СПИСОК патентов США - подгруппа МПК H04K1/00
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9608808 | Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof | |||
2 | 9602925 | Multi-stream-multipoint-jack audio streaming | |||
3 | 9602273 | Implementing key scheduling for white-box DES implementation | |||
4 | 9602222 | Techniques for securing body-based communications | |||
5 | 9600421 | Systems and methods for low-latency encrypted storage | |||
6 | 9596598 | Reducing detectability of an encryption key | |||
7 | 9596177 | Method for a retransmission roundtrip correction | |||
8 | 9596049 | Secure open-air communication system utilizing multi-channel decoyed transmission | |||
9 | 9584311 | Decrypting data | |||
10 | 9577822 | Secure bitstream authentication | |||
11 | 9577784 | System, device, and method for securing voice authentication and end-to-end speech interaction | |||
12 | 9571506 | Dynamic enterprise security control based on user risk factors | |||
13 | 9569907 | System and method for the automated processing of physical objects | |||
14 | 9565556 | User managed number privacy and call accessibility | |||
15 | 9565230 | System and method of encrypted media encapsulation | |||
16 | 9565017 | Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks | |||
17 | 9565016 | Protection of the execution of an algorithm against side-channel attacks | |||
18 | 9563993 | Single sign-on process | |||
19 | 9560022 | Avoiding collection of biometric data without consent | |||
20 | 9554419 | Pairing method and apparatus for ad-hoc connection in wireless communication terminal | |||
21 | 9544766 | System and method for authentication and key exchange for a mobile device via spectrally confined wireless communications | |||
22 | 9544277 | KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages | |||
23 | 9544276 | Method for transmitting and receiving a multimedia content | |||
24 | 9544154 | Method of authenticating a device | |||
25 | 9537944 | Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network | |||
26 | 9537652 | Polymorphic encryption key allocation scheme | |||
2016 | |||||
27 | 9532214 | Apparatus and method for generating key hierarchy in wireless network | |||
28 | 9529465 | Secure interaction with input devices | |||
29 | 9526071 | Method and apparatus for operating wake on WLAN | |||
30 | 9526007 | Location brokering for providing security, privacy and services | |||
31 | 9524404 | Program execution device | |||
32 | 9521500 | Portable electronic device with directional microphones for stereo recording | |||
33 | 9520995 | Efficient prime-number check | |||
34 | 9520991 | Apparatus for handling bills and/or coins, and method for initializing and operating such an apparatus | |||
35 | 9519773 | Returning to a control transfer instruction | |||
36 | 9516066 | Rights management services integration with mobile device management | |||
37 | 9516000 | Runtime instantiation of broadcast encryption schemes | |||
38 | 9513606 | Safety systems and methods for production environments | |||
39 | 9510192 | Method and apparatus for securing a mobile application | |||
40 | 9509512 | Message digest generator | |||
41 | 9509504 | Cryptographic key manager for application servers | |||
42 | 9509414 | Encryption and decryption method and device | |||
43 | 9503434 | Single-pass data compression and encryption | |||
44 | 9497632 | System and method for pairing a UICC card with a particular mobile communications device | |||
45 | 9491621 | Systems and methods for fast initial link setup security optimizations for PSK and SAE security modes | |||
46 | 9490977 | Method and apparatus for enabling physical layer secret key generation | |||
47 | 9490972 | Method and apparatus for providing conditional access based on channel characteristics | |||
48 | 9490925 | DMB terminal for enabling simultaneous DMB viewing and phone call and method therefor | |||
49 | 9485093 | Push button configuration pairing | |||
50 | 9483656 | Efficient and secure data storage utilizing a dispersed data storage system | |||
51 | 9479334 | Method, system, and terminal for communication between cluster system encryption terminal and encryption module | |||
52 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
53 | 9467288 | Encryption key destruction for secure data erasure | |||
54 | 9462463 | Method of controlling states of mobile node and verifier therein for receiving secret key | |||
55 | 9461974 | System and method to merge encrypted signals in distributed communication system | |||
56 | 9451453 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
57 | 9450661 | Method and apparatus for beam tracking in wireless communication system | |||
58 | 9444670 | Method and apparatus for transmitting and receiving signal based on interference | |||
59 | 9437196 | Working method of sound transmission-based dynamic token | |||
60 | 9436821 | Systems and methods for detecting attempts to transmit sensitive information via data-distribution channels | |||
61 | 9432192 | Content aware hierarchical encryption for secure storage systems | |||
62 | 9429603 | Method and device for detecting aircraft radio signals transmitted in the same channel simultaneously | |||
63 | 9420429 | Techniques for trusted location application and location provider communications | |||
64 | 9419795 | Digital device and method for performing secure communication using same | |||
65 | 9414233 | Method for managing profile of Embedded UICC, and Embedded UICC, Embedded UICC-equipped terminal, provision method, and method for changing MNO using same | |||
66 | 9414193 | Communicating RF fingerprint-based geofences | |||
67 | 9413882 | System and method for enabling encrypted voice communications between an external device and telephony devices associated with an enterprise network | |||
68 | 9413786 | Dynamic enterprise security control based on user risk factors | |||
69 | 9411944 | Biometric access sensitivity | |||
70 | 9402270 | Secure device bootstrap identity | |||
71 | 9401920 | Black core network system and method | |||
72 | 9401913 | Updating stored passwords | |||
73 | 9401805 | Encrypting device, encrypting method, and recording medium | |||
74 | 9400714 | Wirelessly communicating a data file | |||
75 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
76 | 9392451 | Systems/methods of conducting a financial transaction using a smartphone | |||
77 | 9392449 | Communication system, communication unit, and communication method | |||
78 | 9385867 | Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program | |||
79 | 9385865 | Correcting deciphering mis-synchronization in a mobile communication terminal | |||
80 | 9379888 | Powerline communication network analyzer | |||
81 | 9374706 | Wireless sensor network and central node device thereof | |||
82 | 9369945 | Wireless network system and wireless communication method for switching a wireless network mode | |||
83 | 9363079 | Method of generating message authentication code and authentication device and authentication request device using the method | |||
84 | 9363076 | Implementing encrypted content in a game | |||
85 | 9363034 | Method to encrypt information that is transferred between two communication units | |||
86 | 9357432 | Media streaming with high rate availability | |||
87 | 9356785 | Method and system for security enhancement for mobile communications | |||
88 | 9356778 | Secured communication for local area network | |||
89 | 9351157 | Methods, systems, and devices to reduce audio truncation during transcoding | |||
90 | 9350547 | Systems and methods for watermarking software and other media | |||
91 | 9344895 | Method and system for securely accessing portable hotspot for intelligent mobile phones | |||
92 | 9344412 | Security key management in IMS-based multimedia broadcast and multicast services (MBMS) | |||
93 | 9344317 | OFDM signal modulation-demodulation method, device and system based on compressed sensing | |||
94 | 9344277 | Mass serialization analytics | |||
95 | 9344274 | Method and system for encrypting data | |||
96 | 9344273 | Cryptographic device for implementing S-box | |||
97 | 9338166 | System and method for a single request and single response authentication protocol | |||
98 | 9332429 | Systems/methods of adaptively varying a spectral content of communications | |||
99 | 9319353 | Network task offload apparatus and method thereof | |||
100 | 9317987 | Safe with controllable data transfer capability | |||
101 | 9313802 | Communication of security key information | |||
102 | 9313181 | System and method to merge encrypted signals in distributed communication system | |||
103 | 9313180 | Systems and methods for quantum key generation | |||
104 | 9307091 | Method and apparatus for the secure storage of audio signals | |||
105 | 9306738 | Managed secure computations on encrypted data | |||
106 | 9301147 | Method, apparatus, and system for data protection on interface in communications system | |||
107 | 9294915 | Localized network authentication and security using tamper-resistant keys | |||
108 | 9294913 | Android-based secure handheld network access device and micro-USB version of IEEE 802.15.4 bridge for ACSD networks | |||
109 | 9294429 | Method and system for providing service for searching friends | |||
110 | 9294278 | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same | |||
111 | 9294277 | Audio encryption systems and methods | |||
112 | 9288527 | Multimedia presentation through an extended connectivity apparatus configured via near-field communication (NFC) | |||
113 | 9288045 | Spectral and temporal stealthy fiber optic communication using sampling and phase encoding detection systems | |||
114 | 9288043 | Methods and systems for providing high-security cryptographic keys to mobile radios | |||
115 | 9286792 | Wireless portable activity-monitoring device syncing | |||
116 | 9286490 | Systems and methods for providing conditional access to transmitted information | |||
117 | 9281945 | Offline methods for authentication in a client/server authentication system | |||
118 | 9277402 | Systems and methods for secure high-speed link maintenance via NFC | |||
119 | 9276748 | Data-encrypting method and decrypting method for a mobile phone | |||
120 | 9275512 | Secure communications in gaming system | |||
121 | 9275202 | Data processing method | |||
122 | 9271256 | Verifying generic broadcast of location assistance data | |||
123 | 9270859 | Utilizing data reduction in steganographic and cryptographic systems | |||
124 | 9270457 | Optimizing security bits in a media access control (MAC) header | |||
125 | 9264294 | HAIPE peer discovery using BGP | |||
126 | 9262656 | Multi-protocol RFID system | |||
127 | 9258714 | Broadcast replenishment of account parameters for groups of wireless devices | |||
128 | 9258141 | Supplemental mobile communication device | |||
129 | 9258116 | System and methods for permitting open access to data objects and for securing data within the data objects | |||
130 | 9252954 | Efficient homomorphic encryption scheme for bilinear forms | |||
131 | 9251723 | Systems and methods of multidimensional encrypted data transfer | |||
132 | 9251377 | Instructions processors, methods, and systems to process secure hash algorithms | |||
133 | 9246602 | Quantum encryption communication apparatus, quantum encryption communication method, and quantum encryption communication system | |||
134 | 9237169 | Network stream identification for open FaceTime | |||
135 | 9237008 | Encryption device, encryption method, and encryption program | |||
136 | 9237007 | Secure modulation and demodulation | |||
137 | 9232260 | Extended connectivity multimedia apparatus, multimedia presentation system, and method of transporting credentials obtained via near-field communication (NFC) | |||
138 | 9232259 | Apparatus, system, and method to extend functionality in multimedia presentation device | |||
139 | 9232258 | Apparatus,system, and method to extend connectivity in multimedia presentation device | |||
140 | 9231762 | Method of secure communication, controlled device, and control program | |||
141 | 9229687 | Private two-party computation using partially homomorphic encryption | |||
2015 | |||||
142 | 9225518 | Method of providing fresh keys for message authentication | |||
143 | 9224272 | Method of secure data communication | |||
144 | 9224019 | Electromagnetic interference device identification system and method | |||
145 | 9219752 | Data leak prevention systems and methods | |||
146 | 9219605 | Quantum key distribution | |||
147 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
148 | 9218700 | Method and system for secure and authorized communication between a vehicle and wireless communication devices or key fobs | |||
149 | 9218485 | Program execution device | |||
150 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
151 | 9215067 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
152 | 9203619 | Online data transformation | |||
153 | 9203609 | Method and apparatus for implementing key stream hierarchy | |||
154 | 9198037 | Identification processing apparatus and mobile device using the same | |||
155 | 9197671 | Connection configuration | |||
156 | 9191039 | Randomization using an XOR scrambler in multicarrier communications | |||
157 | 9185553 | Systems/methods of preferential communications | |||
158 | 9185083 | Concealing data within encoded audio signals | |||
159 | 9184913 | Authenticating a telecommunication terminal in a telecommunication network | |||
160 | 9182480 | Information technology (IT) equipment positioning system | |||
161 | 9176543 | Access using a mobile device with an accelerometer | |||
162 | 9172535 | Key implementation system | |||
163 | 9172493 | Caller-identity based security | |||
164 | 9171530 | Methods and apparatus for creating music melodies using validated characters | |||
165 | 9167433 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
166 | 9166785 | Cryptography processing device and cryptography processing method | |||
167 | 9165149 | Use of a mobile telecommunication device as an electronic health insurance card | |||
168 | 9158939 | Security chip, program, information processing apparatus, and information processing system | |||
169 | 9154946 | Secure coupling of hardware components | |||
170 | 9154477 | Systems and methods for encrypting mobile device communications | |||
171 | 9154295 | Method of generating a correspondence table for a cryptographic white box | |||
172 | 9152801 | Cryptographic system of symmetric-key encryption using large permutation vector keys | |||
173 | 9152773 | Communication apparatus and secure module including function for disabling encrypted communication | |||
174 | 9152383 | Method for encrypting a message through the computation of mathematical functions comprising modular multiplications | |||
175 | 9148780 | Method and apparatus for secure data transmission | |||
176 | 9143931 | Privacy control for wireless devices | |||
177 | 9143513 | Portable electronic device and associated method for making information available | |||
178 | 9143326 | Method and system for encrypting data | |||
179 | 9143325 | Masking with shared random bits | |||
180 | 9143257 | Method and apparatus for transmitting signal | |||
181 | 9143256 | Method and apparatus for transmitting signal | |||
182 | 9130693 | Generation of perfectly secret keys in wireless communication networks | |||
183 | 9124423 | Iterative data secret-sharing transformation | |||
184 | 9124386 | System, device, and method for securing voice authentication and end-to-end speech interaction | |||
185 | 9119064 | Method and apparatus for providing broadcast channel encryption to enhance cellular network security | |||
186 | 9118966 | Enforcing software independent content protection in an electronic device during transcoding | |||
187 | 9118643 | Authentication and data integrity protection of token | |||
188 | 9118463 | Distributed single sign on technologies including privacy protection and proactive updating | |||
189 | 9118441 | Layout-optimized random mask distribution system and method | |||
190 | 9112855 | Method for identifying pulse optical signal and device thereof | |||
191 | 9112698 | Cryptographic device and method for data encryption with per-round combined operations | |||
192 | 9107074 | Wireless personal area network having authentication and associated methods | |||
193 | 9107066 | Encryption in a wireless telecommunications | |||
194 | 9106421 | Securing communications over a first communication link with encryption managed by a second communication link | |||
195 | 9106364 | Signal processing of a high capacity waveform | |||
196 | 9100863 | Cellular backhaul load distribution | |||
197 | 9100548 | Feature enablement at a communications terminal | |||
198 | 9100175 | Embedded universal integrated circuit card supporting two-factor authentication | |||
199 | 9094842 | Systems and method for orthogonal frequency divisional multiplexing | |||
200 | 9094454 | Location specific personalized enterprise services using video signature of an electronic display | |||
201 | 9088553 | Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets | |||
202 | 9087432 | Creation and monitoring of "fair play" online gaming | |||
203 | 9087192 | Electronic circuit and method for monitoring a data processing | |||
204 | 9083684 | Communication node, key synchronization method, and key synchronization system | |||
205 | 9083590 | Long range WLAN data unit format | |||
206 | 9083528 | Authentication of encrypted data blocks | |||
207 | 9077509 | Secure threshold decryption protocol computation | |||
208 | 9071972 | Asynchronous tiered access control to a wireless home network | |||
209 | 9071964 | Method and apparatus for authenticating a digital certificate status and authorization credentials | |||
210 | 9071440 | Method and system of authenticating the identity of a user of a public computer terminal | |||
211 | 9070251 | Multi-tiered static chain of trust | |||
212 | 9065631 | Integrated cryptographic module providing confidentiality and integrity | |||
213 | 9065593 | Securing speech recognition data | |||
214 | 9064117 | Mobile provisioning device | |||
215 | 9060265 | Wireless sensor network and central node device thereof | |||
216 | 9059866 | Digital microwave radio system and method with encryption | |||
217 | 9059838 | Encryption algorithm with randomized buffer | |||
218 | 9059784 | Space based authentication utilizing signals from low and medium earth orbit | |||
219 | 9058495 | Rights management services integration with mobile device management | |||
220 | 9054862 | Access control key management in a virtual world | |||
221 | 9049226 | Defending against a cyber attack via asset overlay mapping | |||
222 | 9047461 | Computer-implemented method for replacing a data string | |||
223 | 9043868 | Network security appliance | |||
224 | 9043599 | Method and server for providing a mobility key | |||
225 | 9042550 | Methods and apparatus for base station assisted peer discovery through aggregation of expressions | |||
226 | 9042549 | Apparatus and method for address privacy protection in receiver oriented channels | |||
227 | 9031236 | Generating identical numerical sequences utilizing a physical property and secure communication using such sequences | |||
228 | 9027111 | Relay node authentication method, apparatus, and system | |||
229 | 9025771 | Security optimization for IMS/MMD architecture | |||
230 | 9025770 | Dynamic encryption arrangement with a wireless device and methods therefor | |||
231 | 9021554 | Unlimited access to media and applications over wireless infrastructure | |||
232 | 9021463 | Method, system and apparatus for management of push content | |||
233 | 9020149 | Protected storage for cryptographic materials | |||
234 | 9020146 | Algorithm agile programmable cryptographic processor | |||
235 | 9008315 | Shared secret arrangements and optical data transfer | |||
236 | 9008314 | Secure wireless communications | |||
237 | 9008312 | System and method of creating and sending broadcast and multicast data | |||
238 | 9008310 | Implementing encrypted content in a game | |||
239 | 9007895 | Method for routing data packets in a fat tree network | |||
240 | 9000886 | Method, computer program product, and system for preventing inadvertent configuration of electronic devices provided with infrared data association interfaces | |||
241 | 8997182 | Legacy device registering method, data transferring method and legacy device authenticating method | |||
242 | 8995662 | Secure vehicle-to-vehicle communication system | |||
243 | 8995650 | Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection | |||
244 | 8993897 | Photosensitive resin composition and use thereof | |||
245 | 8989885 | Watermark generator, watermark decoder, method for providing a watermark signal in dependence on binary message data, method for providing binary message data in dependence on a watermarked signal and computer program using a two-dimensional bit spreading | |||
246 | 8989382 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
247 | 8989381 | Method, apparatus, and system for data protection on interface in communications system | |||
248 | 8989286 | Mapping a transmission stream in a virtual baseband to a physical baseband with equalization | |||
249 | 8983069 | System and method for counter mode encrypted communication with reduced bandwidth | |||
250 | 8982972 | Apparatus and method for processing an input signal | |||
251 | 8982411 | Image processing apparatus and method | |||
252 | 8978149 | Media content device, system and method | |||
253 | 8976965 | Mobile computing device and wearable computing device having automatic access mode control | |||
254 | 8976964 | Key pair management method and image forming device | |||
255 | 8973122 | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method | |||
256 | 8972300 | Content distribution system | |||
257 | 8971534 | Mobile communication terminal and method | |||
258 | 8966611 | Method and apparatus for local area networks | |||
259 | 8966261 | Method for secure remote backup | |||
260 | 8966250 | Appliance, system, method and corresponding software components for encrypting and processing data | |||
261 | 8966241 | Apparatus and method for sending encrypted data to conditional access module over common interface, conditional access module and system thereof | |||
262 | 8964982 | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |||
263 | 8964981 | Method and system for transmitting signaling information over a data transport network | |||
264 | 8964980 | System and method of distributing game play instructions to players during a game | |||
265 | 8964971 | Method of providing text representation of a cryptographic value | |||
266 | 8963687 | System and method for DSRC communication | |||
267 | 8958553 | Public key cryptosystem based on goppa codes and puf based random generation | |||
268 | 8958552 | Data processing device | |||
269 | 8958551 | Multi-dimensional montgomery ladders for elliptic curves | |||
270 | 8955062 | Method and system for permitting access to resources based on instructions of a code tagged with an identifier assigned to a domain | |||
271 | 8953803 | Circuit switched mobile telephony in fixed wireless access | |||
272 | 8953801 | System and method for multicasting IPSEC protected communications | |||
273 | 8953790 | Secure generation of a device root key in the field | |||
274 | 8953788 | Encrypting a data transmission using multiple channels | |||
275 | 8953786 | User input based data encryption | |||
276 | 8953782 | Crypto arrangement with mixed endian | |||
277 | 8953781 | Apparatus and method for ciphering of uplink data in mobile communication system | |||
278 | 8949300 | Circuit and method for controlling quality of random numbers | |||
279 | 8948401 | Method for filtering of abnormal ONT with same serial number in a GPON system | |||
280 | 8948393 | Uninterrupted transmission during a change in ciphering configuration | |||
281 | 8948392 | Method of providing an authenticable time-and-location indication | |||
282 | 8948389 | Wireless network connection method, wireless network apparatus and wireless network access point (AP) applying the method | |||
283 | 8948387 | Security key generator | |||
284 | 8948376 | Format-preserving encryption via rotating block encryption | |||
285 | 8948375 | Systems for embedding information in data strings | |||
286 | 8942678 | Content distributing system, content distributing apparatus, terminal device and content distributing method | |||
287 | 8942379 | Timeslot encryption in an optical transport network | |||
288 | 8942372 | Method and device for identifying objects | |||
289 | 8942224 | Method and system for handling security synchronization for prolonged periods of no-reception of voice frames | |||
290 | 8938624 | Encryption key destruction for secure data erasure | |||
291 | 8938075 | Method and device for establishing a communication session | |||
292 | 8938074 | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier | |||
293 | 8935763 | System and method of user authentication in wireless communication networks | |||
294 | 8935536 | Image encryption/decryption device, method, and storage medium storing a program | |||
295 | 8935526 | Secure message handling on a mobile device | |||
296 | 8934632 | System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks | |||
297 | 8934631 | Decompressing apparatus and compressing apparatus | |||
298 | 8934630 | Compressing block-cipher encrypted data | |||
299 | 8930423 | Method and system for restoring encrypted files from a virtual machine image | |||
300 | 8929550 | LPI/LPD communication systems | |||
301 | 8929546 | Motion-based authentication for a gesture-based computing device | |||
302 | 8929539 | Instructions to perform Groestl hashing | |||
2014 | |||||
303 | 8923518 | Key distribution system, key distribution method, and recording medium | |||
304 | 8923516 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
305 | 8918906 | Communication service system | |||
306 | 8917870 | Methods and devices for computing a shared encryption key | |||
307 | 8917869 | Creation and monitoring of "fair play" online gaming | |||
308 | 8914849 | Broadcast replenishment of account parameters for groups of wireless devices | |||
309 | 8913747 | Secure configuration of a wireless sensor network | |||
310 | 8913746 | Wireless communication system and method | |||
311 | 8913740 | Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule | |||
312 | 8913673 | Method and apparatus for transmitting rank indication information | |||
313 | 8912880 | Method for checking the authorization of users | |||
314 | 8909929 | Stored public key validity registers for cryptographic devices and systems | |||
315 | 8908865 | Session key generation and distribution with multiple security associations per protocol instance | |||
316 | 8908860 | Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing | |||
317 | 8907768 | Access using a mobile device with an accelerometer | |||
318 | 8903091 | Optical system with imparted secure codes | |||
319 | 8902475 | Image forming apparatus, image processing method, and image processing system | |||
320 | 8898466 | Secure block acknowledgement mechanism for use in communication networks | |||
321 | 8897447 | Burst tethering for mobile communication devices | |||
322 | 8897440 | Cryptographic system of symmetric-key encryption using large permutation vector keys | |||
323 | 8893285 | Securing data using integrated host-based data loss agent with encryption detection | |||
324 | 8892839 | Methods, systems, and storage mediums for managing content storage and selection | |||
325 | 8891767 | Method and apparatus for direct counterfactual quantum communication | |||
326 | 8891757 | Programmable cryptographic integrated circuit | |||
327 | 8887258 | Apparatus and method of binding a removable module to an access terminal | |||
328 | 8887212 | Extended connectivity point-of-deployment apparatus and concomitant method thereof | |||
329 | 8886238 | Method of allocating radio resource in wireless communication system | |||
330 | 8885827 | System and method for enabling a host device to securely connect to a peripheral device | |||
331 | 8885825 | Method of establishing a cryptographic key, network head and receiver for this method, and method of transmitting signals | |||
332 | 8880893 | Enterprise information asset protection through insider attack specification, monitoring and mitigation | |||
333 | 8879736 | Telecommunication systems and encryption of control messages in such systems | |||
334 | 8879727 | Method and apparatus for hardware-accelerated encryption/decryption | |||
335 | 8879725 | Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation | |||
336 | 8874938 | Program execution device | |||
337 | 8874913 | Secure communications between devices using a trusted server | |||
338 | 8873758 | Secure wireless link between two devices using probes | |||
339 | 8873757 | Methods and apparatus for providing network-assisted key agreement for D2D communications | |||
340 | 8873756 | System for transmitting a data signal in a network, method, mobile transmitting device and network device | |||
341 | 8873754 | Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system | |||
342 | 8867742 | Optical transmission device and reception device for Yuen encryption, optical transmission method and reception method for Yuen encryption, and encrypted communication system | |||
343 | 8867608 | Systems and methods for segmenting and communicating video data | |||
344 | 8861733 | Method of personalizing a NFC chipset | |||
345 | 8861732 | Method and system for supporting security in a mobile communication system | |||
346 | 8861730 | Arranging data ciphering in a wireless telecommunication system | |||
347 | 8861717 | Verification device, secret information restoration device, verification method, program, and secret sharing system | |||
348 | 8861716 | Efficient homomorphic encryption scheme for bilinear forms | |||
349 | 8860979 | Deletion of unwanted reply messages in e-mail printing | |||
350 | 8855313 | System and method for providing variable security level in a wireless communication system | |||
351 | 8855311 | Advanced container security device network protocols | |||
352 | 8855310 | System and method for exchanging encryption keys between a mobile device and a peripheral device | |||
353 | 8855306 | Node distributed with group key and group key updating | |||
354 | 8844051 | Method and apparatus for media relaying and mixing in social networks | |||
355 | 8842834 | Robust delivery of packet based secure voice | |||
356 | 8842833 | System and method for secure transaction of data between wireless communication device and server | |||
357 | 8842831 | Authentication of an RFID tag using an asymmetric cryptography method | |||
358 | 8842830 | Method and apparatus for sending a key on a wireless local area network | |||
359 | 8842825 | Data encoding apparatus, data encoding method, data encoding program, and recording medium | |||
360 | 8839363 | Trusted hardware for attesting to authenticity in a cloud environment | |||
361 | 8838972 | Exchange of key material | |||
362 | 8837735 | Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing | |||
363 | 8837731 | Secure remote control for audio/video receiver/decoder | |||
364 | 8837730 | Apparatus and method for reducing channel reproduction delay in mobile terminal | |||
365 | 8837728 | Server algorithms to improve space based authentication | |||
366 | 8837724 | Synchronization test for device authentication | |||
367 | 8832849 | Computer data object modification based on data types in a networked environment | |||
368 | 8832311 | Diverter | |||
369 | 8831426 | OCDM-based all optical multi-level security | |||
370 | 8831220 | Processing module operating methods, processing modules, and communications systems | |||
371 | 8826029 | Providing time ratio-based password/challenge authentication | |||
372 | 8826026 | Systems and methods for tracking electronic files in computer networks using electronic signatures | |||
373 | 8825928 | Facilitating and authenticating transactions through the use of a dongle interfacing a security card and a data processing apparatus | |||
374 | 8824681 | Method and device for link layer decrypting and/or encrypting a voice message stream already supporting end to end encryption | |||
375 | 8824678 | MAC address anonymizer | |||
376 | 8824672 | Reconfigurable block encryption logic | |||
377 | 8819854 | Information processing apparatus, system management method, and recording medium | |||
378 | 8819431 | Methods and device for electronic entities for the exchange and use of rights | |||
379 | 8817985 | Encryption key distribution system | |||
380 | 8817978 | Order-preserving encryption and decryption apparatus and method thereof | |||
381 | 8817976 | Reversible cipher | |||
382 | 8813184 | Authentication using mobile devices | |||
383 | 8812833 | Wireless multiband security | |||
384 | 8811617 | Efficient security-related processing | |||
385 | 8811614 | Space based authentication utilizing signals from low and medium earth orbit | |||
386 | 8811611 | Encryption/decryption of digital data using related, but independent keys | |||
387 | 8811608 | Attack-resistant multivariate signature scheme | |||
388 | 8810862 | Paper medium information encrypting system, decrypting system, program and method | |||
389 | 8806214 | Communication with non-repudiation and blind signatures | |||
390 | 8804961 | Method and system for mobile terminals handing over between clear session and encrypted session communications | |||
391 | 8804957 | Authentication key generation arrangement | |||
392 | 8804951 | Speeding up galois counter mode (GCM) computations | |||
393 | 8804950 | Methods and apparatus for producing a hash value based on a hash function | |||
394 | 8800019 | Secure streaming container | |||
395 | 8799655 | Mobile offline authentication using one-time passcodes | |||
396 | 8798269 | Method and system for secured broadcasting of a digital data stream | |||
397 | 8798261 | Data protection using distributed security key | |||
398 | 8793504 | Validating a system with multiple subsystems using trusted platform modules and virtual platform modules | |||
399 | 8792791 | Multiplexed quantum key distribution | |||
400 | 8792644 | Communication apparatus for performing communication parameter setting and authentication process, control method thereof and storage medium storing program | |||
401 | 8792641 | Secure wireless communication | |||
402 | 8787724 | Information processing apparatus, information processing method and program | |||
403 | 8787578 | Method and apparatus for encrypting transmissions in a communication system | |||
404 | 8787577 | Method and system for wireless transmission of content | |||
405 | 8787574 | Multicast key negotiation method suitable for group calling system and a system thereof | |||
406 | 8787571 | Wired communications systems with improved capacity and security | |||
407 | 8787565 | Method and apparatus for generating an advanced encryption standard (AES) key schedule | |||
408 | 8787564 | Assessing cryptographic entropy | |||
409 | 8787563 | Data converter, data conversion method and program | |||
410 | 8782757 | Session sharing in secure web service conversations | |||
411 | 8782756 | Time clock | |||
412 | 8782437 | Content protection using block reordering | |||
413 | 8782402 | System and method for secure communications | |||
414 | 8781970 | System, method and program product to determine resolution when software installed on a computer is not properly licensed | |||
415 | 8781126 | Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network | |||
416 | 8781125 | Systems and methods of secure coding for physical layer communication channels | |||
417 | 8781123 | Method for processing location information relating to a terminal connected to a packet network via a cellular network | |||
418 | 8781111 | System and methods for side-channel attack prevention | |||
419 | 8781110 | Unified system architecture for elliptic-curve cryptography | |||
420 | 8779890 | Radio devices, regulation servers, and verification servers | |||
421 | 8774411 | Session key generation and distribution with multiple security associations per protocol instance | |||
422 | 8774409 | Method of handover | |||
423 | 8774407 | System and method for executing encrypted binaries in a cryptographic processor | |||
424 | 8774400 | Method for protecting data against differntial fault analysis involved in rivest, shamir, and adleman cryptography using the chinese remainder theorem | |||
425 | 8769686 | System and method for securing wireless transmissions | |||
426 | 8769282 | Localized network authentication and security using tamper-resistant keys | |||
427 | 8768404 | Mobile radio terminal | |||
428 | 8768314 | Methods and apparatus for anonymous user identification and content personalization in wireless communication | |||
429 | 8763026 | Flexible interface for secure input of pin code | |||
430 | 8762714 | Protecting against counterfeit electronics devices | |||
431 | 8761744 | Mobile virtual communication invitations | |||
432 | 8761395 | Reducing detectability of an encryption key | |||
433 | 8761394 | System and method for secure broadcast communication | |||
434 | 8761390 | Production of cryptographic keys for an embedded processing device | |||
435 | 8756410 | Polynomial evaluation delegation | |||
436 | 8755529 | Method and device for establishing network connection | |||
437 | 8755522 | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet | |||
438 | 8752148 | Processorless token for producing a one-time password | |||
439 | 8752144 | Targeted biometric challenges | |||
440 | 8751822 | Cryptography using quasigroups | |||
441 | 8750707 | System and method for establishing secure communications between transceivers in undersea optical communication systems | |||
442 | 8750517 | Friend or foe detection | |||
443 | 8750514 | Secure smart poster | |||
444 | 8750511 | Root node and a computer readable medium | |||
445 | 8750509 | Wireless surveillance system releasably mountable to track lighting | |||
446 | 8750507 | Dynamic group creation for managed key servers | |||
447 | 8750500 | Multi-dimensional montgomery ladders for elliptic curves | |||
448 | 8750497 | Cryptographic device for implementing S-box | |||
449 | 8745392 | Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel | |||
450 | 8745379 | Systems and methods for securing data in motion | |||
451 | 8744083 | System and method for early cut through of encrypted and unencrypted voice streams | |||
452 | 8744082 | System and method for securing wireless communications | |||
453 | 8744078 | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | |||
454 | 8744074 | Method and device for countering fault attacks | |||
455 | 8744072 | Exponentiation method resistant against side-channel and safe-error attacks | |||
456 | 8738925 | Wireless portable biometric device syncing | |||
457 | 8737964 | Facilitating and authenticating transactions | |||
458 | 8737625 | Data receiving apparatus, data receiving method, and non-transitory computer readable medium storing program | |||
459 | 8737618 | Secure key distribution for optical code division multiplexed based optical encryption | |||
460 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
461 | 8737615 | Content transmission system, communication device, and content transmission method | |||
462 | 8737607 | Finding nearby users without revealing own location | |||
463 | 8732805 | Re-authentication in secure web service conversations | |||
464 | 8731200 | Key distribution | |||
465 | 8731196 | Decrypting apparatus, encrypting apparatus, decrypting method, encrypting method, and communication system | |||
466 | 8731194 | Method of establishing security association in inter-rat handover | |||
467 | 8731188 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
468 | 8726040 | Memory randomization for protection against side channel attacks | |||
469 | 8724814 | System and method of security function activation for a mobile electronic device | |||
470 | 8724813 | Wireless device setup | |||
471 | 8724811 | Broadcast encryption based security system | |||
472 | 8724810 | Method for authenticating onboard units | |||
473 | 8724807 | Method for etching and secure distribution of digital data, access device and writer | |||
474 | 8719574 | Certificate generation using virtual attributes | |||
475 | 8718276 | Cryptography on a elliptical curve | |||
476 | 8713303 | Method and system for establishing security connection between switch equipments | |||
477 | 8712055 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
478 | 8712053 | Method and system for security authentication of radio frequency identification | |||
479 | 8712038 | Cryptography on a simplified elliptical curve | |||
480 | 8712037 | Data encoding and decoding apparatus and method thereof for verifying data integrity | |||
481 | 8712036 | System for encrypting and decrypting a plaintext message with authentication | |||
482 | 8711843 | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |||
483 | 8707402 | Secure computer provisioning | |||
484 | 8707045 | Method and apparatus for traffic count key management and key count management | |||
485 | 8705742 | Data compression apparatus and data decompression apparatus | |||
486 | 8705739 | On-the-fly encryption on a gaming machine | |||
487 | 8705729 | Audio content protection | |||
488 | 8705348 | Use of metadata for time based anti-replay | |||
489 | 8700921 | Fault-resistant exponentiation algorithm | |||
490 | 8694789 | System and method for generating a non-repudiatable record of a data stream | |||
491 | 8694782 | Wireless authentication using beacon messages | |||
492 | 8694775 | Method enabling real-time data service, realization, real-time data service system and mobile terminal | |||
493 | 8693685 | Quantum cryptography apparatus | |||
494 | 8687808 | Method and system for self synchronizing cryptographic parameters | |||
495 | 8687807 | Cascading dynamic crypto periods | |||
496 | 8687802 | Method and system for accelerating the deterministic enciphering of data in a small domain | |||
497 | 8687801 | Method and apparatus for acquiring domain information and domain-related data | |||
498 | 8683561 | Fixed client identification system for positive identification of client to server | |||
499 | 8683229 | Data encryption device | |||
500 | 8683211 | Method of projecting a secure USB key | |||
501 | 8682266 | Techniques to enhance diversity for a wireless system | |||
502 | 8681989 | WCDMA 3G voice communication protection method and terminal using the same | |||
503 | 8681988 | Encoding a connection between a base and a mobile part | |||
504 | 8681983 | Method for public-key attribute-based encryption with respect to a conjunctive logical expression | |||
505 | 8681981 | Method and apparatus for transmitting voice communications related to a multimedia session | |||
506 | 8676198 | Method of supporting location privacy | |||
507 | 8675879 | Methods and devices for allocating scrambling codes | |||
508 | 8675870 | Encryption apparatus | |||
509 | 8675869 | Incorporating data into an ECDSA signature component | |||
510 | 8675868 | Encrypting an address-dependent value along with code to prevent execution or use of moved code | |||
511 | 8675865 | Method and apparatus for a high bandwidth stream cipher | |||
512 | 8670799 | Interface and communication protocol for a mobile device with a smart battery | |||
513 | 8670566 | System and method for exchanging encryption keys between a mobile device and a peripheral output device | |||
514 | 8670565 | Encrypted packet communication system | |||
515 | 8670557 | Cryptographic system with modular randomization of exponentiation | |||
516 | 8666408 | Method of supporting location privacy | |||
517 | 8666079 | Decoding and encoding data | |||
518 | 8666078 | Method and system for generating cipher key during switching | |||
519 | 8666077 | Traffic encryption key generation in a wireless communication network | |||
520 | 8666069 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
521 | 8666065 | Real-time data encryption | |||
522 | 8666064 | Endecryptor capable of performing parallel processing and encryption/decryption method thereof | |||
523 | 8665974 | Multi-clock PHY preamble design and detection | |||
524 | 8661267 | System and method for processing encoded messages | |||
525 | 8661240 | Joint encryption of data | |||
526 | 8660587 | Method for providing position information using time period | |||
527 | 8660262 | Method and device for generating random wait states | |||
528 | 8656486 | Biometric sensor for human presence detection and associated methods | |||
529 | 8656151 | Service accessing control method, terminal and system | |||
530 | 8654978 | Apparatus, method, and computer program product for access control to a mobile terminal | |||
531 | 8654977 | System and method for controlling access between Bluetooth devices | |||
532 | 8654975 | Joint encryption of data | |||
533 | 8654974 | Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices | |||
534 | 8654970 | Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm | |||
535 | 8654969 | Cipher independent interface for cryptographic hardware service | |||
536 | 8653938 | Method of protection in a contactless radiofrequency communication | |||
537 | 8650401 | Network having quantum key distribution | |||
538 | 8650400 | Data processor, relay transmitter, and data transmission system | |||
539 | 8649519 | Method and apparatus for secure distribution of digital content | |||
540 | 8649518 | Implementing CSA cryptography in an integrated circuit device | |||
541 | 8649512 | Duo codes for product authentication | |||
542 | 8649511 | Method and processing circuit for dealing with galois field computation | |||
543 | 8649509 | Systems and computer program products for generating and verifying randomized hash values | |||
544 | 8649508 | System and method for implementing elliptic curve scalar multiplication in cryptography | |||
545 | 8645703 | Power analysis countermeasure for the ECMQV key agreement algorithm | |||
546 | 8644514 | Security model for a relay network system | |||
547 | 8644511 | System and method for providing digital content | |||
548 | 8644508 | Trusted communications between untrusting parties | |||
549 | 8644507 | Game apparatus, system and method for improving in-game communications during a game | |||
550 | 8644502 | Secure data parser method and system | |||
551 | 8644501 | Paired carrier and pivot steganographic objects for stateful data layering | |||
552 | 8644499 | Method and system for securely protecting a semiconductor chip without compromising test and debug capabilities | |||
553 | 8643854 | Image forming apparatus and print control method used therein | |||
554 | 8640158 | Systems, methods, and products for presenting content | |||
555 | 8639931 | Acceleration of key agreement protocols | |||
556 | 8638937 | Methods and systems for distributed processing on consumer devices | |||
557 | 8638936 | Security protected non-access stratum protocol operation supporting method in a mobile telecommunication system | |||
558 | 8638934 | Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site | |||
559 | 8638927 | Cryptographic processing method, computer readable storage medium, and cryptographic processing device | |||
560 | 8638926 | Sharing a secret with modular inverses | |||
561 | 8635681 | Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection | |||
562 | 8635449 | Method of validation public key certificate and validation server | |||
563 | 8634560 | Time-based secure key synchronization | |||
564 | 8634559 | Aggregate signature schemes | |||
565 | 8634557 | Semiconductor storage device | |||
566 | 8634556 | Communication apparatus and control method | |||
567 | 8634553 | Encryption key generation device | |||
568 | 8630620 | Method and apparatus for securing location information and access control using the location information | |||
569 | 8630420 | Method for auto-configuration of a network terminal address | |||
570 | 8630415 | Method and apparatus for authentication service application processes during service reallocation in high availability clusters | |||
571 | 8630414 | Inter-working function for a communication system | |||
572 | 8627108 | System and method for protecting data on a mobile device | |||
573 | 8627107 | System and method of securing private health information | |||
574 | 8627088 | System and method for in- and out-of-band multi-factor server-to-user authentication | |||
575 | 8627074 | Secure block acknowledgement mechanism for use in communication networks | |||
576 | 8627073 | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes | |||
577 | 8626811 | Method and apparatus for providing flexible bit-length moduli on a block Montgomery machine | |||
578 | 8625796 | Method for facilitating authentication using proximity | |||
579 | 8625794 | White-box cryptographic system with configurable key using intermediate data modification | |||
580 | 8625793 | Resynchronization for push message security using secret keys | |||
581 | 8625781 | Encrypton processor | |||
582 | 8625780 | Reduction of side-channel information by interacting crypto blocks | |||
583 | 8625778 | Method of authentication, and image display apparatus incorporating the method | |||
2013 | |||||
584 | 8621227 | System and method for cryptographic key exchange using matrices | |||
585 | 8621202 | Externally managed security and validation processing device | |||
586 | 8620315 | Multi-tiered anti-abuse registration for a mobile device user | |||
587 | 8619989 | VolP encryption bridging by home wireless router | |||
588 | 8619988 | Method and apparatus for virtual Wi-Fi service with authentication and accounting control | |||
589 | 8619986 | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier | |||
590 | 8619980 | Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key | |||
591 | 8619977 | Representation change of a point on an elliptic curve | |||
592 | 8619976 | Encryption method, decryption method, device, and program | |||
593 | 8615661 | System and method for transmitting and utilizing attachments | |||
594 | 8615658 | Dynamic foreign agent--home agent security association allocation for IP mobility systems | |||
595 | 8615087 | OCDM-based photonic encryption system with provable security | |||
596 | 8615080 | Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks | |||
597 | 8613097 | Methods and systems for detecting an access attack | |||
598 | 8612752 | Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network | |||
599 | 8612750 | Creating and using secure communications channels for virtual universes | |||
600 | 8611540 | System and method for secure messaging in a hybrid peer-to-peer network | |||
601 | 8611539 | Group key security in a multihop relay wireless network | |||
602 | 8611537 | Method and system for optimizing authentication procedures in media independent handover services | |||
603 | 8611535 | Characterization of an entangled photon system | |||
604 | 8611533 | Method and system for the Orange family of stream ciphers and method and system for generating stream ciphers based on the ERINDALE-PLUS hashing function | |||
605 | 8611532 | Managing media content decryption keys in encrypted media content distribution systems and methods | |||
606 | 8611531 | Method and apparatus for remotely inserting watermark into encrypted compressed video bitstream | |||
607 | 8605903 | System, device, and method for wireless communication, apparatus and method for processing information from contactless IC cards | |||
608 | 8605902 | Method and implementation for supporting switchable red side or black side control options for airborne radio communication radios | |||
609 | 8605893 | Encryption and decryption processing method, system and computer-accessible medium for achieving SMS4 cryptographic procedure | |||
610 | 8605730 | System and method for multimedia communication across disparate networks | |||
611 | 8601603 | Secure information transmission over a network | |||
612 | 8601267 | Establishing a secured communication session | |||
613 | 8600356 | Authentication in a roaming environment | |||
614 | 8600058 | Generation of self-certified identity for efficient access control list management | |||
615 | 8600050 | Encrypting a data transmission using multiple channels | |||
616 | 8600046 | Method of coding a secret formed by a numerical value | |||
617 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
618 | 8594329 | Non-interactive verifiable, delegated computation | |||
619 | 8594321 | Apparatus and method for operating a symmetric cipher engine in cipher-block chaining mode | |||
620 | 8589694 | System, method, and apparatus for graduated difficulty of human response tests | |||
621 | 8588426 | Methods and apparatus to secure communications in a mobile network | |||
622 | 8588418 | User level security for an emulated removable mass storage device | |||
623 | 8588417 | Systems and methods for multicast retransmission over a secure wireless LAN | |||
624 | 8588416 | System and method for secure communication | |||
625 | 8588415 | Method for securing a telecommunications terminal which is connected to a terminal user identification module | |||
626 | 8588408 | Method of implementing a block cipher algorithm | |||
627 | 8588406 | Data obfuscation | |||
628 | 8583944 | Method and integrated circuit for secure encryption and decryption | |||
629 | 8582769 | Secure communication over passive optical network (PON) with quantum encryption | |||
630 | 8582766 | Method for ensuring media stream security in IP multimedia sub-system | |||
631 | 8582765 | Masking of data in a calculation | |||
632 | 8582761 | Cryptographic method with elliptical curves | |||
633 | 8582760 | Method and system of managing and filtering electronic messages using cryptographic techniques | |||
634 | 8582758 | Apparatus and a method for calculating a multiple of a point an elliptic curve | |||
635 | 8578464 | Secure streaming container | |||
636 | 8577293 | Communication system and communication device | |||
637 | 8577040 | Data transmitting method and apparatus, and data communication method and apparatus | |||
638 | 8577038 | Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number | |||
639 | 8577037 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
640 | 8577036 | Method and device for transmitting messages in real time | |||
641 | 8577035 | Electronic circuit for securing data interchanges between a computer station and a network | |||
642 | 8577027 | Advanced cryptographic method of multilayer diffusion in multidimension | |||
643 | 8577026 | Methods and apparatus in alternate finite field based coders and decoders | |||
644 | 8572707 | Multiple authentication mechanisms for accessing service center supporting a variety of products | |||
645 | 8571219 | Authentication loading control and information recapture in a UMTS network | |||
646 | 8566247 | System and method for secure communications involving an intermediary | |||
647 | 8565760 | Methods, systems and apparatus for recovering registration information | |||
648 | 8565439 | Method for detecting the scrambling of a radiocommunication network, and corresponding storage means and circuit | |||
649 | 8565433 | Method and system for managing air interface key | |||
650 | 8565432 | Communications system | |||
651 | 8565431 | System and method for scrambling wireless signals using a secure time value | |||
652 | 8565421 | Block cipher improvements | |||
653 | 8565420 | Source centric sanction server and methods for use therewith | |||
654 | 8561055 | Method, system and apparatus for management of push content | |||
655 | 8560861 | Method and apparatus for communicating authorization data | |||
656 | 8560847 | Light access authentication method and system | |||
657 | 8559947 | System and method to enable subscriber self-activation of wireless data terminals | |||
658 | 8559921 | Management of security features in a communication network | |||
659 | 8559638 | Cryptographic processing system | |||
660 | 8559637 | Securing information exchanged via a network | |||
661 | 8559636 | Authenticating network elements in a communication system | |||
662 | 8559629 | Sanctioning content source and methods for use therewith | |||
663 | 8559628 | Sanctioned client device and methods for use therewith | |||
664 | 8559627 | Sanctioned caching server and methods for use therewith | |||
665 | 8559626 | Cryptographic sanction server and methods for use therewith | |||
666 | 8559624 | Cyphometry consisting of ciferglifs, chaotiglyphs and word auras | |||
667 | 8555072 | Attestation of computing platforms | |||
668 | 8555064 | Security system and method for wireless communication system | |||
669 | 8554178 | Methods and systems for efficient deployment of communication filters | |||
670 | 8553887 | Method for generating dynamic group key | |||
671 | 8553885 | Wireless personal area network having authentication and associated methods | |||
672 | 8553884 | Quantum communication system | |||
673 | 8553878 | Data transformation system using cyclic groups | |||
674 | 8549310 | Method and apparatus for secure measurement certification | |||
675 | 8549305 | Steganographic method and device | |||
676 | 8549291 | Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same | |||
677 | 8548170 | Document de-registration | |||
678 | 8548168 | Security module for securing an encrypted signal with system and method for use therewith | |||
679 | 8548163 | Simultaneous scalar multiplication method | |||
680 | 8543837 | Method of randomly and dynamically checking configuration integrity of a gaming system | |||
681 | 8543831 | System and method for establishing data connections between electronic devices | |||
682 | 8543822 | Device authentication | |||
683 | 8543512 | Licensed content utilization validation using cache parameters | |||
684 | 8542836 | System, apparatus and methods for highly scalable continuous roaming within a wireless network | |||
685 | 8542834 | System and method for securely pairing a wireless peripheral to a host | |||
686 | 8542832 | System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm | |||
687 | 8542103 | Radio frequency identification reading by using error correcting codes on sets of tags | |||
688 | 8538026 | Key distribution | |||
689 | 8538022 | System and method of cross-component message processing | |||
690 | 8538019 | Method and apparatus for configuring nodes in a wireless network | |||
691 | 8538012 | Performing AES encryption or decryption in multiple modes with a single instruction | |||
692 | 8533807 | Methods for accessing content based on a session ticket | |||
693 | 8533798 | Method and system for controlling access to networks | |||
694 | 8532295 | Method for the secure loading in a NFC chipset of data allowing access to a service | |||
695 | 8532286 | System and method for reducing the computation and storage requirements for a montgomery-style reduction | |||
696 | 8531334 | Location proofs | |||
697 | 8527751 | Systems and methods for secure and certified electronic messaging | |||
698 | 8526617 | Method of handling security configuration in wireless communications system and related communication device | |||
699 | 8526615 | Storage system executing encryption and decryption processing | |||
700 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
701 | 8526603 | Public-key encrypted bloom filters with applications to private set intersection | |||
702 | 8526602 | Adjustment-value-attached block cipher apparatus, cipher generation method and recording medium | |||
703 | 8526601 | Method of improving operational speed of encryption engine | |||
704 | 8522053 | Program execution device | |||
705 | 8522037 | Motion-detecting device user authentication | |||
706 | 8520853 | Wireless communication device, method for wireless connection, and computer usable medium therefor | |||
707 | 8520851 | Wireless communication device with securely added randomness and related method | |||
708 | 8520840 | System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet | |||
709 | 8516562 | Multi-channel multi-factor authentication | |||
710 | 8516272 | Secure dynamically reconfigurable logic | |||
711 | 8515070 | Access control for implanted medical devices | |||
712 | 8515066 | Method, apparatus and program for establishing encrypted communication channel between apparatuses | |||
713 | 8514748 | Method and system for improved authentication for communications network setup | |||
714 | 8510557 | Secure message and file delivery | |||
715 | 8509443 | Rekey index generation method and rekey index generation apparatus | |||
716 | 8509440 | PANA for roaming Wi-Fi access in fixed network architectures | |||
717 | 8509437 | Radio communication system, radio communication apparatus, and ciphering method | |||
718 | 8509436 | Remote circuit locking switch system | |||
719 | 8509427 | Hybrid mode cryptographic method and system with message authentication | |||
720 | 8509424 | Fast key-changing hardware apparatus for AES block cipher | |||
721 | 8509327 | Receiving apparatus and method and program | |||
722 | 8504836 | Secure and efficient domain key distribution for device registration | |||
723 | 8504835 | Method for secure remote backup | |||
724 | 8504483 | Electronic trading system supporting anonymous negotiation and indications of interest | |||
725 | 8503679 | Short message encryption | |||
726 | 8499318 | Method and apparatus for programming blackout and retune | |||
727 | 8498869 | Deriving geographic distribution of physiological or psychological conditions of human speakers while preserving personal privacy | |||
728 | 8498415 | Method for preserving privacy of a reputation inquiry in a peer-to-peer communication environment | |||
729 | 8495390 | System and method for data obfuscation based on discrete logarithm properties | |||
730 | 8494969 | Cryptographic server with provisions for interoperability between cryptographic systems | |||
731 | 8494966 | Method and apparatus for facilitating the transfer of a software license between computer systems | |||
732 | 8494165 | Secure communications between devices using a trusted server | |||
733 | 8494163 | Encryption in a wireless telecommunications | |||
734 | 8494161 | Content protection message extraction | |||
735 | 8488967 | System and method for OCDMA-based photonic layer security robustness to archival attack | |||
736 | 8488842 | Systems and methods for tracking and authenticating goods | |||
737 | 8488837 | Apparatus and method for generating constructively multi-patterned watermark, and apparatus and method for inserting and detecting the watermark using the same | |||
738 | 8488792 | Wireless communications validation system and method | |||
739 | 8488791 | Securing two-party computation against malicious adversaries | |||
740 | 8488789 | System and method for downloading electronic information to a video lottery terminal | |||
741 | 8488784 | Organic keyed encryption | |||
742 | 8488779 | Method and system for conducting high speed, symmetric stream cipher encryption | |||
743 | 8484485 | Encryption device and encryption system | |||
744 | 8484455 | Online data encryption and decryption | |||
745 | 8479000 | Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit | |||
746 | 8477943 | Automatic detection of wireless network type | |||
747 | 8477942 | Method and apparatus for managing service lists | |||
748 | 8477940 | Symmetric cryptography with user authentication | |||
749 | 8477938 | Method and apparatus for authentication of portable electronic devices | |||
750 | 8477935 | Method and apparatus for calculating a polynomial multiplication, in particular for elliptic curve cryptography | |||
751 | 8477934 | Pairing computation device, pairing computation method and recording medium storing pairing computation program | |||
752 | 8473754 | Hardware-facilitated secure software execution environment | |||
753 | 8472621 | Protection of a prime number generation for an RSA algorithm | |||
754 | 8468343 | System and method for securing wireless transmissions | |||
755 | 8467766 | Methods and systems for managing payment sources in a mobile environment | |||
756 | 8467536 | Binding keys to secure media streams | |||
757 | 8467533 | One-time-pad encryption with key ID and offset for starting point | |||
758 | 8467531 | Mobile terminal with encryption chip and related network locking/unlocking method | |||
759 | 8467526 | Key evolution method and system of block ciphering | |||
760 | 8467525 | Steganographic method and device | |||
761 | 8464074 | Storage media encryption with write acceleration | |||
762 | 8462953 | Communication system and method thereof | |||
763 | 8462952 | Synchronizing management signaling in a network | |||
764 | 8462950 | System and method for extracting, decoding, and utilizing hidden data embedded in audio signals | |||
765 | 8462947 | Managing user access in a communications network | |||
766 | 8462939 | RNS-based cryptographic system and method | |||
767 | 8458741 | Provision of TV ID to non-TV device to enable access to TV services | |||
768 | 8457638 | Mobile communication method | |||
769 | 8457597 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | |||
770 | 8457316 | Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing | |||
771 | 8457314 | Wireless video surveillance system and method for self-configuring network | |||
772 | 8457313 | Protocol expansion of a signaling message | |||
773 | 8457307 | Method and system for generating implicit certificates and applications to identity-based encryption (IBE) | |||
774 | 8457306 | Cryptographic module and IC card | |||
775 | 8457305 | Generating genus 2 curves from invariants | |||
776 | 8457304 | Efficient encoding processes and apparatus | |||
777 | 8457302 | Access-controlled data storage medium | |||
778 | 8452013 | Secure message handling on a mobile device | |||
779 | 8452012 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
780 | 8451810 | Wireless LAN system, a terminal and a recording medium readable by a computer | |||
781 | 8451089 | Radio identification with an additional close-range check | |||
782 | 8443202 | Methods and systems for authenticating users | |||
783 | 8443194 | Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system | |||
784 | 8442527 | Cellular authentication for authentication to a service | |||
785 | 8442234 | System and method for obtaining certificate status of subkeys | |||
786 | 8442233 | Telecommunication systems and encryption of control messages in such systems | |||
787 | 8442229 | Method and apparatus for providing security in a passive optical network | |||
788 | 8442228 | Multi-class switching system and associated method of use | |||
789 | 8442227 | Providing additional information with session requests | |||
790 | 8437474 | Public key encryption for groups | |||
791 | 8437470 | Method and system for block cipher encryption | |||
792 | 8433927 | Cryptographically-enabled privileged mode execution | |||
793 | 8433068 | Method and apparatus for communication based on pseudo-contact information | |||
794 | 8433065 | Encryption and signature schemes using message mappings to reduce the message size | |||
795 | 8429412 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
796 | 8428554 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | |||
797 | 8428262 | Method to connect wireless communication device, wireless communication device, and computer usable medium therefor | |||
798 | 8428261 | System and method for establishing authenticated wireless connection between mobile unit and host | |||
799 | 8428252 | Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables | |||
800 | 8428251 | System and method for stream/block cipher with internal random states | |||
801 | 8428161 | Symbol vector mapping for chase-combining HARQ | |||
802 | 8423784 | Position registering method, program and apparatus for terminal equipment | |||
803 | 8422677 | Storage virtualization apparatus comprising encryption functions | |||
804 | 8422674 | Application-specific secret generation | |||
805 | 8422672 | Authenticated device, authenticating device and authenticating method | |||
806 | 8422669 | Method and apparatus for elliptic curve cryptographic processing | |||
807 | 8422667 | Method and apparatus to facilitate transmission of an encrypted rolling code | |||
808 | 8417967 | Storage device data encryption using a binary large object (BLOB) | |||
809 | 8417965 | Method and circuit for secure definition and integration of cores | |||
810 | 8416695 | Method, device and system for network interception | |||
811 | 8412957 | Encryption and decryption of records in accordance with group access vectors | |||
812 | 8412942 | Method and system for seamless SSID creation, authentication and encryption | |||
813 | 8412784 | Storage model for maintaining structured document fidelity | |||
814 | 8412129 | Techniques to enhance diversity for a wireless system | |||
815 | 8411898 | Digital authentication with analog documents | |||
816 | 8411866 | Distribution of group cryptography material in a mobile IP environment | |||
817 | 8411860 | Wireless communication system, base station, terminal and wireless communication method | |||
818 | 8411859 | Non-deterministic number generation | |||
819 | 8411858 | Dynamic foreign agent-home agent security association allocation for IP mobility systems | |||
820 | 8411852 | Diffusion oriented method and apparatus for stream cryptography | |||
821 | 8411851 | Determining HDCP source KSV support | |||
822 | 8407758 | Network security appliance | |||
823 | 8407484 | Flash memory distribution of digital content | |||
824 | 8406735 | Method for pairing electronic equipment in a wireless network system | |||
825 | 8406459 | Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination | |||
826 | 8406422 | Cryptographic module management apparatus, method, and program | |||
827 | 8401181 | Segment deduplication system with encryption of segments | |||
828 | 8401180 | Non-linear data converter, encoder and decoder | |||
829 | 8397076 | System and method for remote reset of password and encryption key | |||
830 | 8396222 | Key distribution system | |||
831 | 8396211 | System and method for dynamic modification of allowable electronic message properties | |||
832 | 8392711 | Staged establishment of secure strings of symbols | |||
833 | 8391541 | Steganographic encoding and detecting for video signals | |||
834 | 8391490 | Method providing the means for recognizing the origin and/or content of an RF signal | |||
835 | 8391489 | Processor system | |||
836 | 8391488 | Method and apparatus for using navigation signal information for geoencryption to enhance security | |||
837 | 8391485 | Stealth message transmission in a network | |||
838 | 8391477 | Cryptographic device having tamper resistance to power analysis attack | |||
839 | 8391476 | Masking method of defending differential power analysis attack in seed encryption algorithm | |||
840 | 8391475 | Method and apparatus for advanced encryption standard (AES) block cipher | |||
841 | 8391264 | Mobile device handoff while maintaining connectivity with multiple access points | |||
842 | 8386803 | System and method for data obfuscation based on discrete logarithm properties | |||
843 | 8386791 | Secure data processing method based particularly on a cryptographic algorithm | |||
844 | 8386790 | Method of using ECDSA with winternitz one time signature | |||
845 | 8386775 | Tolerant key verification method | |||
846 | 8385550 | System and method for secure wireless multi-hop network formation | |||
847 | 8385549 | Fast authentication between heterogeneous wireless networks | |||
848 | 8385540 | Block cipher algorithm based encryption processing method | |||
849 | 8379866 | Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor | |||
850 | 8379861 | Integrated circuit and a method for secure testing | |||
851 | 8379859 | Method and apparatus for ciphering data in wireless communication system | |||
852 | 8379856 | Hardware based cryptography | |||
853 | 8379855 | Ciphering in a packet-switched telecommunications system | |||
854 | 8379854 | Secure wireless communication | |||
855 | 8379844 | Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting | |||
856 | 8379842 | Cryptographic methods including Montgomery power ladder algorithms | |||
857 | 8378786 | Security provision in standards-compliant RFID systems | |||
858 | 8375207 | Method and apparatus for authenticating a network device | |||
859 | 8374352 | Context-free protocol for enforcing data forwarding in wireless ad hoc networks | |||
860 | 8374350 | Quantum communication system | |||
861 | 8374342 | Scalar multiplier and scalar multiplication program | |||
862 | 8374341 | Hash function using a cue sports game process | |||
863 | 8374339 | Security setting method of wireless communication network, wireless communication network system, client device and recording medium | |||
864 | 8374338 | Transport packet decryption testing in a client device | |||
865 | 8374127 | Digital broadcasting system and method of processing data in digital broadcasting system | |||
866 | 8369515 | Cryptographic method of multilayer diffusion in multidimension | |||
867 | 8364978 | System for and method of auto-registration with cryptographic modules | |||
868 | 8364596 | System and method for providing and/or obtaining electronic documents | |||
869 | 8363839 | Image forming apparatus | |||
870 | 8363836 | Using authentication tokens to authorize a firewall to open a pinhole | |||
871 | 8363827 | Method and apparatus for generic multi-stage nested hash processing | |||
872 | 8363739 | Pilot scheme for a MIMO communication system | |||
873 | 8359465 | Enterprise security system | |||
874 | 8358784 | System and method for a secure synchronization between a wireless communication device and a server | |||
875 | 8358783 | Secure wiegand communications | |||
876 | 8356180 | Multidimensional identification, authentication, authorization and key distribution system for patient monitoring | |||
877 | 8355507 | Optical switching and delay systems and methods for optical encryption and/or optical decryption | |||
878 | 8355501 | Method of collision-free hashing for near-match inputs | |||
879 | 8351607 | Wireless communication device, method for wireless connection, and computer usable medium therefor | |||
880 | 8351606 | Power distribution system secure access communication system and method | |||
881 | 8351605 | Stealth message transmission in a network | |||
882 | 8351602 | Dual-mode wireless sensor network system and key establishing method and event processing method thereof | |||
883 | 8351599 | Cryptographic device for fast session switching | |||
884 | 8350574 | Circuit for detecting malfunction generation attack and integrated circuit using the same | |||
885 | 8347377 | Bridged cryptographic VLAN | |||
886 | 8347370 | Multi-channel multi-factor authentication | |||
887 | 8347102 | Image processing apparatus and method for transmitting encrypted data | |||
888 | 8347075 | Methods to mitigate attacks against fiber-to-the-home network systems | |||
889 | 8345875 | System and method of creating and sending broadcast and multicast data | |||
890 | 8345873 | Methods and systems for N-state signal processing with binary devices | |||
891 | 8345871 | Fast authentication over slow channels | |||
2012 | |||||
892 | 8340293 | Verification system, server, and electronic instrument | |||
893 | 8340292 | Lawful intercept management by an authorization system | |||
894 | 8340281 | Efficient method and apparatus for modular inverses | |||
895 | 8335928 | Information providing system and method and storage medium | |||
896 | 8335316 | Method and apparatus for data privacy in passive optical networks | |||
897 | 8335314 | Adaptive and secure modular connection | |||
898 | 8332635 | Updateable secure kernel extensions | |||
899 | 8331569 | Method for generating downlink frame, and method for searching cell | |||
900 | 8331566 | Media transmission and management | |||
901 | 8331565 | Message transmission method, preferably for an energy distribution network | |||
902 | 8331564 | Method for generating downlink frame, and method for searching cell | |||
903 | 8331563 | System and method for providing secure communication of sensitive information | |||
904 | 8331559 | Diffused data encryption/decryption processing method | |||
905 | 8331556 | Asymmetrical method of encryption or signature verification | |||
906 | 8325922 | Group key security in a multihop relay wireless network | |||
907 | 8325921 | Portable memory and a method for encrypting the same | |||
908 | 8325916 | Encryption scheme for streamed multimedia content protected by rights management system | |||
909 | 8325826 | Methods and apparatus for transmitting signals facilitating antenna control | |||
910 | 8320571 | Method for generating downlink frame, and method for searching cell | |||
911 | 8320570 | Apparatus and method for generating secret key | |||
912 | 8320567 | Efficient data path encapsulation between access point and access switch | |||
913 | 8320565 | Method for generating downlink frame, and method for searching cell | |||
914 | 8320560 | Secure data parser method and system | |||
915 | 8320559 | Identity-based-encryption system | |||
916 | 8320558 | Encryption of synchronization information | |||
917 | 8320557 | Cryptographic system including a mixed radix number generator with chosen statistical artifacts | |||
918 | 8320283 | Method and system for utilizing givens rotation expressions for asymmetric beamforming matrices in explicit feedback information | |||
919 | 8316452 | Computer network storage environment with file tracking | |||
920 | 8316241 | Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method | |||
921 | 8316239 | Decoding information to allow access to computerized systems | |||
922 | 8316233 | Systems and methods for accessing secure and certified electronic messages | |||
923 | 8315390 | Method for admission control of multiple service flows paging in mobile packet domain | |||
924 | 8315389 | Geosecurity methods and devices using geotags derived from noisy location data from multiple sources | |||
925 | 8315387 | System and method for data transmission over arbitrary media using physical encryption | |||
926 | 8315386 | Method and apparatus for performing VoIP-based communication using bio keys | |||
927 | 8312276 | Method for sending and receiving an evaluation of reputation in a social network | |||
928 | 8311221 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
929 | 8311216 | Packet cipher algorithm based encryption processing device | |||
930 | 8311214 | Method for elliptic curve public key cryptographic validation | |||
931 | 8307455 | Decryption-key distribution method and authentication apparatus | |||
932 | 8307208 | Confidential communication method | |||
933 | 8306475 | Method and apparatus for configuring a wireless device through reverse advertising | |||
934 | 8306217 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
935 | 8301909 | System and method for managing external storage devices | |||
936 | 8301891 | Localized network authentication and security using tamper-resistant keys | |||
937 | 8301453 | Watermark synchronization signals conveying payload data | |||
938 | 8300823 | Encryption and compression of data for storage | |||
939 | 8300822 | System for secure packet communication | |||
940 | 8300821 | Digital broadcasting system and method of processing data in digital broadcasting system | |||
941 | 8300811 | Method and device for processing data | |||
942 | 8300810 | Method for securely encrypting or decrypting a message | |||
943 | 8300806 | Duo codes for product authentication | |||
944 | 8300805 | AES core with independent inputs and outputs | |||
945 | 8296580 | System and method for protecting data on a mobile device | |||
946 | 8295485 | Quantum communication system | |||
947 | 8295484 | System and method for securing data from a remote input device | |||
948 | 8295483 | Mobile terminal device, wireless communication unit, wireless communication system, and wireless communication method | |||
949 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
950 | 8291235 | Method and system for controlling access of clients and users to a print server | |||
951 | 8291226 | Method and apparatus for securely booting from an external storage device | |||
952 | 8291218 | Creating and using secure communications channels for virtual universes | |||
953 | 8290371 | OCDM-based all optical multi-level security | |||
954 | 8290161 | Incorporating shared randomness into distributed cryptography | |||
955 | 8290146 | Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus | |||
956 | 8289929 | Method and apparatus for enabling mobility in mobile IP based wireless communication systems | |||
957 | 8286228 | Secure streaming container | |||
958 | 8285994 | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |||
959 | 8285989 | Establishing a secured communication session | |||
960 | 8285986 | Apparatus and method for data packet security in a wireless sensor network | |||
961 | 8284940 | System for supporting over-the-air service and method thereof | |||
962 | 8284937 | Method for synchronization in encrypted communications using shared key | |||
963 | 8284931 | System and method for using a streaming protocol | |||
964 | 8284930 | Simultaneous scalar multiplication method | |||
965 | 8281408 | Secure telemetric link | |||
966 | 8281391 | Contents transmission method and contents transmission system | |||
967 | 8281155 | Content protection using block reordering | |||
968 | 8281135 | Enforcing use of chipset key management services for encrypted storage devices | |||
969 | 8280374 | Policy management in a roaming or handover scenario in an IP network | |||
970 | 8280101 | Identification documents and authentication of such documents | |||
971 | 8280059 | Method, system and device for generating group key | |||
972 | 8280058 | Wireless network having multiple security interfaces | |||
973 | 8280057 | Method and apparatus for providing security in wireless communication networks | |||
974 | 8280056 | System and methods for encryption with authentication integrity | |||
975 | 8280051 | Secure presentation of media streams in response to encrypted content | |||
976 | 8280048 | Method for strengthening the implementation of ECDSA against power analysis | |||
977 | 8280041 | Chinese remainder theorem-based computation method for cryptosystems | |||
978 | 8278870 | Battery pack authentication for a mobile communication device | |||
979 | 8276202 | Cloud-based gateway security scanning | |||
980 | 8276198 | Method and apparatus for local area networks | |||
981 | 8275126 | Apparatus and method for hash cryptography | |||
982 | 8275123 | Integrated data transceiver and sensor for the generation of a symmetrical cryptographic key | |||
983 | 8271786 | Method and system for providing secure communications between a first and a second peer device | |||
984 | 8270611 | System and method for communicating with a key variable loader (KVL) using a standard universal asynchronous receiver transmitter (UART) peripheral | |||
985 | 8270610 | Wireless communication system, wireless communication apparatus, and method of exchanging cryptography key between wireless communication apparatuses | |||
986 | 8270607 | Method of protecting broadcast frame, terminal authenticating broadcast frame, and access point broadcasting broadcast frame | |||
987 | 8270602 | Communication systems, transceivers, and methods for generating data based on channel characteristics | |||
988 | 8270598 | Highly secured method and device for distributing audio-visual streams | |||
989 | 8266421 | Private electronic information exchange | |||
990 | 8265281 | IP service authorization in wireless communications networks | |||
991 | 8265279 | Polarization coding quantum cryptography system | |||
992 | 8265271 | Method and device for managing a transmission of keys | |||
993 | 8265265 | Circuit arrangement and method for RSA key generation | |||
994 | 8261084 | Unauthorized contents detection system | |||
995 | 8261075 | Method for secure remote backup | |||
996 | 8260883 | File sharing between devices | |||
997 | 8259945 | Communication system, information processing apparatus, information processing method, recording medium and program | |||
998 | 8259943 | Method for decrypting serial transmission signal | |||
999 | 8259942 | Arranging data ciphering in a wireless telecommunication system | |||
1000 | 8259934 | Methods and devices for a chained encryption mode | |||
1001 | 8255703 | Atomic hash instruction | |||
1002 | 8255691 | Apparatus for batch verification and method using the same | |||
1003 | 8254892 | Methods and apparatus for anonymous user identification and content personalization in wireless communication | |||
1004 | 8254578 | Process of manufacturing a handheld device, involving keys | |||
1005 | 8254576 | System and method for limiting access to data | |||
1006 | 8254573 | System and method for ciphering key forwarding and RRC packet deciphering in a UMTS monitoring system | |||
1007 | 8254569 | Provable data integrity verifying method, apparatuses and system | |||
1008 | 8253860 | System, method and devices for HDMI transmission using a commonly supported media format | |||
1009 | 8250665 | Digital Broadcasting system and method of processing data in digital broadcasting system | |||
1010 | 8249557 | Mobile phone | |||
1011 | 8249256 | Method for providing fast secure handoff in a wireless mesh network | |||
1012 | 8249244 | System and method for recording and distributing customer interactions | |||
1013 | 8243932 | Methods and systems for distributed processing on consumer devices | |||
1014 | 8243931 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
1015 | 8243928 | Authentication method in communication system | |||
1016 | 8243919 | Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks | |||
1017 | 8243703 | Communication system, management apparatus, control method therefor, storage medium, registration apparatus and base station | |||
1018 | 8233934 | Method and system for providing access via a first network to a service of a second network | |||
1019 | 8233614 | Integer division method secure against covert channel attacks | |||
1020 | 8233552 | Method and system for utilizing givens rotation expressions for asymmetric beamforming matrices in explicit feedback information | |||
1021 | 8230215 | Method for allocating multiple authentication certificates to vehicles in a vehicle-to-vehicle communication network | |||
1022 | 8229120 | Mobile communication method | |||
1023 | 8229118 | Method and apparatus for authentication in wireless communications | |||
1024 | 8229110 | Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol | |||
1025 | 8225391 | System and method for improving restrictiveness on accessing software applications | |||
1026 | 8225110 | Cryptographic protection of usage restrictions in electronic devices | |||
1027 | 8225089 | Electronic transaction systems utilizing a PEAD and a private key | |||
1028 | 8225085 | System and method for distributed SSL processing between co-operating nodes | |||
1029 | 8223968 | Image data verification program recorded on a recording medium, image data verification method, and image data verification system | |||
1030 | 8219822 | System and method for blocking unauthorized network log in using stolen password | |||
1031 | 8219820 | Power analysis countermeasure for the ECMQV key agreement algorithm | |||
1032 | 8219810 | Method and system for facilitating throttling of interpolation-based authentication | |||
1033 | 8219493 | Messaging method and apparatus for use in digital distribution systems | |||
1034 | 8218771 | Information processing apparatus and computer readable medium | |||
1035 | 8218769 | Encrypted communication system, communication status management server, encrypted communication method, and communication status management method | |||
1036 | 8218765 | Information system | |||
1037 | 8218762 | Encrypting apparatus for common key cipher | |||
1038 | 8218759 | System and method for encrypting data | |||
1039 | 8214652 | Biometric identification network security | |||
1040 | 8213939 | Mobile communication method | |||
1041 | 8213902 | Smart card accessible over a personal area network | |||
1042 | 8213901 | Subscriber identities | |||
1043 | 8213617 | Finding nearby users without revealing own location | |||
1044 | 8213614 | Distribution and printing of travel documents | |||
1045 | 8213603 | Encryption processing apparatus | |||
1046 | 8213602 | Method and system for encrypting and decrypting a transport stream using multiple algorithms | |||
1047 | 8209546 | Data-securing method of program tool | |||
1048 | 8208632 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
1049 | 8208627 | Format-preserving cryptographic systems | |||
1050 | 8205257 | Systems and methods for preventing threats originating from a non-process based component hosted by a trusted process | |||
1051 | 8204223 | System providing dynamic quality of service signaling messages in a cable telephony network | |||
1052 | 8204218 | High-efficient encryption and decryption processing method for implementing SMS4 algorithm | |||
1053 | 8204214 | Method and system for generating data transaction ID | |||
1054 | 8200979 | Context-sensitive confidentiality within federated environments | |||
1055 | 8200582 | Mobile device password system | |||
1056 | 8200480 | Deriving geographic distribution of physiological or psychological conditions of human speakers while preserving personal privacy | |||
1057 | 8199915 | Wireless system for activation by wireless | |||
1058 | 8196194 | Method and network for securely delivering streaming data | |||
1059 | 8195957 | Memory randomization for protection against side channel attacks | |||
1060 | 8194607 | Handover control method and apparatus for efficiently buffering packets in wimax network | |||
1061 | 8190898 | Portable electronic entity and communication method | |||
1062 | 8190888 | System and methodology providing multi-tier security for network data with industrial control components | |||
1063 | 8190124 | Authentication in a roaming environment | |||
1064 | 8189789 | Intrusion-tolerant group management for mobile ad-hoc networks | |||
1065 | 8189788 | Hybrid symmetric/asymmetric cryptography with user authentication | |||
1066 | 8189785 | Generating identical numerical sequences utilizing a physical property and secure communication using such sequences | |||
1067 | 8189784 | Communication system, and an encoding device and a decoding device thereof | |||
1068 | 8189768 | Secure messaging | |||
1069 | 8185735 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
1070 | 8184851 | Inserting watermarks into portions of digital signals | |||
1071 | 8184849 | Error processing of steganographic message signals | |||
1072 | 8184812 | Secure computing device with monotonic counter and method therefor | |||
1073 | 8184811 | Mobile telephony content protection | |||
1074 | 8184804 | Hash function using a piling-up process | |||
1075 | 8184612 | Method and apparatus for managing hyper frame number for ciphering/deciphering in mobile communication system | |||
1076 | 8181234 | Authentication system in client/server system and authentication method thereof | |||
1077 | 8181040 | Program execution device | |||
1078 | 8180058 | Encryption of the scheduled uplink message in random access procedure | |||
1079 | 8180053 | Secure communications system with assured synchronization for data exchanged among system ports | |||
1080 | 8180052 | Data communication apparatus | |||
1081 | 8180051 | Methods and apparatus for securing communications of a user operated device | |||
1082 | 8180046 | Method for making secure an electronic entity with encrypted access | |||
1083 | 8176326 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |||
1084 | 8175329 | Authentication of physical and electronic media objects using digital watermarks | |||
1085 | 8175272 | Method for establishing secure associations within a communication network | |||
1086 | 8175271 | Method and system for security protocol partitioning and virtualization | |||
1087 | 8175270 | Authentication loading control and information recapture in a UMTS network | |||
1088 | 8175264 | Encryption and decryption processing method, system and computer-accessible medium for achieving SMS4 cryptographic procedure | |||
1089 | 8171282 | Encryption data integrity check with dual parallel encryption engines | |||
1090 | 8170212 | Device, system, and method of establishing secure wireless communication | |||
1091 | 8170211 | Hub device for a network comprising quantum cryptographic connections and node module for said hub device | |||
1092 | 8166566 | Controlling the downloading and recording of digital data | |||
1093 | 8166528 | Wireless communication system and wireless communication method | |||
1094 | 8165963 | License scheme for use with stackable devices | |||
1095 | 8165343 | Forensic watermarking | |||
1096 | 8165341 | Methods and apparatus to process imagery or audio content | |||
1097 | 8165298 | Quantum cryptography communication apparatus and communication terminal | |||
1098 | 8165296 | Time of day encryption using TDMA timing | |||
1099 | 8165294 | Rollback attack prevention system and method | |||
1100 | 8165288 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
1101 | 8165286 | Combination white box/black box cryptographic processes and apparatus | |||
1102 | 8165285 | Process for generating an elliptic curve, application in a cryptographic process, and cryptographic process using such a curve | |||
1103 | 8160253 | Method, transponder, and system for rapid data transmission | |||
1104 | 8160252 | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor | |||
1105 | 8160243 | System, apparatus, and method for the secure storing of bulk data using one-time pad encryption | |||
1106 | 8156336 | Device authentication | |||
1107 | 8155375 | Video watermarking using temporal analysis | |||
1108 | 8150041 | Secure computation of private values | |||
1109 | 8150037 | Apparatus and method for secure, user-friendly deployment of information | |||
1110 | 8150036 | Encrypted data installation | |||
1111 | 8146139 | System and method of user authentication using handwritten signatures for an MFP | |||
1112 | 8145697 | System and method for efficient basis conversion | |||
1113 | 8144940 | System and method for authentication of data | |||
1114 | 8144873 | User interface technique for selection and activation of wireless service among multiple transport carriers | |||
1115 | 8144871 | Trusted communications between untrusting parties | |||
1116 | 8144865 | Protection of the execution of a DES algorithm | |||
1117 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
1118 | 8144678 | Mobile device handoff while maintaining connectivity with multiple access points | |||
1119 | 8140845 | Scheme for authentication and dynamic key exchange | |||
1120 | 8139764 | Closed galois field cryptographic system | |||
1121 | 8134972 | Communication system and gateway apparatus | |||
1122 | 8132240 | Electric field unit and method for executing a protected function of an electric field unit | |||
1123 | 8132023 | Apparatus and method for performing transparent hash functions | |||
1124 | 8132022 | Apparatus and method for employing configurable hash algorithms | |||
1125 | 8131260 | Mobile communication device, mobile communication device control program, and mobile communication device control method | |||
1126 | 8131007 | Watermarking using multiple watermarks and keys, including keys dependent on the host signal | |||
1127 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
1128 | 8130962 | Content protection method and apparatus | |||
1129 | 8130958 | Transmit power control for wireless security | |||
1130 | 8130957 | System and method for securing data | |||
1131 | 8130953 | Security protection for data communication | |||
1132 | 8130949 | Partially reversible key obfuscation | |||
1133 | 8130947 | Privacy preserving social network analysis | |||
1134 | 8130945 | Encrypted cryptography system | |||
1135 | 8130944 | Digital encrypted time capsule | |||
1136 | 8130894 | Data processing apparatus and method for use with a 4K interleaver in a digital video broadcasting (DVB) standard | |||
1137 | 8127150 | Data security | |||
1138 | 8127136 | Method for security association negotiation with extensible authentication protocol in wireless portable internet system | |||
1139 | 8126147 | Secure terminal data loader system and in-flight entertainment management system | |||
1140 | 8126146 | Method of quantum cryptography using blind photon polarization quibits with multiple stages | |||
1141 | 8122257 | Audio-based, location-related methods | |||
1142 | 8121286 | Hash function with provable resistance to differential attacks | |||
1143 | 8121285 | Data processing for coding | |||
1144 | 8117461 | Method of randomly and dynamically checking configuration integrity of a gaming system | |||
1145 | 8117454 | Fast update message authentication with key derivation in mobile IP systems | |||
1146 | 8116516 | Controlling use of audio or image content | |||
1147 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
1148 | 8116453 | Gaming console-specific user authentication | |||
1149 | 8112118 | System and method for using a temporary electronic serial number for over-the-air activation of a mobile device | |||
1150 | 8111827 | Cryptographic processing apparatus and cryptographic processing method | |||
1151 | 8108678 | Identity-based signcryption system | |||
1152 | 8108675 | External signature device for a PC with wireless communication capacity | |||
1153 | 8107674 | Synchronizing rendering of multimedia content | |||
1154 | 8107629 | Method of providing security for relay station | |||
1155 | 8107623 | Method for verifying a first identity and a second identity of an entity | |||
1156 | 8103883 | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | |||
1157 | 8103053 | Method and apparatus for associating identifiers with content | |||
1158 | 8103003 | Method for setting communication parameters and communication device | |||
1159 | 8102998 | Method for elliptic curve scalar multiplication using parameterized projective coordinates | |||
1160 | 8102997 | Processor for executing an AES-type algorithm | |||
1161 | 8098828 | Key distribution | |||
1162 | 8098826 | QKD system laser autocalibration based on bit-error rate | |||
1163 | 8095984 | Systems and methods of associating security vulnerabilities and assets | |||
1164 | 8095132 | Remote SIM card replacement and activation process | |||
1165 | 8094821 | Key generation in a communication system | |||
1166 | 8094816 | System and method for stream/block cipher with internal random states | |||
1167 | 8094815 | Arithmetic method and apparatus for supporting AES and ARIA encryption/decryption functions | |||
1168 | 8094814 | Method and apparatus for using counter-mode encryption to protect image data in frame buffer of a video compression system | |||
1169 | 8094812 | Updating stored passwords | |||
1170 | 8094810 | Unidirectional proxy re-encryption | |||
1171 | 8091138 | Method and apparatus for controlling the presentation of confidential content | |||
1172 | 8090961 | Security switch | |||
1173 | 8090953 | Information storage system | |||
1174 | 8090142 | Embedding data in and detecting embedded data from video objects | |||
1175 | 8090099 | Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field | |||
1176 | 8090098 | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher | |||
2011 | |||||
1177 | 8086864 | Low power HMAC encryption apparatus | |||
1178 | 8086860 | Method for preventing and detecting hash collisions of data during the data transmission | |||
1179 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
1180 | 8086843 | Performing cryptographic provider failover | |||
1181 | 8086537 | Distribution system of contents embedding license machine ID | |||
1182 | 8082443 | Pedigrees for quantum cryptography | |||
1183 | 8081759 | Apparatus, and an associated method, for facilitating fast transition in a network system | |||
1184 | 8081758 | Communication support server, communication support method, and communication support system | |||
1185 | 8081754 | Key update method and apparatus thereof | |||
1186 | 8079071 | Methods for accessing content based on a session ticket | |||
1187 | 8078873 | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |||
1188 | 8078872 | Method, system and device for determining a mobile IP key, notifying a mobile IP type | |||
1189 | 8077869 | Organic keyed encryption | |||
1190 | 8077863 | Secret sharing apparatus, method, and program | |||
1191 | 8077862 | Sharing a secret using polynomials | |||
1192 | 8077861 | Permutation data transform to enhance security | |||
1193 | 8074068 | Secret sharing device, method, and program | |||
1194 | 8073193 | Methods and systems for steganographic processing | |||
1195 | 8073139 | Method of compressing a cryptographic value | |||
1196 | 8068784 | Communication system and communication device | |||
1197 | 8065715 | Authenticating a user of a wireless data processing device | |||
1198 | 8064603 | Information terminal | |||
1199 | 8064602 | Method and application for authentication of a wireless communication using an expiration marker | |||
1200 | 8064600 | Encoded digital video content protection between transport demultiplexer and decoder | |||
1201 | 8064599 | Secure message transport using message segmentation | |||
1202 | 8064598 | Apparatus, method and computer program product providing enforcement of operator lock | |||
1203 | 8064596 | Stream control device, stream encryption/decryption device, and stream encryption/decryption method | |||
1204 | 8064425 | Method for assigning frequency spectrum bandwidth of an OFDM and OFDMA coexistence system | |||
1205 | 8060941 | Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain | |||
1206 | 8060939 | Method and system for securing wireless local area networks | |||
1207 | 8060755 | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine | |||
1208 | 8060745 | Security for wireless transmission | |||
1209 | 8060033 | Techniques to enhance diversity for a wireless system | |||
1210 | 8055901 | Optical signature to enable image correction | |||
1211 | 8055012 | Hiding and detecting messages in media signals | |||
1212 | 8054972 | Encryption processor of memory card and method for writing and reading data using the same | |||
1213 | 8054967 | Computer system and computer program executing encryption or decryption | |||
1214 | 8054900 | Symmetrical data signal processing | |||
1215 | 8051472 | Method and apparatus for personalization and identity management | |||
1216 | 8051287 | Imparting real-time priority-based network communications in an encrypted communication session | |||
1217 | 8051151 | System and method for communicating with a network node behind a subscriber station with an IP convergence sub-layer | |||
1218 | 8050566 | System and methods for quantum key distribution over WDM links | |||
1219 | 8050452 | Quantization-based data embedding in mapped data | |||
1220 | 8050410 | Distributed encryption methods and systems | |||
1221 | 8050404 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |||
1222 | 8050403 | Method and apparatus for generating a public key in a manner that counters power analysis attacks | |||
1223 | 8046788 | Systems, methods, and products for presenting content | |||
1224 | 8046304 | Franking method and mail transport system with central postage accounting | |||
1225 | 8045756 | Routing networks for use with content linking systems | |||
1226 | 8045710 | Broadcasting method and broadcast receiver | |||
1227 | 8045709 | Digital broadcasting conditional access terminal and method | |||
1228 | 8045706 | System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources | |||
1229 | 8045705 | Simultaneous scalar multiplication method | |||
1230 | 8042192 | Information processing apparatus, information processing method, recording medium, and program | |||
1231 | 8042147 | Network security appliance | |||
1232 | 8041961 | Storage system | |||
1233 | 8041643 | System and method of providing media content | |||
1234 | 8041074 | Content indexing and searching using content identifiers and associated metadata | |||
1235 | 8041038 | System and method for decompressing and making publically available received media content | |||
1236 | 8041035 | Automatic configuration of devices upon introduction into a networked environment | |||
1237 | 8041030 | Techniques for evaluating live payment terminals in a payment system | |||
1238 | 8037321 | Method and apparatus for the secure storage of audio signals | |||
1239 | 8037315 | Integrated circuit card | |||
1240 | 8037304 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
1241 | 8037296 | Apparatus and method for counter-based communications in wireless sensor networks and other networks | |||
1242 | 8036386 | System and method for providing electronic ticket, and electronic ticket vending apparatus and mobile telephone therefor | |||
1243 | 8036385 | Apparatus and method for applying ciphering in a universal mobile telecommunications system | |||
1244 | 8036384 | Enhanced shared secret provisioning protocol | |||
1245 | 8036383 | Method and apparatus for secure communication between cryptographic systems using real time clock | |||
1246 | 8036379 | Cryptographic processing | |||
1247 | 8036202 | Physical layer transceiver with integrated time synchronization | |||
1248 | 8032762 | Process, circuits, devices, and systems for encryption and decryption and other purposes, and process making | |||
1249 | 8032753 | Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same | |||
1250 | 8032744 | Method and apparatus for self-authenticating digital records | |||
1251 | 8031874 | Station and method of collecting information corresponding to security in a wireless network | |||
1252 | 8031873 | Free-space quantum communication device with atomic filters | |||
1253 | 8031872 | Pre-expiration purging of authentication key contexts | |||
1254 | 8031867 | Method of verifying the integrity of an encryption key obtained by combining key parts | |||
1255 | 8031866 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
1256 | 8031787 | Channel estimation for OFDM systems | |||
1257 | 8031784 | Preamble detection with unknown channel | |||
1258 | 8027520 | Methods and arrangements employing digital content items | |||
1259 | 8027510 | Encoding and decoding media signals | |||
1260 | 8027508 | Interactive gaming objects | |||
1261 | 8027473 | System and method for improved data protection in PONs | |||
1262 | 8027472 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
1263 | 8027467 | Method for elliptic curve point multiplication | |||
1264 | 8027394 | Reducing data stream jitter during deinterleaving | |||
1265 | 8027304 | Secure session keys context | |||
1266 | 8024575 | System and method for creation and use of strong passwords | |||
1267 | 8024569 | Method for secure remote backup | |||
1268 | 8023696 | Printing media and methods employing digital watermarking | |||
1269 | 8023695 | Methods for analyzing electronic media including video and audio | |||
1270 | 8023692 | Apparatus and methods to process video or audio | |||
1271 | 8023647 | Password self encryption method and system and encryption by keys generated from personal secret information | |||
1272 | 8023645 | Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation | |||
1273 | 8020006 | Pipeline for high-throughput encrypt functions | |||
1274 | 8019344 | Apparatus, and associated methods, for facilitating secure, make-before-break hand-off in a radio communication system | |||
1275 | 8019116 | Content processing methods using reversible watermarking | |||
1276 | 8019083 | Method, apparatus and system for key derivation | |||
1277 | 8019082 | Methods and systems for automated configuration of 802.1x clients | |||
1278 | 8019081 | System and method for processing encoded messages | |||
1279 | 8014563 | Methods and systems for steganographic processing | |||
1280 | 8014529 | In-band device enrollment without access point support | |||
1281 | 8014527 | Apparatus and method for reusing pair of public and private keys | |||
1282 | 8014523 | Key management | |||
1283 | 8011001 | Method for managing security in a mobile communication system using proxy mobile internet protocol and system thereof | |||
1284 | 8010805 | Secure porting of information from one device to another | |||
1285 | 8010802 | Cryptographic device having session memory bus | |||
1286 | 8010801 | Multi-data rate security architecture for network security | |||
1287 | 8010798 | Handheld computer system configured to authenticate a user and power-up in response to a single action by the user | |||
1288 | 8010781 | Method and system to accelerate cryptographic functions for secure E-commerce applications | |||
1289 | 8009830 | Secure data parser method and system | |||
1290 | 8009828 | Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system | |||
1291 | 8006291 | Multi-channel multi-factor authentication | |||
1292 | 8006281 | Network accessible trusted code | |||
1293 | 8006102 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
1294 | 8005224 | Token-based dynamic key distribution method for roaming environments | |||
1295 | 8005223 | System and method for exchanging encryption keys between a mobile device and a peripheral device | |||
1296 | 8005222 | Radio communication system, radio communication device, radio communication method, and computer program | |||
1297 | 8005218 | Authorization and authentication of user access to a distributed network communication system with roaming feature | |||
1298 | 8005217 | Method and apparatus for configuring nodes in a wireless network | |||
1299 | 8005211 | Shuffle-decrypting legitimacy certifying apparatus and method, shuffle-decrypting verifying apparatus and method, program, and recording medium | |||
1300 | 8005210 | Modulus scaling for elliptic-curve cryptography | |||
1301 | 8005209 | Invariance based concurrent error detection for the advanced encryption standard | |||
1302 | 8001608 | Secure streaming container | |||
1303 | 8001381 | Method and system for mutual authentication of nodes in a wireless communication network | |||
1304 | 8001376 | Fixed client identification system for positive identification of client to server | |||
1305 | 8000518 | Methods, objects and apparatus employing machine readable data | |||
1306 | 8000467 | Data parallelized encryption and integrity checking method and device | |||
1307 | 7996861 | Flexible interface for secure input of pin code | |||
1308 | 7996673 | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |||
1309 | 7996376 | Method and apparatus for managing session data across multiple applications | |||
1310 | 7996325 | Microbilling using a trust management system | |||
1311 | 7995760 | Method for ensuring data transmission security, communication system and communication device | |||
1312 | 7995759 | System and method for parallel compression of a single data stream | |||
1313 | 7995757 | Closed galois field combination | |||
1314 | 7995756 | Mobile device playback and control of media content from a personal media host device | |||
1315 | 7995749 | Cryptographic system configured for extending a repetition period of a random sequence | |||
1316 | 7992007 | Dynamic pin pad for credit/debit/ other electronic transactions | |||
1317 | 7991184 | Apparatus to process images and video | |||
1318 | 7991182 | Methods for steganographic encoding media | |||
1319 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
1320 | 7991160 | Method and system for securing wireless communications | |||
1321 | 7991153 | Glyph encryption system and related methods | |||
1322 | 7991152 | Speeding up Galois Counter Mode (GCM) computations | |||
1323 | 7987502 | Secure streaming container | |||
1324 | 7987367 | Method and apparatus for key agreement between devices using polynomial ring | |||
1325 | 7987094 | Audio encoding to convey auxiliary information, and decoding of same | |||
1326 | 7986807 | Signal embedding and detection using circular structures in a transform domain of a media signal | |||
1327 | 7986779 | Efficient elliptic-curve cryptography based on primality of the order of the ECC-group | |||
1328 | 7986778 | Cryptographic method and apparatus | |||
1329 | 7986773 | Interactive voice response system security | |||
1330 | 7983440 | Selection of I-frames for client-side watermarking | |||
1331 | 7983420 | Imaging job authorization | |||
1332 | 7983419 | Wireless device to network server encryption | |||
1333 | 7983415 | Method for performing iterative scalar multiplication which is protected against address bit attack | |||
1334 | 7983303 | Mega-frame initialization packet generation and synchronous re-generation with bit rate adaptation for single frequency networks with multiple modulation schemes | |||
1335 | 7983223 | Apparatus and method for reporting channel quality indicator in wireless communication system | |||
1336 | 7979722 | Flash memory distribution of digital content | |||
1337 | 7979718 | Operator recognition device, operator recognition method and operator recognition program | |||
1338 | 7978876 | Hiding codes in input data | |||
1339 | 7978854 | Asymmetric key generation | |||
1340 | 7978850 | Manufacturing embedded unique keys using a built in random number generator | |||
1341 | 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | |||
1342 | 7975146 | Method and apparatus for recognition of biometric data following recording from at least two directions | |||
1343 | 7974926 | Content use system, information terminal, and settlement system | |||
1344 | 7974439 | Embedding hidden auxiliary information in media | |||
1345 | 7974437 | Identifying steganographic data in an image | |||
1346 | 7974415 | System and method for updating keys used for public key cryptography | |||
1347 | 7974414 | Methods and apparatus for automatically grouping user-specific information in a mobile station | |||
1348 | 7974412 | Communication system, transmission device, reception device, and communication scheme | |||
1349 | 7974408 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
1350 | 7971785 | Method for authenticating micro-processor cards, corresponding micro-processor card, card reader terminal and programs | |||
1351 | 7971066 | Transaction device with noise signal encryption | |||
1352 | 7970167 | Deriving identifying data from video and audio | |||
1353 | 7970166 | Steganographic encoding methods and apparatus | |||
1354 | 7970140 | Method and system for encrypted communications using multi-valued modulation | |||
1355 | 7970130 | Low-latency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode | |||
1356 | 7970128 | Systems and methods for efficient generation of hash values of varying bit widths | |||
1357 | 7969953 | Mobile device handoff while maintaining connectivity with multiple access points | |||
1358 | 7966007 | User-assisted programmable appliance control | |||
1359 | 7965842 | System and method for detecting unauthorized wireless access points | |||
1360 | 7962753 | Method and a circuit for SHA operation with power saved | |||
1361 | 7962740 | Method and apparatus for synchronizing audio and video in encrypted videoconferences | |||
1362 | 7961883 | System and method for securing a personalized indicium assigned to a mobile communications device | |||
1363 | 7961881 | Apparatus and methods for including codes in audio signals | |||
1364 | 7961876 | Method to produce new multivariate public key cryptosystems | |||
1365 | 7961875 | Means and method for ciphering and transmitting data in integrated networks | |||
1366 | 7961874 | XZ-elliptic curve cryptography with secret key embedding | |||
1367 | 7961873 | Password protocols using XZ-elliptic curve cryptography | |||
1368 | 7961871 | Encryption process, encryption device, and computer-readable medium storing encryption program | |||
1369 | 7961624 | System and method for providing bandwidth signaling across cryptographic boundaries in a network | |||
1370 | 7958355 | Keytote component | |||
1371 | 7957977 | Media program identification method and apparatus based on audio watermarking | |||
1372 | 7957536 | Method for key administration for cryptography modules | |||
1373 | 7957534 | System and method for security association between communication devices within a wireless home network | |||
1374 | 7957533 | Method of establishing authentication keys and secure wireless communication | |||
1375 | 7957532 | Data protection for a mobile device | |||
1376 | 7957525 | Encryption and signature schemes using message mappings to reduce the message size | |||
1377 | 7954136 | Self-management network access using localized access management | |||
1378 | 7953221 | Method for processing multiple operations | |||
1379 | 7949881 | Mobil terminal device, personal identification number verification program, and method of verifying personal identification number | |||
1380 | 7949147 | Watermarking compressed data | |||
1381 | 7949129 | Method and apparatus for facilitating efficient authenticated encryption | |||
1382 | 7949128 | Method and device for the encryption and decryption of data | |||
1383 | 7945779 | Securing a communications exchange between computers | |||
1384 | 7941663 | Authentication of 6LoWPAN nodes using EAP-GPSK | |||
1385 | 7940933 | Secure telemetric link | |||
1386 | 7940932 | Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor | |||
1387 | 7940927 | Information security device and elliptic curve operating device | |||
1388 | 7937760 | System security agent authentication and alert distribution | |||
1389 | 7936880 | Method, apparatus and system for key derivation | |||
1390 | 7936879 | Derivation method for cached keys in wireless communication system | |||
1391 | 7936878 | Secure wireless instrumentation network system | |||
1392 | 7936877 | Data transfer system, data transfer device, data recording device and data transfer method | |||
1393 | 7936871 | Altering the size of windows in public key cryptographic computations | |||
1394 | 7936869 | Verifying digital signature based on shared knowledge | |||
1395 | 7934089 | System and method for processing data and communicating encrypted data | |||
1396 | 7933412 | In-vehicle communication system and method therefor, in-vehicle communication terminal, communication method therefor, program recording medium, and program | |||
1397 | 7933404 | Primitives for fast secure hash functions and stream ciphers | |||
1398 | 7933344 | OFDMA based on cognitive radio | |||
1399 | 7932851 | Ranging signal structure with hidden acquisition code | |||
1400 | 7930729 | Performing presence service in a wireless communication system | |||
1401 | 7930711 | Apparatus and method for addressing control in a network for distributed data | |||
1402 | 7930537 | Architecture for encrypted application installation | |||
1403 | 7929700 | Continuous variable quantum encryption key distribution system | |||
1404 | 7929691 | Use of bilinear mappings in cryptographic applications | |||
1405 | 7929690 | Two non-orthogonal states quantum cryptography method and apparatus with inter-and inter-qubit interference for eavesdropper detection | |||
1406 | 7929689 | Call signs | |||
1407 | 7926100 | Method for preventing unauthorized connection in network system | |||
1408 | 7926094 | Secure legacy media peripheral association with authentication in a media exchange network | |||
1409 | 7925592 | System and method of using a proxy server to manage lazy content distribution in a social network | |||
1410 | 7925027 | Secure address proxying using multi-key cryptographically generated addresses | |||
1411 | 7925010 | Message deciphering method, system and article | |||
1412 | 7925009 | Hybrid data encryption | |||
1413 | 7921300 | Apparatus and method for secure hash algorithm | |||
1414 | 7920713 | Recorded video broadcast, streaming, download, and disk distribution with watermarking instructions | |||
1415 | 7917946 | Method and network for securely delivering streaming data | |||
1416 | 7917944 | Secure authentication advertisement protocol | |||
1417 | 7917769 | Transaction authentication card | |||
1418 | 7917757 | Method and system for authentication of electronic communications | |||
1419 | 7916868 | Quadratic residue based password authenticated key exchange method and system | |||
1420 | 7916354 | Hiding and detecting auxiliary data in media materials and signals | |||
1421 | 7913291 | Means and method for control of personal data | |||
1422 | 7913096 | Method and system for the cipher key controlled exploitation of data resources, related network and computer program products | |||
1423 | 7913074 | Securely launching encrypted operating systems | |||
1424 | 7912886 | Configurable exponent FIFO | |||
1425 | 7912222 | Connection authentication in wireless communication network system | |||
1426 | 7912221 | Communication apparatus and method thereof | |||
1427 | 7912215 | Data transmission apparatus, data receiving apparatus and method executed thereof | |||
1428 | 7912212 | Symmetric cryptosystem using cascaded chaotic maps | |||
1429 | 7908663 | Abstractions and automation for enhanced sharing and collaboration | |||
1430 | 7908485 | Printing system | |||
1431 | 7908472 | Secure sockets layer cut through architecture | |||
1432 | 7908411 | Data transfer device and mobile telephone | |||
1433 | 7908217 | Method and system for optimizing throughput of mailing machines | |||
1434 | 7907733 | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station | |||
1435 | 7907732 | Radio frequency identification tag lock and key | |||
1436 | 7907730 | Method and system for mobile communications | |||
1437 | 7907729 | Rollback attack prevention system and method | |||
1438 | 7904949 | Apparatus, systems and methods to provide authentication services to a legacy application | |||
1439 | 7904727 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
1440 | 7904719 | Extending the range of computational fields of integers | |||
1441 | 7903817 | System and method for wireless network profile provisioning | |||
1442 | 7903816 | Storage system executing encryption and decryption processing | |||
1443 | 7903810 | Single instruction for data scrambling | |||
1444 | 7900263 | Content recording/reproducing apparatus and content recording/reproducing method | |||
1445 | 7900253 | Systems and methods for authorization credential emulation | |||
1446 | 7900062 | Unauthorized contents detection system | |||
1447 | 7899475 | Enhanced short message service (SMS) | |||
1448 | 7899189 | Apparatus, system, and method for transparent end-to-end security of storage data in a client-server environment | |||
1449 | 7895638 | Protocol for entering, disabling and/or erasing scrambled data access rights and the corresponding access control module | |||
1450 | 7895432 | Method and apparatus for using a third party authentication server | |||
1451 | 7894628 | Digital watermark embedding apparatus and digital watermark detection apparatus | |||
1452 | 7890766 | Method and apparatus for a proximity warning system | |||
1453 | 7890759 | Connection assistance apparatus and gateway apparatus | |||
1454 | 7890752 | Methods, systems, and computer program products for associating an originator of a network packet with the network packet using biometric information | |||
1455 | 7890358 | Accessibility insurance coverage management | |||
1456 | 7889869 | Methods and apparatus to integrate mobile communications device management with web browsing | |||
1457 | 7889868 | Quantum key distribution system | |||
1458 | 7886364 | Encrypted key cache | |||
1459 | 7886362 | Media authentication via physical attributes of a medium | |||
1460 | 7886354 | Method and apparatus for local area networks | |||
1461 | 7886162 | Cryptographic secure program overlays | |||
1462 | 7886154 | Method and apparatus for a proximity warning system | |||
1463 | 7886143 | Multi-data rate cryptography architecture for network security | |||
1464 | 7885410 | Wireless security system and method | |||
1465 | 7885409 | Software radio system and method | |||
1466 | 7882377 | Electronic device with flexible processing system | |||
1467 | 7882355 | Encryption/decryption methods and devices utilizing the same | |||
1468 | 7882350 | Encryption and decryption method for conditional access content | |||
1469 | 7882346 | Method and apparatus for providing authentication, authorization and accounting to roaming nodes | |||
1470 | 7881492 | Electronic watermark embedding apparatus and method and electronic watermark examining apparatus and method | |||
1471 | 7881478 | Method for controlling access to an encrypted programme | |||
1472 | 7881475 | Systems and methods for negotiating security parameters for protecting management frames in wireless networks | |||
1473 | 7881474 | System and method for secure wireless multi-hop network formation | |||
1474 | 7881471 | Systems and methods for recording an encrypted interaction | |||
1475 | 7881468 | Secret authentication key setup in mobile IPv6 | |||
1476 | 7881466 | Method and system for obfuscating a cryptographic function | |||
1477 | 7877790 | System and method of using personal data | |||
1478 | 7877519 | Selecting one of a plurality of adapters to use to transmit a packet | |||
1479 | 7876900 | Hybrid scrambled transmission coding | |||
1480 | 7876896 | RTP payload format | |||
1481 | 7873837 | Data security for electronic data flash card | |||
1482 | 7873836 | Information processing apparatus and method, recording medium, program, and wireless communication system | |||
1483 | 7873164 | Method and apparatus for configuring network devices | |||
1484 | 7873163 | Method and apparatus for message integrity in a CDMA communication system | |||
1485 | 7873161 | Small hardware implementation of the subbyte function of rijndael | |||
1486 | 7870393 | Steganographic method and device | |||
1487 | 7869601 | Authentication method of ad hoc network and wireless communication terminal thereof | |||
1488 | 7869600 | Optical transmitter and transmitting method for transmitting cryptogram | |||
1489 | 7869599 | Quantum cryptography key distributing system and synchronizing method used in the same | |||
1490 | 7869597 | Method and system for secure packet communication | |||
1491 | 7869592 | Calculation apparatus and encrypt and decrypt processing apparatus | |||
1492 | 7869590 | Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets | |||
1493 | 7865604 | System and program for access control | |||
1494 | 7865174 | Establishing a collaborative domain among communication terminals responsive to authentication | |||
1495 | 7864958 | Quantum key distribution method and apparatus | |||
1496 | 7864952 | Data processing systems with format-preserving encryption and decryption engines | |||
1497 | 7864951 | Scalar multiplication method with inherent countermeasures | |||
2010 | |||||
1498 | 7861312 | MP3 player with digital rights management | |||
1499 | 7860487 | Method of securely unlocking a mobile terminal | |||
1500 | 7860247 | Identity based encryption | |||
1501 | 7860244 | Secure computation of private values | |||
1502 | 7860243 | Public key encryption for groups | |||
1503 | 7856655 | System and method for improved network security | |||
1504 | 7856404 | Playlist burning in rights-management context | |||
1505 | 7856101 | Method for elliptic curve scalar multiplication | |||
1506 | 7856100 | Privacy-preserving data aggregation using homomorphic encryption | |||
1507 | 7856099 | Secure data transmission between two modules | |||
1508 | 7853988 | State saver/restorer for a geospatial decision management system | |||
1509 | 7853805 | Anti-tamper system | |||
1510 | 7853801 | System and method for providing authenticated encryption in GPON network | |||
1511 | 7853797 | Information processing method and information processing apparatus | |||
1512 | 7853013 | Cryptographic method and system for encrypting input data | |||
1513 | 7853012 | Authentication system executing an elliptic curve digital signature cryptographic process | |||
1514 | 7853011 | Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission | |||
1515 | 7849514 | Transparent encryption and access control for mass-storage devices | |||
1516 | 7849324 | Method and apparatus for communicating authorization data | |||
1517 | 7849318 | Method for session security | |||
1518 | 7849316 | Methods and apparatus for secure document printing | |||
1519 | 7848523 | Systems and methods for added authentication in distributed network delivered half-duplex communications | |||
1520 | 7848522 | Method for authenticating a user in a terminal, an authentication system, a terminal, and an authorization device | |||
1521 | 7844998 | Apparatus and method for autonomic email access control | |||
1522 | 7844831 | Secure memory device for smart cards | |||
1523 | 7844826 | Method and apparatus for communicating authorization data | |||
1524 | 7844808 | Computer compliance enforcement | |||
1525 | 7844073 | Watermark-based goods authentication | |||
1526 | 7844057 | Roaming using reassociation | |||
1527 | 7844056 | Method and apparatus for encapsulating long messages over limited fibre channel extended link service | |||
1528 | 7841942 | Gaming system license management | |||
1529 | 7840810 | Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key | |||
1530 | 7840008 | Method and apparatus for decrypting a communication | |||
1531 | 7840000 | High performance programmable cryptography system | |||
1532 | 7839999 | Encryption device, encryption processing method and program, and information protection system employing the encryption device | |||
1533 | 7839998 | Transcoding CableCARD | |||
1534 | 7839538 | Method and system for applying an image-dependent dynamic watermark to postal indicia | |||
1535 | 7839263 | System and method of training in a transmit/receive system | |||
1536 | 7836310 | Security system that uses indirect password-based encryption | |||
1537 | 7836042 | Adaptive routing of resource requests for multiple back-end systems | |||
1538 | 7835723 | Mobile banking | |||
1539 | 7835526 | Method and system for restricting mobility using unique encrypted chargers | |||
1540 | 7835525 | Cryptographic method using dual encryption keys and a wireless local area network (LAN) system therefor | |||
1541 | 7835523 | Cryptographic engine abstraction layer for a software defined radio | |||
1542 | 7831830 | Methods and apparatus for secure document printing | |||
1543 | 7831238 | Method and system for multimedia tags | |||
1544 | 7831062 | Arrangement of objects in images or graphics to convey a machine-readable signal | |||
1545 | 7831049 | Enhanced encryption method and system for ultra secure applications | |||
1546 | 7831039 | AES encryption circuitry with CCM | |||
1547 | 7830296 | Anechoic structures for absorbing electromagnetic interference in a communications module | |||
1548 | 7827400 | Security certificate management | |||
1549 | 7827113 | Method and system for providing a content subscription service | |||
1550 | 7826749 | Method and system for quantum key distribution over multi-user WDM network with wavelength routing | |||
1551 | 7826618 | Synchronization of encryption in a wireless communication system | |||
1552 | 7826617 | Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment | |||
1553 | 7826611 | System and method for exchanging a transformed message with enhanced privacy | |||
1554 | 7826610 | Method to secure an electronic assembly against attacks by error introduction | |||
1555 | 7823193 | Method and system for ordering, loading and using admission tickets | |||
1556 | 7822990 | Online data encryption and decryption | |||
1557 | 7822989 | Controlling access to an area | |||
1558 | 7822406 | Simplified dual mode wireless device authentication apparatus and method | |||
1559 | 7822342 | Secure quantum optical communications system and method | |||
1560 | 7822204 | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system | |||
1561 | 7819746 | System for awarding a bonus to a gaming device on a wide area network | |||
1562 | 7818803 | Security module having a secondary agent in coordination with a host agent | |||
1563 | 7818781 | Behavior blocking access control | |||
1564 | 7818260 | System and method of managing digital rights | |||
1565 | 7818259 | Prepaid licensing system and method | |||
1566 | 7817986 | Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices | |||
1567 | 7817739 | Method for reducing feedback information overhead in precoded MIMO-OFDM systems | |||
1568 | 7817734 | System and method for improving signal to quantization noise ratio of an OFDMA modulator | |||
1569 | 7813579 | Microscope system | |||
1570 | 7813508 | Communication system, wireless communication apparatus, and communication method | |||
1571 | 7813507 | Method and system for creating random cryptographic keys in hardware | |||
1572 | 7813413 | Antenna array communication using spreading codes | |||
1573 | 7809941 | Certifier hierarchy for public key infrastructure in an ad-hoc network | |||
1574 | 7809132 | Implementations of AES algorithm for reducing hardware with improved efficiency | |||
1575 | 7808366 | Refrigerator and method of controlling the same | |||
1576 | 7805614 | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) | |||
1577 | 7805611 | Method for secure communication from chip card and system for performing the same | |||
1578 | 7805478 | Montgomery modular multiplier | |||
1579 | 7804961 | Method and apparatus for fast crytographic key generation | |||
1580 | 7802101 | System and method of retrieving a watermark within a signal | |||
1581 | 7802100 | Watermark system | |||
1582 | 7801492 | System and method for managing resources of portable module resources | |||
1583 | 7801326 | Digital watermark and film mark | |||
1584 | 7801305 | Secure device for the broadcasting, recording and viewing on demand of audiovisual works in a format of the MPEG-2 TS type | |||
1585 | 7801302 | Cryptographic method and apparatus | |||
1586 | 7801297 | Communication device and communication control method | |||
1587 | 7801227 | Methods and apparatus related to composite beacon and wideband synchronization signaling | |||
1588 | 7797740 | System and method for managing captured content | |||
1589 | 7797547 | Information processing apparatus and method of controlling authentication process | |||
1590 | 7797537 | Mobile terminal, data communication method, and computer program | |||
1591 | 7796763 | Method and system for disaster recovery of data from a storage device | |||
1592 | 7796752 | Cipher implementation | |||
1593 | 7796750 | Method for making secure an electronic entity with encrypted access | |||
1594 | 7793353 | Identification card manufacturing security | |||
1595 | 7792325 | Methods and devices employing content identifiers | |||
1596 | 7792299 | Broadcasting receiving apparatus and broadcasting receiving method | |||
1597 | 7792298 | Method of using a mobile device to authenticate a printed token and output an image associated with the token | |||
1598 | 7792297 | System and process for limiting distribution of information on a communication network based on geographic location | |||
1599 | 7792288 | Communication system using quantum cryptography and comprising switching stations | |||
1600 | 7792286 | Signature generation device and signature verification device | |||
1601 | 7788715 | Authentication for transmission control protocol | |||
1602 | 7788700 | Enterprise security system | |||
1603 | 7788500 | Biometric authentication device and terminal | |||
1604 | 7788498 | Triple-tap password entry | |||
1605 | 7788182 | Method for loaning digital works | |||
1606 | 7788168 | Method, system, and apparatus for dynamically creating electronic contracts | |||
1607 | 7787627 | Methods and apparatus for providing a key management system for wireless communication networks | |||
1608 | 7787626 | System and method for obtaining certificate status of subkeys | |||
1609 | 7787624 | Method for inserting synchronization markers into a video stream, compatible with a block cipher | |||
1610 | 7787619 | Method and apparatus for secure key management using multi-threshold secret sharing | |||
1611 | 7783900 | Querying encrypted data in a relational database system | |||
1612 | 7783897 | Programmable logic device | |||
1613 | 7783895 | Method and apparatus for encrypting data to be secured and inputting/outputting the same | |||
1614 | 7783702 | Using a mobile phone to control a personal computer | |||
1615 | 7783578 | System for providing cardless payment | |||
1616 | 7783041 | System, method and computer program product for authenticating a data agreement between network entities | |||
1617 | 7783040 | Encryption in a secure computerized gaming system | |||
1618 | 7783036 | Apparatus for encrypting/decrypting real-time input stream | |||
1619 | 7779476 | Active defense against wireless intruders | |||
1620 | 7779272 | Hardware cryptographic engine and encryption method | |||
1621 | 7779258 | Method for controlling security function execution with a flexible, extendable, and non-forgable block | |||
1622 | 7779250 | Method for applying certificate | |||
1623 | 7779071 | Enterprise wireless local area network switching system | |||
1624 | 7778932 | Device-based access privilege to an account | |||
1625 | 7778437 | Media and methods employing steganographic marking | |||
1626 | 7778422 | Security associations for devices | |||
1627 | 7778415 | Substitution cipher text-encoding and un-encoding software and method | |||
1628 | 7778414 | Encryption method based on factorization | |||
1629 | 7774609 | Process for digital signing of a message | |||
1630 | 7774602 | Secure modem gateway concentrator | |||
1631 | 7774283 | Method and system for using a camera cell phone in transactions | |||
1632 | 7773972 | Functionality and policies based on wireless device dynamic associations | |||
1633 | 7773754 | Key management system and method | |||
1634 | 7773746 | Encryption system, encryption device, decryption device, program, and integrated circuit | |||
1635 | 7773678 | Method and apparatus for reducing the dynamic range of a radio signal | |||
1636 | 7770019 | Imaging method and device using biometric information for operator authentication | |||
1637 | 7769202 | Quantization-based data embedding in mapped data | |||
1638 | 7769175 | System and method for initiation of a security update | |||
1639 | 7769173 | Methods and systems for executing bit-commitment protocols that are based on entangled quantum states and a third party | |||
1640 | 7769172 | Methods and systems for secure distribution of subscription-based game software | |||
1641 | 7769166 | Dual mode AES implementation to support single and multiple AES operations | |||
1642 | 7769165 | Semi-public white-box cipher | |||
1643 | 7769164 | Printing apparatus | |||
1644 | 7765599 | Multimedia transmitter, multimedia receiver, multimedia transmission system, and method for securely transmitting multimedia content over a wireless link | |||
1645 | 7764794 | Location-based wireless messaging for wireless devices | |||
1646 | 7764793 | Method to leverage a secure device to grant trust and identity to a second device | |||
1647 | 7764792 | System and method for encoding data transmitted on a bus | |||
1648 | 7764786 | Protection of a DES algorithm | |||
1649 | 7764785 | Method for communicating securely over an insecure communication channel | |||
1650 | 7761717 | Memory device with data security in a processor | |||
1651 | 7761712 | Steganographic method and device | |||
1652 | 7760905 | Wireless mobile phone with content processing | |||
1653 | 7760882 | Systems and methods for mutual authentication of network nodes | |||
1654 | 7760881 | Data processing apparatus and data reception processing apparatus | |||
1655 | 7760874 | Method and system for implementing FI function in KASUMI algorithm for accelerating cryptography in GSM/GPRS/EDGE compliant handsets | |||
1656 | 7758422 | Hard drive authentication | |||
1657 | 7757096 | Mobile unit with fingerprint sensor and attachment structure | |||
1658 | 7757093 | Printing system | |||
1659 | 7757091 | Method and apparatus for the creation of a self-authenticating document | |||
1660 | 7757082 | Efficient revocation of receivers | |||
1661 | 7756793 | Content data supply system, content data supply apparatus and method, content data reproduction apparatus and method, and program | |||
1662 | 7756290 | Detecting embedded signals in media content using coincidence metrics | |||
1663 | 7756273 | System and method for bit-reversing and scrambling payload bytes in an asynchronous transfer mode cell | |||
1664 | 7752660 | Transmission error resistant reader station | |||
1665 | 7752449 | System and method for generating a non-repudiatable record of a data stream | |||
1666 | 7751596 | Methods and arrangements employing digital content items | |||
1667 | 7751588 | Error processing of steganographic message signals | |||
1668 | 7751568 | Method for securely creating an endorsement certificate utilizing signing key pairs | |||
1669 | 7751567 | Local authentication of mobile subscribers outside their home systems | |||
1670 | 7751566 | Apparatus using a time division multiple access bus for providing multiple levels of security in a communications system | |||
1671 | 7751565 | Secure encryption system, device and method | |||
1672 | 7748617 | Electronic identification system | |||
1673 | 7748045 | Method and system for providing cryptographic document retention with off-line access | |||
1674 | 7748036 | Methods for categorizing input data | |||
1675 | 7747532 | Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation | |||
1676 | 7747038 | Method and apparatus for associating identifiers with content | |||
1677 | 7747037 | Routing networks for use with content linking systems | |||
1678 | 7747017 | Method and apparatus for end-to-end clear transport protocol | |||
1679 | 7743405 | Method of authentication via a secure wireless communication system | |||
1680 | 7743261 | Unauthorized contents detection system | |||
1681 | 7743249 | Method of securing a document in a system and controlling access to the document and a seal for use in the method | |||
1682 | 7742602 | Cipher key setting system, access point, wireless LAN terminal, and cipher key setting method | |||
1683 | 7742601 | Encryption method using synchronized continuously calculated pseudo-random key | |||
1684 | 7742595 | Cryptographic method protected against covert channel type attacks | |||
1685 | 7742594 | Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol | |||
1686 | 7739501 | Cryptographic key construct | |||
1687 | 7738661 | Broadcasting receiving apparatus and broadcasting receiving method | |||
1688 | 7738660 | Cryptographic key split binding process and apparatus | |||
1689 | 7735117 | Context-sensitive confidentiality within federated environments | |||
1690 | 7734380 | Push communications architecture for intelligent electronic devices | |||
1691 | 7734280 | Method and apparatus for authentication of mobile devices | |||
1692 | 7734051 | Key distribution | |||
1693 | 7734050 | Digital certificate pool | |||
1694 | 7734049 | Data transmission method, user equipment and GPRS/EDGE radio access network | |||
1695 | 7734048 | Cryptographic system using chaotic dynamics | |||
1696 | 7734046 | Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit | |||
1697 | 7734043 | Encryption key obfuscation and storage | |||
1698 | 7734042 | System and method for using a streaming protocol | |||
1699 | 7729494 | Squared Weil and Tate pairing techniques for use with elliptic curves | |||
1700 | 7725932 | Restricting communication service | |||
1701 | 7725821 | Managing electronic documents utilizing a digital seal | |||
1702 | 7724920 | Digital authentication with analog documents | |||
1703 | 7724919 | Methods and systems for steganographic processing | |||
1704 | 7724903 | Framing of transmit encoded data and linear feedback shifting | |||
1705 | 7724898 | Cryptography using finite fields of odd characteristic on binary hardware | |||
1706 | 7724897 | Program converter, encrypting device, and encrypting method | |||
1707 | 7724896 | Method for transmitting messages between an emitter and at least on receiver and system for implementing said method | |||
1708 | 7721113 | Data alteration detecting method, data alteration detecting device and data alteration detecting program | |||
1709 | 7721105 | Repurposing digitally signed information | |||
1710 | 7721088 | Terminal device, server device, and content distribution system | |||
1711 | 7720767 | Method and system to support dynamic rights and resources sharing | |||
1712 | 7720255 | Methods and apparatus to process video and audio media | |||
1713 | 7720250 | Method and apparatus for watermarking stream data | |||
1714 | 7720228 | Modulator autocalibration methods for quantum key distribution | |||
1715 | 7720227 | Encryption method for SIP message and encrypted SIP communication system | |||
1716 | 7720226 | Private and secure optical communication system using an optical tapped delay line | |||
1717 | 7720225 | Table splitting for cryptographic processes | |||
1718 | 7720221 | Privacy-enhanced e-passport authentication protocol | |||
1719 | 7720220 | Cipher message assist instruction | |||
1720 | 7720219 | Apparatus and method for implementing a hash algorithm word buffer | |||
1721 | 7716723 | System and method for network user authentication | |||
1722 | 7716491 | Generation and management of customer pin's | |||
1723 | 7716480 | Property-based data authentication mechanism | |||
1724 | 7715563 | Rapid acquisition of state vectors in an encrypted data communication system | |||
1725 | 7715562 | System and method for access authentication in a mobile wireless network | |||
1726 | 7715553 | Encrypting a plaintext message with authentication | |||
1727 | 7715552 | Data authentication with a secure environment | |||
1728 | 7712128 | Wireless access system, method, signal, and computer program product | |||
1729 | 7711961 | Electronic apparatus and authenticating method | |||
1730 | 7711666 | Reduction of memory usage for prime number storage by using a table of differences between a closed form numerical function and prime numbers which bounds a prime numeral between two index values | |||
1731 | 7711143 | Methods for marking images | |||
1732 | 7711119 | Method and apparatus for transition of encryption key during an ongoing media communication session | |||
1733 | 7711118 | Security system | |||
1734 | 7711117 | Management of a communication network and the migration of mobile agents | |||
1735 | 7711113 | ID-based signature, encryption system and encryption method | |||
1736 | 7710978 | System and method for traversing a firewall with multimedia communication | |||
1737 | 7707402 | Quantum cipher communication system | |||
1738 | 7706539 | Method of guaranteeing users' anonymity and wireless local area network (LAN) system therefor | |||
1739 | 7706538 | System, method and data storage device for encrypting data | |||
1740 | 7706536 | Phase locking in a multi-channel quantum communication system | |||
1741 | 7706535 | Systems and methods for implementing routing protocols and algorithms for quantum cryptographic key transport | |||
1742 | 7706528 | Prime calculating apparatus, key issuing system, and prime calculation method | |||
1743 | 7702898 | Method for authenticating and verifying SMS communications | |||
1744 | 7702221 | Unified control and memory for a combined DVD/HDD system | |||
1745 | 7702106 | Quantum secret splitting based on non-orthogonal multi-particle states | |||
1746 | 7702105 | Accelerating elliptic curve point multiplication through batched inversions | |||
1747 | 7702104 | System and method for securing genomic information | |||
1748 | 7702101 | Secure presentation of media streams in response to encrypted digital content | |||
1749 | 7702099 | Multipoint synchronous diffused encryption/decryption method | |||
1750 | 7702098 | Elliptic curve point octupling for weighted projective coordinates | |||
1751 | 7702097 | Method and apparatus for authentication of data using different hash functions and feedback | |||
1752 | 7698566 | Location-based voice-print authentication method and system | |||
1753 | 7698560 | Information storage system | |||
1754 | 7697719 | Methods for analyzing electronic media including video and audio | |||
1755 | 7697694 | Synchronizing the exchange of cryptography information between kernel drivers | |||
1756 | 7697689 | Secure transmission system for a digital trunked radio system | |||
1757 | 7697688 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
1758 | 7697687 | Streaming implementation of AlphaEta physical layer encryption | |||
1759 | 7697594 | Method and apparatus for regenerative based interference cancellation within a communication system | |||
1760 | 7694145 | Indicating status for digital signatures | |||
1761 | 7693284 | Method and apparatus for encryption of over-the-air communications in a wireless communication system | |||
1762 | 7693283 | Methods and apparatus for providing user anonymity in online transactions | |||
1763 | 7693282 | Gaming machine, gaming information authentication and acquisition device, and gaming information acquisition device | |||
1764 | 7693279 | Security method and apparatus using biometric data | |||
1765 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
1766 | 7689831 | Method and system for securing interface access via visual array paths in combination with hidden operators | |||
1767 | 7689825 | Systems and methods for device registration using optical transmission | |||
1768 | 7688972 | Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets | |||
1769 | 7688900 | Interleaver decorrelation in data transmitting and receiving devices | |||
1770 | 7685433 | Recognition of live object in motion | |||
1771 | 7685432 | Authentication method based on biological characteristic information | |||
1772 | 7685263 | Method and system for configuring a device with a wireless mobile configurator | |||
1773 | 7685034 | System and method for finance-based competition | |||
1774 | 7684701 | Photonic quantum information system using unpolarised light | |||
1775 | 7684564 | Method for solving Frobenius equations for elliptic-curve cryptography | |||
1776 | 7684563 | Apparatus and method for implementing a unified hash algorithm pipeline | |||
1777 | 7684502 | Communication network system, and transmission/reception apparatus, method and integrated circuit for use therein | |||
1778 | 7684469 | Code division multiple access transmission antenna weighting | |||
1779 | 7681244 | Packet transmitter apparatus | |||
1780 | 7681228 | Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions | |||
1781 | 7681042 | System and method for dis-identifying sensitive information and associated records | |||
1782 | 7681034 | Method and apparatus for securing electronic data | |||
1783 | 7680281 | Method and apparatus for intercepting events in a communication system | |||
1784 | 7680278 | Domino scheme for wireless cryptographic communication and communication method incorporating same | |||
1785 | 7680270 | System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication | |||
1786 | 7680268 | Elliptic curve point octupling using single instruction multiple data processing | |||
1787 | 7676218 | System and method for detection of a rouge wireless access point in a wireless communication network | |||
1788 | 7676059 | Video steganography or encoding | |||
1789 | 7675981 | OFDM signal demodulator circuit and OFDM signal demodulating method | |||
1790 | 7673328 | Network authentication system using individual services providers and an authentication server | |||
1791 | 7673151 | Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor | |||
1792 | 7673147 | Real-time mitigation of data access insider intrusions | |||
1793 | 7673146 | Methods and systems of remote authentication for computer networks | |||
1794 | 7672477 | Detecting hidden auxiliary code signals in media | |||
1795 | 7672455 | Method and apparatus for data encryption | |||
1796 | 7672452 | Secure scan | |||
1797 | 7669233 | Methods and systems for secure transmission of identification information over public networks | |||
1798 | 7668336 | Extracting embedded information from a document | |||
1799 | 7668246 | Apparatus, method and computer program for correcting common phase error of OFDM signal symbols | |||
1800 | 7668121 | Purging of authentication key contexts by base stations on handoff | |||
1801 | 7667429 | Battery pack authentication for a mobile device | |||
1802 | 7665118 | Server, computer memory, and method to support security policy maintenance and distribution | |||
1803 | 7664957 | Digital signatures including identity-based aggregate signatures | |||
1804 | 7664708 | System for controlling the distribution and use of digital works using digital tickets | |||
1805 | 7664706 | Method for granting customers access to a product | |||
1806 | 7664269 | Encrypting message for secure transmission | |||
1807 | 7664267 | Bit based arithmetic coding using variable size key cipher | |||
1808 | 7664266 | Compression of fiber-based certificate of authenticity data | |||
1809 | 7664265 | Controlling communications between stations | |||
1810 | 7664262 | Playback apparatus and playback control method | |||
1811 | 7660994 | Access control | |||
1812 | 7660988 | Electronic notary | |||
1813 | 7660420 | Wireless device synchronization | |||
1814 | 7660419 | System and method for security association between communication devices within a wireless personal and local area network | |||
1815 | 7660418 | Cryptographic system and method for geolocking and securing digital information | |||
1816 | 7660417 | Enhanced security design for cryptography in mobile communication systems | |||
1817 | 7657925 | Method and system for managing security policies for databases in a distributed system | |||
1818 | 7657761 | Multiple trust modes for handling data | |||
1819 | 7657737 | Method for mapping an encrypted https network packet to a specific url name and other data without decryption outside of a secure web server | |||
1820 | 7657058 | Watermark orientation signals conveying payload data | |||
1821 | 7657031 | Method and device for printing sensitive data | |||
1822 | 7653937 | Video game terminal and security activation arrangement | |||
1823 | 7653211 | Digital watermark embedding apparatus and digital watermark detection apparatus | |||
1824 | 7653200 | Accessing cellular networks from non-native local networks | |||
1825 | 7650647 | Hardware-oriented configuration and locking of devices | |||
1826 | 7650313 | Microbilling using a trust management system | |||
1827 | 7650156 | Method and apparatus for signal processing in a satellite positioning system | |||
1828 | 7650010 | Connected video and audio | |||
1829 | 7650009 | Controlling use of audio or image content | |||
1830 | 7649997 | User transparent registration process for secure communication | |||
1831 | 7649996 | Cryptographic communication apparatus | |||
1832 | 7649994 | System and method for decoding CDMA quality channel | |||
1833 | 7649990 | Apparatus to implement dual hash algorithm | |||
1834 | 7647498 | Device authentication | |||
1835 | 7647367 | Apparatus and method for calculating a multiplication | |||
1836 | 7647024 | Method and system for improving client server transmission over fading channel with wireless location and authentication technology via electromagnetic radiation | |||
1837 | 7646872 | Systems and methods to securely generate shared keys | |||
1838 | 7644437 | Method and apparatus for local area networks | |||
1839 | 7644268 | Automated electronic messaging encryption system | |||
1840 | 7643817 | Method and apparatus for rapid secure session establishment on half-duplex AD-hoc group voice cellular network channels | |||
1841 | 7643649 | Integrating digital watermarks in multimedia content | |||
1842 | 7643638 | System for generating pseudorandom sequences | |||
1843 | 7643495 | PCI express switch with encryption and queues for performance enhancement | |||
2009 | |||||
1844 | 7640432 | Electronic cash controlled by non-homomorphic signatures | |||
1845 | 7639947 | System and methods for quantum key distribution over WDM links | |||
1846 | 7639837 | Identification documents and authentication of such documents | |||
1847 | 7639820 | Image forming apparatus certificate sheet making method and certificate sheet processing method | |||
1848 | 7639817 | Method for scrambling packet data using variable slot length and apparatus thereof | |||
1849 | 7639816 | Mobile communication terminal device and server device | |||
1850 | 7639808 | Elliptic curve cryptosystem apparatus, elliptic curve cryptosystem method, elliptic curve cryptosystem program and computer readable recording medium storing the elliptic curve cryptosystem program | |||
1851 | 7639806 | Fingerprinting digital devices using electromagnetic characteristics of their communications | |||
1852 | 7639802 | Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP | |||
1853 | 7639797 | Apparatus and method of performing AES Rijndael algorithm | |||
1854 | 7636939 | Endpoint identification and security | |||
1855 | 7636936 | Administration of protection of data accessible by a mobile device | |||
1856 | 7634657 | Reducing the probability of undetected collisions in hash-based data block processing | |||
1857 | 7634447 | Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium | |||
1858 | 7634252 | Mobility management in wireless networks | |||
1859 | 7634091 | System and method of hiding cryptographic private keys | |||
1860 | 7634087 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
1861 | 7634085 | Identity-based-encryption system with partial attribute matching | |||
1862 | 7634084 | Prime calculation device, method, and key issuing system | |||
1863 | 7631195 | System and method for providing security to a portable storage device | |||
1864 | 7631192 | Network apparatus for accessing services over a network | |||
1865 | 7631186 | Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing | |||
1866 | 7631048 | Method and system for personal policy-controlled automated response to information transfer requests | |||
1867 | 7630496 | Arrangement and method for adapting mobile field device | |||
1868 | 7630495 | Method for protecting electronic device, and electronic device | |||
1869 | 7628322 | Methods, system and mobile device capable of enabling credit card personalization using a wireless network | |||
1870 | 7627768 | Method and device for automatic validation of computer program using cryptography functions | |||
1871 | 7627749 | System and method for processing data and communicating encrypted data | |||
1872 | 7627126 | Systems and methods for implementing path length control for quantum cryptographic systems | |||
1873 | 7627124 | Wireless communication authentication process and system | |||
1874 | 7627123 | Wireless network having multiple security interfaces | |||
1875 | 7627113 | Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets | |||
1876 | 7624431 | 802.1X authentication technique for shared media | |||
1877 | 7624272 | Platform information for digital signatures | |||
1878 | 7624270 | Inter subnet roaming system and method | |||
1879 | 7623666 | Automatic setting of security in communication network system | |||
1880 | 7623664 | System providing dynamic quality of service signaling messages in a cable telephony network | |||
1881 | 7623656 | Stream cipher encryption and message authentication | |||
1882 | 7620386 | Establishing a collaborative domain among communication terminals responsive to authentication | |||
1883 | 7620200 | Authentication of identification documents | |||
1884 | 7620183 | Method for establishing a connection between a terminal and an operating mobile radio network, mobile radio network and terminal used in such a method | |||
1885 | 7620182 | QKD with classical bit encryption | |||
1886 | 7618317 | Method for developing gaming programs compatible with a computerized gaming operating system and apparatus | |||
1887 | 7617527 | Architecture for virtual private networks | |||
1888 | 7617522 | Authentication and authorization across autonomous network systems | |||
1889 | 7616765 | Method and system for generating shared information | |||
1890 | 7613932 | Method and system for controlling access to software features in an electronic device | |||
1891 | 7613919 | Single-use password authentication | |||
1892 | 7613448 | Web access providing system | |||
1893 | 7613297 | Method and apparatus for data encryption | |||
1894 | 7611407 | Wireless wagering system | |||
1895 | 7609944 | Copy protection of optical discs | |||
1896 | 7609834 | Personal authenticating multi-function peripheral | |||
1897 | 7607012 | Method for securing a communication | |||
1898 | 7606771 | Dynamic number authentication for credit/debit cards | |||
1899 | 7606368 | Method and apparatus for data encryption | |||
1900 | 7606367 | Quantum cryptography with fewer random numbers | |||
1901 | 7606363 | System and method for context switching of a cryptographic engine | |||
1902 | 7603703 | Method and system for controlled distribution of application code and content data within a computer network | |||
1903 | 7603697 | Method and system for securely delivering authentication-related data | |||
1904 | 7602918 | Method for distributing security keys during hand-off in a wireless communication system | |||
1905 | 7602907 | Elliptic curve point multiplication | |||
1906 | 7602905 | Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making | |||
1907 | 7600255 | Preventing network denial of service attacks using an accumulated proof-of-work approach | |||
1908 | 7600118 | Method and apparatus for augmenting authentication in a cryptographic system | |||
1909 | 7599515 | Wireless communication method and apparatus for generating, watermarking and securely transmitting content | |||
1910 | 7599491 | Method for strengthening the implementation of ECDSA against power analysis | |||
1911 | 7599489 | Accelerating cryptographic hash computations | |||
1912 | 7596703 | Hidden data backup and retrieval for a secure device | |||
1913 | 7596700 | Method and system for establishing trusting environment for sharing data between mutually mistrusting entities | |||
1914 | 7596689 | Secure and reliable document delivery using routing lists | |||
1915 | 7596270 | Method of shuffling text in an Asian document image | |||
1916 | 7596225 | Method for refreshing a pairwise master key | |||
1917 | 7596224 | Method and system for secure call alert | |||
1918 | 7594261 | Cryptographic applications of the Cartier pairing | |||
1919 | 7594121 | Methods and apparatus for determining an identity of a user | |||
1920 | 7594116 | Mediated key exchange between source and target of communication | |||
1921 | 7594109 | Digital content distribution system | |||
1922 | 7594108 | Operator root certificates | |||
1923 | 7593898 | Method and system for payment transactions and shipment tracking over the internet | |||
1924 | 7593545 | Determining whether two or more creative works correspond | |||
1925 | 7593530 | Secure legacy media peripheral association with authentication in a media exchange network | |||
1926 | 7593529 | Scramble methods and apparatus for packetized digital video signal in conditional access system | |||
1927 | 7593476 | Data scrambler generation of pseudo-random bit sequence for semi-stationary Q-mode signal | |||
1928 | 7591006 | Security for external system management | |||
1929 | 7590866 | Super-distribution of protected digital content | |||
1930 | 7590858 | Authentication apparatus, user authentication method, user authentication card and storage medium | |||
1931 | 7590844 | Decryption system and method for network analyzers and security programs | |||
1932 | 7590843 | Key exchange for a network architecture | |||
1933 | 7590741 | Communication system for adding data transmission origin information to data | |||
1934 | 7590602 | Electronic currency, electronic wallet therefor and electronic payment systems employing them | |||
1935 | 7590599 | System and method of automatically maintaining and recycling software components | |||
1936 | 7590479 | Remote login of a personal computer | |||
1937 | 7590246 | Authentication between a cellular phone and an access point of a short-range network | |||
1938 | 7590245 | Anonymous communicating over interconnected networks | |||
1939 | 7590241 | Receiver and receiving method | |||
1940 | 7590236 | Identity-based-encryption system | |||
1941 | 7590235 | Reduction calculations in elliptic curve cryptography | |||
1942 | 7590183 | Generating signals for transmission of information | |||
1943 | 7587752 | Methods and apparatus for providing a control channel in a data network | |||
1944 | 7587606 | Emergency web keys | |||
1945 | 7587367 | Method and system to provide feedback data within a distributed e-commerce system | |||
1946 | 7587049 | Active stabilization of a one-way QKD system | |||
1947 | 7584365 | Storage system | |||
1948 | 7584149 | System and method for securing data through a PDA portal | |||
1949 | 7583814 | Protecting images with an image watermark | |||
1950 | 7583800 | Encryption apparatus and method in a wireless communications system | |||
1951 | 7581242 | Authenticating products | |||
1952 | 7580528 | Secure terminal data loader apparatus and method for a mobile platform | |||
1953 | 7580527 | Communication monitoring in a mobile radio network | |||
1954 | 7580526 | Methods and apparatus for protecting signals transmitted between a source and destination device over multiple signals lines | |||
1955 | 7580524 | Method and apparatus for synchronizing the emitter and the receiver in an autocompensating quantum cryptography system | |||
1956 | 7578001 | Information recording and reproducing apparatus, information recording and reproducing method and information recording and reproducing program | |||
1957 | 7577986 | Security objects controlling access to resources | |||
1958 | 7577621 | Cryptographic server with provisions for interoperability between cryptographic systems | |||
1959 | 7577256 | Counter initialization, particularly for radio frames | |||
1960 | 7577255 | Proxy method and system for secure wireless administration of managed entities | |||
1961 | 7574731 | Self-managed network access using localized access management | |||
1962 | 7574720 | Data transmitting method, data transmitting system, data receiving method and receiving terminal | |||
1963 | 7574609 | Method, device and computer program for detecting point correspondences in sets of points | |||
1964 | 7574608 | Security screening of electronic devices by device-reported data | |||
1965 | 7574407 | System and method for selecting, ordering and accessing copyrighted information from physical documents | |||
1966 | 7574198 | Security setting system | |||
1967 | 7571490 | Method and apparatus for protecting data from unauthorized modification | |||
1968 | 7571326 | Relative latency dynamics for identity authentication | |||
1969 | 7571324 | Method and device for anonymous signature with a shared private key | |||
1970 | 7571315 | Method and apparatus to assign trust to a key | |||
1971 | 7570781 | Embedded data in gaming objects for authentication and association of behavior information | |||
1972 | 7570764 | Sequence number calculation and authentication in a communications system | |||
1973 | 7570761 | Method and system for preventing unauthorized recording of media content in the iTunes.TM. environment | |||
1974 | 7570760 | Apparatus and method for implementing a block cipher algorithm | |||
1975 | 7570759 | System and method for secure encryption | |||
1976 | 7570420 | Systems and methods for transmitting quantum and classical signals over an optical network | |||
1977 | 7568237 | Access control list with convolution-weakened authorization | |||
1978 | 7568235 | Controlling data access using security label components | |||
1979 | 7567686 | Hiding and detecting messages in media signals | |||
1980 | 7567672 | Cryptographic communication system | |||
1981 | 7567668 | Calculating unit and method for performing an arithmetic operation with encrypted operands | |||
1982 | 7565698 | Information-processing device | |||
1983 | 7565697 | Systems and methods for preventing unauthorized use of digital content | |||
1984 | 7565676 | Portable device for receiving media content | |||
1985 | 7565546 | System, method and apparatus for secure digital content transmission | |||
1986 | 7565537 | Secure key exchange with mutual authentication | |||
1987 | 7565532 | Secure file system server architecture and methods | |||
1988 | 7565529 | Secure authentication and network management system for wireless LAN applications | |||
1989 | 7565325 | Multi-site software license balancing | |||
1990 | 7565322 | Systems and methods for serverless software licensing | |||
1991 | 7564992 | Content identification through deriving identifiers from video, images and audio | |||
1992 | 7564975 | Method of ciphering data and/or voice call to be transferred in mobile communication system and method of deactivating the ciphering | |||
1993 | 7564973 | Digital watermark embedding device and digital watermark embedding method | |||
1994 | 7564972 | Arithmetic device and encryption/decryption device | |||
1995 | 7564971 | Apparatus and method for performing Montgomery type modular multiplication | |||
1996 | 7562397 | Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof | |||
1997 | 7562348 | Method and system for obtaining device services on a self-service financial transaction terminal | |||
1998 | 7562227 | Method of authenticating a user on multiple devices using a procedural memory based password | |||
1999 | 7562220 | System and method for programming an isolated computing environment | |||
2000 | 7561694 | Session mobility for wireless devices | |||
2001 | 7561692 | Method of authenticating mobile terminal | |||
2002 | 7561691 | System and method for providing secured access to mobile devices | |||
2003 | 7558968 | Information processing apparatus and method | |||
2004 | 7558956 | Communications device and communications program | |||
2005 | 7558388 | Derivation method for cached keys in wireless communication system | |||
2006 | 7558386 | Countermeasure method in an electronic component using a secret key cryptographic algorithm | |||
2007 | 7555779 | Copyright protection system, recording device, and reproduction device | |||
2008 | 7555650 | Techniques for reducing the computational cost of embedding information in digital representations | |||
2009 | 7555206 | Apparatus for retrieving data from detachable optical driver | |||
2010 | 7555139 | Secure documents with hidden signals, and related methods and systems | |||
2011 | 7555128 | Systems and methods for the application of cryptosystems to the data link layer of packetized wireless networks | |||
2012 | 7555127 | Quantum cryptography key distribution system and method | |||
2013 | 7555126 | Game apparatus managing system, game apparatus, controlling method, computer program and recording medium | |||
2014 | 7555122 | Method for elliptic curve point multiplication | |||
2015 | 7555121 | Methods and apparatus for implementing a cryptography engine | |||
2016 | 7552862 | User-controlled profile sharing | |||
2017 | 7552481 | Method of assessing an organization's network identity capability | |||
2018 | 7552467 | Security systems for protecting an asset | |||
2019 | 7552341 | Licensing the use of software on a particular CPU | |||
2020 | 7552332 | Java based electronic signature capture method, device and system | |||
2021 | 7552330 | Mutual authentication system between user and system | |||
2022 | 7552093 | Resolving license dependencies for aggregations of legally-protectable content | |||
2023 | 7552071 | Point-of-care inventory management system and method | |||
2024 | 7551915 | Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent | |||
2025 | 7551913 | Methods and apparatus for anonymous user identification and content personalization in wireless communication | |||
2026 | 7551739 | System and method for container monitoring, real time authentication, anomaly detection, and alerts | |||
2027 | 7549171 | Method and apparatus for validation of application data on a storage system | |||
2028 | 7549160 | Method and system for authenticated access to internet protocol (IP) multicast traffic | |||
2029 | 7549063 | Methods and systems of protecting digital content | |||
2030 | 7549061 | Unauthorized contents detection system | |||
2031 | 7549050 | Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system | |||
2032 | 7549046 | Method and system for vehicle authorization of a service technician | |||
2033 | 7548643 | Methods, objects and apparatus employing machine readable data | |||
2034 | 7548620 | Token provisioning | |||
2035 | 7548266 | Methods and apparatus for providing portable photographic images | |||
2036 | 7546957 | Travel kiosk | |||
2037 | 7546629 | System and methodology for security policy arbitration | |||
2038 | 7546466 | Decoding of watermarked information signals | |||
2039 | 7546459 | GSM-like and UMTS-like authentication in a CDMA2000 network environment | |||
2040 | 7546458 | Method for organizing virtual networks while optimizing security | |||
2041 | 7546373 | Secure dynamic credential distribution over a network | |||
2042 | 7545952 | Image or video display devices | |||
2043 | 7545951 | Data transmission by watermark or derived identifier proxy | |||
2044 | 7543337 | System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document | |||
2045 | 7543333 | Enhanced computer intrusion detection methods and systems | |||
2046 | 7543160 | System and method for generating a secure state indicator on a display | |||
2047 | 7543158 | Hybrid cryptographic accelerator and method of operation thereof | |||
2048 | 7543156 | Transaction authentication card | |||
2049 | 7543144 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
2050 | 7543141 | Method and apparatus for user authentication using infrared communication of a mobile terminal | |||
2051 | 7542587 | Content processing methods using reversible watermarking | |||
2052 | 7542569 | Security of data connections | |||
2053 | 7541920 | Alarm/event encryption in an industrial environment | |||
2054 | 7540014 | Automated policy change alert in a distributed enterprise | |||
2055 | 7539875 | Secure repository with layers of tamper resistance and system and method for providing same | |||
2056 | 7539874 | Secure password entry | |||
2057 | 7539867 | On-disk file format for a serverless distributed file system | |||
2058 | 7539866 | Method of cryptographing wireless data and apparatus using the method | |||
2059 | 7539860 | Single use user IDS | |||
2060 | 7539648 | Secure user certification for electronic commerce employing value metering system | |||
2061 | 7539647 | Using power state to enforce software metering state | |||
2062 | 7539514 | System and method for using a temporary electronic serial number for over-the-air activation of a mobile device | |||
2063 | 7539463 | Techniques to enhance diversity for a wireless system | |||
2064 | 7539309 | Method and system for GSM authentication during WLAN roaming | |||
2065 | 7539308 | Quantum steganography | |||
2066 | 7539304 | Integrated circuit having self test capability using message digest and method for testing integrated circuit having message digest generation circuitry | |||
2067 | 7539237 | Fast locking mechanism for channelized ultrawide-band communications | |||
2068 | 7536558 | Flash memory distribution of digital content | |||
2069 | 7536548 | System and methodology providing multi-tier-security for network data exchange with industrial control components | |||
2070 | 7536547 | Secure data transmission in a network system of image processing devices | |||
2071 | 7536360 | Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party | |||
2072 | 7536355 | Content security system for screening applications | |||
2073 | 7536026 | Image processing apparatus and method | |||
2074 | 7536016 | Encrypted content data structure package and generation thereof | |||
2075 | 7536015 | Setting method for wireless communication device, computer peripheral equipment, and information processor | |||
2076 | 7533408 | Portable computing system, apparatus and method | |||
2077 | 7533276 | Program execution device | |||
2078 | 7533273 | Method and system for controlling an encryption/decryption engine using descriptors | |||
2079 | 7533271 | Method and apparatus for remote control and monitoring of a multimedia system | |||
2080 | 7533257 | Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access | |||
2081 | 7533064 | E-mail invoked electronic commerce | |||
2082 | 7533027 | Methods and apparatus for uniquely identifying a large number of film prints | |||
2083 | 7532876 | Communication system and associated method of performing mutual authentication | |||
2084 | 7532862 | Method and apparatus for configuring a wireless device through reverse advertising | |||
2085 | 7532741 | Data hiding in media | |||
2086 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
2087 | 7530117 | Method and apparatus for preventing unauthorized use of software | |||
2088 | 7530116 | Controlling the downloading and recording of digital data | |||
2089 | 7530110 | System and method for fuzzy multi-level security | |||
2090 | 7530093 | Securing applications and operating systems | |||
2091 | 7529944 | Support for multiple login method | |||
2092 | 7529941 | System and method of retrieving a watermark within a signal | |||
2093 | 7529939 | Method of and apparatus for transferring data | |||
2094 | 7529938 | Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information | |||
2095 | 7529933 | TLS tunneling | |||
2096 | 7529926 | Public key certification providing apparatus | |||
2097 | 7529806 | Partitioning of MP3 content file for emulating streaming | |||
2098 | 7529712 | Content distribution system and method | |||
2099 | 7529647 | Computing distortion of media signals using embedded data with repetitive structure and log-polar mapping | |||
2100 | 7529385 | Marking articles using a covert digitally watermarked image | |||
2101 | 7529372 | Method for setting an encryption key for logical network separation | |||
2102 | 7529371 | Replaceable sequenced one-time pads for detection of cloned service client | |||
2103 | 7526808 | Method and system for actively defending a wireless LAN against attacks | |||
2104 | 7526798 | System and method for credential delegation using identity assertion | |||
2105 | 7526657 | Information processing apparatus, information processing method, and program storage medium | |||
2106 | 7526652 | Secure PIN management | |||
2107 | 7526642 | Controlling delivery of certificates in a mobile communication system | |||
2108 | 7526450 | Interface for presenting downloadable digital data content format options | |||
2109 | 7526092 | Rekey operation with multiplexing capability | |||
2110 | 7526091 | Method for transmitting and receiving control information for encryption in a mobile communication system supporting multimedia broadcast/multicast service | |||
2111 | 7523316 | Method and system for managing the display of sensitive content in non-trusted environments | |||
2112 | 7523303 | System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product | |||
2113 | 7523302 | Electronic recipe management | |||
2114 | 7523072 | System for controlling the distribution and use of digital works | |||
2115 | 7522728 | Wireless methods and devices employing steganography | |||
2116 | 7522727 | Method and apparatus for providing authentication in a communication system | |||
2117 | 7519999 | Secure negotiation and encryption module | |||
2118 | 7519989 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions | |||
2119 | 7519836 | Method and apparatus for the secure storage of audio signals | |||
2120 | 7519835 | Encrypted table indexes and searching encrypted tables | |||
2121 | 7519827 | Provisioning and use of security tokens to enable automated test equipment | |||
2122 | 7519824 | Time stamping method employing multiple receipts linked by a nonce | |||
2123 | 7519821 | Account authority digital signature (AADS) system | |||
2124 | 7519815 | Challenge-based authentication without requiring knowledge of secret authentication data | |||
2125 | 7519730 | Copying chat data from a chat session already active | |||
2126 | 7519558 | Biometrically enabled private secure information repository | |||
2127 | 7519183 | Communication system, wireless communication apparatus, and communication method | |||
2128 | 7519178 | Method, system and apparatus for ensuring a uniform distribution in key generation | |||
2129 | 7519177 | Method and system for processing a data set | |||
2130 | 7518816 | Method and apparatus for disc drive data security using fields in servo wedges | |||
2131 | 7516491 | License tracking system | |||
2132 | 7516484 | Reader adapted for a portable computer | |||
2133 | 7516483 | System and method for accomplishing two-factor user authentication using the internet | |||
2134 | 7516333 | Hybrid Java-C network appliance | |||
2135 | 7516329 | Information processing apparatus | |||
2136 | 7516324 | Information processing system, information management apparatus, and information processing apparatus | |||
2137 | 7516147 | URL system and method for licensing content | |||
2138 | 7516104 | Methods of providing software over a network and related systems and computer program products | |||
2139 | 7515733 | Methods and arrangements employing digital content items | |||
2140 | 7515716 | Systems and methods for reserving cryptographic key material | |||
2141 | 7515715 | Information security for aeronautical surveillance systems | |||
2142 | 7515714 | Communication apparatus and communication system | |||
2143 | 7513411 | Method of and apparatus for granting electronic signature, and computer program | |||
2144 | 7512988 | Data transmission apparatus and method for management of user identification data allocated to image data | |||
2145 | 7512985 | System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation | |||
2146 | 7512984 | Distributed and scalable instant multimedia communication system | |||
2147 | 7512982 | Computer virus generation detection apparatus and method | |||
2148 | 7512972 | Synchronizing for digital content access control | |||
2149 | 7512813 | Method for system level protection of field programmable logic devices | |||
2150 | 7512800 | Key management technique for establishing a secure channel | |||
2151 | 7512796 | Authentication in a packet data network | |||
2152 | 7512791 | Communication apparatus and method for discriminating confidentiality of received data | |||
2153 | 7512788 | Method and apparatus for anonymous group messaging in a distributed messaging system | |||
2154 | 7512786 | Client-side boot domains and boot rules | |||
2155 | 7512783 | Provision of security services for an ad-hoc network | |||
2156 | 7512782 | Method and system for using a web service license | |||
2157 | 7512567 | Method and system for providing biometric authentication at a point-of-sale via a mobile device | |||
2158 | 7512565 | Method for implementing secure transaction for electronic deposit (purse) | |||
2159 | 7512239 | Protection key for hardware and information management system | |||
2160 | 7512237 | Encryption for optical communications using dynamic subcarrier multiplexing | |||
2161 | 7512235 | Multiple user authentication for online console-based gaming | |||
2162 | 7512234 | Providing location data about a mobile entity | |||
2163 | 7509687 | Remotely authenticated operation method | |||
2164 | 7509683 | System and method for authenticating digital content | |||
2165 | 7509682 | Copy protection method and system for digital media | |||
2166 | 7509675 | Non-invasive monitoring of the effectiveness of electronic security services | |||
2167 | 7509500 | Random number generation for encrypting cellular communications | |||
2168 | 7509499 | Secure token access distributed database system | |||
2169 | 7509290 | Methods and apparatuses for differentiating users in multi-player web-based entertainment environments | |||
2170 | 7508955 | Authentication of objects using steganography | |||
2171 | 7508935 | Cryptosystem for data security | |||
2172 | 7506380 | Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module | |||
2173 | 7506370 | Mobile security architecture | |||
2174 | 7506172 | Gaming device with biometric system | |||
2175 | 7505940 | Software suite activation | |||
2176 | 7505898 | Method and system for masking speech | |||
2177 | 7505598 | On-the-fly encryption/decryption for WLAN communications | |||
2178 | 7505597 | Multi-level security CDMA communications arrangement | |||
2179 | 7505596 | Automatic detection of wireless network type | |||
2180 | 7505595 | Post capture decryption of wirelessly captured data using multiple keysets | |||
2181 | 7505586 | Method for computer-based encryption and decryption of data | |||
2182 | 7505585 | Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same | |||
2183 | 7503074 | System and method for enforcing location privacy using rights management | |||
2184 | 7502945 | Using a flexible rights template to obtain a signed rights label (SRL) for digital content in a rights management system | |||
2185 | 7502938 | Trusted biometric device | |||
2186 | 7502936 | System and method providing secure access to a computer system | |||
2187 | 7502930 | Secure communications | |||
2188 | 7502761 | Method and system for providing online authentication utilizing biometric data | |||
2189 | 7502474 | Network interface with security association data prefetch for high speed offloaded security processing | |||
2190 | 7502472 | Encryption system and method for encrypting/decrypting sensitive data | |||
2191 | 7502331 | Infrastructure-less bootstrapping: trustless bootstrapping to enable mobility for mobile devices | |||
2192 | 7502137 | Automated media selection for imposed print jobs | |||
2193 | 7500270 | Method for utilizing intelligent clock controller in digital rights management | |||
2194 | 7500267 | Systems and methods for disabling software components to protect digital media | |||
2195 | 7500262 | Implementing single sign-on across a heterogeneous collection of client/server and web-based applications | |||
2196 | 7500111 | Querying encrypted data in a relational database system | |||
2197 | 7499566 | Methods for steganographic encoding media | |||
2198 | 7499550 | System and method for protecting a title key in a secure distribution system for recordable media content | |||
2199 | 7499549 | Communication system, information processing apparatus, information processing method, recording medium and program | |||
2200 | 7499548 | Terminal authentication in a wireless network | |||
2201 | 7499543 | Linear conversion circuit and encryption circuit | |||
2202 | 7499541 | Cipher strength evaluation apparatus | |||
2203 | 7499484 | Method for 2D antenna rake combining in a code division multiple access system | |||
2204 | 7496965 | Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system | |||
2205 | 7496769 | Hierarchical trusted code for content protection in computers | |||
2206 | 7496751 | Privacy and identification in a data communications network | |||
2207 | 7496540 | System and method for securing digital content | |||
2208 | 7496539 | Systems, methods and computer products for providing tape library dynamic price performance enhancement feature | |||
2209 | 7496202 | Architecture for manufacturing authenticatable gaming systems | |||
2210 | 7496201 | Portable host-pluggable appliance tracking system | |||
2211 | 7496200 | Architecture for manufacturing authenticatable gaming systems | |||
2212 | 7496199 | Method of controlling access to cryptographic resources | |||
2213 | 7493659 | Network intrusion detection and analysis system and method | |||
2214 | 7493489 | System and method for authentication of JPEG image data | |||
2215 | 7493291 | System and method for locally sharing subscription of multimedia content | |||
2216 | 7493284 | Using visual images transferred from wireless computing device display screens | |||
2217 | 7492904 | QKD system detector autocalibration based on bit-error rate | |||
2218 | 7492899 | Authentication method for media gateway | |||
2219 | 7490136 | Digital contents distributing system and distributing method | |||
2220 | 7490069 | Anonymous payment with a verification possibility by a defined party | |||
2221 | 7489783 | Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program | |||
2222 | 7489781 | Secure peer-to-peer messaging invitation architecture | |||
2223 | 7489779 | Hardware implementation of the secure hash standard | |||
2224 | 7487549 | Information processing apparatus, information processing method, recording medium, and program | |||
2225 | 7487360 | Secure authentication and authorization for transaction processing | |||
2226 | 7487359 | Time stamping method employing a separate ticket and stub | |||
2227 | 7487358 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
2228 | 7487357 | Virtual smart card system and method | |||
2229 | 7487352 | Architecture for manufacturing authenticatable gaming systems | |||
2230 | 7487350 | Fixed client identification system for positive identification of client to server | |||
2231 | 7487348 | System for authenticating and screening grid jobs on a computing grid | |||
2232 | 7487129 | Method and apparatus for the distribution of digitised information on demand | |||
2233 | 7487128 | Updating usage conditions in lieu of download digital rights management protected content | |||
2234 | 7486799 | Methods for monitoring audio and images on the internet | |||
2235 | 7486789 | Device and method for calculation on elliptic curve | |||
2236 | 7483699 | Overhead message update with decentralized control | |||
2237 | 7483537 | Selecting cached RSA keys in response to RSA key requests | |||
2238 | 7483535 | Transmission of generalized scalable bit-streams | |||
2239 | 7480939 | Enhancement to authentication protocol that uses a key lease | |||
2240 | 7480806 | Multi-token seal and unseal | |||
2241 | 7480805 | Method and system for identifying and processing an unauthorized access request | |||
2242 | 7480635 | Method for financing multimedia content through advertising | |||
2243 | 7480631 | System and method for detecting and processing fraud and credit abuse | |||
2244 | 7480622 | Accessibility insurance coverage management | |||
2245 | 7478324 | Electronic publication system | |||
2246 | 7478248 | Apparatus and method for securing data on a portable storage device | |||
2247 | 7478244 | Access control method | |||
2248 | 7478158 | Bandwidth management system | |||
2249 | 7478068 | System and method of selecting consumer profile and account information via biometric identifiers | |||
2250 | 7477746 | Apparatus for dynamically managing group transient key in wireless local area network system and method thereof | |||
2251 | 7477745 | License management apparatus, license management system and license management method | |||
2252 | 7477742 | Method and apparatus for controlling contents utilization, and a computer product | |||
2253 | 7477741 | Analysis resistant cipher method and apparatus | |||
2254 | 7475956 | Apparatus for printing, data writing to memory tags and data reading from memory tags, and methods therefor | |||
2255 | 7475240 | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |||
2256 | 7475046 | Electronic trading system supporting anonymous negotiation and indications of interest | |||
2257 | 7475044 | Electronic money system and electronic money terminal device | |||
2258 | 7474888 | Method for bypassing passkey exchange and authentication procedures | |||
2259 | 7474751 | Method of selecting encrypting arithmetric for realizing communication of secrecy | |||
2260 | 7474750 | Dynamic content-aware memory compression and encryption architecture | |||
2261 | 7474749 | Method and apparatus for achieving crypto-syncronization in a packet data communication system | |||
2008 | |||||
2262 | 7472283 | Method and apparatus for secured digital video and access tracking | |||
2263 | 7472282 | Illegal access discriminating apparatus and method | |||
2264 | 7472281 | Method for the automatic log-in of a subscriber station situated particularly in a motor vehicle in an external information system | |||
2265 | 7472091 | Virtual customer database | |||
2266 | 7471795 | Information transmission system | |||
2267 | 7471794 | Network lock method and related apparatus with ciphered network lock and inerasable deciphering key | |||
2268 | 7471793 | Method and apparatus for use in encrypted communication | |||
2269 | 7471792 | Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus | |||
2270 | 7471790 | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, and communication system | |||
2271 | 7471789 | Encryption circuit achieving higher operation speed | |||
2272 | 7471479 | System for protection against copying on magnetic tape recorders | |||
2273 | 7469383 | Medical apparatus for diagnosis or treatment | |||
2274 | 7469340 | Selective encryption of electronic messages and data | |||
2275 | 7469230 | Method and system for automatically distributing fees, including a reseller commission, during a digital file transaction | |||
2276 | 7469048 | Methods for point compression for jacobians of hyperelliptic curves | |||
2277 | 7467415 | Distributed dynamic security for document collaboration | |||
2278 | 7467412 | Data transfer system, data transfer program and video server system | |||
2279 | 7467399 | Context-sensitive confidentiality within federated environments | |||
2280 | 7467213 | Portable device and a method for accessing a computer resource of a temporary registered user | |||
2281 | 7466840 | Soft error decoding of steganographic data | |||
2282 | 7464411 | Copy protection for optical discs | |||
2283 | 7464407 | Attack defending system and attack defending method | |||
2284 | 7464273 | Content utilizing method | |||
2285 | 7464272 | Server control of peer to peer communications | |||
2286 | 7464262 | Method and apparatus for synchronizing audio and video in encrypted videoconferences | |||
2287 | 7464261 | Switching device, switching method and computer system capable of preventing error in data transmission, which is easy to use | |||
2288 | 7464162 | Systems and methods for testing whether access to a resource is authorized based on access information | |||
2289 | 7461407 | Debugging port security interface | |||
2290 | 7461406 | Access control for digital content | |||
2291 | 7461269 | Information recording apparatus, information recording method, and digital broadcast receiver | |||
2292 | 7461262 | Methods and apparatus for providing security in a caching device | |||
2293 | 7461140 | Method and apparatus for identifying IPsec security policy in iSCSI | |||
2294 | 7460672 | Method for securing data storage in a storage area network | |||
2295 | 7460671 | Encryption processing apparatus and method for voice over packet networks | |||
2296 | 7460670 | Systems and methods for managing quantum cryptographic networks | |||
2297 | 7460665 | Cipher strength evaluation apparatus | |||
2298 | 7458101 | Information viewing/listening system, information player, and information provider | |||
2299 | 7458084 | Methods and systems for converged service creation and execution environment applications | |||
2300 | 7457966 | Data file processing apparatus, remote control apparatus for data file processing apparatus and control method for data file processing apparatus | |||
2301 | 7457964 | Trusted path for transmitting content thereon | |||
2302 | 7457952 | Authentication tag for S/W media | |||
2303 | 7457832 | Verifying dynamically generated operations on a data store | |||
2304 | 7457548 | Quantum optical transmission device and quantum optical generator device therefor | |||
2305 | 7457417 | Approach for configuring wireless devices | |||
2306 | 7457416 | Key distribution center for quantum cryptographic key distribution networks | |||
2307 | 7455229 | Direct print system | |||
2308 | 7454794 | Access control method | |||
2309 | 7454785 | Proxy method and system for secure wireless administration of managed entities | |||
2310 | 7454628 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
2311 | 7454624 | Match template protection within biometric security systems | |||
2312 | 7454618 | System and methods for transmitting encrypted data with encryption key | |||
2313 | 7454033 | Quantization-based data hiding employing calibration and locally adaptive quantization | |||
2314 | 7454020 | System and method for encrypting data in pictorial data | |||
2315 | 7454018 | Transfer of DVD decode key on a window by window basis to an attached device | |||
2316 | 7454016 | Data encryption system and method | |||
2317 | 7451476 | Method and apparatus for interfacing a network to an external element | |||
2318 | 7451326 | Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies | |||
2319 | 7451318 | System and method of watermarking a signal | |||
2320 | 7451301 | OS independent device management methods and apparatuses having a map providing codes for various activations of keys | |||
2321 | 7451202 | Information management system having a common management server for establishing secure communication among groups formed out of a plurality of terminals | |||
2322 | 7451108 | Method and system for measuring trade management performance | |||
2323 | 7450928 | Methods for providing overdraft protection for post-paid communication service plans | |||
2324 | 7450854 | High-speed wireless LAN system | |||
2325 | 7450734 | Digital asset management, targeted searching and desktop searching using digital watermarks | |||
2326 | 7450722 | Subset difference method for multi-cast rekeying | |||
2327 | 7450720 | Linear transformation for symmetric-key ciphers | |||
2328 | 7450719 | Gigabit Ethernet-based passive optical network and data encryption method | |||
2329 | 7447915 | Map data processing method, map data processing device, storage medium, and on-board map data processing device | |||
2330 | 7447910 | Method, arrangement and secure medium for authentication of a user | |||
2331 | 7447662 | Transaction processing system | |||
2332 | 7447386 | Cascaded modulator system and method for QKD | |||
2333 | 7447311 | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |||
2334 | 7447310 | Lean multiplication of multi-precision numbers over GF(2.sup.m) | |||
2335 | 7444666 | Multi-domain authorization and authentication | |||
2336 | 7444522 | Dynamic negotiation of security arrangements between web services | |||
2337 | 7444519 | Access control for federated identities | |||
2338 | 7444518 | Method and apparatus for communicating authorization data | |||
2339 | 7444517 | Method for protecting a user's password | |||
2340 | 7444515 | Method and apparatus for detecting predefined signatures in packet payload using Bloom filters | |||
2341 | 7444513 | Authentication in data communication | |||
2342 | 7444510 | Methods and systems for accessing networks, methods and systems for accessing the internet | |||
2343 | 7444000 | Content identification, and securing media content with steganographic encoding | |||
2344 | 7443983 | Communication apparatus and method | |||
2345 | 7443982 | Watermarking and transferring material | |||
2346 | 7443981 | Execution unit for performing the data encryption standard | |||
2347 | 7443980 | Hierarchical identity-based encryption and signature schemes | |||
2348 | 7441269 | Method and system for session accounting in wireless networks | |||
2349 | 7441264 | Security objects controlling access to resources | |||
2350 | 7441263 | System, method and computer program product for providing unified authentication services for online applications | |||
2351 | 7441125 | Portable data carrier provide with access protection by rendering messages unfamiliar | |||
2352 | 7441122 | Method for providing secure access to a digital resource | |||
2353 | 7441116 | Secure resource distribution through encrypted pointers | |||
2354 | 7440573 | Enterprise wireless local area network switching system | |||
2355 | 7440489 | Method and apparatus for selective demodulation and decoding of communications signals | |||
2356 | 7437752 | Client architecture for portable device with security policies | |||
2357 | 7437550 | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |||
2358 | 7437468 | Method and system for secure URL-based access control | |||
2359 | 7437314 | Method and system for referencing trading agreements | |||
2360 | 7437161 | Method of fast data transmission of mobile stations via the same base station | |||
2361 | 7437081 | System and method for providing two-way communication of quantum signals, timing signals, and public data | |||
2362 | 7436964 | Synchronization of encryption in a wireless communication system | |||
2363 | 7436962 | Method and apparatus for providing secured communication connections using a secured communication connection object | |||
2364 | 7436961 | Sentinel synchronization method for enhancing QKD security | |||
2365 | 7436959 | Data recording apparatus and recording method | |||
2366 | 7436957 | Audio cassette emulator with cryptographic media distribution control | |||
2367 | 7436816 | Method and system for transmission-based billing of applications | |||
2368 | 7434225 | Context information associated with message flows in a messaging system | |||
2369 | 7434069 | Method and device for encryption/decryption of data on mass storage device | |||
2370 | 7434063 | Authentication method, apparatus, and system | |||
2371 | 7434062 | Password encrypting apparatus and method for encrypting password | |||
2372 | 7433848 | System for carrying out a transaction | |||
2373 | 7433846 | Method of embedding permanent identification code into musical apparatus | |||
2374 | 7433491 | Method and apparatus for associating identifiers with content | |||
2375 | 7433472 | Digital content distribution system | |||
2376 | 7430762 | Identification card manufacturing security | |||
2377 | 7430758 | Prompt authentication | |||
2378 | 7430754 | Method for dynamic application of rights management policy | |||
2379 | 7430542 | System and method for activating a rendering device in a multi-level rights-management architecture | |||
2380 | 7430541 | Method of and apparatus for updating a database using a recordable optical disc | |||
2381 | 7428746 | System and method for secure network connectivity | |||
2382 | 7428641 | Session-state manager | |||
2383 | 7428638 | Architecture for manufacturing authenticatable gaming systems | |||
2384 | 7428305 | Generation of keyed integer permutations for message authentication codes | |||
2385 | 7426637 | Method and system for controlled media sharing in a network | |||
2386 | 7426635 | Bulk certificate lifetime allocation systems, components and methods | |||
2387 | 7426277 | Encryption of information input to portable card terminal using encryption key information associated to portable card terminal identifier | |||
2388 | 7426271 | System and method for establishing secondary channels | |||
2389 | 7424746 | Intrusion detection and vulnerability assessment system, method and computer program product | |||
2390 | 7424618 | Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic | |||
2391 | 7424615 | Mutually authenticated secure key exchange (MASKE) | |||
2392 | 7424460 | Image ordering system and method | |||
2393 | 7424284 | Secure network/service access | |||
2394 | 7424135 | Security check provision | |||
2395 | 7424132 | Embedding hidden auxiliary code signals in media | |||
2396 | 7424131 | Authentication of physical and electronic media objects using digital watermarks | |||
2397 | 7424128 | Electronic watermark embedding apparatus, electronic watermark embedding method, record medium having electronic watermark and manufacturing method of record medium | |||
2398 | 7424116 | Method and apparatus for providing authentication in a communication system | |||
2399 | 7424115 | Generating asymmetric keys in a telecommunications system | |||
2400 | 7424034 | Information converting apparatus | |||
2401 | 7421735 | Proxy method and system for secure wireless administration of managed entities | |||
2402 | 7421583 | System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof | |||
2403 | 7421579 | Multiplexing a secure counter to implement second level secure counters | |||
2404 | 7421077 | Mobile IP authentication | |||
2405 | 7418737 | Encrypted data file transmission | |||
2406 | 7418727 | Method for PC client security authentication | |||
2407 | 7418596 | Secure, efficient, and mutually authenticated cryptographic key distribution | |||
2408 | 7418594 | Mobile unit authenticating method | |||
2409 | 7418421 | Method, system, and apparatus for dynamically creating electronic contracts | |||
2410 | 7418397 | Witness system | |||
2411 | 7418209 | System and method for multi-dimensional encoding | |||
2412 | 7418111 | Methods and apparatus to process media | |||
2413 | 7418101 | Securely transferring user data using first and second communication media | |||
2414 | 7415730 | Microcomputer and test method therefore | |||
2415 | 7415619 | Method and apparatus for recording and reproducing information on and from recording disc | |||
2416 | 7415605 | Biometric identification network security | |||
2417 | 7415441 | Printing system, apparatus and method for automatically printing records of electronic transactions | |||
2418 | 7415129 | Providing reports associated with video and audio content | |||
2419 | 7415115 | Method and system for disaster recovery of data from a storage device | |||
2420 | 7412606 | Copy protection using detailed copy control information | |||
2421 | 7412542 | Bridging a gaming console with a wireless network | |||
2422 | 7412450 | Method and apparatus for identifying tampering of data in a file system | |||
2423 | 7412424 | Third party certification of content in electronic commerce transactions | |||
2424 | 7412420 | Systems and methods for enrolling a token in an online authentication program | |||
2425 | 7412304 | Power system for area containing a set of power consumers | |||
2426 | 7412229 | Sales apparatus and method of transmitting and receiving merchandise information by electric field induced in human body | |||
2427 | 7412074 | Hiding codes in input data | |||
2428 | 7412054 | Matrix encryption method and system | |||
2429 | 7409553 | Public key certificate generation method, validation method and apparatus thereof | |||
2430 | 7409549 | Methods and apparatus for dynamic home agent assignment in mobile IP | |||
2431 | 7409543 | Method and apparatus for using a third party authentication server | |||
2432 | 7409542 | Security association management through the use of lookup tables | |||
2433 | 7409541 | Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method | |||
2434 | 7409352 | System and method for managing sponsorships | |||
2435 | 7409062 | Method and device for the generation of checkable forgery-proof documents | |||
2436 | 7409061 | Method and system for secure distribution of subscription-based game software | |||
2437 | 7408953 | Information converting apparatus | |||
2438 | 7406709 | Apparatus and method for allowing peer-to-peer network traffic across enterprise firewalls | |||
2439 | 7406599 | Indicating status for digital signatures | |||
2440 | 7406593 | Method and apparatus for protecting information and privacy | |||
2441 | 7406472 | Integrated import/export system | |||
2442 | 7406447 | Opening price process for trading system | |||
2443 | 7406446 | System and method for trustworthy metering and deactivation | |||
2444 | 7406357 | Transforming a product description into a process network and specifying product creation | |||
2445 | 7406173 | Quantum communication apparatus and quantum communication method | |||
2446 | 7405666 | Method and apparatus for locating a missing individual | |||
2447 | 7404089 | Method and system for protecting against side channel attacks when performing cryptographic operations | |||
2448 | 7404088 | Digital content security system | |||
2449 | 7404084 | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |||
2450 | 7403623 | High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses | |||
2451 | 7403622 | Process for managing a symmetric key in a communication network and devices for the implementation of this process | |||
2452 | 7403619 | Interface module and decoder for host | |||
2453 | 7403615 | Methods and apparatus for accelerating ARC4 processing | |||
2454 | 7403614 | Encryption apparatus | |||
2455 | 7401353 | Detecting and blocking malicious connections | |||
2456 | 7401221 | Advanced stream format (ASF) data stream header object protection | |||
2457 | 7401052 | Method for validating warranty compliance and ink compatibility assurance | |||
2458 | 7400749 | Method and apparatus for supporting a biometric registration performed on an authentication server | |||
2459 | 7400743 | Methods to evaluate images, video and documents | |||
2460 | 7400731 | Scalable technique for ensuring real-time, end-to-end security in a multimedia mobile network | |||
2461 | 7400726 | Apparatus for preventing unauthorized use of a copyrighted medium | |||
2462 | 7400725 | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein | |||
2463 | 7400724 | Device and method for use in quantum crytography | |||
2464 | 7400723 | Secure method for secret key cryptographic calculation and component using said method | |||
2465 | 7398544 | Configurable cableCARD | |||
2466 | 7398386 | Transparent IPSec processing inline between a framer and a network component | |||
2467 | 7398311 | Selective cache flushing in identity and access management systems | |||
2468 | 7397922 | Group security | |||
2469 | 7397917 | Method and apparatus for generating a cryptographic key | |||
2470 | 7397916 | System and method for protecting computer software from a white box attack | |||
2471 | 7397817 | Information converting apparatus | |||
2472 | 7395436 | Methods, software programs, and systems for electronic information security | |||
2473 | 7395435 | Secure memory device for smart cards | |||
2474 | 7395432 | Method of embedding/detecting digital watermark and apparatus for using thereof | |||
2475 | 7395431 | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method | |||
2476 | 7395395 | Methods, systems, and storage mediums for monitoring consumption of storage space and relocating content contained in the storage when a predetermined condition is met | |||
2477 | 7392535 | Access privilege transferring method | |||
2478 | 7392396 | Transaction device with noise signal encryption | |||
2479 | 7392383 | Method and apparatus for providing process-based access controls on computer resources | |||
2480 | 7392037 | Wireless communication device and methods for protecting broadcasted management control messages in wireless networks | |||
2481 | 7391891 | Method and apparatus for supporting a biometric registration performed on an authentication server | |||
2482 | 7391881 | Curve fitting for synchronizing readers of hidden auxiliary data | |||
2483 | 7391867 | Graphical display of QKD system statistics | |||
2484 | 7391866 | Broadcast apparatus and reception apparatus for providing a storage service by which scrambled content is stored and descrambled using scrambling key list | |||
2485 | 7390952 | Electronic music apparatus system useful for user registration | |||
2486 | 7389428 | Data processing system, data processing method, and program providing medium | |||
2487 | 7389425 | Biometric-based authentication in a nonvolatile memory device | |||
2488 | 7389424 | Technique for distributing software | |||
2489 | 7389414 | Printing system | |||
2490 | 7389270 | System for controlling the distribution and use of digital works | |||
2491 | 7389160 | Remote login of a personal computer | |||
2492 | 7388958 | Communication system segregating communications by security level | |||
2493 | 7388957 | Elliptic curve exponentiation apparatus that can counter differential fault attack, and information security apparatus | |||
2494 | 7386732 | Integrated system security method | |||
2495 | 7383577 | Method and system for encrypted network management and intrusion detection | |||
2496 | 7383574 | Method and system for limiting the impact of undesirable behavior of computers on a shared data network | |||
2497 | 7383568 | Security management administration system and method | |||
2498 | 7383462 | Method and apparatus for encrypted remote copy for secure data backup and restoration | |||
2499 | 7383439 | Apparatus and method for facilitating encryption and decryption operations over an email server using an unsupported protocol | |||
2500 | 7383438 | System and method for secure conditional access download and reconfiguration | |||
2501 | 7383435 | Method for encoding and decoding communication data | |||
2502 | 7383433 | Trust spectrum for certificate distribution in distributed peer-to-peer networks | |||
2503 | 7383233 | Method of designing an electronic transaction system | |||
2504 | 7383230 | System and method for the efficient exchange and pricing of services and intangible works | |||
2505 | 7383229 | Access control and metering system for streaming media | |||
2506 | 7382882 | Secure session set up based on the wireless application protocol | |||
2507 | 7382877 | RSA cryptographic method and system | |||
2508 | 7380710 | Payment card preloaded with unique numbers | |||
2509 | 7380280 | Rights locker for digital content access control | |||
2510 | 7380258 | Systems and methods for controlling and managing programming content and portions thereof | |||
2511 | 7380209 | Managing electronic documents utilizing a digital seal | |||
2512 | 7380134 | Information recording/reproducing apparatus and method of executing encryption processing | |||
2513 | 7380129 | Method and apparatus for detecting grid intrusions | |||
2514 | 7380128 | Method and device for reading authentication means and adapted identification means | |||
2515 | 7380126 | Methods and apparatus for controlling the transmission and receipt of email messages | |||
2516 | 7380124 | Security transmission protocol for a mobility IP network | |||
2517 | 7380118 | Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method | |||
2518 | 7379897 | Automatic payment system using RF ID tags | |||
2519 | 7379551 | Method and system for recovering password protected private data via a communication network without exposing the private data | |||
2520 | 7379550 | Method for the computer-assisted production of public keys for encoding information and device for carrying out said method | |||
2521 | 7379548 | Virtual smart card device, method and system | |||
2522 | 7379546 | Method for XZ-elliptic curve cryptography | |||
2523 | 7376976 | Transcryption of digital content between content protection systems | |||
2524 | 7376842 | Malware scanning messages containing multiple data records | |||
2525 | 7376840 | Streamlined service subscription in distributed architectures | |||
2526 | 7376839 | Smart card access control system | |||
2527 | 7376628 | Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds | |||
2528 | 7376624 | Secure communication and real-time watermarking using mutating identifiers | |||
2529 | 7376242 | Quantization-based data embedding in mapped data | |||
2530 | 7376232 | Computer system security via dynamic encryption | |||
2531 | 7376196 | Receiving apparatus in communication system | |||
2532 | 7373671 | Method and system for user information verification | |||
2533 | 7373521 | Semiconductor IC, information processing method, information processing device, and program storage medium | |||
2534 | 7373518 | Operation of a security module in a card reader | |||
2535 | 7373507 | System and method for establishing secure communication | |||
2536 | 7372976 | Content indexing and searching using content identifiers and associated metadata | |||
2537 | 7372964 | Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof | |||
2538 | 7372963 | Device for compression and encryption, and device for decompression and decryption | |||
2539 | 7372962 | Storage system executing encryption and decryption processing | |||
2540 | 7372908 | Radio communication method, radio transmitting apparatus, and radio receiving apparatus | |||
2541 | 7370356 | Distributed network monitoring system and method | |||
2542 | 7370354 | Method of remotely managing a firewall | |||
2543 | 7370350 | Method and apparatus for re-authenticating computing devices | |||
2544 | 7370210 | Apparatus and method for managing processor configuration data | |||
2545 | 7370209 | Systems and methods for increasing the difficulty of data sniffing | |||
2546 | 7370208 | Method and apparatus for automatic control of access | |||
2547 | 7370206 | Self-signing electronic documents | |||
2548 | 7370201 | Secure identification method between two radiofrequency network appliances | |||
2549 | 7370194 | Security gateway for online console-based gaming | |||
2550 | 7370120 | Method and system for reducing network latency in data communication | |||
2551 | 7370017 | Redistribution of rights-managed content and technique for encouraging same | |||
2552 | 7369678 | Digital watermark and steganographic decoding | |||
2553 | 7369676 | Routing networks for use with content linking systems | |||
2554 | 7369658 | Secure modulation and demodulation | |||
2555 | 7369657 | Cryptography accelerator application program interface | |||
2556 | 7367061 | Systems, methods, and a storage medium for storing and securely transmitting digital media data | |||
2557 | 7367058 | Encoding method | |||
2558 | 7367048 | Apparatus and method for autonomic email access control | |||
2559 | 7367045 | Trusted communications system | |||
2560 | 7366913 | Knowledge-type authorization device and methods | |||
2561 | 7366910 | System and method for string filtering | |||
2562 | 7366903 | Card activated cash dispensing automated banking machine system and method | |||
2563 | 7366901 | Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address | |||
2564 | 7366703 | Smartcard internet authorization system | |||
2565 | 7366701 | Copy protection of data | |||
2566 | 7366700 | Method and apparatus for transmitting and receiving a decoding key encoded with specific information to decode encrypted information of a record medium | |||
2567 | 7366328 | Method and device for preventing false acceptance of latent fingerprint images | |||
2568 | 7366304 | Cruable U-NII wireless radio with secure, integral antenna connection via SM BIOS in U-NII wireless ready device | |||
2569 | 7366303 | Integrity protection during initial registration of a subscriber in a telecommunications network | |||
2570 | 7366300 | Methods and apparatus for implementing a cryptography engine | |||
2571 | 7366299 | Method for encrypting and decrypting data using derivative equations and factors | |||
2572 | 7363507 | Device and method of preventing pirated copies of computer programs | |||
2573 | 7363504 | Method and system for keystroke scan recognition biometrics on a smartcard | |||
2574 | 7363503 | Method for producing a data structure for use in password identification | |||
2575 | 7363501 | Semiconductor integrated circuit with function to manage license information | |||
2576 | 7363496 | Authenticated ID-based cryptosystem with no key escrow | |||
2577 | 7363494 | Method and apparatus for performing enhanced time-based authentication | |||
2578 | 7363486 | Method and system for authentication through a communications pipe | |||
2579 | 7363276 | Broadcast receiving method and apparatus and information distributing method and apparatus | |||
2580 | 7363244 | Methods, apparatus, and program products for inferring service usage | |||
2581 | 7362973 | Protecting secret data entry from infrared and audio eavesdropping | |||
2582 | 7362867 | Apparatus and method for generating scrambling code in UMTS mobile communication system | |||
2583 | 7362866 | Method for determining encryption algorithm of secret communication based on mobile country codes | |||
2584 | 7362862 | Methods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons | |||
2585 | 7362859 | Enhancement of utilization of encryption engine | |||
2586 | 7360252 | Method and apparatus for secure distribution of software | |||
2587 | 7360247 | Method for protection against fraudulent modification of data sent to a secure electronic medium | |||
2588 | 7360237 | System and method for secure network connectivity | |||
2589 | 7360095 | Method and apparatus for a proximity warning system | |||
2590 | 7360092 | Marking and identifying web-based authentication forms | |||
2591 | 7360091 | Secure data transfer method of using a smart card | |||
2592 | 7360076 | Security association data cache and structure | |||
2593 | 7359885 | System and method for device-based access privilege to an account | |||
2594 | 7359883 | License management system, license management device, relay device and terminal device | |||
2595 | 7359528 | Monitoring of video or audio based on in-band and out-of-band data | |||
2596 | 7359516 | User interface technique for selection and activation of wireless services from among multiple transport carriers | |||
2597 | 7359513 | Quantum cryptography protocol | |||
2598 | 7359507 | Server-assisted regeneration of a strong secret from a weak secret | |||
2599 | 7358847 | IC tag | |||
2600 | 7356709 | Systems and methods for deterring software piracy in a volume license environment | |||
2601 | 7356705 | Biometric authentication for remote initiation of actions and services | |||
2602 | 7356704 | Aggregated authenticated identity apparatus for and method therefor | |||
2603 | 7356703 | Time-based computer access controls | |||
2604 | 7356510 | Content delivery | |||
2605 | 7356147 | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient | |||
2606 | 7356145 | Arranging data ciphering in a wireless telecommunication system | |||
2607 | 7356141 | Baud rate modulation encoding/decoding method and device for remote controller | |||
2608 | 7353541 | Systems and methods for content distribution using one or more distribution keys | |||
2609 | 7353538 | Server resource management, analysis, and intrusion negation | |||
2610 | 7353535 | Flexible, selectable, and fine-grained network trust policies | |||
2611 | 7353533 | Administration of protection of data accessible by a mobile device | |||
2612 | 7353532 | Secure system and method for enforcement of privacy policy and protection of confidentiality | |||
2613 | 7353399 | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks | |||
2614 | 7353397 | Repurposing digitally signed information | |||
2615 | 7353395 | Authenticated ID-based cryptosystem with no key escrow | |||
2616 | 7353382 | Security framework and protocol for universal pervasive transactions | |||
2617 | 7353353 | File security management | |||
2618 | 7353210 | Electronic means of payment with individually settable security features for the internet or for mobile networks | |||
2619 | 7353209 | Releasing decrypted digital content to an authenticated path | |||
2620 | 7353186 | Advertising system | |||
2621 | 7352879 | Conjugate cluster screens for embedding digital watermarks into printed halftone documents | |||
2622 | 7352866 | Enhanced subscriber authentication protocol | |||
2623 | 7352861 | Digital electronic component which is protected against electrical-type analyses | |||
2624 | 7350230 | Wireless security module | |||
2625 | 7350228 | Method for securing digital content | |||
2626 | 7350227 | Cryptographic peer discovery, authentication, and authorization for on-path signaling | |||
2627 | 7350074 | Peer-to-peer authentication and authorization | |||
2628 | 7350069 | System and method which employs a multi user secure scheme utilizing shared keys | |||
2629 | 7349555 | Documents and apparatus to encode documents | |||
2630 | 7349554 | Maze pattern analysis | |||
2631 | 7349543 | Secure foreign enterprise printing | |||
2632 | 7349541 | Method and apparatus for controlling content consumption | |||
2633 | 7349538 | Hierarchical identity-based encryption and signature schemes | |||
2634 | 7349537 | Method for data encryption in an ethernet passive optical network | |||
2635 | 7349485 | Mapping radio-frequency noise in an ultra-wideband communication system | |||
2636 | 7349481 | Communication using audible tones | |||
2637 | 7346932 | Data processing apparatus, a data processing method, a data recording medium on which data processing program that is readable by a computer are recorded, and a recording medium | |||
2638 | 7346779 | System and method for authenticating electronic documents | |||
2639 | 7346778 | Security method and apparatus for controlling the data exchange on handheld computers | |||
2640 | 7346772 | Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure | |||
2641 | 7346581 | Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system | |||
2642 | 7346185 | Optical content modulation for visual copyright protection | |||
2643 | 7346170 | Information processing system and method | |||
2644 | 7346163 | Dynamic composition of pre-encrypted video on demand content | |||
2645 | 7346161 | Method and apparatus for designing cipher logic, and a computer product | |||
2646 | 7346160 | Randomization-based encryption apparatus and method | |||
2647 | 7343628 | Authorization data model | |||
2648 | 7343495 | Information recording apparatus, information reproducing apparatus, and information distribution system | |||
2649 | 7343490 | Apparatus, and associated method, for facilitating authentication of a mobile station with a core network | |||
2650 | 7343350 | System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services | |||
2651 | 7343348 | System for performing real-estate transactions over a computer network using participant templates | |||
2652 | 7343347 | Electronic media player with metadata based control and method of operating the same | |||
2653 | 7343295 | Automated complaint resolution system | |||
2654 | 7342973 | Method and apparatus for adapting multi-band ultra-wideband signaling to interference sources | |||
2655 | 7340778 | Method and apparatus for ensuring the copy protection of digital data | |||
2656 | 7340607 | Preservation system for digitally created and digitally signed documents | |||
2657 | 7340606 | Digital certificates | |||
2658 | 7340605 | System and method for secure download of waveforms to signal generators | |||
2659 | 7340603 | Efficient revocation of receivers | |||
2660 | 7340482 | Preview function in a digital data preservation system | |||
2661 | 7340436 | Communication network charging method and system | |||
2662 | 7340079 | Image recognition apparatus, image recognition processing method, and image recognition program | |||
2663 | 7340059 | Programmable scrambler and De-scrambler for digital telephony equipment | |||
2664 | 7340058 | Low-overhead secure information processing for mobile gaming and other lightweight device applications | |||
2665 | 7340057 | Method and apparatus for distributing authorization to provision mobile devices on a wireless network | |||
2666 | 7340054 | Information processing method, decrypting method, information processing apparatus, and computer program | |||
2667 | 7340053 | Cipher strength estimating device | |||
2668 | 7339978 | Adaptive weight update method and system for a discrete multitone spread spectrum communications system | |||
2669 | 7337465 | Peer-to-peer communication apparatus and communication method | |||
2670 | 7337322 | Hierarchical identity-based encryption and signature schemes | |||
2671 | 7337315 | Efficient certificate revocation | |||
2672 | 7337147 | Dynamic digital content licensing | |||
2673 | 7337146 | Emergency information management system | |||
2674 | 7336787 | Critical packet partial encryption | |||
2675 | 7336783 | Cryptographic systems and methods supporting multiple modes | |||
2676 | 7334266 | Reproduction control method, program and recording medium | |||
2677 | 7334259 | National identification card system and biometric identity verification method for negotiating transactions | |||
2678 | 7334132 | Flexible and scalable architecture for transport processing | |||
2679 | 7333957 | Connected audio and other media objects | |||
2680 | 7333612 | Methods and apparatus for confidentiality protection for Fibre Channel Common Transport | |||
2681 | 7330981 | File locker and mechanisms for providing and using same | |||
2682 | 7330980 | Method of and system for encrypting digital data, method of and apparatus for reproducing digital data, and computer product | |||
2683 | 7330973 | Safety judgment method, safety judgment system, safety judgment apparatus, first authentication apparatus, and computer program product | |||
2684 | 7330871 | Online machine data collection and archiving process | |||
2685 | 7330838 | System and method for securing transactional data transmitted over a wireless network in a retail store environment | |||
2686 | 7330653 | Quantum dense coding system | |||
2687 | 7330570 | Face collation apparatus and biometrics data collation apparatus | |||
2688 | 7330564 | Digital watermarking apparatus and methods | |||
2689 | 7330563 | Documents, articles and authentication of documents and articles | |||
2690 | 7330550 | Cryptographic system and method that uses excitation spectroscopy | |||
2691 | 7328352 | Apparatus and method for reading or writing user data | |||
2692 | 7328350 | Method and apparatus for secure cryptographic key generation, certification and use | |||
2693 | 7328345 | Method and system for end to end securing of content for video on demand | |||
2694 | 7328342 | Method for secure communication between two devices | |||
2695 | 7327934 | Data reproduction apparatus, data recording apparatus, circuit element, data reproduction method and data recording method | |||
2696 | 7327846 | Secure cryptographic key exchange and verifiable digital signature | |||
2697 | 7327845 | Transmission of encrypted messages between a transmitter and a receiver utilizing a one-time cryptographic pad | |||
2698 | 7327775 | CDMA receiver | |||
2699 | 7325247 | Information management method using a recording medium with a secure area and a user-use area | |||
2700 | 7325143 | Digital identity creation and coalescence for service authorization | |||
2701 | 7325141 | Method and system for secure access | |||
2702 | 7325134 | Localized network authentication and security using tamper-resistant keys | |||
2703 | 7325133 | Mass subscriber management | |||
2704 | 7325132 | Authentication method, system and apparatus of an electronic value | |||
2705 | 7325129 | Method for altering encryption status in a relational database in a continuous process | |||
2706 | 7324974 | Digital data file encryption apparatus and method | |||
2707 | 7324735 | Image processing | |||
2708 | 7322046 | Method and system for the secure use of a network service | |||
2709 | 7321968 | Method and apparatus for encoding, transmitting and decoding a digital message | |||
2710 | 7321667 | Data hiding through arrangement of objects | |||
2711 | 7320143 | Method of gaining secure access to intranet resources | |||
2712 | 7320131 | Methods and apparatus for selecting a server to process a request | |||
2713 | 7320073 | Secure method for roaming keys and certificates | |||
2714 | 7319988 | System and method for processing protected audio information | |||
2715 | 7319757 | Wireless communication device and method for over-the-air application service | |||
2716 | 7319756 | Audio coding | |||
2717 | 7319754 | Insertion of binary messages in video pictures | |||
2718 | 7319751 | Data encryption | |||
2719 | 7319750 | Digital circuit apparatus and method for accelerating preliminary operations for cryptographic processing | |||
2720 | 7318235 | Attestation using both fixed token and portable token | |||
2721 | 7318160 | Cryptographic key setup in queued cryptographic systems | |||
2722 | 7317811 | Method to decode temporal watermarks in compressed video | |||
2723 | 7316616 | Gaming system license management | |||
2724 | 7316030 | Method and system for authenticating a personal security device vis-a-vis at least one remote computer system | |||
2725 | 7315948 | Time stamping method employing a separate ticket and stub | |||
2726 | 7315945 | Directoryless public key cryptographic system and method | |||
2727 | 7315927 | Machine readable medium and method for controlling access to a data storage device | |||
2728 | 7315621 | Digital watermark-embedding apparatus, digital watermark-embedding method, and recording medium | |||
2729 | 7314169 | Device that issues authority for automation systems by issuing an encrypted time pass | |||
2007 | |||||
2730 | 7313828 | Method and apparatus for protecting software against unauthorized use | |||
2731 | 7313822 | Application-layer security method and system | |||
2732 | 7313699 | Automatic authentication method and system in print process | |||
2733 | 7313690 | Three way validation and authentication of boot files transmitted from server to client | |||
2734 | 7313688 | Method and apparatus for private messaging among users supported by independent and interoperating couriers | |||
2735 | 7313664 | Apparatus and system for controlling access to a data storage device | |||
2736 | 7313253 | Methods and tangible objects employing machine readable data in photo-reactive materials | |||
2737 | 7313251 | Method and system for managing and controlling electronic media | |||
2738 | 7313237 | Methods and systems for providing variable rates of service for accessing networks, methods and systems for accessing the internet | |||
2739 | 7313162 | Apparatus and method for calculating and implementing a Fibonacci mask for a code generator | |||
2740 | 7310822 | Filtering a permission set using permission requests associated with a code assembly | |||
2741 | 7310812 | Service executing method and service providing system | |||
2742 | 7310731 | Contents processing system | |||
2743 | 7308704 | Data structure for access control | |||
2744 | 7308703 | Protection of data accessible by a mobile device | |||
2745 | 7308702 | Locally adaptable central security management in a heterogeneous network environment | |||
2746 | 7308581 | Systems and methods for online identity verification | |||
2747 | 7308580 | System and method for ensuring security with multiple authentication schemes | |||
2748 | 7308578 | Method and apparatus for authorizing execution for applications in a data processing system | |||
2749 | 7308575 | Data scrambling system for a shared transmission media | |||
2750 | 7308572 | Method of printing a document | |||
2751 | 7308430 | Methods and apparatus for uniquely identifying a large number of film prints | |||
2752 | 7308256 | Mobile communication terminal, information processing apparatus, relay server apparatus, information processing system, and information processing method | |||
2753 | 7308110 | Methods for marking images | |||
2754 | 7308101 | Method and apparatus for transporting encrypted media streams over a wide area network | |||
2755 | 7308097 | Digital signature and authentication method and apparatus | |||
2756 | 7308096 | Elliptic scalar multiplication system | |||
2757 | 7305713 | Method and system for preventing capture of electronic digital content | |||
2758 | 7305562 | System, method and computer program product for an authentication management infrastructure | |||
2759 | 7305559 | Software method for improved password entry | |||
2760 | 7305555 | Smart card mating protocol | |||
2761 | 7305550 | System and method for providing authentication and verification services in an enhanced media gateway | |||
2762 | 7305545 | Automated electronic messaging encryption system | |||
2763 | 7305470 | Method for displaying web user's authentication status in a distributed single login network | |||
2764 | 7305117 | Methods and tangible objects employing machine readable data | |||
2765 | 7305104 | Authentication of identification documents using digital watermarks | |||
2766 | 7305092 | Method and system to accelerate cryptographic functions for secure e-commerce applications | |||
2767 | 7305091 | Quantum cipher communication system | |||
2768 | 7305090 | Method and system for use of common provisioning data to activate cellular wireless devices | |||
2769 | 7305085 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
2770 | 7302705 | Method and apparatus for tracing a denial-of-service attack back to its source | |||
2771 | 7302704 | Excising compromised routers from an ad-hoc network | |||
2772 | 7302589 | Method for securing memory mapped control registers | |||
2773 | 7302581 | Storing apparatus and password control method | |||
2774 | 7302577 | Data processing apparatus and method | |||
2775 | 7302571 | Method and system to maintain portable computer data secure and authentication token for use therein | |||
2776 | 7302415 | Data copyright management system | |||
2777 | 7302079 | Stealthy secret key encoding and decoding | |||
2778 | 7302056 | Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography | |||
2779 | 7301983 | Method for using codebook indexing to achieve high bit densities in a direct-sequence CDMA spread spectrum communication system | |||
2780 | 7299504 | System and method for implementing security management using a database-modeled security policy | |||
2781 | 7299502 | System and method for providing customized secure access to shared documents | |||
2782 | 7299501 | Electronic book selection and delivery system having encryption and security features | |||
2783 | 7299493 | Techniques for dynamically establishing and managing authentication and trust relationships | |||
2784 | 7299492 | Multi-level multi-user web services security system and method | |||
2785 | 7299355 | Fast SHA1 implementation | |||
2786 | 7299281 | Method and system for activating and capturing screen displays associated with predetermined user interface events | |||
2787 | 7298848 | Quantum cryptography transmission method and system | |||
2788 | 7298847 | Secure key distribution protocol in AAA for mobile IP | |||
2789 | 7298844 | Recording/reproducing apparatus, data moving method, and data deletion method | |||
2790 | 7297860 | System and method for determining genre of audio | |||
2791 | 7296163 | System and methods for encrypted execution of computer programs | |||
2792 | 7296158 | Methods, apparatus, and program products for inferring service usage | |||
2793 | 7296157 | Methods and apparatus for secure document printing | |||
2794 | 7296156 | System and method for SMS authentication | |||
2795 | 7296147 | Authentication system and key registration apparatus | |||
2796 | 7296002 | Methods and apparatus for providing agent controlled synchronized browsing at a terminal | |||
2797 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
2798 | 7294776 | Content supply method and apparatus | |||
2799 | 7293291 | System and method for detecting computer port inactivity | |||
2800 | 7293176 | Strong mutual authentication of devices | |||
2801 | 7292999 | Online card present transaction | |||
2802 | 7292641 | Apparatus and method for transmitting/receiving preamble sequence in orthogonal frequency division multiplexing communication system using plurality of transmission antennas | |||
2803 | 7292640 | System and method for an adaptive receiver for the reception of signals subject to multipath interference | |||
2804 | 7290280 | Method and apparatus to facilitate virtual transport layer security on a virtual network | |||
2805 | 7290278 | Identity based service system | |||
2806 | 7290148 | Encryption and decryption communication semiconductor device and recording/reproducing apparatus | |||
2807 | 7290144 | Access-control method for software modules and programmable electronic device therefor | |||
2808 | 7290143 | Method of certifying transmission, reception and authenticity of electronic documents and related network unit | |||
2809 | 7289630 | Counter initialization, particularly for radio frames | |||
2810 | 7287273 | Individual authentication method using input characteristic of input apparatus by network, program thereof, and recording medium containing the program | |||
2811 | 7287158 | Person authentication system, person authentication method, information processing apparatus, and program providing medium | |||
2812 | 7286684 | Secure document design carrying auxiliary machine readable information | |||
2813 | 7286671 | Secure network access method | |||
2814 | 7286669 | Circuits for scrambling and descrambling packets of various lengths, and methods of doing the same | |||
2815 | 7286606 | System and method for channelization recognition in a wideband communication system | |||
2816 | 7284263 | Rights management inter-entity message policies and enforcement | |||
2817 | 7284132 | Memory card | |||
2818 | 7284129 | Data processing apparatus and method | |||
2819 | 7284127 | Secure communications | |||
2820 | 7284126 | Device authentication using pre-configured security keys | |||
2821 | 7284125 | Method and apparatus for personal identification | |||
2822 | 7283743 | Systems and methods for active monitoring and management of fiber links | |||
2823 | 7281267 | Software audit system | |||
2824 | 7280672 | Image data processing | |||
2825 | 7280662 | Time-shifting data in digital radio system | |||
2826 | 7280657 | Data encryption and decryption system and method using merged ciphers | |||
2827 | 7280529 | Providing network management access through user profiles | |||
2828 | 7278169 | Controlling the downloading and recording of digital data | |||
2829 | 7278160 | Presentation of correlated events as situation classes | |||
2830 | 7278157 | Efficient transmission of IP data using multichannel SOCKS server proxy | |||
2831 | 7278155 | Single sign-on system for application program | |||
2832 | 7278029 | Program writable IC card and method thereof | |||
2833 | 7278027 | Biomedical recognizing system comprising image diagnosis workstation and method therefor | |||
2834 | 7278024 | Session authentication using temporary passwords | |||
2835 | 7278023 | System and method for distributed network acess and control enabling high availability, security and survivability | |||
2836 | 7278022 | Information processing apparatus and information processing method | |||
2837 | 7278021 | Information processing device, information processing system, authentication method, storage medium and program | |||
2838 | 7277557 | Image processing apparatus, image processing method, and storage medium of image processing program | |||
2839 | 7277547 | Method for automated security configuration in a wireless network | |||
2840 | 7277543 | Cryptographic combiner using two sequential non-associative operations | |||
2841 | 7277540 | Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography | |||
2842 | 7274807 | Method and apparatus for supporting a biometric registration performed on a card | |||
2843 | 7274791 | Quantum cryptographic system and method for achieving unambiguous state discrimination measurement of coherent light states | |||
2844 | 7274704 | Piggybacking VPN information in BGP for network based VPN architectures | |||
2845 | 7273164 | Postage metering system | |||
2846 | 7272857 | Method/system for preventing identity theft or misuse by restricting access | |||
2847 | 7272724 | User alerts in an anti computer virus system | |||
2848 | 7272723 | USB-compliant personal key with integral input and output devices | |||
2849 | 7272722 | Method for industrially changing the passwords of AIX/UNIX users | |||
2850 | 7272719 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
2851 | 7272718 | Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis | |||
2852 | 7272714 | Method, apparatus, and program for automated trust zone partitioning | |||
2853 | 7272582 | Fee determination device | |||
2854 | 7272581 | Method and system for optimizing throughput of mailing machines | |||
2855 | 7272245 | Method of biometric authentication | |||
2856 | 7272167 | PN code chip time tracking with smart antenna | |||
2857 | 7269854 | Transaction system for transporting media files from content provider sources to home entertainment devices | |||
2858 | 7269736 | Distributed cryptographic methods and arrangements | |||
2859 | 7269576 | Content rendering apparatus | |||
2860 | 7269275 | Physical objects and validation of physical objects | |||
2861 | 7269260 | Communication system, wireless communication apparatus, and communication method | |||
2862 | 7267266 | Security system | |||
2863 | 7266846 | System and method of facilitating compliance with information sharing regulations | |||
2864 | 7266703 | Single-pass cryptographic processor and method | |||
2865 | 7266702 | Method and system for managing security material and services in a distributed database system | |||
2866 | 7266701 | System and method for enabling a remote control to automatically and dynamically set-up a V-chip | |||
2867 | 7266697 | Stealthy audio watermarking | |||
2868 | 7266529 | Method and apparatus for executing code in accordance with usage rights | |||
2869 | 7266502 | Feature centric release manager method and system | |||
2870 | 7266304 | System for secure optical transmission of binary code | |||
2871 | 7266199 | Incorporating shared randomness into distributed cryptography | |||
2872 | 7266197 | Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors | |||
2873 | 7263715 | Communications terminal operable with high security protocol | |||
2874 | 7263611 | Key management for content protection | |||
2875 | 7263508 | Method and system for online purchasing using sensor with identifier | |||
2876 | 7263501 | Point-of-care inventory management system and method | |||
2877 | 7263190 | System for securing the confidentiality of electronically stored data in the event of the physical theft thereof | |||
2878 | 7263187 | Batch mode session-based encryption of video on demand content | |||
2879 | 7262733 | Method of estimating the location of a device | |||
2880 | 7260726 | Method and apparatus for a secure computing environment | |||
2881 | 7260557 | Method and apparatus for license distribution | |||
2882 | 7260556 | Content rendering device with usage rights | |||
2883 | 7260552 | Secure remote electronic voting system and cryptographic protocols and computer programs employed | |||
2884 | 7260222 | Shared data refining device and shared data refining method | |||
2885 | 7260216 | State machine representation for encrypting and decrypting a set of data values and method for protecting the same | |||
2886 | 7260215 | Method for encryption in an un-trusted environment | |||
2887 | 7260138 | Base station transmitter and CDMA mobile communication system comprising the same | |||
2888 | 7257836 | Security link management in dynamic networks | |||
2889 | 7257718 | Cipher message assist instructions | |||
2890 | 7257714 | Electronic data storage medium with fingerprint verification capability | |||
2891 | 7257713 | Automatic password configuration during error reporting | |||
2892 | 7257708 | Steganographic authentication | |||
2893 | 7257706 | Method of securing a document in a system and controlling access to the document and a seal for use in the method | |||
2894 | 7257655 | Embedded PCI-Express implementation | |||
2895 | 7257580 | Method, system, and program for restricting modifications to allocations of computational resources | |||
2896 | 7257542 | Secure on-line ticketing | |||
2897 | 7257240 | Input device, information device, and control information generation method | |||
2898 | 7257234 | Watermark-based goods authentication | |||
2899 | 7257228 | Account authority digital signature (AADS) system using encoded information | |||
2900 | 7257225 | System and method for high speed reversible data encryption | |||
2901 | 7257224 | Cryptographical pseudo-random number generation apparatus and program | |||
2902 | 7254712 | System and method for compressing secure e-mail for exchange with a mobile data communication device | |||
2903 | 7251834 | Filtering a permission set using permission requests associated with a code assembly | |||
2904 | 7251832 | Secure streaming container | |||
2905 | 7251728 | Secure and reliable document delivery using routing lists | |||
2906 | 7251632 | Machine dependent login for on-line value-bearing item system | |||
2907 | 7251330 | Content playback system, content playback method, content playback requesting apparatus, and temporary playback apparatus | |||
2908 | 7251329 | Method and system for providing secure subscriber content data | |||
2909 | 7251325 | Public key cryptosystem using finite non abelian groups | |||
2910 | 7249259 | Hybrid signature scheme | |||
2911 | 7249257 | Digitally watermarked maps and signs and related navigational tools | |||
2912 | 7249111 | Method of assigning value codes | |||
2913 | 7249110 | Individual authentication method, individual authentication apparatus, accounting method, accounting apparatus | |||
2914 | 7249105 | BORE-resistant digital goods configuration and distribution methods and arrangements | |||
2915 | 7249103 | System and method for selectively enabling access based on lineage analysis of digital information | |||
2916 | 7249101 | Method and apparatus for transmitting and receiving a decoding key encoded with specific information to decode encrypted information of a record medium | |||
2917 | 7248739 | Semiconductor device for compressing video signals with copy protection information | |||
2918 | 7248717 | Securing media content with steganographic encoding | |||
2919 | 7248699 | Encryption method using synchronized continuously calculated pseudo-random key | |||
2920 | 7248698 | System for generating pseudorandom sequences | |||
2921 | 7248696 | Dynamic system bus encryption using improved differential transitional encoding | |||
2922 | 7248695 | Systems and methods for transmitting quantum and classical signals over an optical network | |||
2923 | 7248691 | Hashing using multiple sub-hashes | |||
2924 | 7246240 | Quantum digital signatures | |||
2925 | 7245725 | Dual processor framer | |||
2926 | 7245722 | System and method for distributing key | |||
2927 | 7245718 | Low bandwidth zero knowledge authentication protocol and device | |||
2928 | 7243239 | Click passwords | |||
2929 | 7243233 | System and method for secure communication between electronic devices | |||
2930 | 7242790 | Video steganography | |||
2931 | 7242766 | Method and system for encrypting and decrypting data using an external agent | |||
2932 | 7240363 | System and method for thwarting identity theft and other identity misrepresentations | |||
2933 | 7240037 | Method and apparatus for digitally signing an advertisement area next to a value-bearing item | |||
2934 | 7240035 | Method and apparatus for masking private mailing address information by manipulating delivery transactions | |||
2935 | 7239709 | Data recording/reproducing method, data recording/reproducing system, recording apparatus | |||
2936 | 7239708 | Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client | |||
2937 | 7237118 | Methods and systems for authentication of a user for sub-locations of a network location | |||
2938 | 7237117 | Universal secure registry | |||
2939 | 7237030 | System and method for preserving post data on a server system | |||
2940 | 7236958 | Electronic software license with software product installer identifier | |||
2941 | 7236957 | Method for remotely authorizing a payment transaction file over an open network | |||
2942 | 7236614 | Device, system, and method for identifying living bodies and renewing registration data | |||
2943 | 7236610 | Authenticating executable code and executions thereof | |||
2944 | 7236598 | Systems and methods for communication protection | |||
2945 | 7236592 | Efficient stream cipher system and method | |||
2946 | 7236590 | Method and apparatus for protecting data | |||
2947 | 7236589 | Device for point compression for Jacobians of hyperelliptic curves | |||
2948 | 7236455 | Communications between modules of a computing apparatus | |||
2949 | 7234169 | Method and apparatus for integrating and monitoring key digital cinema system components as a means to verify system integrity | |||
2950 | 7234061 | Methods and apparatus for verifying modules from approved vendors | |||
2951 | 7233970 | Computational method, system, and apparatus | |||
2952 | 7233929 | Postal system intranet and commerce processing for on-line value bearing system | |||
2953 | 7233782 | Method of generating an authentication | |||
2954 | 7233671 | Method for storing a security start value in a wireless communications system | |||
2955 | 7233664 | Dynamic security authentication for wireless communication networks | |||
2956 | 7233663 | Key generation performance improvement | |||
2957 | 7233662 | Numerical array output device, a numerical array output method, an encryption device, and a decryption device | |||
2958 | 7231657 | User authentication system and methods thereof | |||
2959 | 7231526 | System and method for validating a network session | |||
2960 | 7231370 | Method and apparatus for organizational software license sharing | |||
2961 | 7231360 | Time-based software licensing approach | |||
2962 | 7231043 | Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored | |||
2963 | 7231042 | Signal transmission apparatus and signal transmission method | |||
2964 | 7231040 | Multiprime RSA public key cryptosystem | |||
2965 | 7230990 | Multicarrier transmission system with reduced complexity channel response estimation | |||
2966 | 7228430 | Security system for preventing a personal computer from being used by an unauthorized people | |||
2967 | 7228427 | Method and system to securely distribute content via a network | |||
2968 | 7228425 | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections | |||
2969 | 7228413 | Data transmitting/receiving method and its receiver | |||
2970 | 7228339 | Information storage output system and information storage output service | |||
2971 | 7228011 | System and method for issuing a security unit after determining eligibility by image recognition | |||
2972 | 7227955 | Single-photon watch dog detector for folded quantum key distribution system | |||
2973 | 7227952 | System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media | |||
2974 | 7227951 | Enhanced ANSI X9.17 pseudorandom number generators with forward security | |||
2975 | 7227948 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
2976 | 7225448 | System and method for hibernating application state data on removable module | |||
2977 | 7225331 | System and method for securing data on private networks | |||
2978 | 7225329 | Enhanced CSU/DSU (channel service unit/data service unit) | |||
2979 | 7225262 | System and method for selecting an external user interface using spatial information | |||
2980 | 7225166 | Remote authentication of two dimensional barcoded indicia | |||
2981 | 7225165 | License-issuing system and method | |||
2982 | 7225162 | Read-only recording medium containing sample data and reproducing method thereof | |||
2983 | 7225161 | Method and system for initializing a key management system | |||
2984 | 7225160 | Digital works having usage rights and method for creating the same | |||
2985 | 7225159 | Method for authenticating and securing integrated bookstore entries | |||
2986 | 7224801 | Wireless secure device | |||
2987 | 7224800 | System and method for authentication of a roaming subscriber | |||
2988 | 7224798 | Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system | |||
2989 | 7224310 | Method and device for the recognition of the origin of encrypted data broadcasting | |||
2990 | 7222363 | Device independent authentication system and method | |||
2991 | 7222360 | Continuous biometric authentication using frame preamble for biometric data | |||
2992 | 7222240 | Token for storing installation software and drivers | |||
2993 | 7222237 | Secure multimedia data transmission method | |||
2994 | 7222233 | Method for secure remote backup | |||
2995 | 7222108 | Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method | |||
2996 | 7222106 | Mechanisms for handling software license agreements on multi-user system | |||
2997 | 7222104 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights | |||
2998 | 7222101 | System and method for securing data through a PDA portal | |||
2999 | 7221764 | Security key distribution using key rollover strategies for wireless networks | |||
3000 | 7221762 | Authenticated ID-based cryptosystem with no key escrow | |||
3001 | 7219234 | System and method for managing access rights and privileges in a data processing system | |||
3002 | 7219233 | Methods and apparatus for associating a user with content in a collaborative whiteboard system | |||
3003 | 7219222 | Method and system to grant access to software options resident on a medical imaging device | |||
3004 | 7218754 | Visual copyright protection | |||
3005 | 7218739 | Multiple user authentication for online console-based gaming | |||
3006 | 7218735 | Cryptography method on elliptic curves | |||
3007 | 7216804 | Postage metering system | |||
3008 | 7216227 | Method and system for controlling the use of addresses using address computation techniques | |||
3009 | 7216083 | Automated transaction machine digital signature system and method | |||
3010 | 7215978 | Mobile terminal apparatus, mobile terminal settings changing system, method used therefor, and program thereof | |||
3011 | 7215777 | Sending notification through a firewall over a computer network | |||
3012 | 7215775 | Ad-hoc radio communication verification system | |||
3013 | 7213150 | Method and apparatus for secure message queuing | |||
3014 | 7213146 | System and method for establishing security profiles of computers | |||
3015 | 7213144 | Efficient security association establishment negotiation technique | |||
3016 | 7213005 | Digital content distribution using web broadcasting services | |||
3017 | 7212978 | Customer valuation in a resource price manager | |||
3018 | 7212637 | Cartridge validation with radio frequency identification | |||
3019 | 7209903 | Method and system for facilitation of wireless e-commerce transactions | |||
3020 | 7209902 | Repository with security class and method for use thereof | |||
3021 | 7209898 | XML instrumentation interface for tree-based monitoring architecture | |||
3022 | 7209889 | Secure system for the issuance, acquisition, and redemption of certificates in a transaction network | |||
3023 | 7209572 | Digital watermark embedding apparatus, digital watermark extraction apparatus, and methods thereof | |||
3024 | 7209555 | Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device | |||
3025 | 7209510 | Channel estimation system for a wideband code division multiple access (WCDMA) communication system | |||
3026 | 7209029 | Electronic lock system and method for providing access thereto | |||
3027 | 7207067 | Enforcing data protection legislation in Web data services | |||
3028 | 7206938 | Key sequence rhythm recognition system and method | |||
3029 | 7206933 | Software modem with privileged mode driver authentication | |||
3030 | 7206799 | Modular multiplication method and calculating device | |||
3031 | 7206765 | System and method for supplying and managing usage rights based on rules | |||
3032 | 7206649 | Audio watermarking with dual watermarks | |||
3033 | 7203845 | Multiple trust modes for handling data | |||
3034 | 7203841 | Encryption in a secure computerized gaming system | |||
3035 | 7203839 | Method for providing secure access to information held in a shared repository | |||
3036 | 7203837 | Methods and systems for unilateral authentication of messages | |||
3037 | 7203318 | Secure transmission system for a digital trunked radio system | |||
3038 | 7203312 | Data reproduction apparatus and data reproduction module | |||
3039 | 7200869 | System and method for protecting domain data against unauthorized modification | |||
3040 | 7200751 | Watermark system | |||
3041 | 7200603 | In a data storage server, for each subsets which does not contain compressed data after the compression, a predetermined value is stored in the corresponding entry of the corresponding compression group to indicate that corresponding data is compressed | |||
3042 | 7200575 | Managing access to digital content | |||
3043 | 7200574 | System for controlling the distribution and use digital works using digital tickets | |||
3044 | 7200234 | Fingerprint, control signal for new encryption key | |||
3045 | 7200227 | Method and apparatus for facilitating efficient authenticated encryption | |||
3046 | 7200225 | Elliptic curve point ambiguity resolution apparatus and method | |||
3047 | 7197765 | Method for securely using a single password for multiple purposes | |||
3048 | 7197646 | System and method for preventing automated programs in a network | |||
3049 | 7197484 | Asset management advice system and recording medium containing program of the system | |||
3050 | 7197368 | Audio watermarking with dual watermarks | |||
3051 | 7197164 | Time-varying video watermark | |||
3052 | 7197145 | Method for setting up radio bearer in mobile communication system | |||
3053 | 7197141 | RSA cryptographic processing apparatus for IC card | |||
3054 | 7194768 | Access control for a microprocessor card | |||
3055 | 7194632 | Method for secure biometric authentication/identification, biometric data input module and verification module | |||
3056 | 7194631 | Information-processing apparatus having a user-switching function and user-switching method for use in the apparatus | |||
3057 | 7194438 | Electronic payment schemes in a mobile environment for short-range transactions | |||
3058 | 7194090 | Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium | |||
3059 | 7194089 | Method for reducing a value modulo a shared secret | |||
3060 | 7194088 | Method and system for a full-adder post processor for modulo arithmetic | |||
3061 | 7191238 | Method and system for authenticating content distribution and content reproduction requests based on biometric features | |||
3062 | 7191156 | Digital watermarking systems | |||
3063 | 7190793 | Key generation in a communication system | |||
3064 | 7190788 | Methods and apparatus for encrypting a binary string | |||
3065 | 7190787 | Stream cipher having a combiner function with storage based shuffle unit | |||
3066 | 7188362 | System and method of user and data verification | |||
3067 | 7188251 | System and method for secure message-based leasing of resources in a distributed computing environment | |||
3068 | 7188242 | Key management for content protection | |||
3069 | 7188161 | Method for configuring a network element at a customer premise via a mobile data terminal | |||
3070 | 7188087 | Devices, systems and methods for restricting use of digital content | |||
3071 | 7187780 | Image processing methods using reversible watermarking | |||
3072 | 7187770 | Method and apparatus for accelerating preliminary operations for cryptographic processing | |||
3073 | 7185362 | Method and apparatus for security in a data processing system | |||
3074 | 7185092 | Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor | |||
3075 | 7184988 | Methods for operating infrastructure and applications for cryptographically-supported services | |||
3076 | 7184985 | Method, system, and apparatus for providing secure access to a digital work | |||
3077 | 7184570 | Methods and systems for steganographic processing | |||
3078 | 7184569 | Marking articles using a covert digitally watermarked image | |||
3079 | 7184553 | Method and system for encryption of optical signals | |||
3080 | 7184549 | Method and apparatus for encryption, method and apparatus for decryption, and computer-readable medium storing program | |||
3081 | 7184546 | Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications | |||
3082 | 7181761 | Rights management inter-entity message policies and enforcement | |||
3083 | 7181431 | Interactive information services system and associated method for facilitating purchasing transactions | |||
3084 | 7181196 | Performing authentication in a communications system | |||
3085 | 7181022 | Audio watermarking to convey auxiliary information, and media embodying same | |||
3086 | 7181012 | Secured map messages for telecommunications networks | |||
3087 | 7181011 | Key bank systems and methods for QKD | |||
3088 | 7181008 | Contents management method, content management apparatus, and recording medium | |||
3089 | 7178277 | Quantum cryptography communication system and quantum cryptography key distributing method used in the same | |||
3090 | 7178038 | Apparatus and method for reproducing user data | |||
3091 | 7178031 | Wireless security access management for a portable data storage cartridge | |||
3092 | 7178030 | Electronically signing a document | |||
3093 | 7178027 | System and method for securely copying a cryptographic key | |||
3094 | 7177850 | Method and apparatus for determining a portion of total costs of an entity | |||
3095 | 7177847 | Authorization token accompanying request and including constraint tied to request | |||
3096 | 7177843 | Rights expression system | |||
3097 | 7177443 | Method and apparatus for associating identifiers with content | |||
3098 | 7177428 | System and method for downloading electronic information to a video lottery terminal | |||
3099 | 7174563 | Computer network security system and method having unilateral enforceable security policy provision | |||
3100 | 7174463 | Method and system for preboot user authentication | |||
3101 | 7174452 | Method for processing multiple security policies applied to a data packet structure | |||
3102 | 7174018 | Security framework for an IP mobility system using variable-based security associations and broker redirection | |||
3103 | 7174017 | Decryption system for encrypted audio | |||
3104 | 7174014 | Method and system for performing permutations with bit permutation instructions | |||
3105 | 7173900 | Method and apparatus for chip generation of a chip sequence | |||
3106 | 7171680 | Method and apparatus for electro-biometric identity recognition | |||
3107 | 7171567 | System for protecting information over the internet | |||
3108 | 7171566 | Data encryption and decryption | |||
3109 | 7171564 | Universal password generation method | |||
3110 | 7171554 | Method, computer program product and system for providing a switch user functionality in an information technological network | |||
3111 | 7171389 | Identification, storage and display of land data on a website | |||
3112 | 7171020 | Method for utilizing fragile watermark for enhanced security | |||
3113 | 7171016 | Method for monitoring internet dissemination of image, video and/or audio files | |||
3114 | 7171000 | Simplified addressing for private communications | |||
3115 | 7170996 | Random number generation for encrypting cellular communications | |||
3116 | 7168089 | Secured virtual network in a gaming environment | |||
3117 | 7167987 | Use of biometrics to provide physical and logic access to computer devices | |||
3118 | 7167981 | Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email | |||
3119 | 7167843 | Apparatus for private personal identification number management | |||
3120 | 7167842 | Architecture and method for operational privacy in business services | |||
3121 | 7167841 | Content distributing system, content distributing service server, and community site server | |||
3122 | 7167562 | Security method using information transmission by optical means, and an optical disk for implementing the method | |||
3123 | 7167559 | Information security device, exponentiation device, modular exponentiation device, and elliptic curve exponentiation device | |||
3124 | 7167507 | Equalizer and method for performing equalization in a wireless communications system | |||
3125 | 7165180 | Monolithic semiconductor device for preventing external access to an encryption key | |||
3126 | 7165179 | Digital signature verification and program transmission | |||
3127 | 7165173 | System and method for secure over-the-air administration of a wireless mobile station | |||
3128 | 7165051 | Electronic commerce system and method for detecting fraud | |||
3129 | 7165050 | Media on demand via peering | |||
3130 | 7164780 | Digital watermarking apparatus and methods | |||
3131 | 7164767 | Data transfer system, data transfer apparatus, data recording apparatus, and data transfer method | |||
3132 | 7164765 | Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack | |||
3133 | 7162649 | Method and apparatus for network assessment and authentication | |||
3134 | 7162641 | Weight based background discriminant functions in authentication systems | |||
3135 | 7162640 | System and method for protecting identity information | |||
3136 | 7162456 | Method for private personal identification number management | |||
3137 | 7162455 | Unique time generating device and authenticating device using the same | |||
3138 | 7162452 | Key distribution via a memory device | |||
3139 | 7162451 | Information content distribution based on privacy and/or personal information | |||
3140 | 7162429 | System and method for managing sponsorships | |||
3141 | 7162032 | Encryption of programs represented as polynomial mappings and their computations | |||
3142 | 7162031 | Method and device for cryptographically processing data | |||
3143 | 7161974 | Method for 2D antenna rake combining in a code division multiplication access system | |||
3144 | 7161973 | Pilot aided adaptive minimum mean square interference cancellation and detection | |||
3145 | 7161465 | Enhancing security for facilities and authorizing providers | |||
3146 | 7159245 | Method for protecting a portable card | |||
3147 | 7159243 | Data carrier for the storage of data and circuit arrangement for such a data carrier | |||
3148 | 7159237 | Method and system for dynamic network intrusion monitoring, detection and response | |||
3149 | 7159122 | Message digest instructions | |||
3150 | 7159114 | System and method of securely installing a terminal master key on an automated banking machine | |||
3151 | 7158953 | Method and system for limiting the use of user-specific software features | |||
3152 | 7158654 | Image processor and image processing method | |||
3153 | 7158640 | Method and apparatus for re-synchronization of a stream cipher during handoff | |||
3154 | 7158636 | Multivariable cryptosystem | |||
3155 | 7158635 | Generation of user equipment identification specific scrambling code for the high speed shared control channel | |||
2006 | |||||
3156 | 7155745 | Data storage device provided with function for user's access right | |||
3157 | 7155615 | Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller | |||
3158 | 7155611 | Method of operating a conditional access system for broadcast applications | |||
3159 | 7155607 | Method for authentication between apparatuses using challenge and response system | |||
3160 | 7155413 | Electronic apparatus and management system of the same | |||
3161 | 7155035 | Personal authentication method, personal authentication apparatus and image capturing device | |||
3162 | 7152786 | Identification document including embedded data | |||
3163 | 7152245 | Installation of black box for trusted component for digital rights management (DRM) on computing device | |||
3164 | 7152046 | Method and apparatus for tracking status of resource in a system for managing use of the resources | |||
3165 | 7152021 | Computing distortion of media signals embedded data with repetitive structure and log-polar mapping | |||
3166 | 7151842 | Watermark embedding and extracting method and embedding hardware structure used in image compression system | |||
3167 | 7151830 | Method, system, program product and state machine representation for encrypting and decrypting a message | |||
3168 | 7151829 | System and method for implementing a hash algorithm | |||
3169 | 7150042 | Techniques for performing malware scanning of files stored within a file storage device of a computer network | |||
3170 | 7150039 | Information processing system, portable electronic device, access apparatus for the portable electronic device, and method of using memory space | |||
3171 | 7149896 | Methods and systems for providing security for accessing networks, methods and systems for providing security for accessing the internet | |||
3172 | 7149895 | Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal | |||
3173 | 7149801 | Memory bound functions for spam deterrence and the like | |||
3174 | 7149722 | Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system | |||
3175 | 7149268 | Digital subscriber line driver | |||
3176 | 7149239 | Communication system and methods of estimating channel impulse responses therein | |||
3177 | 7146640 | Personal computer internet security system | |||
3178 | 7146498 | Computer and program recording medium | |||
3179 | 7146344 | Method and system for making small payments using a payment card | |||
3180 | 7146072 | All optical phase insensitive code responsive and code separator devices apparatus and method | |||
3181 | 7146025 | Apparatus and method for providing security in a base or mobile station by using detection of face information | |||
3182 | 7146006 | Method for improving a random number generator to make it more resistant against attacks by current measuring | |||
3183 | 7145939 | Receiving circuit | |||
3184 | 7143289 | System and method for delivering encrypted information in a communication network using location identity and key tables | |||
3185 | 7143288 | Secure file system server architecture and methods | |||
3186 | 7143067 | System and method for installing personal computer software | |||
3187 | 7143028 | Method and system for masking speech | |||
3188 | 7142851 | Technique for secure wireless LAN access | |||
3189 | 7142676 | Method and apparatus for secure communications using third-party key provider | |||
3190 | 7142675 | Sequence generator and method of generating a pseudo random sequence | |||
3191 | 7142672 | Method and system for transmitting sensitive information over a network | |||
3192 | 7142671 | Methods and apparatus for implementing a cryptography engine | |||
3193 | 7142670 | Space-efficient, side-channel attack resistant table lookups | |||
3194 | 7142668 | Apparatus and method for generating expression data for finite field operation | |||
3195 | 7140045 | Method and system for user information verification | |||
3196 | 7139918 | Multiple secure socket layer keyfiles for client login support | |||
3197 | 7139916 | Method and system for monitoring user interaction with a computer | |||
3198 | 7139911 | Password exposure elimination for digital signature coupling with a host identity | |||
3199 | 7139737 | Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses | |||
3200 | 7139736 | Content rendering repository | |||
3201 | 7139408 | Transform domain watermarking of image signals | |||
3202 | 7139407 | Image generation apparatus, image file generation method, image verification apparatus and image verification method | |||
3203 | 7136999 | Method and system for electronic device authentication | |||
3204 | 7136996 | One-time logon method for distributed computing systems | |||
3205 | 7136503 | Encoding hidden data | |||
3206 | 7136502 | Printing media and methods employing digital watermarking | |||
3207 | 7136490 | Electronic password wallet | |||
3208 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
3209 | 7136485 | Packetizing devices for scalable data streaming | |||
3210 | 7134138 | Methods and apparatus for providing security for a data storage system | |||
3211 | 7134137 | Providing data to applications from an access system | |||
3212 | 7134026 | Data terminal device providing backup of uniquely existable content data | |||
3213 | 7134019 | Methods and systems for unilateral authentication of messages | |||
3214 | 7133526 | System and method for providing WLAN security through synchronized update and rotation of WEP keys | |||
3215 | 7133523 | Method and system for solving the word problem in braid group cryptosystems | |||
3216 | 7133522 | Method and apparatus for encryption of data | |||
3217 | 7133029 | Keypad | |||
3218 | 7131145 | Method for signalling tampering of remotely positioned components by tagging and global positioning system monitoring | |||
3219 | 7131132 | Automatic access denial | |||
3220 | 7131009 | Multiple factor-based user identification and authentication | |||
3221 | 7131007 | System and method of retrieving a watermark within a signal | |||
3222 | 7131006 | Cryptographic techniques for a communications network | |||
3223 | 7131001 | Apparatus and method for secure filed upgradability with hard wired public key | |||
3224 | 7130829 | Digital rights management | |||
3225 | 7130442 | Protecting images with an image watermark | |||
3226 | 7130424 | Systems and methods for utilizing an application from a native portable device within a non-native communications network | |||
3227 | 7130423 | Threshold encoding of frame buffers | |||
3228 | 7130087 | Methods and apparatus to produce security documents | |||
3229 | 7127742 | Establishing a secure connection with a private corporate network over a public network | |||
3230 | 7127432 | System for enabling data processing while maintaining confidentiality | |||
3231 | 7127233 | Technique for controlling fraudulent use of a telecommunication service including information assistance | |||
3232 | 7127068 | Geographical comparison system and method | |||
3233 | 7127067 | Secure patch system | |||
3234 | 7126936 | Wireless network for transmitting parameters for an encoded data transmission | |||
3235 | 7124444 | Method of converting audio data for a portable device and reproducing the converted audio data | |||
3236 | 7124300 | Handheld computer system configured to authenticate a user and power-up in response to a single action by the user | |||
3237 | 7124115 | Micro payment-based advertising | |||
3238 | 7123721 | Enhanced subscriber authentication protocol | |||
3239 | 7123720 | Key scheduler for encryption apparatus using data encryption standard algorithm | |||
3240 | 7123719 | Method and apparatus for providing authentication in a communication system | |||
3241 | 7123717 | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | |||
3242 | 7123645 | Spread-spectrum signal receiver | |||
3243 | 7123644 | Peak cancellation apparatus of base station transmission unit | |||
3244 | 7120933 | Method for intrusion detection in a database system | |||
3245 | 7120928 | Secure selective sharing of account information on an internet information aggregation system | |||
3246 | 7120797 | Methods for authenticating potential members invited to join a group | |||
3247 | 7120608 | Systems and methods for implementing person-to-person money exchange | |||
3248 | 7120422 | Method, element and system for securing communication between two parties | |||
3249 | 7120421 | Wireless network with a cipher key change procedure | |||
3250 | 7120255 | Java applications for secured palm held cellular communications | |||
3251 | 7120254 | Cryptographic system and method for geolocking and securing digital information | |||
3252 | 7117376 | Platform and method of creating a secure boot that enforces proper user authentication and enforces hardware configurations | |||
3253 | 7117372 | Programmable logic device with decryption and structure for preventing design relocation | |||
3254 | 7117369 | Portable smart card secured memory system for porting user profiles and documents | |||
3255 | 7117356 | Systems and methods for secure biometric authentication | |||
3256 | 7117183 | Airline ticket payment and reservation system and methods | |||
3257 | 7116970 | Selection of networks between WLAN and 2G/3G networks based on user and provider preferences | |||
3258 | 7116785 | Data processing system, data processing method, and program providing medium | |||
3259 | 7116784 | Method and apparatus for authenticated reporting in a mobile communication device | |||
3260 | 7116783 | Non-deterministic method for secured data transfer | |||
3261 | 7116782 | Encryption in a secure computerized gaming system | |||
3262 | 7116738 | Data synchronization apparatus and method | |||
3263 | 7116702 | Signal processing method and apparatus in CDMA radio communication system | |||
3264 | 7114180 | Method and system for authenticating and authorizing requestors interacting with content servers | |||
3265 | 7114167 | Content control in a device environment | |||
3266 | 7114080 | Architecture for secure remote access and transmission using a generalized password scheme with biometric features | |||
3267 | 7114079 | Security access based on facial features | |||
3268 | 7114075 | User authentication apparatus, method of user authentication, and storage medium therefor | |||
3269 | 7114070 | System and method for automatic digital certificate installation on a network device in a data-over-cable system | |||
3270 | 7113979 | System, method and article of manufacture for enhancing electronic messages | |||
3271 | 7113929 | System for voucher or token verification | |||
3272 | 7113925 | Electronic check | |||
3273 | 7113615 | Watermark embedder and reader | |||
3274 | 7113614 | Embedding auxiliary signals with multiple components into media signals | |||
3275 | 7113601 | Method and apparatus for performing secure communications | |||
3276 | 7113600 | Base transceiver station automatic encryption handling | |||
3277 | 7113598 | Methods and systems for high-data-rate quantum cryptography | |||
3278 | 7113594 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
3279 | 7113593 | Recursive cryptoaccelerator and recursive VHDL design of logic circuits | |||
3280 | 7111173 | Encryption process including a biometric unit | |||
3281 | 7111167 | Digital watermarks with values derived from remote platforms | |||
3282 | 7111166 | Extending the range of computational fields of integers | |||
3283 | 7111164 | Crisis management system, computer, and computer memory product | |||
3284 | 7110987 | Secure online purchasing | |||
3285 | 7110543 | Content management system, content management terminal, usage rule management server, content management method, and content management program | |||
3286 | 7110541 | Systems and methods for policy based printing | |||
3287 | 7110538 | Method for accelerating cryptographic operations on elliptic curves | |||
3288 | 7109986 | Illumination apparatus | |||
3289 | 7107620 | Authentication in a packet data network | |||
3290 | 7107457 | Optical card based system for individualized tracking and record keeping | |||
3291 | 7107449 | Digital certificates | |||
3292 | 7107051 | Technique to establish wireless session keys suitable for roaming | |||
3293 | 7106864 | Chaos-based data protection using time-discrete dynamical systems | |||
3294 | 7106863 | Method for positioning by satellites | |||
3295 | 7106860 | System and method for executing Advanced Encryption Standard (AES) algorithm | |||
3296 | 7106783 | Method and apparatus for searching multipaths of mobile communication system | |||
3297 | 7106780 | Rake-based CDMA receivers for multiple receiver antennas | |||
3298 | 7106720 | User equipment for detecting short codes | |||
3299 | 7103911 | Identity-based-encryption system with district policy information | |||
3300 | 7103775 | Signature calculation system by use of mobile agent | |||
3301 | 7103576 | System for providing cardless payment | |||
3302 | 7103573 | User rewards program and associated communications system | |||
3303 | 7103197 | Arrangement for embedding subliminal data in imaging | |||
3304 | 7103181 | State-varying hybrid stream cipher | |||
3305 | 7103084 | Apparatus and method for searching preamble signal based on small search window | |||
3306 | 7100053 | Monitoring and managing user access to content via a portable data storage medium | |||
3307 | 7100045 | System, method, and program for ensuring originality | |||
3308 | 7100044 | Public key certificate using system, public key certificate using method, information processing apparatus, and program providing medium | |||
3309 | 7099850 | Methods for providing cardless payment | |||
3310 | 7099847 | Apparatus, methods and articles of manufacture for construction and maintaining a calendaring interface | |||
3311 | 7099492 | Method of steganographically embedding geo-location data in media | |||
3312 | 7099471 | Detecting compromised ballots | |||
3313 | 7099374 | Wireless communication systems and methods for long-code communications for regenerative multiple user detection involving matched-filter outputs | |||
3314 | 7096504 | Distribution system, semiconductor memory card, receiving apparatus, computer-readable recording medium and receiving method | |||
3315 | 7096367 | System and methods for caching in connection with authorization in a computer system | |||
3316 | 7096365 | Digital signature | |||
3317 | 7096355 | Dynamic encoding algorithms and inline message decryption | |||
3318 | 7096352 | Security protocol structure in application layer | |||
3319 | 7096201 | Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system | |||
3320 | 7096200 | System and method for evaluating and enhancing source anonymity for encrypted web traffic | |||
3321 | 7095871 | Digital asset management and linking media signals with related data using watermarks | |||
3322 | 7095856 | Method and apparatus to maintain encryption synchronization in a multi-modulation TDM system | |||
3323 | 7095851 | Voice and data encryption method using a cryptographic key split combiner | |||
3324 | 7095791 | OFDM interference cancellation based on training symbol interference | |||
3325 | 7093298 | Apparatus and method for security object enhancement and management | |||
3326 | 7093291 | Method and system for detecting and preventing an intrusion in multiple platform computing environments | |||
3327 | 7093286 | Method and system for exchanging sensitive information in a wireless communication system | |||
3328 | 7093131 | Information authenticating apparatus and authenticating station | |||
3329 | 7093125 | Rote based tool delegation | |||
3330 | 7092913 | System for inexpensively executing online purchases | |||
3331 | 7092525 | Cryptographic system with enhanced encryption function and cipher key for data encryption standard | |||
3332 | 7092524 | Device for and method of cryptographically wrapping information | |||
3333 | 7092522 | Apparatus for solving system of equations on finite field and apparatus for inverting element of extension field | |||
3334 | 7092427 | Direct sequence modulation using time, frequency, and/or on-off keying | |||
3335 | 7089587 | ISCSI target offload administrator | |||
3336 | 7089553 | Method, system, computer program product, and article of manufacture for downloading a remote computer program according to a stored configuration | |||
3337 | 7089427 | Security system method and apparatus for preventing application program unauthorized use | |||
3338 | 7089426 | Method and system for encryption | |||
3339 | 7089421 | Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | |||
3340 | 7089416 | Information communication apparatus and method, information communication system, and memory medium | |||
3341 | 7088824 | Single-photon-emission apparatus | |||
3342 | 7088823 | System and method for secure distribution and evaluation of compressed digital information | |||
3343 | 7088822 | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith | |||
3344 | 7085744 | Method and system for conducting a transaction over a network | |||
3345 | 7085739 | Method and system for facilitating, coordinating and managing a competitive marketplace | |||
3346 | 7085383 | Secured cellular telephone communications system, method, and computer program product | |||
3347 | 7085382 | Communication device, communication device set, authentication method and method of wireless-connecting terminals | |||
3348 | 7085376 | Method and system for securely exchanging encryption key determination information | |||
3349 | 7085313 | Multiple channel joint decoding at mobile handset | |||
3350 | 7082540 | System and method for tracking programmable devices that use intellectual property | |||
3351 | 7082535 | System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol | |||
3352 | 7082200 | Establishing secure peer networking in trust webs on open networks using shared secret device key | |||
3353 | 7080405 | Limiting device function | |||
3354 | 7080253 | Audio fingerprinting | |||
3355 | 7080045 | Electronic revenue stamp issuing apparatus and method thereof and recording medium stored control program thereof | |||
3356 | 7079656 | Method and communications system for ciphering information for a radio transmission and for authenticating subscribers | |||
3357 | 7079655 | Encryption algorithm management system | |||
3358 | 7079652 | Login renewal based on device surroundings | |||
3359 | 7079650 | Computing method for elliptic curve cryptography | |||
3360 | 7079649 | Copy protection of data | |||
3361 | 7079648 | Tester of cryptographic service providers | |||
3362 | 7076664 | User confirmation system and method | |||
3363 | 7076663 | Integrated system security method | |||
3364 | 7076084 | Methods and objects employing machine readable data | |||
3365 | 7076082 | Media signal filtering for use in digital watermark reading | |||
3366 | 7076066 | LapDesk | |||
3367 | 7076061 | Efficient and compact subgroup trace representation ("XTR") | |||
3368 | 7073067 | Authentication system and method based upon random partial digitized path recognition | |||
3369 | 7072493 | Robust and stealthy video watermarking into regions of successive frames | |||
3370 | 7072473 | Method and system for secure delivery and retrieval of documents utilizing a facsimile machine | |||
3371 | 7069595 | Method of controlling use of digitally encoded products | |||
3372 | 7069593 | Device and method for making secure an integrated circuit | |||
3373 | 7069592 | Web-based document system | |||
3374 | 7069589 | Detection of a class of viral code | |||
3375 | 7069436 | Information transmission system and method, transmitting apparatus, receiving apparatus, data processing device and data processing method, and recording medium | |||
3376 | 7069434 | Secure data transfer method and system | |||
3377 | 7069249 | Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party | |||
3378 | 7068812 | Decoding hidden data from imagery | |||
3379 | 7068811 | Protecting images with image markings | |||
3380 | 7068707 | Method and apparatus for tracking signals in a wireless communication system | |||
3381 | 7068701 | Data transmission and reception within a spread-spectrum communication system | |||
3382 | 7065790 | Method and system for providing computer malware names from multiple anti-virus scanners | |||
3383 | 7065643 | Network compromise recovery methods and apparatus | |||
3384 | 7065505 | Method for metering and pricing of digital works | |||
3385 | 7065503 | Cookie data stored on transportable recording medium | |||
3386 | 7065131 | Processor and method for weight detection in a closed loop diversity mode WCDMA system | |||
3387 | 7065130 | Searching for signals in a communications system | |||
3388 | 7062656 | Method for providing secure access to information held in a shared respiratory | |||
3389 | 7062655 | Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords | |||
3390 | 7062649 | System and method for categorizing security profile rules within a computer system | |||
3391 | 7062465 | Methods and apparatus for providing agent controlled synchronized browsing at a terminal | |||
3392 | 7062070 | Image marking adapted to the image | |||
3393 | 7062069 | Digital watermark embedding and decoding using encryption keys | |||
3394 | 7062044 | Method of elliptic curve cryptographic key agreement using coefficient splitting | |||
3395 | 7062043 | Method of elliptic curve digital signature using coefficient splitting | |||
3396 | 7058978 | Security component for a computing device | |||
3397 | 7058971 | Access privilege transferring method | |||
3398 | 7058806 | Method and apparatus for secure leveled access control | |||
3399 | 7058613 | Device and method for user identification check based on user-specific formula | |||
3400 | 7058607 | Contents distribution method and system | |||
3401 | 7058606 | Method for loaning digital works | |||
3402 | 7058600 | Integrated proxy interface for web based data management reports | |||
3403 | 7058402 | Subscribers database proofing using a checksum in a telecommunications system | |||
3404 | 7054843 | Method and apparatus in a telecommunications system | |||
3405 | 7054465 | Data hiding method and system for embedding and extracting information in signals | |||
3406 | 7054444 | Public and private key cryptographic method | |||
3407 | 7054379 | Data scrambler generation of pseudo-random bit sequence for semi-stationary Q-mode signal | |||
3408 | 7054354 | Multicarrier transmission system with reduced complexity leakage matrix multiplication | |||
3409 | 7051210 | Persistance and recovery of security keys | |||
3410 | 7051209 | System and method for creation and use of strong passwords | |||
3411 | 7050582 | Pseudo-random one-to-one circuit synthesis | |||
3412 | 7047421 | Data signal with a database and a compressed key | |||
3413 | 7047418 | Imaging method and device using biometric information for operator authentication | |||
3414 | 7047405 | Method and apparatus for providing secure processing and data storage for a wireless communication device | |||
3415 | 7047404 | Method and apparatus for self-authenticating digital records | |||
3416 | 7046807 | Data administration method | |||
3417 | 7046801 | Method of calculating multiplication by scalars on an elliptic curve and apparatus using same and recording medium | |||
3418 | 7046719 | Soft handoff between cellular systems employing different encoding rates | |||
3419 | 7043760 | System and method for establishing and managing relationships between pseudonymous identifications and memberships in organizations | |||
3420 | 7043643 | Method and apparatus for operating a computer in a secure mode | |||
3421 | 7043641 | Encryption in a secure computerized gaming system | |||
3422 | 7043581 | Resource sequester mechanism | |||
3423 | 7043453 | Method and system for conducting transactions between repositories using a repository transaction protocol | |||
3424 | 7043052 | Digital authentication with analog documents | |||
3425 | 7043023 | Software defined radio and radio system | |||
3426 | 7043016 | Substitution-box for symmetric-key ciphers | |||
3427 | 7043015 | Methods for point compression for Jacobians of hyperelliptic curves | |||
3428 | 7042928 | Method and apparatus for pilot estimation using prediction error method | |||
3429 | 7042923 | Method and apparatus for frequency hopping in a spread spectrum digital cordless telephone system | |||
3430 | 7039811 | Apparatus and method for controlling access to contents stored in card like electronic equipment | |||
3431 | 7039809 | Asymmetric encrypted pin | |||
3432 | 7039613 | System and method for controlling distribution and use of digital works using price specifications | |||
3433 | 7039190 | Wireless LAN WEP initialization vector partitioning scheme | |||
3434 | 7039189 | Stream continuity enforcement | |||
3435 | 7038600 | Method and device for adding or extracting a secondary information signal to/from a RLL code sequence | |||
3436 | 7036019 | Method for controlling database copyrights | |||
3437 | 7035427 | Method and system for managing, accessing and paying for the use of copyrighted electronic media | |||
3438 | 7035411 | Encryption method and apparatus encrypting and adding signature information to qubits | |||
3439 | 7035407 | Data transmission system for prevention of unauthorized copy of data from recording medium | |||
3440 | 7035404 | Method and apparatus for shuffle with proof, method and apparatus for shuffle verification, method and apparatus for generating input message sequence and program for same | |||
3441 | 7032242 | Method and system for distributed network address translation with network security features | |||
3442 | 7032111 | Method for optimizing of data transmission | |||
3443 | 7031493 | Method for generating and detecting marks | |||
3444 | 7031473 | Network architecture for secure communications between two console-based gaming systems | |||
3445 | 7028340 | Apparatus, a system and method for controlling access to contents | |||
3446 | 7028192 | Method and apparatus that enable a computer user to verify whether they have correctly input their password into a computer | |||
3447 | 7027598 | Residue number system based pre-computation and dual-pass arithmetic modular operation approach to implement encryption protocols efficiently in electronic integrated circuits | |||
3448 | 7027597 | Pre-computation and dual-pass modular arithmetic operation approach to implement encryption protocols efficiently in electronic integrated circuits | |||
3449 | 7027487 | Combination power/inphase correlator for spread spectrum receiver | |||
3450 | 7024690 | Protected mutual authentication over an unsecured wireless communication channel | |||
3451 | 7024686 | Secure network and method of establishing communication amongst network devices that have restricted network connectivity | |||
3452 | 7024554 | Systems and methods that authorize target devices utilizing proprietary software and/or hardware | |||
3453 | 7024552 | Location authentication of requests to a web server system linked to a physical entity | |||
3454 | 7024392 | Method for controlling use of database content | |||
3455 | 7024016 | Digital watermarking apparatus and methods | |||
3456 | 7023996 | Encryption for asymmetric data links | |||
3457 | 7023990 | Secure parameter generating device and parameter generating method in algebraic curve crytography | |||
3458 | 7023905 | Correlation and demodulation circuit for a receiver for signals modulated by a specific code | |||
3459 | 7023902 | Apparatus and method for scalable offline CDMA demodulation | |||
3460 | 7020779 | Secure, distributed e-mail system | |||
3461 | 7020778 | Method for issuing an electronic identity | |||
3462 | 7020282 | Simplified secure, swift cryptographic key exchange | |||
3463 | 7020184 | Store and forward handoff | |||
3464 | 7020182 | Apparatus comprising a receiving device working with space diversity and processing method for signal received over various channels | |||
3465 | 7020179 | Base station transmitter in CDMA system | |||
3466 | 7020178 | Microprocessor decoder frequency hopping spread spectrum communications receiver | |||
3467 | 7017182 | Method of securely transmitting information | |||
3468 | 7017042 | Method and circuit to accelerate IPSec processing | |||
3469 | 7016846 | Robust checksums | |||
3470 | 7016516 | Authentication of identification documents | |||
3471 | 7013388 | Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system | |||
3472 | 7013295 | Tagged private information retrieval | |||
3473 | 7012951 | Symbol combining method for reducing the number of FIFO registers of finger, rake receiver and method for driving the rake receiver | |||
3474 | 7012932 | Digital broadcast data receiving apparatus | |||
3475 | 7010683 | Public key validation service | |||
3476 | 7010019 | Assessment of delay estimation quality using interference estimates | |||
3477 | 7010018 | Fast acquisition procedure for TDD W-CDMA | |||
3478 | 7007300 | Secure booting of a personal computer system | |||
3479 | 7007168 | User authentication using member specifying discontinuous different coordinates | |||
3480 | 7007000 | Secure online purchasing | |||
3481 | 7006655 | Methods, apparatus and systems for an electronic watermark having resistance to scaling | |||
3482 | 7006627 | Cipher block chaining mode in encryption/decryption processing | |||
3483 | 7003667 | Targeted secure printing | |||
3484 | 7003665 | Method for the secure transmission of messages | |||
3485 | 7003500 | Retail point of sale (RPOS) apparatus for internet merchandising | |||
3486 | 7003132 | Embedding hidden auxiliary code signals in media | |||
3487 | 7003115 | Communication apparatus, communication system and method of the same | |||
3488 | 7003112 | Extensible GPS receiver system | |||
3489 | 7000108 | System, apparatus and method for presentation and manipulation of personal information syntax objects | |||
3490 | 7000105 | System and method for transparently providing certificate validation and other services within an electronic transaction | |||
3491 | 6999589 | Method and system for automatic brokered transactions | |||
3492 | 6996719 | Secure password entry | |||
3493 | 6996718 | System and method for providing access to multiple user accounts via a common password | |||
3494 | 6996545 | Reproduction apparatus and reproduction method of digital video signal or audio signal | |||
3495 | 6996252 | Low visibility watermark using time decay fluorescence | |||
3496 | 6996237 | Apparatus and methods for including codes in audio signals | |||
3497 | 6996233 | System and method for encrypting and verifying messages using three-phase encryption | |||
3498 | 6996163 | Walsh-Hadamard decoder | |||
3499 | 6996159 | Reducing spread spectrum noise | |||
3500 | 6996154 | Low power dual protocol transceiver | |||
3501 | 6993152 | Hiding geo-location data through arrangement of objects | |||
3502 | 6992563 | Method for protecting devices, specially car radios, against theft | |||
3503 | 6990588 | Authentication card system | |||
3504 | 6990578 | Method and apparatus for encrypting electronic messages composed using abbreviated address books | |||
3505 | 6990199 | Apparatus and method for cipher processing system using multiple port memory and parallel read/write operations | |||
3506 | 6989733 | Method and system for adapting a telephone line modem for use on the power line | |||
3507 | 6988205 | Method and apparatus for the secure storage of audio signals | |||
3508 | 6987862 | Video steganography | |||
3509 | 6986057 | Security device and method | |||
3510 | 6986056 | Method and arrangement for generating binary sequences of random numbers | |||
3511 | 6986044 | Method for group unit encryption/decryption, and method and apparatus for writing signature | |||
3512 | 6985886 | Method and apparatus for a mortgage loan management system | |||
3513 | 6985600 | Printing media and methods employing digital watermarking | |||
3514 | 6985590 | Electronic watermarking method and apparatus for compressed audio data, and system therefor | |||
3515 | 6985587 | Method and system for calling line authenticated key distribution | |||
3516 | 6985510 | Method and system for data and voice transmission over shared and dedicated channels | |||
3517 | 6983371 | Super-distribution of protected digital content | |||
3518 | 6983309 | Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium | |||
3519 | 6983009 | Median weighted tracking for spread-spectrum communications | |||
2005 | |||||
3520 | 6967992 | Method and apparatus for receiving GPS/GLONASS signals | |||
3521 | 6965998 | Time stamping method using time-based signature key | |||
3522 | 6965683 | Routing networks for use with watermark systems | |||
3523 | 6965673 | Method of using transient faults to verify the security of a cryptosystem | |||
3524 | 6963977 | Circuits and methods for modular exponentiation | |||
3525 | 6963975 | System and method for audio fingerprinting | |||
3526 | 6961558 | Method and receiver for receiving a radio broadcast signal having encoded contents | |||
3527 | 6959386 | Hiding encrypted messages in information carriers | |||
3528 | 6957338 | Individual authentication system performing authentication in multiple steps | |||
3529 | 6957329 | System for encrypting data from multiple multimedia applications and method thereof | |||
3530 | 6956890 | Process and device for the generation of codes, for example channeling codes for CDMA applications | |||
3531 | 6954738 | Method and apparatus for distributing enforceable property rights | |||
3532 | 6952477 | Fault intolerant cipher chaining | |||
3533 | 6950932 | Security association mediator for java-enabled devices | |||
3534 | 6950810 | Tokenless biometric electronic financial transactions via a third party identicator | |||
3535 | 6950532 | Visual copyright protection | |||
3536 | 6948069 | Method and system for determining and maintaining trust in digital image files with certifiable time | |||
3537 | 6947571 | Cell phones with optical capabilities, and related applications | |||
3538 | 6944482 | Visualization supplemented wireless mobile telephony | |||
3539 | 6941457 | Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key | |||
3540 | 6940841 | Packet-switched spread-spectrum system | |||
3541 | 6934388 | Method and apparatus for generating random permutations | |||
3542 | 6931381 | Methods and apparatus for authenticating the download of information onto a smart card | |||
3543 | 6931131 | Method and apparatus for online geographic and user verification and restriction using a GPS system | |||
3544 | 6928557 | Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment | |||
3545 | 6928167 | Method for managing public key | |||
3546 | 6928103 | Rach receiving apparatus | |||
3547 | 6925563 | Multiplication of modular numbers | |||
3548 | 6922784 | Administrative security systems and methods | |||
3549 | 6920563 | System and method to securely store information in a recoverable manner on an untrusted system | |||
3550 | 6920173 | Spread-spectrum signal receiver apparatus and interference cancellation apparatus | |||
3551 | 6920171 | Multiple access frequency hopping network with interference anticipation | |||
3552 | 6918044 | Password protection for high reliability computer systems | |||
3553 | 6918039 | Method and an apparatus for detecting a need for security and invoking a secured presentation of data | |||
3554 | 6914985 | Method and system for presentation and manipulation of PKCS enveloped-data objects | |||
3555 | 6912658 | Hiding of encrypted data | |||
3556 | 6912241 | Chip-interleaved, block-spread multi-user communication | |||
3557 | 6907524 | Extensible firmware interface virus scan | |||
3558 | 6907127 | Hierarchical key management encoding and decoding | |||
3559 | 6907124 | Optical encryption and decryption method and system | |||
3560 | 6907123 | Secure voice communication system | |||
3561 | 6904528 | Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus | |||
3562 | 6901121 | Compensation of DC offset impairment in a communications receiver | |||
3563 | 6898288 | Method and system for secure key exchange | |||
3564 | 6894997 | Packet spread-spectrum transmitter | |||
3565 | 6889206 | Method for computer network operation providing basis for usage fees | |||
3566 | 6888943 | Multimedia adaptive scrambling system (MASS) | |||
3567 | 6888878 | Signal combining within a communication system | |||
3568 | 6883137 | System and method for schema-driven compression of extensible mark-up language (XML) documents | |||
3569 | 6882729 | System and method for limiting access to data | |||
3570 | 6882679 | Extension of wireless local area network communication system to accommodate higher data rates while preserving legacy receiver features | |||
3571 | 6882678 | Method and system for canceling multiple access interference in CDMA wireless communication system | |||
3572 | 6877096 | Modular computer applications with expandable capabilities | |||
3573 | 6877095 | Session-state manager | |||
3574 | 6876695 | Method and apparatus for reducing spread spectrum noise | |||
3575 | 6874030 | PPP domain name and L2TP tunnel selection configuration override | |||
3576 | 6873977 | Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries | |||
3577 | 6873707 | Hardware-based encryption/decryption employing cycle stealing | |||
3578 | 6873649 | Method and apparatus for detecting a stationary dither code | |||
3579 | 6868114 | Interference suppression in a spread spectrum communications system using non-linear frequency domain excision | |||
3580 | 6862641 | Interruptable and re-enterable system management mode programming code | |||
3581 | 6856687 | Portable telecommunication security device | |||
3582 | 6856686 | Method and apparatus for securing e-mail attachments | |||
3583 | 6850782 | Wireless device with vibrational communication capabilities | |||
3584 | 6848050 | System and method for alternative encryption techniques | |||
3585 | 6839852 | Firewall system and method with network mapping capabilities | |||
2004 | |||||
3586 | 6834075 | Method for improving multipath searcher speed | |||
3587 | 6832317 | Personal computer security mechanism | |||
3588 | 6823455 | Method for robust watermarking of content | |||
3589 | 6823451 | Integrated circuit for security and manageability | |||
3590 | 6820203 | Security unit for use in memory card | |||
3591 | 6801625 | Apparatus and method for stripping parity bits from an input stream | |||
3592 | 6792112 | Encrypting communications between wireless mobile units | |||
3593 | 6785813 | Key agreement and transport protocol with implicit signatures | |||
3594 | 6782102 | Multiple format secure voice apparatus for communication handsets | |||
3595 | 6782101 | Encryption using fractal key | |||
3596 | 6775781 | Administrative security systems and methods | |||
3597 | 6771796 | Methods for identifying equipment used in counterfeiting | |||
3598 | 6766454 | System and method for using an authentication applet to identify and authenticate a user in a computer network | |||
3599 | 6754346 | Method for tracing the distribution of physical digital media | |||
3600 | 6748395 | System and method for dynamic playlist of media | |||
3601 | 6741636 | System and method for converting data into a noise-like waveform | |||
3602 | 6738905 | Conditional access via secure logging with simplified key management | |||
3603 | 6738411 | Simultaneous plural code series generator and CDMA radio receiver using same | |||
3604 | 6735310 | Technique of password encryption and decryption for user authentication in a federated content management system | |||
3605 | 6735297 | System for maintaining PBX license key information in the event of a hardware failure reducing MTTR | |||
3606 | 6735264 | Compensation for non-linear distortion in a modem receiver | |||
3607 | 6731674 | Device and method for generating quasi-orthogonal code and spreading channel signals in mobile communication system | |||
3608 | 6728305 | Simultaneous plural code series generator and CDMA radio receiver using same | |||
3609 | 6724838 | Methods and apparatus to despread dual codes for CDMA systems | |||
3610 | 6718038 | Cryptographic method using modified fractional fourier transform kernel | |||
3611 | 6678309 | CDMA base station system | |||
2003 | |||||
3612 | 6671331 | Carrier detecting circuit for detecting the level of a received signal and communication apparatus | |||
3613 | 6662166 | Tokenless biometric electronic debit and credit transactions | |||
3614 | 6658113 | Apparatus and method for concealing data bursts in an analog scrambler using audio repetition | |||
3615 | 6654480 | Audio appliance and monitoring device responsive to watermark data | |||
3616 | 6647149 | Methods and apparatus for securely transmitting and processing digital image data | |||
3617 | 6647129 | Method and system for encoding image and audio content | |||
3618 | 6628701 | Method and apparatus for reducing spread spectrum noise | |||
3619 | 6624773 | Data encryption and signal scrambling using programmable data conversion arrays | |||
3620 | 6594362 | Radio data transmission apparatus | |||
3621 | 6587821 | Methods for decoding watermark data from audio, and controlling audio devices in accordance therewith | |||
3622 | 6581042 | Tokenless biometric electronic check transactions | |||
3623 | 6580809 | Quantization-based data hiding employing calibration and locally adaptive quantization | |||
3624 | 6577732 | Hierarchical encryption technique for dense wavelength division multiplexed systems using a wavelength bus architecture | |||
3625 | 6567780 | Audio with hidden in-band digital data | |||
3626 | 6560350 | Methods for detecting alteration of audio | |||
3627 | 6560349 | Audio monitoring using steganographic information | |||
3628 | 6557103 | Spread spectrum image steganography | |||
3629 | 6542618 | Methods for watermark decoding | |||
3630 | 6539095 | Audio watermarking to convey auxiliary control information, and media embodying same | |||
3631 | 6529602 | Method and apparatus for the secure storage of audio signals | |||
3632 | 6519699 | Method and system for voice guided secure entry of private data in a public setting | |||
3633 | 6519352 | Encoding and decoding in accordance with steganographically-conveyed data | |||
3634 | 6519340 | Method and apparatus for encryption using partial information | |||
3635 | 6519299 | Methods and apparatus to despread dual codes for CDMA systems | |||
2002 | |||||
3636 | 6498851 | Data encryption and signal scrambling using programmable data conversion arrays | |||
3637 | 6496591 | Video copy-control with plural embedded signals | |||
3638 | 6496582 | Information processing apparatus and method therefor | |||
3639 | 6483927 | Synchronizing readers of hidden auxiliary data in quantization-based data hiding schemes | |||
3640 | 6466607 | Hybrid spread spectrum method and system for wirelessly transmitting and receiving wideband digital data | |||
3641 | 6463089 | Hybrid spread spectrum method and system for wirelessly transmitting and receiving wideband digital data | |||
3642 | 6456647 | Two step signal recovery scheme for a receiver | |||
3643 | 6449379 | Video steganography methods avoiding introduction of fixed pattern noise | |||
3644 | 6446210 | Method for securing communication by selecting an encoding process using a first computer based upon ability of a second computer and deleting the process thereafter | |||
3645 | 6438252 | Method for encoding bits in a signal | |||
3646 | 6430691 | Stand-alone telecommunications security device | |||
3647 | 6426977 | System and method for applying and removing Gaussian covering functions | |||
3648 | 6418323 | Wireless mobile phone with Morse code and related capabilities | |||
3649 | 6408017 | High speed demux parallel correlator system | |||
3650 | 6407699 | Method and device for rapidly extracting time and frequency parameters from high dynamic direct sequence spread spectrum radio signals under interference | |||
3651 | 6404898 | Method and system for encoding image and audio content | |||
3652 | 6400827 | Methods for hiding in-band digital data in images and video | |||
3653 | 6397198 | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor | |||
3654 | 6373879 | Device and method for generating spread spectrum signals | |||
3655 | 6370182 | Integrated beamforming/rake/mud CDMA receiver architecture | |||
3656 | 6363159 | Consumer audio appliance responsive to watermark data | |||
3657 | 6363150 | Billing method for customers having IP telephony service with multiple levels of security | |||
3658 | 6356638 | Radio wireline interface and method for secure communication | |||
3659 | 6353672 | Steganography using dynamic codes | |||
3660 | 6343138 | Security documents with hidden digital data | |||
2001 | |||||
3661 | 6330335 | Audio steganography | |||
3662 | 6317835 | Method and system for entry of encrypted and non-encrypted information on a touch screen | |||
3663 | 6317123 | Progressively generating an output stream with realtime properties from a representation of the output stream which is not monotonic with regard to time | |||
3664 | 6314192 | System, method, and product for information embedding using an ensemble of non-intersecting embedding generators | |||
3665 | 6301360 | Method of encoding information using a position-based encoding scheme | |||
3666 | 6289108 | Methods for detecting alteration of audio and images | |||
3667 | 6285776 | Methods for identifying equipment used in counterfeiting | |||
3668 | 6275679 | Secure communication using array transmitter | |||
3669 | 6275573 | System and method for secured network access | |||
3670 | 6266430 | Audio or video steganography | |||
3671 | 6266418 | Encryption and authentication methods and apparatus for securing telephone communications | |||
3672 | 6266412 | Encrypting speech coder | |||
3673 | 6263087 | Method of encoding bits in a signal | |||
3674 | 6252961 | Method and apparatus for performing data encryption and error code correction | |||
3675 | 6233347 | System method, and product for information embedding using an ensemble of non-intersecting embedding generators | |||
3676 | 6219423 | System and method for digitally signing a digital agreement between remotely located nodes | |||
3677 | 6202056 | Method for computer network operation providing basis for usage fees | |||
3678 | 6173403 | Method and apparatus for distributing information products | |||
2000 | |||||
3679 | 6157679 | Method of adding encryption/encoding element to the modulation/demodulation process | |||
3680 | 6125182 | Cryptographic engine using logic and base conversions | |||
3681 | 6097939 | Method and apparatus for event data maintenance per MIN/ESN pair in a mobile telephone system | |||
3682 | 6094485 | SSL step-up | |||
3683 | 6088451 | Security system and method for network element access | |||
3684 | 6081784 | Methods and apparatus for encoding, decoding, encrypting and decrypting an audio signal, recording medium therefor, and method of transmitting an encoded encrypted audio signal | |||
3685 | 6081600 | Method and apparatus for signaling privacy in personal communications systems | |||
3686 | 6078668 | Apparatus and method for concealing data bursts in an analog scrambler using audio repetition | |||
3687 | 6076167 | Method and system for improving security in network applications | |||
3688 | 6069954 | Cryptographic data integrity with serial bit processing and pseudo-random generators | |||
3689 | 6067566 | Methods and apparatus for distributing live performances on MIDI devices via a non-real-time network protocol | |||
3690 | 6052407 | Apparatus and method for detection frequency hopping patterns embedded in radio frequency noise | |||
3691 | 6049873 | Scrambled information transmitting and receiving method | |||
3692 | 6047069 | Method and apparatus for preserving error correction capabilities during data encryption/decryption | |||
3693 | 6044158 | Method and apparatus for communicating secure data over a telephone line using a cellular encryption apparatus | |||
3694 | 6032260 | Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same | |||
3695 | 6023511 | Cryptosystem for encrypting digital image or voice file | |||
1999 | |||||
3696 | 6002773 | Method and apparatus for encryption | |||
3697 | 5995533 | Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics | |||
3698 | 5982889 | Method and apparatus for distributing information products | |||
3699 | 5974142 | Secure telecommunications | |||
3700 | 5966373 | Waveform and frame structure for a fixed wireless loop synchronous CDMA communications system | |||
3701 | 5963621 | Secure communication system | |||
3702 | 5960029 | Coherent dual-channel QPSK modulator/demodulator for CDMA systems, and modulating/demodulating methods therefor | |||
3703 | 5940514 | Encrypted holographic data storage based on orthogonal phase code multiplexing | |||
3704 | 5923759 | System for securely exchanging data with smart cards | |||
3705 | 5909188 | Process control transmitter with adaptive analog-to-digital converter | |||
3706 | 5903648 | Method and apparatus for encryption | |||
3707 | 5894521 | System and method for encrypting sensitive information | |||
3708 | 5893067 | Method and apparatus for echo data hiding in audio signals | |||
3709 | 5883957 | Methods and apparatus for encrypting and decrypting MIDI files | |||
1998 | |||||
3710 | 5848156 | Communication method and apparatus for carrying out cipher communications telephonically | |||
3711 | 5838797 | Secure communication by encryption/decryption of vector at PSK modulation/detection stage | |||
3712 | 5832214 | Method and apparatus for data security for a computer | |||
3713 | 5822428 | Data encryption for product information and access | |||
3714 | 5819108 | Programming of software into programmable memory within a peripheral device | |||
3715 | 5805635 | Secure communication system | |||
3716 | 5793871 | Optical encryption interface | |||
3717 | 5793870 | System and method for encrypting sensitive information | |||
3718 | 5787180 | Method of connecting a scrambler or encryption device to a hand-held portable cellular telephone | |||
3719 | 5778073 | Method and device for speech encryption and decryption in voice transmission | |||
3720 | 5777771 | Generation of optical signals with RF components | |||
3721 | 5771287 | Apparatus and method for secured control of feature set of a programmable device | |||
3722 | 5745389 | System and mechanism for assigning pre-established electronic addresses to printed circuit boards | |||
3723 | 5724414 | Secure communication system | |||
3724 | 5717762 | WACS-type mobile communication with a unified frame format | |||
3725 | 5712915 | Encrypted digital circuit multiplication system | |||
3726 | 5710816 | Method and apparatus for ensuring receipt of voicemail messages | |||
1997 | |||||
3727 | 5608723 | Methods and systems for secure wireless communication within a predetermined boundary | |||
3728 | 5604806 | Apparatus and method for secure radio communication | |||
3729 | 5598471 | Method and apparatus for encoding and decoding of audio transmission signals | |||
3730 | 5594798 | Secure telecommunications | |||
3731 | 5592556 | Digital radio with vocoding encrypting codec | |||
3732 | 5592555 | Wireless communications privacy method and system | |||
1996 | |||||
3733 | 5579394 | Clear channel interface module and method therefor | |||
3734 | 5568556 | System and method for encrypting sensitive information | |||
3735 | 5541997 | Method and apparatus for detecting correctly decrypted communications | |||
3736 | 5517568 | Method of detecting unauthorized use of a wireless communication channel | |||
3737 | 5509072 | Facsimile apparatus | |||
3738 | 5506889 | Digital voice privacy apparatus and method | |||
1995 | |||||
3739 | 5455861 | Secure telecommunications | |||
3740 | 5448643 | Authenticaton system | |||
3741 | 5438332 | Method of hardening transmissions, in particular between a control station and a transponder, and a device implementing the method | |||
3742 | 5434920 | Secure telecommunications | |||
3743 | 5430800 | Facsimile apparatus | |||
3744 | 5410599 | Voice and data encryption device | |||
3745 | 5404394 | Secure communication system | |||
3746 | 5392357 | Secure telecommunications | |||
3747 | 5392352 | Scramble detecting circuit in a satellite broadcasting receiver and scramble detecting method | |||
1994 | |||||
3748 | 5353351 | Secure teleconferencing | |||
3749 | 5335277 | Signal processing appparatus and methods | |||
3750 | 5315658 | Fair cryptosystems and methods of use | |||
3751 | 5293423 | Synchronizing method in a mobile radio system | |||
3752 | 5276737 | Fair cryptosystems and methods of use | |||
1993 | |||||
3753 | 5241539 | Communication system with signal converter between networks | |||
3754 | 5233654 | Signal processing apparatus and methods | |||
3755 | 5231397 | Extreme waveform coding | |||
3756 | 5226083 | Communication apparatus for speech signal | |||
3757 | 5222137 | Dynamic encryption key selection for encrypted radio transmissions | |||
3758 | 5214694 | Scramble signal transmission system for earth station of communication satellite | |||
3759 | 5199069 | Automatic encryption selector | |||
3760 | 5185797 | Encrypted trunked control channel system | |||
3761 | 5182772 | Method and apparatus for encoding, transmitting, receiving and de-coding information | |||
3762 | 5181246 | Privacy communication device | |||
1992 | |||||
3763 | 5151922 | Variable speaker muting based on received data | |||
3764 | 5150410 | Secure digital conferencing system | |||
3765 | 5148482 | Layered session data unit frame | |||
3766 | 5144666 | Decoder to decode an encrypted sound | |||
3767 | 5136648 | Message storage security system | |||
3768 | 5121430 | Storm alert for emergencies | |||
3769 | 5109414 | Signal processing apparatus and methods | |||
3770 | 5101432 | Signal encryption | |||
3771 | 5091941 | Secure voice data transmission system | |||
3772 | 5091936 | System for communicating television signals or a plurality of digital audio signals in a standard television line allocation | |||
1991 | |||||
3773 | 5077791 | Method and apparatus for preventing unauthorized transmissions | |||
3774 | 5055845 | Signal digitizing method and system utilizing time delay of the input signal | |||
3775 | 5051991 | Method and apparatus for efficient digital time delay compensation in compressed bandwidth signal processing | |||
3776 | 5034961 | Area communications system | |||
3777 | 5018198 | Speech privacy processing method and apparatus therefor | |||
3778 | 5001756 | Decryption device with variable clock | |||
3779 | 5001750 | Secret communication control apparatus | |||
3780 | 4985919 | Secure communication control system | |||
1990 | |||||
3781 | 4972479 | Method and apparatus for providing privacy/security in a communication system | |||
3782 | 4965826 | Method of and system for scrambling/descrambling sound | |||
3783 | 4965825 | Signal processing apparatus and methods | |||
3784 | 4964165 | Method for the fast synchronization of vocoders coupled to one another by enciphering | |||
3785 | 4924516 | Method and system for a synchronized pseudo-random privacy modem | |||
3786 | 4920567 | Secure telephone terminal | |||
3787 | 4920565 | Method for connection of secure conference calls | |||
3788 | 4914697 | Cryptographic method and apparatus with electronically redefinable algorithm | |||
3789 | 4908860 | System for the secret transmission of audio signals and television receiver for receiving such signals | |||
3790 | 4903298 | System for providing encryption and decryption of voice and data transmissions to and from an aircraft | |||
1989 | |||||
3791 | 4888799 | Scrambling of signals by inversion | |||
3792 | 4882751 | Secure trunked communications system | |||
3793 | 4856061 | Method for cryptographic transmission of speech signals and a communication station for performing the method | |||
3794 | 4852155 | Systeme d'authentification analogique reciproque entre un terminal et une ligne de transmission | |||
3795 | 4845749 | Secure teleconferencing system | |||
3796 | 4841571 | Privacy signal transmission system | |||
3797 | 4837821 | Signal transmission system having encoder/decoder without frame synchronization signal | |||
3798 | 4829540 | Secure communication system for multiple remote units | |||
3799 | 4817146 | Cryptographic digital signal transceiver method and apparatus | |||
3800 | 4817141 | Confidential communication system | |||
3801 | 4815128 | Gateway system and method for interconnecting telephone calls with a digital voice protected radio network | |||
3802 | 4803726 | Bit synchronization method for a digital radio telephone system | |||
1988 | |||||
3803 | 4776013 | Method and apparatus of encryption of optical images | |||
3804 | 4757536 | Method and apparatus for transceiving cryptographically encoded digital data | |||
3805 | 4750205 | Frequency or time domain speech scrambling technique and system which does not require any frame synchronization | |||
3806 | 4747137 | Speech scrambler | |||
1987 | |||||
3807 | 4704725 | Signal processing apparatus and methods | |||
3808 | 4694490 | Signal processing apparatus and methods | |||
3809 | 4659875 | Electronic system for the secret transmission of audio signals | |||
3810 | 4652838 | Phase randomization to reduce detectability of phase or frequency-modulated digital signals | |||
1986 | |||||
3811 | 4628358 | Television signal encryption system with protected audio | |||
3812 | 4622680 | Hybrid subband coder/decoder method and apparatus | |||
3813 | 4612414 | Secure voice transmission | |||
3814 | 4591673 | Frequency or time domain speech scrambling technique and system which does not require any frame synchronization | |||
3815 | 4575753 | Method of and apparatus for scrambling and decoding television and similar signals with wobbulating trapping | |||
1985 | |||||
3816 | 4551580 | Time-frequency scrambler | |||
3817 | 4536739 | Apparatus for communication of instructing information | |||
3818 | 4532636 | Radio communications receivers | |||
1984 | |||||
3819 | 4476566 | Frequency hopping radio communications apparatus having pseudo-random _channel selection | |||
3820 | 4440976 | Automatic selection of decryption key for multiple-key encryption systems | |||
3821 | 4434323 | Scrambler key code synchronizer | |||
3822 | 4433211 | Privacy communication system employing time/frequency transformation | |||
1983 | |||||
3823 | 4398296 | Communication systems | |||
3824 | 4398216 | Multiple signal transmission method and system, particularly for television | |||
3825 | 4397034 | Low probability of intercept transmitting apparatus | |||
3826 | 4392241 | Digital interface system | |||
3827 | 4387393 | Signal unscrambler | |||
3828 | 4379205 | Analog signal scrambling system | |||
1982 | |||||
3829 | 4358857 | Communication system | |||
3830 | 4351064 | Communication | |||
3831 | 4329711 | Apparatus for encoding of information | |||
3832 | 4326292 | Random energy communication system | |||
3833 | 4324002 | Delay-modulated random energy intelligence communication system | |||
3834 | 4319087 | Secret communication system | |||
3835 | 4312072 | Radio frequency transmission system | |||
1981 | |||||
3836 | 4308617 | Noiselike amplitude and phase modulation coding for spread spectrum transmissions | |||
3837 | 4305152 | Security communication system | |||
3838 | 4280222 | Receiver and correlator switching method | |||
3839 | 4278840 | Dynamic frequency and time voice encryption system and method | |||
3840 | 4276652 | Secure communication system with improved frequency-hopping arrangement | |||
3841 | 4244053 | Privacy communication method and system | |||
1980 | |||||
3842 | 4232194 | Voice encryption system | |||
3843 | 4231113 | Anti-jam communications system | |||
3844 | 4228321 | Privacy transmission system with remote key control | |||
3845 | 4225935 | Coding method and system with enhanced security | |||
3846 | 4222115 | Spread spectrum apparatus for cellular mobile communication systems | |||
3847 | 4209750 | Swept-carrier transmission system adapted for use in process control systems | |||
3848 | 4208734 | Underwater communication system | |||
3849 | 4206462 | Secure communication and ranging system | |||
3850 | 4203164 | Secure sonar communication system | |||
3851 | 4193030 | Frequency hopping communication system | |||
3852 | 4184117 | Communication security method and system | |||
3853 | 4182933 | Secure communication system with remote key setting | |||
1979 | |||||
3854 | 4179658 | Secret-signalling system utilizing noise communication | |||
3855 | 4179657 | Anti-jamming communication system | |||
3856 | 4172963 | Checker and automatic synchronizer for coding equipment | |||
3857 | 4170757 | Method of and apparatus for transmitting clandestine radio signals | |||
3858 | 4169993 | Intercept receiver for double-side-band, noise-like signals | |||
3859 | 4167700 | Digital voice protection system and method | |||
3860 | 4159399 | Security communication system using polarity inversion | |||
3861 | 4156205 | Binary frequency synthesizer | |||
3862 | 4152650 | Continuously-synchronized tracking receiver for a priori defined swept carriers | |||
1978 | |||||
3863 | 4112368 | Constant amplitude carrier communications system | |||
3864 | 4102521 | System for signal coding | |||
3865 | 4086435 | Method of and means for scrambling and descrambling speech at audio frequencies | |||
3866 | 4077005 | Secure position identity and time reporting system | |||
3867 | 4066964 | Communication system | |||
1977 | |||||
3868 | 4058677 | Sound scrambling equipment | |||
3869 | 4023103 | Synchronizer for frequency hopping receiver | |||
3870 | 4005428 | Secure remote control communication systems | |||
3871 | 4002825 | System for encoding and decoding amplitude modulated signals | |||
1976 | |||||
3872 | 3999005 | Secure transmission of AM or FM signals | |||
3873 | 3959592 | Method and apparatus for transmitting and receiving electrical speech signals transmitted in ciphered or coded form | |||
3874 | 3936749 | Matched filter communication systems | |||
3875 | 3936748 | Secret communication system employing magnetic control of signal modulation on microwave or other electromagnetic carrier wave | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |