Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
S Christensen, D Becker, T Black, M Calcano… - US Patent …, 2022 - Google Patents
(57) ABSTRACT A system includes at least one processor and at least one memory
communicatively coupled to the at least one pro cessor. The at least one processor is …
communicatively coupled to the at least one pro cessor. The at least one processor is …
Encrypted asset encryption key parts allowing for assembly of an asset encryption key using a subset of the encrypted asset encryption key parts
S Christensen, D Becker, T Black, T Perkins - US Patent 11,601,264, 2023 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
Proof-of-work key wrap** with integrated key fragments
MHM Bursell, NP McCallum, PM Jones… - US Patent …, 2022 - Google Patents
Primary Examiner Kristine L Kincaid Assistant Examiner Alexander R Lapian (74) Attorney,
Agent, or Firm-Lowenstein Sandler LLP (57) ABSTRACT The technology disclosed herein …
Agent, or Firm-Lowenstein Sandler LLP (57) ABSTRACT The technology disclosed herein …
Proof-of-work key wrap** for temporally restricting data access
MHM Bursell, NP McCallum, PM Jones - US Patent 11,316,839, 2022 - Google Patents
The technology disclosed herein provides an enhanced access control mechanism that
uses a proof-of-work key wrap** system to temporally restrict access to data. An example …
uses a proof-of-work key wrap** system to temporally restrict access to data. An example …
Proof-of-work key wrap** for cryptographically controlling data access
MHM Bursell, NP McCallum, PM Jones - US Patent 11,424,920, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system that
cryptographically controls access to data. An example method may include: selecting a set …
cryptographically controls access to data. An example method may include: selecting a set …
Proof-of-work key wrap** for verifying device capabilities
MHM Bursell, NP McCallum, PM Jones - US Patent 11,271,734, 2022 - Google Patents
The technology disclosed herein provides a proof-of-work key wrap** system for verifying
device capabilities. An example method may include: receiving a wrapped key and a …
device capabilities. An example method may include: receiving a wrapped key and a …
Stream-based key management
Techniques for stream-based key management are disclosed. A system obtains a first
payload to be published to a first set of one or more subscribers, encrypts the first payload …
payload to be published to a first set of one or more subscribers, encrypts the first payload …
Secure data movement
SR Hetzler, GDH Hunt - US Patent 11,743,241, 2023 - Google Patents
US11743241B2 - Secure data movement - Google Patents US11743241B2 - Secure data
movement - Google Patents Secure data movement Download PDF Info Publication …
movement - Google Patents Secure data movement Download PDF Info Publication …
Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
S Christensen, D Becker, T Black, M Calcano… - US Patent …, 2025 - Google Patents
A system includes at least one processor and at least one memory communicatively coupled
to the at least one processor. The at least one processor is configured to receive a plurality …
to the at least one processor. The at least one processor is configured to receive a plurality …
Doubly-encrypted secret parts allowing for assembly of a secret using a subset of the doubly-encrypted secret parts
S Christensen, D Becker, T Black, M Calcano… - US Patent …, 2023 - Google Patents
H04L9/3073—Public key, ie encryption algorithm being computationally infeasible to invert
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …
or user's encryption keys not requiring secrecy involving algebraic varieties, eg elliptic or …