Home

Security and Secure payment solutions

2014-09 Partial Data Encryption

The encryption method described in this invention is a very fast and a considerably efficient way of protecting information when compared with current prior art methods, because only the essential information is encrypted. For example, when images or video are coded with the progressive Gurulogic Multi-Variate Codec (GMVC®), then only 1/1000 of the entire data size of the data stream is protected with encryption . We can therefore claim that using encryption in the invented way has hardly any effect at all in transfer rate of real time video, nor does it increase the consumption of CPU computing resources in any significant manner. The encryption method described in this invention makes it possible to use a very fast, yet efficient encryption algorithm. Moreover, the additional advantage given by this invented method is that one does not necessarily have to protect one’s data in data transfer networks with a protected, secure network connection such as VPN tunneling, SSH (Secure Shell) or SSL/TLS (HTTPS) protocols. Therefore, this invented method offers a novel model for transmitting text, binary, audio, image, and video information for example in public internet networks or in web services and cloud services.

Applications:

WO 2016/041641 A1 (Positive IPRP)

WO Applications:

JP 513156386

Granted Patents:

2014-08 Integration of encoding and encryption

The encryption methods described in this invention can be integrated into an encoder or into another, corresponding pre-processor. Therefore, this invention makes it possible to gain considerable protection improvement as compared with protection implemented with prior art methods using corresponding encryption algorithms. The invented technology can be integrated with almost any coding solution, not depending on which encryption algorithm is used. That is, in practice, even the currently used implementations can be refactored to work more efficiently if the methods of this invention are used. The integration of encryption and encoding also offers an efficient model for multiprocessing, or running several processes in parallel manner, because this invented technology enables the implementation of optimal processing structure for the CPU and the GPU, according to the available computing capacity. However, the methods described in this invention do not alter the behavior of the integrated encryption algorithm, which means that the protection will not be compromised. The invented methods can be implemented in connection with common, well-known open source or proprietary data compression software applications such as 7-Zip or Win-Zip, etc. The invented technology can be efficiently utilized especially in medical or military purposes, to strengthen the prior art data compression and data processing algorithms in use, the purpose of which is to protect vital information that is confidential or classified. Furthermore, current known technology offers a lot of different options from which it is extremely difficult to select a solution that fits the need, whereas the invented technology offers integration with the best and the most reliable solution, as compared with the not-integrated options. For example, the Gurulogic Multi-Variate Codec (GMVC®) used for data compression enables the use of all the invented modes of operation. The encryption method described in this invention makes it possible to use a very fast, yet efficient encryption algorithm. Moreover, the additional advantage given by this invented method is that one does not necessarily have to protect one’s data in data transfer networks with a protected, secure network connection such as VPN tunneling, SSH (Secure Shell) or SSL/TLS (HTTPS) protocols. Therefore, this invented method offers a novel model for transmitting text, binary, audio, image, and video information for example in public internet networks or in web services and cloud services.

Applications:

WO 2016/020068 A1 (Positive IPRP)

WO Applications:

WO Allowed Applications:

RU 201705340

WO Granted Patents:

Granted Patents:

2014-12 Secure Media Player

The invention provides an integrated secure media player system that does not store or allow others to store critical sections of data in an unencrypted form. This is achieved by integrating encryption into an encoder, and by integrating decryption into a decoder, wherein rendering of media content information is also integrated into the decoder. As a result, the critical sections of data are not required to be stored (or transferred between different components) in an unencrypted form, which prevents unauthorized copying of the data.

Applications:

WO Applications:

EP 3231182
US 15/532336

2015-04 Encryption system, encryption key wallet and method

This invention provides an encryption system that is operable to produce and process encryption keys more efficiently than known conventional encryption systems. The encryption key wallet enables creating a truly reliable information system, improving data security. Gurulogig (R) Encryption Key Wallets are designed to be used between two communicating parties, but if required, can be used between more than two communicating parties. The encryption system provided by this invention is highly desirable for situations wherein data of a confidential or sensitive nature is to be exchanged securely between parties to the encryption system.

Applications:

WO Applications:

EP 16719776.3
US 15/569,747

Applications:

Allowed Applications:

Applications:

GB 1615738.0 2016-09
PCT EP2017/025257

Applications:

GB 1620553.6

WO Applications:

PCT EP2017/025349

Applications:

GB 1621795.2

2017-04 Auto-response triggered user registration

A very effective prevention and filtering of unsolicited electronic messages is facilitated by sending auto-response messages to unregistered senders, and enabling the unregistered senders to initiate a registration process in an easy and quick manner, while enabling service providers to register the senders as new users in the same registration process.

Applications:

GB 1705728.2

Data Transfer Method

Secure way of communicating data from a source device to a destination device, when either or both of them have no direct access or have only restricted access to any data communication network.

Applications:

GB 1712601.2