СПИСОК патентов США - подгруппа МПК16 H04L9/14
|
|
| № п/п | Номер патента | Название патента | |||
2017 | |||||
| 1 | 9608980 | Environment-aware security tokens | |||
| 2 | 9608968 | Connection architecture for a mobile network | |||
| 3 | 9608825 | Trusted platform module certification and attestation utilizing an anonymous key system | |||
| 4 | 9608816 | Shared data encryption and confidentiality | |||
| 5 | 9608808 | Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof | |||
| 6 | 9608806 | Extending data confidentiality into a player application | |||
| 7 | 9608805 | Encryption key generation | |||
| 8 | 9607159 | Intelligent key selection and generation | |||
| 9 | 9602457 | Mobile device having power save feature for establishing communications | |||
| 10 | 9602279 | Configuring devices for use on a network using a fast packet exchange with authentication | |||
| 11 | 9602274 | Secure password generation | |||
| 12 | 9602273 | Implementing key scheduling for white-box DES implementation | |||
| 13 | 9600656 | System and method for domain password reset in a secured distributed network environment | |||
| 14 | 9600640 | Multimedia network system with content importation, content exportation, and integrated content management | |||
| 15 | 9596436 | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box | |||
| 16 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
| 17 | 9590971 | Environment-aware security tokens | |||
| 18 | 9589268 | Integration of payment capability into secure elements of computers | |||
| 19 | 9588908 | Memory circuit using resistive random access memory arrays in a secure element | |||
| 20 | 9584310 | Protecting a white-box implementation against attacks | |||
| 21 | 9578496 | Method and user equipment for negotiating security during handover between different radio access technologies | |||
| 22 | 9577993 | System and method for authenticating users | |||
| 23 | 9577827 | Information processing device, information processing method, and program | |||
| 24 | 9577824 | Delivering a content item from a server to a device | |||
| 25 | 9572023 | Method and system for providing services to mobile communication subscribers | |||
| 26 | 9571472 | Establishing an initial root of trust for individual components of a distributed security infrastructure | |||
| 27 | 9571289 | Methods and systems for glitch-resistant cryptographic signing | |||
| 28 | 9571280 | Application integrity protection via secure interaction and processing | |||
| 29 | 9571271 | Sending messages by oblivious transfer | |||
| 30 | 9569774 | System and method for processing feedback entries received from software | |||
| 31 | 9565022 | RFID tags with dynamic key replacement | |||
| 32 | 9565020 | System and method for generating a server-assisted strong password from a weak secret | |||
| 33 | 9563753 | Method for booting and dumping a confidential image on a trusted computer system | |||
| 34 | 9560474 | Device for transfering data between an unconscious capture device and another device | |||
| 35 | 9559846 | Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems | |||
| 36 | 9559845 | Systems, methods and apparatuses for the secure transmission of media content | |||
| 37 | 9559837 | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |||
| 38 | 9558373 | 3D graphics system using encrypted texture tiles | |||
| 39 | 9558362 | Data encryption using an external arguments encryption algorithm | |||
| 40 | 9554270 | Enhanced security for direct link communications | |||
| 41 | 9548866 | Deletion of content in digital storage systems | |||
| 42 | 9548863 | Method for unambiguous marking of an object | |||
| 43 | 9548861 | Encrypted statistical processing system, device, method, and program | |||
| 44 | 9547860 | System for processing feedback entries received from software | |||
| 45 | 9544151 | Controlling access to clinical data analyzed by remote computing resources | |||
| 46 | 9544142 | Data authentication using plural electronic keys | |||
| 47 | 9536047 | Privacy-enhancing technologies for medical tests using genomic data | |||
| 48 | 9535852 | System and method for secured host-slave communication | |||
2016 | |||||
| 49 | 9532213 | Lawful interception for device-to-device (D2D) communication | |||
| 50 | 9531687 | Techniques for secure message offloading | |||
| 51 | 9531537 | System and method for performing secure communications | |||
| 52 | 9526007 | Location brokering for providing security, privacy and services | |||
| 53 | 9526001 | Device-to-device discovery with direct radio signals | |||
| 54 | 9525668 | Face based secure messaging | |||
| 55 | 9525538 | Apparatus, system and method of communicating non-cellular access network information over a cellular network | |||
| 56 | 9524594 | Mobile access control system and method | |||
| 57 | 9521370 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | |||
| 58 | 9520995 | Efficient prime-number check | |||
| 59 | 9516500 | ID-based control unit-key fob pairing | |||
| 60 | 9515828 | Sharing a secret via linear interpolation | |||
| 61 | 9510216 | Node device and communication control method | |||
| 62 | 9509501 | Storage encryption | |||
| 63 | 9509498 | System and method for transmitting data | |||
| 64 | 9509493 | Information processing technique for secure pattern matching | |||
| 65 | 9503892 | Mapping special subframes in a wireless communication network | |||
| 66 | 9503256 | SMS4 acceleration hardware | |||
| 67 | 9503255 | Cryptographic sequencing system and method | |||
| 68 | 9497174 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
| 69 | 9495588 | Biometric template security and key generation | |||
| 70 | 9495240 | Encrypting data for storage in a dispersed storage network | |||
| 71 | 9491040 | Determination and display of LUN encryption paths | |||
| 72 | 9489519 | Method and apparatus for encrypting data messages after detecting infected VM | |||
| 73 | 9485101 | Provisioning digital certificates in a network environment | |||
| 74 | 9485096 | Encryption / decryption of data with non-persistent, non-shared passkey | |||
| 75 | 9485090 | Managed authentication on a distributed network | |||
| 76 | 9483655 | File backup with selective encryption | |||
| 77 | 9479932 | ID-based control unit-key fob pairing | |||
| 78 | 9479334 | Method, system, and terminal for communication between cluster system encryption terminal and encryption module | |||
| 79 | 9479329 | Motor vehicle control unit having a cryptographic device | |||
| 80 | 9473302 | Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device | |||
| 81 | 9473298 | Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration | |||
| 82 | 9471796 | Intelligent key selection and generation | |||
| 83 | 9467281 | Information processing apparatus and program product | |||
| 84 | 9465952 | Systems and methods for secure multi-tenant data storage | |||
| 85 | 9461823 | System and method for limiting exploitable or potentially exploitable sub-components in software components | |||
| 86 | 9461822 | Image forming apparatus, control method, and storage medium | |||
| 87 | 9455834 | Securely providing secret data from a sender to a receiver | |||
| 88 | 9454673 | Searchable encryption for cloud storage | |||
| 89 | 9450752 | Method and apparatus for providing service provider-controlled communication security | |||
| 90 | 9449183 | Secure file drawer and safe | |||
| 91 | 9449178 | System, method and computer product for fast and secure data searching | |||
| 92 | 9443107 | Method for protecting the integrity of a group of memory elements using an aggregate authentication code | |||
| 93 | 9442865 | Processor extensions for execution of secure embedded containers | |||
| 94 | 9438569 | Secured embedded data encryption systems | |||
| 95 | 9438550 | Mobile device power management in data synchronization over a mobile network with or without a trigger notification | |||
| 96 | 9438423 | Encryption device, encryption method, and information processing device | |||
| 97 | 9438418 | Systems and methods for generating a key difficult to clone | |||
| 98 | 9438416 | Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation | |||
| 99 | 9438413 | Generating and merging keys for grouping and differentiating volumes of files | |||
| 100 | 9436815 | Block management unification system and method | |||
| 101 | 9432182 | Techniques for sharing data | |||
| 102 | 9426131 | Server apparatus and program to re-encrypt ciphertext data | |||
| 103 | 9425964 | Display device with mobile high-definition link port and signal processing method thereof | |||
| 104 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
| 105 | 9425959 | Security variable scrambling | |||
| 106 | 9425957 | System and method for remote reset of password and encryption key | |||
| 107 | 9418246 | Decryption systems and related methods for on-the-fly decryption within integrated circuits | |||
| 108 | 9413529 | Distributed storage network and method for storing and retrieving encryption keys | |||
| 109 | 9412209 | Prevention device for operating vehicle running record | |||
| 110 | 9407440 | Multiple authority data security and access | |||
| 111 | 9407437 | Secure initialization vector generation | |||
| 112 | 9407432 | System and method for efficient and secure distribution of digital content | |||
| 113 | 9407431 | Systems and methods for distributing and securing data | |||
| 114 | 9402270 | Secure device bootstrap identity | |||
| 115 | 9402108 | Receiver software protection | |||
| 116 | 9401919 | Web form protection | |||
| 117 | 9401804 | Leakage resilient garbled circuit generation using reduced memory hardware token | |||
| 118 | 9398321 | Multimedia network system with content importation, content exportation, and integrated content management | |||
| 119 | 9397833 | Receipt, data reduction, and storage of encrypted data | |||
| 120 | 9397832 | Shared data encryption and confidentiality | |||
| 121 | 9397826 | Encryption device and method for defending a physical attack | |||
| 122 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
| 123 | 9392443 | Shared secret for wireless devices | |||
| 124 | 9392077 | Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices | |||
| 125 | 9391963 | Differential client-side encryption of information originating from a client | |||
| 126 | 9391770 | Method of cryption | |||
| 127 | 9386120 | Single sign-on access in an orchestration framework for connected devices | |||
| 128 | 9385997 | Protection of control words employed by conditional access systems | |||
| 129 | 9385866 | System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised | |||
| 130 | 9385865 | Correcting deciphering mis-synchronization in a mobile communication terminal | |||
| 131 | 9374222 | Secure communication of data between devices | |||
| 132 | 9373113 | Payment terminal sharing | |||
| 133 | 9369490 | Method for the secure exchange of data over an ad-hoc network implementing an Xcast broadcasting service and associated node | |||
| 134 | 9369441 | End-to-end secure communication system | |||
| 135 | 9369281 | Method and system for secure use of services by untrusted storage providers | |||
| 136 | 9367702 | Automatic file encryption | |||
| 137 | 9363668 | Sensor network, sensor management server, key updating method and key updating program | |||
| 138 | 9363247 | Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption | |||
| 139 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
| 140 | 9363075 | Polymorphic encryption key matrices | |||
| 141 | 9357463 | Techniques and systems for extended discontinuous reception | |||
| 142 | 9357389 | Security identity discovery and communication method | |||
| 143 | 9356783 | Method for ciphering and deciphering, corresponding electronic device and computer program product | |||
| 144 | 9356782 | Block encryption | |||
| 145 | 9351157 | Methods, systems, and devices to reduce audio truncation during transcoding | |||
| 146 | 9350544 | Apparatus for encrypting data | |||
| 147 | 9349023 | Database encryption system, method, and program | |||
| 148 | 9344393 | Secure end-to-end transport through intermediary nodes | |||
| 149 | 9338004 | Method and system for smart card chip personalization | |||
| 150 | 9336363 | Method and system for secure deployment of information technology (IT) solutions in untrusted environments | |||
| 151 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
| 152 | 9326142 | Cryptographic key generation | |||
| 153 | 9325673 | Communication system and communication method | |||
| 154 | 9325642 | Randomness for encryption operations | |||
| 155 | 9325506 | Cryptographically enforcing strict separation of environments | |||
| 156 | 9323603 | Storage of sensitive data in a dispersed storage network | |||
| 157 | 9313170 | Identity protection and management for electronic communication | |||
| 158 | 9313026 | Key negotiation method and apparatus according to SM2 key exchange protocol | |||
| 159 | 9313023 | Format-preserving cipher | |||
| 160 | 9313022 | Homomorphic cryptography modeling in support of privacy policies | |||
| 161 | 9311487 | Tampering monitoring system, management device, protection control module, and detection module | |||
| 162 | 9311256 | Storage device | |||
| 163 | 9306753 | Mobile system and method for improving safety of impromptu meetings | |||
| 164 | 9306746 | Randomizing current injection circuit to obscure gate noise for added security | |||
| 165 | 9305172 | Multi-ring encryption approach to securing a payload using hardware modules | |||
| 166 | 9301147 | Method, apparatus, and system for data protection on interface in communications system | |||
| 167 | 9301134 | Security key generation for dual connectivity | |||
| 168 | 9294276 | Countering server-based attacks on encrypted content | |||
| 169 | 9286602 | Secure financial transactions | |||
| 170 | 9282074 | Multi-version message condition based delivery | |||
| 171 | 9276913 | Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program | |||
| 172 | 9276754 | Key rotation with external workflows | |||
| 173 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
| 174 | 9270460 | Instructions to perform JH cryptographic hashing in a 256 bit data path | |||
| 175 | 9270452 | Encryption using real-world objects | |||
| 176 | 9270446 | Privacy-enhancing technologies for medical tests using genomic data | |||
| 177 | 9268911 | Field optimized assay devices, methods, and systems | |||
| 178 | 9258281 | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption | |||
| 179 | 9258122 | Systems and methods for securing data at third-party storage services | |||
| 180 | 9247429 | Key derivation | |||
| 181 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
| 182 | 9246675 | Cryptographic systems using pairing with errors | |||
| 183 | 9240885 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
| 184 | 9240883 | Multi-key cryptography for encrypting file system acceleration | |||
| 185 | 9240880 | Distributed data storage device | |||
| 186 | 9232268 | Unified video delivery system for supporting IP video streaming service | |||
2015 | |||||
| 187 | 9226211 | Centralized partitioning of user devices in a heterogeneous wireless network | |||
| 188 | 9225514 | Method for image encryption and decryption incorporating physiological features and image capture device thereof | |||
| 189 | 9219730 | Securing a secret of a user | |||
| 190 | 9219715 | Mediator utilizing electronic content to enforce policies to a resource | |||
| 191 | 9219606 | Method and device for digital data blocks encryption and decryption | |||
| 192 | 9215066 | Method and system for making information in a data set of a copy-on-write file system inaccessible | |||
| 193 | 9210571 | Secure wireless communication | |||
| 194 | 9209974 | Functional encryption key management | |||
| 195 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
| 196 | 9209971 | Method and system for shielding data in untrusted environments | |||
| 197 | 9208357 | FPGA configuration bitstream protection using multiple keys | |||
| 198 | 9203980 | Unit using operating system and image forming apparatus using the same | |||
| 199 | 9203614 | Method, apparatus, and system for protecting cloud data security | |||
| 200 | 9197410 | Key management system | |||
| 201 | 9195848 | Computational systems and methods for anonymized storage of double-encrypted data | |||
| 202 | 9191812 | Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node | |||
| 203 | 9191374 | Routing device data caching | |||
| 204 | 9191206 | Multiple transform utilization and application for secure digital watermarking | |||
| 205 | 9191205 | Multiple transform utilization and application for secure digital watermarking | |||
| 206 | 9189900 | Methods and systems for assigning e-keys to users to access and drive vehicles | |||
| 207 | 9189645 | Sharing content across applications and devices having multiple operation modes in an orchestration framework for connected devices | |||
| 208 | 9185080 | Data transmitting devices, data receiving devices, methods for controlling a data transmitting device, and methods for controlling a data receiving device | |||
| 209 | 9184913 | Authenticating a telecommunication terminal in a telecommunication network | |||
| 210 | 9183357 | Recording/reproducing system, recording medium device, and recording/reproducing device | |||
| 211 | 9172537 | Array encryption core | |||
| 212 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
| 213 | 9166788 | Method and device for obtaining a security key | |||
| 214 | 9166787 | Securing encrypted virtual hard disks | |||
| 215 | 9166713 | System for providing access to operation information | |||
| 216 | 9160527 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
| 217 | 9148419 | User administering a trustworthy workspace | |||
| 218 | 9147195 | Data custodian and curation system | |||
| 219 | 9141769 | Secure transfer and use of secret material in a shared environment | |||
| 220 | 9137015 | Protection scheme for AACS keys | |||
| 221 | 9125050 | Secure near field communication server information handling system lock | |||
| 222 | 9124564 | Context awareness during first negotiation of secure key exchange | |||
| 223 | 9124417 | Computation of garbled tables in garbled circuit | |||
| 224 | 9118467 | Generating keys using secure hardware | |||
| 225 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
| 226 | 9106413 | Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications | |||
| 227 | 9104610 | Method, system and medium for analog encryption in a flash memory | |||
| 228 | 9094379 | Transparent client-side cryptography for network applications | |||
| 229 | 9092780 | User-mediator monitoring and controlling access to electronic content | |||
| 230 | 9088410 | Accessing local applications when roaming using a NFC mobile device | |||
| 231 | 9088409 | Accessing local applications when roaming using a NFC mobile device | |||
| 232 | 9084112 | Secure group key agreement for wireless networks | |||
| 233 | 9069940 | Secure host authentication using symmetric key cryptography | |||
| 234 | 9065639 | Device for generating encryption key, method thereof and computer readable medium | |||
| 235 | 9064135 | Hardware implemented key management system and method | |||
| 236 | 9064127 | Systems and methods for securing data in the cloud | |||
| 237 | 9059840 | Recipient blind cryptographic access control for publicly hosted message and data streams | |||
| 238 | 9058507 | Signal processor with an encrypting or decrypting device in a memory system | |||
| 239 | 9054865 | Cryptographic system and methodology for securing software cryptography | |||
| 240 | 9053340 | Enterprise application store for an orchestration framework for connected devices | |||
| 241 | 9053130 | Binary data store | |||
| 242 | 9042552 | Managing encryption keys in a computer system | |||
| 243 | 9015479 | Host device and method for super-distribution of content protected with a localized content encryption key | |||
| 244 | 9008317 | Key encryption and decryption | |||
| 245 | 8984298 | Managing access to a secure content-part of a PPCD using a key reset point | |||
| 246 | 8984294 | System of authenticating an individual memory device via reading data including prohibited data and readable data | |||
| 247 | 8966287 | Systems and methods for secure third-party data storage | |||
| 248 | 8943316 | Document security system that permits external users to gain access to secured files | |||
| 249 | 8928454 | Computer room security | |||
2014 | |||||
| 250 | 8924709 | Print release with end to end encryption and print tracking | |||
| 251 | 8918651 | Cryptographic erasure of selected encrypted data | |||
| 252 | 8904171 | Secure search and retrieval | |||
| 253 | 8848922 | Distributed encryption key management | |||
| 254 | 8848906 | Encrypting data for storage in a dispersed storage network | |||
| 255 | 8842836 | System for and method of cryptographic provisioning | |||
| 256 | 8837718 | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store | |||
| 257 | 8832445 | System and method for handling secure messages | |||
| 258 | 8804962 | Method and system for establishing enhanced air interface key | |||
| 259 | 8782392 | Privacy-protective data transfer and storage | |||
| 260 | 8745416 | Systems and methods for secure third-party data storage | |||
| 261 | 8731191 | Data encryption method and system and data decryption method | |||
| 262 | 8718280 | Securing keys of a cipher using properties of the cipher process | |||
| 263 | 8712057 | Apparatus and method for an iterative cryptographic block | |||
| 264 | 8687814 | Securing encrypted virtual hard disks | |||
| 265 | 8683189 | On-chip security method and apparatus | |||
| 266 | 8677152 | Method and apparatus for encrypting media programs for later purchase and viewing | |||
| 267 | 8659388 | Variable strength wireless communication system | |||
| 268 | 8645712 | Electronic circuit design copy protection | |||
| 269 | 8638943 | Communication device, communication method, communication system and service issuing method | |||
| 270 | 8638935 | System and method for key space division and sub-key derivation for mixed media digital rights management content | |||
2013 | |||||
| 271 | 8611542 | Peer to peer key synchronization | |||
| 272 | 8584228 | Packet authentication and encryption in virtual networks | |||
| 273 | 8583936 | Key generation using biometric data and secret extraction codes | |||
| 274 | 8582777 | Method and system for lightweight key distribution in a wireless network | |||
| 275 | 8550339 | Utilization of digit sequences for biometric authentication | |||
| 276 | 8516271 | Securing non-volatile memory regions | |||
| 277 | 8487740 | Vehicle function restriction system | |||
| 278 | 8487739 | Television theft deterrence | |||
| 279 | 8464069 | Secure data access methods and apparatus | |||
| 280 | 8464049 | Method and system of accessing copy-prevented encrypted data resources over a network | |||
| 281 | 8458494 | Systems and methods for secure third-party data storage | |||
| 282 | 8456275 | Electric wiring system of a motor vehicle with replaceable cryptographic key and/or certificate | |||
| 283 | 8453258 | Protecting an electronic document by embedding an executable script | |||
| 284 | 8451086 | Remote control signaling using audio watermarks | |||
| 285 | 8379853 | Descrambler | |||
| 286 | 8364964 | Registering client devices with a registration server | |||
| 287 | 8358197 | Mesh network door lock | |||
| 288 | 8342400 | Systems controlled by data bearing records for maintaining inventory data | |||
2012 | |||||
| 289 | 8321677 | Pre-binding and tight binding of an on-line identity to a digital signature | |||
| 290 | 8300824 | System and method for encrypting data using a cipher text in a communications environment | |||
| 291 | 8299891 | Antitheft system for vehicle | |||
| 292 | 8284938 | Techniques for data encryption and decryption | |||
| 293 | 8264320 | Aftermarket keyless starter | |||
| 294 | 8259948 | Virtual TPM key migration using hardware keys | |||
| 295 | 8259946 | Communication apparatus, reader/writer, communication system, and communication method | |||
| 296 | 8250380 | Implementing secure erase for solid state drives | |||
| 297 | 8233617 | Resilient cryptographic scheme | |||
| 298 | 8232861 | Remote controller capable of selectively controlling a plurality of electric appliances, remote control system and method thereof | |||
| 299 | 8230218 | Mobile station authentication in tetra networks | |||
| 300 | 8218771 | Information processing apparatus and computer readable medium | |||
| 301 | 8189772 | Method and apparatus for performing elliptic curve arithmetic | |||
| 302 | 8188837 | Method of finding a key to a mobile vehicle | |||
| 303 | 8180049 | Signature schemes using bilinear mappings | |||
| 304 | 8171564 | Systems and methods for one-to-many secure video encryption | |||
| 305 | 8169297 | Electronic assembly having means to prevent non-permitted disassembling of its components | |||
| 306 | 8144866 | Method and system for securing data utilizing redundant secure key storage | |||
| 307 | 8135135 | Secure data protection during disasters | |||
| 308 | 8127148 | Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith | |||
| 309 | 8125311 | Medical diagnostic imaging system, information processing method for medical diagnostic imaging system, ultrasonic imaging diagnostic apparatus, and operation device | |||
| 310 | 8116455 | System and method for securely initializing and booting a security appliance | |||
| 311 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
| 312 | 8107621 | Encrypted file system mechanisms | |||
| 313 | 8106745 | Remote control signaling using audio watermarks | |||
| 314 | 8106744 | Remote control signaling using audio watermarks | |||
| 315 | 8099771 | Method for issuing IC card storing encryption key information | |||
2011 | |||||
| 316 | 8085126 | Identification with RFID asset locator for entry authorization | |||
| 317 | 8078877 | Fast batch verification method and apparatus there-of | |||
| 318 | 8064606 | Method and apparatus for securely registering hardware and/or software components in a computer system | |||
| 319 | 8059816 | Secret sharing technique with low overhead information content | |||
| 320 | 8050401 | High speed configurable cryptographic architecture | |||
| 321 | 8037301 | Setting an encryption key | |||
| 322 | 8028157 | On-chip security method and apparatus | |||
| 323 | 8006280 | Security system for generating keys from access rules in a decentralized manner and methods therefor | |||
| 324 | 8005213 | Method, apparatus, and computer program for generating session keys for encryption of image data | |||
| 325 | 7986158 | Methods, apparatuses, and products for a secure circuit | |||
| 326 | 7982624 | System and method for accident prevention | |||
| 327 | 7975140 | Key negotiation and management for third party access to a secure communication session | |||
| 328 | 7969285 | Management of badge access to different zones | |||
| 329 | 7965844 | System and method for processing user data in an encryption pipeline | |||
| 330 | 7929694 | Variable length private key generator and method thereof | |||
| 331 | 7921283 | Method for real-time data authentication | |||
| 332 | 7920703 | Descrambler | |||
| 333 | 7917771 | Method for selective encryption within documents | |||
| 334 | 7898384 | System for checking the single crossing of a controlled passage | |||
| 335 | 7889050 | System and method for training a trainable transmitter | |||
| 336 | 7885639 | Method and apparatus for authenticating a wireless access point | |||
| 337 | 7885412 | Pre-generation of generic session keys for use in communicating within communications environments | |||
| 338 | 7882367 | Information recording and reproducing apparatus and method | |||
| 339 | 7880584 | Lockbox key with callback feature | |||
2010 | |||||
| 340 | 7840009 | Method and apparatus for storing and distributing encryption keys | |||
| 341 | 7836313 | Method and apparatus for constructing a storage system from which digital objects can be securely deleted from durable media | |||
| 342 | 7818572 | Security system and method | |||
| 343 | 7813508 | Communication system, wireless communication apparatus, and communication method | |||
| 344 | 7802109 | Trusted system for file distribution | |||
| 345 | 7802105 | Method and apparatus for generating cryptographic key using biometric data | |||
| 346 | 7801308 | Secure key encoding for content protection | |||
| 347 | 7797549 | Secure method and system for biometric verification | |||
| 348 | 7797539 | Resilient cryptographic scheme | |||
| 349 | 7793104 | Security authentication and key management within an infrastructure-based wireless multi-hop network | |||
| 350 | 7791451 | Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security | |||
| 351 | 7783899 | System and method for performing a conjunctive keyword search over encrypted data | |||
| 352 | 7778412 | Method and apparatus for performing elliptic curve arithmetic | |||
| 353 | 7773747 | Encryption apparatus, decryption apparatus, and method | |||
| 354 | 7770008 | Embedding data and information related to function with which data is associated into a payload | |||
| 355 | 7768378 | Field retrofittable refrigerator lock with audit trail | |||
| 356 | 7757082 | Efficient revocation of receivers | |||
| 357 | 7752463 | Automatically filling a drive table | |||
| 358 | 7747016 | Data transmitting/receiving method, data transmission apparatus, data reception apparatus, data transmission/reception system, AV contents transmitting method, AV contents receiving method, AV contents transmission apparatus, AV contents reception apparatus, and program recording medium | |||
| 359 | 7725721 | Method and system for transferring software and hardware feature licenses between devices | |||
| 360 | 7724126 | Movable barrier operator operating parameter transfer method and apparatus | |||
| 361 | 7702108 | Use of communication equipment and method for authenticating an item, unit and system for authenticating items, and authenticating device | |||
| 362 | 7697692 | Cryptographic communication system and method | |||
| 363 | 7697683 | Cryptography-processing method, cryptography-processing apparatus and computer program | |||
| 364 | 7694154 | Method and apparatus for securely executing a background process | |||
| 365 | 7688973 | Encryption apparatus, decryption apparatus, key generation apparatus, program, and method | |||
| 366 | 7681030 | Mobile communication terminal, information processing method, data processing program, and recording medium | |||
| 367 | 7647646 | Information input/output system, key management device, and user device | |||
2009 | |||||
| 368 | 7636032 | Active RFID tag with new use automatic updating | |||
| 369 | 7627125 | Key loading systems and methods | |||
| 370 | 7623655 | Computing modular polynomials modulo large primes | |||
| 371 | 7613303 | Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster | |||
| 372 | 7612651 | Communication system, communication method and program | |||
| 373 | 7590845 | Key cache management through multiple localities | |||
| 374 | 7584362 | Systems and methods for providing signatures | |||
| 375 | 7571488 | Rights management terminal, server apparatus and usage information collection system | |||
| 376 | 7565539 | Method and apparatus for secure communications | |||
| 377 | 7562224 | System and method for multi-session establishment for a single device | |||
| 378 | 7545931 | Protection of application secrets | |||
| 379 | 7545810 | Approaches for switching transport protocol connection keys | |||
| 380 | 7529926 | Public key certification providing apparatus | |||
| 381 | 7519183 | Communication system, wireless communication apparatus, and communication method | |||
| 382 | 7512813 | Method for system level protection of field programmable logic devices | |||
| 383 | 7512789 | Mailing list server and mail transmission method thereof | |||
| 384 | 7508942 | Multi-process descrambler | |||
| 385 | 7501946 | Electronic control system used in security system for cargo trailers | |||
| 386 | 7499547 | Security authentication and key management within an infrastructure based wireless multi-hop network | |||
| 387 | 7484107 | Method for selective encryption within documents | |||
2008 | |||||
| 388 | 7463739 | Method and system providing improved security for the transfer of root keys | |||
| 389 | 7463132 | Door lock and operation mechanism | |||
| 390 | 7461406 | Access control for digital content | |||
| 391 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
| 392 | 7460666 | Combinational circuit, encryption circuit, method for constructing the same and program | |||
| 393 | 7448086 | Recording apparatus and method, reproducing apparatus and method, and memory medium | |||
| 394 | 7441122 | Method for providing secure access to a digital resource | |||
| 395 | 7440574 | Content encryption using programmable hardware | |||
| 396 | 7440570 | Method and apparatus for remote digital key generation | |||
| 397 | 7437771 | Rendering protected digital content within a network of computing devices or the like | |||
| 398 | 7430761 | Command processing system by a management agent | |||
| 399 | 7428306 | Encryption apparatus and method for providing an encrypted file system | |||
| 400 | 7423515 | FPALM II fingerprint authentication lock mechanism II | |||
| 401 | 7418736 | Network security system | |||
| 402 | 7415110 | Method and apparatus for the generation of cryptographic keys | |||
| 403 | 7412063 | Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster | |||
| 404 | 7409550 | Method for binding networked devices | |||
| 405 | 7383442 | Nested strong loader apparatus and method | |||
| 406 | 7373523 | Preparing data for storage in a secure fashion | |||
| 407 | 7366912 | Method of identifying participants in secure web sessions | |||
| 408 | 7366906 | Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium | |||
| 409 | 7355506 | Systems and methods for deterring theft of electronic devices | |||
| 410 | 7353382 | Security framework and protocol for universal pervasive transactions | |||
| 411 | 7343621 | Method and apparatus for providing iSCSI target stealth operation | |||
| 412 | 7340603 | Efficient revocation of receivers | |||
| 413 | 7337322 | Hierarchical identity-based encryption and signature schemes | |||
| 414 | 7322047 | Data security system and method associated with data mining | |||
| 415 | 7319752 | Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith | |||
2007 | |||||
| 416 | 7308102 | System and method for securing access to memory modules | |||
| 417 | 7298847 | Secure key distribution protocol in AAA for mobile IP | |||
| 418 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
| 419 | 7287168 | Partial encryption and PID mapping | |||
| 420 | 7281068 | Wireless-boot diskless mobile computing | |||
| 421 | 7269854 | Transaction system for transporting media files from content provider sources to home entertainment devices | |||
| 422 | 7269260 | Communication system, wireless communication apparatus, and communication method | |||
| 423 | 7263611 | Key management for content protection | |||
| 424 | 7260716 | Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach | |||
| 425 | 7257843 | Command processing system by a management agent | |||
| 426 | 7239725 | Face image recognition apparatus | |||
| 427 | 7227444 | Method and apparatus for remote control | |||
| 428 | 7203838 | System and method for authenticating a web page | |||
| 429 | 7200235 | Error-checking and correcting decryption-key memory for programmable logic devices | |||
| 430 | 7194762 | Method of creating password list for remote authentication to services | |||
| 431 | 7191327 | Internet-enabled device provisioning, upgrade and recovery mechanism | |||
| 432 | 7188242 | Key management for content protection | |||
| 433 | 7178033 | Method and apparatus for securing digital assets | |||
| 434 | 7176782 | Electronic locking system, locking management device, method of managing a locking device, and program | |||
| 435 | 7174460 | Distributed digital signature generation method and digitally signed digital document generation method and apparatus | |||
| 436 | 7170998 | Door access control and key management system and the method thereof | |||
| 437 | 7167565 | Efficient techniques for sharing a secret | |||
2006 | |||||
| 438 | 7152158 | Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium | |||
| 439 | 7146644 | Data security system and method responsive to electronic attacks | |||
| 440 | 7140044 | Data security system and method for separation of user communities | |||
| 441 | 7139917 | Systems, methods and software for remote password authentication using multiple servers | |||
| 442 | 7136960 | Hardware hashing of an input of a content addressable memory (CAM) to emulate a wider CAM | |||
| 443 | 7127619 | Decoding and decryption of partially encrypted information | |||
| 444 | 7124303 | Elementary stream partial encryption | |||
| 445 | 7124302 | Systems and methods for secure transaction management and electronic rights protection | |||
| 446 | 7120604 | Method of controlling digital content distribution, a method of reproducing digital content, and an apparatus using the same | |||
| 447 | 7119709 | Electronic access security and keyless entry system | |||
| 448 | 7117372 | Programmable logic device with decryption and structure for preventing design relocation | |||
| 449 | 7113070 | Door lock and operation mechanism | |||
| 450 | 7103185 | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication | |||
| 451 | 7103184 | System and method for sign mask encryption and decryption | |||
| 452 | 7096355 | Dynamic encoding algorithms and inline message decryption | |||
| 453 | 7089417 | Cryptographic information and flow control | |||
| 454 | 7088218 | Wireless appliance activation transceiver | |||
| 455 | 7079653 | Cryptographic key split binding process and apparatus | |||
| 456 | 7076657 | Use of short message service (SMS) for secure transactions | |||
| 457 | 7042332 | Electronic key system | |||
| 458 | 6993138 | Spatial key trees for key management in wireless environments | |||
2005 | |||||
| 459 | 6957340 | Encryption key for multi-key encryption in programmable logic device | |||
2004 | |||||
| 460 | 6690810 | Image coding without coding transparency regions | |||
| 461 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2002 | |||||
| 462 | 6483919 | Method and arrangement for establishing an encrypted mobile connection | |||
| 463 | 6408389 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
| 464 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
2000 | |||||
| 465 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
1994 | |||||
| 466 | 5321689 | Multipath transmission system | |||
| © 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 | |||||