Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

110results about How to "Avoid decryption" patented technology

Secure video system for display adaptor

A secure video system for a graphics display adaptor includes a module for decrypting a content signal from a media player or other secure content source. The adaptor may be provided as a component of a computer graphics system, or in a stand-alone special-purpose device. The adaptor may include other features for preventing unauthorized use of protected content, for example authenticating the source of a content signal before providing an output audio or video signal, encrypting the output video signal, responding to commands to renew or revoke cryptographic keysets, and embedding forensic tracking information in an audio or video signal.
Owner:MOTION PICTURE ASSOC OF AMERICA

Protected volume on a data storage device with dual operating systems and configurable access and encryption controls

A method provides a protected region of a data storage device associated with a computational device, where data in the protected region is primarily protected by preventing access without proper access authorization. The method comprises the steps of providing, in an unprotected region of the data storage device, a first operating system and associated operating system data; monitoring operating system data accessed by the computational device until a predetermined functionality becomes available; storing, in the protected region, the monitored operating system data; providing, in the protected region, a second operating system; transferring control of the computational device from the first operating system to the second operating system; storing data in the protected region; and preventing access to the stored data in the protected region without access authorization. In a further embodiment of the method, the second operating system optionally provides a second level of security by preventing decryption of data stored in the protected region without decryption authorization.
Owner:SPEX TECH

Restriction of broadcast session key use by secure module decryption policy

A method is provided for restricting or enhancing broadcast content access on a per-subscriber basis across a population of subscribers, all of whom have a valid content access key to such content, without necessitating changes to the current standard schemes and protocols for distributing content access keys and broadcasting the traffic keys associated with the broadcast data itself, and without trusting the application that processes the data. A method of handling a multimedia broadcast in a device comprises receiving broadcast content in a media stream encrypted using a traffic key, receiving the traffic key encrypted using a session key, and receiving broadcast attributes encrypted using the traffic key and the session key, wherein use of the media stream by the device is controlled using the broadcast attributes and using an access policy in the device.
Owner:ROUNDBOX

Signcryption method of biological features of a plurality of receivers

InactiveCN102710613AOvercome the problem of forgeryPrevent leakageTransmissionDigital signatureSigncryption
The invention discloses a signcryption method of biological features of a plurality of receivers, comprising generating system parameters; extracting features; performing user log-on; encrypting by a sender; and decrypting by receivers. The method employs fuzzy extractor technique to bind the biological features and user keys to protect keys, directly authenticates user identity through the biological features, solves the safety problems of key safety and key abuse in the conventional cryptography, adds digital signature of senders during encryption, verifies identity of senders through certification during decryption, and solves the problem of counterfeiting of senders. The method improves the safety and reliability of whole systems, has the advantages of high safety, high efficiency and no need for storing any secret information by users, and can be applied to the distributed network application field.
Owner:XIDIAN UNIV

Encrypted application identification and encrypted webpage content classification methods, and encrypted application identification and/or encrypted webpage content classification devices

The invention discloses an encrypted application identification method. The method comprises that connection data in the network is obtained, and the connection data is determined to be domain name system (DNS) connection data; a DNS feedback packet, which comprises the domain name of an encrypted application and the IP address of a server, is obtained from the DNS connection data, whether an automatic matching table of the application comprises the IP address of the server is checked; and if the automatic matching table of the application does not the IP address of the server, whether an application rule base includes an application identification corresponding to the domain name of the encrypted application is checked, and if yes, the IP address of the server and the corresponding identification are added to the automatic matching table of the application. The invention also discloses an encrypted webpage content classification method, an encrypted application identification device, an encrypted webpage content classification device and an encrypted application identification and encrypted webpage content classification device.
Owner:BEIJINGNETENTSEC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products