СПИСОК патентов США - подгруппа МПК16 H04L9/30
|
|
| № п/п | Номер патента | Название патента | |||
2017 | |||||
| 1 | 9608980 | Environment-aware security tokens | |||
| 2 | 9608819 | Learning parity with noise-based relational encryption for proximity relations | |||
| 3 | 9608818 | Cryptographic communication system and cryptographic communication method | |||
| 4 | 9608817 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
| 5 | 9607256 | Augmenting and updating data using encrypted machine-readable identifiers | |||
| 6 | 9607158 | Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium | |||
| 7 | 9602485 | Network, network node with privacy preserving source attribution and admission control and device implemented method therfor | |||
| 8 | 9602478 | Trust relationships in a computerized system | |||
| 9 | 9602285 | Authentication device, authentication method, and program | |||
| 10 | 9602282 | Secure software and hardware association technique | |||
| 11 | 9602281 | Parallelizable cipher construction | |||
| 12 | 9596598 | Reducing detectability of an encryption key | |||
| 13 | 9596090 | Method for controlling data acquisition for a plurality of field devices | |||
| 14 | 9596083 | Information processing technique for pattern matching | |||
| 15 | 9596082 | Secure debug trace messages for production authenticated code modules | |||
| 16 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
| 17 | 9591483 | Authentication mechanisms for wireless networks | |||
| 18 | 9590971 | Environment-aware security tokens | |||
| 19 | 9590807 | Identity based public key cryptosystem | |||
| 20 | 9589144 | System and method for cryptographic suite management | |||
| 21 | 9589138 | Computing device boot software authentication | |||
| 22 | 9588908 | Memory circuit using resistive random access memory arrays in a secure element | |||
| 23 | 9584321 | Secure storage for shared documents | |||
| 24 | 9582671 | Security and data privacy for lighting sensory networks | |||
| 25 | 9578035 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
| 26 | 9577828 | Batch verification method and apparatus thereof | |||
| 27 | 9577827 | Information processing device, information processing method, and program | |||
| 28 | 9577822 | Secure bitstream authentication | |||
| 29 | 9576144 | Secured file system management | |||
| 30 | 9571281 | CRT-RSA encryption method and apparatus | |||
| 31 | 9571271 | Sending messages by oblivious transfer | |||
| 32 | 9571268 | Method and system for homomorphicly randomizing an input | |||
| 33 | 9571267 | Data processor and decryption method | |||
| 34 | 9569773 | Invariant biohash security system and method | |||
| 35 | 9565017 | Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks | |||
| 36 | 9563762 | Method for generating an identifier | |||
| 37 | 9559850 | Component management via secure communications | |||
| 38 | 9559847 | Content access for duration of calendar events | |||
| 39 | 9553723 | Multi-dimensional encryption | |||
| 40 | 9552175 | System and method for providing a command buffer in a memory system | |||
| 41 | 9548970 | Managing unlinkable identifiers for controlled privacy-friendly data exchange | |||
| 42 | 9548864 | Device and method for encoding bits to symbols for a communication system | |||
| 43 | 9548863 | Method for unambiguous marking of an object | |||
| 44 | 9548861 | Encrypted statistical processing system, device, method, and program | |||
| 45 | 9547778 | Secure public key acceleration | |||
| 46 | 9544145 | Device, method, and medium for facility management verification | |||
| 47 | 9544144 | Data encryption | |||
| 48 | 9544133 | On-the-fly key generation for encryption and decryption | |||
| 49 | 9542158 | T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring | |||
| 50 | 9537660 | Method of establishing public key cryptographic protocols against quantum computational attack | |||
| 51 | 9537656 | Systems and methods for managing cryptographic keys in a secure microcontroller | |||
2016 | |||||
| 52 | 9531540 | Secure token-based signature schemes using look-up tables | |||
| 53 | 9531537 | System and method for performing secure communications | |||
| 54 | 9530005 | Techniques for secure data management in a distributed environment | |||
| 55 | 9520992 | Logical-to-physical address translation for a removable data storage device | |||
| 56 | 9516013 | Communication apparatus, method of controlling the same and storage medium for transmitting image file to a network address | |||
| 57 | 9516007 | Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier | |||
| 58 | 9515997 | Inline data encryption | |||
| 59 | 9515994 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | |||
| 60 | 9514454 | Wireless transaction medium having combined magnetic stripe and radio frequency communications | |||
| 61 | 9509690 | Methods and systems for managing network activity using biometrics | |||
| 62 | 9509670 | System and method for managing secure communications in an Ad-Hoc network | |||
| 63 | 9509663 | Secure distribution of session credentials from client-side to server-side traffic management devices | |||
| 64 | 9509511 | Identity based encryption | |||
| 65 | 9509492 | Authentication device, output device, verification device and input device | |||
| 66 | 9503448 | Authenticated session establishment | |||
| 67 | 9503267 | Generating digital signatures | |||
| 68 | 9503264 | Attribute based encryption using lattices | |||
| 69 | 9503263 | Method and apparatus for storing encrypted data files across distributed storage media | |||
| 70 | 9503262 | Transparent denial of service protection | |||
| 71 | 9503261 | Public key encryption with digital signature scheme | |||
| 72 | 9503259 | System and method for generating and protecting cryptographic keys | |||
| 73 | 9503258 | System and method for communication using orbital angular momentum with multiple layer overlay modulation | |||
| 74 | 9495545 | Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption | |||
| 75 | 9490979 | System and method for providing credentials | |||
| 76 | 9490978 | Information processing apparatus and information processing method | |||
| 77 | 9490974 | Identity-based decryption | |||
| 78 | 9490970 | Methods and system for secure communication between an RFID tag and a reader | |||
| 79 | 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
| 80 | 9485101 | Provisioning digital certificates in a network environment | |||
| 81 | 9485092 | Electronic authentication systems | |||
| 82 | 9479340 | Controlling use of encryption keys | |||
| 83 | 9473794 | Digital broadcasting receiver and method for controlling the same | |||
| 84 | 9473603 | Memory system for portable telephone | |||
| 85 | 9473492 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
| 86 | 9473471 | Method, apparatus and system for performing proxy transformation | |||
| 87 | 9473302 | Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device | |||
| 88 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
| 89 | 9471948 | System and method for administering licenses stored by a product unit, and administration of said unit in the field | |||
| 90 | 9471774 | Secure access to a virtual machine | |||
| 91 | 9467299 | Device for and method of controlled multilevel chain of trust/revision | |||
| 92 | 9467298 | Device for and method of multilevel chain of trust/revision | |||
| 93 | 9467283 | Securing method for lawful interception | |||
| 94 | 9467281 | Information processing apparatus and program product | |||
| 95 | 9461974 | System and method to merge encrypted signals in distributed communication system | |||
| 96 | 9460315 | Order-preserving encryption system, device, method, and program | |||
| 97 | 9455832 | Signatures with confidential message recovery | |||
| 98 | 9455828 | Re-encryption system, re-encryption method and re-encryption program | |||
| 99 | 9451453 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
| 100 | 9450933 | Systems and methods for device and data authentication | |||
| 101 | 9450755 | Transponder, reader and methods for operating the same | |||
| 102 | 9450754 | Data privacy | |||
| 103 | 9449198 | Prime field elliptic cryptography processor | |||
| 104 | 9445263 | Method for ensuring security and privacy in a wireless cognitive network | |||
| 105 | 9444623 | Modular exponentiation optimization for cryptographic systems | |||
| 106 | 9438600 | Apparatus and methods for distributing and storing electronic access clients | |||
| 107 | 9438427 | Method and system for providing a plurality of tamperproof digital certificates for a plurality of public keys of a device | |||
| 108 | 9432192 | Content aware hierarchical encryption for secure storage systems | |||
| 109 | 9432191 | Public key encryption system based on the quadratic residuosity assumption | |||
| 110 | 9425966 | Security mechanism evaluation service | |||
| 111 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
| 112 | 9425960 | Searchable encryption for outsourcing data analytics | |||
| 113 | 9425955 | Power line communication (PLC) network nodes using cipher then segment security | |||
| 114 | 9425952 | Algebraic manipulation detection codes from algebraic curves | |||
| 115 | 9420458 | Method for the use of a mobile appliance using a motor vehicle | |||
| 116 | 9420454 | Method for ensuring security and privacy in a wireless cognitive network | |||
| 117 | 9419994 | Method for identifying potentially malicious network elements within a network using cross-domain collaborative data sharing | |||
| 118 | 9419798 | Public encryption method based on user ID | |||
| 119 | 9419789 | Method and apparatus for scalar multiplication secure against differential power attacks | |||
| 120 | 9418242 | Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database | |||
| 121 | 9418211 | Electronic device and method of transmitting content item | |||
| 122 | 9413531 | Cryptographic system, cryptographic method, cryptographic program, and decryption device | |||
| 123 | 9413528 | Method for attribute based broadcast encryption with permanent revocation | |||
| 124 | 9407618 | Systems and methods for device and data authentication | |||
| 125 | 9407439 | Authentication system and authentication code convertor | |||
| 126 | 9407438 | Cryptographic system, cryptographic method, and cryptographic program | |||
| 127 | 9407437 | Secure initialization vector generation | |||
| 128 | 9405729 | Cryptographic method comprising a modular exponentiation operation | |||
| 129 | 9402091 | Digital broadcasting receiver and method for controlling the same | |||
| 130 | 9401811 | Attribute-based digital signatures | |||
| 131 | 9401810 | Method and apparatus for applying recipient criteria in identity-based encryption | |||
| 132 | 9401809 | Composite system, method, and storage medium | |||
| 133 | 9401805 | Encrypting device, encrypting method, and recording medium | |||
| 134 | 9400636 | Apparatus and method for calculating a result in a scalar multiplication | |||
| 135 | 9397985 | System and method for providing a cryptographic platform for exchanging information | |||
| 136 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
| 137 | 9392525 | Establishing reliable routes without expensive mesh peering | |||
| 138 | 9392449 | Communication system, communication unit, and communication method | |||
| 139 | 9391965 | Data search device, data search method, data search program, data registration device, data registration method, data registration program, and information processing device | |||
| 140 | 9391777 | System and method for performing key resolution over a content centric network | |||
| 141 | 9391773 | Elliptic curve point multiplication procedure resistant to side-channel information leakage | |||
| 142 | 9385867 | Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program | |||
| 143 | 9383966 | Number squaring computer-implemented method and apparatus | |||
| 144 | 9379891 | Method and system for ID-based encryption and decryption | |||
| 145 | 9378380 | System and method for securely storing and sharing information | |||
| 146 | 9378220 | Bonding contents on separate storage media | |||
| 147 | 9374227 | Verification of signed digital documents | |||
| 148 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
| 149 | 9374220 | System and method for providing compressed encryption and decryption in homomorphic encryption based on integers | |||
| 150 | 9369151 | Apparatus and method for resource allocation | |||
| 151 | 9363087 | End-to-end security for hardware running verified software | |||
| 152 | 9363086 | Aggregate signing of data in content centric networking | |||
| 153 | 9363082 | Cryptographic communication system and cryptographic communication method | |||
| 154 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
| 155 | 9363073 | Cryptographic countermeasure method by deriving a secret data | |||
| 156 | 9356787 | Secure communication architecture including sniffer | |||
| 157 | 9356786 | Method for encrypting a plurality of data in a secure set | |||
| 158 | 9356783 | Method for ciphering and deciphering, corresponding electronic device and computer program product | |||
| 159 | 9356779 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
| 160 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
| 161 | 9350543 | Method and system for homomorphicly randomizing an input | |||
| 162 | 9350539 | Secure distribution of content | |||
| 163 | 9344276 | Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program | |||
| 164 | 9342712 | Method and system for accelerating cryptographic processing | |||
| 165 | 9338142 | Method for verifying the security of a device that generates private and public cryptographic keys | |||
| 166 | 9338000 | Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm | |||
| 167 | 9332012 | Apparatus and methods for storing electronic access clients | |||
| 168 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
| 169 | 9326136 | Method and apparatus for managing group key for mobile device | |||
| 170 | 9325499 | Message encryption and decryption utilizing low-entropy keys | |||
| 171 | 9323560 | Interpreting I/O operation requests from pageable guests without host intervention | |||
| 172 | 9319946 | System for efficient recovery of Node-B buffered data following MAC layer reset | |||
| 173 | 9319395 | System and method for securing authentication information in a networked environment | |||
| 174 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
| 175 | 9313181 | System and method to merge encrypted signals in distributed communication system | |||
| 176 | 9313027 | Protection of a calculation performed by an integrated circuit | |||
| 177 | 9313026 | Key negotiation method and apparatus according to SM2 key exchange protocol | |||
| 178 | 9306753 | Mobile system and method for improving safety of impromptu meetings | |||
| 179 | 9300681 | Method for prefix reachability in a communication system | |||
| 180 | 9300654 | Method of handling a certification request | |||
| 181 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
| 182 | 9300469 | Secure computing system, secure computing method, secure computing apparatus, and program therefor | |||
| 183 | 9300466 | Transmitting device, receiving device, transmitting method, receiving method, and program | |||
| 184 | 9298904 | Method for accessing a plurality of services by a mobile terminal user, and related secure device | |||
| 185 | 9294278 | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same | |||
| 186 | 9294273 | Method and system for conditional access to a digital content, associated terminal and subscriber device | |||
| 187 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
| 188 | 9288044 | Method for providing cryptographic key pairs | |||
| 189 | 9286243 | Logical-to-physical address translation for a removable data storage device | |||
| 190 | 9281944 | Attribute based encryption using lattices | |||
| 191 | 9280518 | Public key cryptography computing device | |||
| 192 | 9277406 | Methods and system for secure communication between an RFID tag and a reader | |||
| 193 | 9276746 | Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization | |||
| 194 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
| 195 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
| 196 | 9276735 | Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program | |||
| 197 | 9276734 | Confidential computation system, confidential computation method, and confidential computation program | |||
| 198 | 9270829 | Message routing | |||
| 199 | 9270447 | Demand based encryption and key generation and distribution systems and methods | |||
| 200 | 9268968 | Credential validation | |||
| 201 | 9264406 | Public key cryptography with reduced computational load | |||
| 202 | 9264222 | Precomputing internal AES states in counter mode to protect keys used in AES computations | |||
| 203 | 9264221 | Systems and methods for faster public key encryption using the associated private key portion | |||
| 204 | 9256763 | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |||
| 205 | 9252960 | System for establishing a cryptographic key depending on a physical system | |||
| 206 | 9252954 | Efficient homomorphic encryption scheme for bilinear forms | |||
| 207 | 9252944 | Key wrapping for common cryptographic architecture (CCA) key token | |||
| 208 | 9252941 | Enhanced digital signatures algorithm method and system utilitzing a secret generator | |||
| 209 | 9246900 | Using a single certificate request to generate credentials with multiple ECQV certificates | |||
| 210 | 9246888 | Systems and methods for secure communication over an unsecured communication channel | |||
| 211 | 9246689 | Component management via secure communications | |||
| 212 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
| 213 | 9246675 | Cryptographic systems using pairing with errors | |||
| 214 | 9241175 | Digital broadcasting receiver and method for controlling the same | |||
| 215 | 9240884 | Method and apparatus for verifiable generation of public keys | |||
| 216 | 9237137 | Key generation device, key generation program, secret search system, and key distribution method | |||
| 217 | 9237016 | System and method for wiping encrypted data on a device having file-level content protection | |||
| 218 | 9237015 | Compact and efficient communication security through combining anti-replay with encryption | |||
| 219 | 9237013 | Encrypted data management device, encrypted data management method, and encrypted data management program | |||
| 220 | 9237009 | Disrupting offline password attacks | |||
| 221 | 9231925 | Network authentication method for secure electronic transactions | |||
| 222 | 9231770 | Combined digital certificate | |||
| 223 | 9231762 | Method of secure communication, controlled device, and control program | |||
| 224 | 9230630 | Physically unclonable function based on the initial logical state of magnetoresistive random-access memory | |||
| 225 | 9229687 | Private two-party computation using partially homomorphic encryption | |||
2015 | |||||
| 226 | 9219805 | Memory system for portable telephone | |||
| 227 | 9219730 | Securing a secret of a user | |||
| 228 | 9219714 | ID-based encryption and signature method and terminal | |||
| 229 | 9219612 | Method of mutually authenticating a reader and a radio tag | |||
| 230 | 9219606 | Method and device for digital data blocks encryption and decryption | |||
| 231 | 9219604 | Generating an encrypted message for storage | |||
| 232 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
| 233 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
| 234 | 9215068 | Search system, search method, and program | |||
| 235 | 9214214 | Physically unclonable function based on the random logical state of magnetoresistive random-access memory | |||
| 236 | 9213867 | Secure cloud database platform with encrypted database queries | |||
| 237 | 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
| 238 | 9209980 | Provisioning a shared secret to a portable electronic device and to a service entity | |||
| 239 | 9209974 | Functional encryption key management | |||
| 240 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
| 241 | 9208330 | System for execution of security related functions | |||
| 242 | 9203622 | Cryptographic processing system, cryptographic processing method, cryptograhpic processing program, and key generation device | |||
| 243 | 9203621 | Policy-based data management | |||
| 244 | 9191214 | Procedure for a multiple digital signature | |||
| 245 | 9191208 | Schemes for signcryption | |||
| 246 | 9191199 | Method and apparatus for public-key cryptography based on error correcting codes | |||
| 247 | 9184914 | Information processing apparatus and information processing method | |||
| 248 | 9183411 | Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption | |||
| 249 | 9183158 | System and method for hardware based security | |||
| 250 | 9182943 | Methods and devices for prime number generation | |||
| 251 | 9178700 | Information processing apparatus, information processing method, program, and recording medium | |||
| 252 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
| 253 | 9176707 | Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program | |||
| 254 | 9172530 | Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method | |||
| 255 | 9172529 | Hybrid encryption schemes | |||
| 256 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
| 257 | 9166953 | Method and apparatus for providing identity based encryption in distributed computations | |||
| 258 | 9166791 | Method and apparatus for user identity verification | |||
| 259 | 9166790 | Commission information generator for making processes on communication performed by another computer | |||
| 260 | 9166778 | Secure group messaging | |||
| 261 | 9164732 | Multiplication method and modular multiplier using redundant form recoding | |||
| 262 | 9160530 | Method and apparatus for verifiable generation of public keys | |||
| 263 | 9154494 | Self-signed implicit certificates | |||
| 264 | 9154306 | Privacy-preserving flexible anonymous-pseudonymous access | |||
| 265 | 9154302 | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number | |||
| 266 | 9152779 | Protecting codes, keys and user credentials with identity and patterns | |||
| 267 | 9152383 | Method for encrypting a message through the computation of mathematical functions comprising modular multiplications | |||
| 268 | 9148282 | Method to calculate square roots for elliptic curve cryptography | |||
| 269 | 9143327 | Power line communication (PLC) network nodes using cipher then segment security | |||
| 270 | 9141802 | Computing device boot software authentication | |||
| 271 | 9141372 | Secure and interruptible transfer of a map update package to a navigation device | |||
| 272 | 9135834 | Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation | |||
| 273 | 9130753 | Authentication using security device with electronic interface | |||
| 274 | 9130745 | Encryption processing device and method | |||
| 275 | 9130744 | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |||
| 276 | 9130664 | Wireless communications using a sound signal | |||
| 277 | 9129122 | Signature verification apparatus, signature verification method, program, and recording medium | |||
| 278 | 9124571 | Network authentication method for secure user identity verification | |||
| 279 | 9124430 | Centralized policy management for security keys | |||
| 280 | 9118664 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
| 281 | 9118482 | Fault tolerant apparatus and method for elliptic curve cryptography | |||
| 282 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
| 283 | 9112700 | Personal assistance safety systems and methods | |||
| 284 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
| 285 | 9111115 | Oblivious transfer with hidden access control lists | |||
| 286 | 9106636 | Information authentication method and information authentication system | |||
| 287 | 9106635 | System and method for connecting client devices to a network | |||
| 288 | 9106410 | Identity based authenticated key agreement protocol | |||
| 289 | 9106408 | Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program | |||
| 290 | 9094206 | Method and system for secure session establishment using identity-based encryption (VDTLS) | |||
| 291 | 9094205 | Secure provisioning in an untrusted environment | |||
| 292 | 9094189 | Cryptographic method for communicating confidential information | |||
| 293 | 9092645 | Efficient multiplication, exponentiation and modular reduction implementations | |||
| 294 | 9088419 | Keyed PV signatures | |||
| 295 | 9087192 | Electronic circuit and method for monitoring a data processing | |||
| 296 | 9086905 | Interpreting I/O operation requests from pageable guests without host intervention | |||
| 297 | 9083726 | Automatic content publication and distribution | |||
| 298 | 9077540 | Method for verification of decryption processes | |||
| 299 | 9077537 | Generating secure private keys for use in a public key communications environment | |||
| 300 | 9077536 | Method and apparatus for solving discrete logarithm problem using pre-computation table | |||
| 301 | 9077525 | User-controlled data encryption with obfuscated policy | |||
| 302 | 9076000 | Authentication device, authentication method, and program | |||
| 303 | 9071445 | Method and system for generating implicit certificates and applications to identity-based encryption (IBE) | |||
| 304 | 9071442 | Signcryption method and device and corresponding signcryption verification method and device | |||
| 305 | 9071427 | Method and apparatus for establishing a key agreement protocol | |||
| 306 | 9065637 | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | |||
| 307 | 9065636 | Data encryption system and method | |||
| 308 | 9064229 | Real-time asset tracking using discovery services | |||
| 309 | 9059852 | Validating a user's identity utilizing information embedded in a image file | |||
| 310 | 9054877 | Data expansion using an approximate method | |||
| 311 | 9025767 | Method and apparatus for querying content protected by identity-based encryption | |||
| 312 | 8997174 | Configuring browser policy settings on client computing devices | |||
| 313 | 8995665 | Role based encryption without key management system | |||
| 314 | 8988713 | Secure printing in a cloud-based print system | |||
| 315 | 8983064 | Strengthened public key protocol | |||
| 316 | 8972300 | Content distribution system | |||
| 317 | 8966287 | Systems and methods for secure third-party data storage | |||
| 318 | 8958552 | Data processing device | |||
| 319 | 8953787 | Strengthened public key protocol | |||
| 320 | 8949609 | Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor | |||
| 321 | 8948401 | Method for filtering of abnormal ONT with same serial number in a GPON system | |||
| 322 | 8942378 | Method and device for encrypting multicast service in passive optical network system | |||
| 323 | 8934631 | Decompressing apparatus and compressing apparatus | |||
2014 | |||||
| 324 | 8909929 | Stored public key validity registers for cryptographic devices and systems | |||
| 325 | 8898474 | Support of multiple pre-shared keys in access point | |||
| 326 | 8880881 | Secure communications between devices | |||
| 327 | 8861733 | Method of personalizing a NFC chipset | |||
| 328 | 8856536 | Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system | |||
| 329 | 8856531 | Message bus key agreement scheme | |||
| 330 | 8855315 | Method and system for realizing secure forking call session in IP multimedia subsystem | |||
| 331 | 8842840 | Demand based encryption and key generation and distribution systems and methods | |||
| 332 | 8826026 | Systems and methods for tracking electronic files in computer networks using electronic signatures | |||
| 333 | 8826009 | Method of handling a certification request | |||
| 334 | 8817972 | Method of authentication using a decoding of an error correcting code on the basis of a public matrix | |||
| 335 | 8787566 | Strong encryption | |||
| 336 | 8781113 | Decryption apparatus and method of decrypting ciphertext of the same | |||
| 337 | 8781110 | Unified system architecture for elliptic-curve cryptography | |||
| 338 | 8767967 | Physical digital media delivery | |||
| 339 | 8761390 | Production of cryptographic keys for an embedded processing device | |||
| 340 | 8750500 | Multi-dimensional montgomery ladders for elliptic curves | |||
| 341 | 8745416 | Systems and methods for secure third-party data storage | |||
| 342 | 8745379 | Systems and methods for securing data in motion | |||
| 343 | 8744079 | Secure communication system | |||
| 344 | 8744078 | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | |||
| 345 | 8744075 | Quantum public key encryption system | |||
| 346 | 8744074 | Method and device for countering fault attacks | |||
| 347 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
| 348 | 8737614 | Document imaging system with identity-based encryption | |||
| 349 | 8737607 | Finding nearby users without revealing own location | |||
| 350 | 8726023 | Authentication using GAA functionality for unidirectional network connections | |||
| 351 | 8718276 | Cryptography on a elliptical curve | |||
| 352 | 8712042 | Implicit certificate scheme | |||
| 353 | 8712038 | Cryptography on a simplified elliptical curve | |||
| 354 | 8711843 | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |||
| 355 | 8705746 | Data security in an off-premise environment | |||
| 356 | 8700899 | Forward-secure key unlocking for cryptographic devices | |||
| 357 | 8694771 | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption | |||
| 358 | 8693684 | Method and apparatus for computing a shared secret key | |||
| 359 | 8688991 | Media player embodiments and secure playlist packaging | |||
| 360 | 8683189 | On-chip security method and apparatus | |||
| 361 | 8661260 | Methods and systems for indicating trustworthiness of secure communications | |||
| 362 | 8649508 | System and method for implementing elliptic curve scalar multiplication in cryptography | |||
| 363 | 8627107 | System and method of securing private health information | |||
| 364 | 8625797 | Releasing a service on an electronic appliance | |||
| 365 | 8625783 | Method and apparatus for providing privacy of user identity and characteristics in a communication system | |||
| 366 | 8625780 | Reduction of side-channel information by interacting crypto blocks | |||
2013 | |||||
| 367 | 8621239 | Method for strengthening the implementation of ECDSA against power analysis | |||
| 368 | 8615798 | Optimizing a data deduplication system using client authentication information | |||
| 369 | 8612750 | Creating and using secure communications channels for virtual universes | |||
| 370 | 8601260 | Creation of user digital certificate for portable consumer payment device | |||
| 371 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
| 372 | 8566601 | Systems and methods for functional encryption using a string of arbitrary length | |||
| 373 | 8559632 | Method for transferring messages comprising extensible markup language information | |||
| 374 | 8549299 | Accelerated key agreement with assisted computations | |||
| 375 | 8543822 | Device authentication | |||
| 376 | 8539606 | Data protection method and data protection system | |||
| 377 | 8538028 | System and method for secure electronic communication services | |||
| 378 | 8527766 | Reducing leakage of information from cryptographic systems | |||
| 379 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
| 380 | 8516271 | Securing non-volatile memory regions | |||
| 381 | 8509429 | Protection of a prime number generation against side-channel attacks | |||
| 382 | 8509428 | High-speed pipelined ARIA encryption apparatus | |||
| 383 | 8495373 | Method of generating a cryptographic key, network and computer program therefor | |||
| 384 | 8484461 | Method and apparatus for external organization path length validation within a public key infrastructure (PKI) | |||
| 385 | 8472621 | Protection of a prime number generation for an RSA algorithm | |||
| 386 | 8462944 | Method of public key generation | |||
| 387 | 8462940 | Public key cryptosystem and associated method utilizing a hard lattice with O(n log n) random bits for security | |||
| 388 | 8458776 | Low-latency peer session establishment | |||
| 389 | 8458494 | Systems and methods for secure third-party data storage | |||
| 390 | 8428252 | Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables | |||
| 391 | 8417967 | Storage device data encryption using a binary large object (BLOB) | |||
| 392 | 8417965 | Method and circuit for secure definition and integration of cores | |||
| 393 | 8417956 | Encryption and authentication systems and methods | |||
| 394 | 8396211 | System and method for dynamic modification of allowable electronic message properties | |||
| 395 | 8385541 | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping | |||
| 396 | 8379849 | Method and apparatus for generating a public key in a manner that counters power analysis attacks | |||
| 397 | 8370631 | Trusted identities on a trusted computing platform | |||
| 398 | 8369519 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
| 399 | 8369518 | Electronic data encryption and encrypted data decryption system, and its method | |||
| 400 | 8356182 | Electronic signature system and electronic signature verifying method | |||
| 401 | 8351601 | Elliptic polynomial cryptography with secret key embedding | |||
| 402 | 8347376 | Techniques for distributing a new communication key within a virtual private network | |||
| 403 | 8347349 | Configuring browser policy settings on client computing devices | |||
2012 | |||||
| 404 | 8340284 | Key generation device, key derivation device, encryption device, decryption device, method and program | |||
| 405 | 8331568 | Efficient distribution of computation in key agreement | |||
| 406 | 8331558 | Method of cipher block chaining using elliptic curve cryptography | |||
| 407 | 8321674 | Information processing device, computer program, and information processing system | |||
| 408 | 8320742 | Method and apparatus for playing data between external device and TV set | |||
| 409 | 8320559 | Identity-based-encryption system | |||
| 410 | 8312276 | Method for sending and receiving an evaluation of reputation in a social network | |||
| 411 | 8311214 | Method for elliptic curve public key cryptographic validation | |||
| 412 | 8307208 | Confidential communication method | |||
| 413 | 8296563 | Method of handling a certification request | |||
| 414 | 8296381 | Method and computer program product for receiving an update to a previously received email message | |||
| 415 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
| 416 | 8291218 | Creating and using secure communications channels for virtual universes | |||
| 417 | 8290149 | Method of obscuring cryptographic computations | |||
| 418 | 8280048 | Method for strengthening the implementation of ECDSA against power analysis | |||
| 419 | 8270601 | Implicit certificate scheme | |||
| 420 | 8261089 | Method and system for authenticating a user by means of a mobile device | |||
| 421 | 8259948 | Virtual TPM key migration using hardware keys | |||
| 422 | 8255691 | Apparatus for batch verification and method using the same | |||
| 423 | 8250367 | Cryptographic applications of efficiently evaluating large degree isogenies | |||
| 424 | 8243920 | Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems | |||
| 425 | 8243338 | Providing privacy for electronic voting using encryption | |||
| 426 | 8239331 | Auction verification | |||
| 427 | 8233618 | Method and system for generating a pair of public key and secret key | |||
| 428 | 8219819 | Public key encryption with digital signature scheme | |||
| 429 | 8214638 | Using multiple certificates to distribute public keys | |||
| 430 | 8213608 | Roaming utilizing an asymmetric key pair | |||
| 431 | 8213605 | Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption | |||
| 432 | 8213604 | Signcryption scheme based on elliptic curve cryptography | |||
| 433 | 8194854 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
| 434 | 8181035 | Methods, apparatus and systems to improve security in computer systems | |||
| 435 | 8156336 | Device authentication | |||
| 436 | 8145899 | Creation of user digital certificate for portable consumer payment device | |||
| 437 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
| 438 | 8136166 | Installation of black box for trusted component for digital rights management (DRM) on computing device | |||
| 439 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
| 440 | 8117453 | Customization of an electronic circuit | |||
| 441 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
| 442 | 8116451 | Key validation scheme | |||
| 443 | 8108678 | Identity-based signcryption system | |||
| 444 | 8108675 | External signature device for a PC with wireless communication capacity | |||
| 445 | 8107623 | Method for verifying a first identity and a second identity of an entity | |||
| 446 | 8098820 | Conditional access system for broadcast digital television | |||
| 447 | 8091119 | Identity based network mapping | |||
| 448 | 8090947 | Key agreement and transport protocol with implicit signatures | |||
| 449 | 8090099 | Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field | |||
| 450 | 8089861 | Data verification using signature | |||
2011 | |||||
| 451 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
| 452 | 8074265 | Methods and systems for verifying a location factor associated with a token | |||
| 453 | 8074073 | Certificate-based encryption and public key infrastructure | |||
| 454 | 8073143 | Information processing device and method | |||
| 455 | 8045706 | System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources | |||
| 456 | 8041951 | Code-based communication connection management | |||
| 457 | 8028157 | On-chip security method and apparatus | |||
| 458 | 8024575 | System and method for creation and use of strong passwords | |||
| 459 | 8024567 | Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof | |||
| 460 | 8023647 | Password self encryption method and system and encryption by keys generated from personal secret information | |||
| 461 | 8023646 | Identity-based-encryption extensions formed using multiple instances of an identity based encryption scheme | |||
| 462 | 8005209 | Invariance based concurrent error detection for the advanced encryption standard | |||
| 463 | 8001384 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium | |||
| 464 | 8000470 | Method of public key generation | |||
| 465 | 7995752 | Method for accelerating cryptographic operations on elliptic curves | |||
| 466 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
| 467 | 7987366 | Key management for network elements | |||
| 468 | 7983415 | Method for performing iterative scalar multiplication which is protected against address bit attack | |||
| 469 | 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | |||
| 470 | 7974408 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
| 471 | 7962765 | Methods and systems for tamper resistant files | |||
| 472 | 7962753 | Method and a circuit for SHA operation with power saved | |||
| 473 | 7961877 | Factoring based modular exponentiation | |||
| 474 | 7961876 | Method to produce new multivariate public key cryptosystems | |||
| 475 | 7957527 | Cryptographic processing apparatus | |||
| 476 | 7957525 | Encryption and signature schemes using message mappings to reduce the message size | |||
| 477 | 7945044 | Method and system for performing an untraceable secret matching | |||
| 478 | 7940936 | Public key generation method in elliptic curve cryptography and public key generation system executing the method | |||
| 479 | 7936882 | Method to trace traceable parts of original private keys in a public-key cryptosystem | |||
| 480 | 7936871 | Altering the size of windows in public key cryptographic computations | |||
| 481 | 7936870 | Rotation of keys during encryption/decryption | |||
| 482 | 7936869 | Verifying digital signature based on shared knowledge | |||
| 483 | 7929689 | Call signs | |||
| 484 | 7925010 | Message deciphering method, system and article | |||
| 485 | 7917757 | Method and system for authentication of electronic communications | |||
| 486 | 7912886 | Configurable exponent FIFO | |||
| 487 | 7907724 | Method and apparatus for protecting an RSA calculation on an output by means of the chinese remainder theorem | |||
| 488 | 7904721 | Digital certificates | |||
| 489 | 7895432 | Method and apparatus for using a third party authentication server | |||
| 490 | 7889866 | Information leakage prevention apparatus and information leakage prevention method | |||
| 491 | 7886364 | Encrypted key cache | |||
| 492 | 7885412 | Pre-generation of generic session keys for use in communicating within communications environments | |||
| 493 | 7882367 | Information recording and reproducing apparatus and method | |||
| 494 | 7869593 | Software for providing based on shared knowledge public keys having same private key | |||
2010 | |||||
| 495 | 7860247 | Identity based encryption | |||
| 496 | 7856101 | Method for elliptic curve scalar multiplication | |||
| 497 | 7856100 | Privacy-preserving data aggregation using homomorphic encryption | |||
| 498 | 7853801 | System and method for providing authenticated encryption in GPON network | |||
| 499 | 7853793 | Trusted signature with key access permissions | |||
| 500 | 7844051 | Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption | |||
| 501 | 7832016 | Microprocessor system and method for detecting the exchange of modules of the system | |||
| 502 | 7814313 | System, terminal, network entity, method and computer program product for authorizing communication message | |||
| 503 | 7809132 | Implementations of AES algorithm for reducing hardware with improved efficiency | |||
| 504 | 7801299 | Techniques for merging tables | |||
| 505 | 7796751 | Certificate-based encryption and public key infrastructure | |||
| 506 | 7794323 | Gaming apparatus with encryption and method | |||
| 507 | 7792287 | Leak-resistant cryptographic payment smartcard | |||
| 508 | 7792286 | Signature generation device and signature verification device | |||
| 509 | 7783044 | System for on-line and off-line decryption | |||
| 510 | 7783040 | Encryption in a secure computerized gaming system | |||
| 511 | 7779481 | Systems and methods for electronic postmarking of data including location data | |||
| 512 | 7779259 | Key agreement and transport protocol with implicit signatures | |||
| 513 | 7778422 | Security associations for devices | |||
| 514 | 7778414 | Encryption method based on factorization | |||
| 515 | 7773747 | Encryption apparatus, decryption apparatus, and method | |||
| 516 | 7773746 | Encryption system, encryption device, decryption device, program, and integrated circuit | |||
| 517 | 7769167 | Weil and Tate pairing techniques using parabolas | |||
| 518 | 7760873 | Method and a system for a quick verification rabin signature scheme | |||
| 519 | 7758422 | Hard drive authentication | |||
| 520 | 7752447 | Information-processing system and method, information-transmission-processing apparatus, and information-reception-processing apparatus | |||
| 521 | 7751558 | Certificate-based encryption and public key infrastructure | |||
| 522 | 7739504 | Signature generation apparatus and signature verification apparatus | |||
| 523 | 7734932 | System and method for securing executable code | |||
| 524 | 7715563 | Rapid acquisition of state vectors in an encrypted data communication system | |||
| 525 | 7707420 | Public key encryption with digital signature scheme | |||
| 526 | 7698736 | Secure delegation using public key authentication | |||
| 527 | 7694329 | Secure delegation using public key authentication | |||
| 528 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
| 529 | 7688973 | Encryption apparatus, decryption apparatus, key generation apparatus, program, and method | |||
| 530 | 7685414 | Subscription management service for secure messaging system | |||
| 531 | 7681031 | Method and apparatus to provide authentication code | |||
| 532 | 7680280 | Electronic device, control method thereof, security program and others | |||
| 533 | 7680272 | Inverse calculation circuit, inverse calculation method, and storage medium encoded with computer-readable computer program code | |||
| 534 | 7680271 | Zero-knowledge proof cryptography methods and devices | |||
| 535 | 7680270 | System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication | |||
| 536 | 7673142 | Efficient method for providing secure remote access | |||
| 537 | 7664269 | Encrypting message for secure transmission | |||
| 538 | 7664260 | Signature generation device, key generation device, and signature generation method | |||
| 539 | 7664259 | Encryption and verification using partial public key | |||
| 540 | 7664258 | Randomized sparse formats for efficient and secure computation on elliptic curves | |||
| 541 | 7660989 | System for, and method of, authenticating an electronic message to a recipient | |||
| 542 | 7657748 | Certificate-based encryption and public key infrastructure | |||
| 543 | 7657029 | Systems and methods for generating random addition chains | |||
| 544 | 7649991 | Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack | |||
| 545 | 7647498 | Device authentication | |||
2009 | |||||
| 546 | 7640427 | System and method for secure electronic communication in a partially keyless environment | |||
| 547 | 7639806 | Fingerprinting digital devices using electromagnetic characteristics of their communications | |||
| 548 | 7639799 | Cryptographically processing data based on a Cassels-Tate pairing | |||
| 549 | 7636441 | Method for secure key exchange | |||
| 550 | 7634091 | System and method of hiding cryptographic private keys | |||
| 551 | 7634087 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
| 552 | 7631183 | System and method for retrieving related certificates | |||
| 553 | 7623655 | Computing modular polynomials modulo large primes | |||
| 554 | 7609834 | Personal authenticating multi-function peripheral | |||
| 555 | 7596689 | Secure and reliable document delivery using routing lists | |||
| 556 | 7594261 | Cryptographic applications of the Cartier pairing | |||
| 557 | 7593527 | Providing digital signature and public key based on shared knowledge | |||
| 558 | 7593526 | Method and apparatus for compressing rabin signatures | |||
| 559 | 7590236 | Identity-based-encryption system | |||
| 560 | 7590235 | Reduction calculations in elliptic curve cryptography | |||
| 561 | 7587045 | System and method for securing document transmittal | |||
| 562 | 7571320 | Circuit and method for providing secure communications between devices | |||
| 563 | 7567669 | Strengthened public key protocol | |||
| 564 | 7562223 | Multifunction device with secure job release | |||
| 565 | 7551737 | Cryptographic keys using random numbers instead of random primes | |||
| 566 | 7539861 | Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip card | |||
| 567 | 7536011 | Tamper-proof elliptic encryption with private key | |||
| 568 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
| 569 | 7512800 | Key management technique for establishing a secure channel | |||
| 570 | 7512233 | Method and apparatus for computing a shared secret key | |||
| 571 | 7508936 | Hardware accelerator for elliptic curve cryptography | |||
| 572 | 7505585 | Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same | |||
| 573 | 7503060 | Reactive system safety verification device, method, program, and recording medium containing the program | |||
| 574 | 7499544 | Use of isogenies for design of cryptosystems | |||
| 575 | 7492897 | Conditional access system for broadcast digital television | |||
| 576 | 7486789 | Device and method for calculation on elliptic curve | |||
| 577 | 7480380 | Method for efficient generation of modulo inverse for public key cryptosystems | |||
| 578 | 7478239 | Electronic ticket vending system | |||
2008 | |||||
| 579 | 7471792 | Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus | |||
| 580 | 7461406 | Access control for digital content | |||
| 581 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
| 582 | 7457408 | Calculation unit for executing a cryptographic protocol | |||
| 583 | 7450719 | Gigabit Ethernet-based passive optical network and data encryption method | |||
| 584 | 7447311 | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |||
| 585 | 7436957 | Audio cassette emulator with cryptographic media distribution control | |||
| 586 | 7434052 | Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream | |||
| 587 | 7434050 | Efficient method for providing secure remote access | |||
| 588 | 7428749 | Secure delegation using public key authorization | |||
| 589 | 7424114 | Method for enhancing security of public key encryption schemas | |||
| 590 | 7421074 | Security system using RSA algorithm and method thereof | |||
| 591 | 7412061 | Encrypting a digital object on a key ID selected therefor | |||
| 592 | 7409553 | Public key certificate generation method, validation method and apparatus thereof | |||
| 593 | 7409543 | Method and apparatus for using a third party authentication server | |||
| 594 | 7406089 | Data verification using signature | |||
| 595 | 7404078 | Methods and apparatus for private certificates in public key cryptography | |||
| 596 | 7397917 | Method and apparatus for generating a cryptographic key | |||
| 597 | 7395431 | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method | |||
| 598 | 7386123 | Method of implementing in an electronic component a cryptographic algorithm for finding the public exponent | |||
| 599 | 7386122 | Method for proving the authenticity or integrity of a message by means of a public exponent equal to the power of two | |||
| 600 | 7382877 | RSA cryptographic method and system | |||
| 601 | 7379550 | Method for the computer-assisted production of public keys for encoding information and device for carrying out said method | |||
| 602 | 7373521 | Semiconductor IC, information processing method, information processing device, and program storage medium | |||
| 603 | 7359508 | Method of securely implementing a cryptography algorithm of the RSA type, and a corresponding component | |||
| 604 | 7356847 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software | |||
| 605 | 7356140 | Encrypting device, decrypting device, cryptosystem including the same devices, encrypting method, and decrypting method | |||
| 606 | 7350086 | Creation of image file | |||
| 607 | 7349538 | Hierarchical identity-based encryption and signature schemes | |||
| 608 | 7346159 | Generic modular multiplier using partial reduction | |||
| 609 | 7340606 | Digital certificates | |||
| 610 | 7340061 | Information processing apparatus, information processing method and providing medium | |||
| 611 | 7337315 | Efficient certificate revocation | |||
| 612 | 7336791 | Information processing apparatus | |||
| 613 | 7330549 | Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function | |||
| 614 | 7316028 | Method and system for transmitting information across a firewall | |||
2007 | |||||
| 615 | 7308572 | Method of printing a document | |||
| 616 | 7302703 | Hardware token self enrollment process | |||
| 617 | 7298839 | Squared Weil and Tate pairing techniques for use with elliptic curves | |||
| 618 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
| 619 | 7287164 | Method and system for encoding signatures to authenticate files | |||
| 620 | 7286666 | Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm | |||
| 621 | 7286665 | System and method for transferring the right to decode messages | |||
| 622 | 7266197 | Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors | |||
| 623 | 7263185 | Key based decipher including its generation, distribution and usage | |||
| 624 | 7254718 | Tamper-resistant processing method | |||
| 625 | 7251728 | Secure and reliable document delivery using routing lists | |||
| 626 | 7236590 | Method and apparatus for protecting data | |||
| 627 | 7233662 | Numerical array output device, a numerical array output method, an encryption device, and a decryption device | |||
| 628 | 7228430 | Security system for preventing a personal computer from being used by an unauthorized people | |||
| 629 | 7213158 | Distributed autonomic backup | |||
| 630 | 7206936 | Revocation and updating of tokens in a public key infrastructure system | |||
| 631 | 7197637 | Authorization process using a certificate | |||
| 632 | 7184547 | Authenticating or signature method with reduced computations | |||
| 633 | 7178035 | Write once system and method for facilitating digital encrypted transmissions | |||
| 634 | 7174016 | Modular exponentiation algorithm in an electronic component using a public key encryption algorithm | |||
| 635 | 7171000 | Simplified addressing for private communications | |||
| 636 | 7167565 | Efficient techniques for sharing a secret | |||
| 637 | 7165180 | Monolithic semiconductor device for preventing external access to an encryption key | |||
| 638 | 7165174 | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management | |||
| 639 | 7162033 | Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm | |||
| 640 | 7159121 | Transmission of information to a reproduction device having user identification by organism information of a specified type | |||
2006 | |||||
| 641 | 7152158 | Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium | |||
| 642 | 7146009 | Secure electronic messaging system requiring key retrieval for deriving decryption keys | |||
| 643 | 7139396 | Koblitz exponentiation with bucketing | |||
| 644 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
| 645 | 7130422 | Information security device, prime number generation device, and prime number generation method | |||
| 646 | 7127063 | Method and apparatus for computing a shared secret key | |||
| 647 | 7114070 | System and method for automatic digital certificate installation on a network device in a data-over-cable system | |||
| 648 | 7113595 | Generation of a random number that is non-divisible by a set of prime numbers | |||
| 649 | 7096352 | Security protocol structure in application layer | |||
| 650 | 7088822 | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith | |||
| 651 | 7088821 | Absolute public key cryptographic system and method surviving private-key compromise with other advantages | |||
| 652 | 7085383 | Secured cellular telephone communications system, method, and computer program product | |||
| 653 | 7082538 | Electronically verified digital signature and document delivery system and method | |||
| 654 | 7080254 | Method, system, device for proving authenticity of an entity or integrity of a message | |||
| 655 | 7073057 | Method and apparatus for obtaining status of public key certificate updates | |||
| 656 | 7058808 | Method for making a blind RSA-signature and apparatus therefor | |||
| 657 | 7054445 | Authentication method and schemes for data integrity protection | |||
| 658 | 7039816 | Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content | |||
| 659 | 7035405 | Method for establishing a common key between a central station and a group of subscribers | |||
| 660 | 7016498 | Encrypting a digital object on a key ID selected therefor | |||
| 661 | 7010692 | Cryptographic methods for remote authentication | |||
| 662 | 6996711 | Certification validation system | |||
| 663 | 6993136 | Cryptographic key exchange method using efficient elliptic curve | |||
2005 | |||||
| 664 | 6968060 | Method for verifying the use of public keys generated by an on-board system | |||
| 665 | 6959091 | Cryptography private key storage and recovery method and apparatus | |||
| 666 | 6957333 | System and method for encrypted communications between electronic devices | |||
| 667 | 6956950 | Computer readable medium having a private key encryption program | |||
| 668 | 6956947 | Extraction of multiple single keys from a compressed key | |||
| 669 | 6956946 | Method and device for cryptographic processing with the aid of an elliptic curve on a computer | |||
| 670 | 6952476 | Verification of the private components of a public-key cryptographic system | |||
| 671 | 6950948 | Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections | |||
| 672 | 6948065 | Platform and method for securely transmitting an authorization secret | |||
| 673 | 6948064 | Method and apparatus for providing public key security control for a cryptographic processor | |||
| 674 | 6944300 | Method for migrating a base chip key from one computer system to another | |||
| 675 | 6940980 | High security cryptosystem | |||
| 676 | 6940979 | Management of certificates for public key infrastructure | |||
| 677 | 6937728 | Verifiable anonymous channel | |||
| 678 | 6937726 | System and method for protecting data files by periodically refreshing a decryption key | |||
| 679 | 6934392 | Split-key key-agreement protocol | |||
| 680 | 6934389 | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus | |||
| 681 | 6931126 | Non malleable encryption method and apparatus using key-encryption keys and digital signature | |||
| 682 | 6928546 | Identity verification method using a central biometric authority | |||
| 683 | 6925182 | Administration and utilization of private keys in a networked environment | |||
| 684 | 6922785 | Apparatus and a method for secure communications for network computers | |||
| 685 | 6912657 | Method and arrangement in a communication network | |||
| 686 | 6912656 | Method and apparatus for sending encrypted electronic mail through a distribution list exploder | |||
| 687 | 6912654 | Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system | |||
| 688 | 6912285 | Mechanism for efficient private bulk messaging | |||
| 689 | 6909786 | Cryptographic trap door with timed lock and controlled escrow | |||
| 690 | 6909702 | Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system | |||
| 691 | 6898288 | Method and system for secure key exchange | |||
| 692 | 6898287 | Cryptographic system using chaotic dynamics | |||
| 693 | 6886098 | Systems and methods for compression of key sets having multiple keys | |||
| 694 | 6886096 | Identity-based encryption system | |||
| 695 | 6876745 | Method and apparatus for elliptic curve cryptography and recording medium therefore | |||
| 696 | 6873977 | Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries | |||
| 697 | 6873706 | Processing apparatus, program, or system of secret information | |||
| 698 | 6868160 | System and method for providing secure sharing of electronic data | |||
| 699 | 6851049 | Method and apparatus for facilitating secure anonymous email recipients | |||
| 700 | 6839839 | Public key distribution using an approximate linear function | |||
| 701 | 6839838 | Data management system, information processing apparatus, authentification management apparatus, method and storage medium | |||
| 702 | 6839437 | Method and apparatus for managing keys for cryptographic operations | |||
2004 | |||||
| 703 | 6834272 | Privacy preserving negotiation and computation | |||
| 704 | 6834112 | Secure distribution of private keys to multiple clients | |||
| 705 | 6816970 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
| 706 | 6816966 | Techniques for securing data flow in internet multicasting | |||
| 707 | 6813358 | Method and system for timed-release cryptosystems | |||
| 708 | 6813357 | Exclusive key sharing method | |||
| 709 | 6804782 | Countermeasure to power attack and timing attack on cryptographic operations | |||
| 710 | 6801999 | Passive and active software objects containing bore resistant watermarking | |||
| 711 | 6798884 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
| 712 | 6789195 | Secure data processing method | |||
| 713 | 6788788 | Cryptographic communication method, encryption method, and cryptographic communication system | |||
| 714 | 6785388 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
| 715 | 6782100 | Accelerated finite field operations on an elliptic curve | |||
| 716 | 6779111 | Indirect public-key encryption | |||
| 717 | 6778666 | Cryptographic method using construction of elliptic curve cryptosystem | |||
| 718 | 6754820 | Multiple level access system | |||
| 719 | 6751318 | Method and apparatus for digital signature authentication | |||
| 720 | 6744894 | Data management system | |||
| 721 | 6741991 | Data management system | |||
| 722 | 6731755 | Split-key cryptographic system and method | |||
| 723 | 6724894 | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same | |||
| 724 | 6721887 | Data copyright management system | |||
| 725 | 6721421 | Method for encrypting information represented as a numerical value | |||
| 726 | 6718468 | Method for associating a password with a secured public/private key pair | |||
| 727 | 6715073 | Secure server using public key registration and methods of operation | |||
| 728 | 6711263 | Secure distribution and protection of encryption key information | |||
| 729 | 6707801 | Method and apparatus for data transport in a wireless communication system | |||
| 730 | 6697488 | Practical non-malleable public-key cryptosystem | |||
| 731 | 6694025 | Method and apparatus for secure distribution of public/private key pairs | |||
| 732 | 6687822 | Method and system for providing translation certificates | |||
| 733 | 6683955 | Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels | |||
| 734 | 6683953 | Encoding method, encoding-decoding apparatus, and code communications system | |||
| 735 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2003 | |||||
| 736 | 6665405 | Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields | |||
| 737 | 6658569 | Secret key cryptographic process for protecting a computer system against attacks by physical analysis | |||
| 738 | 6618483 | Elliptic curve encryption systems | |||
| 739 | 6614909 | Methods, systems, and circuits for generating keys for public key cryptosystems using parallel processing for modular operations of IC cards | |||
| 740 | 6603445 | Method and apparatus for factoring large numbers with optoelectronic devices | |||
| 741 | 6598163 | Flash mixing apparatus and method | |||
| 742 | 6587946 | Method and system for quorum controlled asymmetric proxy encryption | |||
| 743 | 6587563 | Cryptographic system using chaotic dynamics | |||
| 744 | 6564322 | Method and apparatus for watermarking with no perceptible trace | |||
| 745 | 6560336 | Apparatus for operating double vector and encrypting system including the same | |||
| 746 | 6553493 | Secure mapping and aliasing of private keys used in public key cryptography | |||
| 747 | 6550009 | Encryption system for distributing a common crypt key | |||
| 748 | 6530020 | Group oriented public key encryption and key management system | |||
| 749 | 6523116 | Secure personal information card database system | |||
| 750 | 6507656 | Non malleable encryption apparatus and method | |||
2002 | |||||
| 751 | 6496929 | Generating RSA moduli including a predetermined portion | |||
| 752 | 6490352 | Cryptographic elliptic curve apparatus and method | |||
| 753 | 6480831 | Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center | |||
| 754 | 6480606 | Elliptic curve encryption method and system | |||
| 755 | 6480605 | Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon | |||
| 756 | 6477254 | Network system using a threshold secret sharing method | |||
| 757 | 6463536 | Data copyright management system | |||
| 758 | 6459791 | Public key cryptography method | |||
| 759 | 6446205 | Cryptosystems with elliptic curves chosen by users | |||
| 760 | 6446051 | Document transfer systems | |||
| 761 | 6430292 | System and method for controlling disclosure time of information | |||
| 762 | 6412072 | Parasitically powered microprocessor capable of transmitting data over a single data line and ground | |||
| 763 | 6411715 | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key | |||
| 764 | 6404890 | Generating RSA moduli including a predetermined portion | |||
| 765 | 6401204 | Process for cryptographic code management between a first computer unit and a second computer unit | |||
| 766 | 6396926 | Scheme for fast realization of encrytion, decryption and authentication | |||
| 767 | 6385318 | Encrypting method, deciphering method and certifying method | |||
| 768 | 6385317 | Method for providing a secure communication between two devices and application of this method | |||
| 769 | 6381699 | Leak-resistant cryptographic method and apparatus | |||
| 770 | 6381331 | Information sending system and method for sending encrypted information | |||
| 771 | 6378072 | Cryptographic system | |||
| 772 | 6377689 | Key transmission system | |||
| 773 | 6377688 | Cryptographic communication method and system | |||
| 774 | 6373946 | Communication security | |||
| 775 | 6370250 | Method of authentication and storage of private keys in a public key cryptography system (PKCS) | |||
| 776 | 6366673 | Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks | |||
| 777 | 6363480 | Ephemeral decryptability | |||
| 778 | 6351536 | Encryption network system and method | |||
| 779 | 6345098 | Method, system and apparatus for improved reliability in generating secret cryptographic variables | |||
| 780 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
| 781 | 6339824 | Method and apparatus for providing public key security control for a cryptographic processor | |||
| 782 | 6337909 | Generation of session keys for El Gamal-like protocols from low hamming weight integers | |||
2001 | |||||
| 783 | 6330674 | Use of biometrics as a methodology for defining components for ECC encryption | |||
| 784 | 6330332 | Prime number generation apparatus B-smoothness judgement apparatus and computer memory product | |||
| 785 | 6317833 | Practical mix-based election scheme | |||
| 786 | 6311270 | Method and apparatus for securing communication utilizing a security processor | |||
| 787 | 6307938 | Method, system and apparatus for generating self-validating prime numbers | |||
| 788 | 6307935 | Method and apparatus for fast elliptic encryption with direct embedding | |||
| 789 | 6304658 | Leak-resistant cryptographic method and apparatus | |||
| 790 | 6298137 | Ring-based public key cryptosystem method | |||
| 791 | 6292895 | Public key cryptosystem with roaming user capability | |||
| 792 | 6292892 | Apparatus and method for providing secured communications | |||
| 793 | 6289454 | Memory configuration which support multiple cryptographical algorithms | |||
| 794 | 6285760 | Method and apparatus for digital signature authentication | |||
| 795 | 6275936 | Decryption method and device, and access right authentication method and apparatus | |||
| 796 | 6272635 | Data copyright management system | |||
| 797 | 6263446 | Method and apparatus for secure distribution of authentication credentials to roaming users | |||
| 798 | 6259790 | Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion | |||
| 799 | 6240187 | Key replacement in a public key cryptosystem | |||
| 800 | 6237097 | Robust efficient distributed RSA-key generation | |||
| 801 | 6230269 | Distributed authentication system and method | |||
| 802 | 6219789 | Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities | |||
| 803 | 6215877 | Key management server, chat system terminal unit, chat system and recording medium | |||
| 804 | 6212277 | Elliptic curve transformation device, utilization device and utilization system | |||
| 805 | 6195433 | Private key validity and validation | |||
| 806 | 6192472 | Method and apparatus for the secure distributed storage and retrieval of information | |||
| 807 | 6185685 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
| 808 | 6185546 | Apparatus and method for providing secured communications | |||
| 809 | 6170058 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use | |||
2000 | |||||
| 810 | 6154543 | Public key cryptosystem with roaming user capability | |||
| 811 | 6154541 | Method and apparatus for a robust high-speed cryptosystem | |||
| 812 | 6151676 | Administration and utilization of secret fresh random numbers in a networked environment | |||
| 813 | 6144740 | Method for designing public key cryptosystems against fault-based attacks with an implementation | |||
| 814 | 6141422 | Secure cryptographic multi-exponentiation method and coprocessor subsystem | |||
| 815 | 6141420 | Elliptic curve encryption systems | |||
| 816 | 6134431 | Personal station authentication system and authentication method | |||
| 817 | 6134325 | Key transmission system | |||
| 818 | 6125185 | System and method for encryption key generation | |||
| 819 | 6111956 | Method for secure key distribution over a nonsecure communications network | |||
| 820 | 6111952 | Asymmetrical cryptographic communication method and portable object therefore | |||
| 821 | 6108419 | Differential fault analysis hardening apparatus and evaluation method | |||
| 822 | 6098056 | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet | |||
| 823 | 6091819 | Accelerating public-key cryptography by precomputing randomly generated pairs | |||
| 824 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
| 825 | 6081793 | Method and system for secure computer moderated voting | |||
| 826 | 6081598 | Cryptographic system and method with fast decryption | |||
| 827 | 6081597 | Public key cryptosystem method and apparatus | |||
| 828 | 6078667 | Generating unique and unpredictable values | |||
| 829 | 6075864 | Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem | |||
| 830 | 6073125 | Token key distribution system controlled acceptance mail payment and evidencing system | |||
| 831 | 6072876 | Method and system for depositing private key used in RSA cryptosystem | |||
| 832 | 6049610 | Method and apparatus for digital signature authentication | |||
| 833 | 6047072 | Method for secure key distribution over a nonsecure communications network | |||
| 834 | 6038317 | Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l | |||
| 835 | 6035041 | Optimal-resilience, proactive, public-key cryptographic system and method | |||
| 836 | 6026163 | Distributed split-key cryptosystem and applications | |||
1999 | |||||
| 837 | 6005943 | Electronic identifiers for network terminal devices | |||
| 838 | 5999629 | Data encryption security module | |||
| 839 | 5991415 | Method and apparatus for protecting public key schemes from timing and fault attacks | |||
| 840 | 5991414 | Method and apparatus for the secure distributed storage and retrieval of information | |||
| 841 | 5987133 | Electronic authentication system | |||
| 842 | 5987124 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
| 843 | 5974151 | Public key cryptographic system having differential security levels | |||
| 844 | 5974141 | Data management system | |||
| 845 | 5960087 | Distributed garbage collection system and method | |||
| 846 | 5956408 | Apparatus and method for secure distribution of data | |||
| 847 | 5956407 | Public key cryptographic system having nested security levels | |||
| 848 | 5956406 | Method of setting up secure communications and associated encryption/decryption system | |||
| 849 | 5933503 | Controlled modular cryptography apparatus and method | |||
| 850 | 5915018 | Key management system for DVD copyright management | |||
| 851 | 5909491 | Method for sending a secure message in a telecommunications system | |||
| 852 | 5905799 | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
| 853 | 5870470 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
| 854 | 5864667 | Method for safe communications | |||
1998 | |||||
| 855 | 5850450 | Method and apparatus for encryption key creation | |||
| 856 | 5850444 | Method and apparatus for encrypting radio traffic in a telecommunications network | |||
| 857 | 5850443 | Key management system for mixed-trust environments | |||
| 858 | 5848159 | Public key cryptographic apparatus and method | |||
| 859 | 5838792 | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
| 860 | 5835598 | Public key method of encoding data | |||
| 861 | 5832207 | Secure module with microprocessor and co-processor | |||
| 862 | 5832091 | Fingerprint controlled public key cryptographic system | |||
| 863 | 5825300 | Method of protected distribution of keying and certificate material | |||
| 864 | 5805712 | Apparatus and method for providing secured communications | |||
| 865 | 5805703 | Method and apparatus for digital signature authentication | |||
| 866 | 5799088 | Non-deterministic public key encrypton system | |||
| 867 | 5796840 | Apparatus and method for providing secured communications | |||
| 868 | 5796833 | Public key sterilization | |||
| 869 | 5790675 | Cryptographic communication process | |||
| 870 | 5768389 | Method and system for generation and management of secret key of public key cryptosystem | |||
| 871 | 5764768 | Blind encryption | |||
| 872 | 5761311 | Blind encryption | |||
| 873 | 5761310 | Communication system for messages enciphered according to an RSA-type procedure | |||
| 874 | 5761307 | Method for securing data in a telecommunications system | |||
| 875 | 5761306 | Key replacement in a public key cryptosystem | |||
| 876 | 5751813 | Use of an encryption server for encrypting messages | |||
| 877 | 5751808 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
| 878 | 5748735 | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |||
| 879 | 5745571 | Cryptographic communications method and system | |||
| 880 | 5740250 | Tame automorphism public key system | |||
| 881 | 5737425 | Cryptosystem employing worst-case difficult-to solve lattice problem | |||
| 882 | 5737424 | Method and system for secure distribution of protected data using elliptic curve systems | |||
| 883 | 5737420 | Method for secure data transmission between remote stations | |||
| 884 | 5737419 | Computer system for securing communications using split private key asymmetric cryptography | |||
| 885 | 5712800 | Broadcast key distribution apparatus and method using chinese remainder | |||
1997 | |||||
| 886 | 5680460 | Biometric controlled key generation | |||
| 887 | 5680458 | Root key compromise recovery | |||
| 888 | 5666419 | Encryption device and communication apparatus using same | |||
| 889 | 5663896 | Broadcast key distribution apparatus and method using Chinese Remainder | |||
| 890 | 5651066 | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information | |||
| 891 | 5638445 | Blind encryption | |||
| 892 | 5625692 | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing | |||
| 893 | 5604801 | Public key data communications system under control of a portable security device | |||
1996 | |||||
| 894 | 5588061 | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
| 895 | 5586186 | Method and system for controlling unauthorized access to information distributed to users | |||
| 896 | 5581616 | Method and apparatus for digital signature authentication | |||
| 897 | 5577124 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
| 898 | 5577123 | Public-key cryptographic apparatus handling ciphertext by public-key | |||
| 899 | 5563950 | System and methods for data encryption using public key cryptography | |||
| 900 | 5559889 | System and methods for data encryption using public key cryptography | |||
| 901 | 5557678 | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
| 902 | 5552897 | Secure communication apparatus and method | |||
| 903 | 5541994 | Fingerprint controlled public key cryptographic system | |||
| 904 | 5539828 | Apparatus and method for providing secured communications | |||
| 905 | 5535276 | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | |||
| 906 | 5499299 | Modular arithmetic operation system | |||
| 907 | 5497423 | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication | |||
1995 | |||||
| 908 | 5463690 | Method and apparatus for public key exchange in a cryptographic system | |||
| 909 | 5442706 | Secure mobile storage | |||
1994 | |||||
| 910 | 5373560 | Partial modular reduction method | |||
| 911 | 5371794 | Method and apparatus for privacy and authentication in wireless networks | |||
| 912 | 5369708 | Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device | |||
| 913 | 5351298 | Cryptographic communication method and apparatus | |||
| 914 | 5351297 | Method of privacy communication using elliptic curves | |||
| 915 | 5297206 | Cryptographic method for communication and electronic signatures | |||
| 916 | 5295188 | Public key encryption and decryption circuitry and method | |||
| 917 | 5289542 | Caller identification system with encryption | |||
1993 | |||||
| 918 | 5274707 | Modular exponentiation and reduction device and method | |||
| 919 | 5272755 | Public key cryptosystem with an elliptic curve | |||
| 920 | 5271061 | Method and apparatus for public key exchange in a cryptographic system | |||
| 921 | 5241599 | Cryptographic protocol for secure communications | |||
| 922 | 5220604 | Method for performing group exclusion in hierarchical group structures | |||
| 923 | 5202921 | Method and apparatus for authenticating users of a communication system to each other | |||
| 924 | 5201000 | Method for generating public and private key pairs without using a passphrase | |||
| 925 | 5199070 | Method for generating a public key | |||
1992 | |||||
| 926 | 5159632 | Method and apparatus for public key exchange in a cryptographic system | |||
| 927 | 5146500 | Public key cryptographic system using elliptic curves over rings | |||
| 928 | 5144665 | Cryptographic communication method and system | |||
| 929 | 5142579 | Public key cryptographic system and method | |||
| 930 | 5142577 | Method and apparatus for authenticating messages | |||
| 931 | 5136642 | Cryptographic communication method and cryptographic communication device | |||
| 932 | 5124117 | Cryptographic key distribution method and system | |||
| 933 | 5121429 | Digital signal processing | |||
1991 | |||||
| 934 | 5073935 | Method for secure communication | |||
| 935 | 5073934 | Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key | |||
| 936 | 5068895 | Encryption and decryption methods using bit-length preservation decryptor | |||
| 937 | 5054066 | Error correcting public key cryptographic method and program | |||
| 938 | 5046094 | Server-aided computation method and distributed information processing unit | |||
1990 | |||||
| 939 | 4969190 | Encrypting system of data | |||
| 940 | 4964164 | RSA computation method for efficient batch processing | |||
| 941 | 4949379 | Process for encrypted information transmission | |||
| 942 | 4944007 | Public key diversification method | |||
| 943 | 4926480 | Card-computer moderated systems | |||
1989 | |||||
| 944 | 4888801 | Hierarchical key management system | |||
| 945 | 4870681 | Cryptographic method and cryptographic processor for carrying out the method | |||
| 946 | 4841570 | One-way transformation of information | |||
| 947 | 4807288 | Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system | |||
1988 | |||||
| 948 | 4736423 | Technique for reducing RSA Crypto variable storage | |||
1987 | |||||
| 949 | 4703503 | Cryptographic system using pseudocomplements of vector Boolean algebra | |||
| 950 | 4658094 | Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer | |||
1986 | |||||
| 951 | 4633036 | Method and apparatus for use in public-key data encryption system | |||
| 952 | 4567600 | Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission | |||
1985 | |||||
| 953 | 4532638 | Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encoding and decoding digitally-represented messages | |||
| 954 | 4514592 | Cryptosystem | |||
1984 | |||||
| 955 | 4471164 | Stream cipher operation using public key cryptosystem | |||
| 956 | 4424414 | Exponentiation cryptographic apparatus and method | |||
1983 | |||||
| 957 | 4405829 | Cryptographic communications system and method | |||
| 958 | 4399323 | Fast real-time public key cryptography | |||
1982 | |||||
| 959 | 4351982 | RSA Public-key data encryption system having large random prime number generating microprocessor or the like | |||
1981 | |||||
| 960 | 4306111 | Simple and effective public-key cryptosystem | |||
1980 | |||||
| 961 | 4218582 | Public key cryptographic apparatus and method | |||
| © 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 | |||||