for trusted operating systems. In general, a device may comprise for example, at least processing circuitry and memory circuitry. The device may be virtualized in that the processing circuitry may load virtual machines (vms) and a virtual machine manager (vmm) into the memory circuitry during operation. At least one of the vms may ...
Wi-fi encryption device based on iris identification
Lemobile Information Technology (beijing) Co., Ltd.
October 05, 2017 - N°20170288868

The embodiment of the present disclosure discloses a wi-fi encryption device based on iris identification, which includes: a camera control module, an iris camera, an iris identification module, a key generation module and a wi-fi key module. The iris camera is coupled to the iris identification module, the iris identification module is coupled to the key generation module, the key ...
Systems and methods for quick start-up of playback
Sonic Ip, Inc.
October 05, 2017 - N°20170288865

Systems and methods for quick start-up of playback in accordance with embodiments of the invention are disclosed. Media content may be encoded in a plurality of alternative streams and a quick start-up stream. The quick start-up stream may include media content that is encoded at a lower quality that the alternative streams and may be encrypted with a different, less ...
Securely exchanging lists of values without revealing their full content
Ubimo Ltd.
October 05, 2017 - N°20170288862

A computer implemented method of providing an encrypted executable object containing data values, comprising receiving a query defined by one or more query parameters, obtaining a plurality of data values complying with the query parameter(s), creating an encrypted executable object comprising the plurality of data values where each of the plurality of data values is accessible in the encrypted ...
Data encryption
Hewlett Packard Enterprise Development Lp
October 05, 2017 - N°20170288861

In some examples, applying a first encryption process to input data blocks for encrypted data blocks, applying a deduplication process to the encrypted data blocks for chunks and first hashes, applying a deduplication process to the hashes for a first set of deduplicated hashes and sending it to destination computer. If there are missing data blocks at the computer based ...
Server apparatus, search system, terminal apparatus, search method, non-transitory computer readable medium storing server program, ...
Mitsubishi Electric Corporation
October 05, 2017 - N°20170288858

In a server apparatus (301), a data storage part (303) stores a plurality of pieces of encrypted data. An index storage part (304) stores, as an index i, a data structure which is for performing search with using a function h that outputs a unique numeric value in response to an inputted keyword, the data structure having a plurality of storage areas corresponding, ...
Data encryption to ensure data is correctly being accessed
Whole Body Iq, Inc.
October 05, 2017 - N°20170288857

Embodiments disclosed herein provide systems, methods, and computer readable media for encrypting data to ensure that portions of the subject data are correctly accessed. In a particular embodiment, a method provides identifying a first portion of the subject data to be accessible using a first access key. The method further provides encrypting the first portion using a subject key and ...
Loading