Images List Premium Download Classic

Encryption

Encryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Methods and systems for encrypting communications using a secure element
Nagravision S.a.
August 17, 2017 - N°20170238172

Disclosed herein are methods and systems for encrypting communications using a secure element. An embodiment takes the form of a method including the steps of performing a key-exchange procedure with an endpoint via a voice-communication device to obtain a symmetric seed key for a secure voice session with the endpoint; generating first and second symmetric session keys for the secure ...
Methods and systems for enabling legal-intercept mode for a targeted secure element
Nagravision S.a.
August 17, 2017 - N°20170237780

Disclosed herein are methods and systems for enabling legal-intercept mode for a targeted secure element. In an embodiment, a method includes embedding a first key-negotiation parameter associated with a target client device into an intercept secure encryption element; configuring an encryption-management device to receive the intercept secure encryption element and to receive a second key-negotiation parameter associated with the target ...
Self-adaptive communication method for encryption dongle
Feitian Technologies Co., Ltd.
August 17, 2017 - N°20170237728

A self-adaptive communication method for an encryption dongle, comprising: an upper-layer software platform sets communication mode information of self, when connection of an encryption dongle to a host is detected, acquires communication mode information of the encryption dongle, determines whether or not the communication mode information of self matches the communication mode information of the encryption dongle, if yes, then ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Mobile security offloader
Jpu.io Ltd
August 17, 2017 - N°20170237719

In an example embodiment, a mobile security offloader (msol) is provided. Within the msol, a mobile device identification component is used to receive unencrypted data from a mobile device in a mobile radio network and to determine a mobile device identification of the mobile device from the unencrypted data. A security profiles directory interface then uses the mobile device identification ...
System for distributing digital media to exhibitors
Fox Digital Enterprises, Inc.
August 17, 2017 - N°20170237712

A system for packaging digital media and distributing digital media to exhibitors is described, which system enables distribution by utilizing media content booking, media content packaging, encryption, and delivery components.
Multiply-encrypting data requiring multiple keys for decryption
Cloudflare, Inc.
August 17, 2017 - N°20170237566

A server receives a piece of data for encryption. The server encrypts the piece of data such that no single key can decrypt the encrypted piece of data and any combination of a first multiple of unique keys taken a second multiple at a time are capable of decrypting the encrypted piece of data. Each of the first multiple of ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Extending data over cable service interface specification (docsis) provisioning of ethernet passive optical network (epon) (...
Futurewei Technologies, Inc.
August 17, 2017 - N°20170237557

An optical line terminal (olt) including a processor coupled to a transmitter. The processor is configured to send a first encrypted fiber to coax unit (fcu) message containing an optical domain multicast key to an fcu via an optical network. The optical domain multicast key is associated with encryption in an optical domain associated with the optical network. The processor ...
Method and system for at least partially updating data encrypted with an all-or-nothing encryption scheme
Nec Europe Ltd.
August 17, 2017 - N°20170237552

A method for at least partially updating encrypted data stored on one or more servers includes dividing the encrypted data into equal sized chunks; encrypting each chunk using an all-or-nothing encryption scheme (aone) with an encryption key, wherein an additional randomness per chunk is embedded into the aone; outputting a plurality of ciphertext blocks for each chunk; storing the encrypted ...
Providing access to content
Irdeto B.v.
August 17, 2017 - N°20170237551

A method of providing access to content at a first device, the method comprising: receiving an item of content, wherein at least part of the item of content is encrypted, the encrypted at least part of the item of content being decryptable using at least one decryption key; in a first software client: obtaining a transformed version of the at ...
Controlling security in relational databases
Microsoft Technology Licensing, Llc
August 17, 2017 - N°20170235969

A security controller controls secure processing of queries in an encrypted relational database. A query controller receives, from a client device, a secure query in a format of an encrypted token generated using a structured query language (sql) query in a conjunctive query form, and sends an encrypted response to the secure query to the client device. A search engine ...
System and method for confidentiality-preserving rank-ordered search
Microsoft Technology Licensing, Llc
August 17, 2017 - N°20170235736

A confidentiality preserving system and method for performing a rank-ordered search and retrieval of contents of a data collection. The system includes at least one computer system including a search and retrieval algorithm using term frequency and/or similar features for rank-ordering selective contents of the data collection, and enabling secure retrieval of the selective contents based on the rank-order. ...
Policy enforcement in a secure data file delivery system
Axway Inc.
August 10, 2017 - N°20170230423

A server interacts with a sender to form a package which can include one or more attached data files to be sent to one or more recipients, and the server applies a policy established by a policy authority of the sender to the package. Since the server both forms the package through interaction with the sender and applies the policy, ...
Apparatus and methods for the secure transfer of electronic data
United States Postal Service
August 10, 2017 - N°20170230382

An embodiment of the invention provides a method for processing a secure electronic transaction over a network from a sender to a receiver, which includes the process of generating a first unique representation of information included in the transaction, encrypting the information with a first encryption layer, and forming an encryption packet which includes the first encryption layer. The encryption ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Password triggered trusted encrytpion key deletion
Cisco Technology, Inc.
August 10, 2017 - N°20170230179

A method of evaluating secrets in a computer system's trusted execution environment, wherein after evaluation of secrets, a securely stored encryption key is either retrieved or deleted upon entering corresponding secret (password, graphical password, biometric information, data sequence, security token, etc.) or secrets. Deletion of the encryption key can happen in a verifiable manner or in a non-verifiable manner. If ...
Encryption key storage and modification in a data storage device
Seagate Technology Llc
August 10, 2017 - N°20170230178

Methods, systems, and devices are described for encryption key storage and modification in a data storage device. A portion of an encryption key may be stored in a first storage medium, and one or more bits of the encryption key may be stored in a one-time writable storage location. Data received at the data storage device may be encrypted using ...
Secure database backup and recovery
International Business Machines Corporation
August 10, 2017 - N°20170230177

As disclosed herein a computer system for secure database backup and recovery in a secure database network has n distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated ...
Method and apparatus for encrypting and decrypting data
International Business Machines Corporation
August 10, 2017 - N°20170230175

A method and system is disclosed for encrypting and decrypting data, with decryption contingent upon user-defined conditions being met. The encryption process comprises a method for using pointers to indicate the locations and sizes of encryption components, utilizing randomly determined patterns to be used for a random number of characters of text data being encrypted. For each randomly determined block ...
Key agreement algorithm for cipher key creation over a public channel
International Business Machines Corporation
August 10, 2017 - N°20170230172

Two parties will engage in encrypted data communicating over a non secure channel. The encryption require a common session or consecutively updated key, not known by anybody else, and established without prior secrets. One of the parties, the initial sender, creates a table of multiple equations. Each equation contains parameters, known only by him, variables set to different values for ...
Configurable payment tokens
International Business Machines Corporation
August 10, 2017 - N°20170228724

Methods and systems are disclosed for the generation and use of merchant-customizable token formats that define tokens that represent credit card and other payment numbers in online transactions. The tokens, which are used instead of the card numbers themselves for security, can be specified by the token format to have a certain number of characters, have certain fields reserved for ...
System and method for preventing access to data on a compromised remote device
Good Technology Holdings Limited
August 10, 2017 - N°20170228553

This invention discloses a system and method for selective erasure, encryption and or copying of data on a remote device if the remote device has been compromised or the level of authorization of a roaming user in charge of the remote device has been modified.
Encrypted code execution
Intel Corporation
August 10, 2017 - N°20170228548

Embodiments of an invention for encrypted code execution are disclosed. In one embodiment, a processor includes a private key, a code decryptor, and an encryption unit. The code decryptor is to decrypt the encrypted code to generate decrypted code, the encrypted code encrypted with a public key corresponding to the private key. The execution unit is to execute the decrypted ...
Loading