Class / Patent application number | Description | Number of patent applications / Date published |
713191000 | Upgrade/install encryption | 14 |
20080313473 | METHOD AND SURVEILLANCE TOOL FOR MANAGING SECURITY OF MASS STORAGE DEVICES - The present invention relates to a method and a surveillance tool for managing security of mass storage devices. The method and surveillance tool installs a surveillance tool on a computer, and verifies whether there is a mass storage device connected to the computer. Then, the method determines whether the mass storage device is secured with an appropriate encryption tool, and if the mass storage device is not secured with the appropriate encryption tool, the method prevents use of the mass storage device and secures the mass storage device. | 12-18-2008 |
20100241873 | INSTALLATION OF APPLICATION PACKAGE PACKAGING PLURAL APPLICATIONS - An application packaging device is provided, which comprises a decryption component configured to decrypt each of a plurality of applications, a replication component configured to replicate an end user license agreement included in each of the plurality of decrypted applications, and a component configured to package respective replicas of the end user license agreements and the plurality of applications before the decryption so as to obtain an application package. | 09-23-2010 |
20110173457 | ENHANCED SECURITY FOR OVER THE AIR (OTA) FIRMWARE CHANGES - A system and method for providing enhanced security for Over The Air (OTA) firmware changes defers decryption of a firmware image until it is transferred into a protected internal memory of a wireless device. An updated firmware image is encrypted at a source and transmitted to a wireless device having a processor, internal memory, and external memory. The wireless device stores the encrypted firmware image in its external memory. In response to receiving an instruction to load a new firmware image, the processor retrieves the encrypted firmware image from the external memory. The processor decrypts the encrypted firmware image and programs the internal memory in accordance with the decrypted firmware image. | 07-14-2011 |
20110276808 | APPLICATION INSTALLING METHOD - An application installing method according to the present invention in which an application file includes at least two application encrypting data in which the executable files are respectively encrypted using different encryption algorithms, and a license file includes at least two license encryption data in which application decryption keys for decrypting the application encryption data are encrypted using respectively different encryption algorithms. The process execution apparatus includes a calculation unit configured to execute the executable file, and a storage unit configured to store the application file and the license file. The method includes a step of decrypting the application encryption data by use of the application decryption key with the calculation unit based on the level of priority of the predesignated application encryption data stored in the storage unit, and installing the executable file corresponding to the application encryption data. | 11-10-2011 |
20120260108 | FONT ENCRYPTION AND DECRYPTION SYSTEM AND METHOD - Systems and methods in accordance with aspects of the present invention can be implemented to prevent automated, semi-automated, or manual searching, indexing, copying, and surveillance of electronic content, e.g., content in online documents or pages. Such systems and methods can also enable a human user to see the electronic content properly on a display, while the content remains unintelligible to computer programs. Thus, in accordance with the present invention, a computer application and a human user can interpret or “see” an electronic document differently. | 10-11-2012 |
20130073869 | INFORMATION PROCESSING APPARATUS, SOFTWARE UPDATING METHOD, AND IMAGE PROCESSING APPARATUS - An information processing apparatus which updates a basic software package is disclosed. The information processing apparatus includes an encryption and decryption unit which stores values calculated uniquely from software and encrypts information based on the calculated values and decrypts encrypted information based on the calculated values. The basic software package includes a firmware authenticating module for authenticating a firmware updating file which includes new software for updating the basic software package, a value uniquely calculated from the new software, and a public key signature. The information processing apparatus further includes a software updating module which updates the basic software package by using the authenticated firmware updating file, and an encryption key managing module for encrypting again the information encrypted by the values based on a value changed by updating the basic software package. | 03-21-2013 |
20130166921 | PORTING DIGITAL RIGHTS MANAGEMENT SERVICE TO MULTIPLE COMPUTING PLATFORMS - Methods, systems, and apparatus, including computer programs encoded on a computer storage medium, for porting digital rights management services. In one aspect, a system includes: a hardware processor; one or more memory devices coupled with the hardware processor and effecting an operating system for the hardware processor; and a digital rights management (DRM) component having a DRM adaptor configured to check whether the hardware processor has a hardware-based encryption element, use the hardware-based encryption element if available, and use a software-based encryption element if the hardware-based encryption element is not available, wherein the software-based encryption element includes code compiled from source code for the hardware processor, the source code prepared for different computer platforms. | 06-27-2013 |
20130262878 | APPLICATION INSTALLING METHOD - An application installing method according to the present invention in which an application file includes at least two application encrypting data in which the executable files are respectively encrypted using different encryption algorithms, and a license file includes at least two license encryption data in which application decryption keys for decrypting the application encryption data are encrypted using respectively different encryption algorithms. The process execution apparatus includes a calculation unit configured to execute the executable file, and a storage unit configured to store the application file and the license file. The method includes a step of decrypting the application encryption data by use of the application decryption key with the calculation unit based on the level of priority of the predesignated application encryption data stored in the storage unit, and installing the executable file corresponding to the application encryption data. | 10-03-2013 |
20140164789 | AUTHENTICATING MICROCODE PATCHES WITH EXTERNAL ENCRYPTION ENGINE - A single or multicore processor having a separate hardware cryptographic engine (HCE) for microcode patch updates is presented. Microcode in each core is modified to utilize the HCE for patch updates. Various arrangements are presented. Memory for HCE processing can include shared L2 or L3 memory or a separate DRAM configured in the address space of each core or set of cores and the HCE. In some embodiments, the HCE may be located on a circuit card attached to an extension bus, such as a PCIe or LPC bus. | 06-12-2014 |
20140344585 | Secure Software And Hardware Association Technique - Authenticated hardware and authenticated software are cryptographically associated using symmetric and asymmetric cryptography. Cryptographically binding the hardware and software ensures that original equipment manufacturer (OEM) hardware will only run OEM software. Cryptographically binding the hardware and software protects the OEM binary code so it will only run on the OEM hardware and cannot be replicated or altered to operate on unauthorized hardware. In one embodiment, critical security information associated with the equipment is loaded from a memory at startup time. The critical security information is stored in the memory, in encrypted form, using a unique secret value. The secret value is used to retrieve a chip encryption key and one or more image authentication keys that can be used to associate program code with an original equipment manufacturer. These keys are used to authenticate the program code. | 11-20-2014 |
20150295716 | HOMOMORPHIC ENCRYPTION FOR DATABASE QUERYING - This disclosure concerns homomorphic encryption for database querying. Numerical values (FIG. | 10-15-2015 |
20160019386 | Device and method for processing data - A device for processing data includes: an input interface receiving input data; a processing unit processing data; and an encoding unit encoding data words which are obtained as input data at the input interface data in order to obtain encoded data words, the data words being encoded in such a way that a predefined portion of measured values which characterize the encoded data words and/or their processing by the device and which are ascertainable as a function of at least one physical variable of the device has a difference from a default value, the difference being less than or equal to a predefinable threshold value. The encoding unit executes an encoding rule for encoding the data words as a function of at least one encoding parameter, and the processing unit processes the encoded data words. | 01-21-2016 |
20160170733 | ENCRYPTION FOR TELEMATICS FLASHING OF A VEHICLE | 06-16-2016 |
20160203087 | METHOD FOR PROVIDING SECURITY FOR COMMON INTERMEDIATE LANGUAGE-BASED PROGRAM | 07-14-2016 |