Patents Assigned to Eclypses, Inc.
-
Patent number: 11979498Abstract: According to one example, a system includes a second computing device that has one or more processors configured to receive encrypted data from a first computing device, the encrypted data being encrypted based on a first encryption key. The one or more processors are further configured to generate a second encryption key that matches the first encryption key, decrypt the encrypted data using the second encryption key, and transmit the data for use.Type: GrantFiled: August 1, 2022Date of Patent: May 7, 2024Assignee: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader
-
Patent number: 11770370Abstract: According to one example, a system includes a first computing device that includes one or more processors configured to generate a first encryption key, and encrypt data, using the first encryption key, for transmittal to a second computing device. The one or more processors are further configured to determine a first set of tokens; determine, from the first set of tokens, a plurality of tokens for the first encryption key; generate a packet comprising the encrypted data, and further comprising the plurality of tokens; and transmit the packet for receipt by the second computing device.Type: GrantFiled: May 9, 2022Date of Patent: September 26, 2023Assignee: Eclypses, Inc.Inventor: Timothy W. Reynolds
-
Patent number: 11720693Abstract: According to one example, a system includes a first computing device that determines data for transmittal to a second computing device, and determines transmittal mapping data. The first computing device also breaks the data into one or more portions, and, for each of the one or more portions of the data, the first computing device replaces the respective portion of the data with a transmittal token included in the transmittal mapping data. The first computing device also transmits the transmittal tokens for receipt by the second computing device.Type: GrantFiled: March 5, 2021Date of Patent: August 8, 2023Assignee: ECLYPSES, INC.Inventors: Aron J. Seader, Robert E. Nelson
-
Patent number: 11522707Abstract: According to one example, a system includes a first computing device that performs one or more tests that indicate whether the first computing device is compromised. In response to a determination that the first computing device passed the one or more tests, the first computing device manipulates an authentication code to generate a first seed value. In response to a determination that the first computing device failed the one or more tests, the first computing device manipulates the authentication code to generate a second seed value. The first computing device also determine data for transmittal to a second computing device, modifies the data using the first seed value or the second seed value, and transmits the modified data for receipt by the second computing device.Type: GrantFiled: March 5, 2021Date of Patent: December 6, 2022Assignee: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader
-
Publication number: 20220368526Abstract: According to one example, a system includes a second computing device that has one or more processors configured to receive encrypted data from a first computing device, the encrypted data being encrypted based on a first encryption key. The one or more processors are further configured to generate a second encryption key that matches the first encryption key, decrypt the encrypted data using the second encryption key, and transmit the data for use.Type: ApplicationFiled: August 1, 2022Publication date: November 17, 2022Applicant: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader
-
Publication number: 20220286288Abstract: According to one example, a system includes a first computing device that performs one or more tests that indicate whether the first computing device is compromised. In response to a determination that the first computing device passed the one or more tests, the first computing device manipulates an authentication code to generate a first seed value. In response to a determination that the first computing device failed the one or more tests, the first computing device manipulates the authentication code to generate a second seed value. The first computing device also determine data for transmittal to a second computing device, modifies the data using the first seed value or the second seed value, and transmits the modified data for receipt by the second computing device.Type: ApplicationFiled: March 5, 2021Publication date: September 8, 2022Applicant: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader
-
Publication number: 20220284113Abstract: According to one example, a system includes a second computing device that receives encrypted data from a first computing device. The encrypted data is encrypted based on a first encryption key. Also, the data is obfuscated prior to encryption. The second computing device generates a second encryption key that matches the first encryption key, decrypts the encrypted data using the second encryption key, un-obfuscates the data, and transmits the data for use.Type: ApplicationFiled: January 24, 2022Publication date: September 8, 2022Applicant: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader
-
Publication number: 20220284112Abstract: According to one example, a system includes a first computing device that determines data for transmittal to a second computing device, and determines transmittal mapping data. The first computing device also breaks the data into one or more portions, and, for each of the one or more portions of the data, the first computing device replaces the respective portion of the data with a transmittal token included in the transmittal mapping data. The first computing device also transmits the transmittal tokens for receipt by the second computing device.Type: ApplicationFiled: March 5, 2021Publication date: September 8, 2022Applicant: Eclypses, Inc.Inventors: Aron J. Seader, Robert E. Nelson
-
Patent number: 11405203Abstract: According to one example, a system includes a second computing device that has one or more processors configured to receive encrypted data from a first computing device, the encrypted data being encrypted based on a first encryption key. The one or more processors are further configured to generate a second encryption key that matches the first encryption key, decrypt the encrypted data using the second encryption key, and transmit the data for use.Type: GrantFiled: February 17, 2020Date of Patent: August 2, 2022Assignee: ECLYPSES, INC.Inventors: Robert E. Nelson, Aron J. Seader
-
Patent number: 11329963Abstract: According to one example, a system includes a first computing device that includes one or more processors configured to generate a first encryption key, and encrypt data, using the first encryption key, for transmittal to a second computing device. The one or more processors are further configured to determine a first set of tokens; determine, from the first set of tokens, a plurality of tokens for the first encryption key; generate a packet comprising the encrypted data, and further comprising the plurality of tokens; and transmit the packet for receipt by the second computing device.Type: GrantFiled: August 14, 2019Date of Patent: May 10, 2022Assignee: Eclypses, Inc.Inventor: Timothy W. Reynolds
-
Publication number: 20210258158Abstract: According to one example, a system includes a second computing device that has one or more processors configured to receive encrypted data from a first computing device, the encrypted data being encrypted based on a first encryption key. The one or more processors are further configured to generate a second encryption key that matches the first encryption key, decrypt the encrypted data using the second encryption key, and transmit the data for use.Type: ApplicationFiled: February 17, 2020Publication date: August 19, 2021Applicant: Eclypses, Inc.Inventors: Robert E. Nelson, Aron J. Seader