Home

Security and Secure payment solutions

2014-09 Partial Data Encryption

The encryption method described in this invention is a very fast and a considerably efficient way of protecting information when compared with current prior art methods, because only the essential information is encrypted. For example, when images or video are coded with the progressive Gurulogic Multi-Variate Codec (GMVC®), then only 1/1000 of the entire data size of the data stream is protected with encryption . We can therefore claim that using encryption in the invented way has hardly any effect at all in transfer rate of real time video, nor does it increase the consumption of CPU computing resources in any significant manner. The encryption method described in this invention makes it possible to use a very fast, yet efficient encryption algorithm. Moreover, the additional advantage given by this invented method is that one does not necessarily have to protect one’s data in data transfer networks with a protected, secure network connection such as VPN tunneling, SSH (Secure Shell) or SSL/TLS (HTTPS) protocols. Therefore, this invented method offers a novel model for transmitting text, binary, audio, image, and video information for example in public internet networks or in web services and cloud services.

Applications:

WO 2016/041641 A1 (Positive IPRP)

WO Applications:

Allowed Applications:

EP 3195519 Intent to Grant

Granted Patents:

2014-08 Integration of encoding and encryption

The encryption methods described in this invention can be integrated into an encoder or into another, corresponding pre-processor. Therefore, this invention makes it possible to gain considerable protection improvement as compared with protection implemented with prior art methods using corresponding encryption algorithms. The invented technology can be integrated with almost any coding solution, not depending on which encryption algorithm is used. That is, in practice, even the currently used implementations can be refactored to work more efficiently if the methods of this invention are used. The integration of encryption and encoding also offers an efficient model for multiprocessing, or running several processes in parallel manner, because this invented technology enables the implementation of optimal processing structure for the CPU and the GPU, according to the available computing capacity. However, the methods described in this invention do not alter the behavior of the integrated encryption algorithm, which means that the protection will not be compromised. The invented methods can be implemented in connection with common, well-known open source or proprietary data compression software applications such as 7-Zip or Win-Zip, etc. The invented technology can be efficiently utilized especially in medical or military purposes, to strengthen the prior art data compression and data processing algorithms in use, the purpose of which is to protect vital information that is confidential or classified. Furthermore, current known technology offers a lot of different options from which it is extremely difficult to select a solution that fits the need, whereas the invented technology offers integration with the best and the most reliable solution, as compared with the not-integrated options. For example, the Gurulogic Multi-Variate Codec (GMVC®) used for data compression enables the use of all the invented modes of operation. The encryption method described in this invention makes it possible to use a very fast, yet efficient encryption algorithm. Moreover, the additional advantage given by this invented method is that one does not necessarily have to protect one’s data in data transfer networks with a protected, secure network connection such as VPN tunneling, SSH (Secure Shell) or SSL/TLS (HTTPS) protocols. Therefore, this invented method offers a novel model for transmitting text, binary, audio, image, and video information for example in public internet networks or in web services and cloud services.

Applications:

WO 2016/020068 A1 (Positive IPRP)

WO Granted Patents:

RU 2638639
EP 3178190 Decision of Grant

Granted Patents:

2014-12 Secure Media Player

The invention provides an integrated secure media player system that does not store or allow others to store critical sections of data in an unencrypted form. This is achieved by integrating encryption into an encoder, and by integrating decryption into a decoder, wherein rendering of media content information is also integrated into the decoder. As a result, the critical sections of data are not required to be stored (or transferred between different components) in an unencrypted form, which prevents unauthorized copying of the data.

2015-04 Encryption system, encryption key wallet and method

This invention provides an encryption system that is operable to produce and process encryption keys more efficiently than known conventional encryption systems. The encryption key wallet enables creating a truly reliable information system, improving data security. Gurulogig (R) Encryption Key Wallets are designed to be used between two communicating parties, but if required, can be used between more than two communicating parties. The encryption system provided by this invention is highly desirable for situations wherein data of a confidential or sensitive nature is to be exchanged securely between parties to the encryption system.

Applications:

Allowed Applications:

WO Applications:

FI 20175372

2016-09 User Sign-In and Authentication without Passwords

This patented invention provides user-friendly, yet secure solution to sign-in procedures by omitting the need to input a password. Embodiments of the invention are capable of replacing a need to use passwords by employing disposable keys that are usable only once. The parties in communication are provided with identical or mutually compatible copies of at least one digital key code list comprising keys and indices referencing the keys. An authentication message is delivered from one party to another, comprising an index of a key to be used. When data communication is performed between the parties, they are operable to use the derived key, which is beneficially disposed of after use, namely usable between them only once. This results to better security to the data communication system.

Applications:

Allowed Applications:

GB 1620553.6 No objections, waiting for publishing

WO Applications:

Applications:

GB 1621795.2
PCT EP2017/025367

Applications:

GB 1701818.5
PCT EP2018/025032

Data Transfer Method

Secure way of communicating data from a source device to a destination device, when either or both of them have no direct access or have only restricted access to any data communication network.

Applications:

GB 1712601.2
PCT EP2018/070618