Maison » Dernières publications et brevets sur le chiffrement

Dernières publications et brevets sur le chiffrement

. Dernières publications et brevets sur le cryptage. Norme de chiffrement avancée (AES)

Il s'agit de notre dernière sélection de publications et de brevets mondiaux en anglais sur le chiffrement, parmi de nombreuses revues scientifiques en ligne, classées et axées sur le chiffrement, la cryptographie, le chiffrement, AES, la cryptanalyse, Diffie-Hellman, la fonction de hachage, l'algorithme RSA, la signature numérique, la clé cryptographique, l'autorité de certification, la clé publique, la clé privée et la courbe elliptique.

Publication: pas de nouvelles récentes sur ce sujet particulier. Veuillez essayer la recherche manuelle approfondie dans la base de données des publications dont le lien figure juste au-dessus.

Network-independent dynamic encryption

Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])

Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]


Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.

dynamic encryption, digital documents, GPS chip, quick response code

Patent

Method and apparatus for confirming boarding of passenger in uam environment

Patent published on the 2025-03-06 in WO under Ref WO2025048366 by KIA CORP [KR] (Jung Chang Hun [kr], Park Seung Wook [kr])

Abstract: A method and an apparatus for confirming boarding of a passenger in a UAM environment are disclosed. According to one aspect of the present disclosure, the provided method, which is performed by a fuselage system supporting a function of checking whether a user has boarded a fuselage and taken a reserved seat, comprises the steps of: receiving, from a user terminal, a first encryption token including reservation information of the user and identification proof information; receiving, from a flig[...]


Our summary: Method and apparatus for confirming boarding of passenger in UAM environment by using encryption tokens and symmetric key to verify user reservation and seat allocation.

boarding, passenger, UAM, fuselage

Patent

Secure offline transactions using trusted payer

Patent published on the 2025-03-06 in WO under Ref WO2025048687 by TELEFONAKTIEBOLAGET LM ERICSSON PUBL [SE] (Karlsson Henrik [at])

Abstract: A method for making an offline transaction between a payee and a payer, performed by a payee device in communication with a payer device, is provided. The method includes sending, by the payee device, towards the payer device, a first message including signed payee offline information. The method includes receiving, by the payee device, from the payer device, signed payer offline information that is signed with a transaction broker node private key. The method includes receiving, by the payee de[...]


Our summary: Secure offline transactions between payee and payer devices using signed offline information and verification process.

offline transactions, secure, trusted payer, method

Patent

Method and apparatus for supporting protection of control frame in wireless lan system

Patent published on the 2025-03-06 in WO under Ref WO2025048617 by LG ELECTRONICS INC [KR] (Baek Sunhee [kr], Choi Jinsoo [kr], Jang Insun [kr], Kim Geonhwan [kr], Yoon Yelin [kr], Cha Dongju [kr])

Abstract: Disclosed are a method and an apparatus for supporting protection of a control frame in a wireless LAN system. The method performed by a first STA in a wireless local area network (WLAN) system, according to an embodiment of the present disclosure, may comprise the steps of: checking key information related to protection of a control frame; on the basis of a specific encryption protocol, receiving a control frame including encrypted information from a second STA; and on the basis of the key info[...]


Our summary: Method and apparatus for protecting control frames in a wireless LAN system by checking key information, receiving encrypted control frames, and performing decryption and integrity check based on the key information.

wireless LAN, control frame, encryption protocol, decryption

Patent

Disinfectant articles with improved aesthetic performance

Patent published on the 2025-03-06 in WO under Ref WO2025048826 by KIMBERLY CLARK WORLDWIDE INC [US] (Horkman Alexander J [us], Engelbrecht Kathleen C [us], Kapadia Poonamben [us], Dickson Yolonda [us], Wolff Kelly L [us])

Abstract: Disclosed herein are antimicrobial compositions having improved antimicrobial efficacy and aesthetic performance, wherein the compositions include at least one polyquaternium polymer, an antimicrobial agent and an aesthetic enhancer. In specific embodiments, an antimicrobial composition comprises a quaternary ammonium salt comprises benzalkonium chloride, a first polyquaternium species that is polyquaternium-6, an aesthetic enhancer selected from isocetyl alcohol, hexyldecanol, lauryl lactate, d[...]


Our summary: Antimicrobial compositions with improved efficacy and aesthetic performance, including polyquaternium polymer, benzalkonium chloride, and aesthetic enhancers.

antimicrobial, polyquaternium polymer, aesthetic enhancer, benzalkonium chloride

Patent

Long-lasting disinfectant articles

Patent published on the 2025-03-06 in WO under Ref WO2025048827 by KIMBERLY CLARK WORLDWIDE INC [US] (Horkman Alexander J [us], Engelbrecht Kathleen C [us], Kapadia Poonamben [us], Ballesteros Jane [us])

Abstract: Disclosed herein are antimicrobial compositions having improved antimicrobial efficacy and aesthetic performance, wherein the compositions include at least two polyquaternium polymers and an antimicrobial agent. In specific embodiments, the antimicrobial composition comprises a quaternary ammonium salt in an amount less than 1.0 wt%, a first polyquaternium species that is polyquaternium-6, a second polyquaternium species that is polyqyaternium-22, and water.[...]


Our summary: Long-lasting disinfectant articles with improved antimicrobial efficacy and aesthetic performance, comprising polyquaternium polymers, quaternary ammonium salt, and water.

disinfectant, antimicrobial compositions, polyquaternium polymers, quaternary ammonium salt

Patent

Table des matières
    Ajoutez un en-tête pour commencer à générer la table des matières

    DÉFI DE CONCEPTION ou DE PROJET ?
    Ingénieur mécanique, chef de projet ou de R&D
    Développement de produits efficace

    Disponible pour un nouveau défi à court terme en France et en Suisse.
    Contactez-moi sur LinkedIn
    Produits en plastique et en métal, Conception à coût réduit, Ergonomie, Volumes moyens à élevés, Secteurs réglementés, CE et FDA, CAO, Solidworks, Lean Sigma Black Belt, médical ISO 13485 Classes II et III

    Nous recherchons un nouveau sponsor

     

    Votre entreprise ou institution s'intéresse à la technique, à la science ou à la recherche ?
    > envoyez-nous un message <

    Recevez tous les nouveaux articles
    Gratuit, pas de spam, email non distribué ni revendu

    ou vous pouvez obtenir votre adhésion complète - gratuitement - pour accéder à tout le contenu restreint >ici<

    Sujets abordés : cryptage, cryptographie, chiffrement, AES, cryptanalyse, Diffie-Hellman, fonction de hachage, algorithme RSA, signature numérique, clé cryptographique, autorité de certification, clé publique, clé privée, courbe elliptique, cryptage dynamique, transactions hors ligne sécurisées, réseau local sans fil et protocole de cryptage.

    1. Emery

      Une lecture intéressante, mais ces brevets repoussent-ils vraiment les limites ou ne font-ils que remettre à neuf de vieilles techniques de cryptage ? Discutons-en.

    2. Bruno Burton

      Une lecture intéressante, mais ne négligeons-nous pas le potentiel d'utilisation abusive du cryptage avancé ? C'est une arme à double tranchant, n'est-ce pas ?

    Laisser un commentaire

    Votre adresse e-mail ne sera pas publiée. Les champs obligatoires sont indiqués avec *

    Articles Similaires

    Retour en haut

    Vous aimerez peut-être aussi