Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

156 results about "Encryption software" patented technology

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.

System and method for providing customized secure access to shared documents

A document management system and method. The inventive system includes a server for providing data from a stored document. Software is provided on the server for encrypting the data. A communications subsystem is included for transporting the encrypted data from the server to the client. Software is provided at the client for decrypting the encrypted data. The inventive method includes the steps of: using a client machine to access a server via a network and to request data therefrom; encrypting at least a portion of said data on said server; communicating said encrypted data from said server to said client; and decrypting said data on said client. In the illustrative embodiment, the inventive method operates under the control of an agent residing on the server. The encrypting software is a first applet residing on the server and the decrypting software is a second applet residing on the client. In the illustrative implementation, the second applet is communicated from the server to the client. Several mechanisms are included for verifying the user's identity including a digital signature, a private key and a public key. In accordance with the invention, software is included for customizing the data based on the user's access rights; providing for secure modification of the shared document; and tracking submission, access, and changes in the document.
Owner:HEWLETT PACKARD DEV CO LP

Secure installation of encryption enabling software onto electronic devices

ActiveUS20150052351A1Facilitate a public key infrastructureTransmissionEncryptionSoftware
A process/method is provided, which authenticates electronic devices allowing the installation and utilization of encryption enabling software capable of facilitating a public key infrastructure in combination with electronic devices without need for such encryption enabling software capable of facilitating a public key infrastructure to be installed at the same time as manufacture of the electronic device. The disclosed process/method may then provide a system for monitoring various metrics and statuses of the electronic devices through the manufacturing chain, distribution chain and product lifecycle. The process/method can be utilized to create electronic devices secured with encryption enabling software capable of facilitating a public key infrastructure, free from the security risks inherent with the current method of installing encryption enabling software onto electronic devices, which will render such secured electronic devices suitable for tasks requiring such enhanced security or encryption. Moreover, electronic devices utilizing the disclosed process/method to install encryption enabling software capable of facilitating a public key infrastructure will be enabled to benefit from and facilitate public key infrastructure functionality, including, but not limited to, the renew encryption enabling software on a defined renewal interval.
Owner:SMARTGUARD LLC

Embedded system insuring security and integrity, and method of increasing security thereof

A system containing both software and hardware to perform secure operations especially suited for Digital Right Management. The system has hardware to accelerate Elliptic Curve calculations, hash algorithms, and various encryption algorithms. The system runs on encrypted software, and the software is checked for integrity before it boots.
Owner:MEDIATEK INC

Gaming facility and method of operation thereof

A gaming system comprises one or more player stations, a repository containing a number of different software programs, and a download server communicable with the repository and each one of the player stations by means of a communication network. Each player station is identified by a unique code and is operable by a respective player to play a corresponding game. Each software program in the repository is executable on any player station to generate a simulation of a different game. One or more of selected software programs contained in the repository are encrypted, remotely from any of the player Stations, as a function of the unique identification code of a particular of the player stations. The download server is responsive to the encryption and downloads the encrypted software program or programs to the particular player station whose unique identification code was used for encryption. A security module associated with the particular player station decrypts the downloaded encrypted software program or programs to obtain therefrom a decrypted identification code. The security module enables execution of the downloaded encrypted software programs by the particular player station when the decrypted identification code is the same as the unique identification code of the particular player station, and disables execution of the downloaded encrypted software programs by the particular player station when the decrypted identification code is different from the unique identification code of the particular player station. The security module also disables execution of the software programs when the software program have not been encrypted.
Owner:WATERLEAF LTD

Method For Connecting Unclassified And Classified Information Systems

A method and system that enables the connection of an unclassified information system to a classified information system while meeting all government requirements. The system utilizes a combination of COTS technologies (e.g., a Trusted Gateway System, type-2 encryption software, etc.), local administrative policies, and scriptable software applications.
Owner:LOCKHEED MARTIN CORP

Software upgrading method based on OTA upgrading system and OTA upgrading system

The embodiment of the invention provides a software upgrading method based on an OTA upgrading system and the OTA upgrading system, and the method comprises the steps that a package issuing unit encrypts a software package to obtain an encrypted software package, and generates metadata for the software package; a package issuing unit sends the encrypted software package to the downloading unit andsends the metadata to the upgrading service unit; an upgrading service unit acquires a vehicle certificate sent by a vehicle, encrypts the metadata by adopting the vehicle certificate to obtain encrypted metadata, and sends the encrypted metadata to the vehicle; enthe vehicle decrypts the encrypted metadata by adopting a preset vehicle private key, and verifies the legality of the metadata; if the metadata is legal, the vehicle acquires the encrypted software package from the downloading unit and decrypts the encrypted software package according to the metadata; the vehicle verifies the legality of the software package according to the metadata; and if the software package is legal, the vehicle is upgraded by adopting the software package. According to the embodiment of the invention, theproblems of tampering and replay attacks of the software package can be prevented.
Owner:GUANGZHOU XIAOPENG MOTORS TECH CO LTD

Protection of software models

An encryption method is provided that has a software model of a technical system, the model including software components is encrypted by a public key and a decryption structure, wherein the latter includes definitions of component groups of the software model. The decryption structure is integrated at least partially into the encrypted software model. Correspondingly, in a decryption method according to the invention, via a secret key that likewise comprises definitions of component groups, only the particular component groups are decrypted whose definitions the secret key includes in agreement with the definitions of the encrypted software model. The definitions of the secret key can be extended after the fact by a key extension, so that additional component groups can be decrypted with an extended secret key.
Owner:DSPACE DIGITAL SIGNAL PROCESSING & CONTROL ENG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products