Images List Premium Download Classic

Encryption

Encryption-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
NEW System and method of decoupling and exposing computing device originated location information
International Business Machines Corporation
June 22, 2017 - N°20170180996

A system and method is provided to determine location information of a portable computing device and, in particular, to a secure and scalable system and method of decoupling and exposing handset originated location information to third parties. The system includes a location platform to determine location information of a remote user, and an encryption service configured to secure the location ...
NEW Wifi access management system and methods of operation thereof
Wyfi, Inc.
June 22, 2017 - N°20170180383

A wifi access management system and methods of operation are disclosed. In one embodiment, a method comprises receiving, at a server, a wireless access profile and a wireless access list from a securing client device; transmitting an invitation message to an accessing client device associated with the wireless access list; receiving, at the server, a request from the accessing client ...
NEW Privacy preserving group formation with distributed content key generation
Intel Corporation
June 22, 2017 - N°20170180122

An embodiment includes a method executed by at least one processor of a first computing node comprising: form a first group of computing nodes, wherein forming the first group comprises providing (a)(i) a public key and a first seed value to each of second and third nodes, (a)(ii) second and third private keys, which both correspond to the ...
NEW Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
Myport Technologies, Inc.
June 22, 2017 - N°20170178271

A cell phone is disclosed for acquiring information to be transmitted to a receiving facility and for transmitting such thereto. A capture device captures information from an external source. A processor is provided for associating with the captured information a representation of the date and time of the capture of the information, such that the representation of the date and ...
NEW Payment system
Kuang-chi Intelligent Photonic Technology Ltd.
June 22, 2017 - N°20170178126

The present application discloses a payment system to enhance security of the entire payment system and ensure fund security in a payment process. The technical solution is: in the entire payment system, designing encryption and decryption solutions at a payment end, a consumer end, and an account management server end separately; performing hierarchical encryption on data transmission and storage, and ...
NEW Encrypted data deduplication in cloud storage
Agency For Science, Technology And Research
June 22, 2017 - N°20170177899

There is provided a method of storing data in a cloud storage system, the method including: generating a file identifier for a data file desired to be stored in the cloud storage system; encrypting the file identifier of the data file using a homomorphic encryption technique to produce an encrypted file identifier of the data file; and transmitting the encrypted ...
NEW Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
NEW Systems, methods, and devices for securing data stored in a cloud environment
Mastercard International Incorporated
June 22, 2017 - N°20170177890

Devices, systems, and methods for performing particularized encryption of confidential information within real-world data files that are subsequently stored within a cloud environment are described. Specific rules/logic are executed in a local computing environment to identify the type(s) and/or magnitude(s) of confidential information contained within each real-world data file. The identified type(s) and/or magnitude(...
NEW Computing devices
Intel Corporation
June 22, 2017 - N°20170177873

Disclosed herein are embodiments related to security in cloudlet environments. In some embodiments, for example, a computing device (e. G., a cloudlet) may include: a trusted execution environment; a basic input/output system (bios) to request a key encryption key (kek) from the trusted execution environment; and a self-encrypting storage (ses) associated with the kek; wherein the trusted execution environment ...
NEW Anonymization system
Toshiba Solutions Corporation
June 22, 2017 - N°20170177683

According to one embodiment, there is provided an anonymization system including at least one encryption apparatus, an anonymization apparatus, and a decryption apparatus. The encryption apparatus store personal data including one or more values for each item, and generates encrypted data from the personal data by encrypting the one or more values for each item included in the personal data. ...
NEW Techniques to compress cryptographic metadata for memory encryption
Intel Corporation
June 22, 2017 - N°20170177505

Examples include techniques for compressing counter values included in cryptographic metadata. In some examples, a cache line to fill a cache included in on-die processor memory may be received. The cache arranged to store cryptographic metadata. The cache line includes a counter value generated by a counter. The counter value to serve as version information for a memory encryption scheme ...
NEW Message encryption with video game
Texta, Inc.
June 22, 2017 - N°20170173476

A system that may be utilized for sending and locking text messages is provided. The system may allow a user to send an electronic message that is encrypted, locked, hidden, or otherwise made unviewable by the system to form a locked message. The locked message may be formed by associating a game with the message and requiring that a recipient ...
Security system for handheld wireless devices using time-variable encryption keys
Mlr, Llc.
June 15, 2017 - N°20170171750

In one embodiment, the invention provides a portable wireless personal communication system for cooperating with a remote certification authority to employ time variable secure key information pursuant to a predetermined encryption algorithm to facilitate convenient, secure encrypted communication. The disclosed system includes a wireless handset, such as pda, smartphone, cellular telephone or the like, characterized by a relatively robust data ...
Wireless dongle and method for wirelessly transmitting data from a computer to at least one ...
Endress+hauser Conducta Gmbh+co. Kg
June 15, 2017 - N°20170171746

The present disclosure relates to a wireless dongle for the wireless transmission of data from a computer to at least one field device of a process automation system. The dongle includes a connection interface for connecting the dongle to a computer, a wireless interface for transmitting the data from the dongle to a field device, a memory, an arithmetic unit ...
Encryption Patent Pack
Download 846+ patent application PDFs
Encryption Patent Applications
Download 846+ Encryption-related PDFs
For professional research & prior art discovery
inventor
  • 846+ full patent PDF documents of Encryption-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method and terminal for online playing video stream
Le Shi Internet Information Technology Corp. Beijing
June 15, 2017 - N°20170171279

The disclosure provides a method and a terminal for online playing a video stream. The method includes: acquiring slice data encrypted slice by slice from a server according to a time parameter of a video slice; decrypting the acquired slice data to acquire the video slice. And add the video slice to a buffer for online playing. The principle of ...
Management of encryption within processing elements
International Business Machines Corporation
June 15, 2017 - N°20170171223

A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. The first processing element includes a first encryption key for encrypting the tuples as the leave the first processing ...
Signed envelope encryption
Amazon Technologies, Inc.
June 15, 2017 - N°20170171219

Clients within a computing environment may establish a secure communication session. Sometimes, a client may trust another client to read, but not modify, a message. Clients may utilize a cryptography service to generate a message protected against improper modification. Clients may utilize a cryptography service to verify whether a protected message has been improperly modified.
Bidirectional cryptographic io for data streams
Intel Corporation
June 15, 2017 - N°20170171194

Various configurations and techniques for enabling bidirectional cryptographic input output (io) operations with an io device of a computing system are disclosed herein. In an example, electronic operations of a computing system to enable a secure direct memory access (dma) transaction including writing information to enable the secure dma transaction to memory, reading and verifying the information from memory, performing ...
Management of encryption within processing elements
International Business Machines Corporation
June 15, 2017 - N°20170171171

A streaming environment includes at least a first processing element of a first compute node and a second processing element of a second compute node. A tuple encryption operation is determined of the first processing element and the second processing element. The first processing element includes a first encryption key for encrypting the tuples as the leave the first processing ...
Dynamic encryption systems
Xasp Security, Llc
June 15, 2017 - N°20170171170

A proxy dynamically encrypts data that is transmitted between a server and a client. The proxy randomly selects an encryption algorithm for the client to use during various time periods (e. G. Every transaction, every 10 minutes, or during randomly chosen time periods). If the client transmits a response without using the selected encryption algorithm, the system could trigger an alert ...
Flexible ethernet encryption systems and methods
Ciena Corporation
June 15, 2017 - N°20170171163

Systems and methods for physical coding sublayer (pcs) encryption implemented by a first network element communicatively coupled to a second network element include utilizing an encryption messaging channel to establish an authenticated session and exchanging one or more encryption keys with a second network element; encrypting a signal, based on the one or more encryption keys; and transmitting the encrypted ...
Privacy enhancing networks
Mindtop, Inc.
June 15, 2017 - N°20170171154

The presently disclosed privacy enhancing networks (pens) comprises a network of gateways in communication with one or more controllers. By dynamically creating and tearing down unique data flow paths through a network of gateways for each individual data flow, the privacy enhancing network makes it more difficult for an adversary to glean information about communicating parties. Since each flow in ...
Loading