The device relates to encryption, and particularly to encryption across different memories, cloud platforms, operating systems, and other products.
Many encryption engines or systems, such as those described in U.S. Pat. Nos. 7,751,565 and 8,595,508, can perform functional encryption/decryption and produce full scale coding or full section of the cipher text or cipher text stream. These full scale cipher streams, in many cases, are not readable, not displayable, not easy to communicate, and sometimes difficult to integrate with other devices and products. In today's Internet, Cloud and integratable environment, full scale coding forms a major deficiency of encryption engines and encryption systems, affecting their applications on a global scale.
In a first aspect, an encryption box device includes a memory and a processor coupled to the memory. A first clipboard runs on the processor and downloads a plaintext stream. An encryption engine runs on the processor and receives the plaintext stream and encrypts the plaintext stream to produce an encrypted stream. The encryption engine may also decrypt the encrypted stream to produce the plaintext stream and upload the plaintext stream to the first clipboard.
In a second aspect, digitizer runs on the processor and digitizes the encrypted stream to produce a digitized encrypted stream. The digitizer digitizes the encrypted stream according to a mode such as no digitization, Base 64 digitization, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
In a third aspect, second clipboard runs on the processor and uploads the digitized encrypted stream.
In a fourth aspect, the encryption box device may also include a de-digitizer running on the processor that downloads the digitized encryption stream from the second clipboard and de-digitizes the digitized encryption stream to produce the encrypted stream. The de-digitizer may then provide the encrypted stream to the encryption engine.
In a fifth aspect, the de-digitizer de-digitizes the digitized encryption stream according to a mode such as no de-digitization, Base 64, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
In a sixth aspect, the encryption box device may be a dongle that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
In a seventh aspect, the encryption box device may be a USB device that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
In an eighth aspect, the encryption box device may include wireless communication such as Wi-Fi or Bluetooth.
In a ninth aspect, the encryption box device may be any device or communications platform which can display, store or exchange data including but not limited to a Mobile Phone, an isdn phone, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a telephone exchange, a tablet, a computer, a radio, or the cloud, Unified Communications, any form of enterprise communication services, instant messaging (chat), presence information, voice (including IP telephony), mobility features (including extension mobility and single number reach), audio, web & video conferencing, fixed-mobile convergence (FMC), desktop sharing, data sharing (including web connected electronic interactive whiteboards), call control, speech recognition, any form of communication services, unified messaging (integrated voicemail, e-mail, SMS and fax), any set of products that provides a consistent unified user-interface and user-experience across multiple devices and media-types, all forms of communications that are exchanged via a network to include other forms of communications such as Internet Protocol Television (IPTV) and digital signage Communications, any integrated part of a network communications deployment that may be directed as one-to-one communications or broadcast communications from one to many, communications allowing an individual to send a message on one medium, and receive the same communication on another medium (for example, one can receive a voicemail message and choose to access it through e-mail or a cell phone. If the sender is online according to the presence information and currently accepts calls, the response can be sent immediately through text chat or video call. Otherwise, it may be sent as a non-real-time message that can be accessed through a variety of media), multimodal communications, speech access and personal assistant, conferencing (audio, Web and video), collaboration tools, mobility, business process integration (BPI) and software to enable business process integration.
In a 10th aspect, the encryption box device may include proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box. Use of the encryption box device may be limited to a user of one of the wireless adapters.
In an 11th aspect, the encryption box device may be simulated by a hardware emulator, such as an emulator running on a computer.
In a 12th aspect, a method of secure encryption using an encryption box device includes a first operation of plugging the encryption box device into a computer. The method of secure encryption then performs a second operation of running an application on the computer. The method of secure encryption then performs a third operation of downloading a plaintext stream from the application to a first clipboard. The method of secure encryption then performs a fourth operation of encrypting the plaintext stream to produce an encrypted stream. The method of secure encryption then performs a fifth operation of digitizing the encrypted stream to produce a digitized encrypted stream. The method of secure encryption then performs a sixth operation of uploading the digitized encrypted stream to a second clipboard.
In a 13th aspect, the application may be a spreadsheet, a text window, an email, a word processor, a chat room, or a presentation.
In a 14th aspect, the method of secure encryption may further include a seventh operation of digitizing the encrypted stream according to a mode such as no digitization, Base 64 digitization, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
In a 15th aspect, the method of secure encryption may further include an eighth operation of downloading the digitized encryption stream from the second clipboard. The method of secure encryption may further include a ninth operation of de-digitizing the digitized encryption stream to produce the encrypted stream and providing the encrypted stream to the encryption engine. The method of secure encryption may further include a 10th operation of decrypting the encrypted stream to produce the plaintext stream and uploading the plaintext stream to the first clipboard.
In a 16th aspect, the method of secure encryption may further include an 11th operation of de-digitizing the digitized encryption stream according to a mode such as no de-digitization, Base 64, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
In a 17th aspect, the method of secure encryption may further include a 12th operation of simulating the encryption box device using a hardware emulator.
The above and other features and advantages of the present invention, as well as the structure and operation of various embodiments of the present invention, are described in detail below with reference to the accompanying drawings.
The accompanying drawings, which are incorporated herein and form part of the specification, illustrate various embodiments of the present invention and, together with the description, further serve to explain the principles and to enable a person skilled in the pertinent art to make and use the invention. In the drawings, like reference numbers indicate identical or functionally similar elements. A more complete appreciation and many of the attendant advantages thereof will be readily obtained as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, wherein:
A first embodiment of an encryption box device 100 is shown in
In order to travel, or be compatible, among all different memories, operating systems etc, a special memory (hardware memory) structure of “Clipboard” is used. Clipboard (or Clipboard cache) is a special memory in all devices including computers, mobile phones, and tablets. Clipboard alone cannot handle all incompatibility problems; a “Digitizer/De-digitizer Module” is 136 (in FIG.2, 236) is also needed.
In the encryption box device 100 shown in
An encryption engine runs on the processor and receives the plaintext stream 116 and encrypts the plaintext stream 116 to produce a cipher text or encrypted stream 110. The encryption engine may also decrypt the encrypted stream 110 to produce the plaintext stream 116 and upload the plaintext stream 116 to the first clipboard 122 using upload clipboard 124.
A digitizer/de-digitizer 128 runs on the processor and digitizes the encrypted stream 110 to produce a digitized encrypted stream 138. The digitizer/de-digitizer 128 digitizes the encrypted stream 110 according to a mode 132 such as no digitization, Base 64 digitization, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
A second clipboard 140 runs on the processor and uploads the digitized encrypted stream 138 using upload clipboard 134.
The digitizer/de-digitizer 128 running on the processor may also download the digitized encryption stream 138 from the second clipboard 140 using the download clipboard 142 and de-digitize the digitized encryption stream 138 to produce the encrypted stream 110. The digitizer/de-digitizer 128 may then provide the encrypted stream 110 to the encryption engine.
The digitizer/de-digitizer 128 de-digitizes the digitized encryption stream 138 according to a mode 132 such as no de-digitization, Base 64, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
The encryption box device 100 may be a dongle that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 100 may be a USB device that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 100 may include wireless communication such as Wi-Fi or Bluetooth.
The encryption box device 100 may be a Mobile Phone, an isdn phone, skype, viber, Whatsapp, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a telephone exchange, a tablet, a computer, a radio, or the cloud.
The encryption box device 100 may include proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box. Use of the encryption box device 100 may be limited to a user of one of the wireless adapters.
The encryption box device 100 may be simulated by a hardware emulator, such as an emulator running on a computer.
A first cipher stream generator 103 generates and synchronizes a first cipher stream using the plaintext information 116 and a first key 118. A second cipher stream generator 101 generates and synchronizes a second cipher stream using a second key 106 and a randomizing function 104 to randomize and then synchronize a controllable plaintext stream 102. An exclusive disjunction operator 120 operating on the first and second synchronized cipher streams obtains the cipher text stream 110.
The first cipher stream generator 103 includes a block cipher encryption unit 114 that generates and synchronizes the first synchronized cipher stream upon input of plaintext information 116 and a first key 118. A block cipher encryption device 114 generates the first cipher stream and a first synchronization unit 112 synchronizes the first cipher stream.
The second cipher stream generator 101 includes a random function generator that randomize is, and then synchronizes, the controllable plaintext stream 102 upon input of a second key 106 and the controllable plaintext stream 102, and outputs a second synchronized cipher stream. The random function generator includes a random function generator device 104 to randomize the controllable plaintext stream and a second synchronization unit 108 (in
A second embodiment of an encryption box device 200 is shown in
In the encryption box device 200 shown in
An encryption engine runs on the processor and receives the plaintext stream 216 and encrypts the plaintext stream 216 to produce a cipher text or encrypted stream 210. The encryption engine may also decrypt the encrypted stream 210 to produce the plaintext stream 216 and upload the plaintext stream 216 to the first clipboard 222 using upload clipboard 224.
A digitizer/de-digitizer 228 runs on the processor and digitizes the encrypted stream 210 to produce a digitized encrypted stream 238. The digitizer/de-digitizer 228 digitizes the encrypted stream 210 according to a mode 232 such as no digitization, Base 64 digitization, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
A second clipboard 240 runs on the processor and uploads the digitized encrypted stream 238 using upload clipboard 234.
The digitizer/de-digitizer 228 running on the processor may also download the digitized encryption stream 238 from the second clipboard 240 using the download clipboard 242 and de-digitize the digitized encryption stream 238 to produce the encrypted stream 210. The digitizer/de-digitizer 228 may then provide the encrypted stream 210 to the encryption engine.
The digitizer/de-digitizer 228 de-digitizes the digitized encryption stream 238 according to a mode 232 such as no de-digitization, Base 64, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
The encryption box device 200 may be a dongle that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 200 may be a USB device that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, or a set-top box.
The encryption box device 200 may include wireless communication such as Wi-Fi or Bluetooth.
The encryption box device 200 may be a Mobile Phone, an isdn phone, Skype, Viber, Whatsapp, a smart TV, an Intelligent Network Drive, central storage, a smart phone, a display screen, a telephone exchange, a tablet, a computer, a radio, or the cloud.
The encryption box device 200 may include proprietary wireless communication and a plurality of wireless adapters that can be plugged into a computer such as a personal computer, a laptop, a smart phone, a tablet, a smart TV, an intelligent network drive, a central storage, and a set-top box. Use of the encryption box device 200 may be limited to a user of one of the wireless adapters.
The encryption box device 200 may be simulated by a hardware emulator, such as an emulator running on a computer.
The second synchronized cipher stream is generated. A controllable plaintext 202 that matches the controllable plaintext 102 shown in
In
The encryption-box will contain the Encryption Engine with Digitizer/De-digitizer and Clipboard described above.
The single encryption box dongle and USB device 310 can be plugged into a PC 302, a Laptop 308, or a Smart Phone and/or Tablet 304 and 306 and provide direct encryption/decryption for one user.
In
In
A Wireless USB Adapter 510 contains the wireless transmission corresponding to the wireless encryption hub 512, and allows multiple people to use the wireless encryption hub 512 at the same time. The Wireless USB Adapter 510 contains Wireless Proprietary Modules corresponding to the Encryption-Hub 512.
Users can buy one Wireless Encryption-Hub 512 and multiple Wireless Adapters 510. Each adapter 510 can be plugged into a PC 502, a Laptop 508, or a Smart Phone and/or Tablet 504 and 506 directly. Only the adapter 510 users can use encryption/decryption provided by the wireless encryption-hub 512.
In
In one embodiment, ppExcel, which integrates Microsoft Excel and the encryption box 610, is fully embedded inside MS Excel to provide encryption/decryption on MS Excel cells regardless of cells' type.
It is well known that the complications of cells format of MS Excel such as number cells, text cells, and formula cells forming a major difficulty for any encryption engine to provide security encryption successfully. These different cell types are not compatible each other, but are inter-related. When changing one type of cells such as formula cells with encryption, all other dependent cells such as number cells will changed to difficult status immediately. For this reason, it is believed that no traditional encryption engine can provide encryption successfully on Excel cells regardless of its types. With a digitizer and clipboard module, the encryption box 610 can provide a solution to this problem.
Once the encryption box 610 is plugged into a device such as a PC 602, the encryption box 610 will install a clickable tag 702 called “ppExcel30”, as shown in
The functional buttons 704 provided by ppExcel can be used for encryption and decryption on selected cells, entire sheet, and the whole workbook of Excel regardless of the cell types. It is believed that ppExcel is the first encrypter to provide cells encryption for MS Excel successfully in this style.
The following process describes the basic encryption of ppExcel on MS Excel cells:
1. Highlight the selected original cells in Excel that you want to encrypt,
2. Press the “Enc/Dec Selected Cells” button,
3. ppExcel will copy all selected cells and send them to the Encryption-Box one-by-one,
4. After the encryption by the Encryption-Box, the cell contents will be sent to clipboard,
5. ppExcel will then paste the encrypted cell contents on clipboard back to its former cell location.
The following process describes the basic decryption of ppExcel on MS Excel cells with respect to
1. Highlight the selected encrypted cells in MS Excel that you want to decrypt,
2. Press the “Enc/Dec Selected Cells” button,
3. ppExcel will copy all selected encrypted cells and send them to the Encryption-Box one-by-one. Since they are ppExcel encrypted (in Digitized Cipher text Stream format), Encryption-Box will perform decryption automatically,
4. After the decryption by the Encryption-Box, the original cell will be sent to clipboard,
5. ppExcel will then paste the cell on clipboard back to its former cell location.
A process of encrypting the MS Excel cells with ppExcel is shown in
1. First mark (or highlight) the cells that you want to encrypt 802 from MS Excel,
2. Click the “Enc/Dec Selected Cells” button 904,
3. The selected original cells of MS Excel 802 will be replaced by the encrypted cells 902.
By using the similar construction, the following associated prototypes are also established:
1. ppOutlook, which integrates MS Outlook and the Encryption-Box.
2. ppWord, which integrates MS Word and the Encryption-Box.
3. ppPowerPoint, which integrates MS PowerPoint and the Encryption-Box.
In another embodiment, shown in
Due to the complications of all different programs in different platforms (or operating systems) that produce texts, it is not easy for traditional encryption engines to construct a universal encrypter that can encrypt/decrypt texts for all of them. With the digitizer and clipboard modules, the encryption-box 1004 establishes a universal encrypter called PPM (Professional Protection for Messages) to encrypt/decrypt any text from any other programs.
Once the encryption box 1004 is plugged into a machine 1002, as shown in
The buttons provided by PPM can be used for encryption and decryption on any text from any program. When you type a piece of text into the Original Message window, it will be encrypted automatically and the encrypted message will appear in the Encrypted Message window.
Among the buttons may be:
Msg Copy—Copy the text in the Original Message window onto the Clipboard,
Msg Paste—Download the text from the Clipboard into the Original Message window. (Auto-Encrypt) This will trigger auto-encryption and decryption results appear in the Encrypted Message window (digitizing mode=3 is used),
Enc Copy—Copy the encrypted text from the Encrypted Message window onto the Clipboard
Enc Paste—Download the encrypted text from the Clipboard into the EncryptedMessage window. The encrypted text will be decrypted automatically and appear in the Original Message window. This may also be referred to as Auto-Decrypt.
The encryption process of PPM will be described with respect to
1. Hightlight and press the Control-C key on selected text 1202 such as “This is my secret” from any text related program (This will send the selected text to Clipboard)
2. Press the “Msg Paste” button of PPM
(The PPM will copy the text from the Clipboard and paste to the Original Message window)
3. The text in the Original Message window 1302 will be encrypted automatically and immediately
4. The encrypted text will appear in the Encrypted Message window 1304 as
“f3 0e c2 ab e2 ef 71 4a e1 70 67 81 53 95 28 02 12 e1 5a cf 5a 3b 27 cf 73 90 93 68 df 3a 74 f5 5c f4 ff c2 6c 14 dc fd”
paired hexadecimal numbers with space (or digitizing mode=3).
The decryption of PPM will be described with respect to
1. Hightlight and press the Control-C key on any PPM encrypted text 1402, this will send the selected text to the clipboard,
2. Press the “Enc Paste” button of PPM, the PPM will paste text from Clipboard to the Encrypted Message window 1504,
3. The text in the Encrypted Message window 1504 will also be decrypted automatically,
4. The decrypted text will appear in the Original Message window 1502.
Sending an Encrypted Message to a Live Chat Program called LINE will be described with respect to
Suppose you want to perform secure live chatting with someone called “Buckingham” using a popular chat software called LINE installed on a machine. The machine also has an Encryption-Box attached. The secure live chat can be performed by the following procedures:
1. Suppose you have the PPM and the popular chat software LINE on your machine.
2. Type a message in the Original Message window 1602 such as “Meet Me At 2 pm Tomorrow” on PPM.
3. While you are typing message in the Original Message window 1602, the corresponding encrypted message
“1b 67 f2 de 0a 86 41 3f 52 9b c6 8f 2a 70 6c 0b 6c b0 ac d1 35 65 01 8d 1e
65 d0 6b 31 50 d6 87 41 f6 22 70 cb 3e 1f fb”
will appear on the Encrypted Message window 1604 at the same time.
4. Press the “Enc Copy” button to send the encrypted message onto the Clipboard.
5. Paste the encrypted message on the Clipboard onto the typing area 1702 of LINE and press the return key to send the encrypted message to the chat area of LINE.
6. You will see the encrypted message appear in the chat area of LINE.
Decrypting an encrypted message from a live chat program called line will be described with respect to
Suppose you have received a PPM encrypted message
“ff ad d6 f5 ee 4c 65 14 1d 73 0b b9 e5 db 9f 27 bf 4b 11 a1 33 39 20 ab 34 18 72
63 a2 d0 d0 b3 ef c2 e3 fa fb 7b e9 81”
from LINE. The following procedure can be used to decrypt it:
1. Highlight the encrypted message from the chat area 1802 of LINE.
2. Press the Control-C key to send the encrypted message to the Clipboard.
3. Press the “Enc Paste” button from PPM.
4. The encrypted message will be copied from the Clipboard to the Encrypted Message window 1904 of PPM. Also the encrypted message will be decrypted by PPM automatically at the same time.
5. The decryption results such as
“OK. At the spot-772 as usual”
will be displayed in the Original Message window 1902 of PPM. You can read the original message and do whatever you like.
In a third embodiment, shown in
In a fourth embodiment, shown in
The application may be a spreadsheet, a text window, an email, a word processor, a chat room, or a presentation.
The method of secure encryption may further include a seventh operation of digitizing the encrypted stream according to a mode such as no digitization, Base 64 digitization, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
The method of secure encryption may further include an eighth operation of downloading the digitized encryption stream from the second clipboard. The method of secure encryption may further include a ninth operation of de-digitizing the digitized encryption stream to produce the encrypted stream and providing the encrypted stream to the encryption engine. The method of secure encryption may further include a 10th operation of decrypting the encrypted stream to produce the plaintext stream and uploading the plaintext stream to the first clipboard.
The method of secure encryption may further include an 11th operation of de-digitizing the digitized encryption stream according to a mode such as no de-digitization, Base 64, hexadecimal numbers without spacing, paired hexadecimal numbers with spacing, a user-defined mode, or save as a file (flag).
The method of secure encryption may further include a 12th operation of simulating the encryption box device using a hardware emulator.
The embodiments can be implemented in computing hardware (computing apparatus) and/or software, such as (in a non-limiting example) any computer that can store, retrieve, process and/or output data and/or communicate with other computers. The results produced can be displayed on a display of the computing hardware. A program/software implementing the embodiments may be recorded on computer-readable media comprising computer-readable recording media. The program/software implementing the embodiments may also be transmitted over transmission communication media. Examples of the computer-readable recording media include a magnetic recording apparatus, an optical disk, a magneto-optical disk, and/or a semiconductor memory (for example, RAM, ROM, etc.). Examples of the magnetic recording apparatus include a hard disk device (HDD), a flexible disk (FD), and a magnetic tape (MT). Examples of the optical disk include a DVD (Digital Versatile Disc), a DVD-RAM, RAM, a CD-ROM (Compact Disc-Read Only Memory), and a CD-R (Recordable)/RW. An example of communication media includes a carrier-wave signal.
Further, according to an aspect of the embodiments, any combinations of the described features, functions and/or operations can be provided.
The many features and advantages of the embodiments are apparent from the detailed specification and, thus, it is intended by the appended claims to cover all such features and advantages of the embodiments that fall within the true spirit and scope thereof. Further, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the inventive embodiments to the exact construction and operation illustrated and described, and accordingly all suitable modifications and equivalents may be resorted to, falling within the scope thereof.
The foregoing has described the principles, embodiments, and modes of operation of the present invention. However, the invention should not be construed as being limited to the particular embodiments described above, as they should be regarded as being illustrative and not restrictive. It should be appreciated that variations may be made in those embodiments by those skilled in the art without departing from the scope of the present invention.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2016/001215 | 7/29/2016 | WO |
Publishing Document | Publishing Date | Country | Kind |
---|---|---|---|
WO2018/020286 | 2/1/2018 | WO | A |
Number | Name | Date | Kind |
---|---|---|---|
5799090 | Angert | Aug 1998 | A |
5905505 | Lesk | May 1999 | A |
5943421 | Grabon | Aug 1999 | A |
5964844 | Rosenthal | Oct 1999 | A |
6023506 | Ote | Feb 2000 | A |
6178243 | Pomerantz | Jan 2001 | B1 |
6373947 | Pomerantz | Apr 2002 | B1 |
6820198 | Ross | Nov 2004 | B1 |
6971021 | Daspit | Nov 2005 | B1 |
7242766 | Lyle | Jul 2007 | B1 |
7950066 | Zuili | May 2011 | B1 |
8166132 | Mooneyham | Apr 2012 | B1 |
8171540 | Pulfer | May 2012 | B2 |
8245314 | Liu | Aug 2012 | B2 |
8345876 | Sinn | Jan 2013 | B1 |
8347398 | Weber | Jan 2013 | B1 |
8364985 | Subramanian | Jan 2013 | B1 |
8396208 | Holtzman | Mar 2013 | B2 |
8448260 | Hansen | May 2013 | B1 |
8938067 | Martin et al. | Jan 2015 | B2 |
8990589 | Kazarkin | Mar 2015 | B1 |
9098713 | Lee | Aug 2015 | B2 |
9147050 | Park | Sep 2015 | B2 |
9460293 | Kashyap | Oct 2016 | B1 |
9584325 | Brandwine | Feb 2017 | B1 |
11451864 | Mittal | Sep 2022 | B2 |
20030161467 | Ming et al. | Aug 2003 | A1 |
20040123112 | Himmel | Jun 2004 | A1 |
20050086501 | Woo | Apr 2005 | A1 |
20050097340 | Pedlow | May 2005 | A1 |
20060117178 | Miyamoto | Jun 2006 | A1 |
20060227967 | Nishikawa | Oct 2006 | A1 |
20060294377 | Ho | Dec 2006 | A1 |
20070011749 | Allison | Jan 2007 | A1 |
20070039042 | Apelbaum | Feb 2007 | A1 |
20070061747 | Hahn | Mar 2007 | A1 |
20070152058 | Yeakley | Jul 2007 | A1 |
20080086646 | Pizano | Apr 2008 | A1 |
20080112559 | Dyne | May 2008 | A1 |
20080134237 | Tu | Jun 2008 | A1 |
20080162527 | Pizano | Jul 2008 | A1 |
20100020972 | Baugher | Jan 2010 | A1 |
20110038552 | Lam | Feb 2011 | A1 |
20110202762 | Hadad | Aug 2011 | A1 |
20110211698 | Li | Sep 2011 | A1 |
20110271178 | Feuerbacher | Nov 2011 | A1 |
20120076299 | Koemmerling | Mar 2012 | A1 |
20120226913 | Park | Sep 2012 | A1 |
20120260100 | Applegate | Oct 2012 | A1 |
20130010955 | Lu | Jan 2013 | A1 |
20130013913 | Ge | Jan 2013 | A1 |
20130080574 | Prince | Mar 2013 | A1 |
20130086393 | Pogmore | Apr 2013 | A1 |
20130151864 | Lee | Jun 2013 | A1 |
20130236015 | Li | Sep 2013 | A1 |
20130239192 | Linga | Sep 2013 | A1 |
20140164776 | Hook | Jun 2014 | A1 |
20150026455 | Enderwick | Jan 2015 | A1 |
20150095643 | Adams | Apr 2015 | A1 |
20160037215 | Cardona | Feb 2016 | A1 |
20160072776 | Yip | Mar 2016 | A1 |
20160156467 | Seo | Jun 2016 | A1 |
20160204940 | Zachey | Jul 2016 | A1 |
20160260098 | Landrock | Sep 2016 | A1 |
20160294785 | Lim | Oct 2016 | A1 |
20160306964 | Austin | Oct 2016 | A1 |
20160314720 | Kim | Oct 2016 | A1 |
20160360402 | Park | Dec 2016 | A1 |
20160364397 | Lindner | Dec 2016 | A1 |
20160380768 | Koike | Dec 2016 | A1 |
20170004316 | Walton | Jan 2017 | A1 |
20170046532 | Miller | Feb 2017 | A1 |
20170161599 | Li | Jun 2017 | A1 |
20170286698 | Shetty | Oct 2017 | A1 |
20170366576 | Donahue | Dec 2017 | A1 |
20180012032 | Radich | Jan 2018 | A1 |
20180285583 | Dogu | Oct 2018 | A1 |
20180331824 | Racz | Nov 2018 | A1 |
20180335998 | Callaghan | Nov 2018 | A1 |
20190147169 | Adams | May 2019 | A1 |
20200007548 | Sanghavi | Jan 2020 | A1 |
20200014714 | Mortensen | Jan 2020 | A1 |
20210234939 | Vedula | Jul 2021 | A1 |
Number | Date | Country |
---|---|---|
2608100 | Jun 2013 | EP |
2002-9759 | Jan 2002 | JP |
2003-318878 | Nov 2003 | JP |
2013-539109 | Oct 2013 | JP |
2015-125652 | Jul 2015 | JP |
2016-105251 | Jun 2016 | JP |
2585988 | Jun 2016 | RU |
WO-2007074431 | Jul 2007 | WO |
Entry |
---|
International Search Report for PCT/IB2016/001215 dated Mar. 31, 2017. |
C. Ian et al.; “Flaxor: A Symmetric-Key Block Cipher Plug-In using USB Mass Storage Device for Extracted Block Storage”; School of Information Technology; Jupiter: 1st ITE Research Colloquim, Mar. 28, 2008; XP55357760, http://flaxor.ianuy.com/Flaxor-ExtendedAbstract-10Pages.pdf; retrieved on Mar. 22, 2017; 10 pages. |
PCT/IB2016/001215, Jul. 29, 2016, Pak Kay Yuen, Permanent Privacy Ltd. |
Written Opinion of the International Search Authority (PCT Rule 43bis.1); for International Application No. PCT/IB2016/001215 dated Mar. 31, 2017. |
Written Opinion of the International Search Authority (PCT Rule 66); for International Application No. PCT/IB2016/001215 dated Jun. 14, 2018. |
Notice of Reasons for Refusal, dated Mar. 31, 2020, in corresponding Japanese Application No. 2019-504940 (15 pp.). |
European Office Action dated Nov. 29, 2019 in corresponding European Application No. 16774544.7; 6 pages. |
Office Action, dated Jun. 30, 2020, in corresponding African Regional Patent Application No. AP/P/2018/011227. |
Office Action dated Jul. 3, 2019 in corresponding Pakistani Application No. 411/2017; 3 pages. |
Examination Report, dated Jul. 30, 2020, in corresponding Pakistani Application No. 411/2017 (2 pp.). |
Pakistani Office Action dated Feb. 4, 2020 in corresponding Pakistani Application No. 411/2017; 3 pages. |
Decision of Refusal, dated Nov. 4, 2020, in corresponding Japanese Application No. 2019-504940 (9 pp.). |
Office Action, dated Mar. 30, 2020, in corresponding Eurasian Application No. 201990412/31 (4 pp.). |
Office Action, dated Jul. 21, 2021, in corresponding Eurasian Patent Application No. 201990412/31 (8 pp.). |
Chinese Office Action, dated Jun. 28, 2021, in corresponding Chinese Application No. 201680087984.9 (24 pp.). |
Office Action, dated Jun. 9, 2021, in corresponding ARIPO Patent Application No. AP/P/2018/011227 (4 pp.). |
Office Action, dated Nov. 27, 2020, in corresponding Eurasian Patent Application No. 201990412/31 (4 pp.). |
Patent Examination Report, dated Nov. 12, 2019, in corresponding Iraqi Application No. 2017405 (2 pp.). |
PCT International Preliminary Report on Patentability (IPRP), PCT/IPEA/409, dated Aug. 27, 2018 (6 pp.). |
First Examination Report, dated Mar. 6, 2019, in corresponding Pakistani Application No. 411/2017 (3 pp.). |
Summons to Attend Oral Proceedings Pursuant to Rule 115(1) EPC, dated May 21, 2021, in corresponding European Patent Application No. 16774544.7 (10 pp.). |
Examination Report, dated May 22, 2021, in corresponding Indian Patent Application No. 201917001072 (7 pp.). |
Office Action, dated Oct. 29, 2021, in corresponding Pakistan Patent Application No. 411/2017 (5 pp.). |
Office Action, dated Dec. 30, 2021, in corresponding Iraq Patent Application No. 2017405 (2 pp.). |
PC World, Aug. 9, 2002 <URL: https://www.osp.ru/pcworld/2002/08/163808>, including English computer translation (11 pages). |
Office Action, dated Apr. 27, 2022, in corresponding Eurasian Patent Application No. 201990412/31 (4 pp.). |
Office Action, dated Feb. 7, 2022, in corresponding 2nd Chinese Patent Application No. 201680087984.9 (15 pp.) including English translation (10 pp.). |
Hongyan Yang, “iPhone & iPad Enterprise Mobile Application Development Tips”, Maritime Press, Dec. 31, 2013, pp. 138-141. |
Office Action, dated Feb. 1, 2022, in corresponding ARIPO Patent Application No. AP/P/2018/011227 (4 pp.). |
Number | Date | Country | |
---|---|---|---|
20190165929 A1 | May 2019 | US |