Images List Premium Download Classic

Encryption

Encryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Method and system for managing encrypted data of devices
Nec Europe Ltd.
January 11, 2018 - N°20180013830

A method for managing data of devices using one or more computing entities includes encrypting, by one or more encrypting entities, the data based on encryption policies using encryption keys; storing the encrypted data as ciphertext at a storing entity; requesting decryption keys to decrypt the stored ciphertext by one or more clients; computing restricted decryption keys based on access ...
Method for dynamic encryption and signing, terminal and server
Tencent Technology (shenzhen) Company Limited
January 11, 2018 - N°20180013735

A method for dynamic encryption and signing, a terminal and a server are provided. The method includes that: at least one key and at least one signature are generated through native data; a first predetermined key index and a first random signature index are selected during session connection; a first key and a first signature are located from the at ...
Instant messaging private tags
Uber Technologies, Inc.
January 11, 2018 - N°20180013733

Systems for instant messaging private tags preferably comprise a parser for parsing an instant message for sensitive data and an encryption engine for encrypting the sensitive data. A modified uuencoder is also preferably included for converting the encrypted sensitive data into a data stream that complies with an xml format. Other systems and methods are also provided.
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Blind cloud data leak protection
Dell Software Inc.
January 11, 2018 - N°20180013730

Systems and methods for blind data leak prevention are provided. A first computer can determine if encrypted data matches a rule even without the encryption key used to encrypt the data. The first computer may encrypt the rule with a second encryption key and send the encrypted rule to a second computer, which may then encrypt the rule with the ...
Method for secure communication using asymmetric & symmetric encryption over insecure communications
Sony Interactive Entertainment Inc.
January 11, 2018 - N°20180013728

Data may be protected using a combination of symmetric and asymmetric cryptography. A symmetric key may be generated and the data may be encrypted with the symmetric key. The symmetric key and a only a portion of the symmetrically encrypted data may then be encrypted with an asymmetric public key. The entire set of encrypted data, including the asymmetrically encrypted ...
Authentication mechanism for 5g technologies
Futurewei Technologies, Inc.
January 11, 2018 - N°20180013568

Embodiments of this disclosure provide techniques for securely communicating an imsi over the air from a ue to an sean, as well as for securely validating an unencrypted imsi that the sean receives from the home network, during authentication protocols. In particular, the ue may either encrypt the imsi assigned to the ue using an imsi encryption key (kimsienc) or ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Cryptography method
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180013558

The embodiments provide cryptography that is performed in each of two communicating devices and is based on information known only to the devices. The information is determined in each of the devices at the time of communications. Each of the devices determines the information without communicating key information related to the encryption key with each other. Channel characteristic reciprocity between ...
Data transmission method and apparatus
Tencent Technology (shenzhen) Company Limited
January 11, 2018 - N°20180013555

A data transmission method and apparatus are disclosed that resolves a technical problem where an existing data encryption algorithm offers poor security during transmission of data. The solution includes obtaining, by a first terminal, a data transmission request sent by a second terminal, the data transmission request at least carrying first encrypted data that is obtained by encrypting first exchange ...
Cryptography using rf power measurement
Microsoft Technology Licensing, Llc
January 11, 2018 - N°20180013553

The embodiments provide a cryptography key for two communicating devices that is based on information known only to the devices. The information may only be determined by the devices. Each device determines the information without communicating key information related to the encryption key with the other. Channel characteristic reciprocity between the devices allows creation of identical keys in each device. ...
Optimizing use of hardware security modules
International Business Machines Corporation
January 11, 2018 - N°20180013548

Use of cryptographic key-store hardware security modules is optimized in a system having a first scarce high-security key storage device and a second more plentiful low-security key storage device comprising securing a cryptographic key to the higher security level by initially storing the key in the first storage device, then responsive to an event, evaluating the stored key against one ...
Image data encryption and rendering system
Disc Intellectual Properties, Llc
January 11, 2018 - N°20180012329

Systems, devices, and techniques are generally described to transmit image data. An image file including image data may be identified. The image data may be divided into a plurality of portions. The plurality of portions may include a first portion corresponding to a first position in the image data and a second portion corresponding to a second position in the ...
Systems and method for payment transaction processing with payment application driver
Powerpay, Llc
January 11, 2018 - N°20180012213

A pre-certified payment application driver code configured to satisfy requirements of a particular level of a credit card data security certification compliance may be integrated with first and second pos applications to generate first and second integrated applications, respectively, as a fully integrated, tested and production-ready solution. Each integrated application meets all levels of data security compliance requirements and enables ...
Encrypted collaboration system and method
Pageproof.com Limited
January 11, 2018 - N°20180012032

A method of sharing collaborative data between registered users in an online collaboration system. The collaboration system has a server and one or more electronic user devices that are capable of data communication with the server over a data network. Each registered user is allocated a unique asymmetric key pair comprising a user public key and a user private key ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011867

An apparatus includes a processor component of a first node device caused to receive data block encryption data and an indication of size of an encrypted data block distributed to the first node device for decryption, and in response to the data set being of encrypted data: receive an indication of the quantity of sub-blocks within the encrypted data block, ...
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011866

An apparatus may include a processor component caused to: generate map entries in map data descriptive of encrypted data blocks within a data file; use first map block encryption data to encrypt a first map extension of the map data; transmit the encrypted first map extension for storage within the data file; store the first map block encryption data within ...
Distributed data set encryption and decryption
Sas Institute Inc.
January 11, 2018 - N°20180011865

An apparatus including a processor caused to: receive sizes and data block encryption data for multiple encrypted data blocks from multiple node devices, wherein data block encryption data is separately generated and used by each node device to encrypt a portion of a data set to generate one of the multiple encrypted data blocks; for each encrypted data block, generate ...
Secrecy system and decryption method of on-chip data stream of nonvolatile fpga
Gowin Semiconductor Corporation, Ltd
January 11, 2018 - N°20180011803

A secrecy system and a decryption method of on-chip data stream of nonvolatile fpga are provided in the present invention. The nonvolatile memory module of the system is configured to only allow the full erase operation. After the full erase operation is finished, the nonvolatile memory module gets into the initial state. Only the operation to the nonvolatile memory module ...
Selective memory encryption
Hewlett Packard Enterprise Development Lp
January 11, 2018 - N°20180011802

In one example in accordance with the present disclosure, a method may include receiving, by a processor on a system on a chip (soc), a request to encrypt a subset of data accessed by a process. The method may also include receiving, at a page encryption hardware unit of the soc, a system call from an operating system on behalf ...
Method and apparatus for providing broadcast channel encryption to enhance cellular network security
At&t Intellectual Property I, L.p.
January 04, 2018 - N°20180007548

A method, computer-readable storage device and apparatus for encrypting a broadcast message of a base station are disclosed. For example, the method selects an encryption key for the broadcast message and encrypts the broadcast message using the encryption key to create an encrypted broadcast message. The method then transmits an identifier of the encryption key and transmits the encrypted broadcast ...
Permission-based secure media content sharing
At&t Intellectual Property I, L.p.
January 04, 2018 - N°20180007546

Embodiments of a system and method for sharing media content are generally described herein. A method may include receiving, from a first clearing device, a first indication of approval for sharing media content from an originating device, the first indication identifying the originating device, sending an encryption key for sharing the media content to the originating device, receiving an encrypted ...
Method and system for state machine security device
Golba Llc
January 04, 2018 - N°20180007047

A security device may be utilized to provide security measures to an electronic device that may incorporate the security device or be coupled to it. The security measures may comprise authentication (e. G., authentication of devices, users, or activities), and/or encryption measures (e. G., encrypting or decrypting exchanged data). A transaction or access via the security device may be ...
Loading