Images List Premium Download Classic

Encryption

Encryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Communication apparatus, control method for communication apparatus, and storage medium
Canon Kabushiki Kaisha
April 12, 2018 - N°20180103161

When a version of an encryption communication protocol that is used for communication and set as an apparatus main unit setting for a communication apparatus is changed, a notification indicating such change of the setting is sent to an application installed in the communication apparatus.
Service processing method and electronic device
Tencent Technology (shenzhen) Company Limited
April 12, 2018 - N°20180103017

The present disclosure relates to the field of terminal technologies, and discloses a service processing method and an electronic device. In the present disclosure, a plaintext message used for performing a service operation is provided in a second electronic device. In this case, when needing to perform service processing, a first electronic device may obtain, by means of encryption transmission ...
Edge server, encryption communication control method thereof, and terminal
Fujitsu Limited
April 12, 2018 - N°20180103013

An edge server disposed on an edge of a cloud network, includes: a processor, wherein when encryption key information relating to a terminal which requests a connection to the edge server and the encryption key information generated before the request, is included in shared information shared between a cloud server and another edge server in the cloud network, the processor ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Checkout and payment
Coinbase, Inc.
April 12, 2018 - N°20180102898

A key ceremony application creates bundles for custodians encrypted with their passphrases. Each bundle includes master key share. The master key shares are combined to store an operational master key. The operational master key is used for private key encryption during a checkout process. The operational private key is used for private key decryption for transaction signing in a payment ...
Trust-enhanced attribute-based encryption
Intel Corporation
April 12, 2018 - N°20180101688

Embodiments are directed to protecting, and recovering protected information, with attribute-based encryption. A predefined attribute policy defines one or more combinations of recipient attributes that entitle the recipient entity to attain access to the protected information. A set of at least one trust criterion is derived from the predefined attribute policy. The at least one trust criterion represents a measure ...
Encryption system, encryption method and encryption device
Fujitsu Limited
April 12, 2018 - N°20180101687

An encoding unit encodes at least a part of items of a csv file including a plurality of records having a plurality of items with a unit of items of respective records. A creation unit creates an encrypted dictionary in which an encoded dictionary having been used for the encoding is encrypted with a unit of dictionary. A transmission unit ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Overcoming bottlenecks in zero information gain (zig) rebuild operations
International Business Machines Corporation
April 12, 2018 - N°20180101440

A storage unit (su) includes an interface configured to interface and communicate with a dispersed storage network (dsn), a memory that stores operational instructions, and processing circuitry operably coupled to the interface and to the memory. The su determines to rebuild an encoded data slice (eds) of a set of edss based on a storage error of the eds and ...
Preparation of reflective image component and application method thereof
Sun Yat-sen University
April 12, 2018 - N°20180100229

The present invention discloses preparation of a reflective image component and application method thereof. A reflective image component in the present invention consists of a metallic semi-continuous thin film, a porous alumina film and a high reflective metal substrate. The structure is easy in preparation, low in cost, environmental friendly regarding preparing procedures and suitable for large-scale fabrication, which plays ...
Scalable security key architecture for network encryption
Nicira, Inc.
April 05, 2018 - N°20180097785

An example method of key management for encryption of traffic in a network having a network nodes includes negotiating, between a first network node and a centralized key management server, to obtain a master key shared among the network nodes; receiving, at the first network node, a first identifier for the first network node and a second identifier for a ...
Device for managing multiple accesses to a secure module of a system on chip of ...
Gemalto Sa
April 05, 2018 - N°20180097781

A device for managing multiple accesses to a secure module of a system on chip of an apparatus, and comprises a stream ciphering means arranged for computing on the fly and in a single pass an integrity check for data to be transferred between secure and non secure modules of the system on chip with a seed and an encryption ...
Package integrated security features
Intel Corporation
April 05, 2018 - N°20180097693

Embodiments of the invention include a physiological sensor system. According to an embodiment the sensor system may include a package substrate, a plurality of sensors formed on the substrate, a second electrical component, and an encryption bank formed along a data transmission path between the plurality of sensors and the second electrical component. In an embodiment the encryption bank may ...
Imaging systems with data encryption and embedding capabalities
Semiconductor Components Industries, Llc
April 05, 2018 - N°20180097636

An imaging system may embed encrypted data into image data. The imaging system may generate image data in response to light received at a pixel array. The imaging system may include encryption circuitry that accesses an encryption key. The encryption circuitry may receive data related to the imaging system and/or to an environment in which an image is captured ...
Methods and apparatus for providing blockchain participant identity binding
Entrust, Inc.
April 05, 2018 - N°20180097635

A method and apparatus provides a blockchain that includes one or more blocks that contain a cryptographic binding of a signature-verification public key and/or a data encryption public key to the identity of the holder of the corresponding private key. The binding is performed by one or more key binding entities, referred to herein as a blockchain identity binder. ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Data transmission method and computer program
Semiconductor Energy Laboratory Co., Ltd.
April 05, 2018 - N°20180097622

Provided are a novel data transmission method and a novel computer program. A mobile terminal (the device 14a) includes the display unit 114 in which the liquid crystal layer 115 and the el layer 116 are stacked with a reflective layer positioned therebetween. The device 14a transmits information of the device 14a, such as unique information, location information, and time information, to the ...
Obfuscated secret key derivation for non-secure commercial off-the-shelf (cots) devices
Sony Interactive Entertainment America Llc
April 05, 2018 - N°20180097621

One or more device-specific serial numbers are processed by a chaotic function to render an output, which is used to derive at least one encryption key.
Linear masking circuits for side-channel immunization of advanced encryption standard hardware
Intel Corporation
April 05, 2018 - N°20180097618

Described is an apparatus comprising an s-box circuitry operable to convert a value on an input into a value on an output in accordance with an advanced encryption standard (aes) rijndael s-box matrix. The apparatus also comprises a pseudo-random number generation (prg) circuitry operable to provide a sequence of pseudo-random numbers on a first output and a registered copy of ...
Encryption device and memory device
Megachips Corporation
April 05, 2018 - N°20180097613

A noise generation module generates power consumption noise to conceal the power consumption characteristics of a cryptographic module. The cryptographic module performs first non-linear transformation on received data, and the noise generation module performs second non-linear transformation on received data during the operational period of the first non-linear transformation.
Method for payment authorization on offline mobile devices with irreversibility assurance
Matera Systems Inc.
April 05, 2018 - N°20180096348

A methods for payment authorization (10) on mobile devices (dm) such as smartphones, tablets or any others available, which may be offline; the method for payment authorization (10) comprises the compilation of sequential steps of method (m1) of the payer (20) with method (m2) of the operational system (50) or application that constitutes a logical structure for alignment with the method (m3) of the ...
Semiconductor integrated circuit and system
Renesas Electronics Corporation
April 05, 2018 - N°20180096169

To raise confidentiality of the value stored in the rom, in an ic having a built-in or an externally-attached rom storing a value (program and/or data) encrypted using a predetermined cryptographic key. The ic includes the rom storing the encrypted value (program and/or data), a unique code generating unit, and a decrypting unit. The unique code generating unit ...
Systems, methods, and devices for encrypting database data
Snowflake Computing, Inc.
April 05, 2018 - N°20180096164

A method for encrypting database data includes generating an encryption key for a first file stored in a data store, wherein a table in a database comprises an entry pointing to the first file. The method includes generating a second file by encrypting the data the first file in the data store using the encryption key without modifying the first ...
Multi-crypto-color-group vm/enclave memory integrity method and apparatus
Intel Corporation
April 05, 2018 - N°20180095899

Embodiments of apparatus, method, and storage medium associated with mccg memory integrity for securing/protecting memory content/data of vm or enclave are described herein. In some embodiments, an apparatus may include one or more encryption engines to encrypt a unit of data to be stored in a memory in response to a write operation from a vm or an ...
Loading