Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

155 results about "Encryption software" patented technology

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. Cryptography is used to protect digital information on computers as well as the digital information that is sent to other computers over the Internet.

System and method for providing customized secure access to shared documents

A document management system and method. The inventive system includes a server for providing data from a stored document. Software is provided on the server for encrypting the data. A communications subsystem is included for transporting the encrypted data from the server to the client. Software is provided at the client for decrypting the encrypted data. The inventive method includes the steps of: using a client machine to access a server via a network and to request data therefrom; encrypting at least a portion of said data on said server; communicating said encrypted data from said server to said client; and decrypting said data on said client. In the illustrative embodiment, the inventive method operates under the control of an agent residing on the server. The encrypting software is a first applet residing on the server and the decrypting software is a second applet residing on the client. In the illustrative implementation, the second applet is communicated from the server to the client. Several mechanisms are included for verifying the user's identity including a digital signature, a private key and a public key. In accordance with the invention, software is included for customizing the data based on the user's access rights; providing for secure modification of the shared document; and tracking submission, access, and changes in the document.
Owner:HEWLETT PACKARD DEV CO LP

Secure installation of encryption enabling software onto electronic devices

ActiveUS20150052351A1Facilitate a public key infrastructureTransmissionEncryptionSoftware
A process/method is provided, which authenticates electronic devices allowing the installation and utilization of encryption enabling software capable of facilitating a public key infrastructure in combination with electronic devices without need for such encryption enabling software capable of facilitating a public key infrastructure to be installed at the same time as manufacture of the electronic device. The disclosed process/method may then provide a system for monitoring various metrics and statuses of the electronic devices through the manufacturing chain, distribution chain and product lifecycle. The process/method can be utilized to create electronic devices secured with encryption enabling software capable of facilitating a public key infrastructure, free from the security risks inherent with the current method of installing encryption enabling software onto electronic devices, which will render such secured electronic devices suitable for tasks requiring such enhanced security or encryption. Moreover, electronic devices utilizing the disclosed process/method to install encryption enabling software capable of facilitating a public key infrastructure will be enabled to benefit from and facilitate public key infrastructure functionality, including, but not limited to, the renew encryption enabling software on a defined renewal interval.
Owner:SMARTGUARD LLC

Gaming facility and method of operation thereof

A gaming system comprises one or more player stations, a repository containing a number of different software programs, and a download server communicable with the repository and each one of the player stations by means of a communication network. Each player station is identified by a unique code and is operable by a respective player to play a corresponding game. Each software program in the repository is executable on any player station to generate a simulation of a different game. One or more of selected software programs contained in the repository are encrypted, remotely from any of the player Stations, as a function of the unique identification code of a particular of the player stations. The download server is responsive to the encryption and downloads the encrypted software program or programs to the particular player station whose unique identification code was used for encryption. A security module associated with the particular player station decrypts the downloaded encrypted software program or programs to obtain therefrom a decrypted identification code. The security module enables execution of the downloaded encrypted software programs by the particular player station when the decrypted identification code is the same as the unique identification code of the particular player station, and disables execution of the downloaded encrypted software programs by the particular player station when the decrypted identification code is different from the unique identification code of the particular player station. The security module also disables execution of the software programs when the software program have not been encrypted.
Owner:WATERLEAF LTD

Software upgrading method based on OTA upgrading system and OTA upgrading system

The embodiment of the invention provides a software upgrading method based on an OTA upgrading system and the OTA upgrading system, and the method comprises the steps that a package issuing unit encrypts a software package to obtain an encrypted software package, and generates metadata for the software package; a package issuing unit sends the encrypted software package to the downloading unit andsends the metadata to the upgrading service unit; an upgrading service unit acquires a vehicle certificate sent by a vehicle, encrypts the metadata by adopting the vehicle certificate to obtain encrypted metadata, and sends the encrypted metadata to the vehicle; enthe vehicle decrypts the encrypted metadata by adopting a preset vehicle private key, and verifies the legality of the metadata; if the metadata is legal, the vehicle acquires the encrypted software package from the downloading unit and decrypts the encrypted software package according to the metadata; the vehicle verifies the legality of the software package according to the metadata; and if the software package is legal, the vehicle is upgraded by adopting the software package. According to the embodiment of the invention, theproblems of tampering and replay attacks of the software package can be prevented.
Owner:GUANGZHOU XIAOPENG MOTORS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products