Follow us on Twitter
twitter icon@FreshPatents


Encryption patents

      

This page is updated frequently with new Encryption-related patent applications.




 Wireless network connection method, apparatus, and system patent thumbnailnew patent Wireless network connection method, apparatus, and system
A wireless network connection method includes: scanning a graphical code to acquire graphical code information carried in the graphical code, the graphical code information including encryption information and the encryption information being used for acquiring configuration information of a wireless network; decrypting the encryption information to acquire the configuration information; and connecting to the wireless network by using the configuration information.. .
Tencent Technology (shenzhen) Company Limited


 Method and  protecting data in a portable electronic device patent thumbnailnew patent Method and protecting data in a portable electronic device
Data in a portable electronic device is protected by using external and internal status detection means to determine if the device is misplaced, lost, or stolen. The device then takes, singly or in combination, one of several actions to protect the data on the device, including declaring its location to an owner or service provider, locking the device or specific functions of the device to disable all data retrieval functionality, erasing or overwriting all the stored data in the device or, where the data has been stored in the device in an encrypted format, destroying an internally-stored encryption key, thereby preventing unauthorized access to the encrypted data in the device..
Applied Minds, Llc


 Sensor nodes with multicast transmissions in lighting sensory network patent thumbnailnew patent Sensor nodes with multicast transmissions in lighting sensory network
An embodiment method for communicating data within a lighting sensory network may include configuring a first plurality of lighting nodes to operate as sensor nodes, configuring a second plurality of lighting nodes to operate as listening nodes, generating, by a sensor node using an encryption key, a sensor message associated with sensor data and including at least a timestamp, calculating an interval for transmitting the sensor message, wherein the interval is randomized and exponentially increasing, determining whether to transmit the sensor message based on the calculated interval, transmitting the sensor message in response to determining to transmit the sensor message based on the calculated interval, receiving, by a listening node, the sensor message at a listening node, determining whether the received sensor message is useful based on the timestamp and a predefined age threshold, and performing a lighting action in response to determining the received sensor message is useful. .
Sensity Systems Inc.


 Encryption key updates in wireless communication systems patent thumbnailnew patent Encryption key updates in wireless communication systems
In an aspect, a wireless communication between a transmitter and a receiver involves determining updated keys according to a key management process for mac layer encryption. Such key is propagated to a transmitter mac and though a receiver key management process to a receiver mac.
Imagination Technologies Limited


 System and  secure encryption for electronic data transfer patent thumbnailnew patent System and secure encryption for electronic data transfer
A system for secure transfer of encrypted data involves a sender client, a recipient client, a main server, and a key server. The sender client receives instructions from a first user identifying transfer data and a recipient identifier, creates a key, encodes the transfer data using the key, and communicates the key and the recipient identifier to a server.
Ceelox Patents, Llc


 Image based key derivation function patent thumbnailnew patent Image based key derivation function
Embodiments of the invention relate to methods of generating and using an image-based derived key. In various embodiments, the image-based derived key may be used to facilitate user authentication and data encryption.

 Systems and methods for implementing modular digital encryption key management solutions patent thumbnailnew patent Systems and methods for implementing modular digital encryption key management solutions
An encryption key management apparatus receives from an authorized compute device, a raw dataset that is encrypted with at least one asymmetric encryption key. The apparatus can determine, based on the raw dataset, an identifier of a first entity associated with the raw dataset and an identifier of a second entity associated with the raw dataset.
Iaspire, Llc


 Information processing system, server device, and non-transitory computer-readable medium patent thumbnailnew patent Information processing system, server device, and non-transitory computer-readable medium
A server device that is a first-facility terminal device configured to transmit issuance information issued by a first facility to a user terminal device of a user of the first facility, includes: a first-facility encrypting unit configured to encrypt the issuance information issued by the first facility using a public key acquired from the user terminal device, and a first-facility terminal transmitting unit configured to transmit, when the user terminal device is connected to a network to which the first-facility terminal device is connected, the issuance information without encryption to the user terminal device, and to transmit, when the user terminal device is not connected to the network, the encrypted issuance information to the user terminal device.. .
Ricoh Company, Ltd.


 Wildcard search in encrypted text using order preserving encryption patent thumbnailnew patent Wildcard search in encrypted text using order preserving encryption
A encrypted text wildcard search method enables wildcard search of encrypted text by using a permuterm index storing permuted keyword strings that are encrypted using an order preserving encryption algorithm. The permuted keyword strings are encrypted using an order preserving encryption algorithm or a modular order preserving encryption algorithm and stored in the permuterm index.
Skyhigh Networks, Inc.


 Secure instant messaging system patent thumbnailnew patent Secure instant messaging system
A secure instant messaging (im) system integrates secure instant messaging into existing instant messaging systems. A certificate authority (ca) issues security certificates to users binding the user's im screen name to a public key, used by sending users to encrypt messages and files for the user.
Google Inc.


new patent

Secure offline authentication

A user workstation stores a vendor identifier and encrypted data comprising a first string of randomized data, a second string of randomized data, and encrypted text, the encrypted text further comprising a first security answer. The user workstation receives credentials information and a second security answer.
Bank Of America Corporation

new patent

System and securing wireless communication through physical layer control and data channel

A system for securing wireless communication between a transmitter and a receiver through a physical layer control and a data channel is disclosed. The transmitter includes a pseudo random sequence generator module and an encryption module.
Signalchip Innovations Private Limited

new patent

Group license encryption and decryption

According to an aspect, a computing device may include a media content handler to obtain media content, a group license manager to determine whether or not the media content is part of a license group, and when the media content is determined as part of the license group, the group license manager may determine whether a master key for the license group was previously received. The group license manager may send, over a network, a license request to a license manager when the master key was not previously received.
Google Inc.

new patent

Memory encryption engine integration

Memory encryption engine (mee) integration technologies are described. A mee system may include a mee interface and a mee core.
Intel Corporation

new patent

Secure entry and exit for software modules protected by controlled encryption key management

Techniques for protecting software in a computing device are provided. A method according to these techniques includes receiving a request from a non-secure software module to execute an instruction of a secure software module comprising encrypted program code, determining whether the instruction comprises an instruction associated with a controlled point of entry to the secure software module accessible outside of the secure software module, executing one or more instructions of the secure software module responsive to the instruction comprising an instruction associated with the controlled point of entry to the secure software module, and controlling exit from the secure software module to return execution to the non-secure software module..
Qualcomm Incorporated

Apparatus for controlling copying of broadcast content and recording and playing back broadcast content using the same

Disclosed herein are an apparatus for controlling copying of broadcast content and a method for recording and playing back broadcast content using the apparatus. The broadcast content copying control apparatus includes a communication unit for receiving a request for recording of broadcast content from a drm client, and receiving content management information (cmi) corresponding to the broadcast content from a dmcd server, a security package configuration unit for configuring a dmcd security package using the cmi, a content management unit for recording the broadcast content based on recording permission information included in the cmi, and an encryption/decryption unit for encrypting the broadcast content, wherein the communication unit transmits recording result information to the drm client, wherein the recording result information includes at least one of recording status information of the broadcast content, copy control information (cci) corresponding to the broadcast content, and the cmi..
Electronics And Telecommunications Research Institute

Method and system for device dependent encryption and/or decryption of music content

A method and system is disclosed that provides at least one server device; and at least one remote audio playback device, the remote audio playback device including a unique identifier stored thereon. An encryption key is created by the at least one server device.
Onulas, Llc

Design approach for message level encryption for service apis

Disclosed are requesting party and responding party computer systems which perform a message level encryption for messages sent through the computer systems. Using the message level encryption, the computer systems may prevent those with access to an unsecured zone in one or more of the computer systems from viewing the messages..
Blackhawk Network, Inc.

Method, apparatus and system for dynamically controlling secure vehicle communication based on ignition

A method of controlling secure vehicle communication in a vehicle gateway includes: detecting whether a vehicle is started; generating a new public key for each network connected to the vehicle gateway for message encryption upon detecting that the vehicle is started; transmitting a first message including the new public key; allocating a new identification (id) to each controller connected to the vehicle gateway with reference to a stored routing table for message routing between controllers upon detecting that the vehicle is started; and transmitting a second message including the new id.. .
Hyundai Motor Company

System and methods for dynamically and randomly encrypting and decrypting data

A system and method for encrypting and decrypting information is presented. In some embodiments, an endpoint token management system is provided for facilitating dynamic and random encryption and decryption methods.
Plankwalk Corp.

Preventing pattern recognition in electronic code book encryption

In general, in one aspect, noise is injected into a bitmap associated with content to be presented on a display to create a noisy bitmap. The noisy bitmap is encrypted using electronic code book (ecb) encryption.
Intel Corporation

Homomorphically-created symmetric key

One embodiment of the invention includes a method, including performing, a symmetric homomorphic encryption of a secret sa with a cryptographic key h as input yielding a homomorphic encryption result sa*, sending sa* for mathematical combination by at least one device with at least one secret sb yielding g*, the device a not having access to sb, the at least one device not having access to sa and not having access to h, receiving g*, performing a symmetric homomorphic decryption of data based on g* with h as input yielding a first decrypted output, determining a symmetric cryptographic key ka based on the first decrypted output for secure communication with a first device which is operationally connected to, or includes, a tamper resistant security system including sa and sb therein, securing data using ka yielding secured data, and sending the secured data to the first device.. .
Cisco Technology, Inc.

Electronic device and managing image by electronic device

A method of managing an image by an electronic device may include: generating a first encryption image by encrypting a first image; acquiring bitstream data corresponding to a second image related to the first image; generating a changed image by combining at least some of the bitstream data and the first encryption image; and transmitting the changed image to an external electronic device.. .
Samsung Electronics Co., Ltd

Wireless relay device, wireless communication system, and wireless communication method

A wireless relay device that performs relay of encrypted data over a wireless network, the wireless relay device, includes: a determiner that determines whether or not there is an abnormality using first data which is transmitted to its own device from wireless devices belonging to a preset section among wireless devices joining the wireless network; a transmission controller that transmits second data indicating a result of the determination of the determiner to a preset transmission destination; and an encryption processor that decrypts the first data and encrypts the second data transmitted by the transmission controller.. .
Yokogawa Electric Corporation

Profile download use in wireless communication system

A profile downloading method and apparatus is provided for a terminal to download and install a profile in a communication system. The communication method of the terminal includes transmitting a first message including information on a profile to be received from a profile provision server; receiving a second message including information indicating whether an encryption code input is required and a first modified encryption code; generating, when the first modified encryption code is successfully authenticated, a second modified encryption code; transmitting to the profile provision server a third message including information requesting to the profile provision server for the second modified encryption code and profile download, and receiving a fourth message including information on the profile from the profile provision server..
Samsung Electronics Co., Ltd

Method for supporting and setting ipsec in mobile communication

One disclosure of the present specification provides a method for supporting an internet protocol security (ipsec). The method may be performed by a mobility management entity (mme) and comprise: receiving a tracking area update (tau) request message from a user equipment (ue); determining whether to activate an encryption option of ipsec; and transmitting a tau accept message including ipsec related information generated based on the determination..
Lg Electronics Inc.

Method and system for providing access to a video content

Disclosed is a method for providing access to a video content. The method comprises providing a first encryption key, recording a first video with at least one video camera and encrypting the first video with the first encryption key.
Teleste Oyj

Maintaining synchronization of encryption process across devices by sending frame numbers

Maintaining synchronization of encryption processes at devices during transmission of encrypted data over a communication link is provided. Cipher link maintenance characters are sent from a source device to a sink device.
Lattice Semiconductor Corporation

Methods and systems for distributing encrypted cryptographic data

A method for distributing encrypted cryptographic data includes receiving, by a key service, from a first client device, a request for a first public key. The method includes transmitting, by the key service, to the first client device, the first public key.
Virtru Corporation

Shared symmetric key encryption

A method for encrypting a message is described in which a public key and a private key are generated. The public key is encrypted using a shared symmetric key shared with an agent.
Hewlett-packard Development Company, L.p.

Virtualized application performance through disabling of unnecessary functions

Improved virtualized application performance is provided through disabling of unnecessary functions, such as unnecessary encryption and decryption operations. An example method performed by a hypervisor includes the steps of obtaining a request to one or more of encrypt and decrypt a communication between a first virtual machine and a second virtual machine; determining if the first and second virtual machines execute on a same host as the hypervisor (e.g., by evaluating a context of the communication); and processing the communication without encrypting or decrypting the communication if the first and second virtual machines execute on the same host.
Alcatel-lucent Usa Inc.

Renewable traitor tracing

A system, method, and computer program product to renewably prevent traitors in a broadcast encryption system from re-using compromised keys. A license agency assigns individual receivers a set of sequence keys preferably at manufacture, and assigns sequence key blocks (skbs) to protected content files to be distributed.
International Business Machines Corporation

System and sharing data securely

Embodiments of systems and methods disclosed herein provide simple and effective methods for secure processes to share selected data with other processes and other memory locations, either secure or not, in a safe and secure manner. More specifically, in certain embodiments, systems and methods are disclosed that enable a secure data cache system to use one or more virtual machines to securely generate encryption keys based on information from multiple independent sources.
Rubicon Labs, Inc.

Multivariate cryptography based on clipped hopfield neural network

The systems and methods disclosed herein, in one aspect thereof, can encrypt and decrypt messages using a multivariate extended clipped hopfield neural network that uses a diffie-hellman like key exchange algorithm. The proposed cryptosystem comprises three stages that are involved in the communication.
City University Of Hong Kong

Complex format-preserving tokenization scheme

Methods, computing systems and computer program products implement embodiments of the present invention that include defining multiple primitives, each of the primitives including ranking and unranking methods. Two or more of the multiple primitives are selected, and an operation is performed on the selected primitives, thereby defining a complex format.
International Business Machines Corporation

Efficient sharing of hardware encryption pipeline for multiple security solutions

A processing or memory device may include a first encryption pipeline to encrypt and decrypt data with a first encryption mode and a second encryption pipeline to encrypt and decrypt data with a second encryption mode, wherein the first encryption pipeline and the second encryption pipeline share a single, shared pipeline for a majority of encryption and decryption operations performed by the first encryption pipeline and by the second encryption pipeline. A controller (and/or other logic) may direct selection of encrypted (or decrypted) data from the first and second encryption pipelines responsive to a region of memory to which a physical address of a memory request is directed.
Intel Corporation

Multiply-encrypting data requiring multiple keys for decryption

A server receives a piece of data for encryption. The server encrypts the piece of data such that no single key can decrypt the encrypted piece of data and any combination of a first multiple of unique keys taken a second multiple at a time are capable of decrypting the encrypted piece of data.
Cloudflare, Inc.

Nado cryptography with key generators

A symmetric cryptography for encrypting and decrypting information is provided, that can be implemented efficiently in hardware or in software. The symmetric cryptography uses a key generator, so that the cryptography is not dependent on a single, static cryptography key.

Method and encrypting data

The method for performing encryption including generating a secret key or a parameter for encrypting plaintext; converting the plaintext into ciphertext by using the secret key or the parameter; and transmitting the ciphertext to a database.. .
Samsung Electronics Co., Ltd.

Symmetric stream cipher

A method, an apparatus, and a computer program product for symmetric stream encryption are provided. An encryption chain is obtained from a real random number generator (rrng) and stored in memory.
Transfersoft, Inc.

System and private-key fully homomorphic encryption and private search between rings

N=pq and further, q is a second private prime number, and the public ring Ĥ is further, publically available. A corresponding method is also disclosed..

Comparison and search operations of encrypted data

Searching for desired data within an encrypted set of data (using a fully homomorphic encryption) without decrypting the set of data. A lookup key is compared against a set of encrypted data, employing characteristics of the fully homomorphic encryption, to locate and return desired data correlated to the lookup key..
International Business Machines Corporation

System and a self-calculating token vault

A system and method for electronic payment that involves generating and then using a temporary token based on a legacy pan (primary account number) to conduct an electronic transaction. The token is generated by transforming the pan using specific inputs such that the original pan can be recovered by manipulating the token in various ways as disclosed herein.
Sequent Software, Inc.

Systems and methods for multiport to multiport cryptography

Systems and methods are discussed herein for reusing hardware for encryption and authentication, where the hardware has a fixed input bandwidth, and where the hardware has the same bandwidth for a different input bandwidth. In order to accomplish this mechanism, systems and methods are provided herein for processing invalid data that appears within streams of valid data.
Altera Corporation

Providing secure indexes for searching encrypted data

Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents comprising a plurality of unencrypted phrases; (ii) providing a master key; (iii) providing, based on the master key, for each phrase a set of encryption keys comprising one or more encryption keys; (iv) selecting, for each phrase, one encryption key of the set of encryption keys; (v) encrypting each phrase with the selected encryption key; and (vi) building an index based on the encrypted phrases, the index comprising information regarding which encrypted phrase is comprised within a certain document.. .
International Business Machines Corporation

Providing secure indexes for searching encrypted data

Providing an encrypted search index for performing searches on encrypted documents, the method comprising: (i) providing a set of documents, the documents comprising a plurality of unencrypted phrases; (ii) providing a master key; (iii) providing, based on the master key, for each phrase a set of encryption keys comprising one or more encryption keys; (iv) selecting, for each phrase, one encryption key of the set of encryption keys; (v) encrypting each phrase with the selected encryption key; and (vi) building an index based on the encrypted phrases, the index comprising information regarding which encrypted phrase is comprised within a certain document.. .
International Business Machines Corporation

Securely recovering stored data in a dispersed storage network

A method for execution by a dispersed storage and task (dst) execution unit that includes a processor includes receiving a slice pre-image request from a computing device via a network that indicates a data slice, a requesting entity and a plurality of storage units. A data pre-image is generated by performing a pre-image function on the data slice based on the plurality of storage units.
International Business Machines Corporation

Methods and architecture for encrypting and decrypting data

Methods of securely encrypting and decrypting data stored within computer readable memory of a device are described. Additionally, a memory encryption unit architecture (200) is described.
Nxp B.v.



Encryption topics:
  • Encryption
  • Decryption
  • Ciphertext
  • Computer Program
  • Private Key
  • Video Camera
  • Parallelizable
  • Hierarchical
  • Public Key
  • Binary File
  • Encryption Algorithm
  • Processing Device
  • Key Generator
  • Data Encryption Key
  • Coded Data


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Encryption for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Encryption with additional patents listed. Browse our RSS directory or Search for other possible listings.


    2.2053

    file didn't exist2491

    479091 - 0 - 53