СПИСОК патентов США - подгруппа МПК H04K1/00



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19608808Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof
29602925Multi-stream-multipoint-jack audio streaming
39602273Implementing key scheduling for white-box DES implementation
49602222Techniques for securing body-based communications
59600421Systems and methods for low-latency encrypted storage
69596598Reducing detectability of an encryption key
79596177Method for a retransmission roundtrip correction
89596049Secure open-air communication system utilizing multi-channel decoyed transmission
99584311Decrypting data
109577822Secure bitstream authentication
119577784System, device, and method for securing voice authentication and end-to-end speech interaction
129571506Dynamic enterprise security control based on user risk factors
139569907System and method for the automated processing of physical objects
149565556User managed number privacy and call accessibility
159565230System and method of encrypted media encapsulation
169565017Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks
179565016Protection of the execution of an algorithm against side-channel attacks
189563993Single sign-on process
199560022Avoiding collection of biometric data without consent
209554419Pairing method and apparatus for ad-hoc connection in wireless communication terminal
219544766System and method for authentication and key exchange for a mobile device via spectrally confined wireless communications
229544277KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages
239544276Method for transmitting and receiving a multimedia content
249544154Method of authenticating a device
259537944Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network
269537652Polymorphic encryption key allocation scheme

2016

279532214Apparatus and method for generating key hierarchy in wireless network
289529465Secure interaction with input devices
299526071Method and apparatus for operating wake on WLAN
309526007Location brokering for providing security, privacy and services
319524404Program execution device
329521500Portable electronic device with directional microphones for stereo recording
339520995Efficient prime-number check
349520991Apparatus for handling bills and/or coins, and method for initializing and operating such an apparatus
359519773Returning to a control transfer instruction
369516066Rights management services integration with mobile device management
379516000Runtime instantiation of broadcast encryption schemes
389513606Safety systems and methods for production environments
399510192Method and apparatus for securing a mobile application
409509512Message digest generator
419509504Cryptographic key manager for application servers
429509414Encryption and decryption method and device
439503434Single-pass data compression and encryption
449497632System and method for pairing a UICC card with a particular mobile communications device
459491621Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes
469490977Method and apparatus for enabling physical layer secret key generation
479490972Method and apparatus for providing conditional access based on channel characteristics
489490925DMB terminal for enabling simultaneous DMB viewing and phone call and method therefor
499485093Push button configuration pairing
509483656Efficient and secure data storage utilizing a dispersed data storage system
519479334Method, system, and terminal for communication between cluster system encryption terminal and encryption module
529473297Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
539467288Encryption key destruction for secure data erasure
549462463Method of controlling states of mobile node and verifier therein for receiving secret key
559461974System and method to merge encrypted signals in distributed communication system
569451453Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
579450661Method and apparatus for beam tracking in wireless communication system
589444670Method and apparatus for transmitting and receiving signal based on interference
599437196Working method of sound transmission-based dynamic token
609436821Systems and methods for detecting attempts to transmit sensitive information via data-distribution channels
619432192Content aware hierarchical encryption for secure storage systems
629429603Method and device for detecting aircraft radio signals transmitted in the same channel simultaneously
639420429Techniques for trusted location application and location provider communications
649419795Digital device and method for performing secure communication using same
659414233Method for managing profile of Embedded UICC, and Embedded UICC, Embedded UICC-equipped terminal, provision method, and method for changing MNO using same
669414193Communicating RF fingerprint-based geofences
679413882System and method for enabling encrypted voice communications between an external device and telephony devices associated with an enterprise network
689413786Dynamic enterprise security control based on user risk factors
699411944Biometric access sensitivity
709402270Secure device bootstrap identity
719401920Black core network system and method
729401913Updating stored passwords
739401805Encrypting device, encrypting method, and recording medium
749400714Wirelessly communicating a data file
759397793Method for securely transmitting packets for wireless telecommunications system
769392451Systems/methods of conducting a financial transaction using a smartphone
779392449Communication system, communication unit, and communication method
789385867Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program
799385865Correcting deciphering mis-synchronization in a mobile communication terminal
809379888Powerline communication network analyzer
819374706Wireless sensor network and central node device thereof
829369945Wireless network system and wireless communication method for switching a wireless network mode
839363079Method of generating message authentication code and authentication device and authentication request device using the method
849363076Implementing encrypted content in a game
859363034Method to encrypt information that is transferred between two communication units
869357432Media streaming with high rate availability
879356785Method and system for security enhancement for mobile communications
889356778Secured communication for local area network
899351157Methods, systems, and devices to reduce audio truncation during transcoding
909350547Systems and methods for watermarking software and other media
919344895Method and system for securely accessing portable hotspot for intelligent mobile phones
929344412Security key management in IMS-based multimedia broadcast and multicast services (MBMS)
939344317OFDM signal modulation-demodulation method, device and system based on compressed sensing
949344277Mass serialization analytics
959344274Method and system for encrypting data
969344273Cryptographic device for implementing S-box
979338166System and method for a single request and single response authentication protocol
989332429Systems/methods of adaptively varying a spectral content of communications
999319353Network task offload apparatus and method thereof
1009317987Safe with controllable data transfer capability
1019313802Communication of security key information
1029313181System and method to merge encrypted signals in distributed communication system
1039313180Systems and methods for quantum key generation
1049307091Method and apparatus for the secure storage of audio signals
1059306738Managed secure computations on encrypted data
1069301147Method, apparatus, and system for data protection on interface in communications system
1079294915Localized network authentication and security using tamper-resistant keys
1089294913Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks
1099294429Method and system for providing service for searching friends
1109294278Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same
1119294277Audio encryption systems and methods
1129288527Multimedia presentation through an extended connectivity apparatus configured via near-field communication (NFC)
1139288045Spectral and temporal stealthy fiber optic communication using sampling and phase encoding detection systems
1149288043Methods and systems for providing high-security cryptographic keys to mobile radios
1159286792Wireless portable activity-monitoring device syncing
1169286490Systems and methods for providing conditional access to transmitted information
1179281945Offline methods for authentication in a client/server authentication system
1189277402Systems and methods for secure high-speed link maintenance via NFC
1199276748Data-encrypting method and decrypting method for a mobile phone
1209275512Secure communications in gaming system
1219275202Data processing method
1229271256Verifying generic broadcast of location assistance data
1239270859Utilizing data reduction in steganographic and cryptographic systems
1249270457Optimizing security bits in a media access control (MAC) header
1259264294HAIPE peer discovery using BGP
1269262656Multi-protocol RFID system
1279258714Broadcast replenishment of account parameters for groups of wireless devices
1289258141Supplemental mobile communication device
1299258116System and methods for permitting open access to data objects and for securing data within the data objects
1309252954Efficient homomorphic encryption scheme for bilinear forms
1319251723Systems and methods of multidimensional encrypted data transfer
1329251377Instructions processors, methods, and systems to process secure hash algorithms
1339246602Quantum encryption communication apparatus, quantum encryption communication method, and quantum encryption communication system
1349237169Network stream identification for open FaceTime
1359237008Encryption device, encryption method, and encryption program
1369237007Secure modulation and demodulation
1379232260Extended connectivity multimedia apparatus, multimedia presentation system, and method of transporting credentials obtained via near-field communication (NFC)
1389232259Apparatus, system, and method to extend functionality in multimedia presentation device
1399232258Apparatus,system, and method to extend connectivity in multimedia presentation device
1409231762Method of secure communication, controlled device, and control program
1419229687Private two-party computation using partially homomorphic encryption

2015

1429225518Method of providing fresh keys for message authentication
1439224272Method of secure data communication
1449224019Electromagnetic interference device identification system and method
1459219752Data leak prevention systems and methods
1469219605Quantum key distribution
1479219602Method and system for securely computing a base point in direct anonymous attestation
1489218700Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs
1499218485Program execution device
1509215069Methods and apparatus for device authentication with one-time credentials
1519215067Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
1529203619Online data transformation
1539203609Method and apparatus for implementing key stream hierarchy
1549198037Identification processing apparatus and mobile device using the same
1559197671Connection configuration
1569191039Randomization using an XOR scrambler in multicarrier communications
1579185553Systems/methods of preferential communications
1589185083Concealing data within encoded audio signals
1599184913Authenticating a telecommunication terminal in a telecommunication network
1609182480Information technology (IT) equipment positioning system
1619176543Access using a mobile device with an accelerometer
1629172535Key implementation system
1639172493Caller-identity based security
1649171530Methods and apparatus for creating music melodies using validated characters
1659167433Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
1669166785Cryptography processing device and cryptography processing method
1679165149Use of a mobile telecommunication device as an electronic health insurance card
1689158939Security chip, program, information processing apparatus, and information processing system
1699154946Secure coupling of hardware components
1709154477Systems and methods for encrypting mobile device communications
1719154295Method of generating a correspondence table for a cryptographic white box
1729152801Cryptographic system of symmetric-key encryption using large permutation vector keys
1739152773Communication apparatus and secure module including function for disabling encrypted communication
1749152383Method for encrypting a message through the computation of mathematical functions comprising modular multiplications
1759148780Method and apparatus for secure data transmission
1769143931Privacy control for wireless devices
1779143513Portable electronic device and associated method for making information available
1789143326Method and system for encrypting data
1799143325Masking with shared random bits
1809143257Method and apparatus for transmitting signal
1819143256Method and apparatus for transmitting signal
1829130693Generation of perfectly secret keys in wireless communication networks
1839124423Iterative data secret-sharing transformation
1849124386System, device, and method for securing voice authentication and end-to-end speech interaction
1859119064Method and apparatus for providing broadcast channel encryption to enhance cellular network security
1869118966Enforcing software independent content protection in an electronic device during transcoding
1879118643Authentication and data integrity protection of token
1889118463Distributed single sign on technologies including privacy protection and proactive updating
1899118441Layout-optimized random mask distribution system and method
1909112855Method for identifying pulse optical signal and device thereof
1919112698Cryptographic device and method for data encryption with per-round combined operations
1929107074Wireless personal area network having authentication and associated methods
1939107066Encryption in a wireless telecommunications
1949106421Securing communications over a first communication link with encryption managed by a second communication link
1959106364Signal processing of a high capacity waveform
1969100863Cellular backhaul load distribution
1979100548Feature enablement at a communications terminal
1989100175Embedded universal integrated circuit card supporting two-factor authentication
1999094842Systems and method for orthogonal frequency divisional multiplexing
2009094454Location specific personalized enterprise services using video signature of an electronic display
2019088553Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets
2029087432Creation and monitoring of "fair play" online gaming
2039087192Electronic circuit and method for monitoring a data processing
2049083684Communication node, key synchronization method, and key synchronization system
2059083590Long range WLAN data unit format
2069083528Authentication of encrypted data blocks
2079077509Secure threshold decryption protocol computation
2089071972Asynchronous tiered access control to a wireless home network
2099071964Method and apparatus for authenticating a digital certificate status and authorization credentials
2109071440Method and system of authenticating the identity of a user of a public computer terminal
2119070251Multi-tiered static chain of trust
2129065631Integrated cryptographic module providing confidentiality and integrity
2139065593Securing speech recognition data
2149064117Mobile provisioning device
2159060265Wireless sensor network and central node device thereof
2169059866Digital microwave radio system and method with encryption
2179059838Encryption algorithm with randomized buffer
2189059784Space based authentication utilizing signals from low and medium earth orbit
2199058495Rights management services integration with mobile device management
2209054862Access control key management in a virtual world
2219049226Defending against a cyber attack via asset overlay mapping
2229047461Computer-implemented method for replacing a data string
2239043868Network security appliance
2249043599Method and server for providing a mobility key
2259042550Methods and apparatus for base station assisted peer discovery through aggregation of expressions
2269042549Apparatus and method for address privacy protection in receiver oriented channels
2279031236Generating identical numerical sequences utilizing a physical property and secure communication using such sequences
2289027111Relay node authentication method, apparatus, and system
2299025771Security optimization for IMS/MMD architecture
2309025770Dynamic encryption arrangement with a wireless device and methods therefor
2319021554Unlimited access to media and applications over wireless infrastructure
2329021463Method, system and apparatus for management of push content
2339020149Protected storage for cryptographic materials
2349020146Algorithm agile programmable cryptographic processor
2359008315Shared secret arrangements and optical data transfer
2369008314Secure wireless communications
2379008312System and method of creating and sending broadcast and multicast data
2389008310Implementing encrypted content in a game
2399007895Method for routing data packets in a fat tree network
2409000886Method, computer program product, and system for preventing inadvertent configuration of electronic devices provided with infrared data association interfaces
2418997182Legacy device registering method, data transferring method and legacy device authenticating method
2428995662Secure vehicle-to-vehicle communication system
2438995650Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection
2448993897Photosensitive resin composition and use thereof
2458989885Watermark generator, watermark decoder, method for providing a watermark signal in dependence on binary message data, method for providing binary message data in dependence on a watermarked signal and computer program using a two-dimensional bit spreading
2468989382Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
2478989381Method, apparatus, and system for data protection on interface in communications system
2488989286Mapping a transmission stream in a virtual baseband to a physical baseband with equalization
2498983069System and method for counter mode encrypted communication with reduced bandwidth
2508982972Apparatus and method for processing an input signal
2518982411Image processing apparatus and method
2528978149Media content device, system and method
2538976965Mobile computing device and wearable computing device having automatic access mode control
2548976964Key pair management method and image forming device
2558973122Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method
2568972300Content distribution system
2578971534Mobile communication terminal and method
2588966611Method and apparatus for local area networks
2598966261Method for secure remote backup
2608966250Appliance, system, method and corresponding software components for encrypting and processing data
2618966241Apparatus and method for sending encrypted data to conditional access module over common interface, conditional access module and system thereof
2628964982Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
2638964981Method and system for transmitting signaling information over a data transport network
2648964980System and method of distributing game play instructions to players during a game
2658964971Method of providing text representation of a cryptographic value
2668963687System and method for DSRC communication
2678958553Public key cryptosystem based on goppa codes and puf based random generation
2688958552Data processing device
2698958551Multi-dimensional montgomery ladders for elliptic curves
2708955062Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain
2718953803Circuit switched mobile telephony in fixed wireless access
2728953801System and method for multicasting IPSEC protected communications
2738953790Secure generation of a device root key in the field
2748953788Encrypting a data transmission using multiple channels
2758953786User input based data encryption
2768953782Crypto arrangement with mixed endian
2778953781Apparatus and method for ciphering of uplink data in mobile communication system
2788949300Circuit and method for controlling quality of random numbers
2798948401Method for filtering of abnormal ONT with same serial number in a GPON system
2808948393Uninterrupted transmission during a change in ciphering configuration
2818948392Method of providing an authenticable time-and-location indication
2828948389Wireless network connection method, wireless network apparatus and wireless network access point (AP) applying the method
2838948387Security key generator
2848948376Format-preserving encryption via rotating block encryption
2858948375Systems for embedding information in data strings
2868942678Content distributing system, content distributing apparatus, terminal device and content distributing method
2878942379Timeslot encryption in an optical transport network
2888942372Method and device for identifying objects
2898942224Method and system for handling security synchronization for prolonged periods of no-reception of voice frames
2908938624Encryption key destruction for secure data erasure
2918938075Method and device for establishing a communication session
2928938074Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
2938935763System and method of user authentication in wireless communication networks
2948935536Image encryption/decryption device, method, and storage medium storing a program
2958935526Secure message handling on a mobile device
2968934632System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks
2978934631Decompressing apparatus and compressing apparatus
2988934630Compressing block-cipher encrypted data
2998930423Method and system for restoring encrypted files from a virtual machine image
3008929550LPI/LPD communication systems
3018929546Motion-based authentication for a gesture-based computing device
3028929539Instructions to perform Groestl hashing

2014

3038923518Key distribution system, key distribution method, and recording medium
3048923516Systems and methods for securely transmitting and receiving discovery and paging messages
3058918906Communication service system
3068917870Methods and devices for computing a shared encryption key
3078917869Creation and monitoring of "fair play" online gaming
3088914849Broadcast replenishment of account parameters for groups of wireless devices
3098913747Secure configuration of a wireless sensor network
3108913746Wireless communication system and method
3118913740Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule
3128913673Method and apparatus for transmitting rank indication information
3138912880Method for checking the authorization of users
3148909929Stored public key validity registers for cryptographic devices and systems
3158908865Session key generation and distribution with multiple security associations per protocol instance
3168908860Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing
3178907768Access using a mobile device with an accelerometer
3188903091Optical system with imparted secure codes
3198902475Image forming apparatus, image processing method, and image processing system
3208898466Secure block acknowledgement mechanism for use in communication networks
3218897447Burst tethering for mobile communication devices
3228897440Cryptographic system of symmetric-key encryption using large permutation vector keys
3238893285Securing data using integrated host-based data loss agent with encryption detection
3248892839Methods, systems, and storage mediums for managing content storage and selection
3258891767Method and apparatus for direct counterfactual quantum communication
3268891757Programmable cryptographic integrated circuit
3278887258Apparatus and method of binding a removable module to an access terminal
3288887212Extended connectivity point-of-deployment apparatus and concomitant method thereof
3298886238Method of allocating radio resource in wireless communication system
3308885827System and method for enabling a host device to securely connect to a peripheral device
3318885825Method of establishing a cryptographic key, network head and receiver for this method, and method of transmitting signals
3328880893Enterprise information asset protection through insider attack specification, monitoring and mitigation
3338879736Telecommunication systems and encryption of control messages in such systems
3348879727Method and apparatus for hardware-accelerated encryption/decryption
3358879725Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation
3368874938Program execution device
3378874913Secure communications between devices using a trusted server
3388873758Secure wireless link between two devices using probes
3398873757Methods and apparatus for providing network-assisted key agreement for D2D communications
3408873756System for transmitting a data signal in a network, method, mobile transmitting device and network device
3418873754Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
3428867742Optical transmission device and reception device for Yuen encryption, optical transmission method and reception method for Yuen encryption, and encrypted communication system
3438867608Systems and methods for segmenting and communicating video data
3448861733Method of personalizing a NFC chipset
3458861732Method and system for supporting security in a mobile communication system
3468861730Arranging data ciphering in a wireless telecommunication system
3478861717Verification device, secret information restoration device, verification method, program, and secret sharing system
3488861716Efficient homomorphic encryption scheme for bilinear forms
3498860979Deletion of unwanted reply messages in e-mail printing
3508855313System and method for providing variable security level in a wireless communication system
3518855311Advanced container security device network protocols
3528855310System and method for exchanging encryption keys between a mobile device and a peripheral device
3538855306Node distributed with group key and group key updating
3548844051Method and apparatus for media relaying and mixing in social networks
3558842834Robust delivery of packet based secure voice
3568842833System and method for secure transaction of data between wireless communication device and server
3578842831Authentication of an RFID tag using an asymmetric cryptography method
3588842830Method and apparatus for sending a key on a wireless local area network
3598842825Data encoding apparatus, data encoding method, data encoding program, and recording medium
3608839363Trusted hardware for attesting to authenticity in a cloud environment
3618838972Exchange of key material
3628837735Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing
3638837731Secure remote control for audio/video receiver/decoder
3648837730Apparatus and method for reducing channel reproduction delay in mobile terminal
3658837728Server algorithms to improve space based authentication
3668837724Synchronization test for device authentication
3678832849Computer data object modification based on data types in a networked environment
3688832311Diverter
3698831426OCDM-based all optical multi-level security
3708831220Processing module operating methods, processing modules, and communications systems
3718826029Providing time ratio-based password/challenge authentication
3728826026Systems and methods for tracking electronic files in computer networks using electronic signatures
3738825928Facilitating and authenticating transactions through the use of a dongle interfacing a security card and a data processing apparatus
3748824681Method and device for link layer decrypting and/or encrypting a voice message stream already supporting end to end encryption
3758824678MAC address anonymizer
3768824672Reconfigurable block encryption logic
3778819854Information processing apparatus, system management method, and recording medium
3788819431Methods and device for electronic entities for the exchange and use of rights
3798817985Encryption key distribution system
3808817978Order-preserving encryption and decryption apparatus and method thereof
3818817976Reversible cipher
3828813184Authentication using mobile devices
3838812833Wireless multiband security
3848811617Efficient security-related processing
3858811614Space based authentication utilizing signals from low and medium earth orbit
3868811611Encryption/decryption of digital data using related, but independent keys
3878811608Attack-resistant multivariate signature scheme
3888810862Paper medium information encrypting system, decrypting system, program and method
3898806214Communication with non-repudiation and blind signatures
3908804961Method and system for mobile terminals handing over between clear session and encrypted session communications
3918804957Authentication key generation arrangement
3928804951Speeding up galois counter mode (GCM) computations
3938804950Methods and apparatus for producing a hash value based on a hash function
3948800019Secure streaming container
3958799655Mobile offline authentication using one-time passcodes
3968798269Method and system for secured broadcasting of a digital data stream
3978798261Data protection using distributed security key
3988793504Validating a system with multiple subsystems using trusted platform modules and virtual platform modules
3998792791Multiplexed quantum key distribution
4008792644Communication apparatus for performing communication parameter setting and authentication process, control method thereof and storage medium storing program
4018792641Secure wireless communication
4028787724Information processing apparatus, information processing method and program
4038787578Method and apparatus for encrypting transmissions in a communication system
4048787577Method and system for wireless transmission of content
4058787574Multicast key negotiation method suitable for group calling system and a system thereof
4068787571Wired communications systems with improved capacity and security
4078787565Method and apparatus for generating an advanced encryption standard (AES) key schedule
4088787564Assessing cryptographic entropy
4098787563Data converter, data conversion method and program
4108782757Session sharing in secure web service conversations
4118782756Time clock
4128782437Content protection using block reordering
4138782402System and method for secure communications
4148781970System, method and program product to determine resolution when software installed on a computer is not properly licensed
4158781126Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network
4168781125Systems and methods of secure coding for physical layer communication channels
4178781123Method for processing location information relating to a terminal connected to a packet network via a cellular network
4188781111System and methods for side-channel attack prevention
4198781110Unified system architecture for elliptic-curve cryptography
4208779890Radio devices, regulation servers, and verification servers
4218774411Session key generation and distribution with multiple security associations per protocol instance
4228774409Method of handover
4238774407System and method for executing encrypted binaries in a cryptographic processor
4248774400Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem
4258769686System and method for securing wireless transmissions
4268769282Localized network authentication and security using tamper-resistant keys
4278768404Mobile radio terminal
4288768314Methods and apparatus for anonymous user identification and content personalization in wireless communication
4298763026Flexible interface for secure input of pin code
4308762714Protecting against counterfeit electronics devices
4318761744Mobile virtual communication invitations
4328761395Reducing detectability of an encryption key
4338761394System and method for secure broadcast communication
4348761390Production of cryptographic keys for an embedded processing device
4358756410Polynomial evaluation delegation
4368755529Method and device for establishing network connection
4378755522System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet
4388752148Processorless token for producing a one-time password
4398752144Targeted biometric challenges
4408751822Cryptography using quasigroups
4418750707System and method for establishing secure communications between transceivers in undersea optical communication systems
4428750517Friend or foe detection
4438750514Secure smart poster
4448750511Root node and a computer readable medium
4458750509Wireless surveillance system releasably mountable to track lighting
4468750507Dynamic group creation for managed key servers
4478750500Multi-dimensional montgomery ladders for elliptic curves
4488750497Cryptographic device for implementing S-box
4498745392Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel
4508745379Systems and methods for securing data in motion
4518744083System and method for early cut through of encrypted and unencrypted voice streams
4528744082System and method for securing wireless communications
4538744078System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths
4548744074Method and device for countering fault attacks
4558744072Exponentiation method resistant against side-channel and safe-error attacks
4568738925Wireless portable biometric device syncing
4578737964Facilitating and authenticating transactions
4588737625Data receiving apparatus, data receiving method, and non-transitory computer readable medium storing program
4598737618Secure key distribution for optical code division multiplexed based optical encryption
4608737617Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
4618737615Content transmission system, communication device, and content transmission method
4628737607Finding nearby users without revealing own location
4638732805Re-authentication in secure web service conversations
4648731200Key distribution
4658731196Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system
4668731194Method of establishing security association in inter-rat handover
4678731188Cryptographic processing apparatus and cryptographic processing method, and computer program
4688726040Memory randomization for protection against side channel attacks
4698724814System and method of security function activation for a mobile electronic device
4708724813Wireless device setup
4718724811Broadcast encryption based security system
4728724810Method for authenticating onboard units
4738724807Method for etching and secure distribution of digital data, access device and writer
4748719574Certificate generation using virtual attributes
4758718276Cryptography on a elliptical curve
4768713303Method and system for establishing security connection between switch equipments
4778712055Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
4788712053Method and system for security authentication of radio frequency identification
4798712038Cryptography on a simplified elliptical curve
4808712037Data encoding and decoding apparatus and method thereof for verifying data integrity
4818712036System for encrypting and decrypting a plaintext message with authentication
4828711843Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol
4838707402Secure computer provisioning
4848707045Method and apparatus for traffic count key management and key count management
4858705742Data compression apparatus and data decompression apparatus
4868705739On-the-fly encryption on a gaming machine
4878705729Audio content protection
4888705348Use of metadata for time based anti-replay
4898700921Fault-resistant exponentiation algorithm
4908694789System and method for generating a non-repudiatable record of a data stream
4918694782Wireless authentication using beacon messages
4928694775Method enabling real-time data service, realization, real-time data service system and mobile terminal
4938693685Quantum cryptography apparatus
4948687808Method and system for self synchronizing cryptographic parameters
4958687807Cascading dynamic crypto periods
4968687802Method and system for accelerating the deterministic enciphering of data in a small domain
4978687801Method and apparatus for acquiring domain information and domain-related data
4988683561Fixed client identification system for positive identification of client to server
4998683229Data encryption device
5008683211Method of projecting a secure USB key
5018682266Techniques to enhance diversity for a wireless system
5028681989WCDMA 3G voice communication protection method and terminal using the same
5038681988Encoding a connection between a base and a mobile part
5048681983Method for public-key attribute-based encryption with respect to a conjunctive logical expression
5058681981Method and apparatus for transmitting voice communications related to a multimedia session
5068676198Method of supporting location privacy
5078675879Methods and devices for allocating scrambling codes
5088675870Encryption apparatus
5098675869Incorporating data into an ECDSA signature component
5108675868Encrypting an address-dependent value along with code to prevent execution or use of moved code
5118675865Method and apparatus for a high bandwidth stream cipher
5128670799Interface and communication protocol for a mobile device with a smart battery
5138670566System and method for exchanging encryption keys between a mobile device and a peripheral output device
5148670565Encrypted packet communication system
5158670557Cryptographic system with modular randomization of exponentiation
5168666408Method of supporting location privacy
5178666079Decoding and encoding data
5188666078Method and system for generating cipher key during switching
5198666077Traffic encryption key generation in a wireless communication network
5208666069Cryptographic processing apparatus and cryptographic processing method, and computer program
5218666065Real-time data encryption
5228666064Endecryptor capable of performing parallel processing and encryption/decryption method thereof
5238665974Multi-clock PHY preamble design and detection
5248661267System and method for processing encoded messages
5258661240Joint encryption of data
5268660587Method for providing position information using time period
5278660262Method and device for generating random wait states
5288656486Biometric sensor for human presence detection and associated methods
5298656151Service accessing control method, terminal and system
5308654978Apparatus, method, and computer program product for access control to a mobile terminal
5318654977System and method for controlling access between Bluetooth devices
5328654975Joint encryption of data
5338654974Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
5348654970Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm
5358654969Cipher independent interface for cryptographic hardware service
5368653938Method of protection in a contactless radiofrequency communication
5378650401Network having quantum key distribution
5388650400Data processor, relay transmitter, and data transmission system
5398649519Method and apparatus for secure distribution of digital content
5408649518Implementing CSA cryptography in an integrated circuit device
5418649512Duo codes for product authentication
5428649511Method and processing circuit for dealing with galois field computation
5438649509Systems and computer program products for generating and verifying randomized hash values
5448649508System and method for implementing elliptic curve scalar multiplication in cryptography
5458645703Power analysis countermeasure for the ECMQV key agreement algorithm
5468644514Security model for a relay network system
5478644511System and method for providing digital content
5488644508Trusted communications between untrusting parties
5498644507Game apparatus, system and method for improving in-game communications during a game
5508644502Secure data parser method and system
5518644501Paired carrier and pivot steganographic objects for stateful data layering
5528644499Method and system for securely protecting a semiconductor chip without compromising test and debug capabilities
5538643854Image forming apparatus and print control method used therein
5548640158Systems, methods, and products for presenting content
5558639931Acceleration of key agreement protocols
5568638937Methods and systems for distributed processing on consumer devices
5578638936Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system
5588638934Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site
5598638927Cryptographic processing method, computer readable storage medium, and cryptographic processing device
5608638926Sharing a secret with modular inverses
5618635681Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection
5628635449Method of validation public key certificate and validation server
5638634560Time-based secure key synchronization
5648634559Aggregate signature schemes
5658634557Semiconductor storage device
5668634556Communication apparatus and control method
5678634553Encryption key generation device
5688630620Method and apparatus for securing location information and access control using the location information
5698630420Method for auto-configuration of a network terminal address
5708630415Method and apparatus for authentication service application processes during service reallocation in high availability clusters
5718630414Inter-working function for a communication system
5728627108System and method for protecting data on a mobile device
5738627107System and method of securing private health information
5748627088System and method for in- and out-of-band multi-factor server-to-user authentication
5758627074Secure block acknowledgement mechanism for use in communication networks
5768627073Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes
5778626811Method and apparatus for providing flexible bit-length moduli on a block Montgomery machine
5788625796Method for facilitating authentication using proximity
5798625794White-box cryptographic system with configurable key using intermediate data modification
5808625793Resynchronization for push message security using secret keys
5818625781Encrypton processor
5828625780Reduction of side-channel information by interacting crypto blocks
5838625778Method of authentication, and image display apparatus incorporating the method

2013

5848621227System and method for cryptographic key exchange using matrices
5858621202Externally managed security and validation processing device
5868620315Multi-tiered anti-abuse registration for a mobile device user
5878619989VolP encryption bridging by home wireless router
5888619988Method and apparatus for virtual Wi-Fi service with authentication and accounting control
5898619986Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier
5908619980Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
5918619977Representation change of a point on an elliptic curve
5928619976Encryption method, decryption method, device, and program
5938615661System and method for transmitting and utilizing attachments
5948615658Dynamic foreign agent--home agent security association allocation for IP mobility systems
5958615087OCDM-based photonic encryption system with provable security
5968615080Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
5978613097Methods and systems for detecting an access attack
5988612752Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network
5998612750Creating and using secure communications channels for virtual universes
6008611540System and method for secure messaging in a hybrid peer-to-peer network
6018611539Group key security in a multihop relay wireless network
6028611537Method and system for optimizing authentication procedures in media independent handover services
6038611535Characterization of an entangled photon system
6048611533Method and system for the Orange family of stream ciphers and method and system for generating stream ciphers based on the ERINDALE-PLUS hashing function
6058611532Managing media content decryption keys in encrypted media content distribution systems and methods
6068611531Method and apparatus for remotely inserting watermark into encrypted compressed video bitstream
6078605903System, device, and method for wireless communication, apparatus and method for processing information from contactless IC cards
6088605902Method and implementation for supporting switchable red side or black side control options for airborne radio communication radios
6098605893Encryption and decryption processing method, system and computer-accessible medium for achieving SMS4 cryptographic procedure
6108605730System and method for multimedia communication across disparate networks
6118601603Secure information transmission over a network
6128601267Establishing a secured communication session
6138600356Authentication in a roaming environment
6148600058Generation of self-certified identity for efficient access control list management
6158600050Encrypting a data transmission using multiple channels
6168600046Method of coding a secret formed by a numerical value
6178594332Key generating apparatus, encrypting apparatus and decrypting appatatus
6188594329Non-interactive verifiable, delegated computation
6198594321Apparatus and method for operating a symmetric cipher engine in cipher-block chaining mode
6208589694System, method, and apparatus for graduated difficulty of human response tests
6218588426Methods and apparatus to secure communications in a mobile network
6228588418User level security for an emulated removable mass storage device
6238588417Systems and methods for multicast retransmission over a secure wireless LAN
6248588416System and method for secure communication
6258588415Method for securing a telecommunications terminal which is connected to a terminal user identification module
6268588408Method of implementing a block cipher algorithm
6278588406Data obfuscation
6288583944Method and integrated circuit for secure encryption and decryption
6298582769Secure communication over passive optical network (PON) with quantum encryption
6308582766Method for ensuring media stream security in IP multimedia sub-system
6318582765Masking of data in a calculation
6328582761Cryptographic method with elliptical curves
6338582760Method and system of managing and filtering electronic messages using cryptographic techniques
6348582758Apparatus and a method for calculating a multiple of a point an elliptic curve
6358578464Secure streaming container
6368577293Communication system and communication device
6378577040Data transmitting method and apparatus, and data communication method and apparatus
6388577038Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number
6398577037Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
6408577036Method and device for transmitting messages in real time
6418577035Electronic circuit for securing data interchanges between a computer station and a network
6428577027Advanced cryptographic method of multilayer diffusion in multidimension
6438577026Methods and apparatus in alternate finite field based coders and decoders
6448572707Multiple authentication mechanisms for accessing service center supporting a variety of products
6458571219Authentication loading control and information recapture in a UMTS network
6468566247System and method for secure communications involving an intermediary
6478565760Methods, systems and apparatus for recovering registration information
6488565439Method for detecting the scrambling of a radiocommunication network, and corresponding storage means and circuit
6498565433Method and system for managing air interface key
6508565432Communications system
6518565431System and method for scrambling wireless signals using a secure time value
6528565421Block cipher improvements
6538565420Source centric sanction server and methods for use therewith
6548561055Method, system and apparatus for management of push content
6558560861Method and apparatus for communicating authorization data
6568560847Light access authentication method and system
6578559947System and method to enable subscriber self-activation of wireless data terminals
6588559921Management of security features in a communication network
6598559638Cryptographic processing system
6608559637Securing information exchanged via a network
6618559636Authenticating network elements in a communication system
6628559629Sanctioning content source and methods for use therewith
6638559628Sanctioned client device and methods for use therewith
6648559627Sanctioned caching server and methods for use therewith
6658559626Cryptographic sanction server and methods for use therewith
6668559624Cyphometry consisting of ciferglifs, chaotiglyphs and word auras
6678555072Attestation of computing platforms
6688555064Security system and method for wireless communication system
6698554178Methods and systems for efficient deployment of communication filters
6708553887Method for generating dynamic group key
6718553885Wireless personal area network having authentication and associated methods
6728553884Quantum communication system
6738553878Data transformation system using cyclic groups
6748549310Method and apparatus for secure measurement certification
6758549305Steganographic method and device
6768549291Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same
6778548170Document de-registration
6788548168Security module for securing an encrypted signal with system and method for use therewith
6798548163Simultaneous scalar multiplication method
6808543837Method of randomly and dynamically checking configuration integrity of a gaming system
6818543831System and method for establishing data connections between electronic devices
6828543822Device authentication
6838543512Licensed content utilization validation using cache parameters
6848542836System, apparatus and methods for highly scalable continuous roaming within a wireless network
6858542834System and method for securely pairing a wireless peripheral to a host
6868542832System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm
6878542103Radio frequency identification reading by using error correcting codes on sets of tags
6888538026Key distribution
6898538022System and method of cross-component message processing
6908538019Method and apparatus for configuring nodes in a wireless network
6918538012Performing AES encryption or decryption in multiple modes with a single instruction
6928533807Methods for accessing content based on a session ticket
6938533798Method and system for controlling access to networks
6948532295Method for the secure loading in a NFC chipset of data allowing access to a service
6958532286System and method for reducing the computation and storage requirements for a montgomery-style reduction
6968531334Location proofs
6978527751Systems and methods for secure and certified electronic messaging
6988526617Method of handling security configuration in wireless communications system and related communication device
6998526615Storage system executing encryption and decryption processing
7008526614Method to manage members of at least one group of decoders having access to broadcast data
7018526603Public-key encrypted bloom filters with applications to private set intersection
7028526602Adjustment-value-attached block cipher apparatus, cipher generation method and recording medium
7038526601Method of improving operational speed of encryption engine
7048522053Program execution device
7058522037Motion-detecting device user authentication
7068520853Wireless communication device, method for wireless connection, and computer usable medium therefor
7078520851Wireless communication device with securely added randomness and related method
7088520840System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet
7098516562Multi-channel multi-factor authentication
7108516272Secure dynamically reconfigurable logic
7118515070Access control for implanted medical devices
7128515066Method, apparatus and program for establishing encrypted communication channel between apparatuses
7138514748Method and system for improved authentication for communications network setup
7148510557Secure message and file delivery
7158509443Rekey index generation method and rekey index generation apparatus
7168509440PANA for roaming Wi-Fi access in fixed network architectures
7178509437Radio communication system, radio communication apparatus, and ciphering method
7188509436Remote circuit locking switch system
7198509427Hybrid mode cryptographic method and system with message authentication
7208509424Fast key-changing hardware apparatus for AES block cipher
7218509327Receiving apparatus and method and program
7228504836Secure and efficient domain key distribution for device registration
7238504835Method for secure remote backup
7248504483Electronic trading system supporting anonymous negotiation and indications of interest
7258503679Short message encryption
7268499318Method and apparatus for programming blackout and retune
7278498869Deriving geographic distribution of physiological or psychological conditions of human speakers while preserving personal privacy
7288498415Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment
7298495390System and method for data obfuscation based on discrete logarithm properties
7308494969Cryptographic server with provisions for interoperability between cryptographic systems
7318494966Method and apparatus for facilitating the transfer of a software license between computer systems
7328494165Secure communications between devices using a trusted server
7338494163Encryption in a wireless telecommunications
7348494161Content protection message extraction
7358488967System and method for OCDMA-based photonic layer security robustness to archival attack
7368488842Systems and methods for tracking and authenticating goods
7378488837Apparatus and method for generating constructively multi-patterned watermark, and apparatus and method for inserting and detecting the watermark using the same
7388488792Wireless communications validation system and method
7398488791Securing two-party computation against malicious adversaries
7408488789System and method for downloading electronic information to a video lottery terminal
7418488784Organic keyed encryption
7428488779Method and system for conducting high speed, symmetric stream cipher encryption
7438484485Encryption device and encryption system
7448484455Online data encryption and decryption
7458479000Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
7468477943Automatic detection of wireless network type
7478477942Method and apparatus for managing service lists
7488477940Symmetric cryptography with user authentication
7498477938Method and apparatus for authentication of portable electronic devices
7508477935Method and apparatus for calculating a polynomial multiplication, in particular for elliptic curve cryptography
7518477934Pairing computation device, pairing computation method and recording medium storing pairing computation program
7528473754Hardware-facilitated secure software execution environment
7538472621Protection of a prime number generation for an RSA algorithm
7548468343System and method for securing wireless transmissions
7558467766Methods and systems for managing payment sources in a mobile environment
7568467536Binding keys to secure media streams
7578467533One-time-pad encryption with key ID and offset for starting point
7588467531Mobile terminal with encryption chip and related network locking/unlocking method
7598467526Key evolution method and system of block ciphering
7608467525Steganographic method and device
7618464074Storage media encryption with write acceleration
7628462953Communication system and method thereof
7638462952Synchronizing management signaling in a network
7648462950System and method for extracting, decoding, and utilizing hidden data embedded in audio signals
7658462947Managing user access in a communications network
7668462939RNS-based cryptographic system and method
7678458741Provision of TV ID to non-TV device to enable access to TV services
7688457638Mobile communication method
7698457597Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
7708457316Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing
7718457314Wireless video surveillance system and method for self-configuring network
7728457313Protocol expansion of a signaling message
7738457307Method and system for generating implicit certificates and applications to identity-based encryption (IBE)
7748457306Cryptographic module and IC card
7758457305Generating genus 2 curves from invariants
7768457304Efficient encoding processes and apparatus
7778457302Access-controlled data storage medium
7788452013Secure message handling on a mobile device
7798452012Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
7808451810Wireless LAN system, a terminal and a recording medium readable by a computer
7818451089Radio identification with an additional close-range check
7828443202Methods and systems for authenticating users
7838443194Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system
7848442527Cellular authentication for authentication to a service
7858442234System and method for obtaining certificate status of subkeys
7868442233Telecommunication systems and encryption of control messages in such systems
7878442229Method and apparatus for providing security in a passive optical network
7888442228Multi-class switching system and associated method of use
7898442227Providing additional information with session requests
7908437474Public key encryption for groups
7918437470Method and system for block cipher encryption
7928433927Cryptographically-enabled privileged mode execution
7938433068Method and apparatus for communication based on pseudo-contact information
7948433065Encryption and signature schemes using message mappings to reduce the message size
7958429412Method to control access between network endpoints based on trust scores calculated from information system component analysis
7968428554Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
7978428262Method to connect wireless communication device, wireless communication device, and computer usable medium therefor
7988428261System and method for establishing authenticated wireless connection between mobile unit and host
7998428252Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables
8008428251System and method for stream/block cipher with internal random states
8018428161Symbol vector mapping for chase-combining HARQ
8028423784Position registering method, program and apparatus for terminal equipment
8038422677Storage virtualization apparatus comprising encryption functions
8048422674Application-specific secret generation
8058422672Authenticated device, authenticating device and authenticating method
8068422669Method and apparatus for elliptic curve cryptographic processing
8078422667Method and apparatus to facilitate transmission of an encrypted rolling code
8088417967Storage device data encryption using a binary large object (BLOB)
8098417965Method and circuit for secure definition and integration of cores
8108416695Method, device and system for network interception
8118412957Encryption and decryption of records in accordance with group access vectors
8128412942Method and system for seamless SSID creation, authentication and encryption
8138412784Storage model for maintaining structured document fidelity
8148412129Techniques to enhance diversity for a wireless system
8158411898Digital authentication with analog documents
8168411866Distribution of group cryptography material in a mobile IP environment
8178411860Wireless communication system, base station, terminal and wireless communication method
8188411859Non-deterministic number generation
8198411858Dynamic foreign agent-home agent security association allocation for IP mobility systems
8208411852Diffusion oriented method and apparatus for stream cryptography
8218411851Determining HDCP source KSV support
8228407758Network security appliance
8238407484Flash memory distribution of digital content
8248406735Method for pairing electronic equipment in a wireless network system
8258406459Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination
8268406422Cryptographic module management apparatus, method, and program
8278401181Segment deduplication system with encryption of segments
8288401180Non-linear data converter, encoder and decoder
8298397076System and method for remote reset of password and encryption key
8308396222Key distribution system
8318396211System and method for dynamic modification of allowable electronic message properties
8328392711Staged establishment of secure strings of symbols
8338391541Steganographic encoding and detecting for video signals
8348391490Method providing the means for recognizing the origin and/or content of an RF signal
8358391489Processor system
8368391488Method and apparatus for using navigation signal information for geoencryption to enhance security
8378391485Stealth message transmission in a network
8388391477Cryptographic device having tamper resistance to power analysis attack
8398391476Masking method of defending differential power analysis attack in seed encryption algorithm
8408391475Method and apparatus for advanced encryption standard (AES) block cipher
8418391264Mobile device handoff while maintaining connectivity with multiple access points
8428386803System and method for data obfuscation based on discrete logarithm properties
8438386791Secure data processing method based particularly on a cryptographic algorithm
8448386790Method of using ECDSA with winternitz one time signature
8458386775Tolerant key verification method
8468385550System and method for secure wireless multi-hop network formation
8478385549Fast authentication between heterogeneous wireless networks
8488385540Block cipher algorithm based encryption processing method
8498379866Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor
8508379861Integrated circuit and a method for secure testing
8518379859Method and apparatus for ciphering data in wireless communication system
8528379856Hardware based cryptography
8538379855Ciphering in a packet-switched telecommunications system
8548379854Secure wireless communication
8558379844Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting
8568379842Cryptographic methods including Montgomery power ladder algorithms
8578378786Security provision in standards-compliant RFID systems
8588375207Method and apparatus for authenticating a network device
8598374352Context-free protocol for enforcing data forwarding in wireless ad hoc networks
8608374350Quantum communication system
8618374342Scalar multiplier and scalar multiplication program
8628374341Hash function using a cue sports game process
8638374339Security setting method of wireless communication network, wireless communication network system, client device and recording medium
8648374338Transport packet decryption testing in a client device
8658374127Digital broadcasting system and method of processing data in digital broadcasting system
8668369515Cryptographic method of multilayer diffusion in multidimension
8678364978System for and method of auto-registration with cryptographic modules
8688364596System and method for providing and/or obtaining electronic documents
8698363839Image forming apparatus
8708363836Using authentication tokens to authorize a firewall to open a pinhole
8718363827Method and apparatus for generic multi-stage nested hash processing
8728363739Pilot scheme for a MIMO communication system
8738359465Enterprise security system
8748358784System and method for a secure synchronization between a wireless communication device and a server
8758358783Secure wiegand communications
8768356180Multidimensional identification, authentication, authorization and key distribution system for patient monitoring
8778355507Optical switching and delay systems and methods for optical encryption and/or optical decryption
8788355501Method of collision-free hashing for near-match inputs
8798351607Wireless communication device, method for wireless connection, and computer usable medium therefor
8808351606Power distribution system secure access communication system and method
8818351605Stealth message transmission in a network
8828351602Dual-mode wireless sensor network system and key establishing method and event processing method thereof
8838351599Cryptographic device for fast session switching
8848350574Circuit for detecting malfunction generation attack and integrated circuit using the same
8858347377Bridged cryptographic VLAN
8868347370Multi-channel multi-factor authentication
8878347102Image processing apparatus and method for transmitting encrypted data
8888347075Methods to mitigate attacks against fiber-to-the-home network systems
8898345875System and method of creating and sending broadcast and multicast data
8908345873Methods and systems for N-state signal processing with binary devices
8918345871Fast authentication over slow channels

2012

8928340293Verification system, server, and electronic instrument
8938340292Lawful intercept management by an authorization system
8948340281Efficient method and apparatus for modular inverses
8958335928Information providing system and method and storage medium
8968335316Method and apparatus for data privacy in passive optical networks
8978335314Adaptive and secure modular connection
8988332635Updateable secure kernel extensions
8998331569Method for generating downlink frame, and method for searching cell
9008331566Media transmission and management
9018331565Message transmission method, preferably for an energy distribution network
9028331564Method for generating downlink frame, and method for searching cell
9038331563System and method for providing secure communication of sensitive information
9048331559Diffused data encryption/decryption processing method
9058331556Asymmetrical method of encryption or signature verification
9068325922Group key security in a multihop relay wireless network
9078325921Portable memory and a method for encrypting the same
9088325916Encryption scheme for streamed multimedia content protected by rights management system
9098325826Methods and apparatus for transmitting signals facilitating antenna control
9108320571Method for generating downlink frame, and method for searching cell
9118320570Apparatus and method for generating secret key
9128320567Efficient data path encapsulation between access point and access switch
9138320565Method for generating downlink frame, and method for searching cell
9148320560Secure data parser method and system
9158320559Identity-based-encryption system
9168320558Encryption of synchronization information
9178320557Cryptographic system including a mixed radix number generator with chosen statistical artifacts
9188320283Method and system for utilizing givens rotation expressions for asymmetric beamforming matrices in explicit feedback information
9198316452Computer network storage environment with file tracking
9208316241Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method
9218316239Decoding information to allow access to computerized systems
9228316233Systems and methods for accessing secure and certified electronic messages
9238315390Method for admission control of multiple service flows paging in mobile packet domain
9248315389Geosecurity methods and devices using geotags derived from noisy location data from multiple sources
9258315387System and method for data transmission over arbitrary media using physical encryption
9268315386Method and apparatus for performing VoIP-based communication using bio keys
9278312276Method for sending and receiving an evaluation of reputation in a social network
9288311221Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
9298311216Packet cipher algorithm based encryption processing device
9308311214Method for elliptic curve public key cryptographic validation
9318307455Decryption-key distribution method and authentication apparatus
9328307208Confidential communication method
9338306475Method and apparatus for configuring a wireless device through reverse advertising
9348306217Cryptographic processing apparatus and cryptographic processing method, and computer program
9358301909System and method for managing external storage devices
9368301891Localized network authentication and security using tamper-resistant keys
9378301453Watermark synchronization signals conveying payload data
9388300823Encryption and compression of data for storage
9398300822System for secure packet communication
9408300821Digital broadcasting system and method of processing data in digital broadcasting system
9418300811Method and device for processing data
9428300810Method for securely encrypting or decrypting a message
9438300806Duo codes for product authentication
9448300805AES core with independent inputs and outputs
9458296580System and method for protecting data on a mobile device
9468295485Quantum communication system
9478295484System and method for securing data from a remote input device
9488295483Mobile terminal device, wireless communication unit, wireless communication system, and wireless communication method
9498295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
9508291235Method and system for controlling access of clients and users to a print server
9518291226Method and apparatus for securely booting from an external storage device
9528291218Creating and using secure communications channels for virtual universes
9538290371OCDM-based all optical multi-level security
9548290161Incorporating shared randomness into distributed cryptography
9558290146Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus
9568289929Method and apparatus for enabling mobility in mobile IP based wireless communication systems
9578286228Secure streaming container
9588285994Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
9598285989Establishing a secured communication session
9608285986Apparatus and method for data packet security in a wireless sensor network
9618284940System for supporting over-the-air service and method thereof
9628284937Method for synchronization in encrypted communications using shared key
9638284931System and method for using a streaming protocol
9648284930Simultaneous scalar multiplication method
9658281408Secure telemetric link
9668281391Contents transmission method and contents transmission system
9678281155Content protection using block reordering
9688281135Enforcing use of chipset key management services for encrypted storage devices
9698280374Policy management in a roaming or handover scenario in an IP network
9708280101Identification documents and authentication of such documents
9718280059Method, system and device for generating group key
9728280058Wireless network having multiple security interfaces
9738280057Method and apparatus for providing security in wireless communication networks
9748280056System and methods for encryption with authentication integrity
9758280051Secure presentation of media streams in response to encrypted content
9768280048Method for strengthening the implementation of ECDSA against power analysis
9778280041Chinese remainder theorem-based computation method for cryptosystems
9788278870Battery pack authentication for a mobile communication device
9798276202Cloud-based gateway security scanning
9808276198Method and apparatus for local area networks
9818275126Apparatus and method for hash cryptography
9828275123Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key
9838271786Method and system for providing secure communications between a first and a second peer device
9848270611System and method for communicating with a key variable loader (KVL) using a standard universal asynchronous receiver transmitter (UART) peripheral
9858270610Wireless communication system, wireless communication apparatus, and method of exchanging cryptography key between wireless communication apparatuses
9868270607Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame
9878270602Communication systems, transceivers, and methods for generating data based on channel characteristics
9888270598Highly secured method and device for distributing audio-visual streams
9898266421Private electronic information exchange
9908265281IP service authorization in wireless communications networks
9918265279Polarization coding quantum cryptography system
9928265271Method and device for managing a transmission of keys
9938265265Circuit arrangement and method for RSA key generation
9948261084Unauthorized contents detection system
9958261075Method for secure remote backup
9968260883File sharing between devices
9978259945Communication system, information processing apparatus, information processing method, recording medium and program
9988259943Method for decrypting serial transmission signal
9998259942Arranging data ciphering in a wireless telecommunication system
10008259934Methods and devices for a chained encryption mode
10018255703Atomic hash instruction
10028255691Apparatus for batch verification and method using the same
10038254892Methods and apparatus for anonymous user identification and content personalization in wireless communication
10048254578Process of manufacturing a handheld device, involving keys
10058254576System and method for limiting access to data
10068254573System and method for ciphering key forwarding and RRC packet deciphering in a UMTS monitoring system
10078254569Provable data integrity verifying method, apparatuses and system
10088253860System, method and devices for HDMI transmission using a commonly supported media format
10098250665Digital Broadcasting system and method of processing data in digital broadcasting system
10108249557Mobile phone
10118249256Method for providing fast secure handoff in a wireless mesh network
10128249244System and method for recording and distributing customer interactions
10138243932Methods and systems for distributed processing on consumer devices
10148243931Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
10158243928Authentication method in communication system
10168243919Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
10178243703Communication system, management apparatus, control method therefor, storage medium, registration apparatus and base station
10188233934Method and system for providing access via a first network to a service of a second network
10198233614Integer division method secure against covert channel attacks
10208233552Method and system for utilizing givens rotation expressions for asymmetric beamforming matrices in explicit feedback information
10218230215Method for allocating multiple authentication certificates to vehicles in a vehicle-to-vehicle communication network
10228229120Mobile communication method
10238229118Method and apparatus for authentication in wireless communications
10248229110Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
10258225391System and method for improving restrictiveness on accessing software applications
10268225110Cryptographic protection of usage restrictions in electronic devices
10278225089Electronic transaction systems utilizing a PEAD and a private key
10288225085System and method for distributed SSL processing between co-operating nodes
10298223968Image data verification program recorded on a recording medium, image data verification method, and image data verification system
10308219822System and method for blocking unauthorized network log in using stolen password
10318219820Power analysis countermeasure for the ECMQV key agreement algorithm
10328219810Method and system for facilitating throttling of interpolation-based authentication
10338219493Messaging method and apparatus for use in digital distribution systems
10348218771Information processing apparatus and computer readable medium
10358218769Encrypted communication system, communication status management server, encrypted communication method, and communication status management method
10368218765Information system
10378218762Encrypting apparatus for common key cipher
10388218759System and method for encrypting data
10398214652Biometric identification network security
10408213939Mobile communication method
10418213902Smart card accessible over a personal area network
10428213901Subscriber identities
10438213617Finding nearby users without revealing own location
10448213614Distribution and printing of travel documents
10458213603Encryption processing apparatus
10468213602Method and system for encrypting and decrypting a transport stream using multiple algorithms
10478209546Data-securing method of program tool
10488208632Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
10498208627Format-preserving cryptographic systems
10508205257Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process
10518204223System providing dynamic quality of service signaling messages in a cable telephony network
10528204218High-efficient encryption and decryption processing method for implementing SMS4 algorithm
10538204214Method and system for generating data transaction ID
10548200979Context-sensitive confidentiality within federated environments
10558200582Mobile device password system
10568200480Deriving geographic distribution of physiological or psychological conditions of human speakers while preserving personal privacy
10578199915Wireless system for activation by wireless
10588196194Method and network for securely delivering streaming data
10598195957Memory randomization for protection against side channel attacks
10608194607Handover control method and apparatus for efficiently buffering packets in wimax network
10618190898Portable electronic entity and communication method
10628190888System and methodology providing multi-tier security for network data with industrial control components
10638190124Authentication in a roaming environment
10648189789Intrusion-tolerant group management for mobile ad-hoc networks
10658189788Hybrid symmetric/asymmetric cryptography with user authentication
10668189785Generating identical numerical sequences utilizing a physical property and secure communication using such sequences
10678189784Communication system, and an encoding device and a decoding device thereof
10688189768Secure messaging
10698185735System and method for lost data destruction of electronic data stored on portable electronic devices
10708184851Inserting watermarks into portions of digital signals
10718184849Error processing of steganographic message signals
10728184812Secure computing device with monotonic counter and method therefor
10738184811Mobile telephony content protection
10748184804Hash function using a piling-up process
10758184612Method and apparatus for managing hyper frame number for ciphering/deciphering in mobile communication system
10768181234Authentication system in client/server system and authentication method thereof
10778181040Program execution device
10788180058Encryption of the scheduled uplink message in random access procedure
10798180053Secure communications system with assured synchronization for data exchanged among system ports
10808180052Data communication apparatus
10818180051Methods and apparatus for securing communications of a user operated device
10828180046Method for making secure an electronic entity with encrypted access
10838176326Method of communications and communication network intrusion protection methods and intrusion attempt detection system
10848175329Authentication of physical and electronic media objects using digital watermarks
10858175272Method for establishing secure associations within a communication network
10868175271Method and system for security protocol partitioning and virtualization
10878175270Authentication loading control and information recapture in a UMTS network
10888175264Encryption and decryption processing method, system and computer-accessible medium for achieving SMS4 cryptographic procedure
10898171282Encryption data integrity check with dual parallel encryption engines
10908170212Device, system, and method of establishing secure wireless communication
10918170211Hub device for a network comprising quantum cryptographic connections and node module for said hub device
10928166566Controlling the downloading and recording of digital data
10938166528Wireless communication system and wireless communication method
10948165963License scheme for use with stackable devices
10958165343Forensic watermarking
10968165341Methods and apparatus to process imagery or audio content
10978165298Quantum cryptography communication apparatus and communication terminal
10988165296Time of day encryption using TDMA timing
10998165294Rollback attack prevention system and method
11008165288Cryptographic processing apparatus and cryptographic processing method, and computer program
11018165286Combination white box/black box cryptographic processes and apparatus
11028165285Process for generating an elliptic curve, application in a cryptographic process, and cryptographic process using such a curve
11038160253Method, transponder, and system for rapid data transmission
11048160252Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor
11058160243System, apparatus, and method for the secure storing of bulk data using one-time pad encryption
11068156336Device authentication
11078155375Video watermarking using temporal analysis
11088150041Secure computation of private values
11098150037Apparatus and method for secure, user-friendly deployment of information
11108150036Encrypted data installation
11118146139System and method of user authentication using handwritten signatures for an MFP
11128145697System and method for efficient basis conversion
11138144940System and method for authentication of data
11148144873User interface technique for selection and activation of wireless service among multiple transport carriers
11158144871Trusted communications between untrusting parties
11168144865Protection of the execution of a DES algorithm
11178144864Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems
11188144678Mobile device handoff while maintaining connectivity with multiple access points
11198140845Scheme for authentication and dynamic key exchange
11208139764Closed galois field cryptographic system
11218134972Communication system and gateway apparatus
11228132240Electric field unit and method for executing a protected function of an electric field unit
11238132023Apparatus and method for performing transparent hash functions
11248132022Apparatus and method for employing configurable hash algorithms
11258131260Mobile communication device, mobile communication device control program, and mobile communication device control method
11268131007Watermarking using multiple watermarks and keys, including keys dependent on the host signal
11278130964Systems and methods for identity-based encryption and related cryptographic techniques
11288130962Content protection method and apparatus
11298130958Transmit power control for wireless security
11308130957System and method for securing data
11318130953Security protection for data communication
11328130949Partially reversible key obfuscation
11338130947Privacy preserving social network analysis
11348130945Encrypted cryptography system
11358130944Digital encrypted time capsule
11368130894Data processing apparatus and method for use with a 4K interleaver in a digital video broadcasting (DVB) standard
11378127150Data security
11388127136Method for security association negotiation with extensible authentication protocol in wireless portable internet system
11398126147Secure terminal data loader system and in-flight entertainment management system
11408126146Method of quantum cryptography using blind photon polarization quibits with multiple stages
11418122257Audio-based, location-related methods
11428121286Hash function with provable resistance to differential attacks
11438121285Data processing for coding
11448117461Method of randomly and dynamically checking configuration integrity of a gaming system
11458117454Fast update message authentication with key derivation in mobile IP systems
11468116516Controlling use of audio or image content
11478116454Method and apparatus for providing security in a radio frequency identification system
11488116453Gaming console-specific user authentication
11498112118System and method for using a temporary electronic serial number for over-the-air activation of a mobile device
11508111827Cryptographic processing apparatus and cryptographic processing method
11518108678Identity-based signcryption system
11528108675External signature device for a PC with wireless communication capacity
11538107674Synchronizing rendering of multimedia content
11548107629Method of providing security for relay station
11558107623Method for verifying a first identity and a second identity of an entity
11568103883Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
11578103053Method and apparatus for associating identifiers with content
11588103003Method for setting communication parameters and communication device
11598102998Method for elliptic curve scalar multiplication using parameterized projective coordinates
11608102997Processor for executing an AES-type algorithm
11618098828Key distribution
11628098826QKD system laser autocalibration based on bit-error rate
11638095984Systems and methods of associating security vulnerabilities and assets
11648095132Remote SIM card replacement and activation process
11658094821Key generation in a communication system
11668094816System and method for stream/block cipher with internal random states
11678094815Arithmetic method and apparatus for supporting AES and ARIA encryption/decryption functions
11688094814Method and apparatus for using counter-mode encryption to protect image data in frame buffer of a video compression system
11698094812Updating stored passwords
11708094810Unidirectional proxy re-encryption
11718091138Method and apparatus for controlling the presentation of confidential content
11728090961Security switch
11738090953Information storage system
11748090142Embedding data in and detecting embedded data from video objects
11758090099Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field
11768090098Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher

2011

11778086864Low power HMAC encryption apparatus
11788086860Method for preventing and detecting hash collisions of data during the data transmission
11798086854Content protection information using family of quadratic multivariate polynomial maps
11808086843Performing cryptographic provider failover
11818086537Distribution system of contents embedding license machine ID
11828082443Pedigrees for quantum cryptography
11838081759Apparatus, and an associated method, for facilitating fast transition in a network system
11848081758Communication support server, communication support method, and communication support system
11858081754Key update method and apparatus thereof
11868079071Methods for accessing content based on a session ticket
11878078873Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
11888078872Method, system and device for determining a mobile IP key, notifying a mobile IP type
11898077869Organic keyed encryption
11908077863Secret sharing apparatus, method, and program
11918077862Sharing a secret using polynomials
11928077861Permutation data transform to enhance security
11938074068Secret sharing device, method, and program
11948073193Methods and systems for steganographic processing
11958073139Method of compressing a cryptographic value
11968068784Communication system and communication device
11978065715Authenticating a user of a wireless data processing device
11988064603Information terminal
11998064602Method and application for authentication of a wireless communication using an expiration marker
12008064600Encoded digital video content protection between transport demultiplexer and decoder
12018064599Secure message transport using message segmentation
12028064598Apparatus, method and computer program product providing enforcement of operator lock
12038064596Stream control device, stream encryption/decryption device, and stream encryption/decryption method
12048064425Method for assigning frequency spectrum bandwidth of an OFDM and OFDMA coexistence system
12058060941Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain
12068060939Method and system for securing wireless local area networks
12078060755Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
12088060745Security for wireless transmission
12098060033Techniques to enhance diversity for a wireless system
12108055901Optical signature to enable image correction
12118055012Hiding and detecting messages in media signals
12128054972Encryption processor of memory card and method for writing and reading data using the same
12138054967Computer system and computer program executing encryption or decryption
12148054900Symmetrical data signal processing
12158051472Method and apparatus for personalization and identity management
12168051287Imparting real-time priority-based network communications in an encrypted communication session
12178051151System and method for communicating with a network node behind a subscriber station with an IP convergence sub-layer
12188050566System and methods for quantum key distribution over WDM links
12198050452Quantization-based data embedding in mapped data
12208050410Distributed encryption methods and systems
12218050404Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
12228050403Method and apparatus for generating a public key in a manner that counters power analysis attacks
12238046788Systems, methods, and products for presenting content
12248046304Franking method and mail transport system with central postage accounting
12258045756Routing networks for use with content linking systems
12268045710Broadcasting method and broadcast receiver
12278045709Digital broadcasting conditional access terminal and method
12288045706System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources
12298045705Simultaneous scalar multiplication method
12308042192Information processing apparatus, information processing method, recording medium, and program
12318042147Network security appliance
12328041961Storage system
12338041643System and method of providing media content
12348041074Content indexing and searching using content identifiers and associated metadata
12358041038System and method for decompressing and making publically available received media content
12368041035Automatic configuration of devices upon introduction into a networked environment
12378041030Techniques for evaluating live payment terminals in a payment system
12388037321Method and apparatus for the secure storage of audio signals
12398037315Integrated circuit card
12408037304System and method for lost data destruction of electronic data stored on portable electronic devices
12418037296Apparatus and method for counter-based communications in wireless sensor networks and other networks
12428036386System and method for providing electronic ticket, and electronic ticket vending apparatus and mobile telephone therefor
12438036385Apparatus and method for applying ciphering in a universal mobile telecommunications system
12448036384Enhanced shared secret provisioning protocol
12458036383Method and apparatus for secure communication between cryptographic systems using real time clock
12468036379Cryptographic processing
12478036202Physical layer transceiver with integrated time synchronization
12488032762Process, circuits, devices, and systems for encryption and decryption and other purposes, and process making
12498032753Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same
12508032744Method and apparatus for self-authenticating digital records
12518031874Station and method of collecting information corresponding to security in a wireless network
12528031873Free-space quantum communication device with atomic filters
12538031872Pre-expiration purging of authentication key contexts
12548031867Method of verifying the integrity of an encryption key obtained by combining key parts
12558031866Cryptographic processing apparatus and cryptographic processing method, and computer program
12568031787Channel estimation for OFDM systems
12578031784Preamble detection with unknown channel
12588027520Methods and arrangements employing digital content items
12598027510Encoding and decoding media signals
12608027508Interactive gaming objects
12618027473System and method for improved data protection in PONs
12628027472Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
12638027467Method for elliptic curve point multiplication
12648027394Reducing data stream jitter during deinterleaving
12658027304Secure session keys context
12668024575System and method for creation and use of strong passwords
12678024569Method for secure remote backup
12688023696Printing media and methods employing digital watermarking
12698023695Methods for analyzing electronic media including video and audio
12708023692Apparatus and methods to process video or audio
12718023647Password self encryption method and system and encryption by keys generated from personal secret information
12728023645Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation
12738020006Pipeline for high-throughput encrypt functions
12748019344Apparatus, and associated methods, for facilitating secure, make-before-break hand-off in a radio communication system
12758019116Content processing methods using reversible watermarking
12768019083Method, apparatus and system for key derivation
12778019082Methods and systems for automated configuration of 802.1x clients
12788019081System and method for processing encoded messages
12798014563Methods and systems for steganographic processing
12808014529In-band device enrollment without access point support
12818014527Apparatus and method for reusing pair of public and private keys
12828014523Key management
12838011001Method for managing security in a mobile communication system using proxy mobile internet protocol and system thereof
12848010805Secure porting of information from one device to another
12858010802Cryptographic device having session memory bus
12868010801Multi-data rate security architecture for network security
12878010798Handheld computer system configured to authenticate a user and power-up in response to a single action by the user
12888010781Method and system to accelerate cryptographic functions for secure E-commerce applications
12898009830Secure data parser method and system
12908009828Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system
12918006291Multi-channel multi-factor authentication
12928006281Network accessible trusted code
12938006102Method and apparatus for transmitting content data and recording and/or reproducing apparatus
12948005224Token-based dynamic key distribution method for roaming environments
12958005223System and method for exchanging encryption keys between a mobile device and a peripheral device
12968005222Radio communication system, radio communication device, radio communication method, and computer program
12978005218Authorization and authentication of user access to a distributed network communication system with roaming feature
12988005217Method and apparatus for configuring nodes in a wireless network
12998005211Shuffle-decrypting legitimacy certifying apparatus and method, shuffle-decrypting verifying apparatus and method, program, and recording medium
13008005210Modulus scaling for elliptic-curve cryptography
13018005209Invariance based concurrent error detection for the advanced encryption standard
13028001608Secure streaming container
13038001381Method and system for mutual authentication of nodes in a wireless communication network
13048001376Fixed client identification system for positive identification of client to server
13058000518Methods, objects and apparatus employing machine readable data
13068000467Data parallelized encryption and integrity checking method and device
13077996861Flexible interface for secure input of pin code
13087996673System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
13097996376Method and apparatus for managing session data across multiple applications
13107996325Microbilling using a trust management system
13117995760Method for ensuring data transmission security, communication system and communication device
13127995759System and method for parallel compression of a single data stream
13137995757Closed galois field combination
13147995756Mobile device playback and control of media content from a personal media host device
13157995749Cryptographic system configured for extending a repetition period of a random sequence
13167992007Dynamic pin pad for credit/debit/ other electronic transactions
13177991184Apparatus to process images and video
13187991182Methods for steganographic encoding media
13197991162Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
13207991160Method and system for securing wireless communications
13217991153Glyph encryption system and related methods
13227991152Speeding up Galois Counter Mode (GCM) computations
13237987502Secure streaming container
13247987367Method and apparatus for key agreement between devices using polynomial ring
13257987094Audio encoding to convey auxiliary information, and decoding of same
13267986807Signal embedding and detection using circular structures in a transform domain of a media signal
13277986779Efficient elliptic-curve cryptography based on primality of the order of the ECC-group
13287986778Cryptographic method and apparatus
13297986773Interactive voice response system security
13307983440Selection of I-frames for client-side watermarking
13317983420Imaging job authorization
13327983419Wireless device to network server encryption
13337983415Method for performing iterative scalar multiplication which is protected against address bit attack
13347983303Mega-frame initialization packet generation and synchronous re-generation with bit rate adaptation for single frequency networks with multiple modulation schemes
13357983223Apparatus and method for reporting channel quality indicator in wireless communication system
13367979722Flash memory distribution of digital content
13377979718Operator recognition device, operator recognition method and operator recognition program
13387978876Hiding codes in input data
13397978854Asymmetric key generation
13407978850Manufacturing embedded unique keys using a built in random number generator
13417978846Scale-invariant barrett reduction for elliptic-curve cyrptography
13427975146Method and apparatus for recognition of biometric data following recording from at least two directions
13437974926Content use system, information terminal, and settlement system
13447974439Embedding hidden auxiliary information in media
13457974437Identifying steganographic data in an image
13467974415System and method for updating keys used for public key cryptography
13477974414Methods and apparatus for automatically grouping user-specific information in a mobile station
13487974412Communication system, transmission device, reception device, and communication scheme
13497974408Scrambling of a calculation performed according to an RSA-CRT algorithm
13507971785Method for authenticating micro-processor cards, corresponding micro-processor card, card reader terminal and programs
13517971066Transaction device with noise signal encryption
13527970167Deriving identifying data from video and audio
13537970166Steganographic encoding methods and apparatus
13547970140Method and system for encrypted communications using multi-valued modulation
13557970130Low-latency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode
13567970128Systems and methods for efficient generation of hash values of varying bit widths
13577969953Mobile device handoff while maintaining connectivity with multiple access points
13587966007User-assisted programmable appliance control
13597965842System and method for detecting unauthorized wireless access points
13607962753Method and a circuit for SHA operation with power saved
13617962740Method and apparatus for synchronizing audio and video in encrypted videoconferences
13627961883System and method for securing a personalized indicium assigned to a mobile communications device
13637961881Apparatus and methods for including codes in audio signals
13647961876Method to produce new multivariate public key cryptosystems
13657961875Means and method for ciphering and transmitting data in integrated networks
13667961874XZ-elliptic curve cryptography with secret key embedding
13677961873Password protocols using XZ-elliptic curve cryptography
13687961871Encryption process, encryption device, and computer-readable medium storing encryption program
13697961624System and method for providing bandwidth signaling across cryptographic boundaries in a network
13707958355Keytote component
13717957977Media program identification method and apparatus based on audio watermarking
13727957536Method for key administration for cryptography modules
13737957534System and method for security association between communication devices within a wireless home network
13747957533Method of establishing authentication keys and secure wireless communication
13757957532Data protection for a mobile device
13767957525Encryption and signature schemes using message mappings to reduce the message size
13777954136Self-management network access using localized access management
13787953221Method for processing multiple operations
13797949881Mobil terminal device, personal identification number verification program, and method of verifying personal identification number
13807949147Watermarking compressed data
13817949129Method and apparatus for facilitating efficient authenticated encryption
13827949128Method and device for the encryption and decryption of data
13837945779Securing a communications exchange between computers
13847941663Authentication of 6LoWPAN nodes using EAP-GPSK
13857940933Secure telemetric link
13867940932Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
13877940927Information security device and elliptic curve operating device
13887937760System security agent authentication and alert distribution
13897936880Method, apparatus and system for key derivation
13907936879Derivation method for cached keys in wireless communication system
13917936878Secure wireless instrumentation network system
13927936877Data transfer system, data transfer device, data recording device and data transfer method
13937936871Altering the size of windows in public key cryptographic computations
13947936869Verifying digital signature based on shared knowledge
13957934089System and method for processing data and communicating encrypted data
13967933412In-vehicle communication system and method therefor, in-vehicle communication terminal, communication method therefor, program recording medium, and program
13977933404Primitives for fast secure hash functions and stream ciphers
13987933344OFDMA based on cognitive radio
13997932851Ranging signal structure with hidden acquisition code
14007930729Performing presence service in a wireless communication system
14017930711Apparatus and method for addressing control in a network for distributed data
14027930537Architecture for encrypted application installation
14037929700Continuous variable quantum encryption key distribution system
14047929691Use of bilinear mappings in cryptographic applications
14057929690Two non-orthogonal states quantum cryptography method and apparatus with inter-and inter-qubit interference for eavesdropper detection
14067929689Call signs
14077926100Method for preventing unauthorized connection in network system
14087926094Secure legacy media peripheral association with authentication in a media exchange network
14097925592System and method of using a proxy server to manage lazy content distribution in a social network
14107925027Secure address proxying using multi-key cryptographically generated addresses
14117925010Message deciphering method, system and article
14127925009Hybrid data encryption
14137921300Apparatus and method for secure hash algorithm
14147920713Recorded video broadcast, streaming, download, and disk distribution with watermarking instructions
14157917946Method and network for securely delivering streaming data
14167917944Secure authentication advertisement protocol
14177917769Transaction authentication card
14187917757Method and system for authentication of electronic communications
14197916868Quadratic residue based password authenticated key exchange method and system
14207916354Hiding and detecting auxiliary data in media materials and signals
14217913291Means and method for control of personal data
14227913096Method and system for the cipher key controlled exploitation of data resources, related network and computer program products
14237913074Securely launching encrypted operating systems
14247912886Configurable exponent FIFO
14257912222Connection authentication in wireless communication network system
14267912221Communication apparatus and method thereof
14277912215Data transmission apparatus, data receiving apparatus and method executed thereof
14287912212Symmetric cryptosystem using cascaded chaotic maps
14297908663Abstractions and automation for enhanced sharing and collaboration
14307908485Printing system
14317908472Secure sockets layer cut through architecture
14327908411Data transfer device and mobile telephone
14337908217Method and system for optimizing throughput of mailing machines
14347907733Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station
14357907732Radio frequency identification tag lock and key
14367907730Method and system for mobile communications
14377907729Rollback attack prevention system and method
14387904949Apparatus, systems and methods to provide authentication services to a legacy application
14397904727Method to control access between network endpoints based on trust scores calculated from information system component analysis
14407904719Extending the range of computational fields of integers
14417903817System and method for wireless network profile provisioning
14427903816Storage system executing encryption and decryption processing
14437903810Single instruction for data scrambling
14447900263Content recording/reproducing apparatus and content recording/reproducing method
14457900253Systems and methods for authorization credential emulation
14467900062Unauthorized contents detection system
14477899475Enhanced short message service (SMS)
14487899189Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment
14497895638Protocol for entering, disabling and/or erasing scrambled data access rights and the corresponding access control module
14507895432Method and apparatus for using a third party authentication server
14517894628Digital watermark embedding apparatus and digital watermark detection apparatus
14527890766Method and apparatus for a proximity warning system
14537890759Connection assistance apparatus and gateway apparatus
14547890752Methods, systems, and computer program products for associating an originator of a network packet with the network packet using biometric information
14557890358Accessibility insurance coverage management
14567889869Methods and apparatus to integrate mobile communications device management with web browsing
14577889868Quantum key distribution system
14587886364Encrypted key cache
14597886362Media authentication via physical attributes of a medium
14607886354Method and apparatus for local area networks
14617886162Cryptographic secure program overlays
14627886154Method and apparatus for a proximity warning system
14637886143Multi-data rate cryptography architecture for network security
14647885410Wireless security system and method
14657885409Software radio system and method
14667882377Electronic device with flexible processing system
14677882355Encryption/decryption methods and devices utilizing the same
14687882350Encryption and decryption method for conditional access content
14697882346Method and apparatus for providing authentication, authorization and accounting to roaming nodes
14707881492Electronic watermark embedding apparatus and method and electronic watermark examining apparatus and method
14717881478Method for controlling access to an encrypted programme
14727881475Systems and methods for negotiating security parameters for protecting management frames in wireless networks
14737881474System and method for secure wireless multi-hop network formation
14747881471Systems and methods for recording an encrypted interaction
14757881468Secret authentication key setup in mobile IPv6
14767881466Method and system for obfuscating a cryptographic function
14777877790System and method of using personal data
14787877519Selecting one of a plurality of adapters to use to transmit a packet
14797876900Hybrid scrambled transmission coding
14807876896RTP payload format
14817873837Data security for electronic data flash card
14827873836Information processing apparatus and method, recording medium, program, and wireless communication system
14837873164Method and apparatus for configuring network devices
14847873163Method and apparatus for message integrity in a CDMA communication system
14857873161Small hardware implementation of the subbyte function of rijndael
14867870393Steganographic method and device
14877869601Authentication method of ad hoc network and wireless communication terminal thereof
14887869600Optical transmitter and transmitting method for transmitting cryptogram
14897869599Quantum cryptography key distributing system and synchronizing method used in the same
14907869597Method and system for secure packet communication
14917869592Calculation apparatus and encrypt and decrypt processing apparatus
14927869590Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets
14937865604System and program for access control
14947865174Establishing a collaborative domain among communication terminals responsive to authentication
14957864958Quantum key distribution method and apparatus
14967864952Data processing systems with format-preserving encryption and decryption engines
14977864951Scalar multiplication method with inherent countermeasures

2010

14987861312MP3 player with digital rights management
14997860487Method of securely unlocking a mobile terminal
15007860247Identity based encryption
15017860244Secure computation of private values
15027860243Public key encryption for groups
15037856655System and method for improved network security
15047856404Playlist burning in rights-management context
15057856101Method for elliptic curve scalar multiplication
15067856100Privacy-preserving data aggregation using homomorphic encryption
15077856099Secure data transmission between two modules
15087853988State saver/restorer for a geospatial decision management system
15097853805Anti-tamper system
15107853801System and method for providing authenticated encryption in GPON network
15117853797Information processing method and information processing apparatus
15127853013Cryptographic method and system for encrypting input data
15137853012Authentication system executing an elliptic curve digital signature cryptographic process
15147853011Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission
15157849514Transparent encryption and access control for mass-storage devices
15167849324Method and apparatus for communicating authorization data
15177849318Method for session security
15187849316Methods and apparatus for secure document printing
15197848523Systems and methods for added authentication in distributed network delivered half-duplex communications
15207848522Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device
15217844998Apparatus and method for autonomic email access control
15227844831Secure memory device for smart cards
15237844826Method and apparatus for communicating authorization data
15247844808Computer compliance enforcement
15257844073Watermark-based goods authentication
15267844057Roaming using reassociation
15277844056Method and apparatus for encapsulating long messages over limited fibre channel extended link service
15287841942Gaming system license management
15297840810Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key
15307840008Method and apparatus for decrypting a communication
15317840000High performance programmable cryptography system
15327839999Encryption device, encryption processing method and program, and information protection system employing the encryption device
15337839998Transcoding CableCARD
15347839538Method and system for applying an image-dependent dynamic watermark to postal indicia
15357839263System and method of training in a transmit/receive system
15367836310Security system that uses indirect password-based encryption
15377836042Adaptive routing of resource requests for multiple back-end systems
15387835723Mobile banking
15397835526Method and system for restricting mobility using unique encrypted chargers
15407835525Cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor
15417835523Cryptographic engine abstraction layer for a software defined radio
15427831830Methods and apparatus for secure document printing
15437831238Method and system for multimedia tags
15447831062Arrangement of objects in images or graphics to convey a machine-readable signal
15457831049Enhanced encryption method and system for ultra secure applications
15467831039AES encryption circuitry with CCM
15477830296Anechoic structures for absorbing electromagnetic interference in a communications module
15487827400Security certificate management
15497827113Method and system for providing a content subscription service
15507826749Method and system for quantum key distribution over multi-user WDM network with wavelength routing
15517826618Synchronization of encryption in a wireless communication system
15527826617Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment
15537826611System and method for exchanging a transformed message with enhanced privacy
15547826610Method to secure an electronic assembly against attacks by error introduction
15557823193Method and system for ordering, loading and using admission tickets
15567822990Online data encryption and decryption
15577822989Controlling access to an area
15587822406Simplified dual mode wireless device authentication apparatus and method
15597822342Secure quantum optical communications system and method
15607822204Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
15617819746System for awarding a bonus to a gaming device on a wide area network
15627818803Security module having a secondary agent in coordination with a host agent
15637818781Behavior blocking access control
15647818260System and method of managing digital rights
15657818259Prepaid licensing system and method
15667817986Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
15677817739Method for reducing feedback information overhead in precoded MIMO-OFDM systems
15687817734System and method for improving signal to quantization noise ratio of an OFDMA modulator
15697813579Microscope system
15707813508Communication system, wireless communication apparatus, and communication method
15717813507Method and system for creating random cryptographic keys in hardware
15727813413Antenna array communication using spreading codes
15737809941Certifier hierarchy for public key infrastructure in an ad-hoc network
15747809132Implementations of AES algorithm for reducing hardware with improved efficiency
15757808366Refrigerator and method of controlling the same
15767805614Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
15777805611Method for secure communication from chip card and system for performing the same
15787805478Montgomery modular multiplier
15797804961Method and apparatus for fast crytographic key generation
15807802101System and method of retrieving a watermark within a signal
15817802100Watermark system
15827801492System and method for managing resources of portable module resources
15837801326Digital watermark and film mark
15847801305Secure device for the broadcasting, recording and viewing on demand of audiovisual works in a format of the MPEG-2 TS type
15857801302Cryptographic method and apparatus
15867801297Communication device and communication control method
15877801227Methods and apparatus related to composite beacon and wideband synchronization signaling
15887797740System and method for managing captured content
15897797547Information processing apparatus and method of controlling authentication process
15907797537Mobile terminal, data communication method, and computer program
15917796763Method and system for disaster recovery of data from a storage device
15927796752Cipher implementation
15937796750Method for making secure an electronic entity with encrypted access
15947793353Identification card manufacturing security
15957792325Methods and devices employing content identifiers
15967792299Broadcasting receiving apparatus and broadcasting receiving method
15977792298Method of using a mobile device to authenticate a printed token and output an image associated with the token
15987792297System and process for limiting distribution of information on a communication network based on geographic location
15997792288Communication system using quantum cryptography and comprising switching stations
16007792286Signature generation device and signature verification device
16017788715Authentication for transmission control protocol
16027788700Enterprise security system
16037788500Biometric authentication device and terminal
16047788498Triple-tap password entry
16057788182Method for loaning digital works
16067788168Method, system, and apparatus for dynamically creating electronic contracts
16077787627Methods and apparatus for providing a key management system for wireless communication networks
16087787626System and method for obtaining certificate status of subkeys
16097787624Method for inserting synchronization markers into a video stream, compatible with a block cipher
16107787619Method and apparatus for secure key management using multi-threshold secret sharing
16117783900Querying encrypted data in a relational database system
16127783897Programmable logic device
16137783895Method and apparatus for encrypting data to be secured and inputting/outputting the same
16147783702Using a mobile phone to control a personal computer
16157783578System for providing cardless payment
16167783041System, method and computer program product for authenticating a data agreement between network entities
16177783040Encryption in a secure computerized gaming system
16187783036Apparatus for encrypting/decrypting real-time input stream
16197779476Active defense against wireless intruders
16207779272Hardware cryptographic engine and encryption method
16217779258Method for controlling security function execution with a flexible, extendable, and non-forgable block
16227779250Method for applying certificate
16237779071Enterprise wireless local area network switching system
16247778932Device-based access privilege to an account
16257778437Media and methods employing steganographic marking
16267778422Security associations for devices
16277778415Substitution cipher text-encoding and un-encoding software and method
16287778414Encryption method based on factorization
16297774609Process for digital signing of a message
16307774602Secure modem gateway concentrator
16317774283Method and system for using a camera cell phone in transactions
16327773972Functionality and policies based on wireless device dynamic associations
16337773754Key management system and method
16347773746Encryption system, encryption device, decryption device, program, and integrated circuit
16357773678Method and apparatus for reducing the dynamic range of a radio signal
16367770019Imaging method and device using biometric information for operator authentication
16377769202Quantization-based data embedding in mapped data
16387769175System and method for initiation of a security update
16397769173Methods and systems for executing bit-commitment protocols that are based on entangled quantum states and a third party
16407769172Methods and systems for secure distribution of subscription-based game software
16417769166Dual mode AES implementation to support single and multiple AES operations
16427769165Semi-public white-box cipher
16437769164Printing apparatus
16447765599Multimedia transmitter, multimedia receiver, multimedia transmission system, and method for securely transmitting multimedia content over a wireless link
16457764794Location-based wireless messaging for wireless devices
16467764793Method to leverage a secure device to grant trust and identity to a second device
16477764792System and method for encoding data transmitted on a bus
16487764786Protection of a DES algorithm
16497764785Method for communicating securely over an insecure communication channel
16507761717Memory device with data security in a processor
16517761712Steganographic method and device
16527760905Wireless mobile phone with content processing
16537760882Systems and methods for mutual authentication of network nodes
16547760881Data processing apparatus and data reception processing apparatus
16557760874Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets
16567758422Hard drive authentication
16577757096Mobile unit with fingerprint sensor and attachment structure
16587757093Printing system
16597757091Method and apparatus for the creation of a self-authenticating document
16607757082Efficient revocation of receivers
16617756793Content data supply system, content data supply apparatus and method, content data reproduction apparatus and method, and program
16627756290Detecting embedded signals in media content using coincidence metrics
16637756273System and method for bit-reversing and scrambling payload bytes in an asynchronous transfer mode cell
16647752660Transmission error resistant reader station
16657752449System and method for generating a non-repudiatable record of a data stream
16667751596Methods and arrangements employing digital content items
16677751588Error processing of steganographic message signals
16687751568Method for securely creating an endorsement certificate utilizing signing key pairs
16697751567Local authentication of mobile subscribers outside their home systems
16707751566Apparatus using a time division multiple access bus for providing multiple levels of security in a communications system
16717751565Secure encryption system, device and method
16727748617Electronic identification system
16737748045Method and system for providing cryptographic document retention with off-line access
16747748036Methods for categorizing input data
16757747532Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation
16767747038Method and apparatus for associating identifiers with content
16777747037Routing networks for use with content linking systems
16787747017Method and apparatus for end-to-end clear transport protocol
16797743405Method of authentication via a secure wireless communication system
16807743261Unauthorized contents detection system
16817743249Method of securing a document in a system and controlling access to the document and a seal for use in the method
16827742602Cipher key setting system, access point, wireless LAN terminal, and cipher key setting method
16837742601Encryption method using synchronized continuously calculated pseudo-random key
16847742595Cryptographic method protected against covert channel type attacks
16857742594Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
16867739501Cryptographic key construct
16877738661Broadcasting receiving apparatus and broadcasting receiving method
16887738660Cryptographic key split binding process and apparatus
16897735117Context-sensitive confidentiality within federated environments
16907734380Push communications architecture for intelligent electronic devices
16917734280Method and apparatus for authentication of mobile devices
16927734051Key distribution
16937734050Digital certificate pool
16947734049Data transmission method, user equipment and GPRS/EDGE radio access network
16957734048Cryptographic system using chaotic dynamics
16967734046Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit
16977734043Encryption key obfuscation and storage
16987734042System and method for using a streaming protocol
16997729494Squared Weil and Tate pairing techniques for use with elliptic curves
17007725932Restricting communication service
17017725821Managing electronic documents utilizing a digital seal
17027724920Digital authentication with analog documents
17037724919Methods and systems for steganographic processing
17047724903Framing of transmit encoded data and linear feedback shifting
17057724898Cryptography using finite fields of odd characteristic on binary hardware
17067724897Program converter, encrypting device, and encrypting method
17077724896Method for transmitting messages between an emitter and at least on receiver and system for implementing said method
17087721113Data alteration detecting method, data alteration detecting device and data alteration detecting program
17097721105Repurposing digitally signed information
17107721088Terminal device, server device, and content distribution system
17117720767Method and system to support dynamic rights and resources sharing
17127720255Methods and apparatus to process video and audio media
17137720250Method and apparatus for watermarking stream data
17147720228Modulator autocalibration methods for quantum key distribution
17157720227Encryption method for SIP message and encrypted SIP communication system
17167720226Private and secure optical communication system using an optical tapped delay line
17177720225Table splitting for cryptographic processes
17187720221Privacy-enhanced e-passport authentication protocol
17197720220Cipher message assist instruction
17207720219Apparatus and method for implementing a hash algorithm word buffer
17217716723System and method for network user authentication
17227716491Generation and management of customer pin's
17237716480Property-based data authentication mechanism
17247715563Rapid acquisition of state vectors in an encrypted data communication system
17257715562System and method for access authentication in a mobile wireless network
17267715553Encrypting a plaintext message with authentication
17277715552Data authentication with a secure environment
17287712128Wireless access system, method, signal, and computer program product
17297711961Electronic apparatus and authenticating method
17307711666Reduction of memory usage for prime number storage by using a table of differences between a closed form numerical function and prime numbers which bounds a prime numeral between two index values
17317711143Methods for marking images
17327711119Method and apparatus for transition of encryption key during an ongoing media communication session
17337711118Security system
17347711117Management of a communication network and the migration of mobile agents
17357711113ID-based signature, encryption system and encryption method
17367710978System and method for traversing a firewall with multimedia communication
17377707402Quantum cipher communication system
17387706539Method of guaranteeing users' anonymity and wireless local area network (LAN) system therefor
17397706538System, method and data storage device for encrypting data
17407706536Phase locking in a multi-channel quantum communication system
17417706535Systems and methods for implementing routing protocols and algorithms for quantum cryptographic key transport
17427706528Prime calculating apparatus, key issuing system, and prime calculation method
17437702898Method for authenticating and verifying SMS communications
17447702221Unified control and memory for a combined DVD/HDD system
17457702106Quantum secret splitting based on non-orthogonal multi-particle states
17467702105Accelerating elliptic curve point multiplication through batched inversions
17477702104System and method for securing genomic information
17487702101Secure presentation of media streams in response to encrypted digital content
17497702099Multipoint synchronous diffused encryption/decryption method
17507702098Elliptic curve point octupling for weighted projective coordinates
17517702097Method and apparatus for authentication of data using different hash functions and feedback
17527698566Location-based voice-print authentication method and system
17537698560Information storage system
17547697719Methods for analyzing electronic media including video and audio
17557697694Synchronizing the exchange of cryptography information between kernel drivers
17567697689Secure transmission system for a digital trunked radio system
17577697688Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
17587697687Streaming implementation of AlphaEta physical layer encryption
17597697594Method and apparatus for regenerative based interference cancellation within a communication system
17607694145Indicating status for digital signatures
17617693284Method and apparatus for encryption of over-the-air communications in a wireless communication system
17627693283Methods and apparatus for providing user anonymity in online transactions
17637693282Gaming machine, gaming information authentication and acquisition device, and gaming information acquisition device
17647693279Security method and apparatus using biometric data
17657693277Generating digital signatures using ephemeral cryptographic key
17667689831Method and system for securing interface access via visual array paths in combination with hidden operators
17677689825Systems and methods for device registration using optical transmission
17687688972Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets
17697688900Interleaver decorrelation in data transmitting and receiving devices
17707685433Recognition of live object in motion
17717685432Authentication method based on biological characteristic information
17727685263Method and system for configuring a device with a wireless mobile configurator
17737685034System and method for finance-based competition
17747684701Photonic quantum information system using unpolarised light
17757684564Method for solving Frobenius equations for elliptic-curve cryptography
17767684563Apparatus and method for implementing a unified hash algorithm pipeline
17777684502Communication network system, and transmission/reception apparatus, method and integrated circuit for use therein
17787684469Code division multiple access transmission antenna weighting
17797681244Packet transmitter apparatus
17807681228Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions
17817681042System and method for dis-identifying sensitive information and associated records
17827681034Method and apparatus for securing electronic data
17837680281Method and apparatus for intercepting events in a communication system
17847680278Domino scheme for wireless cryptographic communication and communication method incorporating same
17857680270System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication
17867680268Elliptic curve point octupling using single instruction multiple data processing
17877676218System and method for detection of a rouge wireless access point in a wireless communication network
17887676059Video steganography or encoding
17897675981OFDM signal demodulator circuit and OFDM signal demodulating method
17907673328Network authentication system using individual services providers and an authentication server
17917673151Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor
17927673147Real-time mitigation of data access insider intrusions
17937673146Methods and systems of remote authentication for computer networks
17947672477Detecting hidden auxiliary code signals in media
17957672455Method and apparatus for data encryption
17967672452Secure scan
17977669233Methods and systems for secure transmission of identification information over public networks
17987668336Extracting embedded information from a document
17997668246Apparatus, method and computer program for correcting common phase error of OFDM signal symbols
18007668121Purging of authentication key contexts by base stations on handoff
18017667429Battery pack authentication for a mobile device
18027665118Server, computer memory, and method to support security policy maintenance and distribution
18037664957Digital signatures including identity-based aggregate signatures
18047664708System for controlling the distribution and use of digital works using digital tickets
18057664706Method for granting customers access to a product
18067664269Encrypting message for secure transmission
18077664267Bit based arithmetic coding using variable size key cipher
18087664266Compression of fiber-based certificate of authenticity data
18097664265Controlling communications between stations
18107664262Playback apparatus and playback control method
18117660994Access control
18127660988Electronic notary
18137660420Wireless device synchronization
18147660419System and method for security association between communication devices within a wireless personal and local area network
18157660418Cryptographic system and method for geolocking and securing digital information
18167660417Enhanced security design for cryptography in mobile communication systems
18177657925Method and system for managing security policies for databases in a distributed system
18187657761Multiple trust modes for handling data
18197657737Method for mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server
18207657058Watermark orientation signals conveying payload data
18217657031Method and device for printing sensitive data
18227653937Video game terminal and security activation arrangement
18237653211Digital watermark embedding apparatus and digital watermark detection apparatus
18247653200Accessing cellular networks from non-native local networks
18257650647Hardware-oriented configuration and locking of devices
18267650313Microbilling using a trust management system
18277650156Method and apparatus for signal processing in a satellite positioning system
18287650010Connected video and audio
18297650009Controlling use of audio or image content
18307649997User transparent registration process for secure communication
18317649996Cryptographic communication apparatus
18327649994System and method for decoding CDMA quality channel
18337649990Apparatus to implement dual hash algorithm
18347647498Device authentication
18357647367Apparatus and method for calculating a multiplication
18367647024Method and system for improving client server transmission over fading channel with wireless location and authentication technology via electromagnetic radiation
18377646872Systems and methods to securely generate shared keys
18387644437Method and apparatus for local area networks
18397644268Automated electronic messaging encryption system
18407643817Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels
18417643649Integrating digital watermarks in multimedia content
18427643638System for generating pseudorandom sequences
18437643495PCI express switch with encryption and queues for performance enhancement

2009

18447640432Electronic cash controlled by non-homomorphic signatures
18457639947System and methods for quantum key distribution over WDM links
18467639837Identification documents and authentication of such documents
18477639820Image forming apparatus certificate sheet making method and certificate sheet processing method
18487639817Method for scrambling packet data using variable slot length and apparatus thereof
18497639816Mobile communication terminal device and server device
18507639808Elliptic curve cryptosystem apparatus, elliptic curve cryptosystem method, elliptic curve cryptosystem program and computer readable recording medium storing the elliptic curve cryptosystem program
18517639806Fingerprinting digital devices using electromagnetic characteristics of their communications
18527639802Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP
18537639797Apparatus and method of performing AES Rijndael algorithm
18547636939Endpoint identification and security
18557636936Administration of protection of data accessible by a mobile device
18567634657Reducing the probability of undetected collisions in hash-based data block processing
18577634447Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
18587634252Mobility management in wireless networks
18597634091System and method of hiding cryptographic private keys
18607634087Systems and methods for identity-based encryption and related cryptographic techniques
18617634085Identity-based-encryption system with partial attribute matching
18627634084Prime calculation device, method, and key issuing system
18637631195System and method for providing security to a portable storage device
18647631192Network apparatus for accessing services over a network
18657631186Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing
18667631048Method and system for personal policy-controlled automated response to information transfer requests
18677630496Arrangement and method for adapting mobile field device
18687630495Method for protecting electronic device, and electronic device
18697628322Methods, system and mobile device capable of enabling credit card personalization using a wireless network
18707627768Method and device for automatic validation of computer program using cryptography functions
18717627749System and method for processing data and communicating encrypted data
18727627126Systems and methods for implementing path length control for quantum cryptographic systems
18737627124Wireless communication authentication process and system
18747627123Wireless network having multiple security interfaces
18757627113Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets
18767624431802.1X authentication technique for shared media
18777624272Platform information for digital signatures
18787624270Inter subnet roaming system and method
18797623666Automatic setting of security in communication network system
18807623664System providing dynamic quality of service signaling messages in a cable telephony network
18817623656Stream cipher encryption and message authentication
18827620386Establishing a collaborative domain among communication terminals responsive to authentication
18837620200Authentication of identification documents
18847620183Method for establishing a connection between a terminal and an operating mobile radio network, mobile radio network and terminal used in such a method
18857620182QKD with classical bit encryption
18867618317Method for developing gaming programs compatible with a computerized gaming operating system and apparatus
18877617527Architecture for virtual private networks
18887617522Authentication and authorization across autonomous network systems
18897616765Method and system for generating shared information
18907613932Method and system for controlling access to software features in an electronic device
18917613919Single-use password authentication
18927613448Web access providing system
18937613297Method and apparatus for data encryption
18947611407Wireless wagering system
18957609944Copy protection of optical discs
18967609834Personal authenticating multi-function peripheral
18977607012Method for securing a communication
18987606771Dynamic number authentication for credit/debit cards
18997606368Method and apparatus for data encryption
19007606367Quantum cryptography with fewer random numbers
19017606363System and method for context switching of a cryptographic engine
19027603703Method and system for controlled distribution of application code and content data within a computer network
19037603697Method and system for securely delivering authentication-related data
19047602918Method for distributing security keys during hand-off in a wireless communication system
19057602907Elliptic curve point multiplication
19067602905Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making
19077600255Preventing network denial of service attacks using an accumulated proof-of-work approach
19087600118Method and apparatus for augmenting authentication in a cryptographic system
19097599515Wireless communication method and apparatus for generating, watermarking and securely transmitting content
19107599491Method for strengthening the implementation of ECDSA against power analysis
19117599489Accelerating cryptographic hash computations
19127596703Hidden data backup and retrieval for a secure device
19137596700Method and system for establishing trusting environment for sharing data between mutually mistrusting entities
19147596689Secure and reliable document delivery using routing lists
19157596270Method of shuffling text in an Asian document image
19167596225Method for refreshing a pairwise master key
19177596224Method and system for secure call alert
19187594261Cryptographic applications of the Cartier pairing
19197594121Methods and apparatus for determining an identity of a user
19207594116Mediated key exchange between source and target of communication
19217594109Digital content distribution system
19227594108Operator root certificates
19237593898Method and system for payment transactions and shipment tracking over the internet
19247593545Determining whether two or more creative works correspond
19257593530Secure legacy media peripheral association with authentication in a media exchange network
19267593529Scramble methods and apparatus for packetized digital video signal in conditional access system
19277593476Data scrambler generation of pseudo-random bit sequence for semi-stationary Q-mode signal
19287591006Security for external system management
19297590866Super-distribution of protected digital content
19307590858Authentication apparatus, user authentication method, user authentication card and storage medium
19317590844Decryption system and method for network analyzers and security programs
19327590843Key exchange for a network architecture
19337590741Communication system for adding data transmission origin information to data
19347590602Electronic currency, electronic wallet therefor and electronic payment systems employing them
19357590599System and method of automatically maintaining and recycling software components
19367590479Remote login of a personal computer
19377590246Authentication between a cellular phone and an access point of a short-range network
19387590245Anonymous communicating over interconnected networks
19397590241Receiver and receiving method
19407590236Identity-based-encryption system
19417590235Reduction calculations in elliptic curve cryptography
19427590183Generating signals for transmission of information
19437587752Methods and apparatus for providing a control channel in a data network
19447587606Emergency web keys
19457587367Method and system to provide feedback data within a distributed e-commerce system
19467587049Active stabilization of a one-way QKD system
19477584365Storage system
19487584149System and method for securing data through a PDA portal
19497583814Protecting images with an image watermark
19507583800Encryption apparatus and method in a wireless communications system
19517581242Authenticating products
19527580528Secure terminal data loader apparatus and method for a mobile platform
19537580527Communication monitoring in a mobile radio network
19547580526Methods and apparatus for protecting signals transmitted between a source and destination device over multiple signals lines
19557580524Method and apparatus for synchronizing the emitter and the receiver in an autocompensating quantum cryptography system
19567578001Information recording and reproducing apparatus, information recording and reproducing method and information recording and reproducing program
19577577986Security objects controlling access to resources
19587577621Cryptographic server with provisions for interoperability between cryptographic systems
19597577256Counter initialization, particularly for radio frames
19607577255Proxy method and system for secure wireless administration of managed entities
19617574731Self-managed network access using localized access management
19627574720Data transmitting method, data transmitting system, data receiving method and receiving terminal
19637574609Method, device and computer program for detecting point correspondences in sets of points
19647574608Security screening of electronic devices by device-reported data
19657574407System and method for selecting, ordering and accessing copyrighted information from physical documents
19667574198Security setting system
19677571490Method and apparatus for protecting data from unauthorized modification
19687571326Relative latency dynamics for identity authentication
19697571324Method and device for anonymous signature with a shared private key
19707571315Method and apparatus to assign trust to a key
19717570781Embedded data in gaming objects for authentication and association of behavior information
19727570764Sequence number calculation and authentication in a communications system
19737570761Method and system for preventing unauthorized recording of media content in the iTunes.TM. environment
19747570760Apparatus and method for implementing a block cipher algorithm
19757570759System and method for secure encryption
19767570420Systems and methods for transmitting quantum and classical signals over an optical network
19777568237Access control list with convolution-weakened authorization
19787568235Controlling data access using security label components
19797567686Hiding and detecting messages in media signals
19807567672Cryptographic communication system
19817567668Calculating unit and method for performing an arithmetic operation with encrypted operands
19827565698Information-processing device
19837565697Systems and methods for preventing unauthorized use of digital content
19847565676Portable device for receiving media content
19857565546System, method and apparatus for secure digital content transmission
19867565537Secure key exchange with mutual authentication
19877565532Secure file system server architecture and methods
19887565529Secure authentication and network management system for wireless LAN applications
19897565325Multi-site software license balancing
19907565322Systems and methods for serverless software licensing
19917564992Content identification through deriving identifiers from video, images and audio
19927564975Method of ciphering data and/or voice call to be transferred in mobile communication system and method of deactivating the ciphering
19937564973Digital watermark embedding device and digital watermark embedding method
19947564972Arithmetic device and encryption/decryption device
19957564971Apparatus and method for performing Montgomery type modular multiplication
19967562397Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
19977562348Method and system for obtaining device services on a self-service financial transaction terminal
19987562227Method of authenticating a user on multiple devices using a procedural memory based password
19997562220System and method for programming an isolated computing environment
20007561694Session mobility for wireless devices
20017561692Method of authenticating mobile terminal
20027561691System and method for providing secured access to mobile devices
20037558968Information processing apparatus and method
20047558956Communications device and communications program
20057558388Derivation method for cached keys in wireless communication system
20067558386Countermeasure method in an electronic component using a secret key cryptographic algorithm
20077555779Copyright protection system, recording device, and reproduction device
20087555650Techniques for reducing the computational cost of embedding information in digital representations
20097555206Apparatus for retrieving data from detachable optical driver
20107555139Secure documents with hidden signals, and related methods and systems
20117555128Systems and methods for the application of cryptosystems to the data link layer of packetized wireless networks
20127555127Quantum cryptography key distribution system and method
20137555126Game apparatus managing system, game apparatus, controlling method, computer program and recording medium
20147555122Method for elliptic curve point multiplication
20157555121Methods and apparatus for implementing a cryptography engine
20167552862User-controlled profile sharing
20177552481Method of assessing an organization's network identity capability
20187552467Security systems for protecting an asset
20197552341Licensing the use of software on a particular CPU
20207552332Java based electronic signature capture method, device and system
20217552330Mutual authentication system between user and system
20227552093Resolving license dependencies for aggregations of legally-protectable content
20237552071Point-of-care inventory management system and method
20247551915Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent
20257551913Methods and apparatus for anonymous user identification and content personalization in wireless communication
20267551739System and method for container monitoring, real time authentication, anomaly detection, and alerts
20277549171Method and apparatus for validation of application data on a storage system
20287549160Method and system for authenticated access to internet protocol (IP) multicast traffic
20297549063Methods and systems of protecting digital content
20307549061Unauthorized contents detection system
20317549050Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system
20327549046Method and system for vehicle authorization of a service technician
20337548643Methods, objects and apparatus employing machine readable data
20347548620Token provisioning
20357548266Methods and apparatus for providing portable photographic images
20367546957Travel kiosk
20377546629System and methodology for security policy arbitration
20387546466Decoding of watermarked information signals
20397546459GSM-like and UMTS-like authentication in a CDMA2000 network environment
20407546458Method for organizing virtual networks while optimizing security
20417546373Secure dynamic credential distribution over a network
20427545952Image or video display devices
20437545951Data transmission by watermark or derived identifier proxy
20447543337System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document
20457543333Enhanced computer intrusion detection methods and systems
20467543160System and method for generating a secure state indicator on a display
20477543158Hybrid cryptographic accelerator and method of operation thereof
20487543156Transaction authentication card
20497543144System and method for lost data destruction of electronic data stored on portable electronic devices
20507543141Method and apparatus for user authentication using infrared communication of a mobile terminal
20517542587Content processing methods using reversible watermarking
20527542569Security of data connections
20537541920Alarm/event encryption in an industrial environment
20547540014Automated policy change alert in a distributed enterprise
20557539875Secure repository with layers of tamper resistance and system and method for providing same
20567539874Secure password entry
20577539867On-disk file format for a serverless distributed file system
20587539866Method of cryptographing wireless data and apparatus using the method
20597539860Single use user IDS
20607539648Secure user certification for electronic commerce employing value metering system
20617539647Using power state to enforce software metering state
20627539514System and method for using a temporary electronic serial number for over-the-air activation of a mobile device
20637539463Techniques to enhance diversity for a wireless system
20647539309Method and system for GSM authentication during WLAN roaming
20657539308Quantum steganography
20667539304Integrated circuit having self test capability using message digest and method for testing integrated circuit having message digest generation circuitry
20677539237Fast locking mechanism for channelized ultrawide-band communications
20687536558Flash memory distribution of digital content
20697536548System and methodology providing multi-tier-security for network data exchange with industrial control components
20707536547Secure data transmission in a network system of image processing devices
20717536360Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
20727536355Content security system for screening applications
20737536026Image processing apparatus and method
20747536016Encrypted content data structure package and generation thereof
20757536015Setting method for wireless communication device, computer peripheral equipment, and information processor
20767533408Portable computing system, apparatus and method
20777533276Program execution device
20787533273Method and system for controlling an encryption/decryption engine using descriptors
20797533271Method and apparatus for remote control and monitoring of a multimedia system
20807533257Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access
20817533064E-mail invoked electronic commerce
20827533027Methods and apparatus for uniquely identifying a large number of film prints
20837532876Communication system and associated method of performing mutual authentication
20847532862Method and apparatus for configuring a wireless device through reverse advertising
20857532741Data hiding in media
20867532720Utilizing SIMD instructions within montgomery multiplication
20877530117Method and apparatus for preventing unauthorized use of software
20887530116Controlling the downloading and recording of digital data
20897530110System and method for fuzzy multi-level security
20907530093Securing applications and operating systems
20917529944Support for multiple login method
20927529941System and method of retrieving a watermark within a signal
20937529939Method of and apparatus for transferring data
20947529938Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information
20957529933TLS tunneling
20967529926Public key certification providing apparatus
20977529806Partitioning of MP3 content file for emulating streaming
20987529712Content distribution system and method
20997529647Computing distortion of media signals using embedded data with repetitive structure and log-polar mapping
21007529385Marking articles using a covert digitally watermarked image
21017529372Method for setting an encryption key for logical network separation
21027529371Replaceable sequenced one-time pads for detection of cloned service client
21037526808Method and system for actively defending a wireless LAN against attacks
21047526798System and method for credential delegation using identity assertion
21057526657Information processing apparatus, information processing method, and program storage medium
21067526652Secure PIN management
21077526642Controlling delivery of certificates in a mobile communication system
21087526450Interface for presenting downloadable digital data content format options
21097526092Rekey operation with multiplexing capability
21107526091Method for transmitting and receiving control information for encryption in a mobile communication system supporting multimedia broadcast/multicast service
21117523316Method and system for managing the display of sensitive content in non-trusted environments
21127523303System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product
21137523302Electronic recipe management
21147523072System for controlling the distribution and use of digital works
21157522728Wireless methods and devices employing steganography
21167522727Method and apparatus for providing authentication in a communication system
21177519999Secure negotiation and encryption module
21187519989Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
21197519836Method and apparatus for the secure storage of audio signals
21207519835Encrypted table indexes and searching encrypted tables
21217519827Provisioning and use of security tokens to enable automated test equipment
21227519824Time stamping method employing multiple receipts linked by a nonce
21237519821Account authority digital signature (AADS) system
21247519815Challenge-based authentication without requiring knowledge of secret authentication data
21257519730Copying chat data from a chat session already active
21267519558Biometrically enabled private secure information repository
21277519183Communication system, wireless communication apparatus, and communication method
21287519178Method, system and apparatus for ensuring a uniform distribution in key generation
21297519177Method and system for processing a data set
21307518816Method and apparatus for disc drive data security using fields in servo wedges
21317516491License tracking system
21327516484Reader adapted for a portable computer
21337516483System and method for accomplishing two-factor user authentication using the internet
21347516333Hybrid Java-C network appliance
21357516329Information processing apparatus
21367516324Information processing system, information management apparatus, and information processing apparatus
21377516147URL system and method for licensing content
21387516104Methods of providing software over a network and related systems and computer program products
21397515733Methods and arrangements employing digital content items
21407515716Systems and methods for reserving cryptographic key material
21417515715Information security for aeronautical surveillance systems
21427515714Communication apparatus and communication system
21437513411Method of and apparatus for granting electronic signature, and computer program
21447512988Data transmission apparatus and method for management of user identification data allocated to image data
21457512985System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation
21467512984Distributed and scalable instant multimedia communication system
21477512982Computer virus generation detection apparatus and method
21487512972Synchronizing for digital content access control
21497512813Method for system level protection of field programmable logic devices
21507512800Key management technique for establishing a secure channel
21517512796Authentication in a packet data network
21527512791Communication apparatus and method for discriminating confidentiality of received data
21537512788Method and apparatus for anonymous group messaging in a distributed messaging system
21547512786Client-side boot domains and boot rules
21557512783Provision of security services for an ad-hoc network
21567512782Method and system for using a web service license
21577512567Method and system for providing biometric authentication at a point-of-sale via a mobile device
21587512565Method for implementing secure transaction for electronic deposit (purse)
21597512239Protection key for hardware and information management system
21607512237Encryption for optical communications using dynamic subcarrier multiplexing
21617512235Multiple user authentication for online console-based gaming
21627512234Providing location data about a mobile entity
21637509687Remotely authenticated operation method
21647509683System and method for authenticating digital content
21657509682Copy protection method and system for digital media
21667509675Non-invasive monitoring of the effectiveness of electronic security services
21677509500Random number generation for encrypting cellular communications
21687509499Secure token access distributed database system
21697509290Methods and apparatuses for differentiating users in multi-player web-based entertainment environments
21707508955Authentication of objects using steganography
21717508935Cryptosystem for data security
21727506380Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module
21737506370Mobile security architecture
21747506172Gaming device with biometric system
21757505940Software suite activation
21767505898Method and system for masking speech
21777505598On-the-fly encryption/decryption for WLAN communications
21787505597Multi-level security CDMA communications arrangement
21797505596Automatic detection of wireless network type
21807505595Post capture decryption of wirelessly captured data using multiple keysets
21817505586Method for computer-based encryption and decryption of data
21827505585Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same
21837503074System and method for enforcing location privacy using rights management
21847502945Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system
21857502938Trusted biometric device
21867502936System and method providing secure access to a computer system
21877502930Secure communications
21887502761Method and system for providing online authentication utilizing biometric data
21897502474Network interface with security association data prefetch for high speed offloaded security processing
21907502472Encryption system and method for encrypting/decrypting sensitive data
21917502331Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices
21927502137Automated media selection for imposed print jobs
21937500270Method for utilizing intelligent clock controller in digital rights management
21947500267Systems and methods for disabling software components to protect digital media
21957500262Implementing single sign-on across a heterogeneous collection of client/server and web-based applications
21967500111Querying encrypted data in a relational database system
21977499566Methods for steganographic encoding media
21987499550System and method for protecting a title key in a secure distribution system for recordable media content
21997499549Communication system, information processing apparatus, information processing method, recording medium and program
22007499548Terminal authentication in a wireless network
22017499543Linear conversion circuit and encryption circuit
22027499541Cipher strength evaluation apparatus
22037499484Method for 2D antenna rake combining in a code division multiple access system
22047496965Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system
22057496769Hierarchical trusted code for content protection in computers
22067496751Privacy and identification in a data communications network
22077496540System and method for securing digital content
22087496539Systems, methods and computer products for providing tape library dynamic price performance enhancement feature
22097496202Architecture for manufacturing authenticatable gaming systems
22107496201Portable host-pluggable appliance tracking system
22117496200Architecture for manufacturing authenticatable gaming systems
22127496199Method of controlling access to cryptographic resources
22137493659Network intrusion detection and analysis system and method
22147493489System and method for authentication of JPEG image data
22157493291System and method for locally sharing subscription of multimedia content
22167493284Using visual images transferred from wireless computing device display screens
22177492904QKD system detector autocalibration based on bit-error rate
22187492899Authentication method for media gateway
22197490136Digital contents distributing system and distributing method
22207490069Anonymous payment with a verification possibility by a defined party
22217489783Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
22227489781Secure peer-to-peer messaging invitation architecture
22237489779Hardware implementation of the secure hash standard
22247487549Information processing apparatus, information processing method, recording medium, and program
22257487360Secure authentication and authorization for transaction processing
22267487359Time stamping method employing a separate ticket and stub
22277487358Method to control access between network endpoints based on trust scores calculated from information system component analysis
22287487357Virtual smart card system and method
22297487352Architecture for manufacturing authenticatable gaming systems
22307487350Fixed client identification system for positive identification of client to server
22317487348System for authenticating and screening grid jobs on a computing grid
22327487129Method and apparatus for the distribution of digitised information on demand
22337487128Updating usage conditions in lieu of download digital rights management protected content
22347486799Methods for monitoring audio and images on the internet
22357486789Device and method for calculation on elliptic curve
22367483699Overhead message update with decentralized control
22377483537Selecting cached RSA keys in response to RSA key requests
22387483535Transmission of generalized scalable bit-streams
22397480939Enhancement to authentication protocol that uses a key lease
22407480806Multi-token seal and unseal
22417480805Method and system for identifying and processing an unauthorized access request
22427480635Method for financing multimedia content through advertising
22437480631System and method for detecting and processing fraud and credit abuse
22447480622Accessibility insurance coverage management
22457478324Electronic publication system
22467478248Apparatus and method for securing data on a portable storage device
22477478244Access control method
22487478158Bandwidth management system
22497478068System and method of selecting consumer profile and account information via biometric identifiers
22507477746Apparatus for dynamically managing group transient key in wireless local area network system and method thereof
22517477745License management apparatus, license management system and license management method
22527477742Method and apparatus for controlling contents utilization, and a computer product
22537477741Analysis resistant cipher method and apparatus
22547475956Apparatus for printing, data writing to memory tags and data reading from memory tags, and methods therefor
22557475240System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems
22567475046Electronic trading system supporting anonymous negotiation and indications of interest
22577475044Electronic money system and electronic money terminal device
22587474888Method for bypassing passkey exchange and authentication procedures
22597474751Method of selecting encrypting arithmetric for realizing communication of secrecy
22607474750Dynamic content-aware memory compression and encryption architecture
22617474749Method and apparatus for achieving crypto-syncronization in a packet data communication system

2008

22627472283Method and apparatus for secured digital video and access tracking
22637472282Illegal access discriminating apparatus and method
22647472281Method for the automatic log-in of a subscriber station situated particularly in a motor vehicle in an external information system
22657472091Virtual customer database
22667471795Information transmission system
22677471794Network lock method and related apparatus with ciphered network lock and inerasable deciphering key
22687471793Method and apparatus for use in encrypted communication
22697471792Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
22707471790Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system
22717471789Encryption circuit achieving higher operation speed
22727471479System for protection against copying on magnetic tape recorders
22737469383Medical apparatus for diagnosis or treatment
22747469340Selective encryption of electronic messages and data
22757469230Method and system for automatically distributing fees, including a reseller commission, during a digital file transaction
22767469048Methods for point compression for jacobians of hyperelliptic curves
22777467415Distributed dynamic security for document collaboration
22787467412Data transfer system, data transfer program and video server system
22797467399Context-sensitive confidentiality within federated environments
22807467213Portable device and a method for accessing a computer resource of a temporary registered user
22817466840Soft error decoding of steganographic data
22827464411Copy protection for optical discs
22837464407Attack defending system and attack defending method
22847464273Content utilizing method
22857464272Server control of peer to peer communications
22867464262Method and apparatus for synchronizing audio and video in encrypted videoconferences
22877464261Switching device, switching method and computer system capable of preventing error in data transmission, which is easy to use
22887464162Systems and methods for testing whether access to a resource is authorized based on access information
22897461407Debugging port security interface
22907461406Access control for digital content
22917461269Information recording apparatus, information recording method, and digital broadcast receiver
22927461262Methods and apparatus for providing security in a caching device
22937461140Method and apparatus for identifying IPsec security policy in iSCSI
22947460672Method for securing data storage in a storage area network
22957460671Encryption processing apparatus and method for voice over packet networks
22967460670Systems and methods for managing quantum cryptographic networks
22977460665Cipher strength evaluation apparatus
22987458101Information viewing/listening system, information player, and information provider
22997458084Methods and systems for converged service creation and execution environment applications
23007457966Data file processing apparatus, remote control apparatus for data file processing apparatus and control method for data file processing apparatus
23017457964Trusted path for transmitting content thereon
23027457952Authentication tag for S/W media
23037457832Verifying dynamically generated operations on a data store
23047457548Quantum optical transmission device and quantum optical generator device therefor
23057457417Approach for configuring wireless devices
23067457416Key distribution center for quantum cryptographic key distribution networks
23077455229Direct print system
23087454794Access control method
23097454785Proxy method and system for secure wireless administration of managed entities
23107454628Method and apparatus for transmitting content data and recording and/or reproducing apparatus
23117454624Match template protection within biometric security systems
23127454618System and methods for transmitting encrypted data with encryption key
23137454033Quantization-based data hiding employing calibration and locally adaptive quantization
23147454020System and method for encrypting data in pictorial data
23157454018Transfer of DVD decode key on a window by window basis to an attached device
23167454016Data encryption system and method
23177451476Method and apparatus for interfacing a network to an external element
23187451326Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies
23197451318System and method of watermarking a signal
23207451301OS independent device management methods and apparatuses having a map providing codes for various activations of keys
23217451202Information management system having a common management server for establishing secure communication among groups formed out of a plurality of terminals
23227451108Method and system for measuring trade management performance
23237450928Methods for providing overdraft protection for post-paid communication service plans
23247450854High-speed wireless LAN system
23257450734Digital asset management, targeted searching and desktop searching using digital watermarks
23267450722Subset difference method for multi-cast rekeying
23277450720Linear transformation for symmetric-key ciphers
23287450719Gigabit Ethernet-based passive optical network and data encryption method
23297447915Map data processing method, map data processing device, storage medium, and on-board map data processing device
23307447910Method, arrangement and secure medium for authentication of a user
23317447662Transaction processing system
23327447386Cascaded modulator system and method for QKD
23337447311Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system
23347447310Lean multiplication of multi-precision numbers over GF(2.sup.m)
23357444666Multi-domain authorization and authentication
23367444522Dynamic negotiation of security arrangements between web services
23377444519Access control for federated identities
23387444518Method and apparatus for communicating authorization data
23397444517Method for protecting a user's password
23407444515Method and apparatus for detecting predefined signatures in packet payload using Bloom filters
23417444513Authentication in data communication
23427444510Methods and systems for accessing networks, methods and systems for accessing the internet
23437444000Content identification, and securing media content with steganographic encoding
23447443983Communication apparatus and method
23457443982Watermarking and transferring material
23467443981Execution unit for performing the data encryption standard
23477443980Hierarchical identity-based encryption and signature schemes
23487441269Method and system for session accounting in wireless networks
23497441264Security objects controlling access to resources
23507441263System, method and computer program product for providing unified authentication services for online applications
23517441125Portable data carrier provide with access protection by rendering messages unfamiliar
23527441122Method for providing secure access to a digital resource
23537441116Secure resource distribution through encrypted pointers
23547440573Enterprise wireless local area network switching system
23557440489Method and apparatus for selective demodulation and decoding of communications signals
23567437752Client architecture for portable device with security policies
23577437550System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
23587437468Method and system for secure URL-based access control
23597437314Method and system for referencing trading agreements
23607437161Method of fast data transmission of mobile stations via the same base station
23617437081System and method for providing two-way communication of quantum signals, timing signals, and public data
23627436964Synchronization of encryption in a wireless communication system
23637436962Method and apparatus for providing secured communication connections using a secured communication connection object
23647436961Sentinel synchronization method for enhancing QKD security
23657436959Data recording apparatus and recording method
23667436957Audio cassette emulator with cryptographic media distribution control
23677436816Method and system for transmission-based billing of applications
23687434225Context information associated with message flows in a messaging system
23697434069Method and device for encryption/decryption of data on mass storage device
23707434063Authentication method, apparatus, and system
23717434062Password encrypting apparatus and method for encrypting password
23727433848System for carrying out a transaction
23737433846Method of embedding permanent identification code into musical apparatus
23747433491Method and apparatus for associating identifiers with content
23757433472Digital content distribution system
23767430762Identification card manufacturing security
23777430758Prompt authentication
23787430754Method for dynamic application of rights management policy
23797430542System and method for activating a rendering device in a multi-level rights-management architecture
23807430541Method of and apparatus for updating a database using a recordable optical disc
23817428746System and method for secure network connectivity
23827428641Session-state manager
23837428638Architecture for manufacturing authenticatable gaming systems
23847428305Generation of keyed integer permutations for message authentication codes
23857426637Method and system for controlled media sharing in a network
23867426635Bulk certificate lifetime allocation systems, components and methods
23877426277Encryption of information input to portable card terminal using encryption key information associated to portable card terminal identifier
23887426271System and method for establishing secondary channels
23897424746Intrusion detection and vulnerability assessment system, method and computer program product
23907424618Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic
23917424615Mutually authenticated secure key exchange (MASKE)
23927424460Image ordering system and method
23937424284Secure network/service access
23947424135Security check provision
23957424132Embedding hidden auxiliary code signals in media
23967424131Authentication of physical and electronic media objects using digital watermarks
23977424128Electronic watermark embedding apparatus, electronic watermark embedding method, record medium having electronic watermark and manufacturing method of record medium
23987424116Method and apparatus for providing authentication in a communication system
23997424115Generating asymmetric keys in a telecommunications system
24007424034Information converting apparatus
24017421735Proxy method and system for secure wireless administration of managed entities
24027421583System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
24037421579Multiplexing a secure counter to implement second level secure counters
24047421077Mobile IP authentication
24057418737Encrypted data file transmission
24067418727Method for PC client security authentication
24077418596Secure, efficient, and mutually authenticated cryptographic key distribution
24087418594Mobile unit authenticating method
24097418421Method, system, and apparatus for dynamically creating electronic contracts
24107418397Witness system
24117418209System and method for multi-dimensional encoding
24127418111Methods and apparatus to process media
24137418101Securely transferring user data using first and second communication media
24147415730Microcomputer and test method therefore
24157415619Method and apparatus for recording and reproducing information on and from recording disc
24167415605Biometric identification network security
24177415441Printing system, apparatus and method for automatically printing records of electronic transactions
24187415129Providing reports associated with video and audio content
24197415115Method and system for disaster recovery of data from a storage device
24207412606Copy protection using detailed copy control information
24217412542Bridging a gaming console with a wireless network
24227412450Method and apparatus for identifying tampering of data in a file system
24237412424Third party certification of content in electronic commerce transactions
24247412420Systems and methods for enrolling a token in an online authentication program
24257412304Power system for area containing a set of power consumers
24267412229Sales apparatus and method of transmitting and receiving merchandise information by electric field induced in human body
24277412074Hiding codes in input data
24287412054Matrix encryption method and system
24297409553Public key certificate generation method, validation method and apparatus thereof
24307409549Methods and apparatus for dynamic home agent assignment in mobile IP
24317409543Method and apparatus for using a third party authentication server
24327409542Security association management through the use of lookup tables
24337409541Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method
24347409352System and method for managing sponsorships
24357409062Method and device for the generation of checkable forgery-proof documents
24367409061Method and system for secure distribution of subscription-based game software
24377408953Information converting apparatus
24387406709Apparatus and method for allowing peer-to-peer network traffic across enterprise firewalls
24397406599Indicating status for digital signatures
24407406593Method and apparatus for protecting information and privacy
24417406472Integrated import/export system
24427406447Opening price process for trading system
24437406446System and method for trustworthy metering and deactivation
24447406357Transforming a product description into a process network and specifying product creation
24457406173Quantum communication apparatus and quantum communication method
24467405666Method and apparatus for locating a missing individual
24477404089Method and system for protecting against side channel attacks when performing cryptographic operations
24487404088Digital content security system
24497404084Method and system to digitally sign and deliver content in a geographically controlled manner via a network
24507403623High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses
24517403622Process for managing a symmetric key in a communication network and devices for the implementation of this process
24527403619Interface module and decoder for host
24537403615Methods and apparatus for accelerating ARC4 processing
24547403614Encryption apparatus
24557401353Detecting and blocking malicious connections
24567401221Advanced stream format (ASF) data stream header object protection
24577401052Method for validating warranty compliance and ink compatibility assurance
24587400749Method and apparatus for supporting a biometric registration performed on an authentication server
24597400743Methods to evaluate images, video and documents
24607400731Scalable technique for ensuring real-time, end-to-end security in a multimedia mobile network
24617400726Apparatus for preventing unauthorized use of a copyrighted medium
24627400725Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein
24637400724Device and method for use in quantum crytography
24647400723Secure method for secret key cryptographic calculation and component using said method
24657398544Configurable cableCARD
24667398386Transparent IPSec processing inline between a framer and a network component
24677398311Selective cache flushing in identity and access management systems
24687397922Group security
24697397917Method and apparatus for generating a cryptographic key
24707397916System and method for protecting computer software from a white box attack
24717397817Information converting apparatus
24727395436Methods, software programs, and systems for electronic information security
24737395435Secure memory device for smart cards
24747395432Method of embedding/detecting digital watermark and apparatus for using thereof
24757395431Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method
24767395395Methods, systems, and storage mediums for monitoring consumption of storage space and relocating content contained in the storage when a predetermined condition is met
24777392535Access privilege transferring method
24787392396Transaction device with noise signal encryption
24797392383Method and apparatus for providing process-based access controls on computer resources
24807392037Wireless communication device and methods for protecting broadcasted management control messages in wireless networks
24817391891Method and apparatus for supporting a biometric registration performed on an authentication server
24827391881Curve fitting for synchronizing readers of hidden auxiliary data
24837391867Graphical display of QKD system statistics
24847391866Broadcast apparatus and reception apparatus for providing a storage service by which scrambled content is stored and descrambled using scrambling key list
24857390952Electronic music apparatus system useful for user registration
24867389428Data processing system, data processing method, and program providing medium
24877389425Biometric-based authentication in a nonvolatile memory device
24887389424Technique for distributing software
24897389414Printing system
24907389270System for controlling the distribution and use of digital works
24917389160Remote login of a personal computer
24927388958Communication system segregating communications by security level
24937388957Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus
24947386732Integrated system security method
24957383577Method and system for encrypted network management and intrusion detection
24967383574Method and system for limiting the impact of undesirable behavior of computers on a shared data network
24977383568Security management administration system and method
24987383462Method and apparatus for encrypted remote copy for secure data backup and restoration
24997383439Apparatus and method for facilitating encryption and decryption operations over an email server using an unsupported protocol
25007383438System and method for secure conditional access download and reconfiguration
25017383435Method for encoding and decoding communication data
25027383433Trust spectrum for certificate distribution in distributed peer-to-peer networks
25037383233Method of designing an electronic transaction system
25047383230System and method for the efficient exchange and pricing of services and intangible works
25057383229Access control and metering system for streaming media
25067382882Secure session set up based on the wireless application protocol
25077382877RSA cryptographic method and system
25087380710Payment card preloaded with unique numbers
25097380280Rights locker for digital content access control
25107380258Systems and methods for controlling and managing programming content and portions thereof
25117380209Managing electronic documents utilizing a digital seal
25127380134Information recording/reproducing apparatus and method of executing encryption processing
25137380129Method and apparatus for detecting grid intrusions
25147380128Method and device for reading authentication means and adapted identification means
25157380126Methods and apparatus for controlling the transmission and receipt of email messages
25167380124Security transmission protocol for a mobility IP network
25177380118Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method
25187379897Automatic payment system using RF ID tags
25197379551Method and system for recovering password protected private data via a communication network without exposing the private data
25207379550Method for the computer-assisted production of public keys for encoding information and device for carrying out said method
25217379548Virtual smart card device, method and system
25227379546Method for XZ-elliptic curve cryptography
25237376976Transcryption of digital content between content protection systems
25247376842Malware scanning messages containing multiple data records
25257376840Streamlined service subscription in distributed architectures
25267376839Smart card access control system
25277376628Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds
25287376624Secure communication and real-time watermarking using mutating identifiers
25297376242Quantization-based data embedding in mapped data
25307376232Computer system security via dynamic encryption
25317376196Receiving apparatus in communication system
25327373671Method and system for user information verification
25337373521Semiconductor IC, information processing method, information processing device, and program storage medium
25347373518Operation of a security module in a card reader
25357373507System and method for establishing secure communication
25367372976Content indexing and searching using content identifiers and associated metadata
25377372964Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof
25387372963Device for compression and encryption, and device for decompression and decryption
25397372962Storage system executing encryption and decryption processing
25407372908Radio communication method, radio transmitting apparatus, and radio receiving apparatus
25417370356Distributed network monitoring system and method
25427370354Method of remotely managing a firewall
25437370350Method and apparatus for re-authenticating computing devices
25447370210Apparatus and method for managing processor configuration data
25457370209Systems and methods for increasing the difficulty of data sniffing
25467370208Method and apparatus for automatic control of access
25477370206Self-signing electronic documents
25487370201Secure identification method between two radiofrequency network appliances
25497370194Security gateway for online console-based gaming
25507370120Method and system for reducing network latency in data communication
25517370017Redistribution of rights-managed content and technique for encouraging same
25527369678Digital watermark and steganographic decoding
25537369676Routing networks for use with content linking systems
25547369658Secure modulation and demodulation
25557369657Cryptography accelerator application program interface
25567367061Systems, methods, and a storage medium for storing and securely transmitting digital media data
25577367058Encoding method
25587367048Apparatus and method for autonomic email access control
25597367045Trusted communications system
25607366913Knowledge-type authorization device and methods
25617366910System and method for string filtering
25627366903Card activated cash dispensing automated banking machine system and method
25637366901Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address
25647366703Smartcard internet authorization system
25657366701Copy protection of data
25667366700Method and apparatus for transmitting and receiving a decoding key encoded with specific information to decode encrypted information of a record medium
25677366328Method and device for preventing false acceptance of latent fingerprint images
25687366304Cruable U-NII wireless radio with secure, integral antenna connection via SM BIOS in U-NII wireless ready device
25697366303Integrity protection during initial registration of a subscriber in a telecommunications network
25707366300Methods and apparatus for implementing a cryptography engine
25717366299Method for encrypting and decrypting data using derivative equations and factors
25727363507Device and method of preventing pirated copies of computer programs
25737363504Method and system for keystroke scan recognition biometrics on a smartcard
25747363503Method for producing a data structure for use in password identification
25757363501Semiconductor integrated circuit with function to manage license information
25767363496Authenticated ID-based cryptosystem with no key escrow
25777363494Method and apparatus for performing enhanced time-based authentication
25787363486Method and system for authentication through a communications pipe
25797363276Broadcast receiving method and apparatus and information distributing method and apparatus
25807363244Methods, apparatus, and program products for inferring service usage
25817362973Protecting secret data entry from infrared and audio eavesdropping
25827362867Apparatus and method for generating scrambling code in UMTS mobile communication system
25837362866Method for determining encryption algorithm of secret communication based on mobile country codes
25847362862Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
25857362859Enhancement of utilization of encryption engine
25867360252Method and apparatus for secure distribution of software
25877360247Method for protection against fraudulent modification of data sent to a secure electronic medium
25887360237System and method for secure network connectivity
25897360095Method and apparatus for a proximity warning system
25907360092Marking and identifying web-based authentication forms
25917360091Secure data transfer method of using a smart card
25927360076Security association data cache and structure
25937359885System and method for device-based access privilege to an account
25947359883License management system, license management device, relay device and terminal device
25957359528Monitoring of video or audio based on in-band and out-of-band data
25967359516User interface technique for selection and activation of wireless services from among multiple transport carriers
25977359513Quantum cryptography protocol
25987359507Server-assisted regeneration of a strong secret from a weak secret
25997358847IC tag
26007356709Systems and methods for deterring software piracy in a volume license environment
26017356705Biometric authentication for remote initiation of actions and services
26027356704Aggregated authenticated identity apparatus for and method therefor
26037356703Time-based computer access controls
26047356510Content delivery
26057356147Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
26067356145Arranging data ciphering in a wireless telecommunication system
26077356141Baud rate modulation encoding/decoding method and device for remote controller
26087353541Systems and methods for content distribution using one or more distribution keys
26097353538Server resource management, analysis, and intrusion negation
26107353535Flexible, selectable, and fine-grained network trust policies
26117353533Administration of protection of data accessible by a mobile device
26127353532Secure system and method for enforcement of privacy policy and protection of confidentiality
26137353399Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
26147353397Repurposing digitally signed information
26157353395Authenticated ID-based cryptosystem with no key escrow
26167353382Security framework and protocol for universal pervasive transactions
26177353353File security management
26187353210Electronic means of payment with individually settable security features for the internet or for mobile networks
26197353209Releasing decrypted digital content to an authenticated path
26207353186Advertising system
26217352879Conjugate cluster screens for embedding digital watermarks into printed halftone documents
26227352866Enhanced subscriber authentication protocol
26237352861Digital electronic component which is protected against electrical-type analyses
26247350230Wireless security module
26257350228Method for securing digital content
26267350227Cryptographic peer discovery, authentication, and authorization for on-path signaling
26277350074Peer-to-peer authentication and authorization
26287350069System and method which employs a multi user secure scheme utilizing shared keys
26297349555Documents and apparatus to encode documents
26307349554Maze pattern analysis
26317349543Secure foreign enterprise printing
26327349541Method and apparatus for controlling content consumption
26337349538Hierarchical identity-based encryption and signature schemes
26347349537Method for data encryption in an ethernet passive optical network
26357349485Mapping radio-frequency noise in an ultra-wideband communication system
26367349481Communication using audible tones
26377346932Data processing apparatus, a data processing method, a data recording medium on which data processing program that is readable by a computer are recorded, and a recording medium
26387346779System and method for authenticating electronic documents
26397346778Security method and apparatus for controlling the data exchange on handheld computers
26407346772Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure
26417346581Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system
26427346185Optical content modulation for visual copyright protection
26437346170Information processing system and method
26447346163Dynamic composition of pre-encrypted video on demand content
26457346161Method and apparatus for designing cipher logic, and a computer product
26467346160Randomization-based encryption apparatus and method
26477343628Authorization data model
26487343495Information recording apparatus, information reproducing apparatus, and information distribution system
26497343490Apparatus, and associated method, for facilitating authentication of a mobile station with a core network
26507343350System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services
26517343348System for performing real-estate transactions over a computer network using participant templates
26527343347Electronic media player with metadata based control and method of operating the same
26537343295Automated complaint resolution system
26547342973Method and apparatus for adapting multi-band ultra-wideband signaling to interference sources
26557340778Method and apparatus for ensuring the copy protection of digital data
26567340607Preservation system for digitally created and digitally signed documents
26577340606Digital certificates
26587340605System and method for secure download of waveforms to signal generators
26597340603Efficient revocation of receivers
26607340482Preview function in a digital data preservation system
26617340436Communication network charging method and system
26627340079Image recognition apparatus, image recognition processing method, and image recognition program
26637340059Programmable scrambler and De-scrambler for digital telephony equipment
26647340058Low-overhead secure information processing for mobile gaming and other lightweight device applications
26657340057Method and apparatus for distributing authorization to provision mobile devices on a wireless network
26667340054Information processing method, decrypting method, information processing apparatus, and computer program
26677340053Cipher strength estimating device
26687339978Adaptive weight update method and system for a discrete multitone spread spectrum communications system
26697337465Peer-to-peer communication apparatus and communication method
26707337322Hierarchical identity-based encryption and signature schemes
26717337315Efficient certificate revocation
26727337147Dynamic digital content licensing
26737337146Emergency information management system
26747336787Critical packet partial encryption
26757336783Cryptographic systems and methods supporting multiple modes
26767334266Reproduction control method, program and recording medium
26777334259National identification card system and biometric identity verification method for negotiating transactions
26787334132Flexible and scalable architecture for transport processing
26797333957Connected audio and other media objects
26807333612Methods and apparatus for confidentiality protection for Fibre Channel Common Transport
26817330981File locker and mechanisms for providing and using same
26827330980Method of and system for encrypting digital data, method of and apparatus for reproducing digital data, and computer product
26837330973Safety judgment method, safety judgment system, safety judgment apparatus, first authentication apparatus, and computer program product
26847330871Online machine data collection and archiving process
26857330838System and method for securing transactional data transmitted over a wireless network in a retail store environment
26867330653Quantum dense coding system
26877330570Face collation apparatus and biometrics data collation apparatus
26887330564Digital watermarking apparatus and methods
26897330563Documents, articles and authentication of documents and articles
26907330550Cryptographic system and method that uses excitation spectroscopy
26917328352Apparatus and method for reading or writing user data
26927328350Method and apparatus for secure cryptographic key generation, certification and use
26937328345Method and system for end to end securing of content for video on demand
26947328342Method for secure communication between two devices
26957327934Data reproduction apparatus, data recording apparatus, circuit element, data reproduction method and data recording method
26967327846Secure cryptographic key exchange and verifiable digital signature
26977327845Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad
26987327775CDMA receiver
26997325247Information management method using a recording medium with a secure area and a user-use area
27007325143Digital identity creation and coalescence for service authorization
27017325141Method and system for secure access
27027325134Localized network authentication and security using tamper-resistant keys
27037325133Mass subscriber management
27047325132Authentication method, system and apparatus of an electronic value
27057325129Method for altering encryption status in a relational database in a continuous process
27067324974Digital data file encryption apparatus and method
27077324735Image processing
27087322046Method and system for the secure use of a network service
27097321968Method and apparatus for encoding, transmitting and decoding a digital message
27107321667Data hiding through arrangement of objects
27117320143Method of gaining secure access to intranet resources
27127320131Methods and apparatus for selecting a server to process a request
27137320073Secure method for roaming keys and certificates
27147319988System and method for processing protected audio information
27157319757Wireless communication device and method for over-the-air application service
27167319756Audio coding
27177319754Insertion of binary messages in video pictures
27187319751Data encryption
27197319750Digital circuit apparatus and method for accelerating preliminary operations for cryptographic processing
27207318235Attestation using both fixed token and portable token
27217318160Cryptographic key setup in queued cryptographic systems
27227317811Method to decode temporal watermarks in compressed video
27237316616Gaming system license management
27247316030Method and system for authenticating a personal security device vis-a-vis at least one remote computer system
27257315948Time stamping method employing a separate ticket and stub
27267315945Directoryless public key cryptographic system and method
27277315927Machine readable medium and method for controlling access to a data storage device
27287315621Digital watermark-embedding apparatus, digital watermark-embedding method, and recording medium
27297314169Device that issues authority for automation systems by issuing an encrypted time pass

2007

27307313828Method and apparatus for protecting software against unauthorized use
27317313822Application-layer security method and system
27327313699Automatic authentication method and system in print process
27337313690Three way validation and authentication of boot files transmitted from server to client
27347313688Method and apparatus for private messaging among users supported by independent and interoperating couriers
27357313664Apparatus and system for controlling access to a data storage device
27367313253Methods and tangible objects employing machine readable data in photo-reactive materials
27377313251Method and system for managing and controlling electronic media
27387313237Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet
27397313162Apparatus and method for calculating and implementing a Fibonacci mask for a code generator
27407310822Filtering a permission set using permission requests associated with a code assembly
27417310812Service executing method and service providing system
27427310731Contents processing system
27437308704Data structure for access control
27447308703Protection of data accessible by a mobile device
27457308702Locally adaptable central security management in a heterogeneous network environment
27467308581Systems and methods for online identity verification
27477308580System and method for ensuring security with multiple authentication schemes
27487308578Method and apparatus for authorizing execution for applications in a data processing system
27497308575Data scrambling system for a shared transmission media
27507308572Method of printing a document
27517308430Methods and apparatus for uniquely identifying a large number of film prints
27527308256Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method
27537308110Methods for marking images
27547308101Method and apparatus for transporting encrypted media streams over a wide area network
27557308097Digital signature and authentication method and apparatus
27567308096Elliptic scalar multiplication system
27577305713Method and system for preventing capture of electronic digital content
27587305562System, method and computer program product for an authentication management infrastructure
27597305559Software method for improved password entry
27607305555Smart card mating protocol
27617305550System and method for providing authentication and verification services in an enhanced media gateway
27627305545Automated electronic messaging encryption system
27637305470Method for displaying web user's authentication status in a distributed single login network
27647305117Methods and tangible objects employing machine readable data
27657305104Authentication of identification documents using digital watermarks
27667305092Method and system to accelerate cryptographic functions for secure e-commerce applications
27677305091Quantum cipher communication system
27687305090Method and system for use of common provisioning data to activate cellular wireless devices
27697305085Encryption apparatus and method, and decryption apparatus and method based on block encryption
27707302705Method and apparatus for tracing a denial-of-service attack back to its source
27717302704Excising compromised routers from an ad-hoc network
27727302589Method for securing memory mapped control registers
27737302581Storing apparatus and password control method
27747302577Data processing apparatus and method
27757302571Method and system to maintain portable computer data secure and authentication token for use therein
27767302415Data copyright management system
27777302079Stealthy secret key encoding and decoding
27787302056Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography
27797301983Method for using codebook indexing to achieve high bit densities in a direct-sequence CDMA spread spectrum communication system
27807299504System and method for implementing security management using a database-modeled security policy
27817299502System and method for providing customized secure access to shared documents
27827299501Electronic book selection and delivery system having encryption and security features
27837299493Techniques for dynamically establishing and managing authentication and trust relationships
27847299492Multi-level multi-user web services security system and method
27857299355Fast SHA1 implementation
27867299281Method and system for activating and capturing screen displays associated with predetermined user interface events
27877298848Quantum cryptography transmission method and system
27887298847Secure key distribution protocol in AAA for mobile IP
27897298844Recording/reproducing apparatus, data moving method, and data deletion method
27907297860System and method for determining genre of audio
27917296163System and methods for encrypted execution of computer programs
27927296158Methods, apparatus, and program products for inferring service usage
27937296157Methods and apparatus for secure document printing
27947296156System and method for SMS authentication
27957296147Authentication system and key registration apparatus
27967296002Methods and apparatus for providing agent controlled synchronized browsing at a terminal
27977295671Advanced encryption standard (AES) hardware cryptographic engine
27987294776Content supply method and apparatus
27997293291System and method for detecting computer port inactivity
28007293176Strong mutual authentication of devices
28017292999Online card present transaction
28027292641Apparatus and method for transmitting/receiving preamble sequence in orthogonal frequency division multiplexing communication system using plurality of transmission antennas
28037292640System and method for an adaptive receiver for the reception of signals subject to multipath interference
28047290280Method and apparatus to facilitate virtual transport layer security on a virtual network
28057290278Identity based service system
28067290148Encryption and decryption communication semiconductor device and recording/reproducing apparatus
28077290144Access-control method for software modules and programmable electronic device therefor
28087290143Method of certifying transmission, reception and authenticity of electronic documents and related network unit
28097289630Counter initialization, particularly for radio frames
28107287273Individual authentication method using input characteristic of input apparatus by network, program thereof, and recording medium containing the program
28117287158Person authentication system, person authentication method, information processing apparatus, and program providing medium
28127286684Secure document design carrying auxiliary machine readable information
28137286671Secure network access method
28147286669Circuits for scrambling and descrambling packets of various lengths, and methods of doing the same
28157286606System and method for channelization recognition in a wideband communication system
28167284263Rights management inter-entity message policies and enforcement
28177284132Memory card
28187284129Data processing apparatus and method
28197284127Secure communications
28207284126Device authentication using pre-configured security keys
28217284125Method and apparatus for personal identification
28227283743Systems and methods for active monitoring and management of fiber links
28237281267Software audit system
28247280672Image data processing
28257280662Time-shifting data in digital radio system
28267280657Data encryption and decryption system and method using merged ciphers
28277280529Providing network management access through user profiles
28287278169Controlling the downloading and recording of digital data
28297278160Presentation of correlated events as situation classes
28307278157Efficient transmission of IP data using multichannel SOCKS server proxy
28317278155Single sign-on system for application program
28327278029Program writable IC card and method thereof
28337278027Biomedical recognizing system comprising image diagnosis workstation and method therefor
28347278024Session authentication using temporary passwords
28357278023System and method for distributed network acess and control enabling high availability, security and survivability
28367278022Information processing apparatus and information processing method
28377278021Information processing device, information processing system, authentication method, storage medium and program
28387277557Image processing apparatus, image processing method, and storage medium of image processing program
28397277547Method for automated security configuration in a wireless network
28407277543Cryptographic combiner using two sequential non-associative operations
28417277540Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography
28427274807Method and apparatus for supporting a biometric registration performed on a card
28437274791Quantum cryptographic system and method for achieving unambiguous state discrimination measurement of coherent light states
28447274704Piggybacking VPN information in BGP for network based VPN architectures
28457273164Postage metering system
28467272857Method/system for preventing identity theft or misuse by restricting access
28477272724User alerts in an anti computer virus system
28487272723USB-compliant personal key with integral input and output devices
28497272722Method for industrially changing the passwords of AIX/UNIX users
28507272719Method to control access between network endpoints based on trust scores calculated from information system component analysis
28517272718Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis
28527272714Method, apparatus, and program for automated trust zone partitioning
28537272582Fee determination device
28547272581Method and system for optimizing throughput of mailing machines
28557272245Method of biometric authentication
28567272167PN code chip time tracking with smart antenna
28577269854Transaction system for transporting media files from content provider sources to home entertainment devices
28587269736Distributed cryptographic methods and arrangements
28597269576Content rendering apparatus
28607269275Physical objects and validation of physical objects
28617269260Communication system, wireless communication apparatus, and communication method
28627267266Security system
28637266846System and method of facilitating compliance with information sharing regulations
28647266703Single-pass cryptographic processor and method
28657266702Method and system for managing security material and services in a distributed database system
28667266701System and method for enabling a remote control to automatically and dynamically set-up a V-chip
28677266697Stealthy audio watermarking
28687266529Method and apparatus for executing code in accordance with usage rights
28697266502Feature centric release manager method and system
28707266304System for secure optical transmission of binary code
28717266199Incorporating shared randomness into distributed cryptography
28727266197Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors
28737263715Communications terminal operable with high security protocol
28747263611Key management for content protection
28757263508Method and system for online purchasing using sensor with identifier
28767263501Point-of-care inventory management system and method
28777263190System for securing the confidentiality of electronically stored data in the event of the physical theft thereof
28787263187Batch mode session-based encryption of video on demand content
28797262733Method of estimating the location of a device
28807260726Method and apparatus for a secure computing environment
28817260557Method and apparatus for license distribution
28827260556Content rendering device with usage rights
28837260552Secure remote electronic voting system and cryptographic protocols and computer programs employed
28847260222Shared data refining device and shared data refining method
28857260216State machine representation for encrypting and decrypting a set of data values and method for protecting the same
28867260215Method for encryption in an un-trusted environment
28877260138Base station transmitter and CDMA mobile communication system comprising the same
28887257836Security link management in dynamic networks
28897257718Cipher message assist instructions
28907257714Electronic data storage medium with fingerprint verification capability
28917257713Automatic password configuration during error reporting
28927257708Steganographic authentication
28937257706Method of securing a document in a system and controlling access to the document and a seal for use in the method
28947257655Embedded PCI-Express implementation
28957257580Method, system, and program for restricting modifications to allocations of computational resources
28967257542Secure on-line ticketing
28977257240Input device, information device, and control information generation method
28987257234Watermark-based goods authentication
28997257228Account authority digital signature (AADS) system using encoded information
29007257225System and method for high speed reversible data encryption
29017257224Cryptographical pseudo-random number generation apparatus and program
29027254712System and method for compressing secure e-mail for exchange with a mobile data communication device
29037251834Filtering a permission set using permission requests associated with a code assembly
29047251832Secure streaming container
29057251728Secure and reliable document delivery using routing lists
29067251632Machine dependent login for on-line value-bearing item system
29077251330Content playback system, content playback method, content playback requesting apparatus, and temporary playback apparatus
29087251329Method and system for providing secure subscriber content data
29097251325Public key cryptosystem using finite non abelian groups
29107249259Hybrid signature scheme
29117249257Digitally watermarked maps and signs and related navigational tools
29127249111Method of assigning value codes
29137249110Individual authentication method, individual authentication apparatus, accounting method, accounting apparatus
29147249105BORE-resistant digital goods configuration and distribution methods and arrangements
29157249103System and method for selectively enabling access based on lineage analysis of digital information
29167249101Method and apparatus for transmitting and receiving a decoding key encoded with specific information to decode encrypted information of a record medium
29177248739Semiconductor device for compressing video signals with copy protection information
29187248717Securing media content with steganographic encoding
29197248699Encryption method using synchronized continuously calculated pseudo-random key
29207248698System for generating pseudorandom sequences
29217248696Dynamic system bus encryption using improved differential transitional encoding
29227248695Systems and methods for transmitting quantum and classical signals over an optical network
29237248691Hashing using multiple sub-hashes
29247246240Quantum digital signatures
29257245725Dual processor framer
29267245722System and method for distributing key
29277245718Low bandwidth zero knowledge authentication protocol and device
29287243239Click passwords
29297243233System and method for secure communication between electronic devices
29307242790Video steganography
29317242766Method and system for encrypting and decrypting data using an external agent
29327240363System and method for thwarting identity theft and other identity misrepresentations
29337240037Method and apparatus for digitally signing an advertisement area next to a value-bearing item
29347240035Method and apparatus for masking private mailing address information by manipulating delivery transactions
29357239709Data recording/reproducing method, data recording/reproducing system, recording apparatus
29367239708Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
29377237118Methods and systems for authentication of a user for sub-locations of a network location
29387237117Universal secure registry
29397237030System and method for preserving post data on a server system
29407236958Electronic software license with software product installer identifier
29417236957Method for remotely authorizing a payment transaction file over an open network
29427236614Device, system, and method for identifying living bodies and renewing registration data
29437236610Authenticating executable code and executions thereof
29447236598Systems and methods for communication protection
29457236592Efficient stream cipher system and method
29467236590Method and apparatus for protecting data
29477236589Device for point compression for Jacobians of hyperelliptic curves
29487236455Communications between modules of a computing apparatus
29497234169Method and apparatus for integrating and monitoring key digital cinema system components as a means to verify system integrity
29507234061Methods and apparatus for verifying modules from approved vendors
29517233970Computational method, system, and apparatus
29527233929Postal system intranet and commerce processing for on-line value bearing system
29537233782Method of generating an authentication
29547233671Method for storing a security start value in a wireless communications system
29557233664Dynamic security authentication for wireless communication networks
29567233663Key generation performance improvement
29577233662Numerical array output device, a numerical array output method, an encryption device, and a decryption device
29587231657User authentication system and methods thereof
29597231526System and method for validating a network session
29607231370Method and apparatus for organizational software license sharing
29617231360Time-based software licensing approach
29627231043Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored
29637231042Signal transmission apparatus and signal transmission method
29647231040Multiprime RSA public key cryptosystem
29657230990Multicarrier transmission system with reduced complexity channel response estimation
29667228430Security system for preventing a personal computer from being used by an unauthorized people
29677228427Method and system to securely distribute content via a network
29687228425Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
29697228413Data transmitting/receiving method and its receiver
29707228339Information storage output system and information storage output service
29717228011System and method for issuing a security unit after determining eligibility by image recognition
29727227955Single-photon watch dog detector for folded quantum key distribution system
29737227952System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media
29747227951Enhanced ANSI X9.17 pseudorandom number generators with forward security
29757227948Encryption apparatus and method, and decryption apparatus and method based on block encryption
29767225448System and method for hibernating application state data on removable module
29777225331System and method for securing data on private networks
29787225329Enhanced CSU/DSU (channel service unit/data service unit)
29797225262System and method for selecting an external user interface using spatial information
29807225166Remote authentication of two dimensional barcoded indicia
29817225165License-issuing system and method
29827225162Read-only recording medium containing sample data and reproducing method thereof
29837225161Method and system for initializing a key management system
29847225160Digital works having usage rights and method for creating the same
29857225159Method for authenticating and securing integrated bookstore entries
29867224801Wireless secure device
29877224800System and method for authentication of a roaming subscriber
29887224798Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system
29897224310Method and device for the recognition of the origin of encrypted data broadcasting
29907222363Device independent authentication system and method
29917222360Continuous biometric authentication using frame preamble for biometric data
29927222240Token for storing installation software and drivers
29937222237Secure multimedia data transmission method
29947222233Method for secure remote backup
29957222108Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method
29967222106Mechanisms for handling software license agreements on multi-user system
29977222104Method and apparatus for transferring usage rights and digital work having transferrable usage rights
29987222101System and method for securing data through a PDA portal
29997221764Security key distribution using key rollover strategies for wireless networks
30007221762Authenticated ID-based cryptosystem with no key escrow
30017219234System and method for managing access rights and privileges in a data processing system
30027219233Methods and apparatus for associating a user with content in a collaborative whiteboard system
30037219222Method and system to grant access to software options resident on a medical imaging device
30047218754Visual copyright protection
30057218739Multiple user authentication for online console-based gaming
30067218735Cryptography method on elliptic curves
30077216804Postage metering system
30087216227Method and system for controlling the use of addresses using address computation techniques
30097216083Automated transaction machine digital signature system and method
30107215978Mobile terminal apparatus, mobile terminal settings changing system, method used therefor, and program thereof
30117215777Sending notification through a firewall over a computer network
30127215775Ad-hoc radio communication verification system
30137213150Method and apparatus for secure message queuing
30147213146System and method for establishing security profiles of computers
30157213144Efficient security association establishment negotiation technique
30167213005Digital content distribution using web broadcasting services
30177212978Customer valuation in a resource price manager
30187212637Cartridge validation with radio frequency identification
30197209903Method and system for facilitation of wireless e-commerce transactions
30207209902Repository with security class and method for use thereof
30217209898XML instrumentation interface for tree-based monitoring architecture
30227209889Secure system for the issuance, acquisition, and redemption of certificates in a transaction network
30237209572Digital watermark embedding apparatus, digital watermark extraction apparatus, and methods thereof
30247209555Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device
30257209510Channel estimation system for a wideband code division multiple access (WCDMA) communication system
30267209029Electronic lock system and method for providing access thereto
30277207067Enforcing data protection legislation in Web data services
30287206938Key sequence rhythm recognition system and method
30297206933Software modem with privileged mode driver authentication
30307206799Modular multiplication method and calculating device
30317206765System and method for supplying and managing usage rights based on rules
30327206649Audio watermarking with dual watermarks
30337203845Multiple trust modes for handling data
30347203841Encryption in a secure computerized gaming system
30357203839Method for providing secure access to information held in a shared repository
30367203837Methods and systems for unilateral authentication of messages
30377203318Secure transmission system for a digital trunked radio system
30387203312Data reproduction apparatus and data reproduction module
30397200869System and method for protecting domain data against unauthorized modification
30407200751Watermark system
30417200603In a data storage server, for each subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group to indicate that corresponding data is compressed
30427200575Managing access to digital content
30437200574System for controlling the distribution and use digital works using digital tickets
30447200234Fingerprint, control signal for new encryption key
30457200227Method and apparatus for facilitating efficient authenticated encryption
30467200225Elliptic curve point ambiguity resolution apparatus and method
30477197765Method for securely using a single password for multiple purposes
30487197646System and method for preventing automated programs in a network
30497197484Asset management advice system and recording medium containing program of the system
30507197368Audio watermarking with dual watermarks
30517197164Time-varying video watermark
30527197145Method for setting up radio bearer in mobile communication system
30537197141RSA cryptographic processing apparatus for IC card
30547194768Access control for a microprocessor card
30557194632Method for secure biometric authentication/identification, biometric data input module and verification module
30567194631Information-processing apparatus having a user-switching function and user-switching method for use in the apparatus
30577194438Electronic payment schemes in a mobile environment for short-range transactions
30587194090Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium
30597194089Method for reducing a value modulo a shared secret
30607194088Method and system for a full-adder post processor for modulo arithmetic
30617191238Method and system for authenticating content distribution and content reproduction requests based on biometric features
30627191156Digital watermarking systems
30637190793Key generation in a communication system
30647190788Methods and apparatus for encrypting a binary string
30657190787Stream cipher having a combiner function with storage based shuffle unit
30667188362System and method of user and data verification
30677188251System and method for secure message-based leasing of resources in a distributed computing environment
30687188242Key management for content protection
30697188161Method for configuring a network element at a customer premise via a mobile data terminal
30707188087Devices, systems and methods for restricting use of digital content
30717187780Image processing methods using reversible watermarking
30727187770Method and apparatus for accelerating preliminary operations for cryptographic processing
30737185362Method and apparatus for security in a data processing system
30747185092Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor
30757184988Methods for operating infrastructure and applications for cryptographically-supported services
30767184985Method, system, and apparatus for providing secure access to a digital work
30777184570Methods and systems for steganographic processing
30787184569Marking articles using a covert digitally watermarked image
30797184553Method and system for encryption of optical signals
30807184549Method and apparatus for encryption, method and apparatus for decryption, and computer-readable medium storing program
30817184546Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications
30827181761Rights management inter-entity message policies and enforcement
30837181431Interactive information services system and associated method for facilitating purchasing transactions
30847181196Performing authentication in a communications system
30857181022Audio watermarking to convey auxiliary information, and media embodying same
30867181012Secured map messages for telecommunications networks
30877181011Key bank systems and methods for QKD
30887181008Contents management method, content management apparatus, and recording medium
30897178277Quantum cryptography communication system and quantum cryptography key distributing method used in the same
30907178038Apparatus and method for reproducing user data
30917178031Wireless security access management for a portable data storage cartridge
30927178030Electronically signing a document
30937178027System and method for securely copying a cryptographic key
30947177850Method and apparatus for determining a portion of total costs of an entity
30957177847Authorization token accompanying request and including constraint tied to request
30967177843Rights expression system
30977177443Method and apparatus for associating identifiers with content
30987177428System and method for downloading electronic information to a video lottery terminal
30997174563Computer network security system and method having unilateral enforceable security policy provision
31007174463Method and system for preboot user authentication
31017174452Method for processing multiple security policies applied to a data packet structure
31027174018Security framework for an IP mobility system using variable-based security associations and broker redirection
31037174017Decryption system for encrypted audio
31047174014Method and system for performing permutations with bit permutation instructions
31057173900Method and apparatus for chip generation of a chip sequence
31067171680Method and apparatus for electro-biometric identity recognition
31077171567System for protecting information over the internet
31087171566Data encryption and decryption
31097171564Universal password generation method
31107171554Method, computer program product and system for providing a switch user functionality in an information technological network
31117171389Identification, storage and display of land data on a website
31127171020Method for utilizing fragile watermark for enhanced security
31137171016Method for monitoring internet dissemination of image, video and/or audio files
31147171000Simplified addressing for private communications
31157170996Random number generation for encrypting cellular communications
31167168089Secured virtual network in a gaming environment
31177167987Use of biometrics to provide physical and logic access to computer devices
31187167981Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email
31197167843Apparatus for private personal identification number management
31207167842Architecture and method for operational privacy in business services
31217167841Content distributing system, content distributing service server, and community site server
31227167562Security method using information transmission by optical means, and an optical disk for implementing the method
31237167559Information security device, exponentiation device, modular exponentiation device, and elliptic curve exponentiation device
31247167507Equalizer and method for performing equalization in a wireless communications system
31257165180Monolithic semiconductor device for preventing external access to an encryption key
31267165179Digital signature verification and program transmission
31277165173System and method for secure over-the-air administration of a wireless mobile station
31287165051Electronic commerce system and method for detecting fraud
31297165050Media on demand via peering
31307164780Digital watermarking apparatus and methods
31317164767Data transfer system, data transfer apparatus, data recording apparatus, and data transfer method
31327164765Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack
31337162649Method and apparatus for network assessment and authentication
31347162641Weight based background discriminant functions in authentication systems
31357162640System and method for protecting identity information
31367162456Method for private personal identification number management
31377162455Unique time generating device and authenticating device using the same
31387162452Key distribution via a memory device
31397162451Information content distribution based on privacy and/or personal information
31407162429System and method for managing sponsorships
31417162032Encryption of programs represented as polynomial mappings and their computations
31427162031Method and device for cryptographically processing data
31437161974Method for 2D antenna rake combining in a code division multiplication access system
31447161973Pilot aided adaptive minimum mean square interference cancellation and detection
31457161465Enhancing security for facilities and authorizing providers
31467159245Method for protecting a portable card
31477159243Data carrier for the storage of data and circuit arrangement for such a data carrier
31487159237Method and system for dynamic network intrusion monitoring, detection and response
31497159122Message digest instructions
31507159114System and method of securely installing a terminal master key on an automated banking machine
31517158953Method and system for limiting the use of user-specific software features
31527158654Image processor and image processing method
31537158640Method and apparatus for re-synchronization of a stream cipher during handoff
31547158636Multivariable cryptosystem
31557158635Generation of user equipment identification specific scrambling code for the high speed shared control channel

2006

31567155745Data storage device provided with function for user's access right
31577155615Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller
31587155611Method of operating a conditional access system for broadcast applications
31597155607Method for authentication between apparatuses using challenge and response system
31607155413Electronic apparatus and management system of the same
31617155035Personal authentication method, personal authentication apparatus and image capturing device
31627152786Identification document including embedded data
31637152245Installation of black box for trusted component for digital rights management (DRM) on computing device
31647152046Method and apparatus for tracking status of resource in a system for managing use of the resources
31657152021Computing distortion of media signals embedded data with repetitive structure and log-polar mapping
31667151842Watermark embedding and extracting method and embedding hardware structure used in image compression system
31677151830Method, system, program product and state machine representation for encrypting and decrypting a message
31687151829System and method for implementing a hash algorithm
31697150042Techniques for performing malware scanning of files stored within a file storage device of a computer network
31707150039Information processing system, portable electronic device, access apparatus for the portable electronic device, and method of using memory space
31717149896Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet
31727149895Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal
31737149801Memory bound functions for spam deterrence and the like
31747149722Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system
31757149268Digital subscriber line driver
31767149239Communication system and methods of estimating channel impulse responses therein
31777146640Personal computer internet security system
31787146498Computer and program recording medium
31797146344Method and system for making small payments using a payment card
31807146072All optical phase insensitive code responsive and code separator devices apparatus and method
31817146025Apparatus and method for providing security in a base or mobile station by using detection of face information
31827146006Method for improving a random number generator to make it more resistant against attacks by current measuring
31837145939Receiving circuit
31847143289System and method for delivering encrypted information in a communication network using location identity and key tables
31857143288Secure file system server architecture and methods
31867143067System and method for installing personal computer software
31877143028Method and system for masking speech
31887142851Technique for secure wireless LAN access
31897142676Method and apparatus for secure communications using third-party key provider
31907142675Sequence generator and method of generating a pseudo random sequence
31917142672Method and system for transmitting sensitive information over a network
31927142671Methods and apparatus for implementing a cryptography engine
31937142670Space-efficient, side-channel attack resistant table lookups
31947142668Apparatus and method for generating expression data for finite field operation
31957140045Method and system for user information verification
31967139918Multiple secure socket layer keyfiles for client login support
31977139916Method and system for monitoring user interaction with a computer
31987139911Password exposure elimination for digital signature coupling with a host identity
31997139737Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses
32007139736Content rendering repository
32017139408Transform domain watermarking of image signals
32027139407Image generation apparatus, image file generation method, image verification apparatus and image verification method
32037136999Method and system for electronic device authentication
32047136996One-time logon method for distributed computing systems
32057136503Encoding hidden data
32067136502Printing media and methods employing digital watermarking
32077136490Electronic password wallet
32087136487System and method for automatically protecting private video content using embedded cryptographic security
32097136485Packetizing devices for scalable data streaming
32107134138Methods and apparatus for providing security for a data storage system
32117134137Providing data to applications from an access system
32127134026Data terminal device providing backup of uniquely existable content data
32137134019Methods and systems for unilateral authentication of messages
32147133526System and method for providing WLAN security through synchronized update and rotation of WEP keys
32157133523Method and system for solving the word problem in braid group cryptosystems
32167133522Method and apparatus for encryption of data
32177133029Keypad
32187131145Method for signalling tampering of remotely positioned components by tagging and global positioning system monitoring
32197131132Automatic access denial
32207131009Multiple factor-based user identification and authentication
32217131007System and method of retrieving a watermark within a signal
32227131006Cryptographic techniques for a communications network
32237131001Apparatus and method for secure filed upgradability with hard wired public key
32247130829Digital rights management
32257130442Protecting images with an image watermark
32267130424Systems and methods for utilizing an application from a native portable device within a non-native communications network
32277130423Threshold encoding of frame buffers
32287130087Methods and apparatus to produce security documents
32297127742Establishing a secure connection with a private corporate network over a public network
32307127432System for enabling data processing while maintaining confidentiality
32317127233Technique for controlling fraudulent use of a telecommunication service including information assistance
32327127068Geographical comparison system and method
32337127067Secure patch system
32347126936Wireless network for transmitting parameters for an encoded data transmission
32357124444Method of converting audio data for a portable device and reproducing the converted audio data
32367124300Handheld computer system configured to authenticate a user and power-up in response to a single action by the user
32377124115Micro payment-based advertising
32387123721Enhanced subscriber authentication protocol
32397123720Key scheduler for encryption apparatus using data encryption standard algorithm
32407123719Method and apparatus for providing authentication in a communication system
32417123717Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
32427123645Spread-spectrum signal receiver
32437123644Peak cancellation apparatus of base station transmission unit
32447120933Method for intrusion detection in a database system
32457120928Secure selective sharing of account information on an internet information aggregation system
32467120797Methods for authenticating potential members invited to join a group
32477120608Systems and methods for implementing person-to-person money exchange
32487120422Method, element and system for securing communication between two parties
32497120421Wireless network with a cipher key change procedure
32507120255Java applications for secured palm held cellular communications
32517120254Cryptographic system and method for geolocking and securing digital information
32527117376Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations
32537117372Programmable logic device with decryption and structure for preventing design relocation
32547117369Portable smart card secured memory system for porting user profiles and documents
32557117356Systems and methods for secure biometric authentication
32567117183Airline ticket payment and reservation system and methods
32577116970Selection of networks between WLAN and 2G/3G networks based on user and provider preferences
32587116785Data processing system, data processing method, and program providing medium
32597116784Method and apparatus for authenticated reporting in a mobile communication device
32607116783Non-deterministic method for secured data transfer
32617116782Encryption in a secure computerized gaming system
32627116738Data synchronization apparatus and method
32637116702Signal processing method and apparatus in CDMA radio communication system
32647114180Method and system for authenticating and authorizing requestors interacting with content servers
32657114167Content control in a device environment
32667114080Architecture for secure remote access and transmission using a generalized password scheme with biometric features
32677114079Security access based on facial features
32687114075User authentication apparatus, method of user authentication, and storage medium therefor
32697114070System and method for automatic digital certificate installation on a network device in a data-over-cable system
32707113979System, method and article of manufacture for enhancing electronic messages
32717113929System for voucher or token verification
32727113925Electronic check
32737113615Watermark embedder and reader
32747113614Embedding auxiliary signals with multiple components into media signals
32757113601Method and apparatus for performing secure communications
32767113600Base transceiver station automatic encryption handling
32777113598Methods and systems for high-data-rate quantum cryptography
32787113594Systems and methods for identity-based encryption and related cryptographic techniques
32797113593Recursive cryptoaccelerator and recursive VHDL design of logic circuits
32807111173Encryption process including a biometric unit
32817111167Digital watermarks with values derived from remote platforms
32827111166Extending the range of computational fields of integers
32837111164Crisis management system, computer, and computer memory product
32847110987Secure online purchasing
32857110543Content management system, content management terminal, usage rule management server, content management method, and content management program
32867110541Systems and methods for policy based printing
32877110538Method for accelerating cryptographic operations on elliptic curves
32887109986Illumination apparatus
32897107620Authentication in a packet data network
32907107457Optical card based system for individualized tracking and record keeping
32917107449Digital certificates
32927107051Technique to establish wireless session keys suitable for roaming
32937106864Chaos-based data protection using time-discrete dynamical systems
32947106863Method for positioning by satellites
32957106860System and method for executing Advanced Encryption Standard (AES) algorithm
32967106783Method and apparatus for searching multipaths of mobile communication system
32977106780Rake-based CDMA receivers for multiple receiver antennas
32987106720User equipment for detecting short codes
32997103911Identity-based-encryption system with district policy information
33007103775Signature calculation system by use of mobile agent
33017103576System for providing cardless payment
33027103573User rewards program and associated communications system
33037103197Arrangement for embedding subliminal data in imaging
33047103181State-varying hybrid stream cipher
33057103084Apparatus and method for searching preamble signal based on small search window
33067100053Monitoring and managing user access to content via a portable data storage medium
33077100045System, method, and program for ensuring originality
33087100044Public key certificate using system, public key certificate using method, information processing apparatus, and program providing medium
33097099850Methods for providing cardless payment
33107099847Apparatus, methods and articles of manufacture for construction and maintaining a calendaring interface
33117099492Method of steganographically embedding geo-location data in media
33127099471Detecting compromised ballots
33137099374Wireless communication systems and methods for long-code communications for regenerative multiple user detection involving matched-filter outputs
33147096504Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method
33157096367System and methods for caching in connection with authorization in a computer system
33167096365Digital signature
33177096355Dynamic encoding algorithms and inline message decryption
33187096352Security protocol structure in application layer
33197096201Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system
33207096200System and method for evaluating and enhancing source anonymity for encrypted web traffic
33217095871Digital asset management and linking media signals with related data using watermarks
33227095856Method and apparatus to maintain encryption synchronization in a multi-modulation TDM system
33237095851Voice and data encryption method using a cryptographic key split combiner
33247095791OFDM interference cancellation based on training symbol interference
33257093298Apparatus and method for security object enhancement and management
33267093291Method and system for detecting and preventing an intrusion in multiple platform computing environments
33277093286Method and system for exchanging sensitive information in a wireless communication system
33287093131Information authenticating apparatus and authenticating station
33297093125Rote based tool delegation
33307092913System for inexpensively executing online purchases
33317092525Cryptographic system with enhanced encryption function and cipher key for data encryption standard
33327092524Device for and method of cryptographically wrapping information
33337092522Apparatus for solving system of equations on finite field and apparatus for inverting element of extension field
33347092427Direct sequence modulation using time, frequency, and/or on-off keying
33357089587ISCSI target offload administrator
33367089553Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration
33377089427Security system method and apparatus for preventing application program unauthorized use
33387089426Method and system for encryption
33397089421Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
33407089416Information communication apparatus and method, information communication system, and memory medium
33417088824Single-photon-emission apparatus
33427088823System and method for secure distribution and evaluation of compressed digital information
33437088822Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith
33447085744Method and system for conducting a transaction over a network
33457085739Method and system for facilitating, coordinating and managing a competitive marketplace
33467085383Secured cellular telephone communications system, method, and computer program product
33477085382Communication device, communication device set, authentication method and method of wireless-connecting terminals
33487085376Method and system for securely exchanging encryption key determination information
33497085313Multiple channel joint decoding at mobile handset
33507082540System and method for tracking programmable devices that use intellectual property
33517082535System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
33527082200Establishing secure peer networking in trust webs on open networks using shared secret device key
33537080405Limiting device function
33547080253Audio fingerprinting
33557080045Electronic revenue stamp issuing apparatus and method thereof and recording medium stored control program thereof
33567079656Method and communications system for ciphering information for a radio transmission and for authenticating subscribers
33577079655Encryption algorithm management system
33587079652Login renewal based on device surroundings
33597079650Computing method for elliptic curve cryptography
33607079649Copy protection of data
33617079648Tester of cryptographic service providers
33627076664User confirmation system and method
33637076663Integrated system security method
33647076084Methods and objects employing machine readable data
33657076082Media signal filtering for use in digital watermark reading
33667076066LapDesk
33677076061Efficient and compact subgroup trace representation ("XTR")
33687073067Authentication system and method based upon random partial digitized path recognition
33697072493Robust and stealthy video watermarking into regions of successive frames
33707072473Method and system for secure delivery and retrieval of documents utilizing a facsimile machine
33717069595Method of controlling use of digitally encoded products
33727069593Device and method for making secure an integrated circuit
33737069592Web-based document system
33747069589Detection of a class of viral code
33757069436Information transmission system and method, transmitting apparatus, receiving apparatus, data processing device and data processing method, and recording medium
33767069434Secure data transfer method and system
33777069249Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
33787068812Decoding hidden data from imagery
33797068811Protecting images with image markings
33807068707Method and apparatus for tracking signals in a wireless communication system
33817068701Data transmission and reception within a spread-spectrum communication system
33827065790Method and system for providing computer malware names from multiple anti-virus scanners
33837065643Network compromise recovery methods and apparatus
33847065505Method for metering and pricing of digital works
33857065503Cookie data stored on transportable recording medium
33867065131Processor and method for weight detection in a closed loop diversity mode WCDMA system
33877065130Searching for signals in a communications system
33887062656Method for providing secure access to information held in a shared respiratory
33897062655Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords
33907062649System and method for categorizing security profile rules within a computer system
33917062465Methods and apparatus for providing agent controlled synchronized browsing at a terminal
33927062070Image marking adapted to the image
33937062069Digital watermark embedding and decoding using encryption keys
33947062044Method of elliptic curve cryptographic key agreement using coefficient splitting
33957062043Method of elliptic curve digital signature using coefficient splitting
33967058978Security component for a computing device
33977058971Access privilege transferring method
33987058806Method and apparatus for secure leveled access control
33997058613Device and method for user identification check based on user-specific formula
34007058607Contents distribution method and system
34017058606Method for loaning digital works
34027058600Integrated proxy interface for web based data management reports
34037058402Subscribers database proofing using a checksum in a telecommunications system
34047054843Method and apparatus in a telecommunications system
34057054465Data hiding method and system for embedding and extracting information in signals
34067054444Public and private key cryptographic method
34077054379Data scrambler generation of pseudo-random bit sequence for semi-stationary Q-mode signal
34087054354Multicarrier transmission system with reduced complexity leakage matrix multiplication
34097051210Persistance and recovery of security keys
34107051209System and method for creation and use of strong passwords
34117050582Pseudo-random one-to-one circuit synthesis
34127047421Data signal with a database and a compressed key
34137047418Imaging method and device using biometric information for operator authentication
34147047405Method and apparatus for providing secure processing and data storage for a wireless communication device
34157047404Method and apparatus for self-authenticating digital records
34167046807Data administration method
34177046801Method of calculating multiplication by scalars on an elliptic curve and apparatus using same and recording medium
34187046719Soft handoff between cellular systems employing different encoding rates
34197043760System and method for establishing and managing relationships between pseudonymous identifications and memberships in organizations
34207043643Method and apparatus for operating a computer in a secure mode
34217043641Encryption in a secure computerized gaming system
34227043581Resource sequester mechanism
34237043453Method and system for conducting transactions between repositories using a repository transaction protocol
34247043052Digital authentication with analog documents
34257043023Software defined radio and radio system
34267043016Substitution-box for symmetric-key ciphers
34277043015Methods for point compression for Jacobians of hyperelliptic curves
34287042928Method and apparatus for pilot estimation using prediction error method
34297042923Method and apparatus for frequency hopping in a spread spectrum digital cordless telephone system
34307039811Apparatus and method for controlling access to contents stored in card like electronic equipment
34317039809Asymmetric encrypted pin
34327039613System and method for controlling distribution and use of digital works using price specifications
34337039190Wireless LAN WEP initialization vector partitioning scheme
34347039189Stream continuity enforcement
34357038600Method and device for adding or extracting a secondary information signal to/from a RLL code sequence
34367036019Method for controlling database copyrights
34377035427Method and system for managing, accessing and paying for the use of copyrighted electronic media
34387035411Encryption method and apparatus encrypting and adding signature information to qubits
34397035407Data transmission system for prevention of unauthorized copy of data from recording medium
34407035404Method and apparatus for shuffle with proof, method and apparatus for shuffle verification, method and apparatus for generating input message sequence and program for same
34417032242Method and system for distributed network address translation with network security features
34427032111Method for optimizing of data transmission
34437031493Method for generating and detecting marks
34447031473Network architecture for secure communications between two console-based gaming systems
34457028340Apparatus, a system and method for controlling access to contents
34467028192Method and apparatus that enable a computer user to verify whether they have correctly input their password into a computer
34477027598Residue number system based pre-computation and dual-pass arithmetic modular operation approach to implement encryption protocols efficiently in electronic integrated circuits
34487027597Pre-computation and dual-pass modular arithmetic operation approach to implement encryption protocols efficiently in electronic integrated circuits
34497027487Combination power/inphase correlator for spread spectrum receiver
34507024690Protected mutual authentication over an unsecured wireless communication channel
34517024686Secure network and method of establishing communication amongst network devices that have restricted network connectivity
34527024554Systems and methods that authorize target devices utilizing proprietary software and/or hardware
34537024552Location authentication of requests to a web server system linked to a physical entity
34547024392Method for controlling use of database content
34557024016Digital watermarking apparatus and methods
34567023996Encryption for asymmetric data links
34577023990Secure parameter generating device and parameter generating method in algebraic curve crytography
34587023905Correlation and demodulation circuit for a receiver for signals modulated by a specific code
34597023902Apparatus and method for scalable offline CDMA demodulation
34607020779Secure, distributed e-mail system
34617020778Method for issuing an electronic identity
34627020282Simplified secure, swift cryptographic key exchange
34637020184Store and forward handoff
34647020182Apparatus comprising a receiving device working with space diversity and processing method for signal received over various channels
34657020179Base station transmitter in CDMA system
34667020178Microprocessor decoder frequency hopping spread spectrum communications receiver
34677017182Method of securely transmitting information
34687017042Method and circuit to accelerate IPSec processing
34697016846Robust checksums
34707016516Authentication of identification documents
34717013388Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system
34727013295Tagged private information retrieval
34737012951Symbol combining method for reducing the number of FIFO registers of finger, rake receiver and method for driving the rake receiver
34747012932Digital broadcast data receiving apparatus
34757010683Public key validation service
34767010019Assessment of delay estimation quality using interference estimates
34777010018Fast acquisition procedure for TDD W-CDMA
34787007300Secure booting of a personal computer system
34797007168User authentication using member specifying discontinuous different coordinates
34807007000Secure online purchasing
34817006655Methods, apparatus and systems for an electronic watermark having resistance to scaling
34827006627Cipher block chaining mode in encryption/decryption processing
34837003667Targeted secure printing
34847003665Method for the secure transmission of messages
34857003500Retail point of sale (RPOS) apparatus for internet merchandising
34867003132Embedding hidden auxiliary code signals in media
34877003115Communication apparatus, communication system and method of the same
34887003112Extensible GPS receiver system
34897000108System, apparatus and method for presentation and manipulation of personal information syntax objects
34907000105System and method for transparently providing certificate validation and other services within an electronic transaction
34916999589Method and system for automatic brokered transactions
34926996719Secure password entry
34936996718System and method for providing access to multiple user accounts via a common password
34946996545Reproduction apparatus and reproduction method of digital video signal or audio signal
34956996252Low visibility watermark using time decay fluorescence
34966996237Apparatus and methods for including codes in audio signals
34976996233System and method for encrypting and verifying messages using three-phase encryption
34986996163Walsh-Hadamard decoder
34996996159Reducing spread spectrum noise
35006996154Low power dual protocol transceiver
35016993152Hiding geo-location data through arrangement of objects
35026992563Method for protecting devices, specially car radios, against theft
35036990588Authentication card system
35046990578Method and apparatus for encrypting electronic messages composed using abbreviated address books
35056990199Apparatus and method for cipher processing system using multiple port memory and parallel read/write operations
35066989733Method and system for adapting a telephone line modem for use on the power line
35076988205Method and apparatus for the secure storage of audio signals
35086987862Video steganography
35096986057Security device and method
35106986056Method and arrangement for generating binary sequences of random numbers
35116986044Method for group unit encryption/decryption, and method and apparatus for writing signature
35126985886Method and apparatus for a mortgage loan management system
35136985600Printing media and methods employing digital watermarking
35146985590Electronic watermarking method and apparatus for compressed audio data, and system therefor
35156985587Method and system for calling line authenticated key distribution
35166985510Method and system for data and voice transmission over shared and dedicated channels
35176983371Super-distribution of protected digital content
35186983309Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium
35196983009Median weighted tracking for spread-spectrum communications

2005

35206967992Method and apparatus for receiving GPS/GLONASS signals
35216965998Time stamping method using time-based signature key
35226965683Routing networks for use with watermark systems
35236965673Method of using transient faults to verify the security of a cryptosystem
35246963977Circuits and methods for modular exponentiation
35256963975System and method for audio fingerprinting
35266961558Method and receiver for receiving a radio broadcast signal having encoded contents
35276959386Hiding encrypted messages in information carriers
35286957338Individual authentication system performing authentication in multiple steps
35296957329System for encrypting data from multiple multimedia applications and method thereof
35306956890Process and device for the generation of codes, for example channeling codes for CDMA applications
35316954738Method and apparatus for distributing enforceable property rights
35326952477Fault intolerant cipher chaining
35336950932Security association mediator for java-enabled devices
35346950810Tokenless biometric electronic financial transactions via a third party identicator
35356950532Visual copyright protection
35366948069Method and system for determining and maintaining trust in digital image files with certifiable time
35376947571Cell phones with optical capabilities, and related applications
35386944482Visualization supplemented wireless mobile telephony
35396941457Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key
35406940841Packet-switched spread-spectrum system
35416934388Method and apparatus for generating random permutations
35426931381Methods and apparatus for authenticating the download of information onto a smart card
35436931131Method and apparatus for online geographic and user verification and restriction using a GPS system
35446928557Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment
35456928167Method for managing public key
35466928103Rach receiving apparatus
35476925563Multiplication of modular numbers
35486922784Administrative security systems and methods
35496920563System and method to securely store information in a recoverable manner on an untrusted system
35506920173Spread-spectrum signal receiver apparatus and interference cancellation apparatus
35516920171Multiple access frequency hopping network with interference anticipation
35526918044Password protection for high reliability computer systems
35536918039Method and an apparatus for detecting a need for security and invoking a secured presentation of data
35546914985Method and system for presentation and manipulation of PKCS enveloped-data objects
35556912658Hiding of encrypted data
35566912241Chip-interleaved, block-spread multi-user communication
35576907524Extensible firmware interface virus scan
35586907127Hierarchical key management encoding and decoding
35596907124Optical encryption and decryption method and system
35606907123Secure voice communication system
35616904528Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus
35626901121Compensation of DC offset impairment in a communications receiver
35636898288Method and system for secure key exchange
35646894997Packet spread-spectrum transmitter
35656889206Method for computer network operation providing basis for usage fees
35666888943Multimedia adaptive scrambling system (MASS)
35676888878Signal combining within a communication system
35686883137System and method for schema-driven compression of extensible mark-up language (XML) documents
35696882729System and method for limiting access to data
35706882679Extension of wireless local area network communication system to accommodate higher data rates while preserving legacy receiver features
35716882678Method and system for canceling multiple access interference in CDMA wireless communication system
35726877096Modular computer applications with expandable capabilities
35736877095Session-state manager
35746876695Method and apparatus for reducing spread spectrum noise
35756874030PPP domain name and L2TP tunnel selection configuration override
35766873977Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries
35776873707Hardware-based encryption/decryption employing cycle stealing
35786873649Method and apparatus for detecting a stationary dither code
35796868114Interference suppression in a spread spectrum communications system using non-linear frequency domain excision
35806862641Interruptable and re-enterable system management mode programming code
35816856687Portable telecommunication security device
35826856686Method and apparatus for securing e-mail attachments
35836850782Wireless device with vibrational communication capabilities
35846848050System and method for alternative encryption techniques
35856839852Firewall system and method with network mapping capabilities

2004

35866834075Method for improving multipath searcher speed
35876832317Personal computer security mechanism
35886823455Method for robust watermarking of content
35896823451Integrated circuit for security and manageability
35906820203Security unit for use in memory card
35916801625Apparatus and method for stripping parity bits from an input stream
35926792112Encrypting communications between wireless mobile units
35936785813Key agreement and transport protocol with implicit signatures
35946782102Multiple format secure voice apparatus for communication handsets
35956782101Encryption using fractal key
35966775781Administrative security systems and methods
35976771796Methods for identifying equipment used in counterfeiting
35986766454System and method for using an authentication applet to identify and authenticate a user in a computer network
35996754346Method for tracing the distribution of physical digital media
36006748395System and method for dynamic playlist of media
36016741636System and method for converting data into a noise-like waveform
36026738905Conditional access via secure logging with simplified key management
36036738411Simultaneous plural code series generator and CDMA radio receiver using same
36046735310Technique of password encryption and decryption for user authentication in a federated content management system
36056735297System for maintaining PBX license key information in the event of a hardware failure reducing MTTR
36066735264Compensation for non-linear distortion in a modem receiver
36076731674Device and method for generating quasi-orthogonal code and spreading channel signals in mobile communication system
36086728305Simultaneous plural code series generator and CDMA radio receiver using same
36096724838Methods and apparatus to despread dual codes for CDMA systems
36106718038Cryptographic method using modified fractional fourier transform kernel
36116678309CDMA base station system

2003

36126671331Carrier detecting circuit for detecting the level of a received signal and communication apparatus
36136662166Tokenless biometric electronic debit and credit transactions
36146658113Apparatus and method for concealing data bursts in an analog scrambler using audio repetition
36156654480Audio appliance and monitoring device responsive to watermark data
36166647149Methods and apparatus for securely transmitting and processing digital image data
36176647129Method and system for encoding image and audio content
36186628701Method and apparatus for reducing spread spectrum noise
36196624773Data encryption and signal scrambling using programmable data conversion arrays
36206594362Radio data transmission apparatus
36216587821Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith
36226581042Tokenless biometric electronic check transactions
36236580809Quantization-based data hiding employing calibration and locally adaptive quantization
36246577732Hierarchical encryption technique for dense wavelength division multiplexed systems using a wavelength bus architecture
36256567780Audio with hidden in-band digital data
36266560350Methods for detecting alteration of audio
36276560349Audio monitoring using steganographic information
36286557103Spread spectrum image steganography
36296542618Methods for watermark decoding
36306539095Audio watermarking to convey auxiliary control information, and media embodying same
36316529602Method and apparatus for the secure storage of audio signals
36326519699Method and system for voice guided secure entry of private data in a public setting
36336519352Encoding and decoding in accordance with steganographically-conveyed data
36346519340Method and apparatus for encryption using partial information
36356519299Methods and apparatus to despread dual codes for CDMA systems

2002

36366498851Data encryption and signal scrambling using programmable data conversion arrays
36376496591Video copy-control with plural embedded signals
36386496582Information processing apparatus and method therefor
36396483927Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes
36406466607Hybrid spread spectrum method and system for wirelessly transmitting and receiving wideband digital data
36416463089Hybrid spread spectrum method and system for wirelessly transmitting and receiving wideband digital data
36426456647Two step signal recovery scheme for a receiver
36436449379Video steganography methods avoiding introduction of fixed pattern noise
36446446210Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter
36456438252Method for encoding bits in a signal
36466430691Stand-alone telecommunications security device
36476426977System and method for applying and removing Gaussian covering functions
36486418323Wireless mobile phone with Morse code and related capabilities
36496408017High speed demux parallel correlator system
36506407699Method and device for rapidly extracting time and frequency parameters from high dynamic direct sequence spread spectrum radio signals under interference
36516404898Method and system for encoding image and audio content
36526400827Methods for hiding in-band digital data in images and video
36536397198Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
36546373879Device and method for generating spread spectrum signals
36556370182Integrated beamforming/rake/mud CDMA receiver architecture
36566363159Consumer audio appliance responsive to watermark data
36576363150Billing method for customers having IP telephony service with multiple levels of security
36586356638Radio wireline interface and method for secure communication
36596353672Steganography using dynamic codes
36606343138Security documents with hidden digital data

2001

36616330335Audio steganography
36626317835Method and system for entry of encrypted and non-encrypted information on a touch screen
36636317123Progressively generating an output stream with realtime properties from a representation of the output stream which is not monotonic with regard to time
36646314192System, method, and product for information embedding using an ensemble of non-intersecting embedding generators
36656301360Method of encoding information using a position-based encoding scheme
36666289108Methods for detecting alteration of audio and images
36676285776Methods for identifying equipment used in counterfeiting
36686275679Secure communication using array transmitter
36696275573System and method for secured network access
36706266430Audio or video steganography
36716266418Encryption and authentication methods and apparatus for securing telephone communications
36726266412Encrypting speech coder
36736263087Method of encoding bits in a signal
36746252961Method and apparatus for performing data encryption and error code correction
36756233347System method, and product for information embedding using an ensemble of non-intersecting embedding generators
36766219423System and method for digitally signing a digital agreement between remotely located nodes
36776202056Method for computer network operation providing basis for usage fees
36786173403Method and apparatus for distributing information products

2000

36796157679Method of adding encryption/encoding element to the modulation/demodulation process
36806125182Cryptographic engine using logic and base conversions
36816097939Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system
36826094485SSL step-up
36836088451Security system and method for network element access
36846081784Methods and apparatus for encoding, decoding, encrypting and decrypting an audio signal, recording medium therefor, and method of transmitting an encoded encrypted audio signal
36856081600Method and apparatus for signaling privacy in personal communications systems
36866078668Apparatus and method for concealing data bursts in an analog scrambler using audio repetition
36876076167Method and system for improving security in network applications
36886069954Cryptographic data integrity with serial bit processing and pseudo-random generators
36896067566Methods and apparatus for distributing live performances on MIDI devices via a non-real-time network protocol
36906052407Apparatus and method for detection frequency hopping patterns embedded in radio frequency noise
36916049873Scrambled information transmitting and receiving method
36926047069Method and apparatus for preserving error correction capabilities during data encryption/decryption
36936044158Method and apparatus for communicating secure data over a telephone line using a cellular encryption apparatus
36946032260Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same
36956023511Cryptosystem for encrypting digital image or voice file

1999

36966002773Method and apparatus for encryption
36975995533Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics
36985982889Method and apparatus for distributing information products
36995974142Secure telecommunications
37005966373Waveform and frame structure for a fixed wireless loop synchronous CDMA communications system
37015963621Secure communication system
37025960029Coherent dual-channel QPSK modulator/demodulator for CDMA systems, and modulating/demodulating methods therefor
37035940514Encrypted holographic data storage based on orthogonal phase code multiplexing
37045923759System for securely exchanging data with smart cards
37055909188Process control transmitter with adaptive analog-to-digital converter
37065903648Method and apparatus for encryption
37075894521System and method for encrypting sensitive information
37085893067Method and apparatus for echo data hiding in audio signals
37095883957Methods and apparatus for encrypting and decrypting MIDI files

1998

37105848156Communication method and apparatus for carrying out cipher communications telephonically
37115838797Secure communication by encryption/decryption of vector at PSK modulation/detection stage
37125832214Method and apparatus for data security for a computer
37135822428Data encryption for product information and access
37145819108Programming of software into programmable memory within a peripheral device
37155805635Secure communication system
37165793871Optical encryption interface
37175793870System and method for encrypting sensitive information
37185787180Method of connecting a scrambler or encryption device to a hand-held portable cellular telephone
37195778073Method and device for speech encryption and decryption in voice transmission
37205777771Generation of optical signals with RF components
37215771287Apparatus and method for secured control of feature set of a programmable device
37225745389System and mechanism for assigning pre-established electronic addresses to printed circuit boards
37235724414Secure communication system
37245717762WACS-type mobile communication with a unified frame format
37255712915Encrypted digital circuit multiplication system
37265710816Method and apparatus for ensuring receipt of voicemail messages

1997

37275608723Methods and systems for secure wireless communication within a predetermined boundary
37285604806Apparatus and method for secure radio communication
37295598471Method and apparatus for encoding and decoding of audio transmission signals
37305594798Secure telecommunications
37315592556Digital radio with vocoding encrypting codec
37325592555Wireless communications privacy method and system

1996

37335579394Clear channel interface module and method therefor
37345568556System and method for encrypting sensitive information
37355541997Method and apparatus for detecting correctly decrypted communications
37365517568Method of detecting unauthorized use of a wireless communication channel
37375509072Facsimile apparatus
37385506889Digital voice privacy apparatus and method

1995

37395455861Secure telecommunications
37405448643Authenticaton system
37415438332Method of hardening transmissions, in particular between a control station and a transponder, and a device implementing the method
37425434920Secure telecommunications
37435430800Facsimile apparatus
37445410599Voice and data encryption device
37455404394Secure communication system
37465392357Secure telecommunications
37475392352Scramble detecting circuit in a satellite broadcasting receiver and scramble detecting method

1994

37485353351Secure teleconferencing
37495335277Signal processing appparatus and methods
37505315658Fair cryptosystems and methods of use
37515293423Synchronizing method in a mobile radio system
37525276737Fair cryptosystems and methods of use

1993

37535241539Communication system with signal converter between networks
37545233654Signal processing apparatus and methods
37555231397Extreme waveform coding
37565226083Communication apparatus for speech signal
37575222137Dynamic encryption key selection for encrypted radio transmissions
37585214694Scramble signal transmission system for earth station of communication satellite
37595199069Automatic encryption selector
37605185797Encrypted trunked control channel system
37615182772Method and apparatus for encoding, transmitting, receiving and de-coding information
37625181246Privacy communication device

1992

37635151922Variable speaker muting based on received data
37645150410Secure digital conferencing system
37655148482Layered session data unit frame
37665144666Decoder to decode an encrypted sound
37675136648Message storage security system
37685121430Storm alert for emergencies
37695109414Signal processing apparatus and methods
37705101432Signal encryption
37715091941Secure voice data transmission system
37725091936System for communicating television signals or a plurality of digital audio signals in a standard television line allocation

1991

37735077791Method and apparatus for preventing unauthorized transmissions
37745055845Signal digitizing method and system utilizing time delay of the input signal
37755051991Method and apparatus for efficient digital time delay compensation in compressed bandwidth signal processing
37765034961Area communications system
37775018198Speech privacy processing method and apparatus therefor
37785001756Decryption device with variable clock
37795001750Secret communication control apparatus
37804985919Secure communication control system

1990

37814972479Method and apparatus for providing privacy/security in a communication system
37824965826Method of and system for scrambling/descrambling sound
37834965825Signal processing apparatus and methods
37844964165Method for the fast synchronization of vocoders coupled to one another by enciphering
37854924516Method and system for a synchronized pseudo-random privacy modem
37864920567Secure telephone terminal
37874920565Method for connection of secure conference calls
37884914697Cryptographic method and apparatus with electronically redefinable algorithm
37894908860System for the secret transmission of audio signals and television receiver for receiving such signals
37904903298System for providing encryption and decryption of voice and data transmissions to and from an aircraft

1989

37914888799Scrambling of signals by inversion
37924882751Secure trunked communications system
37934856061Method for cryptographic transmission of speech signals and a communication station for performing the method
37944852155Systeme d'authentification analogique reciproque entre un terminal et une ligne de transmission
37954845749Secure teleconferencing system
37964841571Privacy signal transmission system
37974837821Signal transmission system having encoder/decoder without frame synchronization signal
37984829540Secure communication system for multiple remote units
37994817146Cryptographic digital signal transceiver method and apparatus
38004817141Confidential communication system
38014815128Gateway system and method for interconnecting telephone calls with a digital voice protected radio network
38024803726Bit synchronization method for a digital radio telephone system

1988

38034776013Method and apparatus of encryption of optical images
38044757536Method and apparatus for transceiving cryptographically encoded digital data
38054750205Frequency or time domain speech scrambling technique and system which does not require any frame synchronization
38064747137Speech scrambler

1987

38074704725Signal processing apparatus and methods
38084694490Signal processing apparatus and methods
38094659875Electronic system for the secret transmission of audio signals
38104652838Phase randomization to reduce detectability of phase or frequency-modulated digital signals

1986

38114628358Television signal encryption system with protected audio
38124622680Hybrid subband coder/decoder method and apparatus
38134612414Secure voice transmission
38144591673Frequency or time domain speech scrambling technique and system which does not require any frame synchronization
38154575753Method of and apparatus for scrambling and decoding television and similar signals with wobbulating trapping

1985

38164551580Time-frequency scrambler
38174536739Apparatus for communication of instructing information
38184532636Radio communications receivers

1984

38194476566Frequency hopping radio communications apparatus having pseudo-random _channel selection
38204440976Automatic selection of decryption key for multiple-key encryption systems
38214434323Scrambler key code synchronizer
38224433211Privacy communication system employing time/frequency transformation

1983

38234398296Communication systems
38244398216Multiple signal transmission method and system, particularly for television
38254397034Low probability of intercept transmitting apparatus
38264392241Digital interface system
38274387393Signal unscrambler
38284379205Analog signal scrambling system

1982

38294358857Communication system
38304351064Communication
38314329711Apparatus for encoding of information
38324326292Random energy communication system
38334324002Delay-modulated random energy intelligence communication system
38344319087Secret communication system
38354312072Radio frequency transmission system

1981

38364308617Noiselike amplitude and phase modulation coding for spread spectrum transmissions
38374305152Security communication system
38384280222Receiver and correlator switching method
38394278840Dynamic frequency and time voice encryption system and method
38404276652Secure communication system with improved frequency-hopping arrangement
38414244053Privacy communication method and system

1980

38424232194Voice encryption system
38434231113Anti-jam communications system
38444228321Privacy transmission system with remote key control
38454225935Coding method and system with enhanced security
38464222115Spread spectrum apparatus for cellular mobile communication systems
38474209750Swept-carrier transmission system adapted for use in process control systems
38484208734Underwater communication system
38494206462Secure communication and ranging system
38504203164Secure sonar communication system
38514193030Frequency hopping communication system
38524184117Communication security method and system
38534182933Secure communication system with remote key setting

1979

38544179658Secret-signalling system utilizing noise communication
38554179657Anti-jamming communication system
38564172963Checker and automatic synchronizer for coding equipment
38574170757Method of and apparatus for transmitting clandestine radio signals
38584169993Intercept receiver for double-side-band, noise-like signals
38594167700Digital voice protection system and method
38604159399Security communication system using polarity inversion
38614156205Binary frequency synthesizer
38624152650Continuously-synchronized tracking receiver for a priori defined swept carriers

1978

38634112368Constant amplitude carrier communications system
38644102521System for signal coding
38654086435Method of and means for scrambling and descrambling speech at audio frequencies
38664077005Secure position identity and time reporting system
38674066964Communication system

1977

38684058677Sound scrambling equipment
38694023103Synchronizer for frequency hopping receiver
38704005428Secure remote control communication systems
38714002825System for encoding and decoding amplitude modulated signals

1976

38723999005Secure transmission of AM or FM signals
38733959592Method and apparatus for transmitting and receiving electrical speech signals transmitted in ciphered or coded form
38743936749Matched filter communication systems
38753936748Secret communication system employing magnetic control of signal modulation on microwave or other electromagnetic carrier wave
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017