СПИСОК патентов США - подгруппа МПК16 H04L9/00



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19609067Proxy captive portal traffic for input-limited devices
29608980Environment-aware security tokens
39608967Method and system for establishing a session key
49608817Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
59608811Managing access to a secure digital document
69608802Decoy bits method for direct encryption and key generation
79607178Protection against key tampering
89607173Information processing apparatus, information processing method, and recording medium
99607158Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium
109607143Provisioning account credentials via a trusted channel
119603012Secure wireless device connection using power line messages
129603010Automatic security action invocation for mobile communications device
139602549Establishing trust between applications on a computer
149602497Trusted and unsupervised digital certificate generation using a security token
159602482Authentication for an API request
169602291Secure connection certificate verification
179602279Configuring devices for use on a network using a fast packet exchange with authentication
189602278Encryption device, cipher-text comparison system, cipher-text comparison method, and cipher-text comparison program
199600677Database apparatus, method, and program
209600421Systems and methods for low-latency encrypted storage
219600291Secure boot using a field programmable gate array (FPGA)
229600238Fully digital chaotic differential equation-based systems and methods
239596598Reducing detectability of an encryption key
249596083Information processing technique for pattern matching
259596078Set of servers for "machine-to-machine" communications using public key infrastructure
269596075Transparent serial encryption
279594769Computing device configured with a table network
289590971Environment-aware security tokens
299590806Secure provisioning of semiconductor chips in untrusted manufacturing factories
309589150Managing confidential information
319589144System and method for cryptographic suite management
329584587Managing transmission and storage of sensitive data
339584516Proxy authentication for a multiple core network device
349584496Systems and methods for securely monitoring an individual
359584492Cryptographic proxy service
369584485Key encryption system, method, and network devices
379584320Blinding function in elliptic curve cryptography
389584317Identifying security boundaries on computing devices
399584315Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
409584311Decrypting data
419584310Protecting a white-box implementation against attacks
429583704Complementary resistance switch, contact-connected polycrystalline piezo- or ferroelectric thin-film layer, method for encrypting a bit sequence
439579562Prism code
449578125Systems, devices, and methods for protecting access privacy of cached content
459578036Access revocation
469578035System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
479577822Secure bitstream authentication
489577821Function masking apparatus in symmetric cryptographic algorithm for preventing side channel attacks and method thereof
499576133Detection of data tampering of encrypted data
509576116Secure software components anti-reverse-engineering by table interleaving
519572026Location services for a wireless device
529571525Policy management system, id provider system, and policy evaluation device
539571499Apparatus and method of providing security to cloud data to prevent unauthorized access
549571468Encoding data using a variable number of pixels and bits based on entropy
559571464Network-enabled device provisioning
569571289Methods and systems for glitch-resistant cryptographic signing
579571286Authenticating the identity of initiators of TCP connections
589571281CRT-RSA encryption method and apparatus
599571279Systems and methods for secured backup of hardware security modules for cloud-based web services
609571268Method and system for homomorphicly randomizing an input
619571267Data processor and decryption method
629569629Communication between key manager and storage subsystem kernel via management console
639569623Secure boot with resistance to differential power analysis and other external monitoring attacks
649569606Verification of a pattern based passcode
659565189Method and system for providing access to administrative functionality a virtualization environment
669565021Shape actuation encapsulant of a cryptographic module
679565017Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks
689565016Protection of the execution of an algorithm against side-channel attacks
699563785Optimized encryption filtering of files
709563729Signal transition analysis of a circuit
719560059System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
729560050System and method to share a resource or a capability of a device
739560040Mitigating risk of account enumeration
749559850Component management via secure communications
759559846Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems
769559844Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program
779559838Method of processing data protected against fault injection attacks and associated device
789558375Protection of registers against unilateral disturbances
799558360Protecting information using policies and encryption
809558113Secure garbage collection on a mobile device
819553722Generating a key based on a combination of keys
829552493Access control framework for information centric networking
839548970Managing unlinkable identifiers for controlled privacy-friendly data exchange
849548862Managing entropy in computing devices for cryptographic key generation
859547774System and method for distributed deduplication of encrypted chunks
869547498Method and chip card for transmitting information
879544297Method for secured data processing
889544284Secure data exchange technique
899544277KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages
909544154Method of authenticating a device
919544153Compression of cryptographic chaining certificates
929544139Method and apparatus for a non-deterministic random bit generator (NRBG)
939544138Authenticator, authenticatee and authentication method
949544133On-the-fly key generation for encryption and decryption
959544132Cryptographic method for protecting a key hardware register against fault attacks
969544131Efficient modular addition resistant to side channel attacks
979544130Protection of a calculation against side-channel attacks
989542374Method and apparatus for applying revision specific electronic signatures to an electronically stored document
999542155Proxy calculation system, method, request device and program thereof
1009542114Methods and apparatus to protect memory regions during low-power states
1019538311Auto-provisioning for internet-of-things devices
1029537866Method and apparatus to control the use of applications based on network service
1039537837Method for ensuring media stream security in IP multimedia sub-system
1049537660Method of establishing public key cryptographic protocols against quantum computational attack
1059537653Encryption key generating apparatus and computer program product
1069537650Verifiable trust for data through wrapper composition
1079537549Method, terminal and base station for multi-user interference suppression
1089536098Methods and systems for concealing information
1099535675Rule based device enrollment
1109535658Secure private database querying system with content hiding bloom filters

2016

1119531692Method of securing mobile applications using distributed keys
1129531548Security system for handheld wireless devices using time-variable encryption keys
1139531540Secure token-based signature schemes using look-up tables
1149531539Information processing apparatus, and information processing method
1159531535Secure memories using unique identification elements
1169531531Methods and devices for fixed execution flow multiplier recoding and scalar multiplication
1179529465Secure interaction with input devices
1189529071Ultrasonic-wave communication system
1199525678Non-transitory computer readable medium, server and system
1209525435Computing device storing look-up tables for computation of a function
1219524404Program execution device
1229524392Encrypting genomic data for storage and genomic computations
1239524370Method for privacy-preserving medical risk test
1249524240Obscuring memory access patterns in conjunction with deadlock detection or avoidance
1259524239Self service propagation of custom extension fields into web services
1269521359Mobile high-definition link data converter and mobile high-definition link data converting method
1279521124Secure computation using a server module
1289520995Efficient prime-number check
1299519618System and method for determining distance between signals
1309516364Secure transcoding of content
1319516335Wireless display encoder architecture
1329516058Method and system for determining whether domain names are legitimate or malicious
1339516002Systems and methods for securing data in motion
1349516001Methods and apparatus to identify media distributed via a network
1359515994Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario
1369515821Apparatus and method for data encryption
1379515820Protection against side channels
1389515818Multi-block cryptographic operation
1399514307Method for producing a secured data object and system
1409509663Secure distribution of session credentials from client-side to server-side traffic management devices
1419509661Method and apparatus for displaying HTTPS block page without SSL inspection
1429509512Message digest generator
1439509497Method for generating a random output bit sequence
1449509494Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption
1459509493Information processing technique for secure pattern matching
1469509492Authentication device, output device, verification device and input device
1479503456Video chat abuse detection based on external context
1489503452System and method for identity recognition and affiliation of a user in a service transaction
1499503269Utilizing a stapling technique with a server-based certificate validation protocol to reduce overhead for mobile communication devices
1509503259System and method for generating and protecting cryptographic keys
1519503256SMS4 acceleration hardware
1529503255Cryptographic sequencing system and method
1539497632System and method for pairing a UICC card with a particular mobile communications device
1549497029Hardening of direct anonymous attestation from side-channel attack
1559497022Method and system for improved fault tolerance in distributed customization controls using non-volatile memory
1569497021Device for generating a message authentication code for authenticating a message
1579496897Methods and apparatus for generating authenticated error correcting codes
1589495818Information processing system, control information processing device, and program
1599495552Integrated data deduplication and encryption
1609495546Electronic signing methods, systems, and apparatus
1619495400Dynamic output selection using highly optimized data structures
1629495366System for distributing digital media to exhibitors
1639495240Encrypting data for storage in a dispersed storage network
1649495111System and method for reducing information leakage from memory
1659494645Method for testing cryptographic circuits, secured cryptographic circuit capable of being tested, and method for wiring such circuit
1669490972Method and apparatus for providing conditional access based on channel characteristics
1679489785RFID secure authentication
1689485609Pulse frequency control for wireless communications and ranging
1699485281Communication system and server
1709485258Mediation system and method for restricted access item distribution
1719485101Provisioning digital certificates in a network environment
1729485099Apparatus, systems and methods for agile enablement of secure communications for cloud based applications
1739485093Push button configuration pairing
1749485088Systems and methods for dynamic data masking
1759485087Method and circuit for cryptographic operation
1769483663Countermeasure method for protecting stored data
1779479571Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements
1789479327Apparatus and method for generating key
1799473603Memory system for portable telephone
1809473526Fight-through nodes for survivable computer network
1819473498Method for using java servlets as a stack based state machine
1829473333Communications system via data scrambling and associated methods
1839473302Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device
1849473297Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
1859473295Virtual transportation point of sale
1869471948System and method for administering licenses stored by a product unit, and administration of said unit in the field
1879467291Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object
1889467288Encryption key destruction for secure data erasure
1899467287Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
1909465960Physics-based authentication
1919462473Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
1929462002System, method, and computer program product for sharing files based on user profile visibility
1939461974System and method to merge encrypted signals in distributed communication system
1949460298Sensitive data aliasing
1959455979System and method for establishing trust using secure transmission protocols
1969455968Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share
1979455831Order preserving encryption method
1989455827Communication apparatus, computer program product, and communication system
1999454346Extracting entropy from the vibration of multiple machines
2009451462Setup of multiple IoT network devices
2019450929Communication device, communication system, and computer program product
2029450765System and method capable of verifying contactless sensor tag
2039450763Server-side key generation
2049449191Device, system and method for securing and comparing genomic data
2059449164Method of securing a computing device
2069444872Method, server and system for data sharing
2079444793System, apparatus and method for encryption and decryption of data transmitted over a network
2089444618Defense against attacks on ring oscillator-based physically unclonable functions
2099444580Optimized data transfer utilizing optimized code table signaling
2109443091Method and system for protecting execution of cryptographic hash functions
2119438940Methods and apparatus to identify media using hash keys
2129438423Encryption device, encryption method, and information processing device
2139438422Chaotic-based synchronization for secure network communications
2149438420Unpredictable number generation
2159438412Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings
2169436836Tamperproof regulation of a process, production, and actuating installation
2179436804Establishing a unique session key using a hardware functionality scan
2189432191Public key encryption system based on the quadratic residuosity assumption
2199432189Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response
2209432188Secret sharing system, data distribution apparatus, distributed data transform apparatus, secret sharing method and program
2219432180Method and system for a programmable parallel computation and data manipulation accelerator
2229430676Processor related noise encryptor
2239430662Provisioning authorization claims using attribute-based access-control policies
2249430659Locating cryptographic keys stored in a cache
2259430656Device for carrying out a cryptographic method, and operating method for same
2269430188Method for protecting a cryptographic device against SPA, DPA and time attacks
2279426154Providing devices as a service
2289425961Method for performing an encryption of an AES type, and corresponding system and computer program product
2299425960Searchable encryption for outsourcing data analytics
2309425957System and method for remote reset of password and encryption key
2319425952Algebraic manipulation detection codes from algebraic curves
2329423820Complimentary bit slicing side channel attack defense
2339423425Side-channel analysis apparatus and method based on profile
2349420457Multiple-persona on mobile devices
2359419983Method and apparatus for providing an adaptable security level in an electronic communication
2369419800Secure network systems and methods
2379419791Hash value calculation device, hash value calculation method, and non-transitory computer-readable storage medium including computer executable instruction
2389419790Differential power analysis--resistant cryptographic processing
2399419789Method and apparatus for scalar multiplication secure against differential power attacks
2409418238Search system, search method of search system, and information processing device
2419414230Certificate management with consequence indication
2429414226Method and system to provide secure exchange of data between mobile phone and computer system
2439413729Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
2449413687Automatic workload transfer to an on-demand center
2459413530System and method of lawful access to secure communications
2469411986System and method for encrypting secondary copies of data
2479411950Methods and systems for user authentication in a computer system using image-based log-ins
2489408079Apparatus and method for communication security in a nationwide wireless network using wireless routers
2499408078IP mobility security control
2509407438Cryptographic system, cryptographic method, and cryptographic program
2519407435Cryptographic key generation based on multiple biometrics
2529405928Deriving encryption rules based on file content
2539405729Cryptographic method comprising a modular exponentiation operation
2549401932Device and method for detection of anomalous behavior in a computer network
2559401908Authentication interworking in communications networks
2569401898System and method for wireless data protection
2579401893System and method for providing data security in a hosted service system
2589401807Processing non-editable fields in web pages
2599401805Encrypting device, encrypting method, and recording medium
2609401802Side channel power attack defense with pseudo random clock operation
2619400876Content data management system and method
2629400636Apparatus and method for calculating a result in a scalar multiplication
2639398049Method and device for securely transmitting data
2649397826Encryption device and method for defending a physical attack
2659397825Method and system for reconstruction of a data object from distributed redundant data parts
2669396359System and method for encrypted disk drive sanitizing
2679395207System and method to record encrypted content with access conditions
2689392437Method and system for IP multimedia bearer path optimization through a succession of border gateways
2699391997Message processing apparatus, wireless device and method of storing a message in a wireless device
2709391961Information operating device, information output device, and information processing method
2719391773Elliptic curve point multiplication procedure resistant to side-channel information leakage
2729391769Serial transmission having a low level EMI
2739390271Vectorial private equality testing
2749386041Method and system for automated incident response
2759386024System and method for detecting modified or corrupted external devices
2769384350Signature compilation on a security device
2779380050Scan image authentication
2789380049Method and system for authentication-based multi-user online video game
2799380044Supporting differentiated secure communications among heterogeneous electronic devices
2809380037Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
2819380036Methods and devices for securing keys for a nonsecured, distributed environment with applications to virtualization and cloud-computing security and management
2829380033Implementing use-dependent security settings in a single white-box implementation
2839374373Encryption techniques for improved sharing and distribution of encrypted content
2849374226Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
2859374220System and method for providing compressed encryption and decryption in homomorphic encryption based on integers
2869372791Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module
2879369754Video content tracking
2889369495Sensor aware security policies with embedded controller hardened enforcement
2899369486Device and method for encoding input data based on hamming distance and/or weight
2909369415Marking electronic messages to indicate human origination
2919369285Social network based PKI authentication
2929369277Encryption code generation using spin-torque NANO-oscillators
2939369273System and method for mixing VoIP streaming data for encrypted processing
2949367693Bitstream confirmation for configuration of a programmable logic device
2959367509Configurable multi-lane scrambler for flexible protocol support
2969363667System and method for user-privacy-aware communication monitoring and analysis
2979363258Secure digital signature system
2989363244Realizing authorization via incorrect functional behavior of a white-box implementation
2999363078Method and apparatus for hardware-accelerated encryption/decryption
3009363075Polymorphic encryption key matrices
3019363074Encryption processing apparatus, encryption processing method, and computer program
3029363073Cryptographic countermeasure method by deriving a secret data
3039361617Variable-length cipher system and method
3049361480Anonymization of streaming data
3059357373Method and system for IP multimedia bearer path optimization through a succession of border gateways
3069356965Method and system for providing transparent trusted computing
3079356943Systems and methods for performing security analyses on network traffic in cloud-based environments
3089356921Different authentication profiles
3099356784Cryptic notes and related apparatus and methods
3109356778Secured communication for local area network
3119355271System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption
3129350550Power management and security for wireless modules in "machine-to-machine" communications
3139350543Method and system for homomorphicly randomizing an input
3149350538Revocation status using other credentials
3159350533Method and apparatus for delivering encrypted content to web browsers based on entropy of the content
3169350532System and method for conducting searches at target devices
3179349023Database encryption system, method, and program
3189344895Method and system for securely accessing portable hotspot for intelligent mobile phones
3199344455Apparatus and method for sharing a hardware security module interface in a collaborative network
3209344407Centrally managed use case-specific entity identifiers
3219344278Secure data transfer using random ordering and random block sizing
3229344277Mass serialization analytics
3239344274Method and system for encrypting data
3249344273Cryptographic device for implementing S-box
3259342701Digital rights management system and methods for provisioning content to an intelligent storage
3269338146Method and apparatus for monitoring transmission characteristics in a network
3279338139System, apparatus and method for encryption and decryption of data transmitted over a network
3289338012Systems and methods for identifying code signing certificate misuse
3299338008System and method for secure release of secret information over a network
3309338005System for and method of remote secure backup
3319338004Method and system for smart card chip personalization
3329338001Privacy enhanced spatial analytics
3339338000Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm
3349336404Privacy-protective data transfer and storage
3359336092Secure data deduplication
3369332438Method for updating group temporal key, related apparatus and system
3379331990Trusted and unsupervised digital certificate generation using a security token
3389331855Apparatus, system, and method for providing attribute identity control associated with a processor
3399331852System and method for securing data transaction
3409331851Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
3419331848Differential power analysis resistant encryption and decryption functions
3429331847Countermeasure method and device for protecting data circulating in an electronic component
3439330270Encryption processing device and authentication method
3449325944Secure delivery of program content via a removable storage medium
3459325683Mobile application management framework
3469325674Privacy system
3479325671System and method for merging encryption data using circular encryption key switching
3489325668System for supporting over-the-air service and method thereof
3499325642Randomness for encryption operations
3509325509Determination method for cryptographic algorithm used for signature, validation server and program
3519325502Identity management for transactional content
3529325494Method for generating a bit vector
3539325493System and methods for silencing hardware backdoors
3549325492Method for increasing I/O performance in systems having an encryption co-processor
3559323957Anti-tamper system based on dual random bits generators for integrated circuits
3569323944Conforming passwords to a password policy
3579323603Storage of sensitive data in a dispersed storage network
3589319877Secret key generation
3599319446System and method for transport stream sync byte detection with transport stream having multiple emulated sync bytes
3609319413Method for establishing resource access authorization in M2M communication
3619319412Method for establishing resource access authorization in M2M communication
3629319223Key derivation for a module using an embedded universal integrated circuit card
3639317712Providing secure communication and/or sharing of personal data via a broadband gateway
3649317708Hardware trust anchors in SP-enabled processors
3659317668Dynamic tardos traitor tracing schemes
3669313182Protecting information using policies and encryption
3679313181System and method to merge encrypted signals in distributed communication system
3689313180Systems and methods for quantum key generation
3699313179Mixing secure and insecure data and operations at server database
3709313028Method for fully homomorphic encryption using multivariate cryptography
3719313027Protection of a calculation performed by an integrated circuit
3729313022Homomorphic cryptography modeling in support of privacy policies
3739313021Secret communication method with self-authentication capability
3749312923Personal point of sale
3759312861Protecting data from decryption from power signature analysis in secure applications
3769311640Methods and arrangements for smartphone payments and transactions
3779311639Methods, apparatus and arrangements for device to device communication
3789310862Method and apparatus for monitoring performance for secure chip operation
3799306946Intelligent electronic cryptographic cloud computing system
3809306746Randomizing current injection circuit to obscure gate noise for added security
3819306740Systems, methods, and apparatus for a quantum key distribution telescope
3829306738Managed secure computations on encrypted data
3839305160Method and system for automatic updating of randomly generated user passwords
3849305157Authentication target having ambiguous target elements
3859301133Audio summing systems and methods in radio communication systems
3869300656Secure connection certificate verification
3879300654Method of handling a certification request
3889300635Overlay network with position independent insertion and tap points
3899300626Method and system for device setup with a user network identity address provisioning server
3909300473Module for "machine-to-machine" communications using public key infrastructure
3919300468Secure node admission in a communication network
3929298947Method for protecting the integrity of a fixed-length data structure
3939294915Localized network authentication and security using tamper-resistant keys
3949294468Application-level certificates for identity and authorization
3959294446Content encryption
3969294444Systems and methods for cryptographically splitting and storing data
3979294429Method and system for providing service for searching friends
3989294277Audio encryption systems and methods
3999292706Customer data management for data analytics outsourcing
4009292663Associating first and second watermarks with audio or video content
4019288229Device association via video handshake
4029288059Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys
4039288046Device for generating an encrypted key and method for providing an encrypted key to a receiver
4049288043Methods and systems for providing high-security cryptographic keys to mobile radios
4059288042Securely and redundantly storing encryption credentials system and method
4069288040Encryption device
4079288039Privacy-preserving text language identification using homomorphic encryption
4089288038Access-controlled data storage medium
4099282114Generation of alerts in an event management system based upon risk
4109281945Offline methods for authentication in a client/server authentication system
4119281941Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
4129281940Information processing apparatus, information processing method, and program
4139281939Method and system for encrypting data delivered over a network
4149280911Context-aware training systems, apparatuses, and methods
4159280675Encrypting and storing confidential data
4169276753System and method for data authentication among processors
4179276743Probabilistic key distribution in vehicular networks with infrastructure support
4189276741Content encryption key management
4199276740Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
4209276739Method and apparatus for encrypting/decrypting data
4219276736Connection key distribution
4229276734Confidential computation system, confidential computation method, and confidential computation program
4239275423Right object renewal method and apparatus for right-protected broadcast service
4249275250Searchable encryption processing system
4259275243Communication between key manager and storage subsystem kernel via management console
4269275202Data processing method
4279274976Code tampering protection for insecure environments
4289270947Terminal device, server, data processing system, data processing method, and program
4299270703Enhanced control-plane security for network-accessible services
4309270648System and method for initiating protected instant messaging conversations
4319270468Methods to improve secure flash programming
4329270466System and method for temporary secure boot of an electronic device
4339270465Control word protection
4349270459Techniques for achieving tenant data confidentiality from cloud service provider administrators
4359270458Encryption processing device, encryption processing method, and program
4369270456System and methodology for decrypting encrypted media
4379270455CPU assisted seeding of a random number generator in an externally provable fashion
4389270452Encryption using real-world objects
4399270451Privacy enhanced spatial analytics
4409268736Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in a multi-core system
4419268555Multiple system images for over-the-air updates
4429264902Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI)
4439264410Dynamic configuration of trusted executed environment resources
4449264397Method and system for implementing a user network identity address provisioning server
4459264236Embedded extrinsic source for digital certificate validation
4469264229System and method for generating random key stream cipher texts
4479264220Secure virtual machine provisioning
4489262656Multi-protocol RFID system
4499262639Plaintext injection attack protection
4509262259One-time programmable integrated circuit security
4519258701Adding randomness internally to a wireless mobile communication device
4529258130Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property
4539258120Distributed public key revocation
4549258116System and methods for permitting open access to data objects and for securing data within the data objects
4559256752Product authorization with cross-region access
4569253701System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks
4579253212Automated production of certification controls by translating framework controls
4589252954Efficient homomorphic encryption scheme for bilinear forms
4599252952Gesture-based encryption methods and systems
4609252945Method for recognizing a manipulation of a sensor and/or sensor data of the sensor
4619252942Method and system for secure multiparty cloud computation
4629252941Enhanced digital signatures algorithm method and system utilitzing a secret generator
4639252898Music distribution systems
4649251900Data scrambling based on transition characteristic of the data
4659247427Multi-factor caller identification
4669246913Sharing content using a dongle device
4679246893Intra-computer protected communications between applications
4689246889Layered protection and validation of identity data delivered online via multiple intermediate clients
4699246689Component management via secure communications
4709246683Re-encryption key generator, re-encryption apparatus, and program
4719246680Optical cryptography systems and methods
4729246672Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key
4739246671Motor vehicle with encrypted bus data
4749245153Semiconductor device
4759244673System and method for updating application archive files
4769240889Method and system for secure data access among two devices
4779240885Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
4789240883Multi-key cryptography for encrypting file system acceleration
4799240880Distributed data storage device
4809239927Static analysis for discovery of timing attack vulnerabilities in a computer software application
4819239926Static analysis for discovery of timing attack vulnerabilities in a computer software application
4829237022Use of multiple digital signatures and quorum rules to verify aircraft information
4839237007Secure modulation and demodulation
4849235708System and method for supporting full volume encryption devices in a client hosted virtualization system
4859230097Method and system for detecting data modification within computing device
4869229823Storage and retrieval of dispersed storage network access information
4879229687Private two-party computation using partially homomorphic encryption

2015

4889226142Mobile communication system, communication control method, and radio base station
4899225721Distributing overlay network ingress information
4909225618Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees
4919225521Apparatus and method for skein hashing
4929225511Systems for determining website secure certificate status via partner browser plugin
4939225510Website secure certificate status determination via partner browser plugin
4949223368Countermeasure method and device for protecting data circulating in an electronic microcircuit
4959219805Memory system for portable telephone
4969219730Securing a secret of a user
4979219715Mediator utilizing electronic content to enforce policies to a resource
4989219607Provisioning sensitive data into third party
4999219604Generating an encrypted message for storage
5009219603System and method for encryption key management in a mixed infrastructure stream processing framework
5019219602Method and system for securely computing a base point in direct anonymous attestation
5029218485Program execution device
5039215252Methods and apparatus to identify privacy relevant correlations between data values
5049215228Authentication of devices having unequal capabilities
5059215221Method for implementing local routing of traffic, base station and system
5069215219Method for protecting data used in cloud computing with homomorphic encryption
5079215072Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security
5089215069Methods and apparatus for device authentication with one-time credentials
5099215068Search system, search method, and program
5109215067Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
5119213581Method and system for a cloud frame architecture
5129210159Information processing system, information processing device, and authentication method
5139209972Mediator device monitoring and controlling access to electronic content
5149209970Method of generating key
5159209968Information processing apparatus, information processing method, and program
5169208346Persona-notitia intellection codifier
5179203829Unified user login
5189203815Systems and methods for secure third-party data storage
5199203811Authenticated encryption support in ISO/IEC 23009-4
5209203801Storage gateway security model
5219203800Communication method, node, and network system
5229203734Optimized bi-directional communication in an information centric network
5239203626User authentication system and method for encryption and decryption
5249203608System for encrypting data with an error correction code
5259203607Keyless challenge and response system
5269203556Optimized code table signaling for authentication to a network and information system
5279198034Validating presence of a communication device using a wireless local area network
5289197637Method of comparing private data without revealing the data
5299197613Document processing method and system
5309197412Low-complexity electronic circuit protected by customized masking
5319195954Autonomic manufacturing operator authorization adjustment
5329191395Method and apparatus for providing an adaptable security level in an electronic communication
5339191382User authentication using swappable user authentication services
5349191374Routing device data caching
5359191372Tracking electronic content
5369191291Detection and handling of aggregated online content using decision criteria to compare similar or identical content items
5379191196Secure computation using a server module
5389185560Identity management on a wireless device
5399185118Preventing inappropriate data transfers based on reputation scores
5409185087Medical device communication using encryption based on correlated motion
5419183841Identification of watermarked content
5429183411Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption
5439183158System and method for hardware based security
5449182748RFID access control reader with enhancements
5459179311Securing vehicle service tool data communications
5469179190Apparatus, method, and system for digital content and access protection
5479178873Systems and methods for secure password entry
5489178779System for detecting whether client state matches predetermined state
5499178703Method of protecting a control vector in an optional block of a standard key block
5509178700Information processing apparatus, information processing method, program, and recording medium
5519178699Public key encryption algorithms for hard lock file encryption
5529178694Securing backing storage data passed through a network
5539178693Distributed media-protection systems and methods to operate the same
5549177489Digital rights convergence place chaser
5559172718Endpoint load rebalancing controller
5569172711Originator publishing an attestation of a statement
5579172542System and method to pass a private encryption key
5589172529Hybrid encryption schemes
5599172528Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads
5609171271Computer system, client device and method
5619170297Secure low pin count scan
5629167433Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
5639167429Visible light communication system, communication terminal and server
5649166995Systems and methods for using user-input information to identify computer security threats
5659166956Priority-based ordering of cryptographic processing in wireless communication apparatus
5669166953Method and apparatus for providing identity based encryption in distributed computations
5679166795Device and method for forming a signature
5689166792Data management device, power usage calculation system, data management method, and computer program product
5699166789Cryptographic processing apparatus
5709166788Method and device for obtaining a security key
5719166785Cryptography processing device and cryptography processing method
5729166777Method and system for user authentication for computing devices utilizing PKI and other user credentials
5739165139System and method for creating secure applications
5749164927Integrated circuit and memory data protection apparatus and methods thereof
5759160763Endpoint load rebalancing controller
5769160728Message sending/receiving method
5779160546Authenticating users based upon an identity footprint
5789160533Random number generation
5799160528Distributed single sign on technologies including privacy protection and proactive updating
5809160525Apparatus and method for key update for use in a block cipher algorithm
5819160523Apparatus and method to prevent side channel power attacks in advanced encryption standard
5829160522System and method for verifying the identity of an individual by employing biometric data features associated with the individual
5839159179Common access card security and document security enhancement
5849158933Protection of encryption keys in a database
5859158896Method and system for generating a secure key
5869158829System and method of data security in synchronizing data with a wireless device
5879154946Secure coupling of hardware components
5889154505Simplified login for mobile devices
5899154481Decryption of a protected resource on a cryptographic device using wireless communication
5909154471Method and apparatus for unified encrypted messaging
5919154469System and method of protecting data on a communication device
5929154308Revocable platform identifiers
5939154295Method of generating a correspondence table for a cryptographic white box
5949148421Method and system for encryption of messages in land mobile radio systems
5959148411Known plaintext attack protection
5969148410Recording medium storing data processing program, data processing apparatus and data processing system
5979148409Method and apparatus to facilitate message transmission and reception using different transmission characteristics
5989148281Random number generation
5999148280Method and system for providing secure, modular multimedia interaction
6009147402Method and apparatus for detecting which one of symbols of watermark data is embedded in a received signal
6019147062Renewal of user identification information
6029143488Real-time encryption of voice and fax over IP
6039143326Method and system for encrypting data
6049143325Masking with shared random bits
6059143320Electronic key registration system
6069143317Protecting against white box attacks using column rotation
6079141824Dynamic database update in multi-server private information retrieval scheme
6089141823Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation
6099141819Encrypted tape access control via challenge-response protocol
6109141816Authenticating a replaceable printer component
6119139414Systems and methods for fuel dispenser security
6129137659Method and system for decoupling user authentication and data encryption on mobile devices
6139137493Method and device for excerpt licensing
6149137214Encrypted content streaming
6159137024System and method for incorporating an originating site into a security protocol for a downloaded program object
6169137011Rapid data encryption and decryption for secure communication over open channels with plausible deniability
6179135834Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation
6189135833Process for selecting compressed key bits for collision resolution in hash lookup table
6199135459Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface
6209135453Preventing data extraction by side-channel attack
6219135418System and method for creating secure applications
6229134998Enforcing alignment of approved changes and deployed changes in the software change life-cycle
6239134708Information processing device and power use adjustment system
6249133012Systems and methods for fuel dispenser security
6259131292Wireless microphone system
6269130745Encryption processing device and method
6279130739Method and apparatus for nonlinear IV setup in keystream generators
6289129121Locating cryptographic keys stored in a cache
6299128476Secure robotic operational system
6309124432Host device and authentication method for host device
6319124423Iterative data secret-sharing transformation
6329122893Trusted platform module switching
6339122882Method and apparatus of securely processing data for file backup, de-duplication, and restoration
6349119062Methods and apparatus for providing additional security for communication of sensitive information
6359118684Method for requesting user access to an application
6369118663Agile OTP generation
6379118631Mixing secure and insecure data and operations at server database
6389118486Revocation of public key infrastructure signatures
6399118464Set of servers for "machine-to-machine" communications using public key infrastructure
6409118463Distributed single sign on technologies including privacy protection and proactive updating
6419118441Layout-optimized random mask distribution system and method
6429117095Data security for digital data storage
6439117087System and method for creating a secure channel for inter-application communication based on intents
6449117061Techniques for securing authentication credentials on a client device during submission in browser-based cloud applications
6459116888Customer controlled data privacy protection in public cloud
6469116741Computer program product, and information processing apparatus and method
6479112967Anonymous communication system and transmission method of information transmission unit in anonymous communication system
6489112698Cryptographic device and method for data encryption with per-round combined operations
6499112681Method and apparatus for secure information transfer to support migration
6509112677Communication device and cryptographic key creation method in cryptographic key sharing system
6519111103Remote access control of storage devices
6529107065Secure information transfer via bar codes
6539106617Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween
6549106407Key generation using multiple sets of secret shares
6559106366Distributing data to multiple clients from server
6569104853Supporting proximity based security code transfer from mobile/tablet application to access device
6579100548Feature enablement at a communications terminal
6589100418Adaptive data verification for resource-constrained systems
6599100193Method for protecting sensor data from manipulation and sensor to that end
6609100185Encryption processing apparatus and method
6619100183Computer program product and method for order preserving symbol based encryption
6629100091Framing mechanism for time-division-duplex OFDM communication systems
6639098978Game system and management apparatus having a convenient authentication process for ensuring security
6649094820Systems and methods for securely transmitting and receiving discovery and paging messages
6659094621Document management
6669094443Web redirection for content scanning
6679094379Transparent client-side cryptography for network applications
6689094217Secure credential store
6699094195Protecting de-duplication repositories against a malicious attack
6709092780User-mediator monitoring and controlling access to electronic content
6719092612Method and system for secure access to data files copied onto a second storage device from a first storage device
6729092385Facilitating access of a dispersed storage network
6739088933Apparatus and methods for anonymous paired device discovery in wireless communications systems
6749088890Method and apparatus for encrypting short data in a wireless communication system
6759088561Method and system for authentication in a computer network
6769088553Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets
6779088548Streaming system and method
6789088545Snippet matching in file sharing networks
6799088538Secure network storage
6809088407Distributed storage network and method for storing and retrieving encryption keys
6819087221Device for preventing logging of clients input data in a computer system
6829087212Methods and apparatus for securing a database
6839087187Unique credentials verification
6849083753Secure network access control
6859083738Airborne wireless device security
6869083684Communication node, key synchronization method, and key synchronization system
6879083682Communication device and computer program product
6889083590Long range WLAN data unit format
6899083531Performing client authentication using certificate store on mobile device
6909083526Fully homomorphic encryption
6919083515Forward secure pseudorandom number generation resilient to forward clock attacks
6929083511Message key generation
6939083506Cryptographic processing apparatus and cryptographic processing method, and computer program
6949083489Block encryption method and apparatus
6959083487Method for transmitting and receiving encrypted digital information with encrypted parity bits and related systems
6969083486Personal point of sale
6979081946Secure mass storage device
6989081635Provision to an application of a random number not generated by an operating system
6999077724Systems and methods for analyzing application security policies
7009077711Selective complex data entry from one time passwords for authentication
7019077540Method for verification of decryption processes
7029077537Generating secure private keys for use in a public key communications environment
7039077522Two-party private estimation of dataset similarity
7049077520Method for secure communication in a network, a communication device, a network and a computer program therefor
7059077509Secure threshold decryption protocol computation
7069077485Automatic security action invocation for mobile communications device
7079071664Methods and apparatus for secure and adaptive delivery of multimedia content
7089071589Encryption key management for storage area network devices
7099071581Secure storage with SCSI storage devices
7109071569System, method, and computer program for content metadata and authorization exchange between content providers and service providers
7119071446Tamper-protected hardware and method for using same
7129071442Signcryption method and device and corresponding signcryption verification method and device
7139071440Method and system of authenticating the identity of a user of a public computer terminal
7149071427Method and apparatus for establishing a key agreement protocol
7159071408Communication system
7169070279Electronic key registration system
7179069940Secure host authentication using symmetric key cryptography
7189069706Confidential information protection system and method
7199066117Container agnostic encryption device and methods for use therewith
7209065640Method and apparatus for generating non-interactive key and method for communication security using the same
7219065636Data encryption system and method
7229065631Integrated cryptographic module providing confidentiality and integrity
7239065593Securing speech recognition data
7249064353Systems and methods for improved access to an attraction
7259064229Real-time asset tracking using discovery services
7269064129Managing data
7279064123Secure product-sum combination system, computing apparatus, secure product-sum combination method and program therefor
7289064091Coupled dynamical systems for chaos computing
7299063823Software development and distribution workflow employing meta-object time stamping
7309059981System, method, and computer program product for security verification of communications to tenants of an on-demand database service
7319059857Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message
7329059838Encryption algorithm with randomized buffer
7339058507Signal processor with an encrypting or decrypting device in a memory system
7349055057Automatic elevation of system security
7359055055Provisioning account credentials via a trusted channel
7369055035Medical device with secure data transmission
7379054874System and method for data authentication among processors
7389054864Method and apparatus of securely processing data for file backup, de-duplication, and restoration
7399054863Industrial protocol system authentication and firewall
7409054861Enhanced key agreement and transport protocol
7419054848Electronic apparatus and encryption method thereof
7429052931Method and system for machine identification
7439049012Secured cryptographic communication system
7449049009Data transmission system
7459049004Low-power encryption apparatus and method
7469047477Distributed key encryption in servers
7479047461Computer-implemented method for replacing a data string
7489043868Network security appliance
7499043599Method and server for providing a mobility key
7509043596Method and apparatus for authenticating public key without authentication server
7519042549Apparatus and method for address privacy protection in receiver oriented channels
7529042548SPS authentication
7539042545Apparatus and method for converting random binary sequence into random integer
7549042543Method for arbitrary-precision division or modular reduction
7559038130Sensor aware security policies with embedded controller hardened enforcement
7569037870Method and system for providing a rotating key encrypted file system
7579037855Method for reproducing content data and method for generating thumbnail image
7589037849System and method for managing network access based on a history of a certificate
7599037845System and method for obtaining certificate status of subkeys
7609037844System and method for securely communicating with electronic meters
7619037726Apparatus and methods for managing messages sent between services
7629036817Network communications using quantum key distribution
7639032497System and method for securing embedded media
7649032211Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message
7659032210Mobile electronic device configured to establish secure wireless communication
7669032040Receiving device and method
7679031238Data encryption and/or decryption by integrated circuit
7689031234Encryption device and decryption device
7699031233Method and storage device for protecting content
7709031231Device and user authentication
7719031230Encryption processing device, encryption processing method, and program
7729031161Apparatus and method for scrambling in a wireless communication system
7739027079Method and system for dynamic security using authentication servers
7749026797Server apparatus having one-time scan code issuing function, user terminal having one-time scan code recognizing function and method for processing one-time scan code
7759026785Method and apparatus for smart-key management
7769026782Token-based entitlement verification for streaming media decryption
7779026497Failover systems and methods for performing backup operations
7789026276Unmanned air vehicle communications
7799025768Securing variable length keyladder key
7809021572Anonymous access to a service by means of aggregated certificates
7819021258Method and device for transcoding during an encryption-based access check on a database
7829021247Home network controlling apparatus and method to obtain encrypted control information
7839020151Secure real-time data replication with disk encryption and key management system
7849015855Secure tunneling platform system and method
7859015478System and method for preventing web crawler access
7869014370High performance hardware-based execution unit for performing C2 block cipher encryption/decryption
7879009845Distributing advertisement-supported software while ensuring certain software freedoms by license
7889009812System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks
7899009483Replacing blinded authentication authority
7909009481System and method for protecting cryptographic assets from a white-box attack
7919009474Method and system for detecting data modification within computing device
7929009461Selectively performing man in the middle decryption
7939008314Secure wireless communications
7949008304Content protection key management
7959008303Method and apparatus for generating forward secure pseudorandom numbers
7969003199Modular cryptographic device providing multi-mode wireless LAN operation features and related methods
7979003192Protocol for protecting third party cryptographic keys
7989002016Rekey scheme on high speed links
7999002015System and method for multi-carrier network operation
8009002013System and apparatus for information display
8019002004Appending pseudo-random sub-LSB values to prevent intensity banding
8029002003Password protocol for data communication system
8039002002Method and apparatus of high speed encryption and decryption
8048997247Information processing device, information processing method, and computer-readable recording medium
8058997206Peer-to-peer network over a virtual private network
8068996874Protection of a program waiting to be executed in a memory used by a microprocessor
8078996871Method and system for generating ciphertext and message authentication codes utilizing shared hardware
8088996861Secure communications system for mobile devices
8098995668Privacy management for tracked devices
8108995667Mechanism for co-ordinated authentication key transition for IS-IS protocol
8118995664Security in wireless communication system and device
8128995663Method for implementing an encryption engine by smart key device
8138995660Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
8148995657Device and method for certifying one's own authenticity
8158995656Multiple hashing in a cryptographic scheme
8168995655Method for creating asymmetrical cryptographic key pairs
8178995651Multiple algorithm cryptography system
8188995650Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection
8198990935Activity signatures and activity replay detection
8208990929Auditing application activities
8218990888Method and apparatus for providing a one-time password
8228990570Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer
8238990554Network optimization for secure connection establishment or secure messaging
8248989388Distribution of storage area network encryption keys across data centers
8258989385Data encryption method, data verification method and electronic apparatus
8268989382Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
8278989379Network encryption key rotation
8288989374Cryptographic device for secure authentication
8298989373Method for connecting an external apparatus and multimedia replaying apparatus using the same
8308984283Private certificate validation method and apparatus
8318984280Systems and methods for automating certification authority practices
8328984268Encrypted record transmission
8338983075Custodian securing a secret of a user
8348983074Input content data managing system and method of managing input content data
8358983072Portable data carrier featuring secure data processing
8368983071Key management method using hierarchical node topology, and method of registering and deregistering user using the same
8378983068Masked nonlinear feedback shift register
8388983067Cryptographic circuit and method therefor
8398983061Method and apparatus for cryptographically processing data
8408978097Method and system for authentication based on wireless identification, wireless identification and server
8418977864Programmable logic device with resistance to external monitoring attacks
8428976967Mediator monitoring and controlling access to electronic content
8438976960Methods and apparatus for correlation protected processing of cryptographic operations
8448976813Secure quality of service
8458972300Content distribution system
8468971535Multi-level key management
8478971530Cryptographic key generation using a stored input value and a stored count value
8488971529Information recording device
8498971528Modified elliptic curve signature algorithm for message recovery
8508971525Method, module and system for providing cipher data
8518966651Digital rights management (DRM) locker
8528966636Transforming unit tests for security testing
8538966611Method and apparatus for local area networks
8548966255Communication apparatus and communication system
8558966248Secure software file transfer systems and methods for vehicle control modules
8568966241Apparatus and method for sending encrypted data to conditional access module over common interface, conditional access module and system thereof
8578966081Method for device security in a heterogeneous storage network environment
8588964990Automating key rotation in a distributed system
8598964982Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium
8608964976Secure storage and retrieval of confidential information
8618964975Method of key derivation in an integrated circuit
8628964974Zero configuration of security for smart meters
8638964973Systems and methods for controlling file execution for industrial control systems
8648964972Apparatus, method, and system for digital content and access protection
8658959581Switching apparatus, authentication server, authentication system, authentication method, and computer program product
8668959570Verifying a security token
8678959355Authentication device, authentication method, program, and signature generation device
8688959352Transmarking of multimedia signals
8698958560Efficient multivariate signature generation
8708958559System and method for secure instant messaging
8718958556Method of secure cryptographic calculation, in particular, against attacks of the DFA and unidirectional type, and corresponding component
8728958552Data processing device
8738958549Countermeasure method and device for protecting data circulating in an electronic component
8748958416Standard telephone equipment (STE) based deployable secure communication system
8758955139Sound and effective data-flow analysis in the presence of aliasing
8768954754Method and apparatus to process SHA-1 secure hashing algorithm
8778954742Method and apparatus for digital authentication of valuable goods
8788954730Establishing historical usage-based hardware trust
8798953808System and method for effectively performing data restore/migration procedures
8808953807Method and apparatus for remotely provisioning software-based security coprocessors
8818953806Method and apparatus for remotely provisioning software-based security coprocessors
8828953802Signal security in a satellite signal distribution environment
8838953796Techniques for accessing features of a hardware adapter
8848953792Combining key control information in common cryptographic architecture services
8858953791Key derivative function for network communications
8868953789Combining key control information in common cryptographic architecture services
8878953646Method and apparatus of multiplexing media streams
8888949996Transforming unit tests for security testing
8898949935Secure account creation
8908949617Disrupting password attack using compression
8918949614Highly efficient guarantee of data consistency
8928949604System and method for issuing an authentication key for authenticating a user in a CPNS environment
8938949493Configurable multi-lane scrambler for flexible protocol support
8948948401Method for filtering of abnormal ONT with same serial number in a GPON system
8958948396Method for a communication device to operate with multiple key management facilities
8968948394Method and apparatus for distribution and synchronization of cryptographic context information
8978948388Elliptic curve random number generation
8988948382Secure protocol for peer-to-peer network
8998948380Communication apparatus, control method of communication apparatus, computer program, and storage medium
9008948376Format-preserving encryption via rotating block encryption
9018943605Proximity based digital rights management
9028943318Secure messaging by key generation information transfer
9038943309Cookie security system with interloper detection and remedial actions to protest personal data
9048942374Encryption device
9058942373Data encryption and decryption method and apparatus
9068942372Method and device for identifying objects
9078938624Encryption key destruction for secure data erasure
9088938070Encryption using real-world objects
9098935747Access right management system, access right management method, and access right management program
9108935541Method and apparatus for encrypting and processing data in flash translation layer
9118935534MACSec implementation
9128935531Privacy system
9138934629Communication apparatus, image input apparatus, image output apparatus, wireless communication circuit, method for controlling apparatus, and program
9148934626Method to manage revocations in a group of terminals
9158934327MBS with outer coding and adjusted frame reference
9168931042Dividing a data processing device into separate security domains
9178930689Securing email conversations
9188930423Method and system for restoring encrypted files from a virtual machine image
9198929552Electronic information and cryptographic key management system
9208929549Method and device for setting up wireless network connection
9218929544Scalable and secure key management for cryptographic data processing
9228929543Enhanced key management for SRNS relocation
9238929540Information processing apparatus, information recording medium manufacturing apparatus, information recording medium, method, and computer program

2014

9248925075Method for protecting data used in cloud computing with homomorphic encryption
9258924740Encryption key transmission with power analysis attack resistance
9268924730Digital watermarking for secure transmission between a source component and a node device
9278924041Vehicle central lock antitheft method and system
9288923519Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
9298923517Multi-terminal quantum key distribution system
9308923516Systems and methods for securely transmitting and receiving discovery and paging messages
9318923511Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
9328923510Method and apparatus for efficiently implementing the advanced encryption standard
9338918894Information processing system, anonymization method, information processing device, and its control method and control program
9348918877Signature compilation on a security device
9358918838Anti-cyber hacking defense system
9368918651Cryptographic erasure of selected encrypted data
9378918648Digital signature and key agreement schemes
9388917870Methods and devices for computing a shared encryption key
9398917867Elliptic curve cryptography with fragmented key processing and methods for use therewith
9408914858Methods and apparatus for security over fibre channel
9418914857Security bypass environment for circumventing a security application in a computing environment
9428914647Method and system for protecting data
9438913750Method for managing keys and/or rights objects
9448913740Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule
9458913721Systems and methods for preventing sensitive information from being communicated into a non-secure environment
9468909967Technique for secure computation
9478909921Signature management method and signature management device
9488908867Automatic recovery of TPM keys
9498908863Method, network element, and mobile station for negotiating encryption algorithms
9508908862Method, system, and devices for fast session transfer of wireless devices from one frequency band to another
9518908861AES algorithm-based encryption apparatus and method for mobile communication system
9528908860Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing
9538907794Cryptographic lock, method of operation thereof and secure container employing the same
9548904503Systems and methods for providing access to data accounts within user profiles via cloud-based storage services
9558904177Authentication for a multi-tier wireless home mesh network
9568904175System and method for secure distribution and/or storage of data files with long term file integrity verification
9578904171Secure search and retrieval
9588904036System and method for electronic secure geo-location obscurity network
9598903085Adding randomness internally to a wireless mobile communication device
9608903084Efficient key derivation for end-to-end network security with traffic visibility
9618898473System and method for compressing secure E-mail for exchange with a mobile data communication device
9628898467Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
9638898465System and method for fuse enablement of a secure client hosted virtualization in an information handling system
9648898463Device
9658898461Battery authentication method and apparatus
9668898452Protocol translation
9678897446Methods for the generation of identical symmetrical cryptographic keys
9688897444Information processing apparatus and information processing method
9698897442Encryption device, decryption device, encryption method, decryption method, program, and recording medium
9708897441Packet transmitting and receiving apparatus and packet transmitting and receiving method
9718893227System and method for providing privacy in smart meter deployment
9728892890Key agreement and transport protocol
9738892865Multiple authority key derivation
9748892839Methods, systems, and storage mediums for managing content storage and selection
9758891771Communication apparatus, communication method, and computer program
9768891770Pair-wise keying for tunneled virtual private networks
9778891764Quarantine method for sellable virtual goods
9788891761Block encryption device, decryption device, encrypting method, decrypting method and program
9798891760System for checking acceptance of string by automaton
9808887292Method for encrypting and embedding information in a URL for content delivery
9818886948Identity management on a wireless device
9828886943Authentication of a vehicle-external device
9838885833One-time recovery credentials for encrypted data access
9848885830Method and apparatus for dynamically establishing and joining an encrypted collaborative communication session
9858885829Antipiracy key segmentation for HFC multicast distribution from master headend to cable hubs
9868885820Key expansion using seed values
9878885818Authentication of data streams
9888881246System and method for providing secured integrated engineering analysis
9898880884System and method for enabling seamless transfer of a secure session
9908880875System, apparatus and method for decentralizing attribute-based encryption information
9918879736Telecommunication systems and encryption of control messages in such systems
9928879735Shared secret arrangements and optical data transfer
9938879734Enhanced high availability for group VPN in broadcast environment
9948879728Key creation and rotation for data encryption
9958879727Method and apparatus for hardware-accelerated encryption/decryption
9968879724Differential power analysis--resistant cryptographic processing
9978875245Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium
9988875222Efficient XACML access control processing
9998874938Program execution device
10008874936Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium
10018874913Secure communications between devices using a trusted server
10028874911Terminal device, system, connection management server, and computer readable medium
10038874904View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device
10048873756System for transmitting a data signal in a network, method, mobile transmitting device and network device
10058873755Establishing secure links between wireless devices in proximity using ambient wireless signals
10068873749Multi-user searchable encryption system and method with index validation and tracing
10078872970System and method for transport stream sync byte detection with transport stream having multiple emulated sync bytes
10088868907Device, method, and system for processing communications for secure operation of industrial control system field devices
10098867746Method for protecting a control device against manipulation
10108867745Efficient transmission of cryptographic information in secure real time protocol
10118867744Security in wireless communication systems
10128867743Encryption of large amounts of data using secure encryption methods
10138863295Linking video sharing accounts with content delivery accounts
10148863249Push button configuration of multimedia over coax alliance (MoCA) devices
10158863135Preemptive smart card access and data transfer based on application priority
10168862874Certificate distribution using secure handshake
10178862867Method and system for protecting security of the third layer mobility user plane data in NGN
10188861735Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
10198861734Secret information distribution system, method, program, and transmission system
10208861733Method of personalizing a NFC chipset
10218861731Efficient procedure for pairing medical devices for wireless communication with limited user interaction
10228861726Method for generating cryptographic half-keys, and associated system
10238861719Method of generating a random permutation, random permutation generating device, and encryption/decryption device having the same
10248861718Method of preventing fault-injection attacks on Chinese Remainder Theorem-Rivest Shamir Adleman cryptographic operations and recording medium for storing program implementing the same
10258856533Device, system and method for determining authenticity of an item
10268856308Cloud scale automatic identity management
10278855318Master key generation and distribution for storage area network devices
10288855314Hierarchization of crytographic keys in an electronic circuit
10298855309Apparatus and method for providing security service
10308855308Method and apparatus for encoding security status information
10318855304System and method for generating session keys
10328855303Cryptography using a symmetric frequency-based encryption algorithm
10338855302Apparatus and method for Skein hashing
10348855299Executing an encryption instruction using stored round keys
10358850538Agile OTP generation
10368850227Cryptographic operations using a key hierarchy
10378850222Electronic apparatus, display driving apparatus, and digital content display method thereof
10388850195Tethered device systems and methods
10398850179Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport
10408848919Revocation status using other credentials
10418848917Verification of the integrity of a ciphering key
10428848915Method for automatic WLAN connection between digital devices and digital device therefor
10438848914Spectrum authorization and related communications methods and apparatus
10448848913Scrambling sequence generation in a communication system
10458843749Visualization of trust in an address bar
10468843747Communication apparatus and communication system
10478842839Device with multiple one-time pads and method of managing such a device
10488842838Method and apparatus of securely processing data for file backup, de-duplication, and restoration
10498842826Information-theoretically secure secrecy generation
10508839445Method and device for securely transferring digital data
10518839418Finding phishing sites
10528839354Mobile enterprise server and client device interaction
10538838979Advanced watermarking system and method
10548838972Exchange of key material
10558838969Enterprise computer investigation system
10568838965Secure remote support automation process
10578838951Automated workflow generation
10588837734Managing encrypted data and encryption keys
10598837729Method and apparatus for ensuring privacy in communications between parties
10608832797Method and system for ensuring authorized operation of a communication system as a secondary user
10618832796Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
10628832464Processor and method for implementing instruction support for hash algorithms
10638832449Security considerations for the LTE of UMTS
10648832442Method and device for securely distributing data in group communication
10658832439Multiple system images for over-the-air updates
10668831225Security mechanism for wireless video area networks
10678831221Unified architecture for crypto functional units
10688826042Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device
10698826026Systems and methods for tracking electronic files in computer networks using electronic signatures
10708826025Authentication device, authentication method, program, and signature generation device
10718826009Method of handling a certification request
10728826004Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority
10738826001Securing information within a cloud computing environment
10748825223Hashed strings for machine-to-machine communication based on time and secret strings
10758824684Dynamic, selective obfuscation of information for multi-party transmission
10768824680Centralized key generation
10778824679Methods and apparatus for protecting digital content
10788824671Data converter, data conversion method, and computer program
10798819854Information processing apparatus, system management method, and recording medium
10808819846Making system constraints of a specified permission in digital rights management
10818819720IPTV follow me content system and method
10828819448Method and system for managing information on mobile devices
10838819410Private electronic information exchange
10848819408Document processing method and system
10858817988Variable epoch scheduler for proactive cryptography systems
10868817979Standalone hardware accelerator for advanced encryption standard (AES) encryption and decryption
10878817973Encrypting method having countermeasure function against power analyzing attacks
10888813247Providing cryptographic security for objective-oriented programming files
10898813174Embedded security blades for cloud service providers
10908812875Virtual self-destruction of stored information
10918812833Wireless multiband security
10928811615Index-based coding with a pseudo-random source
10938811611Encryption/decryption of digital data using related, but independent keys
10948811610Method, medium, and system for encrypting and/or decrypting information of microarray
10958810192Power aggregation system for distributed electric resources
10968806615System and method for protecting specified data combinations
10978806606Service aggregation in a cloud services center
10988806214Communication with non-repudiation and blind signatures
10998806201HTTP authentication and authorization management
11008804950Methods and apparatus for producing a hash value based on a hash function
11018804701Reliable reporting of location data
11028800022Method and system for handling security in an IP multimedia gateway
11038799981Privacy protection system
11048799655Mobile offline authentication using one-time passcodes
11058799651Method and system for encrypted file access
11068799639Method and apparatus for converting authentication-tokens to facilitate interactions between applications
11078799637System, method and software application for secure communication
11088798271Communication system, wireless communication apparatus, and communication method
11098798266Secure data transfer on a handheld communications device
11108798265Secure data transfer on a handheld communications device
11118798264Technique for handling media content to be accessible via multiple media tracks
11128798081Event delivery system, rendezvous node, broker node, load distribution method for event delivery system, load distribution method for rendezvous node, delivery route construction method for broker node, storage medium storing load distribution program, and storage medium storing delivery route construction program
11138792643System and methodology for decrypting encrypted media
11148792637Downloading of data to secure devices
11158789185Method and apparatus for monitoring a computer system for malicious software
11168789173Protecting against distributed network flood attacks
11178788847Secure data processing method and associated device
11188788842System and method for content protection based on a combination of a user PIN and a device specific identifier
11198788824Selective encryption in broker-based messaging systems and methods
11208788808Authenticating digitally encoded products without private key sharing
11218788430Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer
11228788428Multimode retail system
11238787724Information processing apparatus, information processing method and program
11248787574Multicast key negotiation method suitable for group calling system and a system thereof
11258787573Cipher communication method and apparatus for the same
11268787565Method and apparatus for generating an advanced encryption standard (AES) key schedule
11278787564Assessing cryptographic entropy
11288787563Data converter, data conversion method and program
11298782416Family dwelling restricted communication system
11308782415System for, and method of, providing the transmission, receipt and content of an E-mail message to a recipient
11318782413Unattended code update of storage facility
11328782410Avoiding padding oracle attacks
11338782402System and method for secure communications
11348781128Method and device for automatically distributing updated key material
11358781126Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network
11368781119User-controlled Random-ID generation function for smartcards
11378781118Digital fingerprints for integrated circuits
11388781114Apparatus and method for recognizing a failure of a cryptographic unit
11398781111System and methods for side-channel attack prevention
11408781110Unified system architecture for elliptic-curve cryptography
11418779890Radio devices, regulation servers, and verification servers
11428776199Authentication of a server by a client to prevent fraudulent user interfaces
11438775806System and method for providing unique encryption key
11448775804Matching authentication method, device and system for wireless communication
11458775803High security display of private data
11468774413Method and apparatus for processing entitlement control message packets
11478774407System and method for executing encrypted binaries in a cryptographic processor
11488774401Right object renewal method and apparatus for right-protected broadcast service
11498769610Distance-modified security and content sharing
11508769299License utilization management system license wrapper
11518769298Digital rights management using trusted processing techniques
11528769289Authentication of a user accessing a protected resource using multi-channel protocol
11538769288Discovery of security associations
11548769283MTC device authentication method, MTC gateway, and related device
11558769282Localized network authentication and security using tamper-resistant keys
11568769273Method and system for establishing a trusted and decentralized peer-to-peer network
11578767963Method for encrypting short message of mobile communication
11588767956Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
11598767954Methods and systems for deriving a cryptographic framework
11608763144Associating first and second watermarks with audio or video content
11618763026Flexible interface for secure input of pin code
11628762732Security method and apparatus
11638762713User authentication system and method for encryption and decryption
11648762712Methods and system for person-to-person secure file transfer
11658762707Authorization, authentication and accounting protocols in multicast content distribution networks
11668762705System and method for preventing web crawler access
11678761402System and methods for digital content distribution
11688761401System and method for secure key distribution to manufactured products
11698761398Access to authorized domains
11708761391Digital watermark key generation
11718761390Production of cryptographic keys for an embedded processing device
11728761389Memory
11738756624Method for single sign-on when using a set-top box
11748756410Polynomial evaluation delegation
11758755520Apparatus and method for generating a key for broadcast encryption
11768755519Lattice scheme for establishing a secure multi-identity authentication context
11778752166Security-activated operational components
11788752165Provisioning secrets in an unsecured environment
11798751822Cryptography using quasigroups
11808751806Method and apparatus to provide public key authentication with low complexity devices
11818751798Digital rights management handler and related methods
11828751789General purpose distributed encrypted file system
11838751788Payment encryption accelerator
11848751781System and method for supporting secure subsystems in a client hosted virtualization system
11858750827LAN-based UMA network controller with aggregated transport
11868750707System and method for establishing secure communications between transceivers in undersea optical communication systems
11878750521Method and system for station switching when wireless terminal point completes WPI in convergent WLAN
11888750520Appraising systems with zero knowledge proofs
11898750519Data protection system, data protection method, and memory card
11908750511Root node and a computer readable medium
11918750509Wireless surveillance system releasably mountable to track lighting
11928750506Methods, nodes, system, computer programs and computer program products for secure user subscription or registration
11938750505Apparatus and method for controlling conversion of broadcasting program based on program protection information
11948750504Method of providing a portable true random number generator based on the microstructure and noise found in digital images
11958750503FPGA configuration bitstream encryption using modified key
11968750500Multi-dimensional montgomery ladders for elliptic curves
11978750498Method and apparatus for encoding data in accordance with the advanced encryption standard (AES)
11988750497Cryptographic device for implementing S-box
11998745759Associated with abnormal application-specific activity monitoring in a computing network
12008745415Multi-drive cooperation to generate an encryption key
12018745379Systems and methods for securing data in motion
12028745372Systems and methods for securing data in motion
12038745371Unified network architecture having storage devices with secure boot devices
12048744085Hierarchical group key management approach based on linear geometry
12058744079Secure communication system
12068744078System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths
12078744077Cryptographic encoding and decoding of secret data
12088744074Method and device for countering fault attacks
12098744072Exponentiation method resistant against side-channel and safe-error attacks
12108739289Hardware interface for enabling direct access and security assessment sharing
12118739247Verification service
12128738916Secure peer-to-peer messaging invitation architecture
12138738914Method and system for key exchange and method and apparatus for reducing parameter transmission bandwidth
12148738912Accelerated signature verification on an elliptic curve
12158738911Secure socket layer keystore and truststore generation
12168737623Systems and methods for remotely loading encryption keys in a card reader systems
12178737621Enabling users to select between secure service providers using a central trusted service manager
12188737617Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
12198737615Content transmission system, communication device, and content transmission method
12208737608Exponential data transform to enhance security
12218737607Finding nearby users without revealing own location
12228737605Privacy region masking device and method in vehicle black box
12238734529Distribution channel loss protection for electronic devices
12248732481Object with identity based encryption
12258732472System and method for verification of digital certificates
12268732467Masked digital signatures
12278732461Client apparatus, server apparatus, and program using entity authentication and biometric authentication
12288732454Key setting method, node, and network system
12298732451Portable secure computing network
12308731203Securing a secret of a user
12318731201Techniques for securing content in an untrusted environment
12328731199Zero knowledge proofs for arbitrary predicates over data
12338726398System and method to anonymize data transmitted to a destination computing device
12348726360Telecommunication method, computer program product and computer system
12358726334Model based systems management in virtualized and non-virtualized environments
12368726040Memory randomization for protection against side channel attacks
12378726023Authentication using GAA functionality for unidirectional network connections
12388726011Systems and methods for managing digital certificates
12398725536Establishing a patient-provider consent relationship for data sharing
12408724818Method and system for security processing during RRC connection re-establishment
12418724803Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
12428719595Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
12438719587Computer implemented method for generating a pseudonym, computer readable storage medium and computer system
12448719578Document verifying apparatus, document verifying method, and computer product
12458718281Rekey scheme on high speed links
12468718279Apparatus and method for a secure broadcast system
12478718276Cryptography on a elliptical curve
12488713330Data scrambling in memory devices
12498713326Software self-checking systems and methods
12508713322Author signatures for legal purposes
12518713318Email certificates
12528713316System, apparatus and method for enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection
12538713315Content distribution system, mobile communication terminal device, and computer readable medium
12548713312Method and system for detecting data modification within computing device
12558713302Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies
12568712056Secure mobile ad hoc network
12578712055Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
12588712052System and method for secure power systems infrastructure communications
12598712050Method for implementing dynamic pseudorandom keyboard remapping
12608712049System for implementing dynamic pseudorandom keyboard remapping
12618712044Key management system
12628712043Secure provisioning of a portable device using a representation of a key
12638712041Content protection apparatus and content encryption and decryption apparatus using white-box encryption table
12648712040Data-conditioned encryption method
12658712038Cryptography on a simplified elliptical curve
12668712037Data encoding and decoding apparatus and method thereof for verifying data integrity
12678712036System for encrypting and decrypting a plaintext message with authentication
12688711843Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol
12698707406Always-on virtual private network access
12708707059End to end encryption for intrusion detection system
12718707054Establishing a secure memory path in a unitary memory architecture
12728707052Cryptographic device with resistance to differential power analysis and other external monitoring attacks
12738707021Data recording device, data recording method to be used in same, and data record controlling computer program
12748705738Selective security termination in next generation mobile networks
12758705734Method and system for authenticating a mobile terminal in a wireless communication system
12768705729Audio content protection
12778701205Validation and/or authentication of a device for communication with network
12788700906Secure computing in multi-tenant data centers
12798700905Method and device for electronically capturing a handwritten signature using embedding technique
12808700897Method and terminal equipment for applying digital rights management
12818700894Method and system for securing routing information of a communication using identity-based encryption scheme
12828700893Key certification in one round trip
12838699883Variable spectral phase encoder/decoder based on decomposition of hadamard codes
12848699713Key update with compromise detection
12858699710Controlled security domains
12868699705Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device
12878699704Secure node admission in a communication network
12888699703System and method for pseudo-random polymorphic tree construction
12898695064Method and system for machine identification
12908695060System and method for creating secure applications
12918694789System and method for generating a non-repudiatable record of a data stream
12928694772Method and system for managing network identity
12938694767Method and system for NAND flash support in an autonomously loaded secure reprogrammable system
12948693692Direct delivery of content descrambling keys using chip-unique code
12958693686Secure telephone devices, systems and methods
12968693684Method and apparatus for computing a shared secret key
12978689343System and method for securely transmitting video data
12988689290System and method for securing a credential via user and server verification
12998689286System and method for determining a security encoding to be applied to outgoing messages
13008688995Method and apparatus for detection of a fault attack
13018688994Federation among services for supporting virtual-network overlays
13028688991Media player embodiments and secure playlist packaging
13038688987Secure key distribution with general purpose mobile device
13048687810Chaotic cipher system and method for secure communication
13058687809System and method for decryption of content including disconnected encryption chains
13068687806Conditional access system employing constrained encryption keys
13078687804Separating control and data operations to support secured data transfers
13088687802Method and system for accelerating the deterministic enciphering of data in a small domain
13098683600Print policy commands
13108683561Fixed client identification system for positive identification of client to server
13118681994Systems and methods for document control using public key encryption
13128681992Monitoring and controlling access to electronic content
13138681990Renewal management for data items
13148681986Single-round password-based key exchange protocols
13158681985Masking operation method and device for symmetric key encrypted system
13168681984Context-aware based RFID privacy control system and personal privacy protection method using the same
13178681977Enabling/disabling display data channel access to enable/ disable high-bandwidth digital content protection
13188681974Array encryption core
13198677470System, method, and computer program product for security verification of communications to tenants of an on-demand database service
13208677450Systems and methods of controlling network access
13218677125Authenticating a user of a communication device to a wireless network to which the user is not associated with
13228677123Method for accelerating security and management operations on data segments
13238677120Communication between key manager and storage subsystem kernal via management console
13248677114Application steering and application blocking over a secure tunnel
13258677113Transmission of secure electronic mail formats
13268675875Optimizing use of hardware security modules
13278675871Protecting a control vector in an optional block of a standard key block
13288675863Passive system for recovering cryptography keys
13298671278Multiprotocol communication authentication
13308671276Method for passing selective encrypted attributes of specific versions of objects in a distributed system
13318670799Interface and communication protocol for a mobile device with a smart battery
13328670568Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
13338670567Recovery of expired decryption keys
13348670565Encrypted packet communication system
13358670563System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
13368670561Method and apparatus for limiting use of IP
13378667559Feature management of a communication device
13388667294Apparatus and method for preventing falsification of client screen
13398667285Remote authentication and transaction signatures
13408667282Information processing device, computer program, and information processing system
13418667274System and method for WORM data storage
13428667272System and method for content distribution with broadcast encryption
13438666079Decoding and encoding data
13448666070Method and apparatus for minimizing differential power attacks on processors
13458666065Real-time data encryption
13468666064Endecryptor capable of performing parallel processing and encryption/decryption method thereof
13478666063Method and apparatus for minimizing differential power attacks on processors
13488666062Method and apparatus for performing finite field calculations
13498661556Method and apparatus for providing network security using role-based access control
13508661260Methods and systems for indicating trustworthiness of secure communications
13518661254Authentication of a client using a mobile device and an optical link
13528661248Method, apparatus, and system for sending and receiving security policy of multicast sessions
13538660264Method and apparatus for minimizing differential power attacks on processors
13548660262Method and device for generating random wait states
13558660261System and apparatus for integrated video/image encoding/decoding and encryption/decryption
13568656501Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language
13578656457Controlling locking state transitions in a terminal
13588656177Identity-based-encryption system
13598656174Recovering from de-synchronization attacks against watermarking and fingerprinting
13608656165Electronic vehicle document display
13618654974Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
13628654970Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm
13638653938Method of protection in a contactless radiofrequency communication
13648650643Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
13658650610Systems and methods of controlling network access
13668650401Network having quantum key distribution
13678650399Memory device and chip set processor pairing
13688650391Systems and methods for securely providing and/or accessing information
13698649522Electronic data communication system
13708649510Device having coded output of operational data
13718649508System and method for implementing elliptic curve scalar multiplication in cryptography
13728646038Automated service for blocking malware hosts
13738645735Method for lowering power consumption in secure devices
13748645716Method and apparatus for overwriting an encryption key of a media drive
13758645715Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host
13768645698Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
13778645691System and method for securing data while minimizing bandwidth
13788645690Method of verifying key validity and server for performing the same
13798645281Process for authenticating an end user
13808644510Discovery of security associations for key management relying on public keys
13818644506Location-based security rules
13828644502Secure data parser method and system
13838644501Paired carrier and pivot steganographic objects for stateful data layering
13848644254Handover procedure and method and apparatus for controlling transmitter power of femto base station in broadband wireless communication system
13858640252Obfuscating entry of sensitive information
13868640210Distributed computer systems with time-dependent credentials
13878639940Methods and systems for assigning roles on a token
13888639931Acceleration of key agreement protocols
13898639929Method, device and system for authenticating gateway, node and server
13908639921Storage gateway security model
13918639451Information processing system using nucleotide sequence-related information
13928639219Battery pack authentication for a mobile communication device
13938638940Control of an entity to be controlled by a control entity
13948638938Symmetric key subscription
13958638930Random number verification method and random number verification apparatus
13968638928Key exchanging apparatus
13978638926Sharing a secret with modular inverses
13988638227Input device, input method and application of electronic combination lock
13998635680Secure identification of intranet network
14008635455Encrypted communication device with restricted rate of encryption key retrievals from memory
14018635448Secure prefix authorization with untrusted mapping services
14028635445Method for digital identity authentication
14038635442System and method for long-term digital signature verification utilizing light weight digital signatures
14048634552System and method for using a streaming protocol
14058631507Method of using signatures for measurement in a trusted computing environment
14068631461Dynamic data-protection policies within a request-reply message queuing environment
14078631247System and method for hardware based security
14088631239Multiple system images for over-the-air updates
14098630417Method for recording and restoring a ciphered content by a processing unit
14108627478Method and apparatus for inspecting non-portable executable files
14118627460Device function restricting method and system in specific perimeters
14128627415System and method for secure commercial multimedia rental and distribution over secure connections
14138627108System and method for protecting data on a mobile device
14148627107System and method of securing private health information
14158627081Multimedia data protection
14168627073Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes
14178627060Trusted network interface
14188626811Method and apparatus for providing flexible bit-length moduli on a block Montgomery machine
14198625805Digital security bubble
14208625800Portable secure element
14218625799Privacy management for tracked devices
14228625798Method and apparatus for encrypting short data in a wireless communication system
14238625787Hierarchical key management for secure communications in multimedia communication system
14248625785Identity based symmetric cryptosystem using secure biometric model
14258625782Method for privacy-preserving computation of edit distance of symbol sequences
14268625780Reduction of side-channel information by interacting crypto blocks
14278625777Pairing computation device, pairing computation method, and pairing computation program

2013

14288621540Apparatus and methods for provisioning in a download-enabled system
14298621239Method for strengthening the implementation of ECDSA against power analysis
14308621227System and method for cryptographic key exchange using matrices
14318621217Method and apparatus for trusted branded email
14328621210Ad-hoc trust establishment using visual verification
14338619991Encoding/decoding circuit
14348619980Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
14358615663System and method for secure remote biometric authentication
14368615658Dynamic foreign agent--home agent security association allocation for IP mobility systems
14378615650Control-word deciphering, transmission and reception methods, recording medium and server for these methods
14388615086Key agreement and re-keying over a bidirectional communication path
14398615085Encrypted communication system with limited number of stored encryption key retrievals
14408615084Extending a secret bit string to safeguard the secret
14418615081Secure key creation
14428612761Method of executing a cryptographic protocol between two electronic entities
14438612759Communication system for communicating data utilizing challenge data
14448612752Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network
14458612750Creating and using secure communications channels for virtual universes
14468612747System and method for establishing historical usage-based hardware trust
14478611539Group key security in a multihop relay wireless network
14488611534Electro-optic waveguide polarisation modulator
14498611533Method and system for the Orange family of stream ciphers and method and system for generating stream ciphers based on the ERINDALE-PLUS hashing function
14508611532Managing media content decryption keys in encrypted media content distribution systems and methods
14518611530Encryption via induced unweighted errors
14528607343Ticket-based personalization
14538607299Method and system for enforcing a security policy via a security virtual machine
14548607055Scanned document management system
14558606873Methods and apparatus for securely advertising identification and/or discovery information
14568605629Lawful interception of subscriber received multicast traffic
14578601558Pushing certificate chains to remote devices
14588601535Mobile authorization using policy based access control
14598601272Signature log storing apparatus
14608601262Location privacy through IP address space scrambling
14618600062Off-line content delivery system with layered encryption
14628600058Generation of self-certified identity for efficient access control list management
14638600053Message key generation
14648600050Encrypting a data transmission using multiple channels
14658600049Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation
14668600047Exponent obfuscation
14678599916Reliable and non-manipulatable processing of data streams in a receiver
14688595512Data control method of cloud storage
14698595511Securely managing the execution of screen rendering instructions in a host operating system and virtual machine
14708595509Systems and methods for online identity verification
14718595504Light weight authentication and secret retrieval
14728595485Security management method and system for WAPI terminal accessing IMS network
14738595484Method and device for distributing public key infrastructure (PKI) certificate path data
14748594332Key generating apparatus, encrypting apparatus and decrypting appatatus
14758594326Method of generating arbitrary numbers given a seed
14768594325Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
14778594324Key validation scheme
14788594323Method and apparatus for generating large numbers of encryption keys
14798590050Security compliant data storage management
14808590042Storage system, and encryption key management method and encryption key management program thereof
14818590004Method and system for dynamic security using authentication server
14828589690Information processing apparatus, server apparatus, medium recording information processing program and information processing method
14838589682System and method for secure provisioning of an information handling system
14848589680System and method for synchronizing encrypted data on a device having file-level content protection
14858589674Revocation list update for devices
14868589672Method for securely merging multiple nodes having trusted platform modules
14878588426Methods and apparatus to secure communications in a mobile network
14888588419Communication system, wireless communication apparatus, and communication method
14898588416System and method for secure communication
14908588413Enabling seamless access to a Wi-Fi network
14918588410Simplified secure symmetrical key management
14928583944Method and integrated circuit for secure encryption and decryption
14938583925Mix-net system
14948583809Destroying a secure session maintained by a server on behalf of a connection owner
14958582776Electronic monitoring system and method
14968582774Method for making safe an electronic cryptography assembly with a secret key
14978582762Method for producing key material for use in communication with network
14988582759Method and apparatus for providing content service
14998578444Systems and methods of controlling network access
15008578166System and method for authentication, data transfer, and protection against phishing
15018578158Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method
15028578155Address generating method and broadcast receiving apparatus
15038577039Cryptographic communication apparatus and cryptographic communication system
15048577037Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
15058577032Common key block encryption device, common key block encryption method, and program
15068577029Oblivious transfer with hidden access control lists
15078577024Concealing plain text in scrambled blocks
15088572729System, method and computer program product for interception of user mode code execution and redirection to kernel mode
15098572389System and method for protecting master encryption keys
15108572377Method for authentication
15118572119System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
15128571221On-chip storage, creation, and manipulation of an encryption key
15138571210Content protection apparatus and method using binding of additional information to encryption key
15148571208Method and apparatus for performing trick play on scrambled data stream
15158566916Agile OTP generation
15168565437Method and apparatus for remotely provisioning software-based security coprocessors
15178565435Efficient implementation of fully homomorphic encryption
15188565434Methods and systems for maintaining security keys for wireless communication
15198565428Network device and network connecting method for building up network connection via high definition multimedia interface
15208565421Block cipher improvements
15218565420Source centric sanction server and methods for use therewith
15228565185Framework of media-independent pre-authentication support for PANA
15238561094Protecting identification information in usage reports
15248560840Method and system for authenticating a widget
15258559638Cryptographic processing system
15268559634Encoding/decoding circuit
15278559633Method and device for generating local interface key
15288559629Sanctioning content source and methods for use therewith
15298559628Sanctioned client device and methods for use therewith
15308559627Sanctioned caching server and methods for use therewith
15318559626Cryptographic sanction server and methods for use therewith
15328555400Privacy-preserving aggregation of Time-series data
15338555340Method and apparatus for determining authentication capabilities
15348555066Systems and methods for controlling access to encrypted data stored on a mobile device
15358555065Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors
15368555064Security system and method for wireless communication system
15378554903Network appliance for vulnerability assessment auditing over multiple networks
15388554222Method, system and device for maintaining user service continuity
15398553889Mix-net system
15408553887Method for generating dynamic group key
15418553880Pseudorandom number generating system, encryption system, and decryption system
15428553878Data transformation system using cyclic groups
15438549606Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content
15448549586System utilizing a secure element
15458549579Dynamic data-protection policies within a request-reply message queuing environment
15468549315System and method for generating and managing administrator passwords
15478549310Method and apparatus for secure measurement certification
15488549305Steganographic method and device
15498549303Apparatus, system and method for electronically signing electronic transcripts
15508549278Rights management services-based file encryption system and method
15518548165Method of compressing a cryptographic value
15528548163Simultaneous scalar multiplication method
15538548162Method and a device for performing torus-based cryptography
15548547848Traffic control within a network architecture providing many-to-one transmission with denial-of-service protection
15558547706Electronic component, board unit, and information-processing device
15568544109Methods and systems involving survey administration
15578544081Secure network architecture
15588543826MACSec implementation
15598543825Method and apparatus for input of coded image data
15608543824Safe distribution and use of content
15618543822Device authentication
15628543811Efficient identity-based ring signature scheme with anonymity and system thereof
15638543804Adaptive security policy based scalable video service apparatus and method
15648543512Licensed content utilization validation using cache parameters
15658542870Methods, apparatus and programs for generating and utilizing content signatures
15668542838Method and system for generating and distributing mobile IP key
15678542828Cryptographic secret key distribution
15688542103Radio frequency identification reading by using error correcting codes on sets of tags
15698539562Automated management of system credentials
15708539252Method and system for protecting data
15718539238Authenticated nonvolatile memory signing operations
15728539093Port discovery and message delivery in a portable electronic device
15738538919System, method, and computer program for real time remote recovery of virtual computing machines
15748538025Security performance negotiation method and a TEK management method
15758538023Methods and apparatuses for administrator-driven profile update
15768538020Hybrid client-server cryptography for network applications
15778538017Encryption device
15788533607Method and apparatus for providing multiple management interfaces to a network device
15798533491Data security for digital data storage
15808533468Image forming apparatus, launching method of program in the apparatus, image forming system, and program and storage medium therefor
15818533457Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
15828532297Techniques for transmitting control channel information
15838531162Network based energy preference service for managing electric vehicle charging preferences
15848528047Multilayer access control security system
15858527763System and method for enabling seamless transfer of a secure session
15868527761System and method for fuse enablement of a secure client hosted virtualization in an information handling system
15878527751Systems and methods for secure and certified electronic messaging
15888526614Method to manage members of at least one group of decoders having access to broadcast data
15898526607Identity authentication and shared key generation method
15908526606On-demand secure key generation in a vehicle-to-vehicle communication network
15918526605Data encryption to provide data security and memory cell bit wear leveling
15928526601Method of improving operational speed of encryption engine
15938522360Posted move in anchor point-based digital rights management
15948522311Authentication techniques
15958522307Flexibly assigning security configurations to applications
15968522053Program execution device
15978522052Method and integrated circuit for secure encryption and decryption
15988522041System and method for efficiently performing a data encryption operation
15998522033Authentication device, authentication method, program, and signature generation device
16008522027Method for authenticating an entity by a verifier
16018522023Rural services platform
16028522021Communication channel of a device
16038522018Method and system for implementing a mobile trusted platform module
16048522015Authentication of binaries in memory with proxy code execution
16058520856Controlling the validity period of a decryption key
16068520853Wireless communication device, method for wireless connection, and computer usable medium therefor
16078520847Split-key key-agreement protocol
16088520846Method and device for key generation
16098520845Method and apparatus for expansion key generation for block ciphers
16108520844Methods and apparatus for providing secure two-party public key cryptosystem
16118516267Computer readable storage medium for generating an access key, computer implemented method and computing device
16128516266System and method for intermachine markup language communications
16138516244System, apparatus and method for decentralizing attribute-based encryption information
16148515081Approach for managing access to messages using encryption key management policies
16158515076Security system and method using automatic meter reading protocol
16168515074User key allocation method for broadcast encryption
16178515073Method and system for secure communication in near field communication network
16188515072Method and apparatus for providing secure communications for mobile communication devices
16198515066Method, apparatus and program for establishing encrypted communication channel between apparatuses
16208515064Method and an apparatus for key management in a communication network
16218515057Method and device for executing crytographic calculation
16228510797Online user authentication
16238510566Authentic time-stamping for archival storage
16248510561Methods and devices for computing a shared encryption key
16258510560Efficient key establishment for wireless networks
16268510559Secure session key generation
16278510557Secure message and file delivery
16288510552System and method for file-level data protection
16298509447Method and system for distributing cryptographic keys in a hierarchized network
16308509445Duplication means for an electronically coded key and related method
16318509444Scramble key management unit, scramble key management information transmitting unit, method for scramble key output management, scramble key management program, license information management unit, license management information transmitting unit, method for license information output management, and license information management program
16328509443Rekey index generation method and rekey index generation apparatus
16338509433Method and apparatus of generating encryption key for broadcast encryption
16348509431Identity management on a wireless device
16358509427Hybrid mode cryptographic method and system with message authentication
16368509425Image processing system, program and method
16378505066Security audit system and method
16388504483Electronic trading system supporting anonymous negotiation and indications of interest
16398503679Short message encryption
16408503674Cryptographic key attack mitigation
16418503673Method and system for secret key exchange using wireless link characteristics and random device movement
16428499358Program executing processing and controlling
16438499167System and method for efficient and accurate comparison of software items
16448499160Public key encryption with digital signature scheme
16458499147Account management system, root-account management apparatus, derived-account management apparatus, and program
16468498943Secure and recoverable database for on-line value-bearing item system
16478498419Wireless perimeter security device and network using same
16488498411Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables
16498495739System and method for ensuring scanning of files without caching the files to network device
16508495390System and method for data obfuscation based on discrete logarithm properties
16518495372Authentication methods and apparatus using pairing protocols and other techniques
16528495371Network device authentication
16538494966Method and apparatus for facilitating the transfer of a software license between computer systems
16548494169Validating encrypted archive keys
16558494168Locating cryptographic keys stored in a cache
16568494165Secure communications between devices using a trusted server
16578494156System, architecture and method for secure encryption and decryption
16588494155Method and apparatus of high speed encryption and decryption
16598493472Image sensing apparatus for generating image data and authentication data of the image data
16608490149Secure session handling in a device after a policy update
16618489900Method and apparatus for providing a specific user interface in a system for managing content
16628489884Methods and apparatus for generating signatures
16638488793Efficient rebinding of partitioned content encrypted using broadcast encryption
16648488785Secure storage and retrieval of confidential information
16658488784Organic keyed encryption
16668488231Generator of polarization entangled photon pairs and method of generating the same
16678484485Encryption device and encryption system
16688483393Key management system for digital cinema
16698483392Methods and apparatus for compensation for corrupted user identification data in wireless networks
16708483390Systems and methods for broadcast encryption optimization and scalability
16718483385Natural language dependent stream ciphers
16728479298Method for encrypting and embedding information in a URL for content delivery
16738479259Secure customer interface for web based data management
16748479000Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
16758478989Method and apparatus to authenticate and authorize user access to a system
16768478985Determining whether to encrypt outbound traffic
16778477946Method and apparatus for protecting encryption keys in a logically partitioned computer system environment
16788477939Polarization-insensitive one-way quantum key distribution receiver, transmitter/receiver system
16798474052User-administered license state verification
16808474007System and method of controlling identity privacy in a communication session
16818473754Hardware-facilitated secure software execution environment
16828473740Method and system for secured management of online XML document services through structure-preserving asymmetric encryption
16838473735Systems and methods for managing digital certificates
16848473701Storage media to storage drive centric security
16858472629Communication system, communication device and processing method therefor
16868472628Method of handling security key change and related communication device
16878472622Wireless communication method, information access method, and virtual antenna radiation pattern forming method
16888472619Multiple validly decryptable messages
16898468577Managed website system and method
16908468361System and method for securely provisioning and generating one-time-passwords in a remote device
16918468344Enabling multi-level security in a single-level security computing system
16928468341System and method for content distribution with broadcast encryption
16938468336System and method for providing security via a top level domain
16948467536Binding keys to secure media streams
16958467533One-time-pad encryption with key ID and offset for starting point
16968467532System and method for secure transaction of data between a wireless communication device and a server
16978467527Efficient key derivation for end-to-end network security with traffic visibility
16988467526Key evolution method and system of block ciphering
16998467525Steganographic method and device
17008464315Network invitation arrangement and method
17018464070Apparatus and method for transmitting and receiving data
17028464065Procedure and architecture for the protection of real time data
17038464062Systems, devices, and methods for securely transmitting a security parameter to a computing device
17048464059System and method for device bound public key infrastructure
17058464058Password-based cryptographic method and apparatus
17068464057Enterprise computer investigation system
17078464049Method and system of accessing copy-prevented encrypted data resources over a network
17088463713Transactional security over a network
17098463264Early IMS security
17108462953Communication system and method thereof
17118462943Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
17128462942Method and system for securing packetized voice transmissions
17138462941Encrypted stream processing circuit and method of processing encrypted stream
17148462939RNS-based cryptographic system and method
17158458774Method for secure site and user authentication
17168458763Method of automating and personalizing systems to satisfy security requirements in an end-to-end service landscape
17178458490System and method for supporting full volume encryption devices in a client hosted virtualization system
17188458481Using watermarking to reduce communication overhead
17198458480Method and apparatus for binding TPM keys to execution entities
17208458477Communication with non-repudiation
17218458475Systems and methods for product authentication
17228458470Authentication in data management
17238458457Method and system for certificate revocation list pre-compression encoding
17248457638Mobile communication method
17258457597Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
17268457316Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing
17278457308Communication system and method for protecting messages between two mobile phones
17288457306Cryptographic module and IC card
17298457305Generating genus 2 curves from invariants
17308457304Efficient encoding processes and apparatus
17318457302Access-controlled data storage medium
17328453241Method for securing streaming multimedia network transmissions
17338452959Method and system for registering a presence user with a presence service
17348452016Interoperable keychest for use by service providers
17358452014Group key management for mobile ad-hoc networks
17368452012Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
17378447988Hash processing using a processor
17388447981Method and system for generating and distributing mobile IP security key after re-authentication
17398447971Self-signed implicit certificates
17408447697Rights offering and granting
17418447040Communication apparatus, control method thereof, and storage medium
17428447037Key tree construction and key distribution method for hierarchical role-based access control
17438447036Multi-party key agreement method using bilinear map and system therefor
17448447032Generation of min-hash signatures
17458443419Method, device, and system for pre-authentication
17468443417Node authentication and node operation methods within service and access networks in NGN environment
17478443416Techniques for secure channel messaging
17488443197Voice-capable system and method for authentication using prior entity user interaction
17498443194Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system
17508442873Order processing system, method and program product
17518442535Method, system and device for maintaining user service continuity
17528442235Extensible management of self-encrypting storage devices
17538442233Telecommunication systems and encryption of control messages in such systems
17548442230Enhanced high availability for group VPN in broadcast environment
17558442216Fault detection in exponentiation and point multiplication operations using a montgomery ladder
17568442215Determining HDCP source KSV support
17578442070Fractional threshold encoding and aggregation
17588438649Streaming insertion of tokens into content to protect against CSRF
17598438392Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol
17608438391Credential generation management servers and method for communications devices and device management servers
17618437471System for scrambling and methods for use therewith
17628437470Method and system for block cipher encryption
17638433921Object authentication system
17648433916Active hip
17658433912Authentication device, authentication method, program, and signature generation device
17668433911Management server, management method, management system for downloading of contents, and mobile devices
17678433070Systems and methods for stabilization of interferometers for quantum key distribution
17688429412Method to control access between network endpoints based on trust scores calculated from information system component analysis
17698429408Masking the output of random number generators in key generation protocols
17708429405System and method for human assisted secure information exchange
17718429399Method and arrangement for security activation detection in a telecommunication system
17728428554Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access
17738428266Method and terminal for implementing hot-plug of smart card
17748428265Method and apparatus of securely processing data for file backup, de-duplication, and restoration
17758428261System and method for establishing authenticated wireless connection between mobile unit and host
17768428255Selective switching between data sources
17778428254Distributed generation of mutual secrets
17788428252Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables
17798428251System and method for stream/block cipher with internal random states
17808424064Distributed device revocation
17818423788Secure memory card with life cycle phases
17828423780Encryption based security system for network storage
17838423769Method and apparatus for generating security context
17848423764Method and apparatus for key revocation in an attribute-based encryption scheme
17858423437Certified email system and method
17868422685Method for elliptic curve scalar multiplication
17878422684Security classes in a media key block
17888422683Appraising systems with zero knowledge proofs
17898422682Method and system of generating immutable audit logs
17908422680Method for validating encrypted communications via selection and comparison of source transmitter and destination receiver associated encryption keys
17918422675Data transmission system
17928422674Application-specific secret generation
17938422671Methods of encryption and decryption using operand ordering and encryption systems using the same
17948422667Method and apparatus to facilitate transmission of an encrypted rolling code
17958421593Apparatus, systems and methods for authentication of objects having multiple components
17968417967Storage device data encryption using a binary large object (BLOB)
17978417966System and method for measuring and reporting consumption of rights-protected media content
17988417965Method and circuit for secure definition and integration of cores
17998417949Total exchange session security
18008417940System and device for parallelized processing
18018417931Method and system for NAND flash support in an autonomously loaded secure reprogrammable system
18028416954Systems and methods for accessing storage or network based replicas of encrypted volumes with no additional key management
18038416953Data protection system that protects data by encrypting the data
18048416951Method and a device for generating a pseudorandom string
18058413226User-type handling in a wireless access network
18068412957Encryption and decryption of records in accordance with group access vectors
18078412942Method and system for seamless SSID creation, authentication and encryption
18088412934System and method for backing up and restoring files encrypted with file-level content protection
18098412929System and method for administering digital certificate checking
18108411863Full volume encryption in a clustered environment
18118411860Wireless communication system, base station, terminal and wireless communication method
18128411859Non-deterministic number generation
18138411858Dynamic foreign agent-home agent security association allocation for IP mobility systems
18148411856Image forming apparatus, computer readable medium and medium
18158411855Size optimization for large elliptic curve cryptography scalar multiplication acceleration tables
18168411854Method and apparatus for authenticating a user
18178411853Alternate galois field advanced encryption standard round
18188411851Determining HDCP source KSV support
18198407758Network security appliance
18208407488Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method
18218407484Flash memory distribution of digital content
18228407483Apparatus and method for authenticating personal use of contents by using portable storage
18238407477Information distribution system and program for the same
18248407470Control device and controlled device
18258406735Method for pairing electronic equipment in a wireless network system
18268406422Cryptographic module management apparatus, method, and program
18278406382Transparent voice registration and verification method and system
18288402273Method for securing a transmission, associated system and mediation platform
18298402268System and method for providing security aboard a moving platform
18308401972System and method of generating a per sale watermarking on digital files
18318401196Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications
18328401195Method of automatically populating a list of managed secure communications group members
18338401193System and method for securing wireless communications
18348401186Cloud storage data access method, apparatus and system based on OTP
18358401185Systems and methods for securely deduplicating data owned by multiple entities
18368401184Device to generate a machine specific identification key
18378401183Method and system for keying and securely storing data
18388401181Segment deduplication system with encryption of segments
18398400995System and method for descrambling data
18408397292Method and device for online secure logging-on
18418397274Method for authenticating device capabilities to a verified third party
18428397075Method and apparatus for access control to installation control systems of wind energy installations
18438397072Computer-implemented method and system for embedding ancillary information into the header of a digitally signed executable
18448397071Generation method and update method of authorization key for mobile communication
18458397070Systems and methods for governing content rendering, protection, and management applications
18468397061Unattended code update of storage facility
18478397058System and method for communication between smart cards
18488396222Key distribution system
18498396219Scrambler, scramble processing method, and program
18508396218Cryptographic module distribution system, apparatus, and program
18518396214Method and apparatus for centrally managed encrypted partition
18528396213Elliptic curve random number generation
18538396211System and method for dynamic modification of allowable electronic message properties
18548392993Systems and methods for delaying termination of a process to capture data relating to a potential threat
18558392713Secure offline activation process for licensed software application programs
18568392711Staged establishment of secure strings of symbols
18578392703Electronic signature verification method implemented by secret key infrastructure
18588392701Method and apparatus for ensuring packet transmission security
18598392700Apparatus and system for asymmetric security
18608392699Secure communication system for mobile devices
18618391884System and method for managing created location contexts in a location server
18628391495Secure shell used to open a user's encrypted file system keystore
18638391489Processor system
18648391480Digital authentication over acoustic channel
18658391477Cryptographic device having tamper resistance to power analysis attack
18668387122Access control by testing for shared knowledge
18678386803System and method for data obfuscation based on discrete logarithm properties
18688386800Verifiable, leak-resistant encryption and decryption
18698386791Secure data processing method based particularly on a cryptographic algorithm
18708386790Method of using ECDSA with winternitz one time signature
18718386778System and method of protecting data on a communication device
18728386647Method for time source calibration and system thereof
18738385553Portable secure element
18748385552Techniques for managing keys using a key server in a network segment
18758385551Highly available cryptographic key storage (HACKS)
18768385550System and method for secure wireless multi-hop network formation
18778385549Fast authentication between heterogeneous wireless networks
18788385548System and method for entangled photons generation and measurement
18798385547Method and apparatus for secure digital communications using chaotic signals
18808385546System and method for storing and accessing digital media content using smart card technology
18818385540Block cipher algorithm based encryption processing method
18828381266Method and system for machine identification
18838380994Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in multi-core system
18848380986Method for analyzing simultaneously transmitted, encoded data streams
18858380167LAN-based UMA network controller with proxy connection
18868379863Enabling users to select between secure service providers using a central trusted service manager
18878379862Method and device for automatically distributing updated key material
18888379861Integrated circuit and a method for secure testing
18898379850Method and integrated circuit for secure encryption and decryption
18908379848Method of providing a portable true random number generator based on the microstructure and noise found in digital images
18918379847Data and control encryption
18928379846Encryption apparatus and method therefor
18938379845Multilayer encryption of a transport stream data and modification of a transport header
18948379843Data converter, data conversion method, and computer program
18958378786Security provision in standards-compliant RFID systems
18968375457Document management device, document management method and storage medium
18978375420Challenge-response system and method
18988375419Information processing apparatus, method for controlling information processing apparatus, and storage medium
18998375418Method of performing software updates (installations), on networked 32/64-bit microsoft computers in an automated environment without introducing a possible security threat
19008375223Systems and methods for secure distributed storage
19018375202Communications methods and appliances
19028374351Encryption device, program, and method
19038374344Coding
19048374342Scalar multiplier and scalar multiplication program
19058370950Securing mixed-mode applications
19068370921Ensuring quality of service over VPN IPsec tunnels
19078370896System and method for determining a security encoding to be applied to outgoing messages
19088370644Instant hardware erase for content reset and pseudo-random number generation
19098370642Cryptographic processing apparatus
19108370633Apparatus, method, and computer instructions for generating a substitute signature key pair
19118370626Method and apparatus for a configurable online public key infrastructure (PKI) management system
19128370621Counting delegation using hidden vector encryption
19138369528Method and apparatus for providing encrypted key based on DRM type of host device
19148369526Device, system, and method of securely executing applications
19158369521Smart card based encryption key and password generation and management
19168369520Cryptographic device employing parallel processing
19178369517Fast scalar multiplication for elliptic curve cryptosystems over prime fields
19188369514Method for the secure determination of data
19198364982Wireless receiver and methods for storing content from RF signals received by wireless receiver
19208364967Multi-step digital signature method and system
19218364959Systems and methods for using a domain-specific security sandbox to facilitate secure transactions
19228364955Systems and methods for effectively removing access to individual files on magnetic tape media
19238364951System for digital rights management using distributed provisioning and authentication
19248364596System and method for providing and/or obtaining electronic documents
19258363840Method and apparatus for providing broadcast service using encryption key in a communication system
19268363839Image forming apparatus
19278363838Methods for the generation of identical symmetrical cryptographic keys
19288363837Data storage device with data transformation capability
19298363833FPGA configuration bitstream encryption using modified key
19308363830Cryptographic system configured to perform a mixed radix conversion with a priori defined statistical artifacts
19318363829System for descrambling and methods for use therewith
19328363825Device for and method of collision-free hashing for near-match inputs
19338359639Systems and methods for increased security during logging in to web site
19348359469One way authentication
19358359468Masked digital signatures
19368358780Execution unit for performing the data encryption standard
19378356360License management system and authentication method for the same
19388356342Method and system for issuing a kill sequence for a token
19398356177Key transport in authentication or cryptography
19408356170Management-apparatus card, measuring apparatus, health care system, and method for communicating vital sign data
19418355503Adding randomness internally to a wireless mobile communication device
19428353058Methods and systems for detecting rootkits
19438353055Method and apparatus for processing rights object
19448353033Collecting malware samples via unauthorized download protection
19458353024Method of transmitting information effectively in server/client network and server and client apparatuses using the same
19468352998Policy evaluation in controlled environment
19478352742Receiving encrypted emails via a web-based email system
19488352735Method and system for encrypted file access
19498352724Microprocessor and grid computing system
19508352380Method and system for generating a list signature
19518351609Method for managing keys and/or rights objects
19528351608License management apparatus and method and license management system
19538351607Wireless communication device, method for wireless connection, and computer usable medium therefor
19548351604Coding method, decoding method, codec and data storage medium for holographic storage
19558351603Random number generating device, random number generating method, and security chip
19568351600Distributed storage network and method for encrypting and decrypting data using hash functions
19578351599Cryptographic device for fast session switching
19588347407Authority management method, system therefor, and server and information equipment terminal used in the system
19598347402Software development and distribution workflow employing meta-object time stamping
19608347379Printing system and image forming apparatus
19618347377Bridged cryptographic VLAN
19628347351Systems and methods of controlling network access
19638347350Systems and methods of controlling network access
19648347106Method and apparatus for user authentication based on a user eye characteristic
19658347102Image processing apparatus and method for transmitting encrypted data
19668347096Authentication token with incremental key establishment capacity
19678347093Privacy preserving name verification
19688347087Support for multiple digital rights management systems for same content
19698345876Encryption/decryption system and method
19708345875System and method of creating and sending broadcast and multicast data
19718345866Secure data transfer on a handheld communications device
19728345864Elliptic curve cryptography scalar multiplication with on demand acceleration table generation
19738345577High speed wireless infrastructure

2012

19748341709Pushing certificate chains to remote devices
19758341424Methods for playing protected content
19768341411Enabling use of a certificate stored in a smart card
19778340299Key management system and method
19788340298Key management and user authentication for quantum cryptography networks
19798340296Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains
19808340295High-speed cryptographic system using chaotic sequences
19818340294Secure modulation and demodulation
19828340289System and method for providing an indication of randomness quality of random number data generated by a random data service
19838340286Interleaving and deinterleaving method for preventing periodic position interference
19848336109Method and apparatus for processing rights object
19858336081Trusted network connect system for enhancing the security
19868335928Information providing system and method and storage medium
19878335918MAC frame provision method and apparatus capable of establishing security in IEEE 802.15.4 network
19888335915Encryption based security system for network storage
19898335314Adaptive and secure modular connection
19908332657Global copy protection system for digital home networks
19918332653Secure processing environment
19928332642Monitor portal, monitor system, terminal and computer readable medium thereof
19938332635Updateable secure kernel extensions
19948331568Efficient distribution of computation in key agreement
19958331561Fast switching between digital video sources
19968331559Diffused data encryption/decryption processing method
19978331556Asymmetrical method of encryption or signature verification
19988331555Hardware-implemented MD5 function
19998327139System and method for securely exchanging sensitive information with an implantable medical device
20008327135Native WI-FI architecture for 802.11 networks
20018325924Managing group keys
20028325921Portable memory and a method for encrypting the same
20038325915Image output system
20048325914Providing secure communications for active RFID tags
20058321686Secure memory card with life cycle phases
20068321682System and method for generating and managing administrator passwords
20078321679Pre-processed information embedding system
20088321663Enhanced authorization process using digital signatures
20098321660Method and devices for reproducing encrypted content and approving reproduction
20108321350Uniquely linking security elements in identification documents
20118320742Method and apparatus for playing data between external device and TV set
20128320569Generating unique aliases for keys used with tape libraries
20138320566Method and apparatus for performing constellation scrambling in a multimedia home network
20148320562Methods for creating secret keys based upon one or more shared characteristics and systems thereof
20158320561Key identifier in packet data convergence protocol header
20168320560Secure data parser method and system
20178320558Encryption of synchronization information
20188320557Cryptographic system including a mixed radix number generator with chosen statistical artifacts
20198316235Method and device for manipulation-proof transmission of data
20208316233Systems and methods for accessing secure and certified electronic messages
20218316225Automated integration of fault reporting
20228315395Nearly-stateless key escrow service
20238315392Method to secure access to audio/video content in a decoding unit
20248315386Method and apparatus for performing VoIP-based communication using bio keys
20258315385Digital entroping for digital audio reproductions
20268315382Method for monitoring execution of data processing program instructions in a security module
20278315381Methods and apparatus performing hash operations in a cryptography accelerator
20288312519Agile OTP generation
20298312283Accelerated signature verification on an elliptic curve
20308312277Method and system for secure communication between computers
20318312276Method for sending and receiving an evaluation of reputation in a social network
20328312269Challenge and response access control providing data security in data storage devices
20338312265Encrypting received content
20348311223Communication system, communication apparatus, display device, and communication method
20358311222Hardware based multi-dimensional encryption
20368311218Rounding for security
20378311217Data transmission method and terminal
20388311216Packet cipher algorithm based encryption processing device
20398311214Method for elliptic curve public key cryptographic validation
20408311212Method of processing data protected against attacks by generating errors and associated device
20418307447Method and apparatus for making system constraint of a specified permission in the digital rights management
20428307209Universal authentication method
20438307208Confidential communication method
20448307161Caching for structural integrity schemes
20458306220Method to generate a private key in a boneh-franklin scheme
20468301893Detecting media areas likely of hosting watermarks
20478300831Redundant key server encryption environment
20488300828System and method for a derivation function for key per page
20498300825Data encryption and/or decryption by integrated circuit
20508300816Information processing unit, terminal unit, information processing method, key generation method and program
20518300815Process to secure a personal portable object
20528300814Information processing unit, terminal unit, information processing method, key generation method and program
20538300813Secure information transfer based on global position
20548300809System and method for modulus obfuscation
20558300808Arithmetic operation method and arithmetic operation device
20568300807Computing isogenies between genus-2 curves for cryptography
20578296851System and method for ensuring security of data stored on electronic computing devices
20588296826Secure transfer of files
20598296580System and method for protecting data on a mobile device
20608296577Cryptographic bus architecture for the prevention of differential power analysis
20618296563Method of handling a certification request
20628295489Method for sharing a link key in a ZigBee network and a communication system therefor
20638295482Image scanning system, and image scanner and computer readable medium therefor
20648295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
20658295477Cryptanalysis method and system
20668295273Standard telephone equipment (STE) based deployable secure communication system
20678291235Method and system for controlling access of clients and users to a print server
20688291226Method and apparatus for securely booting from an external storage device
20698291218Creating and using secure communications channels for virtual universes
20708291213Techniques for secure network searching
20718291212System and method for compressing secure E-mail for exchange with a mobile data communication device
20728291118Globally unique identification in communications protocols and databases
20738290817Selectable options for downloading digital content to a mobile terminal
20748290165Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
20758290164Automatic recovery of TPM keys
20768290162Combinational combiner cryptographic method and apparatus
20778290161Incorporating shared randomness into distributed cryptography
20788290159Data recovery method, image processing apparatus, controller board, and data recovery program
20798290154Methods and apparatuses for key generation, encryption and decryption in broadcast encryption
20808290152Management system for web service developer keys
20818290145Transition between masked representations of a value during cryptographic calculations
20828285997Backup apparatus with higher security and lower network bandwidth consumption
20838284938Techniques for data encryption and decryption
20848284937Method for synchronization in encrypted communications using shared key
20858284934Systems and methods for shared secret data generation
20868284933Encrypting variable-length passwords to yield fixed-length encrypted passwords
20878284931System and method for using a streaming protocol
20888284930Simultaneous scalar multiplication method
20898281144Ownership sharing method and apparatus using secret key in home network remote controller
20908281140Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
20918281135Enforcing use of chipset key management services for encrypted storage devices
20928281127Method for digital identity authentication
20938281126Out of band encryption
20948280059Method, system and device for generating group key
20958280056System and methods for encryption with authentication integrity
20968280053Authentication in a radiotelephony network
20978280048Method for strengthening the implementation of ECDSA against power analysis
20988280045Text-input device and method
20998280044Stream encryption method and encryption system
21008280043System and method for protecting data in a secure system
21018278870Battery pack authentication for a mobile communication device
21028276198Method and apparatus for local area networks
21038275993Author signatures for legal purposes
21048275709Digital rights management of content when content is a future live event
21058275134Method for guaranteeing security of critical data, terminal and secured chip
21068275131Image forming apparatus and security setting method thereof
21078275130System and method for registering secret key
21088275129Data scrambling, descrambling, and data processing method, and controller and storage system using the same
21098275127Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
21108274941Apparatus and method for subcarrier scrambling
21118272060Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
21128272041Firewall control via process interrogation
21138272031Policy-based virtualization method involving adaptive enforcement
21148271802Secure data parser method and system
21158271786Method and system for providing secure communications between a first and a second peer device
21168271784Communication between key manager and storage subsystem kernel via management console
21178271780Trusted network connect method for enhancing security
21188271777Secure host connection
21198271776Mobile printing
21208270613System for disabling unauthorized person, encryption device, encryption method, and program
21218270612Mapping compound keys
21228270611System and method for communicating with a key variable loader (KVL) using a standard universal asynchronous receiver transmitter (UART) peripheral
21238270598Highly secured method and device for distributing audio-visual streams
21248266438Secure data parser method and system
21258266434System and method for providing an user's security when setting-up a connection over insecure networks
21268266421Private electronic information exchange
21278265271Method and device for managing a transmission of keys
21288265270Utilizing cryptographic keys and online services to secure devices
21298265265Circuit arrangement and method for RSA key generation
21308261366Method and apparatus for identifying and characterizing errant electronic files
21318261359Systems and methods for preventing unauthorized use of digital content
21328261318Method and apparatus for passing security configuration information between a client and a security policy server
21338261317Moving security for virtual machines
21348261099Method and system for securing network data
21358261098Method and apparatus for encrypting and processing data in flash translation layer
21368261084Unauthorized contents detection system
21378261080System and method for managing digital certificates on a remote device
21388261072Method and system for secure external TPM password generation and use
21398261060Content transmitting apparatus, content transmitting method, and content transmitting program
21408261056Digital data recording apparatus, digital data recording method, and computer-readable recording medium
21418260723Transactional security over a network
21428259950Method for secure key management using multi-threshold secret sharing
21438259948Virtual TPM key migration using hardware keys
21448259947Recreating a cryptographic key in a replacement device
21458259936Generating a traffic encryption key
21468255705Encryption moniker in medium auxiliary memory
21478255693Methods and devices responsive to ambient audio
21488255692Method of providing secure tamper-proof acquired data from process instruments
21498255691Apparatus for batch verification and method using the same
21508254882Intrusion prevention system for wireless networks
21518254578Process of manufacturing a handheld device, involving keys
21528254577Validation of encryption key
21538254572Secure provisioning of a portable device using a representation of a key
21548254571Cryptographic system with halting key derivation function capabilities
21558254568Secure booting a computing device
21568250665Digital Broadcasting system and method of processing data in digital broadcasting system
21578250636Instrument access control system
21588250633Techniques for flexible resource authentication
21598250475Managing icon integrity
21608250375Generating unique data from electronic devices
21618250370MACSec implementation
21628250366Method and system for electronic vehicle document display
21638250359Method and apparatus for distributing group data in a tunneled encrypted virtual private network
21648249253Semiconductor integrated circuit having encrypter/decrypter function for protecting input/output data transmitted on internal bus
21658249250Secure similarity verification between homomorphically encrypted signals
21668245307Providing secure access to a secret
21678245287Server message block (SMB) security signatures seamless session switch
21688245036Method and system for establishing a trusted and decentralized peer-to-peer network
21698245029System and method for enhanced network entrance into a wireless network
21708244642System and method for storing metering data while increasing memory endurance
21718243934Electronic device and encryption method thereof
21728243933Method for sharing secret information among cooperating parties
21738243931Method for detecting security error in mobile telecommunications system and device of mobile telecommunications
21748243930Counterfeit prevention system based on random processes and cryptography
21758241369Distribution channel loss protection for electronic devices
21768239960Method for network traffic mirroring with data privacy
21778239680Secret communication method and secret communication device thereof
21788239672Method of automatically establishing a security link for a wireless communication system and related communication device
21798239671Channel binding mechanism based on parameter binding in key derivation
21808238558Key agreement and re-keying over a bidirectional communication path
21818238557Method and apparatus for key expansion to encode data
21828238552Password key derivation system and method
21838238551Generation of perfectly secret keys in wireless communication networks
21848234689System and method for generating target area information of a battlefield using information acquired from multiple classification levels
21858234686System and method for creating a security application for programmable cryptography module
21868233628Information processing apparatus and information processing method
21878233627Method and system for managing a key for encryption or decryption of data
21888233625Rolling code security system
21898233622Transmitting parallel data via high-speed serial interconnection
21908233621Slice-based prioritized secure video streaming
21918233614Integer division method secure against covert channel attacks
21928233600Automated creation of multiple provider services
21938230511Trusted operating environment for malware detection
21948230483System, apparatus, program, and method for authentication
21958230478Flexibly assigning security configurations to applications
21968230227Method for generating a temporally threaded CMI watermark
21978230226Advanced watermarking system and method
21988230219Reduced computation for bit-by-bit password verification in mutual authentication
21998229857Secure pre-recorded digital medium
22008229115Use of copyright text in key derivation function
22018229113Strengthened public key protocol
22028229112Decipherable searchable encryption method, system for such an encryption
22038229110Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
22048225391System and method for improving restrictiveness on accessing software applications
22058225373Protection of computer resources
22068225110Cryptographic protection of usage restrictions in electronic devices
22078225107Methods of storing and retrieving data in/from external server
22088225101Cross validation of data using multiple subsystems
22098225097Anchor point-based digital content protection
22108225089Electronic transaction systems utilizing a PEAD and a private key
22118223974Self-healing encryption keys
22128223973Mix-net system
22138223972Method and device for speeding up key use in key management software with tree structure
22148223968Image data verification program recorded on a recording medium, image data verification method, and image data verification system
22158223962Common key generation system, common key generation method and node using the same
22168220064Content management system and content management unit
22178220037Centralized browser management
22188219830Apparatus and method for management for file aggregates and file directories
22198219819Public key encryption with digital signature scheme
22208219817System and method for authentication of transformed documents
22218219813System and method for protecting a peripheral device against hot plug attacks
22228219808Session-based public key infrastructure
22238219801Method of authenticating digitally encoded products without private key sharing
22248219799Secure communication system
22258219798Method and system for securing E-mail transmissions
22268219493Messaging method and apparatus for use in digital distribution systems
22278218773Systems and methods to securely generate shared keys
22288218772Secure multicast content delivery
22298218771Information processing apparatus and computer readable medium
22308218767Security system and method for use in network
22318218763Method for ensuring the validity of recovered electronic documents from remote storage
22328218762Encrypting apparatus for common key cipher
22338218761Method and apparatus for generating random data-encryption keys
22348214892Password authentication system and methods
22358214656Managing the encryption of data
22368214652Biometric identification network security
22378214651Radio frequency identification (RFID) based authentication system and methodology
22388213939Mobile communication method
22398213616Systems and methods for providing opportunistic security for physical communication channels
22408213612Secure software download
22418213610Generation of key streams in wireless communication systems
22428213609Key generating device, encrypting device, receiving device, key generating method, encrypting method, key processing method, and program
22438213608Roaming utilizing an asymmetric key pair
22448213585Automated distribution and indexing of prepaid calling card information
22458209546Data-securing method of program tool
22468209541Method and system for single sign-on for multiple remote sites of a computer network
22478209533Key agreement and transport protocol
22488208635Wireless mesh network with secure automatic key loads to wireless devices
22498208633Method and system for securing communications in a metering device
22508208632Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
22518205246User sensitive filtering of network application layer resources
22528205090Secure recovery in a serverless distributed file system
22538205088Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine
22548205085Key update system, key management device, communication terminal, and key information construction method for multihop network
22558205079Encryption/decryption system and method thereof
22568204229Method and system for distributing key of media stream
22578204226Encoding and recording apparatus, playback apparatus, and program
22588204220Simulcrypt key sharing with hashed keys
22598204217Lightweight streaming protection by sequence number scrambling
22608204215Method and apparatus for encrypting data
22618204214Method and system for generating data transaction ID
22628204180Systems and methods for preventing sensitive information from being communicated into a non-secure environment
22638201222Authentication system for authenticating communication terminal
22648201164Dynamically regulating content downloads
22658200988Firmware security key upgrade algorithm
22668200976Portable audio appliance
22678200974Method and system for securely exchanging encryption key determination information
22688200971Method for the provision of a network service
22698200965Storage system for data encryption
22708200957Using SYN-ACK cookies within a TCP/IP protocol
22718200582Mobile device password system
22728199917SID management for access to encrypted drives
22738199914Detection of a change of the data of a dataset
22748199912Security storage of electronic keys within volatile memories
22758199911Secure encryption algorithm for data deduplication on untrusted storage
22768199910Signature generation apparatus and signature verification apparatus
22778199346System and method for controlling printing of a print job in a printing system
22788196207Control automation tool
22798196194Method and network for securely delivering streaming data
22808195957Memory randomization for protection against side channel attacks
22818195956Re-keying data in place
22828195948Hybrid signature scheme
22838195943Signaling with opaque UE identities
22848195936Method for transmitting and receiving data of a terminal in a communication system and communication terminal thereof
22858195933Method and system for computing digital certificate trust paths using transitive closures
22868195932Authentication and encryption for secure data transmission
22878194859Efficient key hierarchy for delivery of multimedia content
22888194858Chaotic cipher system and method for secure communication
22898194856Rolling code security system
22908194854Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation
22918191158Systems and methods for secure transaction management and electronic rights protection
22928191157Systems and methods for secure transaction management and electronic rights protection
22938190901Layered security in digital watermarking
22948190894Method and system for generating ciphertext and message authentication codes utilizing shared hardware
22958190888System and methodology providing multi-tier security for network data with industrial control components
22968190665Random cache line refill
22978190124Authentication in a roaming environment
22988189794System and method for effectively performing data restore/migration procedures
22998189790Developing initial and subsequent keyID information from a unique mediaID value
23008189778Adaptive generation of a pseudo random number generator seed
23018189772Method and apparatus for performing elliptic curve arithmetic
23028189768Secure messaging
23038185947System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network
23048185936Automatic device-profile updates based on authentication failures
23058185737Communication across domains
23068185735System and method for lost data destruction of electronic data stored on portable electronic devices
23078185642Communication policy enforcement in a data network
23088184813Encryption key generation device
23098184812Secure computing device with monotonic counter and method therefor
23108184808Chaotic asymmetric encryption process for data security
23118184807Content distribution/browsing system, content distribution apparatus, content browsing apparatus and program
23128184806Table masking for resistance to power analysis attacks
23138184804Hash function using a piling-up process
23148181264Method and apparatus for deferred security analysis
23158181245Proxy-based malware scan
23168181040Program execution device
23178181033Data leakage prevention system, method, and computer program product for preventing a predefined type of operation on predetermined data
23188181026Method and apparatus for input of coded image data
23198181022Method and apparatus for controlling access restrictions for media playback
23208181015System and method for establishing historical usage-based hardware trust
23218181013Method, media gateway and system for transmitting content in call established via media gateway control protocol
23228180873Detecting fraudulent activity
23238180060Telemedical system
23248180059Management apparatus, terminal apparatus, and copyright protection system
23258180057Chaotic signal enabled low probability intercept communication
23268180056Methods and systems for communicating over a quantum channel
23278180055Cryptographic system incorporating a digitally generated chaotic numerical sequence
23288180049Signature schemes using bilinear mappings
23298180047Trapdoor pairings
23308176540Resource based non-interactive entity application proxy method and system
23318176324Method and system for a secure virtual keyboard
23328176322Apparatus and method for moving and copying rights objects between device and portable storage device
23338176110Modular multiplier
23348175276Encryption apparatus with diverse key retention schemes
23358175275Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment
23368175273Quantum cryptography communication method, quantum cryptography communication apparatus, and quantum cryptography communication system
23378175268Generating and securing archive keys
23388175267Communication apparatus, communication system, transmission method, and computer program product
23398175265Systems and methods for implementing block cipher algorithms on attacker-controlled systems
23408171561Secure personal content server
23418171560Secure content pre-distribution to designated systems
23428171525Enabling users to select between secure service providers using a central trusted service manager
23438171303Authenticating a login
23448171300Security method and apparatus
23458171292Systems, devices, and methods for securely transmitting a security parameter to a computing device
23468171291Method for checking the integrity of data, system and mobile terminal
23478171290System for authenticating remotely generated optical control signals
23488171282Encryption data integrity check with dual parallel encryption engines
23498170213Methodology for coordinating centralized key management and encryption keys cached through proxied elements
23508170207Split-key key-agreement protocol
23518170206Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
23528170205Processor apparatus
23538166566Controlling the downloading and recording of digital data
23548166565Encryption and access method and system for peer-to-peer distributed file storage
23558166561Security device, secure memory system and method using a security device
23568166309System and method for a secure multi-level network access mechanism using virtual service set identifier broadcast
23578166303Method for transmitting data among components of the system electronics of mobile systems, and such components
23588166299Secure messaging
23598166297Systems and methods for controlling access to encrypted data stored on a mobile device
23608165963License scheme for use with stackable devices
23618165305Enhanced relational database security through encryption of table indices
23628165304Domain digital rights management system, license sharing method for domain digital rights management system, and license server
23638165302Key table and authorization table management
23648165300System and method for generalized authentication
23658165299Network authentication
23668165296Time of day encryption using TDMA timing
23678165295Data transmission method
23688165291Random seed stability with fuses
23698165289Method and apparatus for the generation of code from pattern features
23708165286Combination white box/black box cryptographic processes and apparatus
23718161545Keyboard with programmable username and password keys and system
23728161279Methods and systems for proofing identities using a certificate authority
23738161278System and method for distributing keys in a wireless network
23748160256Key calculation method and key agreement method using the same
23758160247Providing local storage service to applications that run in an application execution environment
23768160246Apparatus and method for generating a key for broadcast encryption
23778160243System, apparatus, and method for the secure storing of bulk data using one-time pad encryption
23788160242Efficient implementation of arithmetical secure hash techniques
23798156556Method and apparatus for providing mobile honeypots
23808156545Method and apparatus for authorizing a communication interface
23818156537Method and system for access control using resource filters
23828156338Systems and methods for strong authentication of electronic transactions
23838156336Device authentication
23848156334Public key out-of-band transfer for mutual authentication
23858155320Data storage device, management server, integrated circuit, data update system, home electric apparatuses, data update method, encryption method, and encryption/decryption key generation method
23868155312Optical data storage device and method
23878155311Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity
23888155310Key derivation functions to enhance security
23898151344Method and apparatus to authenticate a user
23908151119Method and apparatus for secure data mirroring a storage system
23918151113Methods and devices responsive to ambient audio
23928151111Processing device constituting an authentication system, authentication system, and the operation method thereof
23938151107Method and system for detecting concurrent logins
23948151106Dynamically resolving recipients to retrieve public keys during send/receive
23958150317Method and system for managing mobility of an access terminal in a mobile communication system using mobile IP
23968150039Single security model in booting a computing device
23978146139System and method of user authentication using handwritten signatures for an MFP
23988146134Scalable firewall policy management platform
23998145909Digitally signing an electronic document using seed data
24008145895Information transmission apparatus and method, information reception apparatus and method, and information-providing system
24018145718Secure messaging system with personalization information
24028145707Sending digitally signed emails via a web-based email system
24038144876Validating encrypted archive keys with MAC value
24048144875Method and system for establishing real-time authenticated and secured communications channels in a public network
24058144874Method for obtaining key for use in secure communications over a network and apparatus for providing same
24068144872System and method for generating analog-digital mixed chaotic signal, encryption communication method thereof
24078144870Encoding and detecting apparatus
24088144864Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems
24098141165Systems and methods for secure transaction management and electronic rights protection
24108141136Method and system of replacing smart card
24118140851Approaches for automatically switching message authentication keys
24128140848Digital watermark key generation
24138140824Secure code authentication
24148140664Graphical user interface based sensitive information and internal information vulnerability management system
24158139769Processing multi-key content
24168139767Fine-grained forward-secure signature scheme
24178136155Security system with methodology for interprocess communication control
24188135963Program conversion device and program execution device
24198135961Method and computing device for interfacing with a memory device in operations
24208135955Device and method for detecting a manipulation of an information signal
24218135951Automated key management system and method
24228135132Method and system for secure storage, transmission and control of cryptographic keys
24238135131Method for calculating compressed RSA moduli
24248134972Communication system and gateway apparatus
24258132263Method and system for selectively controlling access to protected media on a media storage device
24268132228Electronic document conversion device and electronic document conversion method
24278131999Distance-preserving anonymization of data
24288131997Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel
24298131993System and method for a commercial multimedia rental and distribution system
24308131830System and method for providing support services using administrative rights on a client computer
24318130964Systems and methods for identity-based encryption and related cryptographic techniques
24328130963Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site
24338130962Content protection method and apparatus
24348130961Method and system for client-server mutual authentication using event-based OTP
24358130956Efficient and low power encrypting and decrypting of data
24368130955Random number generation through use of memory cell activity
24378130954Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
24388130950Configurable random number generator
24398130949Partially reversible key obfuscation
24408127367Refreshing software licenses
24418127361Hierarchical scheme for secure multimedia distribution
24428127146Transparent trust validation of an unknown platform
24438127138Method for embedding information in sonar
24448127134Systems and methods for efficiently authenticating multiple objects based on access patterns
24458127129Method and network system for negotiating a security capability between a PCC and a PCE
24468126149Communication apparatus having power-saving communication function, and communication method
24478126148Securing home agent to mobile node communication with HA-MN key
24488126140Generation of a pseudorandom data sequence
24498126139Partial encryption and full authentication of message blocks
24508122494Apparatus and method of securing network
24518122485Authentication techniques
24528122257Audio-based, location-related methods
24538122254Information processing apparatus and method thereof
24548122253Data validation using signatures and sampling
24558122251Method and apparatus for preventing phishing attacks
24568122250Authentication in data communication
24578122246Method for generating decryption key, apparatus and method using decryption key
24588121952System, method, and service for delivering multimedia content by means of a permission to decrypt titles on a physical media
24598121729Remote diagnostic system for robots
24608121295Method, apparatus, and system for controlling playout of media
24618121294System and method for a derivation function for key per page
24628121293System for ensuring encrypted communication after handover
24638121292Method and apparatus for scrambling information bits on a channel in a communications system
24648121291Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data
24658121290Pseudo-random function calculating device and method and number-limited anonymous authentication system and method
24668121288Encrypting and decrypting a data stream
24678121284Information processing system, information processing method, and information processing program
24688117645Systems and methods of controlling network access
24698117640Systems and methods for analyzing application security policies
24708117634Media data processing apparatus and media data processing method
24718117462Delivery point validation system
24728117455Object authentication from a signature part
24738117452System and method for establishing a secure association between a dedicated appliance and a computing platform
24748117440Methods and apparatus for enabling unified (internet protocol version) IPV6/IPV4 routing services over IPv4-only interfaces
24758117433Method and apparatus to prevent vulnerability to virus and worm attacks through instruction remapping
24768116457Methods, apparatuses, and products for a secure circuit
24778116456Techniques for managing heterogeneous key stores
24788116455System and method for securely initializing and booting a security appliance
24798116452Content playback device
24808116450System and method for utility sampling for trust metrics in pki
24818116382System and method of data word flipping to prevent pathological conditions on high-speed serial video data interfaces
24828116352Method for direct chaotic communications with predetermined spectral mask
24838112818System for identifying content of digital data
24848112811Information playing/reproducing apparatus and method
24858112788Systems and methods of controlling network access
24868112787System and method for securing a credential via user and server verification
24878112629Stateless challenge-response protocol
24888112628Using a portable computing device as a smart key device
24898112626Method and apparatus to provide public key authentication with low complexity devices
24908112484Apparatus and method for auxiliary classification for generating features for a spam filtering model
24918111827Cryptographic processing apparatus and cryptographic processing method
24928111826Apparatus for generating elliptic curve cryptographic parameter, apparatus for processing elliptic curve cryptograph, program for generating elliptic curve cryptographic parameter, and program for processing elliptic cyptograph
24938111706Premises gateway device
24948108928Adaptive traitor tracing
24958108905System and method for an isolated process to control address translation
24968108678Identity-based signcryption system
24978108675External signature device for a PC with wireless communication capacity
24988108668Associating a multi-context trusted platform module with distributed platforms
24998107626Method and system for enabling transfer of content between a storage device and a portable media player device
25008107623Method for verifying a first identity and a second identity of an entity
25018103883Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
25028103004Method, apparatus and system for use in distributed and parallel decryption
25038103003Method for setting communication parameters and communication device
25048103002Pulse position based-chaotic modulation (PPB-CM) communication system and method
25058103001Method for verifying rights contained in a security module
25068099767Secure agent-less enterprise infrastructure discovery
25078099762Secure digital content trading systems and methods
25088099761Protocol for device to station association
25098099759System and method for determining a security encoding to be applied to outgoing messages
25108099599Controlling access to data streams
25118099597Service authorization for distributed authentication and authorization servers
25128098879Information processing device, image movement instructing method, and information storage medium
25138098828Key distribution
25148098826QKD system laser autocalibration based on bit-error rate
25158098824Storage apparatus and data management method
25168098823Multi-key cryptographically generated address
25178098820Conditional access system for broadcast digital television
25188098819Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys
25198098818Secure registration for a multicast-broadcast-multimedia system (MBMS)
25208095989Associating first and second watermarks with audio or video content
25218095971Universal serial bus (USB) flash drive having locking pins and locking grooves for locking swivel cap
25228095796Content identifiers
25238095790Information processing apparatus and method, and computer program
25248095785Authentication of entitlement authorization in conditional access systems
25258095126User-assisted programmable appliance control
25268094825Integrity protection of streamed content
25278094822Broadcast encryption key distribution system
25288094821Key generation in a communication system
25298094817Cryptographic key management in communication networks
25308094816System and method for stream/block cipher with internal random states
25318094815Arithmetic method and apparatus for supporting AES and ARIA encryption/decryption functions
25328094814Method and apparatus for using counter-mode encryption to protect image data in frame buffer of a video compression system
25338094813System and method for modulus obfuscation
25348091116Communication system and method
25358090945Systems and methods for multi-factor remote user authentication
25368090920Recording medium, and information processing device and information processing method for the recording medium
25378090787Aggregation system for email and non-email messages
25388090552Sensor fusion using self evaluating process sensors
25398090108Secure debug interface and memory of a media security circuit and method
25408090107Key agreement and re-keying over a bidirectional communication path
25418090106Multi-level data encryption and decryption system and method thereof
25428090105Broadcast encryption with dual tree sizes
25438090101Method and system for generating a secret key from joint randomness
25448090100Storage apparatus and data management method for changing keys of a logical volume and common resource
25458090099Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field
25468090098Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher

2011

25478086870Methods and apparatus for hardware normalization and denormalization
25488086868Data communication method and system
25498086867Secure identity and privilege system
25508086866Methods and apparatus for efficient computation of one-way chains in cryptographic applications
25518086864Low power HMAC encryption apparatus
25528086861Information processing terminal and status notification method
25538086856Disabling on/off capacity on demand
25548086854Content protection information using family of quadratic multivariate polynomial maps
25558086852Providing a trusted platform module in a hypervisor environment
25568086851Methods for broadcasting and receiving a scrambled multimedia programme, network head, terminal, receiver and security processor for these methods
25578086850Secure group communication among wireless devices with distributed trust
25588086849Secure internet-scale eventing
25598086844Online trusted platform module
25608086537Distribution system of contents embedding license machine ID
25618085938Secret information management scheme based on secret sharing scheme
25628085936Method and system for content management in a secure communication system
25638085934Reverse cryptographic key expansion
25648085933Cipher for disk encryption
25658085932Secure distribution of data or content using keyless transformation
25668082451Data access control
25678082448System and method for user authentication using non-language words
25688081757Blind watermarking of audio signals by using phase modifications
25698081755JPEG2000 syntax-compliant encryption with full scalability
25708081754Key update method and apparatus thereof
25718079067Streaming content in guest mode
25728079062Method and system using presence information to manage network access
25738078874Method and apparatus for transmitting data using authentication
25748078872Method, system and device for determining a mobile IP key, notifying a mobile IP type
25758078869System and method of protecting data on a communication device
25768077871Content processing apparatus and encryption processing method
25778077870Cryptographic key split binder for use with tagged data elements
25788077869Organic keyed encryption
25798077868Mechanism for transport-safe codings for cryptographic use
25808077867Confidential information processing apparatus, confidential information processing device, and confidential information processing method
25818077866Protecting against security attack
25828077865Electronic device, content reproduction control method, program, storage medium, and integrated circuit
25838077863Secret sharing apparatus, method, and program
25848077862Sharing a secret using polynomials
25858074264Secure key distribution to internet clients
25868074263Systems and methods for increased security during logging in to web site
25878074258Obtaining digital identities or tokens through independent endpoint resolution
25888074068Secret sharing device, method, and program
25898073336Entanglement-based QKD system with active phase tracking
25908073143Information processing device and method
25918073142Information recording/reproducing device and information recording medium
25928073141Execution unit for performing the data encryption standard
25938073140Encryption/decryption device, encryption/decryption method, and computer program
25948073139Method of compressing a cryptographic value
25958069489Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
25968069468Controlling access to information over a multiband network
25978069467Privacy protection through restrictions on usernames and other online identifiers
25988069116System and method for supplying and managing usage rights associated with an item repository
25998068613Method and apparatus for remotely provisioning software-based security coprocessors
26008068611Method of playing broadcast program contents using encryption and decryption techniques
26018068610Method and system for providing security within multiple set-top boxes assigned for a single customer
26028068609Method and system for secured wireless data transmission to and from a remote device
26038068606Embedding a secret in a bit string for safeguarding the secret
26048065735Method of securing a calculation of an exponentiation or a multiplication by a scalar in an electronic device
26058065728Malware prevention system monitoring kernel events
26068065695Systems and methods for increased security during logging in to web site
26078065533Reliable storage medium access control method and device
26088065523External storage apparatus and method of preventing information leakage
26098065522Method and system for virtualization of trusted platform modules
26108065518Fast authentication and access control system for mobile networking
26118064606Method and apparatus for securely registering hardware and/or software components in a computer system
26128064605Methods and apparatus for providing upgradeable key bindings for trusted platform modules
26138064604Method and apparatus for facilitating role-based cryptographic key management for a database
26148064601Security in wireless communication systems
26158064599Secure message transport using message segmentation
26168064596Stream control device, stream encryption/decryption device, and stream encryption/decryption method
26178062380Distribution channel loss protection for electronic devices
26188060923Trusted license removal in a content protection system or the like
26198060917System and method for hosting multiple kerberos service principal names
26208060914Anonymous selectable credential system and method therefor
26218060913Policy execution
26228060902System for receiving broadcast digital data comprising a master digital terminal, and at least one slave digital terminal
26238060757Decryption and encryption during write accesses to a memory
26248060755Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine
26258059820Multi-factor content protection
26268059818Accessing protected data on network storage from multiple devices
26278059817Method and apparatus for encrypted communications using IPsec keys
26288059816Secret sharing technique with low overhead information content
26298059814Techniques for carrying out seed or key derivation
26308056121Virtual universe account protection
26318055895Data path security processing
26328054978Key management for content protection
26338054975Method and system for managing key of home device in broadcast encryption (BE) system
26348054971Free-hand mobile messaging-method and device
26358054967Computer system and computer program executing encryption or decryption
26368051472Method and apparatus for personalization and identity management
26378051460Systems and methods of controlling network access
26388051300System and method for reducing latency on remotely-booted information handling systems
26398051296System and method for initializing secure communications with lightweight devices
26408051294Methods for audio watermarking and decoding
26418051288Data validation using signatures and sampling
26428051286Vehicle antitheft system
26438051284Encryption communications system
26448051151System and method for communicating with a network node behind a subscriber station with an IP convergence sub-layer
26458050411Method of managing one-time pad data and device implementing this method
26468050408Techniques for managing keys using a key server in a network segment
26478050407Method and system for protecting keys
26488050406Key table and authorization table management
26498050405Shared key encryption using long keypads
26508050404Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel
26518046582Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus
26528045715Method of handling security key change and related communication device
26538045714Systems and methods for managing multiple keys for file encryption and decryption
26548045713Cryptographic key update management method and apparatus
26558045712Stream ciphering of the content of a memory external to a processor
26568045711System and method for comparison of private values
26578045708Discrete key generation method and apparatus
26588045707System and method for securing data
26598045706System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources
26608045705Simultaneous scalar multiplication method
26618042192Information processing apparatus, information processing method, recording medium, and program
26628042190Pre-boot protected memory channel
26638042170Bearer control of encrypted data flows in packet data communications
26648042147Network security appliance
26658042033Protection of access information in wireless communications
26668041950Random signal generator
26678041948Application level gateway for request verification
26688041943Revocation list improvement
26698041941Method and apparatus for compression of data on storage units using devices inside a storage area network fabric
26708041037Cryptographic system and methods using a one way multidimensional function
26718041036Method and apparatus for preventing the interception of data being transmitted to a web site by a monitoring program
26728041030Techniques for evaluating live payment terminals in a payment system
26738037542Team based row level security system and method
26748037534Strategies for ensuring that executable content conforms to predetermined patterns of behavior ("inverse virus checking")
26758037531Dynamic network security system and control method thereof
26768037530Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
26778037491Data transmitting method, data transmitting system, data receiving method and receiving terminal
26788037321Method and apparatus for the secure storage of audio signals
26798037314Replacing blinded authentication authority
26808037306Method for realizing network access authentication
26818037304System and method for lost data destruction of electronic data stored on portable electronic devices
26828037302Method and system for ensuring secure forwarding of messages
26838037301Setting an encryption key
26848037298System and method for providing security via a top level domain
26858037297Network and node for providing a secure transmission of mobile application part messages
26868037294Authentication of products using identification tags
26878036637Billing in a packet data network
26888036388Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium
26898036380Efficient data integrity protection
26908036379Cryptographic processing
26918036377Method and apparatus of high speed encryption and decryption
26928036250Method and apparatus of mutliplexing media streams
26938032942Configuration of virtual trusted platform module
26948032921Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method
26958032759Verifying signatures for multiple encodings
26968032758Content authentication and recovery using digital watermarks
26978032750Method for establishing a secure e-mail communication channel between a sender and a recipient
26988032748System for allocating a chip card to a network operator
26998032747Comparison of documents possessed by two parties
27008031875Key distribution in unidirectional channels with applications to RFID
27018031869Information recording medium, usage management method, and usage management apparatus
27028031867Method of verifying the integrity of an encryption key obtained by combining key parts
27038031865Multiple level security system and method for encrypting data within documents
27048031239Image sensing apparatus for generating image data authentication data of the image data
27058028340Piracy prevention using unique module translation
27068028330System, apparatus, and program for biometric authentication
27078028324Method for transmitting policy information between network equipment
27088027926Secure and recoverable database for on-line value-bearing item system
27098027475Methods and media for recovering lost encryption keys
27108024810Method and apparatus for protecting digital data by double re-encryption
27118024783Modular agent architecture
27128024770Techniques for managing security contexts
27138024583Confidential information processing host device and confidential information processing method
27148024581Computer readable storage medium for generating a pseudonym, computer implemented method and computing device
27158024578Systems and methods for online identity verification
27168024566Persistent storage implementations for session data within a multi-tiered enterprise network
27178024565Authorizing information flows
27188024558Method and system for providing synchronous running encoding and encryption
27198023656Automated key management system and method
27208023655System, method, and service for tracing traitors from content protection circumvention devices
27218023650Information processing apparatus, setup method and non-transitory computer-readable recording medium on which setup program is recorded
27228023647Password self encryption method and system and encryption by keys generated from personal secret information
27238023645Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation
27248023644Multimode block cipher architectures
27258023417Failover mechanisms in RDMA operations
27268020196Secure transmission and exchange of standardized data
27278020007System and method for obtaining identities
27288019991System and method for secure provisioning of a mobile station from a provisioning server using IP address translation at the BTS/BSC
27298019080Method and apparatus for providing content service
27308019079Asymmetric cryptosystem employing paraunitary matrices
27318015615Determining advertising activity
27328015607Messaging stamp authority
27338015413Secure indirect addressing
27348015406Method to create an OSI network layer 3 virtual private network (VPN) using an HTTP/S tunnel
27358015403Method and system indicating a level of security for VoIP calls through presence
27368015401Authentication of data transmitted in a digital transmission system
27378015400Certificate management and transfer system and method
27388015399Communication apparatus, communication system, certificate transmission method and program
27398015211Secure peer-to-peer object storage system
27408014528Method for accessing a user operable device of controlled access
27418014527Apparatus and method for reusing pair of public and private keys
27428014523Key management
27438014522Optical storage media and the corresponding cryptography for data encryption thereof
27448014236Optical disk, an optical disk barcode forming method, an optical disk reproduction apparatus, a marking forming apparatus, a method of forming a laser marking on an optical disk, and a method of manufacturing an optical disk
27458011002Forcing a mobile browser to access web content through a proxy
27468010999Cable installation support and management system
27478010998Techniques for limiting remote control of a computer system
27488010810Techniques for protecting data using an electronic encryption endpoint device
27498010805Secure porting of information from one device to another
27508010804Method to protect secrets against encrypted section attack
27518010802Cryptographic device having session memory bus
27528010801Multi-data rate security architecture for network security
27538010794Method for securing a transmission, associated system and mediation platform
27548010790Block-level storage device with content security
27558010787Communication device, communication log transmitting method suitable for communication device, and communication system
27568010782Method and system for mediated secure computation
27578010781Method and system to accelerate cryptographic functions for secure E-commerce applications
27588010779Techniques for secure network searching
27598009833Data communication apparatus, control method therefor, and program for implementing the method
27608009831Method and system for hiding the decryption key in a dispersive way
27618009830Secure data parser method and system
27628009829Method and system for deploying advanced cryptographic algorithms
27638009828Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system
27648009826Cryptoanalysis method and system
27658006314System for identifying content of digital data
27668006103TPM device for multi-processor systems
27678006102Method and apparatus for transmitting content data and recording and/or reproducing apparatus
27688006101Radio transceiver or other encryption device having secure tamper-detection module
27698006091Method and apparatus to provide failover capability of cached secure sessions
27708006090System and method for combining user and platform authentication in negotiated channel security protocols
27718006085License management system and method
27728005226Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium
27738005222Radio communication system, radio communication device, radio communication method, and computer program
27748005221Chaotic spread spectrum communications system receiver
27758005220RF communication system having a chaotic signal generator and method for generating chaotic signal
27768005219Data decryption apparatus and data encryption apparatus
27778005215Table shuffle cipher system
27788005214Data transmission system
27798005210Modulus scaling for elliptic-curve cryptography
27808005209Invariance based concurrent error detection for the advanced encryption standard
27818001608Secure streaming container
27828001388Software self-checking systems and methods
27838001386Cooperative non-repudiated message exchange in a network environment
27848001380System and method for providing unique encryption key
27858001379Credential generation system and method for communications devices and device management servers
27868001377Methods and apparatus for secure data processing and transmission
27878001376Fixed client identification system for positive identification of client to server
27888001370Encrypted communication for selectively delivering a message to multiple decrypting devices
27898001053System and method for rights offering and granting using shared state variables
27908000477Data security system and method for high bandwidth bus
27918000474Client-side protection of broadcast or multicast content for non-real-time playback
27928000473Method and apparatus for generating cryptographic sets of instructions automatically and code generator
27938000472Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium
27948000471Robust cipher design
27958000469Authentication engine architecture and method
27968000468Method and system for secure data aggregation in wireless sensor networks
27977996861Flexible interface for secure input of pin code
27987996684Apparatus and method for a programmable security processor
27997996678Embedding and detection of watermark in a motion image signal
28007996676Masked digital signatures
28017996673System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
28027996672Support for multiple digital rights management systems for same content
28037996669Computer platforms and their methods of operation
28047996668Distributed system and computer program product for establishing security in a publish/subscribe data processing broker network
28057995765Sharing a secret using hyperplanes over GF(q)
28067995764Sharing a secret using hyperplanes over GF(2.sup.m)
28077995761Data providing system, data receiving system, computer-readable recording medium storing data providing program, and computer-readable recording medium storing data receiving program
28087995758Family of encryption keys
28097995753Parallel cipher operations using a single data pass
28107995752Method for accelerating cryptographic operations on elliptic curves
28117995751Method and apparatus for encrypting data in a wireless communication system
28127995749Cryptographic system configured for extending a repetition period of a random sequence
28137995748Method and apparatus for providing ecryption/decryption using two sequences of numbers
28147992215Annotation system for creating and retrieving media and methods relating to same
28157992211Method and device for authorising conditional access
28167992193Method and apparatus to secure AAA protocol messages
28177991999Block-based media content authentication
28187991993Telecommunication system, for example an IP telecommunication system, and equipment units for use in the system
28197991162Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
28207991161System and method for automatic security authentication in wireless networks
28217991158Secure messaging
28227991157Methods and systems responsive to features sensed from imagery or other data
28237991154Exponentiation method using multibase number representation
28247991151Method for secure delegation of calculation of a bilinear application
28257987496Automatic application of information protection policies
28267987495System and method for multi-context policy management
28277987367Method and apparatus for key agreement between devices using polynomial ring
28287986787System, method, and service for tracing traitors from content protection circumvention devices
28297986786Methods and systems for utilizing cryptographic functions of a cryptographic co-processor
28307986785Data management
28317986781Method for controlling access to encrypted data
28327986779Efficient elliptic-curve cryptography based on primality of the order of the ECC-group
28337986439Resource entity using resource request entity for verification
28347984509Systems and methods for secure transaction management and electronic rights protection
28357984502Pattern discovery in a network system
28367984496Systems and methods for secure communication over a wireless network
28377984489Device registration system and device registration apparatus
28387984303Flash memory devices with security features
28397984302Electronic document management apparatus, electronic document management method, and computer program
28407984301Bi-processor architecture for secure systems
28417984289Methods and systems for establishing an electronic account for a customer
28427983421Methods to defend against tampering of audit records
28437983415Method for performing iterative scalar multiplication which is protected against address bit attack
28447979906Method and system for multifaceted scanning
28457979890System and method for handling per subscriber application and bearer authorization in a communications environment
28467979889Methods and apparatus providing security to computer systems and networks
28477979722Flash memory distribution of digital content
28487979719Data authentication method and data authentication system
28497979718Operator recognition device, operator recognition method and operator recognition program
28507979714Authentication and access control device
28517979709Information processing apparatus, information recording medium, apparatus and method of manufacturing information recording medium, and computer program
28527979698Apparatus and method for proving authenticity with personal characteristics
28537979691Computer virus protection
28547978858Terminal device, group management server, network communication system, and method for generating encryption key
28557978857Secure device having key management function and information processing apparatus
28567978856Methods of managing a key cache
28577978854Asymmetric key generation
28587978850Manufacturing embedded unique keys using a built in random number generator
28597978849Image forming apparatus, and control method thereof
28607978848Content encryption schema for integrating digital rights management with encrypted multicast
28617978847System using data compression and hashing adapted for use for multimedia encryption
28627978846Scale-invariant barrett reduction for elliptic-curve cyrptography
28637975290Verifying authenticity of instant messaging messages
28647975145Apparatus and program for update of time stamp
28657975141Method of sharing bus key and apparatus therefor
28667974937Adaptive embedded historians with aggregator component
28677974540Communication system and communication method using the same
28687974413Spread spectrum communications system and method utilizing chaotic sequence
28697974410Cryptographic key split combiner
28707974409Changing the order of public key cryptographic computations
28717974408Scrambling of a calculation performed according to an RSA-CRT algorithm
28727974405Method and device for calculating a function from a large number of inputs
28737971262Protecting against software piracy
28747971228System and method for providing application-specific on-line charging in a communications environment
28757971072Secure exchange of IP cores
28767971066Transaction device with noise signal encryption
28777971064Distributed Rivest Shamir Adleman signature method and signature generation node
28787971059Secure channel for image transmission
28797971058System and method for generating a plaintext / cyphertext database for use in device authentication
28807971055Trust management systems and methods
28817970707Shared royalty platform for content royalty management
28827970143System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system
28837970142System, method and apparatus for decrypting data stored on removable media
28847970141Method and apparatus for tracing the source of decryption keys used by a decoder
28857970135Method for the secure, distributed generation of an encryption key
28867970134Method for generating, operating, and using a sparse w-NAF key for encryption
28877970132Reduced hierarchy key management system and method
28887970131Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method
28897970130Low-latency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode
28907970129Selection of a lookup table with data masked with a combination of an additive and multiplicative mask
28917970128Systems and methods for efficient generation of hash values of varying bit widths
28927970127User equipment identification specific scrambling
28937970013Systems and methods for wireless network content filtering
28947966653Method and data processing system for determining user specific usage of a network
28957966652Mashauth: using mashssl for efficient delegated authentication
28967966645Application-aware policy enforcement
28977966497System and method for acoustic two factor authentication
28987966494Visual content-based internet search methods and sub-combinations
28997965836Data cipher processors
29007962965Semiconductor device having power consumption analysis preventing function
29017962761Computer implemented method for generating a pseudonym, computer readable storage medium and computer system
29027962757Secure coordinate identification method, system and program
29037962753Method and a circuit for SHA operation with power saved
29047962740Method and apparatus for synchronizing audio and video in encrypted videoconferences
29057962417System and method for distributing protected information
29067961886Wireless perimeter security device and network using same
29077961885Encrypted JTAG interface
29087961884Method and system for changing security information in a computer network
29097961879Identity-based-encryption system with hidden public key attributes
29107961877Factoring based modular exponentiation
29117961876Method to produce new multivariate public key cryptosystems
29127961875Means and method for ciphering and transmitting data in integrated networks
29137961874XZ-elliptic curve cryptography with secret key embedding
29147961873Password protocols using XZ-elliptic curve cryptography
29157961614Information processing device, information processing method, and recording medium for reducing consumption of memory capacity
29167958548Method for provision of access
29177958542Methods and devices for counting user equipment units in a mobile radio telecommunication network
29187958541Method, system and apparatus for preventing media access control address counterfeiting
29197958523Method and system for protecting cable television subscriber-specific information allowing limited subset access
29207958377Secure access system and method
29217958366Information processing system
29227958363Toolbar signature
29237958357Network invitation arrangement and method
29247958356System and method for establishing a shared secret among nodes of a security appliance
29257958354High-order knowledge sharing system to distribute secret data
29267958353Information security device
29277958352Method and system for verifying and updating the configuration of an access device during authentication
29287958351Method and apparatus for multi-level security implementation
29297958350Proactive forced renewal of content protection implementations
29307958349Method for revoking a digital signature
29317957977Media program identification method and apparatus based on audio watermarking
29327957532Data protection for a mobile device
29337957531Method and apparatus for detection of loss of cipher synchronization
29347957526Confidential information implementation system and LSI
29357957525Encryption and signature schemes using message mappings to reduce the message size
29367954163Method and apparatus for providing network security using role-based access control
29377954139Arrangements for efficient authentication of service request messages
29387954136Self-management network access using localized access management
29397953227Method for securely and automatically configuring access points
29407953226Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment
29417953225Mobile wireless communications device with software installation and verification features and related methods
29427953224MPEG-4 encryption enabling transcoding without decryption
29437953222Method and apparatus for partially encrypting speech packets
29447953221Method for processing multiple operations
29457950053Firewall system and firewall control method
29467950051Password management for a communication network
29477950044Centrally managed proxy-based security for legacy automation systems
29487949878Telecommunication-assisted time stamp
29497949875Message authentication
29507949872Battery and authentication requesting device
29517949870Method and apparatus for downloading information content to a wireless terminal
29527949869Establishing relative identity
29537949867Secure communications
29547949135Key distribution in systems for selective access to information
29557949134Multiplexed multilane hybrid scrambled transmission coding
29567949131Digital security system
29577949128Method and device for the encryption and decryption of data
29587949032Methods and apparatus for masking and securing communications transmissions
29597945959Secure physical distribution of a security token through a mobile telephony provider's infrastructure
29607945945System and method for address block enhanced dynamic network policy management
29617945943Retrieving an access token via a coded surface
29627945790Low-cost pseudo-random nonce value generation system and method
29637945782Method and apparatus for digitally signing electronic mail that originates from a browser
29647945779Securing a communications exchange between computers
29657945774Efficient security for mashups
29667945517Data distribution system and recording device for use therein
29677945052Method of distributing a decryption key in fixed-content data
29687945051Method for setting up radio bearer in mobile communication system
29697945050Suppressing power supply noise using data scrambling in double data rate memory systems
29707945049Stream cipher using multiplication over a finite field of even characteristic
29717945048Method, system and computer product for securing patient identity
29727945047Cryptographic key distribution system and method for digital video systems
29737945045Device and method for generating chaotic signal
29747941864Audio-video output apparatus, authentication processing method, and audio-video processing system
29757941841Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies
29767941834Secure web-based user authentication
29777941826Enforcing access control on multicast transmissions
29787941666Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks
29797941661Method of testing validity of authentication IC
29807940932Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor
29817940928Systems and methods for protecting data secrecy and integrity
29827937762Tracking and identifying operations from un-trusted clients
29837937596Adaptable microcontroller based security monitor
29847937594Apparatus and method for a programmable security processor
29857937589Computer grid access management system
29867937588Techniques for detecting, analyzing, and using visible authentication patterns
29877937587Communication terminal apparatus and information communication method
29887937586Defending against denial of service attacks
29897937583Method of aggregating multiple certificate authority services
29907937581Method and network for ensuring secure forwarding of messages
29917937579System, method and apparatus for electronically protecting data and digital content
29927937427Digital generation of a chaotic numerical sequence
29937936881Method and system for transmitting signaling information over a data transport network
29947936878Secure wireless instrumentation network system
29957936875Protection of a digital quantity contained in an integrated circuit comprising a JTAG interface
29967936871Altering the size of windows in public key cryptographic computations
29977934640Method, system, and computer program product for implementing pin-based data transfer activities
29987934091Digital asset usage accountability via event journaling
29997934088Method of secure communication between endpoints
30007933414Secure data distribution
30017933413Key exchange verification
30027933410System and method for a variable key ladder
30037933409Content playback device
30047933408Asynchronous download
30057933405Data access and permute unit
30067930755System and method for ensuring security of data stored on electronic computing devices
30077930742Multiple-level data processing system
30087930550Content addressable information encapsulation, representation and transfer
30097930549Accelerated signature verification on an elliptic curve
30107930546Methods, systems, and sub-combinations useful in media identification
30117930545Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
30127930542MashSSL: a novel multi party authentication and key exchange mechanism based on SSL
30137930541E-mail communication apparatus
30147930426Method for tracking transmission status of data to entities such as peers in a network
30157929706Encryption key restoring method, information processing apparatus, and encryption key restoring program
30167929704Modified triple wrap encryption/decryption system
30177929703Methods and system for managing security keys within a wireless network
30187929702System and method for generating reproducible session keys
30197929701Multiple level public key hierarchy for performance and high security
30207929697Secure data transmission via multichannel entitlement management and control
30217929694Variable length private key generator and method thereof
30227929693Key generating method and key generating apparatus
30237929692Firmware encrypting and decrypting method and an apparatus using the same
30247929689Call signs
30257929688Parameter generation apparatus, encryption system, decryption system, encryption apparatus, decryption apparatus, encryption method, decryption method, and program thereof
30267929549Method and apparatus for scrambling data for control of high-speed bidirectional signaling
30277926100Method for preventing unauthorized connection in network system
30287925885Method for recording and reading a code of material products for protection and control of their authenticity, and a system therefor
30297925884Fraud detection in seals
30307925883Attack resistant phishing detection
30317925881Method and apparatus for preventing rogue implementations of a security-sensitive class interface
30327925592System and method of using a proxy server to manage lazy content distribution in a social network
30337925027Secure address proxying using multi-key cryptographically generated addresses
30347925025Method for broadcast encryption and key revocation of stateless receivers
30357925021Efficient handling of messages, data and keys in media access layers for network communications
30367925014Random number generating, encrypting, and decrypting apparatus, method thereof, program thereof, and recording medium thereof
30377925013System for data encryption and decryption of digital data entering and leaving memory
30387925012Method and system for the secure distribution of compressed digital texts
30397925011Method for simultaneous modular exponentiations
30407925010Message deciphering method, system and article
30417921455Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
30427921452Defining consistent access control policies
30437921296Generating and matching hashes of multimedia content
30447921295Service mobility management system using XML security and the method thereof
30457921294Verification of encryption key
30467921293Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment
30477921290Method and system for securely authenticating network access credentials for users
30487921283Method for real-time data authentication
30497921282Using SYN-ACK cookies within a TCP/IP protocol
30507920706Method and system for managing cryptographic keys
30517920704Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution
30527920699Encryption operating apparatus
30537917957Method and system for counting new destination addresses
30547917947Secured communication channel between IT administrators using network management software as the basis to manage networks
30557917946Method and network for securely delivering streaming data
30567917769Transaction authentication card
30577917766Stegotext encoder and decoder
30587917764Signature generation device and signature verification device
30597917763Device and method for detecting a manipulation of an information signal
30607917760Tamper resistant module having separate control of issuance and content delivery
30617917757Method and system for authentication of electronic communications
30627917753Transferring control between programs of different security levels
30637917752Method of controlling the processing of data
30647917751Distributed filesystem network security extension
30657917746Authentication of data transmitted in a digital transmission system
30667917439System, method, and computer program product for video based services and commerce
30677917253Method for making vehicle-related data available to an authorized third party
30687916870Systems and methods for document control using public key encryption
30697916867Content receiving apparatus
30707916865Dynamically shifting control word
30717916863Security printing method and system for enhancing security printing
30727916862Stegotext encoder and decoder
30737913293Method and communication unit for communicating between communication apparatuses
30747913095Method and apparatus for providing a specific user interface in a system for managing content
30757913090Authentication systems and authentication method
30767913088Digital signature and authentication method and apparatus
30777913078Computer network virus protection system and method
30787913074Securely launching encrypted operating systems
30797912952Content utilization management method corresponding to network transfer, program, and content transfer system
30807912886Configurable exponent FIFO
30817912223Method and apparatus for data protection
30827912218Method of broadcasting multimedia content via distribution network
30837912216Elliptic curve cryptosystem optimization using two phase key generation
30847912214Method and system for generating and controlling the distribution and use of personal promotion codes by targeted customers
30857912213Device, system and method for fast secure message encryption without key distribution
30867912212Symmetric cryptosystem using cascaded chaotic maps
30877908647Aggregation system
30887908644Adaptive multi-tier authentication system
30897908641Modular exponentiation with randomized exponent
30907908491Method and device for controlling access to encrypted data
30917908489Method for managing external storage devices
30927908483Method and apparatus for binding TPM keys to execution entities
30937908482Key confirmed authenticated key exchange with derived ephemeral keys
30947908477System and method for enabling device dependent rights protection
30957908475Method and apparatus for transferring a communicaton session
30967908474Method for improved key management for ATMs and other remote devices
30977908217Method and system for optimizing throughput of mailing machines
30987907735System and method of creating and sending broadcast and multicast data
30997907734Key distribution control apparatus, radio base station apparatus, and communication system
31007907733Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station
31017907725Simple universal hash for plaintext aware encryption
31027907724Method and apparatus for protecting an RSA calculation on an output by means of the chinese remainder theorem
31037907723Device, system and method for fast secure message encryption without key distribution
31047907722Protection against power analysis attacks
31057904964Method and system for selectively controlling access to protected media on a media storage device
31067904960Source/destination operating system type-based IDS virtualization
31077904952System and method for access control
31087904951Techniques for securely accelerating external domains locally
31097904949Apparatus, systems and methods to provide authentication services to a legacy application
31107904944Image forming apparatus, control method, and computer-readable storage medium therefor
31117904929Log entries
31127904727Method to control access between network endpoints based on trust scores calculated from information system component analysis
31137904724Translation device, translation method, and storage medium
31147904722Method for securely using digital signatures in a commercial cryptographic system
31157904720System and method for providing secure resource management
31167904718Personal digital key differentiation for secure transactions
31177904717Method, apparatus, and manufacture for decryption of network traffic in a secure session
31187903822Method and system for establishing a trusted and decentralized peer-to-peer network
31197903819Memory efficient storage of large numbers of key value pairs
31207903818Random access method for improving scrambling efficiency
31217903815Method of identifying multiple digital streams within a multiplexed signal
31227903814Enhancing the security of public key cryptosystem implementations
31237903813Stream cipher encryption application accelerator and methods thereof
31247903812Detection and handling of encryption key and initialization vector
31257900265Method and/or system to authorize access to stored data
31267900262Security management method and apparatus, and security management program
31277900252Method and apparatus for managing shared passwords on a multi-user computer
31287900244Login system and login method
31297900240Multilayer access control security system
31307900211Method and apparatus for data transfer across a network
31317900062Unauthorized contents detection system
31327900048Method for loading an application in a device, device and smart card therefor
31337900046System and method for establishing mutual trust on a per-deployment basis between two software modules
31347900044Enterprise computer investigation system
31357900039TLS session management method in SUPL-based positioning system
31367900032Method and system for NAND flash support in autonomously loaded secure reprogrammable system
31377899475Enhanced short message service (SMS)
31387899187Domain-based digital-rights management system with easy and secure device enrollment
31397899186Key recovery in encrypting storage devices
31407899185Real privacy management authentication system
31417899184Ends-messaging protocol that recovers and has backward security
31427898383System and method for detecting security violation
31437895661Method and system for secure network-based distribution of content
31447895643Secure logic interlocking
31457895444Method and apparatus for preventing illegal access using prohibit key in electronic device
31467895443Secure authentication using hardware token and computer fingerprint
31477895438Method and apparatus for generating and verifying digital signature
31487895432Method and apparatus for using a third party authentication server
31497895424System for automated boot from disk image
31507894608Secure approach to send data from one system to another
31517894605Systems and methods to securely generate shared keys
31527894604Quantum cryptographic communication apparatus
31537894602System and method for generating pseudo-random numbers
31547894601Method for key diversification on an IC card
31557894600Encrypting apparatus and encrypting method
31567890993Secret file access authorization system with fingerprint limitation
31577890767Virtual smart card system and method
31587890762Differentiated proxy digital signatures
31597890761Systems and methods for strong authentication of electronic transactions
31607890759Connection assistance apparatus and gateway apparatus
31617890758Apparatus and method for generating keys in a network computing environment
31627890756Verification system and method for accessing resources in a computing environment
31637890751Method and system for increasing data access in a secure socket layer network environment
31647889867Method for relocating SRNS in a mobile communication system
31657889862Key update mechanism
31667889861Multiple sequential security key encryption-decryption
31677886364Encrypted key cache
31687886362Media authentication via physical attributes of a medium
31697886360Security device for data carriers
31707886356Removing malicious code in media
31717886354Method and apparatus for local area networks
31727886342Distributed environment controlled access facility
31737886337Method and apparatus for content protection
31747886336Method of initiating a security procedure within a building
31757886160Information processing apparatus and method, and computer program
31767886159Data providing system and apparatus and methods of same
31777886157Hand geometry recognition biometrics on a fob
31787886153Communication device and communication system
31797886150System debug and trace system and method, and applications thereof
31807886143Multi-data rate cryptography architecture for network security
31817886142Apparatus and method for scrambling a packet data channel and a packet data control channel in a mobile communication system for high-speed packet transmission
31827885899System and method for secure network purchasing
31837885411Key agreement and re-keying over a bidirectional communication path
31847885406Computing endomorphism rings of Abelian surfaces over finite fields
31857885404Cryptographic systems and methods supporting multiple modes
31867882564Information recording/playback apparatus and method
31877882545Secure wireless network
31887882541Authentication system in information processing terminal using mobile information processing device
31897882365Systems and methods for distinguishing between actual data and erased/blank memory with regard to encrypted data
31907882361Method and system for accepting a pass code
31917882357System and method of retrieving a watermark within a signal
31927882355Encryption/decryption methods and devices utilizing the same
31937882348System and method for administering digital certificate checking
31947882346Method and apparatus for providing authentication, authorization and accounting to roaming nodes
31957881476Delivering enhanced multimedia content on physical media
31967881474System and method for secure wireless multi-hop network formation
31977881473Quantum key distribution system and method
31987881472Quantum key distribution method and communication apparatus
31997881470Network mobility security management
32007877799Performance of a service on a computing platform
32017877793Repositing for digital content access control
32027877791System, method and program for authentication and access control
32037877790System and method of using personal data
32047877784Verifying authenticity of webpages
32057877782Method and apparatus for configuration management of computer system
32067877610Hybrid signature scheme
32077877609Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
32087877603Configuring a storage drive to communicate with encryption and key managers
32097877595Modular cryptographic device and related methods
32107877594Method and system for securing e-mail transmissions
32117877492System and method for delegating a user authentication process for a networked application to an authentication agent
32127877329Apparatus and method for processing license keys using dynamic field mapping
32137876902Distribution of encrypted software update to reduce attack window
32147876901Alternative design for quantum cryptographic entangling probe
32157876897Data security in wireless network system
32167876894Method and system to provide security implementation for storage devices
32177873837Data security for electronic data flash card
32187873832Mechanism for secure participation in a transaction by a third party
32197873168Secret information management apparatus and secret information management system
32207873167System and method for effectively pre-distributing key for distributed sensor network
32217873166Method for undetectably impeding key strength of encryption usage for products exported outside the U.S
32227873163Method and apparatus for message integrity in a CDMA communication system
32237870598Policy specification framework for insider intrusions
32247870597Method and apparatus for managing digital identities through a single interface
32257870394Method and system to scan firmware for malware
32267870393Steganographic method and device
32277870390Data watermarks created by using an uneven sampling period
32287870389Methods and apparatus for authenticating mobility entities using kerberos
32297870381Schema-based portal architecture for assessment and integration of silicon IPs
32307869605Method for generating group key
32317869604System for an encryption key path diagnostic
32327869603Encryption key path diagnostic
32337869602User-based digital rights management
32347869600Optical transmitter and transmitting method for transmitting cryptogram
32357869599Quantum cryptography key distributing system and synchronizing method used in the same
32367869598System and method for comparison of private values
32377869595Content copying device and content copying method
32387869591System and method for secure three-party communications
32397869590Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets
32407865957Apparatus and methods for updating mobile device virus pattern data
32417865955Apparatus and method for extracting signature candidates of attacking packets
32427865950System of assigning permissions to a user by password
32437865935Electronic apparatus having security function
32447865731Securing access to an application service based on a proximity token
32457865730Bcencryption (BCE)--a public-key based method to encrypt a data stream
32467865728Biometric encryption and decryption
32477865727Authentication for devices located in cable networks
32487865720System and method for supporting multiple certificate status providers on a mobile communication device
32497865719Method for establishing the authenticity of the identity of a service user and device for carrying out the method
32507865715Increasing peer privacy
32517865436Using visual images transferred from wireless computing device display screens
32527865193Communication apparatus capable of performing a load balancing and method thereof
32537865166Software radio transceiver
32547864961Method of managing a mobile multicast key using a foreign group key
32557864960Techniques for securing content in an untrusted environment
32567864959Methods and apparatus for multi-level dynamic security system
32577864955Print system, control method therefor, information processing apparatus, control method therefor, program for implementing the control method, and storage medium storing the control program
32587864954Method and system for encryption and authentication
32597864953Adding an additional level of indirection to title key encryption
32607864952Data processing systems with format-preserving encryption and decryption engines
32617864951Scalar multiplication method with inherent countermeasures
32627864688Communication system, method of providing information therein and communication device

2010

32637861292Method and apparatus for incrementally deploying ingress filtering on the Internet
32647861283User position utilization system
32657861282Information processing apparatus, printing apparatus and printing system including thereof apparatuses
32667861090Electric conference system and control method thereof
32677861084Authentication of data transmitted in a digital transmission system
32687861076Using authentication server accounting to create a common security database
32697861075Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers
32707861006Apparatus, method and system for a tunneling client access point
32717860254Computer system security via dynamic encryption
32727860253Wireless perimeter security device and network using same
32737860248Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
32747860247Identity based encryption
32757860246System and method for protecting data in a secure system
32767860245Methods and systems for multi-party sorting of private values
32777860244Secure computation of private values
32787860241Simple universal hash for plaintext aware encryption
32797859725System and method for monitoring unauthorized dissemination of documents and portable media
32807856664Method, system and computer program for a secure backup license server in a license management system
32817856553System and method for platform activation
32827856404Playlist burning in rights-management context
32837856103Microcontroller and authentication method between the controllers
32847856101Method for elliptic curve scalar multiplication
32857856100Privacy-preserving data aggregation using homomorphic encryption
32867856099Secure data transmission between two modules
32877854010Method and apparatus for searching rights object and mapping method and mapping apparatus for the same
32887854004Computer immune system and method for detecting unwanted code in a computer system
32897853805Anti-tamper system
32907853802Information processing system, method, and apparatus, and program
32917853797Information processing method and information processing apparatus
32927853785System and method for implementing digital certificate revocation in an ad-hoc network
32937853784Filtering and application triggering platform
32947853016Signature schemes using bilinear mappings
32957853012Authentication system executing an elliptic curve digital signature cryptographic process
32967853011Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission
32977853010Testing of an algorithm executed by an integrated circuit
32987849500System and method for wireless local area network monitoring and intrusion detection
32997849495Method and apparatus for passing security configuration information between a client and a security policy server
33007849319Method and device for incorporating additional information into main information through electronic watermarking technique
33017849318Method for session security
33027849317Method for mail address block image information encoding, protection and recovery in postal payment applications
33037849316Methods and apparatus for secure document printing
33047849314Method and system for secure authentication in a wireless network
33057849312Method and system for secure external TPM password generation and use
33067849307System and method for establishing historical usage-based hardware trust
33077849304System and method for on-line diagnostics
33087848746Authentication methods and apparatus utilizing hash chains
33097848526Method of receiving session key in home network and method of reproducing content using the same
33107848525Hybrid broadcast encryption method
33117848524Systems and methods for a secure recording environment
33127848518Stable disc controller ID from unstable comparator outputs
33137848516Diffused symmetric encryption/decryption method with asymmetric keys
33147848514Table masking for resistance to power analysis attacks
33157848513Method for transmitting security context for handover in portable internet system
33167844998Apparatus and method for autonomic email access control
33177844835Systems and methods for secure transaction management and electronic rights protection
33187844834Method and system for protecting data, related communication network and computer program product
33197844831Secure memory device for smart cards
33207844822Temporally threaded CMI watermark
33217844814Methods and apparatus for protecting against IP address assignments based on a false MAC address
33227840814Method for managing an executable code downloaded in a reprogrammable on-board system
33237840811Network system and communication methods for securely bootstraping mobile IPv6 mobile node using pre-shared key
33247840809Method and system for secure transmission of an encrypted media stream across a network
33257840807Authentication of computing device through employment of determination that current location of authentication device matches initial location
33267840805Method of and apparatus for providing secure communication of digital data between devices
33277840799Transmission of secure electronic mail formats
33287840011Method and apparatus for distributed management of files
33297840008Method and apparatus for decrypting a communication
33307840004Split-key key-agreement protocol
33317840003High-speed GCM-AES block cipher apparatus and method
33327840000High performance programmable cryptography system
33337839999Encryption device, encryption processing method and program, and information protection system employing the encryption device
33347836507Contents transmitter apparatus, contents receiver apparatus and contents transmitting method
33357836498Device to protect victim sites during denial of service attacks
33367836485System and method for enrolling in a biometric system
33377836482Information management system
33387836310Security system that uses indirect password-based encryption
33397836304Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus
33407836303Web browser operating system
33417836300Security integrated circuit
33427835725Wireless communication system, terminal, processing method for use in the terminal, and program for allowing the terminal to execute the method
33437835528Method and apparatus for refreshing keys within a bootstrapping architecture
33447835523Cryptographic engine abstraction layer for a software defined radio
33457835519Mini time key creation memory medium and system
33467832008Protection of computer resources
33477831996Authentication techniques
33487831834Associating a postmark with a message to indicate trust
33497831833System and method for key recovery
33507831830Methods and apparatus for secure document printing
33517831826Method and system for distributing security policies
33527831824Hallmarking verification process and system and corresponding method of and system for communication
33537831822Real-time stateful packet inspection method and apparatus
33547831048Secure quantum key distribution using entangled photons
33557831045Security module revocation method used for securing broadcasted messages
33567831043System and method for cryptographically authenticating data items
33577831041Image forming apparatus and image forming system
33587831040DES hardware throughput for short operations
33597831039AES encryption circuitry with CCM
33607827598Grouped access control list actions
33617827411Method, system, and end user device for identifying a sender in a network
33627827404Secure sockets layer proxy architecture
33637827403Method and apparatus for encrypting and decrypting data in a database table
33647827223Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator
33657827113Method and system for providing a content subscription service
33667826619Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device
33677826618Synchronization of encryption in a wireless communication system
33687826614Methods and apparatus for passing initialization vector information from software to hardware to perform IPsec encryption operation
33697826612System, method and apparatus for an incremental modular process including modular multiplication and modular eduction
33707823193Method and system for ordering, loading and using admission tickets
33717823189System and method for dynamic role association
33727822979Method and apparatus for secure execution using a secure memory partition
33737822976Network data security system and protecting method thereof
33747822975Authentication of data transmitted in a digital transmission system
33757822969Watermark systems and methods
33767822686Processing system for recording media content
33777822208Process for creating and managing at least one cryptographic key, and system for its implementation
33787822207Key protection mechanism
33797822205Multiple matching control method
33807822204Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system
33817822203Method, apparatus, and program for processing information
33827822200Method and system for asymmetric key security
33837822199Method and device for performing a cryptographic operation
33847822198Parallel encryptor and decryptor
33857822197Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
33867818807System and method of logical prefetching for optimizing file scanning operations
33877818802Refining behavioral detections for early blocking of malicious code
33887818796Bridged cryptographic VLAN
33897818788Web application security frame
33907818781Behavior blocking access control
33917818583Personal authentication apparatus
33927818576User controlled anonymity when evaluating into a role
33937818260System and method of managing digital rights
33947818259Prepaid licensing system and method
33957818256Digital receipt for electronic data and methods and systems for generating same
33967817800Cryptographic key split binder for use with tagged data elements
33977817799Maintaining encryption key integrity
33987814552Method and apparatus for an encryption system
33997814547Stateful and cross-protocol intrusion detection for voice over IP
34007814533Secure customer interface for Web based data management
34017814531Detection of network environment for network access control
34027814337Secure flash-memory card reader with host-encrypted data on a flash-controller-mastered bus parallel to a local CPU bus carrying encrypted hashed password and user ID
34037814332Voiceprint biometrics on a payment device
34047814329MACSec implementation
34057814326Signature schemes using bilinear mappings
34067814325System, method and computer readable medium for certifying release of electronic information on an internet
34077814312Moving principals across security boundaries without service interruption
34087814308Debugging applications under different permissions
34097813509Key distribution method
34107813507Method and system for creating random cryptographic keys in hardware
34117813503Method and system for generation of cryptographic keys for use in cryptographic systems
34127810142Auditing compliance with a hippocratic database
34137810138Enabling dynamic authentication with different protocols on the same port for a switch
34147810135Apparatus for adopting authorizations
34157810133Encrypting operating system
34167810113Security device and head end in conditional access system and method for controlling illegal use in the system
34177809951System and method for automated border-crossing checks
34187809945Examination apparatus, communication system, examination method, computer-executable program product, and computer-readable recording medium
34197809940Remote certificate management
34207809647Processing system for recording media content
34217809269Systems and methods for multiplexing QKD channels
34227809143QKD system with synchronization channel verification
34237809142Data scrambling and encryption of database tables
34247809141Ciphering by blocks of the content of a memory external to a processor
34257809140Authentication of data transmitted in a digital transmission system
34267809136Enhanced ANSI X9.17 and FIPS 186 pseudorandom number generators with forward security
34277809135System and method for protecting computer software from a white box attack
34287809134Method for encrypting information and device for realization of the method
34297809132Implementations of AES algorithm for reducing hardware with improved efficiency
34307808906Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements
34317805762Method and system for reducing the false alarm rate of network intrusion detection systems
34327805614Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
34337805611Method for secure communication from chip card and system for performing the same
34347804962Modeling a sensor network design to secure a network against attack
34357804961Method and apparatus for fast crytographic key generation
34367804960Hardware-based encryption/decryption employing dual ported key storage
34377802106Method and system for guaranteeing the integrity of at least one software program which is transmitted to an encryption/decryption module and recording media for implementing same
34387802101System and method of retrieving a watermark within a signal
34397802100Watermark system
34407802098Cryptography method and smart cards microcircuit
34417802094Reduction of false positive detection of signature matches in intrusion detection systems
34427802093Methods and systems for proofing identities using a certificate authority
34437801310Nestable skeleton decryption keys for digital rights management
34447801309Private key delivery system and a private key delivery method
34457801307Method of symmetric key data encryption
34467801305Secure device for the broadcasting, recording and viewing on demand of audiovisual works in a format of the MPEG-2 TS type
34477801302Cryptographic method and apparatus
34487801301Method and circuit for data encryption/decryption
34497801300Data transmitter and data receiver
34507797743File conversion in restricted process
34517797742File blocking mitigation
34527797740System and method for managing captured content
34537797728Mechanism to generate restricted and unrestricted execution environments
34547797547Information processing apparatus and method of controlling authentication process
34557797545System and method for registering entities for code signing services
34567797537Mobile terminal, data communication method, and computer program
34577797536Cryptographic device with stored key data and method for using stored key data to perform an authentication exchange or self test
34587797532Device authentication system
34597797246Distributed system for issuing official stamps and/or titles applying dedicated smart cards
34607796763Method and system for disaster recovery of data from a storage device
34617796762Communication system, common key control apparatus, and general communication apparatus
34627796761Distribution and authentication of public keys using random numbers and diffie-hellman public keys
34637796760Approach for managing access to messages using encryption key management policies
34647796759Diversification of a single integrated circuit identifier
34657796752Cipher implementation
34667793353Identification card manufacturing security
34677793351Copy deterrent for an audiovisual product
34687793350Apparatus, system, and method for simulated access to restricted computing resources
34697793336Method and apparatus for communicating credential information within a network device authentication conversation
34707793333Mobile authorization using policy based access control
34717793106Method and system for certifying the authority of a signer of an electronic document
34727793101Verifiable virtualized storage port assignments for virtual machines
34737793100Reference monitor for enforcing information flow policies
34747792303Method of delivering direct proof private keys to devices using a distribution CD
34757792302Securely coupling an FPGA to a security IC
34767792301Access control and encryption in multi-user systems
34777792300Method and apparatus for re-encrypting data in a transaction-based secure storage system
34787792290Gathering randomness in a wireless smart card reader
34797792289Encrypted communications
34807792286Signature generation device and signature verification device
34817792285Method and system for securely exchanging encryption key determination information
34827788716Token handler API
34837788698Pre-negotiation and pre-caching media policy
34847788501Methods for secure backup of personal identity credentials into electronic devices
34857788498Triple-tap password entry
34867788496First computer process and second computer process proxy-executing code on behalf thereof
34877788490Methods for authenticating an identity of an article in electrical communication with a verifier system
34887788482System and method for securing on-line documents using authentication codes
34897788182Method for loaning digital works
34907788168Method, system, and apparatus for dynamically creating electronic contracts
34917787653Methods for controlling rendering of images and video
34927787628Double phase encoding quantum key distribution
34937787627Methods and apparatus for providing a key management system for wireless communication networks
34947787625QKD cascaded network with loop-back capability
34957787621Secure transmission using adaptive transformation and plural channels
34967787619Method and apparatus for secure key management using multi-threshold secret sharing
34977784106Manufacturing unique devices that generate digital signatures
34987784100System and method for home network content protection and copy management
34997784089System and method for providing a multi-credential authentication protocol
35007783900Querying encrypted data in a relational database system
35017783897Programmable logic device
35027783889Methods and apparatus for generating signatures
35037783888Watermarking in an audiovisual product
35047783883System and method for validating e-mail messages
35057783045Secure approach to send data from one system to another
35067783044System for on-line and off-line decryption
35077783042Communication system and synchronization method thereof
35087783040Encryption in a secure computerized gaming system
35097783039Digital recording device, digital reproduction device, digital recording/reproduction device, encryption device, decryption device, encryption method, and decryption method
35107783035Systems and methods for implementing host-based security in a computer network
35117779459Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device
35127779452Computer access security
35137779272Hardware cryptographic engine and encryption method
35147779258Method for controlling security function execution with a flexible, extendable, and non-forgable block
35157779255Multi-level security systems
35167779253Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
35177779249Secure transmission of digital content between a host and a peripheral by way of a digital rights management (DRM) system
35187779248Moving principals across security boundaries without service interruption
35197778932Device-based access privilege to an account
35207778422Security associations for devices
35217778421Method for controlling access to encrypted content using multiple broadcast encryption based control blocks
35227778415Substitution cipher text-encoding and un-encoding software and method
35237778414Encryption method based on factorization
35247778413Cryptographic system and method for encrypting input data
35257778412Method and apparatus for performing elliptic curve arithmetic
35267774845Computer security system
35277774824Multifactor device authentication
35287774612Method and system for single signon for multiple remote sites of a computer network
35297774609Process for digital signing of a message
35307774608Author signatures for legal purposes
35317774607Fast RSA signature verification
35327774603Wireless device registration
35337774602Secure modem gateway concentrator
35347774594Method and system for providing strong security in insecure networks
35357774593Encrypted packet, processing device, method, program, and program recording medium
35367774283Method and system for using a camera cell phone in transactions
35377774279Rights offering and granting
35387773784Revocable biometrics with robust distance metrics
35397773754Key management system and method
35407773753Efficient remotely-keyed symmetric cryptography for digital rights management
35417773751Apparatus and method for controlling the copy and play of a digital audio contents
35427773746Encryption system, encryption device, decryption device, program, and integrated circuit
35437770225Method and apparatus for auditing network security
35447770207System, apparatus, program, and method for authentication
35457770020Face image obtaining method and apparatus
35467770015Signatures for multiple encodings
35477770013Digital authentication with digital and analog documents
35487770012System and computer program product for secure authentication using digital certificates
35497770011Secure authentication using digital certificates with individual authentication data
35507769998Method and apparatus to authenticate and authorize user access to a system
35517769176Systems and methods for a secure recording environment
35527769169Method and apparatus for generating a key stream
35537769165Semi-public white-box cipher
35547769164Printing apparatus
35557765602Storage on-demand system, and method for processing data in the same
35567765582Identity-based-encryption messaging system with public parameter host servers
35577765581System and method for enabling scalable security in a virtual private network
35587765580Method and apparatus for providing user authentication using a back channel
35597765408Systems and methods for online identity verification
35607765406System, computer program and method for a crytographic system using volatile allocation of a superkey
35617765392Method and apparatus for establishing processor as core root of trust for measurement
35627764795Key-exchange protocol using a password-derived prime
35637764792System and method for encoding data transmitted on a bus
35647764787System and method for authenticating software using protected master key
35657764786Protection of a DES algorithm
35667761918System and method for scanning a network
35677761712Steganographic method and device
35687761711Signature validation and generation
35697761702Method and apparatus for distributing group data in a tunneled encrypted virtual private network
35707761700Methods and arrangements for providing a mark-up language based graphical user interface for user identification to an operating system
35717760884Cryptographic method and devices for facilitating calculations during transactions
35727760881Data processing apparatus and data reception processing apparatus
35737760875Accelerating Diffie-Hellman key-exchange protocol with zero-biased exponent windowing
35747760872Public key cryptographic methods and systems
35757757293Automated computer system security compromise
35767757269Enforcing alignment of approved changes and deployed changes in the software change life-cycle
35777757101Data processing apparatus, data processing system, and data processing method therefor
35787757100Protected volume on a data storage device with dual operating systems and configurable access and encryption controls
35797757098Method and apparatus for verifying authenticity of initial boot code
35807757091Method and apparatus for the creation of a self-authenticating document
35817757090System for verifying of secure document
35827757088Methods of accessing and using web-pages
35837757087Information processing apparatus and information processing method
35847757084Method of validating consumable authentication chip
35857756793Content data supply system, content data supply apparatus and method, content data reproduction apparatus and method, and program
35867756510Authentication method for wireless distributed system
35877756292System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
35887756272Interpreter using cryptographic values of a playback device's keys to authorize the playback device
35897756270Encryption device and decryption device
35907756269Cryptosystem for communication networks
35917752466Systems and methods for secure transaction management and electronic rights protection
35927752461Storage apparatus that can properly recommence input and output of classified data
35937752457Method and apparatus for secure data mirroring a storage system
35947752452Dynamic cache lookup based on dynamic data
35957752449System and method for generating a non-repudiatable record of a data stream
35967752444System and method for providing identity hiding in a shared key authentication protocol
35977752443Method and system for a single-sign-on operation providing grid access and network access
35987752440Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages
35997752439Method and apparatus for providing process-based access controls on computer resources
36007751570Method and apparatus for managing cryptographic keys
36017751569Group admission control apparatus and methods
36027751567Local authentication of mobile subscribers outside their home systems
36037751556Apparatus and method of generating falsification detecting data of encrypted data in the course of process
36047751497Method to minimize compatibility error in hierarchical modulation using variable phase
36057748036Methods for categorizing input data
36067748027System and method for dynamic data redaction
36077747852Chain of trust processing
36087747532Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation
36097747024System and method for generalized authentication
36107747022Wireless perimeter security device and network using same
36117747021Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels
36127747020Technique for implementing a security algorithm
36137747019Methods and systems for communicating over a quantum channel
36147747018Method and apparatus for providing a message sequence count in a security systems
36157747014Information transmission system, and information sending apparatus and information receiving apparatus used therein
36167747013Early detection system and method for encrypted signals within packet networks
36177747012Process of security of an electronic unit with cryptoprocessor
36187747011Encryption device, encryption method, and computer program
36197743261Unauthorized contents detection system
36207743258Method for interacting with a memory device in cryptographic operations
36217743254Visualization of trust in an address bar
36227743250Traffic manager for distributed computing environments
36237742605Method and system for authentification of a mobile user via a gateway
36247742601Encryption method using synchronized continuously calculated pseudo-random key
36257742598Shrinking key generator for parallel process
36267742597Exclusive encryption system
36277742596Reliable elliptic curve cryptography computation
36287742594Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol
36297739742Theft protection method and promotion system for audio media
36307739521Method of obscuring cryptographic computations
36317739519Secure device
36327739517Hardware-based authentication of a software program
36337739507Hardware multimedia endpoint and personal computer
36347739506Authentication processing device and security processing method
36357739505Linking Diffie Hellman with HFS authentication by using a seed
36367739502Localization determination process for 1394 serial bus
36377739500Method and system for consistent recognition of ongoing digital relationships
36387739496Secure packet-based data broadcasting architecture
36397739492Encrypted communication for selectively delivering a message to multiple decrypting devices
36407739381System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services
36417739338System and method for encoding and verifying the identity of a sender of electronic mail and preventing unsolicited bulk email
36427738793Secure optical communication system
36437738660Cryptographic key split binding process and apparatus
36447738657System and method for multi-precision division
36457735134Jumping application security system
36467735129Firewall device
36477735128Method of storing pattern matching policy and method of controlling alert message
36487735116System and method for unified threat management with a relational rules methodology
36497735114Multiple tiered network security system, method and apparatus using dynamic user policy assignment
36507734930Click passwords
36517734923Key transformation unit for a tamper resistant module
36527734920Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium
36537734919Telephone having authentication function and telephone system
36547734918Preventing rogue implementations of a security-sensitive class interface
36557734916Multi-level security systems
36567734907Methods and systems for redirecting data
36577734280Method and apparatus for authentication of mobile devices
36587734069Image processing method, image processor, photographic apparatus, image output unit and iris verify unit
36597734048Cryptographic system using chaotic dynamics
36607734046Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit
36617734045Multifactor split asymmetric crypto-key with persistent key security
36627734044Method and apparatus for synchronous stream cipher encryption with reserved codes
36637734042System and method for using a streaming protocol
36647733366Computer network-based, interactive, multimedia learning system and process
36657730327Managing the encryption of data
36667730320Method for generating data for detection of tampering, and method and apparatus for detection of tampering
36677730315Cryptosystem based on a Jacobian of a curve
36687730314Method and apparatus for electronic commerce using digital ticket to provide anonymity
36697730312Tamper resistant module certification authority
36707730311Key transformation unit for a tamper resistant module
36717730310Key transformation unit for a tamper resistant module
36727730309Method and system for key management in voice over internet protocol
36737730308System and method for providing an user's security when setting-up a connection over insecure networks
36747730307Secure ADS-B authentication system and method
36757730306Information processing apparatus with use-restricted functions, and system and method for canceling use restriction
36767730305Authentication method for link protection in Ethernet passive optical network
36777730299System and method for providing secure internetwork services via an assured pipeline
36787730296Method and system for providing synchronous running encoding and encryption
36797729496Efficient key updates in encrypted database systems
36807725928System and method for establishing temporary and permanent credentials for secure online commerce
36817725925Enforcing access control on multicast transmissions
36827725921Systems and methods for managing networks
36837725737System and methodology providing secure workspace environment
36847725736Message digest instruction
36857725732Object authentication system
36867725726Method and apparatus for securing and authenticating encoded data and documents containing such data
36877725719Method and system for generating ciphertext and message authentication codes utilizing shared hardware
36887725717Method and apparatus for user authentication
36897725714Method for checking the integrity of data, system and mobile terminal
36907725712User authentication system and method
36917725707Server, VPN client, VPN system, and software
36927724906Decryption apparatus and decryption method
36937724904Authentication system and method thereof in a communication system
36947724903Framing of transmit encoded data and linear feedback shifting
36957724902Faceplate for quick removal and securing of encryption device
36967724899Method for controlling security channel in MAC security network and terminal using the same
36977724897Program converter, encrypting device, and encrypting method
36987721955Secure transaction method and transaction terminal for use in implementing such method
36997721345Data security system and method
37007721330Utility computing firewall
37017721325Method and apparatus for managing communication security in wireless network
37027721113Data alteration detecting method, data alteration detecting device and data alteration detecting program
37037721105Repurposing digitally signed information
37047721100Granting an access to a computer-based object
37057721096Self-authenticating blade server in a secure environment
37067721092Authenticating device, authenticated device and key updating method
37077721088Terminal device, server device, and content distribution system
37087720767Method and system to support dynamic rights and resources sharing
37097720227Encryption method for SIP message and encrypted SIP communication system
37107720225Table splitting for cryptographic processes
37117720219Apparatus and method for implementing a hash algorithm word buffer
37127716494Establishing a trusted platform in a digital processing system
37137716488Trusted time stamping storage system
37147716484System and method for increasing the security of encrypted secrets and authentication
37157716482Conference session key distribution method in an ID-based cryptographic system
37167716481System and method for secure exchange of trust information
37177716479Dynamically resolving recipients to retrieve public keys during send/receive
37187716478Method and device for data protection
37197716477Data processing method, program of the same, and device of the same
37207716475Mobile station and communication control method
37217716474Anti-piracy software protection system and method
37227716471Communication system and network control apparatus with encryption processing function, and communication control method
37237716468Method and system for cloned cable modem detection
37247715565Information-centric security
37257715564License information conversion apparatus
37267715563Rapid acquisition of state vectors in an encrypted data communication system
37277715561System for protecting personal information of a customer when receiving on-line services from a service provider
37287715557Method for managing rights of subscribers to a multi-operator pay-television system
37297715554Prime number determining method
37307715551Apparatus and method for consistency checking public key cryptography computations
37317712143Trusted enclave for a computer system
37327712141Determining advertising activity
37337712134Method and apparatus for worm detection and containment in the internet core
37347712126Method and apparatus for providing dynamic security management
37357711964Method of securing programmable logic configuration data
37367711963Modular cryptographic device providing enhanced interface protocol features and related methods
37377711957Granting access to a computer-based object
37387711955Apparatus and method for cryptographic key expansion
37397711953Methods and systems that selectively permit changes to a cryptographic hardware unit's state
37407711952Method and system for license management
37417711950Methods and systems for establishing an electronic account for a customer
37427711121System and method for distributed management of shared computers
37437711119Method and apparatus for transition of encryption key during an ongoing media communication session
37447711116Methods and systems for transmitting digital messages
37457707643System and method for accessing protected content in a rights-management architecture
37467707637Distributed threat management
37477707430Digital content protection system
37487707429System and method to proactively detect software tampering
37497707425Recognizer of content of digital signals
37507707424Secure file transfer
37517707423Method and system for maintaining digital signature integrity
37527707420Public key encryption with digital signature scheme
37537707419Method and apparatus for storing and distributing encryption keys
37547707415Tunneling security association messages through a mesh network
37557707414Information processing device for authentication processing, information processing method, and control program for executing the method
37567707408Key transformation unit for a tamper resistant module
37577707407Encryption of voice and data in a single data stream in a deployable, secure communication system
37587707404Automated process for a web site to receive a secure socket layer certificate
37597707402Quantum cipher communication system
37607706541Information management apparatus
37617706540Content distribution using set of session keys
37627706537Method for relocating SRNS in a mobile communication system
37637706530Key information processing method, device thereof, and program
37647706529Random signal generator
37657703132Bridged cryptographic VLAN
37667703124System and method for implementing a private virtual backbone on a common network infrastructure
37677702920Storage control device, host interface control unit of storage control device, and information protection method of storage control device
37687702911Interfacing with a system that includes a passcode authenticator
37697702908Tamper resistant module certification authority
37707702903License re-allocation system and method
37717702902Method for a web site with a proxy domain name registration to receive a secure socket layer certificate
37727702901Secure communications between internet and remote client
37737702899Method and apparatus for verifying revocation status of a digital certificate
37747702109Content recording/reproducing system, distribution device, reproducing device, and recording device
37757702106Quantum secret splitting based on non-orthogonal multi-particle states
37767702104System and method for securing genomic information
37777702097Method and apparatus for authentication of data using different hash functions and feedback
37787698735Method and system of integrating third party authentication into internet browser code
37797698664Secure exchange of information in electronic design automation
37807698570Digital content distribution system and method
37817698565Crypto-proxy server and method of using the same
37827698555System and method for enabling secure access to a program of a headless server device
37837698551Method for broadcast encryption and key revocation of stateless receivers
37847698550Native wi-fi architecture for 802.11 networks
37857698549Program product for unified certificate requests from certificate authorities
37867698227System and method for providing traceable acknowledgement of a digital data distribution license
37877698223Pluggable file-based digital rights management API layer for applications and engines
37887697694Synchronizing the exchange of cryptography information between kernel drivers
37897697691Method of delivering Direct Proof private keys to devices using an on-line service
37907697690Windowed backward key rotation
37917697689Secure transmission system for a digital trunked radio system
37927697688Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm
37937697685Data dependent scrambler with reduced overhead
37947697684Block cipher apparatus using auxiliary transformation
37957697682Encryption apparatus and encryption method
37967694336Aggregated authenticated identity apparatus for and method therefor
37977694152Memory controller with performance-modulated security
37987694145Indicating status for digital signatures
37997694141Extended authenticated key exchange with key confirmation
38007694128Systems and methods for secure communication delivery
38017693978Distributing live performances
38027693286Method of delivering direct proof private keys in signed groups to devices using a distribution CD
38037693285Secure communication apparatus and method
38047693280Rights management system for streamed multimedia content
38057693279Security method and apparatus using biometric data
38067693277Generating digital signatures using ephemeral cryptographic key
38077690045On-the-fly contents-based access control system
38087690041Associating first and second watermarks with audio or video content
38097690040Method for network traffic mirroring with data privacy
38107689912Managing electronic documents utilizing a digital seal
38117689836Encryption device
38127689835Computer program product and computer system for controlling performance of operations within a data processing system or networks
38137689828System and method for implementing digital signature using one time private keys
38147689211Secure login method for establishing a wireless local area network connection, and wireless local area network system
38157688982Protected return path from digital rights management dongle
38167688981Network partitioning using encryption
38177688980Cryptographic-key generation and management
38187688975Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure
38197688972Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets
38207685647Information processing apparatus
38217685645Security containers for document components
38227685631Authentication of a server by a client to prevent fraudulent user interfaces
38237685626Information management system
38247685437Query optimization in encrypted database systems
38257685428Transmission of event markers to data stream recorder
38267685425Server computer for guaranteeing files integrity
38277685424Validating untrusted objects and entities
38287685423Validation protocol and system
38297685418Mechanisms and techniques for protecting intellectual property
38307685414Subscription management service for secure messaging system
38317684568Encrypting data in a communication network
38327684566Encryption scheme for streamed multimedia content protected by rights management system
38337684565System for securely communicating information packets
38347684563Apparatus and method for implementing a unified hash algorithm pipeline
38357681227Generation of encrypted video information
38367681044Secure processor and system
38377681037Network connection system
38387681035Digital rights management handler and related methods
38397681034Method and apparatus for securing electronic data
38407681031Method and apparatus to provide authentication code
38417680282Signal processing circuit
38427680280Electronic device, control method thereof, security program and others
38437680278Domino scheme for wireless cryptographic communication and communication method incorporating same
38447680273System and method for optimizing error detection to detect unauthorized modification of transmitted data
38457680271Zero-knowledge proof cryptography methods and devices
38467680270System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication
38477680269Method for ciphering a compressed audio or video stream with error tolerance
38487680268Elliptic curve point octupling using single instruction multiple data processing
38497676831Role-based access control management for multiple heterogeneous application components
38507676679Method for self-synchronizing time between communicating networked systems using timestamps
38517676678Method for signing a data package and signing apparatus
38527676546Control and management of electronic messaging
38537676037Cryptographic method capable of protecting elliptic curve code from side channel attacks
38547673347Information control in federated interaction
38557673333Flexible method of security data backup
38567673332Method and system for access authentication
38577673328Network authentication system using individual services providers and an authentication server
38587673327Aggregation system
38597673324Method and system for tracking an operating performed on an information asset with metadata associated therewith
38607673151Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor
38617673145Biometric image collation apparatus and collation method therefor
38627673144Cryptographic system for group signature
38637672460Mix-net system
38647672458Method and system for key insertion for stored encrypted content
38657672457Computer-readable recording medium recording a wireless communication authentication program
38667672456Anti-pirate method for the distribution of digital content by pro-active diversified transmission, associated transmitting device and portable receiving object
38677672455Method and apparatus for data encryption
38687669243Method and system for detection and neutralization of buffer overflow attacks
38697669238Evidence-based application security
38707669227Information management system
38717669226Generic declarative authorization scheme for Java
38727669114Software architecture and system for performing validated clinical studies of pharmaceutical related products
38737669055Key transformation unit for a tamper resistant module
38747669053System and method for using acoustic digital signature generator as oracle
38757668316Method for encrypting and decrypting metadata
38767668315Local authentication of mobile subscribers outside their home systems
38777668314System and method for communicating encrypted data
38787668313Recipient-encrypted session key cryptography
38797667429Battery pack authentication for a mobile device
38807665134Profiling users based on artificially constructed deceptive content
38817665124Authentication device
38827665122Authentication apparatus, method and program
38837664961Wireless handheld device with local biometric authentication
38847664957Digital signatures including identity-based aggregate signatures
38857664956Method and system for real-time control of document printing
38867664955Establishing shared information in a network
38877664810Microprocessor apparatus and method for modular exponentiation
38887664708System for controlling the distribution and use of digital works using digital tickets
38897664706Method for granting customers access to a product
38907664267Bit based arithmetic coding using variable size key cipher
38917664265Controlling communications between stations
38927664262Playback apparatus and playback control method
38937664260Signature generation device, key generation device, and signature generation method
38947661147System for controlling use of digitally encoded products
38957661139System and method for detecting invalid access to computer network
38967661127Instrument access control system
38977661125System for providing and utilizing a network trusted context
38987661000Information processing device, information recording medium and information processing method, and computer program
38997660993Cryptographic puzzle cancellation service for deterring bulk electronic mail messages
39007660987Method of establishing a secure e-mail transmission link
39017660984Method and system for achieving individualized protected space in an operating system
39027660861System and method for verifying the identity of a sender of electronic mail and preventing unsolicited bulk email
39037660421Method and system for secure storage, transmission and control of cryptographic keys
39047660418Cryptographic system and method for geolocking and securing digital information
39057660415Method and apparatus for controlling access to storage media
39067660414Encryption/decryption method and authentication method using multiple-affine key system
39077657934Architecture to thwart denial of service attacks
39087657924Method and system for implementing authorization policies for web services
39097657847Copy control information deciding apparatus
39107657761Multiple trust modes for handling data
39117657752Digital signal watermaker
39127657747System and method for specifying security, privacy, and access control to information used by others
39137657744System and method for dynamically determining the role of a network device in a link authentication protocol exchange
39147657736System and method for compressing secure e-mail for exchange with a mobile data communication device
39157657490Electronic settlement system, settlement device, and terminal
39167657036Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol
39177657035Encryption communication method and system
39187657030Method for generating and distributing strong DES keys
39197657028Method for classifying private information securely
39207653947Image forming system, image forming apparatus, control method therefor and program implementing the control method
39217653920Method and system for protecting cable television subscriber-specific information allowing limited subset access
39227653870System and method of dynamically generating index information
39237653817Signature schemes using bilinear mappings
39247653809Method and system for controlling the on-line supply of digital products or the access to on-line services
39257653210Method for monitoring internet dissemination of image, video, and/or audio files
39267653199Quantum key distribution
39277653197System and method of reliable forward secret key sharing with physical random functions
39287650647Hardware-oriented configuration and locking of devices
39297650646Information-recording apparatus, information reproduction apparatus, information-recording method, information reproduction method and computer program
39307650642Peer-to-peer license tracking and control
39317650629Enhanced trust relationship in an IEEE 802.1.times.network
39327650514Scalable leases
39337650511Information processing method, falsification verification method and device, storage medium, and program
39347650497Automated digital certificate renewer
39357650494Method and apparatus for use in relation to verifying an association between two parties
39367650493System and method for integrating secure and non-secure software objects
39377650491Method and system for controlled distribution of application code and content data within a computer network
39387649999Method and apparatus for establishing a key agreement protocol
39397649997User transparent registration process for secure communication
39407649992Apparatuses for encoding, decoding, and authenticating data in cipher block chaining messaging authentication code
39417649990Apparatus to implement dual hash algorithm
39427647644Entitlement designation in web services for remote portlets environment
39437647641Method and system for conditional access applied to protection of content
39447647631Automated user interaction in application assessment
39457647624Techniques for preserving and managing identities in an audit log
39467647622Dynamic security policy through use of empirical security events
39477647503Optimization methods for the insertion, projection, and detection of digital watermarks in digital data
39487647502Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
39497647500Synchronous validation and acknowledgment of electronic data interchange (EDI)
39507647498Device authentication
39517647496Process-mode independent driver model
39527647494Name transformation for a public key infrastructure (PKI)
39537647270System and methods for pricing and allocation of commodities or securities
39547646980Variable spectral phase encoder/decoder based on decomposition of Hadamard codes
39557646874Establishing mutual authentication and secure channels in devices without previous credentials
39567644437Method and apparatus for local area networks
39577644289Modular cryptographic device providing enhanced communication control features and related methods
39587644284Specifying security protocols and policy constraints in distributed systems
39597644283Media analysis method and system for locating and reporting the presence of steganographic activity
39607644276Method for verifying a secure association between devices
39617644275Pass-thru for client authentication
39627644273Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs
39637644034System and method for pricing and allocation of commodities or securities
39647643639Process automation system and process device for a process automation system
39657643638System for generating pseudorandom sequences
39667643637Efficient code constructions via cryptographic assumptions
39677643636Managing multiple cryptographic periods in a single cryptographic group
39687643633Adding randomness internally to a wireless mobile communication device
39697643632Ternary and multi-value digital signal scramblers, descramblers and sequence generators
39707643495PCI express switch with encryption and queues for performance enhancement

2009

39717640582Clustered filesystem for mix of trusted and untrusted nodes
39727640575System and method for determining a security encoding to be applied to outgoing messages
39737640574Method and system for resource based authentication
39747640435System, method, and apparatus for securely providing content viewable on a secure device
39757640432Electronic cash controlled by non-homomorphic signatures
39767640427System and method for secure electronic communication in a partially keyless environment
39777639834Software anti-piracy systems and methods utilizing certificates with digital content
39787639820Image forming apparatus certificate sheet making method and certificate sheet processing method
39797639819Method and apparatus for using an external security device to secure data in a database
39807639818Structured document signature device, structured document adaptation device and structured document verification device
39817639806Fingerprinting digital devices using electromagnetic characteristics of their communications
39827639805Digital rights management scheme for an on-demand distributed streaming system
39837639803Optical disk player
39847639802Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP
39857639801Method of transforming serial scrambler to parallel scrambler, parallel scrambler and double-edge-triggered register with XOR operation
39867639798High speed data encryption architecture
39877639796Method for secure integer division or modular reduction against hidden channel attacks
39887636944Method and apparatus for detecting and responding to email based propagation of malicious software in a trusted network
39897636942Method and system for detecting denial-of-service attack
39907636935Method of enforcing a policy on a computer network
39917636844Method and system to provide a trusted channel within a computer system for a SIM device
39927636841Systems and methods for secure data exchange in a distributed collaborative application
39937636840Secure communications and control in a fueling environment
39947636442Method and apparatus for migrating software-based security coprocessors
39957636439Encryption method, encryption apparatus, data storage distribution apparatus and data delivery system
39967634652Management of streaming content
39977634171PC-based personal video recorder
39987634091System and method of hiding cryptographic private keys
39997634088Radio communications system
40007634087Systems and methods for identity-based encryption and related cryptographic techniques
40017634086Cipher device using RC4 algorithm and method thereof
40027634085Identity-based-encryption system with partial attribute matching
40037634083Differential power analysis
40047631359Hidden proactive replication of data
40057631349Method and apparatus for firewall traversal
40067631318Secure server plug-in architecture for digital rights management systems
40077631195System and method for providing security to a portable storage device
40087631193Tokenless identification system for authorization of electronic transactions and electronic transmissions
40097631190Use of variant and base keys with two entities
40107631189Information recording device, information reproducing device, information recording medium, method, and computer program
40117631187Method for the initialisation of mobile data supports
40127631185File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing
40137631183System and method for retrieving related certificates
40147631181Communication apparatus and method, and program for applying security policy
40157630987System and method for detecting phishers by analyzing website referrals
40167630940Content sharing system and method
40177630497System and method for assigning sequence keys to a media player to enable hybrid traitor tracing
40187630493Multiple factor private portion of an asymmetric key
40197630492Secure audio stream scramble system
40207627891Network audit and policy assurance system
40217627764Apparatus and method for performing MD5 digesting
40227627763Multi signature verification system, electronic signature attaching apparatus, data addition apparatus, and electronic signature verification apparatus
40237627762Signing and authentication devices and processes and corresponding products, notably for DVB/MPEG MHP digital streams
40247627760Extended authenticated key exchange
40257627756Storage system for data encryption
40267627755Secure broadcast/multicast service
40277627754Document data identity verifying apparatus
40287627752Communication system and network control apparatus with encryption processing function, and communication control method
40297627748Network connection device, network connection method, and communication device realizing contents protection procedure over networks
40307627122Method for authentication of a radio communications network with a mobile station, and radio communications network and a mobile station
40317627116Random data method and apparatus
40327627115Method and system for implementing the GEA3 encryption algorithm for GPRS compliant handsets
40337627114Efficient modular reduction and modular multiplication
40347627113Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets
40357626977Standard telephone equipment (STE) based deployable secure communication system
40367624445System for dynamic network reconfiguration and quarantine in response to threat conditions
40377624434System for providing firewall capabilities to a communication device
40387624430Method for accessing a data processing system
40397624428Apparatus and method for platform-independent identity manageability
40407624425Method and apparatus for generating a security document for a farm in a utility computing environment
40417624273Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
40427624270Inter subnet roaming system and method
40437624269Secure messaging system with derived keys
40447624268Device and method for managing public key certificate attached to electronic mail and storage medium
40457624264Using time to determine a hash extension
40467623663Rolling code security system
40477623659Biometric non-repudiation network security systems and methods
40487623658Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets
40497623657Methods and apparatus for secure and adaptive delivery of multimedia content
40507623656Stream cipher encryption and message authentication
40517620980Secure data broker
40527620978Securely propagating authentication in an ensemble of devices using single sign-on
40537620974Distributed traffic scanning through data stream security tagging
40547620824Data communicating apparatus, data communicating method, and program
40557620822Information processing system for controlling integrated circuit cards at a command level
40567620816System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
40577620812System for authenticating remotely generated optical control signals
40587620811Server device and program management system
40597620810Method and network for ensuring secure forwarding of messages
40607620809Method and system for device registration within a digital rights management framework
40617620806Encrypted communication for selectively delivering a message to multiple decrypting devices
40627620570System and method for presentation of user interface for conducting contractual activity over a computer network
40637620198Watermark coding method and recording medium thereof
40647620187Method and apparatus for ad hoc cryptographic key transfer
40657620186Method for establishing an encrypted communication by means of keys
40667620185Preview of payable broadcasts
40677620182QKD with classical bit encryption
40687617528Smartcard with protected memory access
40697617521Charging via policy enforcement
40707617395Battery and authentication requesting device
40717616776Methods and apparatus for enhancing the robustness of watermark extraction from digital host content
40727616765Method and system for generating shared information
40737613928Flash device security method utilizing a check register
40747613926Method and system for protecting a computer and a network from hostile downloadables
40757613922Electronic device controlling apparatus, electronic device controlling system, and electronic device controlling method
40767613921Method and apparatus for remotely provisioning software-based security coprocessors
40777613919Single-use password authentication
40787613918System and method for enforcing a security context on a downloadable
40797613302Systems and methods for compression of key sets having multiple keys
40807613301Data storage device and data storage method
40817613300Content-protected digital link over a single signal line
40827613298System and process for adaptive and progressive scrambling of video streams
40837613297Method and apparatus for data encryption
40847613296M6 block cipher system and method for encoding content and authenticating a device
40857610494Encrypted microcode update of an optical transceiver
40867610487Human input security codes
40877610485System for providing secure multi-cast broadcasts over a network
40887609838Method of transmitting data in a network
40897609834Personal authenticating multi-function peripheral
40907607165Method and apparatus for multiplication and/or modular reduction processing
40917607164Systems and processes for managing policy change in a distributed enterprise
40927607020Communication with an external source application
40937607018Method and apparatus for collecting electronic signatures
40947607015Shared network access using different access keys
40957607013Method and apparatus for access authentication in wireless mobile communication system
40967607007Method and apparatus for message routing in a computer system
40977607006Method for asymmetric security
40987606771Dynamic number authentication for credit/debit cards
40997606388Contents border detection apparatus, monitoring method, and contents location detection method and program and storage medium therefor
41007606370System, method and computer program product for updating security criteria in wireless networks
41017606368Method and apparatus for data encryption
41027606367Quantum cryptography with fewer random numbers
41037603721Restricted software and hardware usage on a computer
41047603719Resource access control
41057603706System security using human authorization
41067603703Method and system for controlled distribution of application code and content data within a computer network
41077603699Method for establishing trust online
41087603561Methods and apparatus for input of coded image data
41097603557Communication device, communication system and authentication method
41107603555Providing tokens to access extranet resources
41117603553System and method to make file handles opaque to clients
41127603552Piracy prevention using unique module translation
41137603550Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path
41147602920Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
41157602918Method for distributing security keys during hand-off in a wireless communication system
41167602916Access-protected data carrier
41177602915Communication system having plurality of nodes sharing a common cipher key, cipher key dispatching apparatus for use in the system, and anti-theft apparatus utilizing information derived from cipher key utilization
41187602910Password protection
41197602909Self-service terminal
41207602906Cipher for disk encryption
41217602903Cryptography correctness detection methods and apparatuses
41227602817Low deviation field modulation for transfer of information
41237600263Access controlled search results
41247600261Security attributes in trusted computing systems
41257600255Preventing network denial of service attacks using an accumulated proof-of-work approach
41267600251Universal peer-to-peer game download
41277600134Theft deterrence using trusted platform module authorization
41287600131Distributed processing in a cryptography acceleration chip
41297600129Controlling access using additional data
41307600128Two-factor computer password client device, system, and method
41317600121Message security
41327600119Data update system, data update method, data update program, and robot system
41337600118Method and apparatus for augmenting authentication in a cryptographic system
41347600116Authentication of messages in a communication system
41357600115Control key capable of storing multiple and variable data packet classification results
41367600108Gaming machine having reduced-read software authentication
41377599976System and method for cryptographic key generation
41387599934Server side filtering and sorting with field level security
41397599496Secure encryption key distribution
41407599493Asymmetric key pair having a kiosk mode
41417599492Fast cryptographic key recovery system and method
41427599491Method for strengthening the implementation of ECDSA against power analysis
41437599488Differential power analysis
41447596804Seamless cross-site user authentication status detection and automatic login
41457596802Method and system for providing connection handling
41467596703Hidden data backup and retrieval for a secure device
41477596700Method and system for establishing trusting environment for sharing data between mutually mistrusting entities
41487596696Efficiently managing keys to make data permanently unreadable
41497596691Internet facsimile and control method thereof and communication instruction terminal
41507596689Secure and reliable document delivery using routing lists
41517596270Method of shuffling text in an Asian document image
41527596227System method and model for maintaining device integrity and security among intermittently connected interoperating devices
41537596226Mobile terminal, method and computer program product for storing and retrieving network parameters
41547596225Method for refreshing a pairwise master key
41557596224Method and system for secure call alert
41567596223User control of a secure wireless computer network
41577594265System for preventing unauthorized access to sensitive data and a method thereof
41587594262System and method for secure group communications
41597594261Cryptographic applications of the Cartier pairing
41607594256Remote interface for policy decisions governing access control
41617594119System for managing time rights linked to a digital content
41627594118Data-processing system and method for controlling same, computer program, and computer-readable recording medium
41637594116Mediated key exchange between source and target of communication
41647594114Authentication apparatus and method for universal appliance communication controller
41657594112Delegated administration for a distributed security system
41667593717Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
41677593532Management of the retention and/or discarding of stored data
41687593531Methods and systems for transceiving chaotic signals
41697593527Providing digital signature and public key based on shared knowledge
41707593526Method and apparatus for compressing rabin signatures
41717591015Secure kernel transactions
41727591013System and method for client initiated authentication in a session initiation protocol environment
41737591006Security for external system management
41747591003Security policies in trusted operating system
41757591001System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection
41767591000System and method for hierarchical role-based entitlements
41777590868Method and apparatus for managing encrypted data on a computer readable medium
41787590866Super-distribution of protected digital content
41797590860Secure data processing apparatus
41807590858Authentication apparatus, user authentication method, user authentication card and storage medium
41817590853Systems and methods using cryptography to protect secure computing environments
41827590851Confirmation method of software and apparatus for executing software
41837590848System and method for authentication and fail-safe transmission of safety messages
41847590847Mobile authentication for network access
41857590840Method and system for authorizing client devices to receive secured data streams
41867590599System and method of automatically maintaining and recycling software components
41877590479Remote login of a personal computer
41887590247System and method for reusable efficient key distribution
41897590241Receiver and receiving method
41907590236Identity-based-encryption system
41917590235Reduction calculations in elliptic curve cryptography
41927587764Cryptic information and behavior generation for competitive environments
41937587759Intrusion prevention for active networked applications
41947587756Methods and apparatus for a secure proximity integrated circuit card transactions
41957587752Methods and apparatus for providing a control channel in a data network
41967587749Computer method and apparatus for managing data objects in a distributed context
41977587609Method and system for secure alert messaging
41987587606Emergency web keys
41997587604Watermark signal generating method
42007587603Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
42017587602Methods and devices responsive to ambient audio
42027587601Digital watermarking methods and apparatus for use with audio and video content
42037587600Loading data onto an electronic device
42047587599System and method for providing services
42057587595Method and apparatus for providing software-based security coprocessors
42067587587Data path security processing
42077587367Method and system to provide feedback data within a distributed e-commerce system
42087587125Reproducing/recording apparatus
42097587051System and method for securing information, including a system and method for setting up a correspondent pairing
42107587050Method, system, base station and data carrier for clash-free transmission between a base station and a number of mobile data carriers
42117587049Active stabilization of a one-way QKD system
42127587047Chaos generator for accumulation of stream entropy
42137587046Method and apparatus for generating keystream
42147587045System and method for securing document transmittal
42157584512Restricted software and hardware usage on a computer
42167584505Inspected secure communication protocol
42177584500Pre-fetching secure content using proxy architecture
42187584499Policy algebra and compatibility model
42197584363Fair blind signature process
42207584362Systems and methods for providing signatures
42217584358Tamper resistant module certification authority
42227584352Protection against denial of service attacks
42237584149System and method for securing data through a PDA portal
42247583803QKD stations with fast optical switches and QKD systems using same
42257583801Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data
42267583800Encryption apparatus and method in a wireless communications system
42277581257System for handling network transactions
42287581244IMX session control and authentication
42297581241Generating an outbound connection security policy based on an inbound connections security policy
42307581113System and method for generating and authenticating a computer password
42317581109Delegation of electronic signature by multi-agent cryptography
42327581105Electronic signing apparatus and methods
42337581103Software self-checking systems and methods
42347581101Network invitation arrangement and method
42357581099Secure object for convenient identification
42367581097Apparatus, system, and method for secure communications from a human interface device
42377581095Mobile-ad-hoc network including node authentication features and related methods
42387581094Cryptographic checksums enabling data manipulation and transcoding
42397580988System and methods for managing the distribution of electronic content
42407580529Method for verifying digital franking notes
42417580525Sub-scrambling/descrambling method and sub-scrambling/descrambling device
42427580523Distribution of video content using client to host pairing of integrated receivers/decoders
42437580521Identity-based-encryption system with hidden public key attributes
42447580520Methods for scaling a progressively encrypted sequence of scalable data
42457577999Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system
42467577985Trusted handler and data association
42477577844Systems and methods for encoding randomly distributed features in an object
42487577841Watermark placement in watermarking of time varying media signals
42497577840Transferring application secrets in a trusted operating system environment
42507577839Transferring application secrets in a trusted operating system environment
42517577838Hybrid systems for securing digital assets
42527577836Method and system for secured wireless data transmission to and from a remote device
42537577833Apparatus and method for high speed IPSec processing
42547577258Apparatus and method for group session key and establishment using a certified migration key
42557577257Large scale quantum cryptographic key distribution network
42567577255Proxy method and system for secure wireless administration of managed entities
42577577254Detector autocalibration in QKD systems
42587577253Conditional access method and devices
42597577250Key derivation functions to enhance security
42607574741Method and system for preventing operating system detection
42617574740Method and system for intrusion detection in a computer network
42627574737Systems and methods for secure communication over a wireless network
42637574734System and method for sequentially processing a biometric sample
42647574731Self-managed network access using localized access management
42657574607Secure pipeline processing
42667574605Method of managing digital signature, apparatus for processing digital signature, and a computer readable medium for recording program of managing digital signature
42677574604Network device registration
42687574603Method of negotiating security parameters and authenticating users interconnected to a network
42697574602Information-processing device, information-processing method, and information-processing program product
42707574600System and method for combining user and platform authentication in negotiated channel security protocols
42717574599Robust authentication and key agreement protocol for next-generation wireless networks
42727574594Network authentication based on inter-packet gap characteristics
42737574571Hardware-based encryption/decryption employing dual ported memory and fast table initialization
42747574407System and method for selecting, ordering and accessing copyrighted information from physical documents
42757574406System and method maximizing video license utilization using billboard services
42767574014Digital watermark detection utilizing host carrier information
42777571484System and method for image authentication of a resource-sparing operating system
42787571480Presentation of correlated events as situation classes
42797571469Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity
42807571466Parental consent service
42817571465Information exchanging system, information communication terminal, information exchanging method, and computer product
42827571326Relative latency dynamics for identity authentication
42837571325Remote identification of blocked websites while maintaining user privacy
42847571324Method and device for anonymous signature with a shared private key
42857571323Image processor, method thereof, computer program, and computer readable storage medium
42867571322Enhanced cookie management
42877571321Identity-based-encryption messaging system
42887571320Circuit and method for providing secure communications between devices
42897571319Validating inbound messages
42907571317Providing user notification signals in phones that use encryption
42917571316Method and device for transforming a digital signal
42927571315Method and apparatus to assign trust to a key
42937571312Methods and apparatus for generating endorsement credentials for software-based security coprocessors
42947571310Method for detecting security module for link protection in ethernet passive optical network
42957571309Method and apparatus for providing security mechanism guaranteeing transparency at transport layer
42967571308Method for controlling access to a network by a wireless client
42977570782Method and system for watermarking
42987570768Systems, structures, and methods for decrypting encrypted digital content when a rights management server has been decommissioned
42997570767Decoupling error correction from privacy amplification in quantum key distribution
43007570766Transparently embedding non-compliant data in a data stream
43017570765Method and an apparatus to perform secure real-time transport protocol-on-the-fly
43027570764Sequence number calculation and authentication in a communications system
43037570761Method and system for preventing unauthorized recording of media content in the iTunes.TM. environment
43047570420Systems and methods for transmitting quantum and classical signals over an optical network
43057570419Quantum entanglement photon-pair producing device and quantum entanglement photon pair producing method
43067568235Controlling data access using security label components
43077568234Robust and flexible digital rights management involving a tamper-resistant identity module
43087568223Internet protocol telephony security architecture
43097568216Methods for defining and naming iSCSI targets using volume access and security policy
43107568113Reliable storage medium access control method and device
43117568110Cryptography accelerator interface decoupling from cryptography processing cores
43127568106Cooperative non-repudiated message exchange in a network environment
43137568105Parallel distribution and fingerprinting of digital content
43147568104Method and apparatus for adding signature information to electronic documents
43157568100Steganographic method and device
43167568099Method and apparatus for avoiding IKE process conflict
43177568098Systems and methods for enhancing security of communication over a public network
43187568097Method for file system security by controlling access to the file system resources using externally stored attributes
43197568096Rendering digital content in a content protection system according to a plurality of chained digital licenses
43207568095Method of aggregating multiple certificate authority services
43217568094Content providing system, user system, tracing system, apparatus, method, and program
43227568093System and method for service tagging for enhanced packet processing in a network environment
43237567921Method and system for providing commercial information and operating an electronic commerce system over a global communications network with company and constituency nodes
43247567674Content transmission apparatus, content reception apparatus, content transmission program, and content reception program
43257567670Verification information for digital video signal
43267567668Calculating unit and method for performing an arithmetic operation with encrypted operands
43277565702Password-based key management
43287565700Method for tracking the expiration of encrypted content using device relative time intervals
43297565699System and method for detecting computer port inactivity
43307565697Systems and methods for preventing unauthorized use of digital content
43317565691Information processing apparatus, authentication processing method, and computer program
43327565690Intrusion detection
43337565685Operating system independent data management
43347565684Declarative configuration of enterprises services
43357565552Method for protecting against manipulation of a controller for at least one motor vehicle component and controller
43367565549System and method for the managed security control of processes on a computer system
43377565548Biometric print quality assurance
43387565547Trust inheritance in network authentication
43397565545Method, system and program product for auditing electronic transactions based on biometric readings
43407565543System and method for authenticating a web page
43417565542Remote authentication of an object using a signature part
43427565541Digital fingerprint identification system
43437565540Fully electronic identity authentication
43447565536Method for secure delegation of trust from a security device to a host computer application for enabling secure access to a resource on the web
43457565535Systems and methods for demonstrating authenticity of a virtual machine using a security image
43467565530Source device and method for controlling output to sink device according to each content
43477565529Secure authentication and network management system for wireless LAN applications
43487565528Method for generating asymmetrical cryptographic keys by the user
43497565527Technique for asymmetric crypto-key generation
43507565526Three component secure tunnel
43517565329Biometric financial transaction system and method
43527565322Systems and methods for serverless software licensing
43537564991Device, device control method, and program
43547564977System, method and program product for anonymous transfer of messages
43557564976System and method for performing security operations on network data
43567564973Digital watermark embedding device and digital watermark embedding method
43577564969Methodology, system and computer readable medium for detecting file encryption
43587562397Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof
43597562395System and method for accessing protected content in a rights-management architecture
43607562392Methods of interacting with audio and ambient music
43617562389Method and system for network security
43627562387Method and apparatus for selective disabling of tracking of click stream data
43637562222System and method for authenticating entities to users
43647562220System and method for programming an isolated computing environment
43657562218Method, system and device for authenticating a user
43667562217Web service provider and authentication service provider
43677562215System and method for electronic document security
43687562214Data processing systems
43697562213Approaches for applying service policies to encrypted packets
43707562212Methods and systems for automated authentication, processing and issuance of digital certificates
43717562211Inspecting encrypted communications with end-to-end integrity
43727561696Delivering policy updates for protected content
43737561695Key information issuing device, wireless device, and medium
43747561693Method for automatically entering into secure communication mode in wireless communication terminal
43757561689Generating keys having one of a number of key sizes
43767559090Memory, information apparatus for access to the memory, and method for the information apparatus
43777559088Method and apparatus for deleting data upon expiration
43787558965Entity authentication in electronic communications by providing verification status of device
43797558964Cued one-time passwords
43807558962Method of authenticating a print medium online
43817558960Network infrastructure validation of network management frames
43827558957Providing fresh session keys
43837558956Communications device and communications program
43847558955Method and apparatus for secure instant messaging utilizing server-supervised publication
43857558954Method and apparatus for ensuring the integrity of data
43867558953Loading data into a mobile terminal
43877558952Method and apparatus for accelerating public-key certificate validation
43887558951System and method for secure transactions over a network
43897558834Method and system to process issue data pertaining to a system
43907558389Method and system of generating a speech signal with overlayed random frequency signal
43917558387Gathering randomness in a wireless smart card reader
43927557941Use of variant and base keys with three or more entities
43937555785Method and apparatus for content management
43947555783Wireless network credential provisioning
43957555782Arrangement and method for limiting access to access-protected data in a system during remote servicing thereof
43967555781Security component for a computing device
43977555772Wireless firewall with tear down messaging
43987555655Apparatus, system, and method for generating and authenticating a computer password
43997555653Data processing apparatus, program for use therewith, and method for use therewith
44007555652Method for user attestation signatures with attributes
44017555651Time management apparatus and time management method
44027555650Techniques for reducing the computational cost of embedding information in digital representations
44037555649Method for generating digital watermarks for electronic documents
44047555648Content management system, recording medium and method
44057555647Encoding device, decoding device, encoding method, decoding method, and program therefor
44067555646Efficient implementation of zero knowledge protocols
44077555584Providing additional channels for an MSL architecture
44087555550Asset tracker for identifying user of current internet protocol addresses within an organization's communications network
44097555129Content playback apparatus, content playback method, and program
44107555126Game apparatus managing system, game apparatus, controlling method, computer program and recording medium
44117555124Secure video system for display adaptor
44127555123Processing an MPEG elementary stream in a conditional access overlay environment
44137555121Methods and apparatus for implementing a cryptography engine
44147552482Data security system and method
44157552480Method and system of assessing risk using a one-dimensional risk assessment model
44167552479Detecting shellcode that modifies IAT entries
44177552467Security systems for protecting an asset
44187552345Implementation of storing secret information in data storage reader products
44197552344Hardware-based encryption/decryption employing dual ported key storage
44207552341Licensing the use of software on a particular CPU
44217552340Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
44227552339Image transmission device, operations management method, and computer-readable medium having operations management program embodied therein
44237552338Dynamic multimedia fingerprinting system
44247552337Service protection
44257552336Watermarking with covert channel and permutations
44267552335Information processing apparatus, method therefor, computer program, and computer-readable storage medium
44277552333Trusted authentication digital signature (tads) system
44287552332Java based electronic signature capture method, device and system
44297552330Mutual authentication system between user and system
44307552329Masked digital signatures
44317552326Use of kernel authorization data to maintain security in a digital processing system
44327552324Printer and print system, and data receiving device and data transmitting and receiving system
44337552322Using a portable security token to facilitate public key certification for devices in a network
44347552321Method and hybrid system for authenticating communications
44357552093Resolving license dependencies for aggregations of legally-protectable content
44367551915Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent
44377551740Weighted secret sharing and reconstructing method
44387549922Software security for gaming devices
44397549172Data processing apparatus for digital copyrights management
44407549160Method and system for authenticated access to internet protocol (IP) multicast traffic
44417549147Security framework for protecting rights in computer software
44427549063Methods and systems of protecting digital content
44437549062Organization-based content rights management and systems, structures, and methods therefor
44447549061Unauthorized contents detection system
44457549060Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system
44467549058Method and apparatus for encrypting and decrypting digital data
44477549057Secure transactions with passive storage media
44487549056System and method for processing and protecting content
44497549053Method and system for efficiently retrieving secured data by securely pre-processing provided access information
44507549052Generating and matching hashes of multimedia content
44517549051Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like
44527549049Dynamic auditing of electronic elections
44537549048Efficient and secure authentication of computing systems
44547549046Method and system for vehicle authorization of a service technician
44557549045Delegate registration in a managed code execution environment
44567549044Block-level storage device with content security
44577548889Payment information security for multi-merchant purchasing environment for downloadable products
44587548624Distribution of broadcast content for remote decryption and viewing
44597548623Communication system, communication device, and communication method
44607548622System and method for the concealment of device input parameters
44617548621System and method for securing a base derivation key for use in injection of derived unique key per transaction devices
44627548618Converter, encryption/decryption system, multi-stage converter, converting method, multi-stage converting method, program, and information recording medium
44637546637Structures and methods for using geo-location in security detectors
44647546632Methods and apparatus to configure a network device via an authentication protocol
44657546629System and methodology for security policy arbitration
44667546470Selective computer component activation apparatus method and system
44677546469Image forming apparatus, method for controlling writing data from the same to storage device, method for controlling reading data from storage device to the same, and replacement part therefor
44687546468Program update method and server
44697546467Time domain watermarking of multimedia signals
44707546466Decoding of watermarked information signals
44717546465Instant messaging private tags
44727546464Network access terminal, network system, method of network system, storage medium, and program code
44737546463Method and system for delegating authority in an online collaborative environment
44747546462Systems and methods for integration adapter security
44757546460Secure communications across multiple protocols
44767546459GSM-like and UMTS-like authentication in a CDMA2000 network environment
44777546458Method for organizing virtual networks while optimizing security
44787546456IPv6 address ownership solution based on zero-knowledge identification protocols or based on one time password
44797546455Digital certificate transferring method, digital certificate transferring apparatus, digital certificate transferring system, program and recording medium
44807546454Automated digital certificate discovery and management
44817546453Certificate management and transfer system and method
44827546452Hardware-based credential management
44837546373Secure dynamic credential distribution over a network
44847545962Biometric authentication system
44857545943Apparatus, method, and computer program product for playing back content
44867545942Security key distribution using key rollover strategies for wireless networks
44877545938Digital watermarking which allows tampering to be detected on a block-specific basis
44887545934Security information packaging system, LSI, and security information packaging method
44897545932Secure authenticated channel
44907545930Portable terminal
44917545928Triple DES critical timing path improvement
44927543293Privelege level changing for virtual memory mapping
44937543156Transaction authentication card
44947543153Digital signature generating apparatus, method, computer program and computer-readable storage medium
44957543152Methods and arrangements for realising betting with off-line terminals
44967543151Method and apparatus for securing and authenticating encoded data and documents containing such data
44977543150Method and system for setting up hosting environments in safety
44987543149Method, system and computer product for securing patient identity
44997543147Method, system, and storage medium for creating a proof of possession confirmation for inclusion into an attribute certificate
45007543145System and method for protecting configuration settings in distributed text-based configuration files
45017543144System and method for lost data destruction of electronic data stored on portable electronic devices
45027543143Service data multicasting system and method therefor and security key generating system
45037543142Method and apparatus for performing an authentication after cipher operation in a network processor
45047543141Method and apparatus for user authentication using infrared communication of a mobile terminal
45057543139Revocation of anonymous certificates, credentials, and access rights
45067543138Image server and method of controlling same
45077542584Image processing method, image processing apparatus, program and recording medium that can reduce image quality degradation
45087542572Method for securely and automatically configuring access points
45097542571Transmitting second content data with reference for use with first content data
45107542570Information encryption transmission/reception method
45117542569Security of data connections
45127542567Method and apparatus for providing security in a data processing system
45137542071Image transmission system, image pickup apparatus, image pickup apparatus unit, key generating apparatus, and program
45147541920Alarm/event encryption in an industrial environment
45157540023Information processing apparatus and authentication program storage medium
45167540019Processing device capable of implementing flexible access control
45177540017Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor
45187539875Secure repository with layers of tamper resistance and system and method for providing same
45197539873Original data circulation method, system, apparatus, and computer readable medium
45207539871System and method for identifying message propagation
45217539870Media watermarking by biasing randomized statistics
45227539869System and methods for using a signature protocol by a nonsigning client
45237539866Method of cryptographing wireless data and apparatus using the method
45247539865Data transfer device
45257539864Methods and portable device for digitally signing data
45267539862Method and system for verifying and updating the configuration of an access device during authentication
45277539860Single use user IDS
45287539858Packet encryption substituting device, method thereof, and program recording medium
45297539857Cooperative processing and escalation in a multi-node application-layer security system and method
45307539856Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources
45317539855Server-based cryptography
45327539648Secure user certification for electronic commerce employing value metering system
45337539647Using power state to enforce software metering state
45347539315Encrypted communication system, key delivery server thereof, terminal device and key sharing method
45357539314Frame synchronization method for QKD systems
45367539313System and method for key management across geographic domains
45377539312Program update method and server
45387539311Techniques for managing keys using a key server in a network segment
45397539310Encryption key updating for multiple site automated login
45407536727Content management method, recording and/or reproducing apparatus, and recording medium
45417536726Restricted software and hardware usage on a computer
45427536720Method and apparatus for accelerating CPE-based VPN transmissions over a wireless network
45437536713Knowledge broadcasting and classification system
45447536563Method and system to securely store and distribute content encryption keys
45457536558Flash memory distribution of digital content
45467536557Method for biometric authentication through layering biometric traits
45477536556Method and device for entering a computer database password
45487536555Methods for audio watermarking and decoding
45497536554Third party authentication of files in digital systems
45507536553Method and system for validating a security marking
45517536552Upper-level protocol authentication
45527536551Weakly computational zero-knowledge proof and evaluation
45537536550Image forming apparatus and control method for same
45547536549Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database
45557536548System and methodology providing multi-tier-security for network data exchange with industrial control components
45567536547Secure data transmission in a network system of image processing devices
45577536546System and method for providing encryption for rerouting of real time multi-media flows
45587536544Trust information delivery scheme for certificate validation
45597536542Method and system for intercepting, analyzing, and modifying interactions between a transport client and a transport provider
45607536540Method of hardware driver integrity check of memory card controller firmware
45617536464Methods and apparatus for performing layer 2 authentication and service selection in SSG based networks
45627536436Reliable messaging using clocks with synchronized rates
45637536360Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
45647536355Content security system for screening applications
45657536027Digital content reproduction, data acquisition, metadata management, and digital watermark embedding
45667536014Apparatus and method for generating scrambling code in UMTS mobile communication system
45677536012Entangled quantum communications and quantum imaging
45687536011Tamper-proof elliptic encryption with private key
45697535488Image data verification system
45707533735Digital authentication over acoustic channel
45717533422Platform independent zero footprint decompression
45727533419Human interactive proof service
45737533412Processor secured against traps
45747533408Portable computing system, apparatus and method
45757533276Program execution device
45767533271Method and apparatus for remote control and monitoring of a multimedia system
45777533270Signature schemes using bilinear mappings
45787533269Digital-signed digital document exchange supporting method and information processor
45797533268Digital signature with an embedded view
45807533267Anti-tampering signature method for rewritable media, anti-tampering signature apparatus for executing the method, anti-tampering signature system provided with the apparatus, and computer-readable recording medium storing anti-tampering signature program for achieving the method
45817533266Watermark-based access control method and device
45827533263System and method for registering a subscriber station on the packet service call state control function CSCF in a communications system
45837533262Media data protection
45847533261Method and apparatus for encoding and storing session data
45857533260Method and apparatus for encoding and storing session data
45867533259Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport
45877533258Using a network-service credential for access control
45887533257Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access
45897533256Method and apparatus for encryption of data on storage units using devices inside a storage area network fabric
45907533255Method and apparatus for restricting address resolution protocol table updates
45917533064E-mail invoked electronic commerce
45927532876Communication system and associated method of performing mutual authentication
45937532727Hardware-based encryption/decryption employing dual ported key storage
45947532726Encryption/decryption device and method, encryption device and method, decryption device and method, and transmission/reception apparatus
45957532724Method for encrypting and decrypting data for multi-level access control in an ad-hoc network
45967532723Tokens/keys for wireless communications
45977532722Apparatus and method for performing transparent block cipher cryptographic functions
45987532720Utilizing SIMD instructions within montgomery multiplication
45997530117Method and apparatus for preventing unauthorized use of software
46007530116Controlling the downloading and recording of digital data
46017530112Method and apparatus for providing network security using role-based access control
46027530110System and method for fuzzy multi-level security
46037530109Systems and methods for generating secure documents from scanned images
46047530103Projection of trustworthiness from a trusted environment to an untrusted environment
46057530093Securing applications and operating systems
46067529944Support for multiple login method
46077529943Systems and methods for end-to-end resource reservation authentication
46087529942Time proof server, terminal, and time proving method
46097529941System and method of retrieving a watermark within a signal
46107529940Securing selected data within a message
46117529939Method of and apparatus for transferring data
46127529938Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information
46137529937System and method for establishing that a server and a correspondent have compatible secure email
46147529936Registration network for an optical sensing device
46157529935Information communication device, information communication system, and computer program product for transmission control
46167529934Individual certification method
46177529933TLS tunneling
46187529932Removable medium and system and method for writing data to same
46197529931Managing elevated rights on a network
46207529929System and method for dynamically enforcing digital rights management rules
46217529928Certificate revocation system
46227529927Specifying security for an element by assigning a scaled value representative of the relative security thereof
46237529926Public key certification providing apparatus
46247529925System and method for distributing keys in a wireless network
46257529924Method and apparatus for aligning ciphered data
46267529712Content distribution system and method
46277529384Robust hidden data extraction method for scaling attacks
46287529375Method for processing encrypted data for first domain received in a network pertaining to a second domain
46297529374Method and apparatus for encrypting data
46307529373Laser autocalibration for QKD systems
46317529371Replaceable sequenced one-time pads for detection of cloned service client
46327529369Data processing with a key
46337529366Block encoding/decoding method, circuit, and device
46347529365Device and method of applying check bit to encrypt instruction for protection
46357529092Electromagnetic interference shield and heat sink apparatus
46367526808Method and system for actively defending a wireless LAN against attacks
46377526798System and method for credential delegation using identity assertion
46387526797System and method for processing callback requests included in web-based procedure calls through a firewall
46397526796Methods and apparatus for securely signing on to a website via a security website
46407526793Method for authenticating database connections in a multi-tier environment
46417526792Integration of policy compliance enforcement and device authentication
46427526658Scalable, distributed method and apparatus for transforming packets to enable secure communication between two stations
46437526657Information processing apparatus, information processing method, and program storage medium
46447526653Method of data protection
46457526651Electronic group signature method with revocable anonymity, equipment and programs for implementing the method
46467526650Personal identifiers for protecting video content
46477526649Session key exchange
46487526648Cryptographic method of protecting an electronic chip against fraud
46497526647Authorization protocol for network publishing
46507526646Authentication system and an authentication method for authenticating mobile information terminals
46517526645Electronic document authenticity assurance method and electronic document disclosure system
46527526644Apparatus and method for demonstrating and confirming the status of digital certificates and other data
46537526642Controlling delivery of certificates in a mobile communication system
46547526641IPsec communication method, communication control apparatus, and network camera
46557526640System and method for automatic negotiation of a security protocol
46567526516System and method for file integrity monitoring using timestamps
46577526092Rekey operation with multiplexing capability
46587526088Code generator and device for the synchronous or asynchronous and permanent identification or encoding and decoding of data of any particular length
46597526087Random number generator
46607526085Throughput and latency of inbound and outbound IPsec processing
46617526084Secure classifying of data with Gaussian distributions
46627523505Methods and systems for managing distributed digital medical data
46637523484Systems and methods of controlling network access
46647523318Method and system for automated password generation
46657523317Computer grid access management system
46667523315Method and process for creating an electronically signed document
46677523314Identity-based-encryption message management system
46687523313Image data management apparatus
46697523311Method for embedding electronic watermark, decoding method, and devices for the same
46707523310Domain-based trust models for rights management of content
46717523309Method of restricting access to emails by requiring multiple levels of user authentication
46727523307Method for ensuring content protection and subscription compliance
46737523306Simplified CCMP mode for a wireless local area network
46747523305Employing cyclic redundancy checks to provide data security
46757523304Generation of set coverings with free riders, and generation of ordered sets of meeting points, in systems which include, but are not limited to, systems for broadcast encryption and systems for certificate revocation
46767523303System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product
46777523302Electronic recipe management
46787523300Communication systems
46797523072System for controlling the distribution and use of digital works
46807522732Method for controlling the distribution of software code updates
46817522731Wireless service points having unique identifiers for secure communication
46827522730Universal microphone for secure radio communication
46837522729Encryption key setting system, access point, encryption key setting method, and authentication code setting system
46847522727Method and apparatus for providing authentication in a communication system
46857522726Transmitter device, transmitting method, receiver device, receiving method, communication system, and program storage medium
46867522724System and method of transmission of generalized scalable bit-streams
46877522723Password self encryption method and system and encryption by keys generated from personal secret information
46887522599Label switching multicast trees for multicast virtual private networks
46897519994Systems and methods for adaptive message interrogation through multiple queues
46907519993Information processing terminal and information security and protection method therefor
46917519991Method and apparatus for incrementally deploying ingress filtering on the internet
46927519989Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions
46937519986Method and apparatus for network security using a router based authentication system
46947519985Radio communication system, radio communication control apparatus, radio communication control method, recording medium, and computer program
46957519984Method and apparatus for handling files containing confidential or sensitive information
46967519836Method and apparatus for the secure storage of audio signals
46977519835Encrypted table indexes and searching encrypted tables
46987519834Scalable method and apparatus for transforming packets to enable secure communication between two stations
46997519825Electronic certification and authentication system
47007519824Time stamping method employing multiple receipts linked by a nonce
47017519823Concealed, non-intrusive watermarks for configuration bitstreams
47027519822Method and apparatus for processing descriptive statements
47037519819Layered security in digital watermarking
47047519817Methods, systems and software applications for verifying certain requirements on electronic documents
47057519816Portable computing environment solution
47067519815Challenge-based authentication without requiring knowledge of secret authentication data
47077519813System and method for a sidecar authentication mechanism
47087519812Architecture and design for central authentication and authorization in an on-demand utility environment
47097519811Data transmission controlling method and data transmission system
47107519810Methods for conducting server-side encryption/decryption-on-demand
47117519666Data transmission and reception system with accurate time information
47127519559Messaging stamp authority
47137519558Biometrically enabled private secure information repository
47147519199Image processing method, image processor, photographic apparatus, image output unit and iris verify unit
47157519184Wireless communication system
47167519182Encryption device and decryption device
47177519179Information transmission apparatus and method, information reception apparatus and method, and information-providing system
47187519178Method, system and apparatus for ensuring a uniform distribution in key generation
47197519177Method and system for processing a data set
47207516495Hardware-based software authenticator
47217516494Method, apparatus, and system for outputting information and forming image via network, and computer product
47227516493Content distribution system, content distribution method, information processing apparatus, and program providing medium
47237516491License tracking system
47247516490System, method and software for supplying activation information to a subsystem
47257516484Reader adapted for a portable computer
47267516479Data communicating apparatus and method for managing memory of data communicating apparatus
47277516477Method and system for ensuring that computer programs are trustworthy
47287516333Hybrid Java-C network appliance
47297516332Processing multi-key content
47307516330Platform and method for establishing provable identities while maintaining privacy
47317516327Distributing access to a data item
47327516326Authentication system and method
47337516324Information processing system, information management apparatus, and information processing apparatus
47347516323Security management system in parallel processing system by OS for single processors
47357516322Copy protection built into a network infrastructure
47367516321Method, system and device for enabling delegation of authority and access control methods based on delegated authority
47377516320Distributed processing architecture with scalable processing layers
47387516104Methods of providing software over a network and related systems and computer program products
47397515978Digital-audio-signal recording apparatus
47407515730Progressive image quality control using watermarking
47417515717Security containers for document components
47427515569Access control for wireless systems
47437512991Methods, systems, signals and media for encouraging users of computer readable content to register
47447512987Adaptive digital rights management system for plural device domains
47457512985System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation
47467512976Method and apparatus for XSL/XML based authorization rules policy implementation
47477512975Hardware-assisted credential validation
47487512972Synchronizing for digital content access control
47497512968System and method for secure management of remote systems
47507512966System and method for visually rendering resource policy usage information
47517512965Computer system security service
47527512815Systems, methods and computer program products for high availability enhancements of virtual security module servers
47537512814Secure and searchable storage system and method
47547512805Machine readable medium and method for data storage security
47557512804Data storage security apparatus and system
47567512803Method for handling password errors
47577512802Application authentication system, secure device, and terminal device
47587512801Authentication system, authentication method, signing apparatus, signing method, certifying apparatus, certifying method, and a computer-readable recording medium with a program making a computer execute the method recording therein
47597512798Organization-based content rights management and systems, structures, and methods therefor
47607512794System and method for authentication
47617512793Page encryption system
47627512792Reference monitor method for enforcing information flow policies
47637512791Communication apparatus and method for discriminating confidentiality of received data
47647512789Mailing list server and mail transmission method thereof
47657512788Method and apparatus for anonymous group messaging in a distributed messaging system
47667512787Receive IPSEC in-line processing of mutable fields for AH algorithm
47677512786Client-side boot domains and boot rules
47687512785Revocation distribution
47697512784Distributed subscriber management system
47707512783Provision of security services for an ad-hoc network
47717512782Method and system for using a web service license
47727512781Firewall with stateful inspection
47737512779Apparatus, and associated method, for communicating signaling data in secure form in a signaling network
47747512567Method and system for providing biometric authentication at a point-of-sale via a mobile device
47757512565Method for implementing secure transaction for electronic deposit (purse)
47767512249System and method for decoding digital encoded images
47777512242Systems and methods for quantum cryptographic key transport
47787512241Method for generating pseudo-random keys
47797512240Management of security key distribution
47807512233Method and apparatus for computing a shared secret key
47817512232Generation and validation of short digital signatures with implicit message embedding
47827509687Remotely authenticated operation method
47837509683System and method for authenticating digital content
47847509682Copy protection method and system for digital media
47857509681Interoperability of vulnerability and intrusion detection systems
47867509500Random number generation for encrypting cellular communications
47877509498Digital signature validation
47887509496Device-type authentication in communication systems
47897509495Authentication protocol
47907509494Interface cable
47917509493Method and system for distributing security policies
47927509492Distributed scalable cryptographic access control
47937509491System and method for dynamic secured group communication
47947509489Format-agnostic system and method for issuing certificates
47957509488Server apparatus, communication terminal apparatus, delivery system and delivery program
47967509486Encryption processor for performing accelerated computations to establish secure network sessions connections
47977509291Formatting value-bearing item indicia
47987509290Methods and apparatuses for differentiating users in multi-player web-based entertainment environments
47997508954System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
48007508945Self-corrector randomisation-encryption and method
48017508939Image processing system and method for processing image data using the system
48027508938Method and apparatus for generating and using a tamper-resistant encryption key
48037508936Hardware accelerator for elliptic curve cryptography
48047508935Cryptosystem for data security
48057506381Method for securing an electronic device, a security system and an electronic device
48067506380Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module
48077506378Data recording medium, program starting method, and program
48087506376Copy protection method for digital media
48097506373Method of automatically classifying a set of alarms emitted by sensors for detecting intrusions of an information security system
48107506370Mobile security architecture
48117506365Document distribution method and document management method
48127506183Data authentication circuit, battery pack and portable electronic device
48137506178Tamper-resistant re-writable data storage media
48147506174Method and system for establishing a biometrically enabled password
48157506173Data repository and method for promoting network storage of data
48167506171Method and systems for securely supporting password change
48177506169Digital watermarking maps and signs, and related navigational tools
48187506167Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
48197506166Method of communications and communication network intrusion protection methods and intrusion attempt detection system
48207506164Automated key management system and method
48217506162Methods for more flexible SAML session
48227506161Communication session encryption and authentication system
48237506160System and method for enhanced data security in office machine environment
48247506159Printer and print system
48257506157Access to content addressable data over a network
48267506156Method and apparatus for prioritizing encrypted traffic at an intermediate node in a communications network
48277506155E-mail virus protection system and method
48287506154Transmission of secure electronic mail formats
48297505955Information terminal and content storage/playback method
48307505599Information processing system and method for managing encrypted data with tag information
48317505594Discontinuous transmission (DTX) controller system and method
48327505589Ternary and higher multi-value digital scramblers/descramblers
48337505588Stream cipher design with revolving buffers
48347505587Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method
48357505585Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same
48367505584Contents management method, contents management apparatus, and recording medium
48377503074System and method for enforcing location privacy using rights management
48387503072Hardware ID to prevent software piracy
48397503068Secure ISN generation
48407503065Method and system for gateway-based authentication
48417503062Method and apparatus for enabling database privileges
48427503060Reactive system safety verification device, method, program, and recording medium containing the program
48437502937Digital watermarking security systems
48447502936System and method providing secure access to a computer system
48457502934Electronic signatures
48467502933Identity authentication system and method
48477502932Return routability method for secure communication
48487502931Method and device for authenticating a user on a remote server
48497502930Secure communications
48507502929Method and apparatus for assigning network addresses based on connection authentication
48517502928Methods and apparatus for secure data processing and transmission
48527502927Directory enabled secure multicast group communications
48537502926802.1X protocol-based multicasting control method
48547502925Method and apparatus for reducing TCP frame transmit latency
48557502924Transparent on-demand certificate provisioning for secure email
48567502923Systems and methods for secured domain name system use based on pre-existing trust
48577502762Method and system for commerce with full anonymity
48587502761Method and system for providing online authentication utilizing biometric data
48597502760Providing payments automatically in accordance with predefined instructions
48607502489Geographically watermarked imagery and methods
48617502476Systems and methods of enhancing QKD security using a heralded photon source
48627502475Method and system for secure key generation
48637502468Method and system for generating a cryptographically random number stream
48647502467System and method for authentication seed distribution
48657502464Method of implementing one-to-one binary function and relative hardware device, especially for a Rijndael S-box
48667500272Manufacturing unique devices that generate digital signatures
48677500271Reproducing apparatus and information distribution system
48687500270Method for utilizing intelligent clock controller in digital rights management
48697500269Remote access to local content using transcryption of digital rights management schemes
48707500268Method of authenticating a print medium before printing
48717500267Systems and methods for disabling software components to protect digital media
48727500111Querying encrypted data in a relational database system
48737500109System and method for secure authentication of external software modules provided by third parties
48747500105Hybrid encoding of data transmissions in a security system
48757500103Data parsing and tokenizing apparatus, method and program
48767500102Method and apparatus for fragmenting and reassembling internet key exchange data packets
48777500101Recording/reproduction device, data processing device, and recording/reproduction system
48787500100Method and apparatus for verifying revocation status of a digital certificate
48797500099Method for mitigating web-based "one-click" attacks
48807500097Extendable data-driven system and method for issuing certificates
48817500096System and method for message filtering by a trusted third party
48827499552Cipher method and system for verifying a decryption of an encrypted user data key
48837499551Public key infrastructure utilizing master key encryption
48847499550System and method for protecting a title key in a secure distribution system for recordable media content
48857499541Cipher strength evaluation apparatus
48867499405Method for testing branch execution and state transition logic in session initiation protocol application modular components
48877496965Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system
48887496769Hierarchical trusted code for content protection in computers
48897496768Providing secure input and output to a trusted agent in a system with a high-assurance execution environment
48907496764Data transmission method between a local server and local peripherals
48917496760System, method and program product for managing user account information
48927496759Multisignature method, apparatus, program, and system
48937496758Method and apparatus for protecting an exponentiation calculation by means of the chinese remainder theorem (CRT)
48947496756Content usage-right management system and management method
48957496755Method and system for a single-sign-on operation providing grid access and network access
48967496751Privacy and identification in a data communications network
48977496749Method and apparatus for decrypting encrypted data transmitted wirelessly by updating a key-table
48987496748Method for establishing a security association between two or more computers communicating via an interconnected computer network
48997496540System and method for securing digital content
49007496539Systems, methods and computer products for providing tape library dynamic price performance enhancement feature
49017496538Franking method and apparatus
49027496209Techniques and systems for embedding and detecting watermarks in digital data
49037496204Passive entry system
49047496203Quantum-key distribution method between a plurality of users or groups
49057496202Architecture for manufacturing authenticatable gaming systems
49067496200Architecture for manufacturing authenticatable gaming systems
49077496199Method of controlling access to cryptographic resources
49087496196Method apparatus and system of performing one or more encryption and/or decryption operations
49097496037Apparatus, system, and method for facilitating delivery of asynchronous response messages
49107495684Printer
49117493659Network intrusion detection and analysis system and method
49127493655Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data
49137493619Methods for transmitting data between tasks of differing priority in a graphical modeling environment
49147493499Method and apparatus for secure delivery and rights management of digital content
49157493492Limiting access to publicly available object-oriented interfaces via password arguments
49167493491Server, a terminal apparatus and an image management method
49177493490Centralized detector of dynamic, robust, embedded-signals
49187493489System and method for authentication of JPEG image data
49197493488Method to disable on/off capacity in demand
49207493487Portable computing environment
49217493486Method and apparatus for supporting cryptographic-related activities in a public key infrastructure
49227493483Method to prevent vulnerability to virus and worm attacks through instruction remapping
49237493291System and method for locally sharing subscription of multimedia content
49247493289Digital content store system
49257493288RF payment via a mobile device
49267493284Using visual images transferred from wireless computing device display screens
49277492922Automated verification of copyrighted digital images
49287492905Rolling code security system
49297492904QKD system detector autocalibration based on bit-error rate
49307492902Custom character-coding compression for encoding and watermarking media content
49317492900Quantum communication system
49327492899Authentication method for media gateway
49337492898Rolling code security system
49347492897Conditional access system for broadcast digital television
49357492475Network apparatus with discriminating logic
49367490248Method for reencryption of a database
49377490246Method for encryption of data based on an iteration of a stored encryption key
49387490244Blocking e-mail propagation of suspected malicious computer code
49397490242Secure management of authentication information
49407490241Time stamping method employing user specified time
49417490240Electronically signing a document
49427490238Implicit population of access control lists
49437490237Systems and methods for caching in authentication systems
49447490235Offline analysis of packets
49457490070Apparatus and method for proving the denial of a direct proof signature
49467490069Anonymous payment with a verification possibility by a defined party
49477490068Apparatus and method for rendering digital content
49487490065Cryptographic module for secure processing of value-bearing items
49497489796Electronic watermark embedding device, electronic watermark detection device, method thereof, and program
49507489783Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program
49517489782Registry restore to original hardware
49527489780Security integrated circuit
49537489779Hardware implementation of the secure hash standard
49547487549Information processing apparatus, information processing method, recording medium, and program
49557487548Granular access control method and system
49567487547Content processing apparatus and content protection program
49577487546Hosts file protection system and method
49587487543Method and apparatus for the automatic determination of potentially worm-like behavior of a program
49597487535Authentication on demand in a distributed network environment
49607487472Method, system and program product for synchronous communication between a public electronic environment and a private electronic environment
49617487365Saving and retrieving data based on symmetric key encryption
49627487364Method to store encrypted data
49637487363System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage
49647487362Digital authentication over acoustic channel
49657487361Dynamic cache lookup based on dynamic data
49667487360Secure authentication and authorization for transaction processing
49677487359Time stamping method employing a separate ticket and stub
49687487358Method to control access between network endpoints based on trust scores calculated from information system component analysis
49697487356Digital watermarking system using scrambling method
49707487355Data processing apparatus and method
49717487354Methods and systems for using digital signatures in uniform resource locators
49727487352Architecture for manufacturing authenticatable gaming systems
49737487351Data use management system, transmitting apparatus having management function, and data use management method
49747487350Fixed client identification system for positive identification of client to server
49757487348System for authenticating and screening grid jobs on a computing grid
49767487225Registering device and method, information processing device and method, providing device and method, and program storage medium
49777487129Method and apparatus for the distribution of digitised information on demand
49787487128Updating usage conditions in lieu of download digital rights management protected content
49797486795Method and apparatus for key management in distributed sensor networks
49807486794Data-processing arrangement comprising confidential data
49817486792Terrestrial broadcast copy protection system for digital television
49827486789Device and method for calculation on elliptic curve
49837486651Mobile node, an ad hoc network routing controlling method and an ad hoc network system
49847484246Content distribution system, content distribution method, information processing apparatus, and program providing medium
49857484243Heterogenous domain-based routing mechanism for user authentication
49867484239Detecting heap and stack execution in the operating system using regions
49877484238Method and apparatus for configuration management of computer system
49887484105Flash update using a trusted platform module
49897484101Coded data associated with an object and encoding a distributed signature
49907484100Temporally threaded CMI watermark
49917484099Method, apparatus, and product for asserting physical presence with a trusted platform module in a hypervisor environment
49927484096Data validation using signatures and sampling
49937484095System for communicating program data between a first device and a second device
49947484094Opening computer files quickly and safely over a network
49957484093Information processor and information processing method
49967484092Techniques for searching encrypted files
49977484090Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system
49987484088Methods and systems for proofing identities using a certificate authority
49997483992Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier
50007483943Reliable messaging using clocks with synchronized rates
50017483862System and method for prepaid biometric redemption accounts
50027483547Perceptual modeling of media signals for data hiding
50037483537Selecting cached RSA keys in response to RSA key requests
50047483536Mini time key creation method
50057483535Transmission of generalized scalable bit-streams
50067483534Elliptic polynomial cryptography with multi y-coordinates embedding
50077483533Elliptic polynomial cryptography with multi x-coordinates embedding
50087483532RTP payload format
50097480939Enhancement to authentication protocol that uses a key lease
50107480938System and method for secure dual channel communication through a firewall
50117480936Generic application architecture suitable for firewall traversal
50127480931Volume mount authentication
50137480919Safe exceptions
50147480806Multi-token seal and unseal
50157480804Method and system for hierarchical platform boot measurements in a trusted computing environment
50167480803System and method for securing system content by automated device authentication
50177480802License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
50187480801Method for securing data traffic in a mobile network environment
50197480800System and method for providing services employing trusted site indicators, and mobile device capable of displaying the trusted site indicators
50207480799Traffic manager for distributed computing environments
50217480798System and method for representing multiple security groups as a single data object
50227480796System and method for authenticating data using incompatible digest functions
50237480795Method for the application of implicit signature schemes
50247480794System and methods for transparent encryption
50257480687Pseudorandom number generator for a stream cipher
50267480638Method and system automatically to remind parties to a network-based transaction to comply with obligations established under a transaction agreement
50277480637Internet transaction authentication apparatus, method, and system for improving security of internet transactions
50287480636Distribution system and method of operation thereof
50297480635Method for financing multimedia content through advertising
50307480631System and method for detecting and processing fraud and credit abuse
50317480393Optimized digital watermarking functions for streaming data
50327480384Method for distributing and authenticating public keys using random numbers and Diffie-Hellman public keys
50337480383Apparatus and method for scrambling high-rate data
50347480382Image file container
50357480381Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
50367479798Selectively disabled output
50377478433Program execution system having authentication function
50387478432Method and system for contents control
50397478427Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs)
50407478424Propagation protection within a network
50417478421System and method for role based access control of a document processing device
50427478419Automated policy constraint matching for computing resources
50437478247Methods and systems for securing data processing devices
50447478245Session-state manager
50457478244Access control method
50467478241Message insertion and extraction in digital data
50477478240Method and system for capture of location specific media related information and delivery through communications network
50487478237System and method of allowing user mode applications with access to file data
50497478236Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure
50507478235Methods and systems for protecting data in USB systems
50517478233Prevention of software tampering
50527478158Bandwidth management system
50537478069Method, communications system and receiver device for the billing of access-controlled programmes and/or data from broadcast transmitters
50547478068System and method of selecting consumer profile and account information via biometric identifiers
50557478067Authentication system for identification documents
50567477749Integrity protection of streamed content
50577477745License management apparatus, license management system and license management method
50587477743Hybrid network encrypt/decrypt scheme
50597477739Efficient storage of fingerprints
50607475421Automatic re-authentication
50617475398System and method for implementing a smart system call
50627475256Secure message forwarding system detecting user's preferences including security preferences
50637475255Analog physical signature devices and methods and systems for using such devices to secure the use of computer resources
50647475250Assignment of user certificates/private keys in token enabled public key infrastructure system
50657475247Method for using a portable computing device as a smart key device
50667475246Secure personal content server
50677475244Wireless communication device, portable terminal, communication control program and communication system
50687475243Preventing a non-head end based service provider from sending media to a media processing system
50697475242Controlling the distribution of information
50707475241Methods and apparatus for dynamic session key generation and rekeying in mobile IP
50717475240System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems
50727475239Pluggable trust adapter architecture, method and program product for processing communications
50737475152Approach to provide self-protection function to web content at client side
50747475046Electronic trading system supporting anonymous negotiation and indications of interest
50757475044Electronic money system and electronic money terminal device
50767475043Method and apparatus for data recipient storage and retrieval of data using a network communication device
50777475042Provision of protected content files via payment system
50787475041Method and system for generating postal indicia or the like
50797474888Method for bypassing passkey exchange and authentication procedures
50807474749Method and apparatus for achieving crypto-syncronization in a packet data communication system
50817474748Modular inversion that is protected against espionage

2008

50827472425Information providing system and authentication medium access control method and computer program
50837472423Method and apparatus for anonymously tracking TV and internet usage
50847472421Computer model of security risks
50857472417System for detection and indication of a secure status of appliances
50867472286Selectively authorizing software functionality after installation of the software
50877472285Apparatus and method for memory encryption with reduced decryption latency
50887472283Method and apparatus for secured digital video and access tracking
50897472282Illegal access discriminating apparatus and method
50907472281Method for the automatic log-in of a subscriber station situated particularly in a motor vehicle in an external information system
50917472280Digital rights management
50927472279Method for automized and synchronous execution of customized code on off-loaded retrieved documents in a document processing system
50937472278Remote authentication of an object using a signature encoded in a number of data portions
50947472277User controlled anonymity when evaluating into a role
50957472276Data card verification system
50967472275System and method of electronic signature verification
50977472274Authentication of an electronic tag
50987472273Authentication in data communication
50997472272Digital asset usage accountability via event journaling
51007472270Secure transmission of digital content between a host and a peripheral by way of a digital rights management (DRM) system
51017472268Privacy and security mechanism for presence systems with tuple spaces
51027472165Support program for web application server and server
51037472093Targeted delivery of informational content with privacy protection
51047472092Money order device with identity verification and method
51057471795Information transmission system
51067471792Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
51077471690Packet transfer device, semiconductor device and packet transfer system
51087471479System for protection against copying on magnetic tape recorders
51097469417Infrastructure method and system for authenticated dynamic security domain boundary extension
51107469340Selective encryption of electronic messages and data
51117469338System and method for cryptographic control of system configurations
51127469263Content management system for archiving data, managing histories, validity of content registration certification wherein the management device encrypts the content in response to a content storage, encrypts the encryption key with the media ID
51137469232System and method for revenue sharing for multimedia sharing in social network
51147469231Digital contents and system for receiving order for prints
51157469230Method and system for automatically distributing fees, including a reseller commission, during a digital file transaction
51167469050Organization-based content rights management and systems, structures, and methods therefor
51177469049Data dependent scrambler with reduced overhead
51187469048Methods for point compression for jacobians of hyperelliptic curves
51197467415Distributed dynamic security for document collaboration
51207467412Data transfer system, data transfer program and video server system
51217467400Integrated security system having network enabled access control and interface devices
51227467399Context-sensitive confidentiality within federated environments
51237467301Authentication processor using a signature part
51247467300Coded data including a distributed data stream
51257467299Authentication device
51267467298Methods and arrangements for selectively maintaining parental access consent in a network environment
51277467297Apparatus of a flexible and common IPMP system for MPEG-2 content distribution and protection
51287467213Portable device and a method for accessing a computer resource of a temporary registered user
51297467113License verification system and method
51307466826Method of secure transmission of digital data from a source to a receiver
51317466825Systems and methods for added authentication in distributed network delivered half-duplex communications
51327466824Method and system for encryption of streamed data
51337466821Secure electronic component
51347464407Attack defending system and attack defending method
51357464406System and method for user determination of secure software
51367464401Secure web access via an original CD
51377464400Distributed environment controlled access facility
51387464398Queuing methods for mitigation of packet spoofing
51397464271Systems and methods of providing content protection for digital video products
51407464269Secure method and system for handling and distributing digital media
51417464268Customizable instant messaging private tags
51427464267System and method for secure transmission of RTP packets
51437464265Methods for iteratively deriving security keys for communications sessions
51447464264Training filters for detecting spasm based on IP addresses and text-related features
51457464262Method and apparatus for synchronizing audio and video in encrypted videoconferences
51467464261Switching device, switching method and computer system capable of preventing error in data transmission, which is easy to use
51477464162Systems and methods for testing whether access to a resource is authorized based on access information
51487464059System and method for purchase benefits at a point of sale
51497464058System and method for generating new licenses
51507463752Imaging forming apparatus and copy management system
51517463750Image data processing apparatus and method
51527463738Method for providing multimedia files and terminal therefor
51537461407Debugging port security interface
51547461403System and method for providing passive screening of transient messages in a distributed computing environment
51557461401Handling related connections in a firewall
51567461399PIN recovery in a smart card
51577461265System and method for single sign on process for websites with multiple applications and services
51587461264Method for automatic identification control and management
51597461263Method and apparatus for a non-revealing do-not-contact list system
51607461262Methods and apparatus for providing security in a caching device
51617461261Method to generate, verify and deny an undeniable signature
51627461259Method and apparatus to provide secure mobile file system
51637461258Use of public switched telephone network for capturing electronic signatures in on-line transactions
51647461257System for detecting spoofed hyperlinks
51657461256Generating watermark signals
51667461255Digital watermark processing apparatus, and digital contents distribution system using the apparatus
51677461252Authentication method, program for implementing the method, and storage medium storing the program
51687461250System and method for certificate exchange
51697461249Computer platforms and their methods of operation
51707461115Modular multiplier
51717461029Method for clustered data transmission
51727461007Reinsurance auction process
51737460684Method and apparatus for embedding watermarks
51747460672Method for securing data storage in a storage area network
51757460669Encoding, decoding and communication method and apparatus
51767460668Optimized secure media playback control
51777458101Information viewing/listening system, information player, and information provider
51787458100Adding copy protection to a computer program
51797458098Systems and methods for enhancing electronic communication security
51807458095Faster authentication with parallel message processing
51817458094Intrusion prevention system
51827458083Architecture for software for interactively communicate with a machine and remotely maintenance the machine
51837457964Trusted path for transmitting content thereon
51847457962Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data
51857457961Authentication of an object using a signature encoded in a number of data portions
51867457960Programmable processor supporting secure mode
51877457959Data repository and method for promoting network storage of data
51887457958System for detecting authentic e-mail messages
51897457957Apparatus and method for issuing and authenticating securities, etc. using digital watermarking
51907457955Method and apparatus for trusted branded email
51917457952Authentication tag for S/W media
51927457951Data integrity monitoring in trusted computing entity
51937457947System for processing multiple wireless communications security policies
51947457946Method and program product for privately communicating web requests
51957457782Electronic settlement system, settlement apparatus and terminal
51967457419Information processing method and apparatus for encrypting encoded data
51977457418Method for accessing a user operable device of controlled access
51987457417Approach for configuring wireless devices
51997457416Key distribution center for quantum cryptographic key distribution networks
52007457413Method and device for encrypting a message
52017457412System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
52027457411Information security via dynamic encryption with hash function
52037457410Transmission/reception system
52047454794Access control method
52057454792Active network defense system and method
52067454786Method for integrated security roles
52077454785Proxy method and system for secure wireless administration of managed entities
52087454784System and method for identity verification
52097454778Enforcing rights management through edge email servers
52107454628Method and apparatus for transmitting content data and recording and/or reproducing apparatus
52117454624Match template protection within biometric security systems
52127454622Method and system for modular authentication and session management
52137454620Method, device and arrangement for inserting extra information
52147454619Method, apparatus, and program product for securely presenting situation information
52157454618System and methods for transmitting encrypted data with encryption key
52167454617Apparatus for validating the presence of an authorized accessory
52177454615Centralized authentication system
52187454614Method and apparatus for fault tolerant TCP handshaking
52197454610Security association updates in a packet load-balanced system
52207454609Network communications security agent
52217454518System, device, and method for receiver access control in a multicast communication network
52227454385Transaction signature
52237454384Information distributing method and system
52247454036Internet facsimile and control method thereof and communication instruction terminal
52257454020System and method for encrypting data in pictorial data
52267454017Information processing unit
52277454016Data encryption system and method
52287451491Method and a device for allowing only a specific kind of hardware to correctly execute software
52297451489Active network defense system and method
52307451486Stateful and cross-protocol intrusion detection for voice over IP
52317451326Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies
52327451323Password inputting apparatus, method of inputting password, and computer product
52337451321Electronic signature management method
52347451319System and method of watermarking a signal
52357451318System and method of watermarking a signal
52367451317Apparatus for and method of embedding watermark into original information, transmitting watermarked information, and reconstructing the watermark
52377451316Method and system for pre-authentication
52387451314Cryptographic authentication process
52397451313Encryption method of application software
52407451312Authenticated dynamic address assignment
52417451311Method and system for decoding charging data records in mobile telephone networks
52427451310Parallelizable authentication tree for random access storage
52437451309Signature specification for encrypted packet streams
52447451307Communication apparatus, communication system, communication apparatus control method and implementation program thereof
52457451306Network security device
52467451305Method and apparatus for securely exchanging cryptographic identities through a mutually trusted intermediary
52477451147Flexible encryption scheme for GSO target passwords
52487451108Method and system for measuring trade management performance
52497450723Method and system for providing for security in communication
52507450720Linear transformation for symmetric-key ciphers
52517450719Gigabit Ethernet-based passive optical network and data encryption method
52527450596Scheme for realizing communications through external network from contents processing device connected to local network in home environment
52537448080Method for implementing secure corporate communication
52547448073System and method for wireless local area network monitoring and intrusion detection
52557448072Techniques for performing UMTS (Universal Mobile Telecommunications System) authentication using SIP (Session Initiation Protocol) messages
52567448069Access-request control method, driver program for communication device, and communication device
52577448068Automatic client authentication for a wireless network protected by PEAP, EAP-TLS, or other extensible authentication protocols
52587448066Application server object-level security for distributed computing domains
52597447917Obfuscated state store for rights management system and the like
52607447912Protecting digital goods using oblivious checking
52617447909Method and system for lawful interception of packet switched network services
52627447908Method of authenticating a print medium offline
52637447907Method and system for data delivery and reproduction
52647447906Projector projecting password
52657447904Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record
52667447903Laddered authentication security using split key asymmetric cryptography
52677447902Method for processing multiple wireless communications security policies
52687447901Method and apparatus for establishing a dynamic multipoint encrypted virtual private network
52697447792Method for distributing a video split up in spatial pieces
52707447747Method for flexible, safe, robust, and efficient generation and serving of multi-source world-wide web content pages
52717447673Enterprise computer system
52727447663Method for on-line client set-up and authorization of automatic electronic funds transfers
52737447662Transaction processing system
52747447329Apparatus and method for producing a document verifiable for its forgery or alteration, and apparatus and method for authenticating the document
52757447315System for determining successful reception of a message
52767447311Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system
52777447310Lean multiplication of multi-precision numbers over GF(2.sup.m)
52787444676Direct authentication and authorization system and method for trusted network of financial institutions
52797444675Systems and methods for defining security information for web-services
52807444670Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance
52817444667Method and apparatus for trusted blade device computing
52827444666Multi-domain authorization and authentication
52837444523System and method for using address bits to signal security attributes of data in the address space
52847444522Dynamic negotiation of security arrangements between web services
52857444516Method, apparatus and article for off-line certification in mobile applications
52867444515Method and apparatus for detecting predefined signatures in packet payload using Bloom filters
52877444514Group key exchanges with failures
52887444513Authentication in data communication
52897444512Establishing trust without revealing identity
52907444511LAN that allows non-authenticated external terminal station to access a predetermined device in LAN
52917444510Methods and systems for accessing networks, methods and systems for accessing the internet
52927444509Method and system for certification path processing
52937444508Method of implementing secure access
52947444507Method and apparatus for distribution of digital certificates
52957444506Selective encryption with parallel networks
52967444505Method, system and software for maintaining network access and security
52977444372Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
52987443986Key allocating method and key allocation system for encrypted communication
52997443985Systems and methods for providing secure server key operations
53007443984Information processing system and method for distributing encrypted message data
53017443980Hierarchical identity-based encryption and signature schemes
53027443884Electronic data transmission and reception system
53037441269Method and system for session accounting in wireless networks
53047441266Wireless communication system utilizing wireless adapter
53057441265Method and system for session based authorization and access control for networked application objects
53067441263System, method and computer program product for providing unified authentication services for online applications
53077441262Integrated VPN/firewall system
53087441125Portable data carrier provide with access protection by rendering messages unfamiliar
53097441122Method for providing secure access to a digital resource
53107441121Device certificate self-individualization
53117441119Offload processing for secure data transfer
53127441118Network appliance having trusted device for providing verifiable identity and/or integrity information
53137441116Secure resource distribution through encrypted pointers
53147441115Method for verifying a digital signature
53157441114Methods and systems for management and control of an automation control module
53167441005Information supply system using communication line
53177440572Secure wireless LAN device and associated methods
53187440571Method for securing software updates
53197440569Tate pairing techniques for use with hyperelliptic curves
53207437772Method and system for access control based on content-ratings and client-specified rating allowances
53217437770Data transfer system, data transfer apparatus, data recording apparatus, data transfer method
53227437768Information processing apparatus and method, and program storage medium
53237437757Token for use in online electronic transactions
53247437752Client architecture for portable device with security policies
53257437573Secure unsent message storage pending server connection
53267437568Apparatus and method for establishing trust
53277437567Portable device and method for accessing data key actuated devices
53287437563Software integrity test
53297437562Method and apparatus for digitally signing electronic mail that originates from a browser
53307437561Authentication of data transmitted in a digital transmission system
53317437560Method and apparatus for establishing a secure smart card communication link through a communication network
53327437559Electronic message authentication
53337437558Method and system for verifying identification of an electronic mail message
53347437557Garbage collection system and method for a mobile communication terminal
53357437555Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
53367437554Method and apparatus for generating queries for secure authentication and authorization of transactions
53377437553Systems and methods for providing autonomous security
53387437552User authentication system and user authentication method
53397437551Public key infrastructure scalability certificate revocation status validation
53407437550System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data
53417437549Datacast distribution system
53427437548Network level protocol negotiation and operation
53437437330System and method for categorizing transactions
53447436966Secure approach to send data from one system to another
53457436965Optical out-of-band key distribution
53467436964Synchronization of encryption in a wireless communication system
53477436962Method and apparatus for providing secured communication connections using a secured communication connection object
53487436961Sentinel synchronization method for enhancing QKD security
53497436959Data recording apparatus and recording method
53507436957Audio cassette emulator with cryptographic media distribution control
53517436956Document encryption
53527436955Encrypting and decrypting a data stream
53537436953Hacking prevention system
53547436816Method and system for transmission-based billing of applications
53557434265Information signal recording/reproducing system, information signal recording device, information signal reproducing device and information signal recording/reproducing process
53567434258Method and communication system for controlling security association lifetime
53577434256Security management for wireless clients
53587434253User mapping information extension for protocols
53597434250Dynamic management of access rights lists in a portable electronic object
53607434231Methods and apparatus to protect a protocol interface
53617434069Method and device for encryption/decryption of data on mass storage device
53627434061Method and system for generating passwords
53637434060Secure entry of a user-identifier in a publicly positioned device
53647434058Generating signatures over a document
53657434057System and method for watermarking in accessed data in a storage system
53667434056Watermark-based copy management system and method for digital media copy protection
53677434055Recording medium, recording method of recording medium, recording and/or reproducing method of recording medium, and data copy control method
53687434054Asynchronous enhanced shared secret provisioning protocol
53697434053Methods and systems for providing an identification key to a printing device
53707434051Method and apparatus for facilitating secure cocktail effect authentication
53717434049Method for making secure a session with data processing means under the control of several entities
53727434048Controlling access to electronic documents
53737434046Method and apparatus providing secure multicast group communication
53747434045Method and apparatus for indexing an inbound security association database
53757434044Fast re-authentication with dynamic credentials
53767434043Cryptography accelerator data routing unit
53777433888Schema packaging, distribution and availability
53787433848System for carrying out a transaction
53797433846Method of embedding permanent identification code into musical apparatus
53807433474Method and apparatus of enciphering and deciphering data using keys enciphered and deciphered with other keys
53817433473Data transmission method between a broadcasting center and a multimedia unit
53827433472Digital content distribution system
53837433470Cryptographic processing apparatus, cryptographic processing method, and computer program
53847430762Identification card manufacturing security
53857430755Method and system for providing persistence in a secure network access
53867430754Method for dynamic application of rights management policy
53877430714Document storage system including a user interface for associating documents into groups
53887430671Systems and methods for preserving confidentiality of sensitive information in a point-of-care communications environment
53897430668Protection of the configuration of modules in computing apparatus
53907430667Media router
53917430666Authentication of a remote user to a host in a data communication
53927430664System and method for securely providing a configuration file over and open network
53937430663System and method for enabling bulk retrieval of certificates
53947430295Simple untrusted network for quantum cryptography
53957430293Cryptographic device employing parallel processing
53967430292Methods and systems for securing information communicated between communication devices
53977428757System and methodology for validating anti-piracy security compliance and reporting thereupon, for one to a plurality of movie theaters
53987428752Secure data accessing system and method
53997428746System and method for secure network connectivity
54007428641Session-state manager
54017428638Architecture for manufacturing authenticatable gaming systems
54027428637Dynamic authentication and initialization method
54037428636Selective encryption system and method for I/O operations
54047428512Information distribution system, information distribution device, information receiving device, information distribution method, information distribution program, recording medium recording the information distribution program, information receiving method, information receiving program, and recording medium recording the information receiving program
54057428307Data reproduction apparatus capable of safely controlling reproduction time of encrypted content data and data reproduction circuit and data recording apparatus used for the same
54067426751Recording medium, information transmission method, terminal, server, and recording method
54077426750Network-based content distribution system
54087426749Distributed computation in untrusted computing environments using distractive computational units
54097426748Management mediating device, image processing apparatus, management mediating program, and storing medium storing management mediating program
54107426745Methods and systems for transparent data encryption and decryption
54117426642Integrating legacy application/data access with single sign-on in a distributed computing environment
54127426639Information processing apparatus and method for managing grouped devices in an encrypted environment
54137426638Controlling access to information on a network using an extended network universal resource locator
54147426637Method and system for controlled media sharing in a network
54157426636Compact secure data communication method
54167426635Bulk certificate lifetime allocation systems, components and methods
54177426634Method and apparatus for rate based denial of service attack detection and prevention
54187426449Sensor fusion using self evaluating process sensors
54197426276Method for the secured transfer of data
54207426275Handling device and method of security data
54217426274Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit
54227426273Audio/video stream processing system and method for data copy protection
54237426272Instrumentation privacy methods and apparatuses
54247426271System and method for establishing secondary channels
54257424746Intrusion detection and vulnerability assessment system, method and computer program product
54267424741Method and system for prevention of network denial-of-service attacks
54277424739On-machine communication verification
54287424736Method for establishing directed circuits between parties with limited mutual trust
54297424735System and method for computer security using multiple cages
54307424621Data protection
54317424618Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic
54327424617Offline-online incentive points system and method
54337424615Mutually authenticated secure key exchange (MASKE)
54347424614Identity-based encryption system
54357424613Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP)
54367424612Saving and retrieving data based on symmetric key encryption
54377424611Authentication system and method
54387424610Remote provisioning of secure systems for mandatory control
54397424608Mechanism for layered authentication
54407424606System and method for authenticating an operating system
54417424605Communication system, server device, client device and method for controlling the same
54427424460Image ordering system and method
54437424458Method and system for generating characterizing information descriptive of printed material such as address blocks and generating postal indicia or the like incorporating such characterizing information
54447424284Secure network/service access
54457424116Method and apparatus for providing authentication in a communication system
54467424115Generating asymmetric keys in a telecommunications system
54477424112Ciphertext switching for syntax compliant encryption
54487424111System and method of applying parity bits to protect transmitting and receiving data
54497424034Information converting apparatus
54507421741Securing digital content system and method
54517421733System and method for providing multi-class processing of login requests
54527421586Protecting mobile code against malicious hosts
54537421583System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof
54547421582Method and apparatus for mutual authentication at handoff in a mobile wireless communication network
54557421581Method and system for controlling encoded image production
54567421580Method and apparatus for synchronizing e-mail addresses
54577421579Multiplexing a secure counter to implement second level secure counters
54587421578Method and apparatus for electing a leader node in a computer network
54597421577Communication device, control method of communication device, program and communication method
54607421576Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes
54617421516System and method for multi-vendor authentication to remotely activate a software-based option
54627421473Method and apparatus for image communications capable of effectively performing receipt acknowledgement
54637421083System for seamlessly updating service keys with automatic recovery
54647421080Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system
54657421078Valid medium management system
54667420596Image sensing apparatus for generating image data and authentication data of the image data
54677418727Method for PC client security authentication
54687418702Concurrent web based multi-task support for control management system
54697418598Architecture of an encryption circuit implementing various types of encryption algorithms simultaneously without a loss of performance
54707418596Secure, efficient, and mutually authenticated cryptographic key distribution
54717418595Replay prevention mechanism for EAP/SIM authentication
54727418593Method and a system for performing testing in a device, and a device
54737418592Automated banking machine system and method
54747418500Mechanism for controlled sharing of files in a clustered application environment
54757418478System and method for application discovery in a computing environment
54767418428System and method for controlling delivering of a commodity
54777418421Method, system, and apparatus for dynamically creating electronic contracts
54787418401Secure internet transactions on unsecured computers
54797418397Witness system
54807418101Securely transferring user data using first and second communication media
54817415731Content addressable information encapsulation, representation, and transfer
54827415720User authentication system and method for controlling the same
54837415719Policy specification framework for insider intrusions
54847415614Cryptographic authentication with ephemeral modules
54857415612Image encrypting method, and image decrypting method
54867415611Accelerated signature verification on a elliptic curve
54877415610Facilitating access to information stored on a network using an extended network universal resource locator
54887415609Automated banking machine system and method
54897415607Obtaining and maintaining real time certificate status
54907415605Biometric identification network security
54917415443Online card present transaction
54927415440Method and system to provide secure key selection using a secure device in a watercrypting environment
54937415436System and method for pricing and allocation of commodities or securities
54947415157Image pickup apparatus
54957415115Method and system for disaster recovery of data from a storage device
54967415114Quantum key system and method
54977415113Management of security key distribution
54987415111Optical network unit and optical line terminal
54997412606Copy protection using detailed copy control information
55007412603Methods and systems for enabling secure storage of sensitive data
55017412602Method and system for storing document images in a network file system
55027412601Illegal data use prevention system
55037412599Administrative remote notification system and method
55047412598Method and system for real-time insertion of service during a call session over a communication network
55057412450Method and apparatus for identifying tampering of data in a file system
55067412424Third party certification of content in electronic commerce transactions
55077412422Method and system for securing user identities and creating virtual users to enhance privacy on a communication network
55087412420Systems and methods for enrolling a token in an online authentication program
55097412304Power system for area containing a set of power consumers
55107412062Method and apparatus for elliptic curve scalar multiplication
55117412061Encrypting a digital object on a key ID selected therefor
55127412060Contents data transmission/reception system, contents data transmitter, contents data receiver and contents data transmission/reception method
55137412059Public-key encryption system
55147412056Rolling code security system
55157412055Method and system for fair exchange of user information
55167412053Cryptographic device with stored key data and method for using stored key data to perform an authentication exchange or self test
55177411868Estimation of time within untrusted time device disconnected from trusted time device
55187409722Control status register access to enable domain reconfiguration
55197409560Certification processing hardware, certification processing system and use management hardware
55207409558Low-latency data decryption interface
55217409557System and method for distributing trusted time
55227409556Hybrid digital watermarking for video authentication
55237409555Electronic document active content assurance
55247409554Data processing system, memory device, data processing unit, and data processing method and program
55257409553Public key certificate generation method, validation method and apparatus thereof
55267409552Method for securing communications between a terminal and an additional user equipment
55277409551Certificate validity authentication method and apparatus
55287409549Methods and apparatus for dynamic home agent assignment in mobile IP
55297409548Maintaining confidentiality of personal information during E-commerce transactions
55307409547Adaptive transparent encryption
55317409546Cryptographically signed filesystem
55327409545Ephemeral decryption utilizing binding functions
55337409544Methods and systems for authenticating messages
55347409543Method and apparatus for using a third party authentication server
55357409542Security association management through the use of lookup tables
55367409541Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method
55377409540Categorizing electronic messages based on trust between electronic messaging entities
55387409458Network system with shared filtering information
55397409431Server apparatus, communications method, program for making computer execute the communications method, and computer-readable storage medium containing the program
55407409352System and method for managing sponsorships
55417409061Method and system for secure distribution of subscription-based game software
55427409060Durable and undecipherable digital watermarking technique and detection of unauthorized use
55437408953Information converting apparatus
55447406710System and method for controlling devices at a location
55457406709Apparatus and method for allowing peer-to-peer network traffic across enterprise firewalls
55467406707Methods and systems for accessing networks methods and systems for accessing the internet
55477406702Broadcasting method and broadcast receiver
55487406602Authentication of data for a gaming machine
55497406600Error-detectable license key fragmentation to facilitate errorless manual entry
55507406599Indicating status for digital signatures
55517406597Methods for efficiently authenticating multiple objects based on access patterns
55527406596Data transfer and management system
55537406595Method of packet encryption that allows for pipelining
55547406594Method and apparatus for certification and authentication of users and computers over networks
55557406593Method and apparatus for protecting information and privacy
55567406472Integrated import/export system
55577406447Opening price process for trading system
55587406446System and method for trustworthy metering and deactivation
55597406174System and method for n-dimensional encryption
55607404205System for controlling client-server connection requests
55617404088Digital content security system
55627404087System and method for providing improved claimant authentication
55637404085Authentication of handheld devices for access to applications
55647404084Method and system to digitally sign and deliver content in a geographically controlled manner via a network
55657404082System and method for providing authorized access to digital content
55667404081Electronic storage apparatus, authentication apparatus and authentication method
55677404080Methods and apparatus for efficient computation of one-way chains in cryptographic applications
55687404079Automatic identity protection system with remote third party monitoring
55697404077Extension of X.509 certificates to simultaneously support multiple cryptographic algorithms
55707404076Encrypted data delivery system
55717403623High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses
55727403622Process for managing a symmetric key in a communication network and devices for the implementation of this process
55737403621System for ensuring encrypted communication after handover
55747403620Cyphering/decyphering performed by an integrated circuit
55757403619Interface module and decoder for host
55767403616Electronic apparatus, data recording method for the electronic apparatus, and storage medium storing program for executing the data recording method
55777403615Methods and apparatus for accelerating ARC4 processing
55787401358Method of controlling access to control registers of a microprocessor
55797401354System and method for network address translation integration with IP Security
55807401353Detecting and blocking malicious connections
55817401352Secure system and method for enforcement of privacy policy and protection of confidentiality
55827401233Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing
55837401229Remote access system, remote access method, and medium containing remote access program
55847401227System and method for providing a form for registering a sensing device with a relay device
55857401226Public key cryptographic method based on braid groups
55867401225Method and apparatus for publishing signature log entry
55877401223Authentication chip for authenticating an untrusted chip
55887401222Method of authentication of memory device and device therefor
55897401221Advanced stream format (ASF) data stream header object protection
55907401219Method and apparatus for protecting external call references
55917401218Home device authentication system and method
55927401217Secure routing protocol for an ad hoc network using one-way/one-time hash functions
55937401216Addressing mechanisms in mobile IP
55947401215Method and apparatus for facilitating cryptographic layering enforcement
55957401054Content bank for objects
55967401052Method for validating warranty compliance and ink compatibility assurance
55977400730Cryptographic communication method in communication system
55987400728Conditional access system and copy protection
55997400725Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein
56007400724Device and method for use in quantum crytography
56017400722Methods and apparatus for performing hash operations in a cryptography accelerator
56027398557Accessing in a rights locker system for digital content access control
56037398556System and method for managing copyrighted electronic media
56047398399Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network
56057398398Authenticated and metered flow control method
56067398396Electronic signature method, program and server for implementing the method
56077398395Using multiple watermarks to protect content material
56087398394Method and apparatus for authenticating nodes in a communications network
56097398392Method for using communication channel round-trip response time for digital asset management
56107398391Content addressable information encapsulation, representation, and transfer
56117398389Kernel-based network security infrastructure
56127398388Increasing peer privacy
56137398386Transparent IPSec processing inline between a framer and a network component
56147398311Selective cache flushing in identity and access management systems
56157397928Insertion and extraction of a message in an image
56167397918Dynamically shifting control word
56177397917Method and apparatus for generating a cryptographic key
56187397916System and method for protecting computer software from a white box attack
56197397817Information converting apparatus
56207395552Team based row level security system and method
56217395551Method and apparatus for managing software use
56227395550Trust management systems and methods
56237395549Method and apparatus for providing a key distribution center without storing long-term server secrets
56247395540Automated business software application integration
56257395438Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
56267395435Secure memory device for smart cards
56277395434Method for secure storage and verification of the administrator, power-on password and configuration information
56287395433Method and system for sustainable digital watermarking
56297395432Method of embedding/detecting digital watermark and apparatus for using thereof
56307395431Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method
56317395430Secure authentication using digital certificates
56327395429Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device
56337395428Delegating certificate validation
56347395427Authenticated key exchange based on pairwise master key
56357395424Method and system for stepping up to certificate-based authentication without breaking an existing SSL session
56367395423Security association storage and recovery in group key management
56377395395Methods, systems, and storage mediums for monitoring consumption of storage space and relocating content contained in the storage when a predetermined condition is met
56387395244Criticality classification system and method
56397394902Encryption apparatus, decryption apparatus and encryption system
56407394901Method for exchanging authentication information between a communication entity and an operator server
56417394900Method and apparatus for preventing the interception of data being transmitted to a web site by a monitoring program
56427394761System and method for delivering messages using alternate modes of communication
56437392546System and method for server security and entitlement processing
56447392535Access privilege transferring method
56457392403Systems, methods and computer program products for high availability enhancements of virtual security module servers
56467392396Transaction device with noise signal encryption
56477392395Trusted and secure techniques, systems and methods for item delivery and execution
56487392394Digital watermarking with variable orientation and protocols
56497392393Content distribution system
56507392392Forensic digital watermarking with variable orientation and protocols
56517392391System and method for secure configuration of sensitive web services
56527392390Method and system for binding kerberos-style authenticators to single clients
56537392389Electronic transmission device, and signal transmission method
56547392388Systems and methods for identity verification for secure transactions
56557392387Apparatus and methods for providing secured communication
56567392386Setuid-filter method for providing secure access to a credentials store for computer systems
56577392385Client server system and devices thereof
56587392384Method and system for secure storage, transmission and control of cryptographic keys
56597392383Method and apparatus for providing process-based access controls on computer resources
56607392382Method and apparatus for verifying data timeliness with time-based derived cryptographic keys
56617392381Proactive forced renewal of content protection implementations
56627392380Authentication and authorization infrastructure system with CRL issuance notification function
56637392378Method and apparatus for routing data traffic in a cryptographically-protected network
56647392377Secured centralized public key infrastructure
56657392376Security module
56667392375Peer-to-peer authentication for real-time collaboration
56677392313Method and apparatus for partitioned environment for web application servers
56687392225Revocation information updating method, revocation information updating apparatus and storage medium
56697392037Wireless communication device and methods for protecting broadcasted management control messages in wireless networks
56707391868Implicit certificate scheme
56717391723Frame-level fibre channel CRC on switching platform
56727391712Method and system for forward-looking tone allocation
56737390952Electronic music apparatus system useful for user registration
56747389536System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer
56757389535Password management
56767389531Method and system to dynamically present a payment gateway for content distributed via a network
56777389529Method and apparatus for generating and using nested encapsulation data
56787389495Framework to facilitate Java testing in a security constrained environment
56797389428Data processing system, data processing method, and program providing medium
56807389425Biometric-based authentication in a nonvolatile memory device
56817389424Technique for distributing software
56827389423System and method for registering a sensing device with a relay device
56837389422System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail
56847389421Countermeasure against estimation-based attacks of spread-spectrum watermarks
56857389419Methods for supplying cryptographic algorithm constants to a storage-constrained target
56867389418Method of and system for controlling access to contents provided by a contents supplier
56877389415Enabling cryptographic features in a cryptographic device using MAC addresses
56887389414Printing system
56897389412System and method for secure network roaming
56907389411Secure transfer of host identities
56917389273System and method for federated rights management
56927389160Remote login of a personal computer
56937386731Password input table creating method and apparatus and program thereof
56947386730Remote medical supporting system
56957386729Method of inserting/detecting digital watermark and apparatus for using thereof
56967386728Security module and method for production of forge-proof documents
56977386727Method for digital signing of a message
56987386726Personal certification authority device
56997386725Node device and communication control method for improving security of packet communications
57007386724Assigning security levels to a shared component
57017386723Method, apparatus and system for compressing IPSec-protected IP packets
57027386722Certificate management system and method
57037386721Method and apparatus for integrated provisioning of a network device with configuration information and identity certification
57047386720Authentication protocol using a multi-factor asymmetric key pair
57057386719System and method for eliminating viruses at a web page server
57067386717Method and system for accelerating the conversion process between encryption schemes
57077386716Device in a system operating with CAN-protocol and in a control and/or supervision system
57087386518Method and system for facilitating transactions
57097386517System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, other event admittance means, goods and/or services
57107386516System and method for providing secure services over public and private networks using a removable portable computer-readable storage
57117386515Fee imposition system for application software
57127386514Method and mechanism for vending digital content
57137386513Networked services licensing system and method
57147386512Method and system for controlling and auditing content/service systems
57157386131Tolerant digital certificate distribute system and distribute method
57167386130Encryption secured against DPA
57177383585Optical discs with controllable access times and method of the same
57187383583Static and run-time anti-disassembly and anti-debugging
57197383582Systems and methods for performing electronic surveillance
57207383580Computer virus detection and prevention
57217383577Method and system for encrypted network management and intrusion detection
57227383574Method and system for limiting the impact of undesirable behavior of computers on a shared data network
57237383571Automatic re-authentication
57247383568Security management administration system and method
57257383447Method for controlling database copyrights
57267383442Nested strong loader apparatus and method
57277383441Method and device for confirming the authenticity of a document and a safe for storing data
57287383440Private user control of a shared remote process
57297383438System and method for secure conditional access download and reconfiguration
57307383437Method and system for implementing super-user-compatible privileges
57317383436Method and apparatus for distributing and updating private keys of multicast group managers using directory replication
57327383435Method for encoding and decoding communication data
57337383434System and method of looking up and validating a digital certificate in one pass
57347383433Trust spectrum for certificate distribution in distributed peer-to-peer networks
57357383432Software modem with hidden authentication commands
57367383230System and method for the efficient exchange and pricing of services and intangible works
57377383229Access control and metering system for streaming media
57387382969Method and system for preventing the unauthorized copying of video content
57397382884Key management for content protection
57407382883Deriving a symmetric key from an asymmetric key for file encryption or decryption
57417382882Secure session set up based on the wireless application protocol
57427382881Lawful interception of end-to-end encrypted data traffic
57437382880Method and apparatus for initializing multiple security modules
57447382879Digital rights management negotiation for streaming media over a network
57457382875Cryptographic method for distributing load among several entities and devices therefor
57467382481Image communication device, method of communicating image, program and recording medium
57477380710Payment card preloaded with unique numbers
57487380280Rights locker for digital content access control
57497380278Protecting software environment in isolated execution
57507380275Secure and backward-compatible processor and secure software execution thereon
57517380271Grouped access control list actions
57527380209Managing electronic documents utilizing a digital seal
57537380140Providing a protected volume on a data storage device
57547380136Methods and apparatus for secure collection and display of user interface information in a pre-boot environment
57557380135Diligent control of preview of stored contents
57567380134Information recording/reproducing apparatus and method of executing encryption processing
57577380133Anti-cloning method
57587380131Copy protection without non-volatile memory
57597380129Method and apparatus for detecting grid intrusions
57607380126Methods and apparatus for controlling the transmission and receipt of email messages
57617380125Smart card data transaction system and methods for providing high levels of storage and transmission security
57627380124Security transmission protocol for a mobility IP network
57637380123Remote activation of covert service channels
57647380121Image processing device, image processing method, image processing program, and computer-readable recording medium storing the same therein
57657380120Secured data format for access control
57667380118Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method
57677380013Method for providing information to a web server
57687379917Printing control apparatus and a method of charging for printing
57697379897Automatic payment system using RF ID tags
57707379551Method and system for recovering password protected private data via a communication network without exposing the private data
57717379550Method for the computer-assisted production of public keys for encoding information and device for carrying out said method
57727379549Access control for digital content
57737379548Virtual smart card device, method and system
57747379546Method for XZ-elliptic curve cryptography
57757378939Method and apparatus for providing proximity based authentication, security, and notification in a wireless system
57767376974Apparatus and method for creating a trusted environment
57777376971Computer implemented method and system for controlling use of digitally encoded products
57787376845Method for calculating hashing of a message in a device communicating with a smart card
57797376841Portable computer with a hand impression
57807376838Method for controlled and audited access to privileged accounts on computer systems
57817376836Systems and methods for preventing an attack on healthcare data processing resources in a hospital information system
57827376835Implementing nonrepudiation and audit using authentication assertions and key servers
57837376834System and method for securely controlling communications
57847376833Anonymous decryption system, anonymous decryption method, and program
57857376832Distributed method, system and computer program product for establishing security in a publish/subscribe data processing broker network
57867376831Selectively encrypting different portions of data sent over a network
57877376829Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data
57887376828Method and apparatus for using incompletely trusted service provider point-to-point networks
57897376826Methods and apparatus for performing encryption and authentication
57907376706Email message filtering system and method
57917376628Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds
57927376624Secure communication and real-time watermarking using mutating identifiers
57937376235Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system
57947376234Portable keying device and method
57957376232Computer system security via dynamic encryption
57967375837User-definable print-option conversion for heterogeneous cluster printing
57977373671Method and system for user information verification
57987373667Protecting a computer coupled to a network from malicious code infections
57997373657Method and apparatus for controlling data and software access
58007373656Automatic configuration for portable devices
58017373654System, apparatus and method for updating security configurations of a plurality of servers from a centralized directory server
58027373521Semiconductor IC, information processing method, information processing device, and program storage medium
58037373517System and method for encrypting and decrypting files
58047373516Systems and methods of securing resources through passwords
58057373514High-performance hashing system
58067373513Transmarking of multimedia signals
58077373512Method and apparatus for providing information security to prevent digital signature forgery
58087373511Identification device, identification system, and card issuing device and system needing identification
58097373509Multi-authentication for a computing device connecting to a network
58107373508Wireless security system and method
58117373507System and method for establishing secure communication
58127373506Data authentication system
58137373504Kernel-level cryptographic kernel interface
58147373503Public key certificate revocation list generation apparatus, revocation judgement apparatus, and authentication system
58157373502Avoiding server storage of client state
58167373501System and method for on-line diagnostics
58177373500Secure network processing
58187373499Methods and apparatus for delegation of cryptographic servers for capture-resilient devices
58197373372Method for accrediting event participants
58207372965Electric circuit management method and device
58217372964Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof
58227372963Device for compression and encryption, and device for decompression and decryption
58237372960Method and apparatus for performing finite field calculations
58247370356Distributed network monitoring system and method
58257370354Method of remotely managing a firewall
58267370350Method and apparatus for re-authenticating computing devices
58277370349Method and system for protecting information on a computer system
58287370210Apparatus and method for managing processor configuration data
58297370209Systems and methods for increasing the difficulty of data sniffing
58307370206Self-signing electronic documents
58317370205Content distribution system, content distribution method and terminal device
58327370204Watermark data embedding apparatus and extracting apparatus
58337370203Method for indivisibly modifying a plurality of sites in a microcircuit card non volatile memory, in particular a contactless card
58347370202Security device for cryptographic communications
58357370201Secure identification method between two radiofrequency network appliances
58367370200Validation for secure device associations
58377370198Total system for preventing information outflow from inside
58387370197Method and system for authenticating messages
58397370195Moving principals across security boundaries without service interruption
58407370194Security gateway for online console-based gaming
58417370190Data processing systems and methods with enhanced bios functionality
58427370017Redistribution of rights-managed content and technique for encouraging same
58437369677System reactions to the detection of embedded watermarks in a digital host content
58447369662Maintaining end-to-end synchronization on a telecommunications connection
58457369661Method and apparatus for detection of loss of cipher synchronization
58467369658Secure modulation and demodulation
58477369657Cryptography accelerator application program interface
58487367061Systems, methods, and a storage medium for storing and securely transmitting digital media data
58497367060Methods and apparatus for secure document printing
58507367059Secure content activation during manufacture of mobile communication devices
58517367058Encoding method
58527367056Countering malicious code infections to computer files that have been infected more than once
58537367053Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof
58547367049System and method for enrolling in a biometric system
58557367048Apparatus and method for autonomic email access control
58567367047Portable information recording medium
58577367045Trusted communications system
58587366918Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer
58597366917System and method for accessing discrete data
58607366916Method and apparatus for an encrypting keyboard
58617366911Methods and apparatus for computationally-efficient generation of secure digital signatures
58627366910System and method for string filtering
58637366909Dynamic wavelet feature-based watermark
58647366908Digital watermarking with content dependent keys and autocorrelation properties for synchronization
58657366907Information processing device and method and program storage medium
58667366906Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium
58677366905Method and system for user generated keys and certificates
58687366903Card activated cash dispensing automated banking machine system and method
58697366902System and method for authenticating a storage device for use with driver software in a storage network
58707366901Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address
58717366900Platform-neutral system and method for providing secure remote operations over an insecure computer network
58727366899Architecture and method of multilayered DRM protection for multimedia service
58737366898Method and apparatus for performing configuration over a network
58747366897Method and system for communication via a computer network
58757366896Systems and methods for limiting access to potentially dangerous code
58767366894Method and apparatus for dynamically securing voice and other delay-sensitive network traffic
58777366893Method and apparatus for protecting a network from attack
58787366764Method for the identification and management of mass unsolicited e-mail
58797366703Smartcard internet authorization system
58807366702System and method for secure network purchasing
58817366701Copy protection of data
58827366542Wireless security
58837366322Automated copyright detection in digital images
58847366306Programmable logic device that supports secure and non-secure modes of decryption-key access
58857366305Platform and method for establishing trust without revealing identity
58867366301Optical watermark
58877366300Methods and apparatus for implementing a cryptography engine
58887363656Event detection/anomaly correlation heuristics
58897363650System and method for incrementally distributing a security policy in a computer network
58907363515Control systems and methods using a partially-observable markov decision process (PO-MDP)
58917363507Device and method of preventing pirated copies of computer programs
58927363505Security authentication method and system
58937363504Method and system for keystroke scan recognition biometrics on a smartcard
58947363500Tunneled authentication protocol for preventing man-in-the-middle attacks
58957363499Blinded encryption and decryption
58967363498Method and apparatus for facilitating secure distributed content delivery
58977363497System for distribution of recorded content
58987363496Authenticated ID-based cryptosystem with no key escrow
58997363495System and method for message encryption and signing in a transaction processing system
59007363494Method and apparatus for performing enhanced time-based authentication
59017363493Method for protecting computer programs and data from hostile code
59027363491Resource management in security enhanced processors
59037363490Method and system for selective email acceptance via encoded email identifiers
59047363488Method and apparatus for prefiltering received messages in a security system
59057363487Method and system for dynamic client authentication in support of JAAS programming model
59067363486Method and system for authentication through a communications pipe
59077363326Archive with timestamps and deletion management
59087363276Broadcast receiving method and apparatus and information distributing method and apparatus
59097363244Methods, apparatus, and program products for inferring service usage
59107362870Method and apparatus for recording/playing back information
59117362869Method of distributing a public key
59127362868Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
59137362865Wireless network system
59147362864Framing of transmit encoded data and linear feedback shifting
59157362863DES hardware throughput for short operations
59167360252Method and apparatus for secure distribution of software
59177360250Illegal access data handling apparatus and method for handling illegal access data
59187360249Refining behavioral detections for early blocking of malicious code
59197360247Method for protection against fraudulent modification of data sent to a secure electronic medium
59207360245Method and system for filtering spoofed packets in a network
59217360239Biometric multimodal centralized authentication service
59227360237System and method for secure network connectivity
59237360096Securely processing client credentials used for Web-based access to resources
59247360094Verifiable secret shuffles and their application to electronic voting
59257360093System and method for authentication of JPEG image data
59267360092Marking and identifying web-based authentication forms
59277360091Secure data transfer method of using a smart card
59287360090Method of and apparatus for authenticating control messages in a signaling network
59297360089Registration network for optical sensing device including printer as base station
59307360088Method and system for authenticating service using integrated circuit card
59317360087Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
59327360086Communications control method and information relaying device for communications network system
59337360085Method and system for providing a secure multimedia presentation
59347360080Non-transferable anonymous credential system with optional anonymity revocation
59357360078Communication methods and apparatus
59367360076Security association data cache and structure
59377360075Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
59387359885System and method for device-based access privilege to an account
59397359518Distribution of secured information
59407359517Nestable skeleton decryption keys for digital rights management
59417359515Method and apparatus for symmetric-key decryption
59427359514Narrow-band single-photon source and QKD system using same
59437359513Quantum cryptography protocol
59447359512Authentication in a quantum cryptographic system
59457359509Method and system for generation of cryptographic keys and the like
59467359507Server-assisted regeneration of a strong secret from a weak secret
59477359378Security system for preventing unauthorized packet transmission between customer servers in a server farm
59487359333Approach for managing internet protocol telephony devices in networks
59497356842Cryptographic revocation method using a chip card
59507356837Centralized identification and authentication system and method
59517356712Method of dynamically assigning network access priorities
59527356710Security message authentication control instruction
59537356708Decryption semiconductor circuit
59547356706Personal authentication method and apparatus sensing user vicinity
59557356705Biometric authentication for remote initiation of actions and services
59567356704Aggregated authenticated identity apparatus for and method therefor
59577356703Time-based computer access controls
59587356701Data repository and method for promoting network storage of data
59597356700Digital watermark-embedding apparatus and method, digital watermark-detecting apparatus and method, and recording medium
59607356699Electronic watermark detection device and electronic watermark detection method
59617356698Device authentication apparatus and method, and recorded medium on which device authentication program is recorded
59627356697System and method for authentication to an application
59637356696Proofs of work and bread pudding protocols
59647356695Multi-level security systems
59657356693Method for producing certificate revocation lists
59667356692Method and system for enforcing access to a computing resource using a licensing attribute certificate
59677356691Authentication of mobile wireless network component
59687356690Method and system for managing a distributed trust path locator for public key certificates relating to the trust path of an X.509 attribute certificate
59697356689Method and apparatus for tracing packets in a communications network
59707356688System and method for document distribution
59717356687Association of security parameters for a collection of related streaming protocols
59727356515Method and system for transferring an electronic sum of money from a credit memory
59737356510Content delivery
59747356149Information processing method and apparatus, computer program, and computer-readable storage medium
59757356148Information processing method and apparatus, computer program, and computer-readable storage medium
59767356147Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
59777356146Method for relocating SRNS in a mobile communication system
59787356144Control of usage of contents in digital broadcasts
59797356142Secure compact disk and player
59807356141Baud rate modulation encoding/decoding method and device for remote controller
59817353541Systems and methods for content distribution using one or more distribution keys
59827353538Server resource management, analysis, and intrusion negation
59837353535Flexible, selectable, and fine-grained network trust policies
59847353533Administration of protection of data accessible by a mobile device
59857353532Secure system and method for enforcement of privacy policy and protection of confidentiality
59867353531Trusted computing environment
59877353468Secure exchange of information in electronic design automation
59887353405Method and systems for sharing network access capacities across internet service providers
59897353402Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system
59907353398Article, method, system and apparatus for decentralized creation, distribution, verification and transfer of valuable documents
59917353397Repurposing digitally signed information
59927353396Physical access control
59937353395Authenticated ID-based cryptosystem with no key escrow
59947353394System and method for digital signature authentication of SMS messages
59957353393Authentication receipt
59967353388Key server for securing IP telephony registration, control, and maintenance
59977353387Method and system for integrating encryption functionality into a database system
59987353386Method and device for authenticating digital data by means of an authentication extension module
59997353385Authentication system, authentication method, authentication apparatus, and authentication method therefor
60007353384Collapsing chained credentials
60017353383System and method for single session sign-on with cryptography
60027353382Security framework and protocol for universal pervasive transactions
60037353381Supplicant and authenticator intercommunication mechanism independent of underlying data link and physical layer protocols
60047353380Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
60057353353File security management
60067353210Electronic means of payment with individually settable security features for the internet or for mobile networks
60077353209Releasing decrypted digital content to an authenticated path
60087353207Method of altering a software product in response to predetermined events
60097352868Method and apparatus for security in a data processing system
60107352867Method of preventing unauthorized distribution and use of electronic keys using a key seed
60117352866Enhanced subscriber authentication protocol
60127352862Encryption method, communication system, transmission device, and data input device
60137352861Digital electronic component which is protected against electrical-type analyses
60147352860Method of encipherment by permutations of fixed-length sequences
60157350695Method, system, and computer program product for implementing pin-based data transfer activities
60167350238Data transfer system, data transfer apparatus, data-recording apparatus, data management method and identifier generation method
60177350230Wireless security module
60187350228Method for securing digital content
60197350227Cryptographic peer discovery, authentication, and authorization for on-path signaling
60207350226System and method for analyzing security policies in a distributed computer network
60217350212Method and apparatus for data transfer across a network
60227350083Integrated circuit chip having firmware and hardware security primitive device(s)
60237350078User selection of computer login
60247350077802.11 using a compressed reassociation exchange to facilitate fast handoff
60257350076Scheme for device and user authentication with key distribution in a wireless network
60267350075Method for autoconfiguration of authentication servers
60277350074Peer-to-peer authentication and authorization
60287350073VPN enrollment protocol gateway
60297350072Remote management and provisioning of a system across a network based connection
60307350071Encrypted and non-encrypted communication of message data
60317350069System and method which employs a multi user secure scheme utilizing shared keys
60327350067Bios security management
60337349545Key agreement method in secure communication system using multiple access method
60347349544Wireless perimeter security device and network using same
60357349542Systems, methods and computer program products for encryption and decryption using wavelet transforms
60367349541Method and apparatus for controlling content consumption
60377349537Method for data encryption in an ethernet passive optical network
60387346931Accepting a set of data in a computer unit
60397346930Security framework bridge
60407346929Method and apparatus for auditing network security
60417346928Decentralized appliance virus scanning
60427346927System and method for storing and accessing secure data
60437346924Storage area network system using internet protocol, security system, security management program and storage device
60447346910Administration of groups of computer programs, data processing systems, or system resources
60457346779System and method for authenticating electronic documents
60467346778Security method and apparatus for controlling the data exchange on handheld computers
60477346777Identification information embedding apparatus and identification information analysis apparatus
60487346776Authenticating media signals by adjusting frequency characteristics to reference values
60497346775System and method for authentication of users and web sites
60507346774Encrypted key cache
60517346773Enabling stateless server-based pre-shared secrets
60527346772Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure
60537346771Key distribution across networks
60547346770Method and apparatus for traversing a translation device with a security protocol
60557346581Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system
60567346514Device and method for embedding a watermark in an audio signal
60577346171Network system, terminal, and method for encryption and decryption
60587346170Information processing system and method
60597346169Information processing device and method
60607346168Method and apparatus for secure wireless delivery of converged services
60617346167Secure mobile ad-hoc network and related methods
60627346166Quantum key distribution system and method using regulated single-photon source
60637346163Dynamic composition of pre-encrypted video on demand content
60647346162Public key cryptography using matrices
60657346161Method and apparatus for designing cipher logic, and a computer product
60667346160Randomization-based encryption apparatus and method
60677343621Method and apparatus for providing iSCSI target stealth operation
60687343620Method and apparatus for adopting authorizations
60697343559Computer-readable recorded medium on which image file is recorded, device for producing the recorded medium, medium on which image file creating program is recorded, device for transmitting image file, device for processing image file, and medium on which image file processing program is recorded
60707343497Security in communication networks
60717343493Encrypted file system using TCPA
60727343492Method and system for digital watermarking
60737343491Information processing apparatus and method
60747343490Apparatus, and associated method, for facilitating authentication of a mobile station with a core network
60757343489Low cost packet originator verification for intermediate nodes
60767343488Method and apparatus for providing discrete data storage security
60777343487Datacast distribution system
60787343486Methods and systems for coordinating the termination of sessions on one or more systems
60797343485System and method for maintaining protocol status information in a network device
60807343441Method and apparatus of remote computer management
60817343350System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services
60827343349System and method for secure data and funds transfer
60837343348System for performing real-estate transactions over a computer network using participant templates
60847343347Electronic media player with metadata based control and method of operating the same
60857343014Method for sharing the authorization to use specific resources
60867343011Secure telecommunications system for wireless local area networks
60877340778Method and apparatus for ensuring the copy protection of digital data
60887340777In memory heuristic system and method for detecting viruses
60897340771System and method for dynamically creating at least one pinhole in a firewall
60907340769System and method for localizing data and devices
60917340768System and method for wireless local area network monitoring and intrusion detection
60927340748Automatic client proxy configuration for portable services
60937340612Method for device registration in a wireless home network
60947340610Trusted time stamping storage system
60957340608System and method for creating, vaulting, transferring and controlling transferable electronic records with unique ownership
60967340607Preservation system for digitally created and digitally signed documents
60977340606Digital certificates
60987340605System and method for secure download of waveforms to signal generators
60997340604Using dynamic web components to remotely control the security state of web pages
61007340602Systems and methods for authenticating and protecting the integrity of data streams and other data
61017340600Authorization infrastructure based on public key cryptography
61027340599Method for protection against fraud in a network by icon selection
61037340482Preview function in a digital data preservation system
61047340462User-configurable terminal for displaying, retrieving, inputting and processing data
61057340436Communication network charging method and system
61067340061Information processing apparatus, information processing method and providing medium
61077340059Programmable scrambler and De-scrambler for digital telephony equipment
61087340057Method and apparatus for distributing authorization to provision mobile devices on a wireless network
61097340055Memory card and data distribution system using it
61107340053Cipher strength estimating device
61117337465Peer-to-peer communication apparatus and communication method
61127337331Distributive storage controller and method
61137337326Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation
61147337323Boot-up and hard drive protection using a USB-compliant token
61157337321Digital content protection using invisible and visible watermarks
61167337319Method of comparing documents possessed by two parties
61177337318Method and apparatus for preventing rogue implementations of a security-sensitive class interface
61187337316Packet authentication
61197337315Efficient certificate revocation
61207337314Apparatus and method for allocating resources within a security processor
61217337147Dynamic digital content licensing
61227337146Emergency information management system
61237337105Electronic equipment setting information creating method and apparatus, and security policy creating method and associated apparatus
61247336802Digital watermarking system using scrambling method
61257336799Digital watermark embedding device and digital watermark embedding method
61267336791Information processing apparatus
61277336789System for providing encrypted data, system for decrypting encrypted data and method for providing a communication interface in such a decrypting system
61287336788Electronic book secure communication with home subsystem
61297334267Email viewing security
61307334266Reproduction control method, program and recording medium
61317334263Detecting viruses using register state
61327334262Proactive prevention of polymorphic SMTP worms
61337334257Techniques for preserving content during a redirection for authentication
61347334254Business-to-business security integration
61357334178Randomized self-checking test system
61367334134System and method for playback of copying-and-use-protected acoustic and image media
61377334132Flexible and scalable architecture for transport processing
61387334129Embedding supplemental data in an encoded signal
61397334128Accessing information on a network using an extended network universal resource locator
61407334127Key agreement and transport protocol
61417334125Facilitating secure communications among multicast nodes in a telecommunications network
61427334123Computer system including a bus bridge for connection to a security services processor
61437334051Data distribution system, terminal apparatus, distribution center apparatus, high-efficiency encoding method, high-efficiency encoding apparatus, encoded data decoding method, encoded data decoding apparatus, data transmission method, data transmission apparatus, sub information attaching method, sub information attaching apparatus, and recording medium
61447333957Connected audio and other media objects
61457333616Approach for managing access to messages using encryption key management policies
61467333615Encryption between multiple devices
61477333612Methods and apparatus for confidentiality protection for Fibre Channel Common Transport
61487333611Ultra-secure, ultra-efficient cryptographic system
61497333610System and method for pre-encryption of transmitted content
61507333609Encrypting apparatus
61517333608Analog scrambler
61527333468Digital phase locked loops for packet stream rate matching and restamping
61537330981File locker and mechanisms for providing and using same
61547330980Method of and system for encrypting digital data, method of and apparatus for reproducing digital data, and computer product
61557330977Apparatus, system, and method for secure mass storage backup
61567330974Method and system for delivery of a secure document
61577330973Safety judgment method, safety judgment system, safety judgment apparatus, first authentication apparatus, and computer program product
61587330972Remote management device key administration using network adapters
61597330971Delegated administration of namespace management
61607330970Methods and systems for protecting information in paging operating systems
61617330969Method and apparatus for data validation
61627330968Communication network system having secret concealment function, and communication method
61637330871Online machine data collection and archiving process
61647330838System and method for securing transactional data transmitted over a wireless network in a retail store environment
61657330560Insertion and extraction of a message in an image
61667330550Cryptographic system and method that uses excitation spectroscopy
61677330549Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function
61687328456Method and system to detect dangerous file name extensions
61697328352Apparatus and method for reading or writing user data
61707328351Mail processing apparatus and method
61717328349Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses
61727328348Method and system for securely timestamping digital data
61737328347Method and apparatus for distinguishing the origin of operator inputs in electronic control systems and printing machine having the apparatus
61747328345Method and system for end to end securing of content for video on demand
61757328344Authority-neutral certification for multiple-authority PKI environments
61767328342Method for secure communication between two devices
61777328340Methods and apparatus to provide secure firmware storage and service access
61787328339Method of testing the encryption function of a device
61797328338Transaction verification protocol for smart cards
61807328337Trust grant and revocation from a master key to secondary keys
61817328336System and method for small-area system data processing
61827327935Information recorder, system for copying information, method for copying information, program and computer readable recording medium
61837327847Method for distributed computation of RSA inverses in asynchronous networks
61847327846Secure cryptographic key exchange and verifiable digital signature
61857325251Method and system to prevent peer-to-peer (P2P) worms
61867325250Method and apparatus for preventing radio communication system access by an unauthorized modem
61877325248Personal firewall with location dependent functionality
61887325246Enhanced trust relationship in an IEEE 802.1x network
61897325145Verifying the presence of an original data storage medium
61907325144Portable information processor having password code checking function
61917325142IP network and admission control method used therefor
61927325141Method and system for secure access
61937325140Secure management access control for computers, embedded and card embodiment
61947325139Information processing device, method, and program
61957325137Apparatus and method for securely realizing cooperative processing
61967325136Method and apparatus for secured electronic commerce
61977325134Localized network authentication and security using tamper-resistant keys
61987325133Mass subscriber management
61997325132Authentication method, system and apparatus of an electronic value
62007325131Robust watermark for DSD signals
62017325130Method for guaranteeing freshness of results for queries against a non-secure data store
62027325129Method for altering encryption status in a relational database in a continuous process
62037325127Security server system
62047324975Method for managing commands in several application files and microchip card for implementing said method
62057324974Digital data file encryption apparatus and method
62067324648Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site
62077324647Quantum cryptographic key distribution networks with untrusted switches
62087324645Method to authenticate a mobile station, a communications system and a mobile station
62097324644Scheme for transferring copyright protected contents data using radio link layer authentication/encryption
62107322046Method and system for the secure use of a network service
62117322042Secure and backward-compatible processor and secure software execution thereon
62127322006Integrated document management system, document retrieval device, and a computer-readable recording medium with a document retrieval program recorded therein
62137321971System and method for secure remote access
62147321969Secure instant messaging system using instant messaging group policy certificates
62157321968Method and apparatus for encoding, transmitting and decoding a digital message
62167321910Microprocessor apparatus and method for performing block cipher cryptographic functions
62177321877Managing a virtual persona through selective association
62187321666Multilayered digital watermarking system
62197321665Method of and apparatus for extracting watermark from repeatedly watermarked data
62207321660Method and apparatus for encrypting/decrypting data using timed-release keys
62217321659Simple universal hash for plaintext aware encryption
62227320143Method of gaining secure access to intranet resources
62237320142Method and system for configurable network intrusion detection
62247320139Data processing system for application to access by accreditation
62257320130Mutual exclusion lock implementation for a computer network
62267320075Software protection method utilizing hidden application code in a protection dynamic link library object
62277320073Secure method for roaming keys and certificates
62287320072Method and token for authenticating a control point
62297320071Secure universal serial bus
62307320070Methods and apparatus for protecting against IP address assignments based on a false MAC address
62317320069Selective encryption of media data
62327319988System and method for processing protected audio information
62337319775Wavelet domain watermarks
62347319758Electronic device with encryption/decryption cells
62357318238Security settings for markup language elements
62367318237System and method for maintaining security in a distributed computer network
62377318236Tying a digital license to a user and tying the user to multiple computing devices in a digital rights management (DRM) system
62387318235Attestation using both fixed token and portable token
62397318160Cryptographic key setup in queued cryptographic systems
62407318155Method and system for configuring highly available online certificate status protocol responders
62417318153Mark information issuing method and system
62427317799Cryptographic key distribution using key folding
62437317798Communication processing system, communication processing method, server and computer program
62447316033Method of controlling recording of media
62457316032Method for allowing a customer to preview, acquire and/or pay for information and a system therefor
62467316030Method and system for authenticating a personal security device vis-a-vis at least one remote computer system
62477316027Techniques for dynamically establishing and managing trust relationships
62487315949Method and system for providing a personal identification security feature to a portable computing device
62497315948Time stamping method employing a separate ticket and stub
62507315947Author signatures for legal purposes
62517315946Out-of-band tokens for rights access
62527315945Directoryless public key cryptographic system and method
62537315944Secure handling of stored-value data objects
62547315943Method and system for authenticating communication terminals
62557315942Network element and method for controlling access to low level computer system services
62567315941Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity
62577315824Internet printing by hotel guests
62587314169Device that issues authority for automation systems by issuing an encrypted time pass

2007

62597313828Method and apparatus for protecting software against unauthorized use
62607313826Connected support entitlement system method of operation
62617313822Application-layer security method and system
62627313820Method and system for providing an authorization framework for applications
62637313815Protecting against spoofed DNS messages
62647313812Application level security
62657313704Control system having download function
62667313702Method for issuing identification information
62677313701Robust efficient distributed RSA-key generation
62687313700Method and system for authenticating a message sender using domain keys
62697313699Automatic authentication method and system in print process
62707313697Method for authentication
62717313696Method for authentication of JPEG image data
62727313694Secure file access control via directory encryption
62737313693Secure transmission using adaptive transformation and plural channels
62747313692Trust management systems and methods
62757313691Internet site authentication service
62767313690Three way validation and authentication of boot files transmitted from server to client
62777313689Method, system and service for the authentication of a public key certificate
62787313688Method and apparatus for private messaging among users supported by independent and interoperating couriers
62797313687Establishing a secure context at an electronic communications end-point
62807313547Manager level device/service arbitrator and methods
62817313239Method and system for data encryption/decryption key generation and distribution
62827313238Method and system for relating cryptographic keys
62837313236Methods and apparatus for secure and adaptive delivery of multimedia content
62847310823Digital information recording apparatus and outputting apparatus
62857310822Filtering a permission set using permission requests associated with a code assembly
62867310821Host certification method and system
62877310819Processing copy protection signals
62887310818System and method for tracking computer viruses
62897310812Service executing method and service providing system
62907310733Method and system for maintaining login preference information of users in a network-based transaction facility
62917310732Content distribution system authenticating a user based on an identification certificate identified in a secure container
62927310731Contents processing system
62937310730Method and apparatus for communicating an encrypted broadcast to virtual private network receivers
62947310728Method of implementing a high-speed header bypass function
62957310669Network appliance for vulnerability assessment auditing over multiple networks
62967310629Method and apparatus for controlling file sharing of multimedia files over a fluid, de-centralized network
62977310620Monitoring market participant responses
62987310424Encryption key distribution and network registration system, apparatus and method
62997308704Data structure for access control
63007308703Protection of data accessible by a mobile device
63017308702Locally adaptable central security management in a heterogeneous network environment
63027308582Collation processing apparatus, data communication system and data communication method
63037308581Systems and methods for online identity verification
63047308580System and method for ensuring security with multiple authentication schemes
63057308579Method and system for internationally providing trusted universal identification over a global communications network
63067308578Method and apparatus for authorizing execution for applications in a data processing system
63077308577Image verification system, image verification apparatus, and image verification method
63087308576Authenticated code module
63097308575Data scrambling system for a shared transmission media
63107308574Method and system for key certification
63117308573Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architecture
63127308572Method of printing a document
63137308501Method and apparatus for policy-based packet classification using hashing algorithm
63147308104Forward multiple scrambling code generating method and apparatus
63157308103Power line communication device and method of using the same
63167308097Digital signature and authentication method and apparatus
63177308096Elliptic scalar multiplication system
63187305710Method for securely loading and executing software in a secure device that cannot retain software after a loss of power
63197305708Methods and systems for intrusion detection
63207305706Establishing a virtual private network for a road warrior
63217305704Management of trusted flow system
63227305703Method and system for enforcing a communication security policy
63237305567Decoupled architecture for data ciphering operations
63247305564System and method to proactively detect software tampering
63257305562System, method and computer program product for an authentication management infrastructure
63267305559Software method for improved password entry
63277305558Digital signing method
63287305557Management and recovery of data object annotations using digital fingerprinting
63297305556Secure printing with authenticated printer key
63307305555Smart card mating protocol
63317305554Dynamic acquisition of state during security system reconfiguration
63327305551Method of transmitting security data in an ethernet passive optical network system
63337305550System and method for providing authentication and verification services in an enhanced media gateway
63347305548Using atomic messaging to increase the security of transferring data across a network
63357305547Method for upgrading a host/agent security system that includes digital certificate management and an upgradable backward compatible host/agent security system digital certificate infrastructure
63367305546Splicing of TCP/UDP sessions in a firewalled network environment
63377305545Automated electronic messaging encryption system
63387305470Method for displaying web user's authentication status in a distributed single login network
63397305365System and method for controlling access to location information
63407305093Method and apparatus for securely transferring data
63417305092Method and system to accelerate cryptographic functions for secure e-commerce applications
63427305091Quantum cipher communication system
63437305086Reducing problems caused by variations in watermark detection results
63447305084Fast encryption and authentication for data processing systems
63457304965Method and apparatus for generating a code in an asynchronous code division multiple access mobile communication system
63467304570Methods, systems, and computer program products for providing context-based, hierarchical security for a mobile device
63477304227Method and system for synthesizing electronic transparent audio
63487302705Method and apparatus for tracing a denial-of-service attack back to its source
63497302704Excising compromised routers from an ad-hoc network
63507302700Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device
63517302589Method for securing memory mapped control registers
63527302584Mechanisms for banning computer programs from use
63537302583Biometrics template
63547302577Data processing apparatus and method
63557302576Systems and methods for authenticating documents
63567302575Apparatus for and method of preventing illicit copying of digital content
63577302574Content identifiers triggering corresponding responses through collaborative processing
63587302573Computer system and method for controlling output of reproduced video data
63597302572Portable information storage medium and its authentication method
63607302571Method and system to maintain portable computer data secure and authentication token for use therein
63617302570Apparatus, system, and method for authorized remote access to a target system
63627302566Internet security system
63637302565Terminal identity masking in a wireless network
63647302564Translation of secure communications for handshake protocols
63657302563Mailing list server and mail re-sending method thereof
63667302415Data copyright management system
63677302078Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique
63687302060Method and application for authentication of a wireless communication using an expiration marker
63697302056Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography
63707299504System and method for implementing security management using a database-modeled security policy
63717299502System and method for providing customized secure access to shared documents
63727299501Electronic book selection and delivery system having encryption and security features
63737299495Virus detection
63747299494File management method and files
63757299493Techniques for dynamically establishing and managing authentication and trust relationships
63767299492Multi-level multi-user web services security system and method
63777299390Apparatus and method for encrypting security sensitive data
63787299360Method and system for fingerprint template matching
63797299358Indirect data protection using random key encryption
63807299356Key conversion method for communication session encryption and authentication system
63817299355Fast SHA1 implementation
63827299354Method to authenticate clients and hosts to provide secure network boot
63837299351Peer-to-peer name resolution protocol (PNRP) security infrastructure and method
63847299350Internet protocol security decryption with secondary use speculative interrupts
63857299349Secure end-to-end notification
63867298851Electronic book security and copyright protection system
63877298850Encrypting keypad module
63887298849Method and apparatus for simultaneous encryption and decryption of publicly distributed media
63897298845Digital content protection system
63907298844Recording/reproducing apparatus, data moving method, and data deletion method
63917298843Method and apparatus for seeding a random number generator
63927298842Utilizing a key for enciphering and deciphering that is modified during enciphering and deciphering
63937296163System and methods for encrypted execution of computer programs
63947296162Time validation system
63957296161Image processing apparatus and image processing method
63967296160Secure user authentication over a communication network
63977296158Methods, apparatus, and program products for inferring service usage
63987296157Methods and apparatus for secure document printing
63997296156System and method for SMS authentication
64007296155Process and system providing internet protocol security without secure domain resolution
64017296154Secure media path methods, systems, and architectures
64027296152System and method for providing access to a network in a communications environment
64037296150Database management systems and methods of operating the same
64047296149Secure user and data authentication over a communication network
64057296148Communication system and network control apparatus with encryption processing function, and communication control method
64067296147Authentication system and key registration apparatus
64077296146Security measures in a partitionable computing system
64087296145Method of secure communication over a distributed network without using secure socket layer
64097295681Method and apparatus for providing improved workflow for digital watermarking
64107295678Method for inserting binary messages in a digital image
64117295674On-line randomness test for detecting irregular pattern
64127295672Method and apparatus for fast RC4-like encryption
64137295671Advanced encryption standard (AES) hardware cryptographic engine
64147294057Secure method for remote game management
64157293294Method and apparatus for using contents
64167293293Apparatus and method for detecting illegitimate change of web resources
64177293291System and method for detecting computer port inactivity
64187293284Codeword-enhanced peer-to-peer authentication
64197293282Method to block unauthorized access to TFTP server configuration files
64207293176Strong mutual authentication of devices
64217293175Automatic information sanitizer
64227293174Method of enabling consumer privacy using personal storage device
64237293173Methods and systems for protecting information in paging operating systems
64247293171Encryption to BCC recipients with S/MIME
64257292999Online card present transaction
64267292693Deterministically generating block substitution tables which meet a given standard of nonlinearity
64277290280Method and apparatus to facilitate virtual transport layer security on a virtual network
64287290278Identity based service system
64297290275Security maturity assessment method
64307290266Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy
64317290148Encryption and decryption communication semiconductor device and recording/reproducing apparatus
64327290146Managed credential issuance
64337290143Method of certifying transmission, reception and authenticity of electronic documents and related network unit
64347290142System and method for initializing a simple network management protocol (SNMP) agent
64357290141Authentication of remotely originating network messages
64367290139System for updating an information state received from another computer based upon validation rules that apply to the information state
64377290137Information processing apparatus, executable module generating method, and storage medium
64387290135Method and arrangement for data communication in a cryptographic system containing a plurality of entities
64397290134Encapsulation mechanism for packet processing
64407290133Method and apparatus improving efficiency of end-user certificate validation
64417290132Establishing secure peer networking in trust webs on open networks using shared secret device key
64427290131Guaranteeing hypertext link integrity
64437290130Information distributing system and method thereof
64447289959Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor
64457289632System and method for distributed security
64467289631Encryption key setting system, access point, encryption key setting method, and authentication code setting system
64477289630Counter initialization, particularly for radio frames
64487287284Information processing method and apparatus, and computer program and computer-readable storage medium
64497287283Return-to-LIBC attack blocking system and method
64507287281Send blocking system and method
64517287272Method, data carrier and system for authentication of a user and a terminal
64527287271System and method for enabling secure access to services in a computer network
64537287167Record medium, recording apparatus for record medium, recording method for record medium, reproducing apparatus for record medium, reproducing medium for record medium, and data output controlling method
64547287163Digital watermark embedding apparatus and method, and computer program
64557287162System and method for platform activation
64567287159Detection and identification methods for software
64577287158Person authentication system, person authentication method, information processing apparatus, and program providing medium
64587287011Application management for multi application devices
64597286670Method and apparatus for chaotic opportunistic lossless compression of data
64607286668Method of protecting copyright of digital video work
64617286664Efficient implementation of MD5 message-digest algorithm (RFC1321) on an 8 bit micro-controller
64627286515Method, apparatus, and software product for detecting rogue access points in a wireless network
64637284277Secured printing
64647284276Return-to-LIBC attack detection using branch trace records system and method
64657284266System and method for secure biometric identification
64667284263Rights management inter-entity message policies and enforcement
64677284131Method for operating internet site offering encrypted contents
64687284129Data processing apparatus and method
64697284128Recording medium, recording medium method and apparatus , information signal output control method, recording medium reproducing apparatus, signal transmission method, and content data
64707284127Secure communications
64717284126Device authentication using pre-configured security keys
64727284125Method and apparatus for personal identification
64737284122Cryptographic method for protection against fraud
64747284061Obtaining temporary exclusive control of a device
64757283633Information recording and/or reproducing method and information recording and/or reproducing device
64767283632Unauthorized access embedded software protection system
64777283631Encryption processing apparatus and encryption processing system
64787283629Deriving keys used to securely process electronic messages
64797283259Image data recording device, method for controlling image data recording device, and a program for controlling an image data recording system, each using a common key
64807281271Exception handling validation system and method
64817281268System, method and computer program product for detection of unwanted processes
64827281267Software audit system
64837281266Personal computer internet security system
64847281265System and method for communicating packets in a network environment
64857281264Security system and method for PnP device coupled to network client
64867281244Using a digital fingerprint to commit loaded data in a device
64877281133Trusted and secure techniques, systems and methods for item delivery and execution
64887281132Using token-based signing to install unsigned binaries
64897281130Storing authentication sequences for expedited login to secure applications
64907281129Secure computer network with a network screen
64917281128One pass security
64927281010Trusted computing platform with dual key trees to support multiple public/private key systems
64937280983Information recording medium having reproduction control program recorded thereon and reproduction control program
64947280669Digital image watermarking apparatus and method
64957280663Encryption system based on crossed inverse quasigroups
64967280661Data output method and apparatus, data playback method and apparatus, data recording method and apparatus, and data recording and playback method and apparatus
64977280659Pseudorandom number generating apparatus or encryption or decryption apparatus using the same
64987280658Systems, methods, and computer program products for accelerated dynamic protection of data
64997280657Data encryption and decryption system and method using merged ciphers
65007280529Providing network management access through user profiles
65017278169Controlling the downloading and recording of digital data
65027278168Dynamic enabling of functionality in electronic document readers
65037278165Method and system for implementing digital rights management
65047278164Software usage/procurement management
65057278160Presentation of correlated events as situation classes
65067278031Secure distribution of portable game software
65077278029Program writable IC card and method thereof
65087278021Information processing device, information processing system, authentication method, storage medium and program
65097278020Digital watermarking apparatus and application apparatus using the same
65107278019Method of hindering the propagation of a computer virus
65117278018Optical sensing device for reading coded data on a surface and registration network for same
65127278017Method and device for secure wireless transmission of information
65137277941System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device
65147277549System for implementing business processes using key server events
65157277548Cryptographic method and computer program product for use in wireless local area networks
65167277546Methods and apparatus for multi-level dynamic security system
65177277545Scrambler and scrambling method
65187277543Cryptographic combiner using two sequential non-associative operations
65197277541Method and system for using a portion of a digital good as a substitution box
65207277540Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography
65217275264Method of restricting access, for the benefit of authorized users, to resources belonging to interactive services with at least one package of services
65227275262Method and system architecture for secure communication between two entities connected to an internet network comprising a wireless transmission segment
65237275257Remote controlled computer system and method of operating the same
65247275163Asynchronous configuration
65257275162On-line directory assistance system
65267275156Method and apparatus for establishing and using a secure credential infrastructure
65277275155Chain of trust processing
65287274804Method and apparatus for hashing data
65297274790Scrambling and descrambling a high definition TV signal
65307274789Information recording/reproducing apparatus with security measure
65317273164Postage metering system
65327272858Digital rights management (DRM) encryption and data-protection for content on a relatively simple device
65337272857Method/system for preventing identity theft or misuse by restricting access
65347272849System and method for sharing data
65357272848Method for device security in a heterogeneous storage network environment
65367272815Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects
65377272727Method for managing external storage devices
65387272724User alerts in an anti computer virus system
65397272723USB-compliant personal key with integral input and output devices
65407272722Method for industrially changing the passwords of AIX/UNIX users
65417272721System and method for automated border-crossing checks
65427272720Date-and-time management device and signature generation apparatus with date-and-time management function
65437272719Method to control access between network endpoints based on trust scores calculated from information system component analysis
65447272718Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis
65457272716Enterprise secure messaging architecture
65467272714Method, apparatus, and program for automated trust zone partitioning
65477272582Fee determination device
65487272581Method and system for optimizing throughput of mailing machines
65497272231Encrypting data for access by multiple users
65507272230Encryption system and control method thereof
65517272229Digital work protection system, key management apparatus, and user apparatus
65527272228System and method for securing code and ensuring proper execution using state-based encryption
65537272226Split-key key-agreement protocol
65547270193Method and system for distributing programs using tamper resistant processor
65557269743Method and apparatus for secure data mirroring a storage system
65567269740Method to protect software against unwanted use with a "variable principle"
65577269737System and method for biometric authorization for financial transactions
65587269736Distributed cryptographic methods and arrangements
65597269735Instance specific digital watermarks
65607269734Invisible digital watermarks
65617269732Securing access to an application service based on a proximity token
65627269730Method and apparatus for providing peer authentication for an internet key exchange
65637269729Relational database management encryption system
65647269728Apparatus and method for distributing management keys in a multicast domain
65657269727System and method for optimizing authentication in a network environment
65667269726Lightweight public key infrastructure employing unsigned certificates
65677269639Method and system to provide secure in-band management for a packet data network
65687269622Watermarking messaging sessions
65697269576Content rendering apparatus
65707269261Key escrow systems
65717269259Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
65727269258Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device
65737269257System and method for processing information using encryption key block
65747269256Electronic-monetary system
65757267266Security system
65767266846System and method of facilitating compliance with information sharing regulations
65777266837Authentication, authorization, and accounting (AAA) server
65787266703Single-pass cryptographic processor and method
65797266702Method and system for managing security material and services in a distributed database system
65807266699Cryptographic infrastructure for encrypting a database
65817266697Stealthy audio watermarking
65827266696Electronic postmarking without directly utilizing an electronic postmark server
65837266695Data updating method and data updating system
65847266693Validated mutual authentication
65857266691Contents providing system
65867266690Methods and systems for protecting information in paging operating systems
65877266689Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
65887266688Methods for improved security of software applications
65897266685Time certification in a wireless communications network
65907266684Internet third-party authentication using electronic tickets
65917266681Network communications security agent
65927266531Mail processing system with unique mailpiece authorization assigned in advance of mailpieces entering carrier service mail processing stream
65937266529Method and apparatus for executing code in accordance with usage rights
65947266215Image forming apparatus and copy management system
65957266203Information recording/reproducing system being able to limit an access and a method thereof
65967266202Information processing device and method, and program storage medium
65977266201Non-disruptive authentication administration
65987266200Method and apparatus for encryption of data
65997266199Incorporating shared randomness into distributed cryptography
66007266197Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors
66017263723Apparatus and method for outputting digital information
66027263720Method and mechanism for validating legitimate software calls into secure software
66037263616Ultrasound imaging system having computer virus protection
66047263615Apparatus and method for detecting embedded watermarks
66057263614Implicit access for communications pathway
66067263612Communication system and management apparatus and method for restricting functions in communication system
66077263610Secure multicast flow
66087263608System and method for providing endorsement certificate
66097263607Categorizing electronic messages based on trust between electronic messaging entities
66107263508Method and system for online purchasing using sensor with identifier
66117263205System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities
66127263192Establishing an encrypted session
66137263191Method and apparatus for encrypting data
66147263189Data transmission and receiving apparatus for digital broadcast signals which include control information
66157263188Data delivery system, server apparatus, reproducing apparatus, data delivery method, data playback method, storage medium, control, signal, and transmission data signal
66167263187Batch mode session-based encryption of video on demand content
66177263185Key based decipher including its generation, distribution and usage
66187263056Apparatus and methods for securing information in storage media
66197260847Antivirus scanning in a hard-linked environment
66207260845Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems
66217260840Multi-layer based method for implementing network firewalls
66227260837Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics
66237260835Bluetooth.TM. based security system
66247260834Cryptography and certificate authorities in gaming machines
66257260832Process for preventing virus infection of data-processing system
66267260830Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy
66277260726Method and apparatus for a secure computing environment
66287260723Masked digital signatures
66297260722Digital multimedia watermarking for source identification
66307260720Device authentication system and method for determining whether a plurality of devices belong to a group
66317260719Information processing system, information processing method, and information processing device
66327260718Method for adding external security to file system resources through symbolic link references
66337260717System and method for performing kernel-mode operations
66347260715Method and apparatus for revocation list management
66357260636Method and apparatus for preventing unauthorized access by a network device
66367260556Content rendering device with usage rights
66377260555Method and architecture for providing pervasive security to digital assets
66387260552Secure remote electronic voting system and cryptographic protocols and computer programs employed
66397260223Data transfer system
66407260221Personal communicator authentication
66417260218Configurable circuit with configuration data protection features
66427260216State machine representation for encrypting and decrypting a set of data values and method for protecting the same
66437260215Method for encryption in an un-trusted environment
66447257842Pre-approval of computer files during a malware detection
66457257839Calculation of identifier codes distributed among pan devices
66467257836Security link management in dynamic networks
66477257835Securely authorizing the performance of actions
66487257833Architecture for an integrated policy enforcement system
66497257716Method and apparatus for uploading mass-distributed content to a server
66507257714Electronic data storage medium with fingerprint verification capability
66517257712Runtime digital signatures
66527257711Efficient authenticated dictionaries with skip lists and commutative hashing
66537257710Additional-data embedding apparatus and additional-data embedding method
66547257708Steganographic authentication
66557257580Method, system, and program for restricting modifications to allocations of computational resources
66567257542Secure on-line ticketing
66577257229Apparatus and method for key scheduling
66587257228Account authority digital signature (AADS) system using encoded information
66597257227System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems
66607257225System and method for high speed reversible data encryption
66617257224Cryptographical pseudo-random number generation apparatus and program
66627254838Copy protection method and system for digital media
66637254716Security supervisor governing allowed transactions on a system bus
66647254712System and method for compressing secure e-mail for exchange with a mobile data communication device
66657254708Apparatus and method for wireless device set-up and authentication using audio authentication.sub.--information
66667254707Platform and method for remote attestation of a platform
66677254559System and method for collection, distribution, and use of information in connection with commercial real estate
66687254295Optical fiber interferometer with relaxed loop tolerance and QKD system using the same
66697254237System and method for establishing a secure connection
66707254235Receiving mixed-media data
66717254234Method and apparatus for encrypting and decrypting information
66727254233Fast encryption and authentication for data processing systems
66737251834Filtering a permission set using permission requests associated with a code assembly
66747251832Secure streaming container
66757251828Flexible method of security data backup
66767251824Accessing a private network
66777251734Secure integrated circuit including parts having a confidential nature and method for operating the same
66787251731Call set-up from a mobile radio telephone terminal with biometric authentication
66797251730Method and apparatus for simplified audio authentication
66807251729Authentication method for establishing connection between devices
66817251728Secure and reliable document delivery using routing lists
66827251635Method and apparatus for managing a key management system
66837251633Method or system for executing deferred transactions
66847251330Content playback system, content playback method, content playback requesting apparatus, and temporary playback apparatus
66857251327Data transmission apparatus, data transmission method, and data recording medium
66867251326Method and apparatus for data encryption
66877249382Distributing access to a data item
66887249379Method and apparatus for implementing process-based security in a computer system
66897249377Method for client delegation of security to a proxy
66907249376Firewall providing enhanced network security and user transparency
66917249372Network based document distribution method
66927249262Method for restricting access to a web site by remote users
66937249261Method for securely supporting password change
66947249260Method and apparatus for implementing a pluggable password obscuring mechanism
66957249259Hybrid signature scheme
66967249258Method and system for assuring an original
66977249257Digitally watermarked maps and signs and related navigational tools
66987249256Encryption protocol
66997249255Apparatus and method for a hash processing system using multiple hash storage areas
67007249111Method of assigning value codes
67017249102Original data circulation method, system, apparatus, and computer readable medium
67027249100Service discovery access to user location
67037248739Semiconductor device for compressing video signals with copy protection information
67047248699Encryption method using synchronized continuously calculated pseudo-random key
67057248698System for generating pseudorandom sequences
67067248697Apparatus and method for scrambling and descrambling data wordwise in optical disk system
67077248696Dynamic system bus encryption using improved differential transitional encoding
67087248695Systems and methods for transmitting quantum and classical signals over an optical network
67097248693Secure network-based system for the distributed printing of documents
67107248692Method of and apparatus for determining a key pair and for generating RSA keys
67117248691Hashing using multiple sub-hashes
67127248069Method and apparatus for providing security for debug circuitry
67137246378Controlling and tracking access to disseminated information
67147246373Methods and apparatus for virtual private network based mobility
67157246371System and method for filtering unavailable devices in a presence and availability management system
67167246247Secure device
67177246246System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key
67187246242Integrity protection method for radio network signaling
67197246241Apparatus and method for securely realizing cooperative processing
67207246240Quantum digital signatures
67217246239Digital watermarks for checking authenticity of printed objects
67227246238System and method for providing integration via a dial-up interface
67237246237Method and device for the generation of several channels in an IFF type system
67247246236Method and apparatus for providing peer authentication for a transport layer session
67257246235Time varying presentation of items based on a key hash
67267246234Transmitter device, transmitting method, receiver device, receiving method, communication system, and program storage medium
67277246232Methods and apparatus for scalable distributed management of wireless virtual private networks
67287246231Location privacy through IP address space scrambling
67297246230Single sign-on over the internet using public-key cryptography
67307246097Methods and apparatus for generating secure endorsed transactions
67317245740Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method
67327245725Dual processor framer
67337245724Rekey operation with multiplexing capability
67347245723Chaotic communication system and method using modulation of nonreactive circuit elements
67357245718Low bandwidth zero knowledge authentication protocol and device
67367243372Modified Harvard architecture processor having data memory space mapped to program memory space with erroneous execution protection
67377243367Method and apparatus for starting up a network or fabric
67387243366Key management protocol and authentication system for secure internet protocol rights management architecture
67397243239Click passwords
67407243237Secure communication with a keyboard or related device
67417243236Systems and methods for using cryptography to protect secure and insecure computing environments
67427243235Mandatory access control (MAC) method
67437243233System and method for secure communication between electronic devices
67447243232Key agreement and transport protocol
67457243231Sensory verification of shared data
67467243230Transferring application secrets in a trusted operating system environment
67477243229Exclusive access control apparatus and method
67487243228Data storage with CBC-mode encryption processing
67497243227Method and apparatus to copy protect software programs
67507243225Data handling in IPSec enabled network stack
67517242776Method and apparatus for the generation and distribution of random bits
67527242775Optical pulse calibration for quantum key distribution
67537242774Quantum cryptography based on phase entangled photons
67547242772Encryption apparatus and method for synchronizing multiple encryption keys with a data stream
67557242771Contents management system
67567242769Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
67577242768Super secure migratable keys in TCPA
67587240830Layered SIM card and security function
67597240369Plug and play device and access control method therefor
67607240366End-to-end authentication of session initiation protocol messages using certificates
67617240220Method and apparatus for cryptographic conversion in a data storage system
67627240216IC card having block state of operation and method of providing information security for the same
67637240212Method and system for secure alert messaging
67647240210Hash value computer of content of digital signals
67657240209Methods of invisibly embedding and hiding data into soft-copy text documents
67667240208Encrypting digital camera with automatic encryption key deletion
67677240206Information signal copy managing method, information signal recording method, information signal output apparatus, and recording medium
67687240205Systems and methods for verifying documents
67697240204Scalable and unified multiplication methods and apparatus
67707240203Method and apparatus for establishing secure sessions
67717240202Security context sharing
67727240201Method and apparatus to provide secure communication between systems
67737240200System and method for guaranteeing software integrity via combined hardware and software authentication
67747240199System and method for verifying delivery and integrity of electronic messages
67757240198Honesty preserving negotiation and computation
67767240197Method and apparatus for encryption and decryption in remote data storage systems
67777240195Certified shuffle-decrypting system, certified shuffle-decrypting method and certified shuffle-decryption verifying method
67787240194Systems and methods for distributing trusted certification authorities
67797240193Systems and methods that provide external network access from a protected network
67807240191Method and apparatus for initializing security information on a network device
67817240036Method and system for facilitation of wireless e-commerce transactions
67827240035Method and apparatus for masking private mailing address information by manipulating delivery transactions
67837240034Method for secure electronic transaction and corresponding system
67847240033Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system
67857239709Data recording/reproducing method, data recording/reproducing system, recording apparatus
67867239707Staggered pulse acquisition method and apparatus
67877239701Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem
67887239346System and architecture that supports a multi-function semiconductor device between networks and portable wireless communications products
67897237261Method, system and gateway allowing secured end-to-end access to WAP services
67907237255Method and system to dynamically present a payment gateway for content distributed via a network
67917237125Method and apparatus for automatically deploying security components in a content distribution system
67927237123Systems and methods for preventing unauthorized use of digital content
67937237122Method and apparatus to facilitate software installation using embedded user credentials
67947237120Method for producing and checking forge-proof documents
67957237118Methods and systems for authentication of a user for sub-locations of a network location
67967237117Universal secure registry
67977237116Digital signature system and method based on hard lattice problem
67987237115Authenticating concealed private data while maintaining concealment
67997237114Method and system for signing and authenticating electronic documents
68007237112Information processing system
68017237108Encryption of streaming control protocols and their headers
68027237081Secure mode for processors supporting interrupts
68037236958Electronic software license with software product installer identifier
68047236957Method for remotely authorizing a payment transaction file over an open network
68057236614Device, system, and method for identifying living bodies and renewing registration data
68067236610Authenticating executable code and executions thereof
68077236598Systems and methods for communication protection
68087236594Random generator description
68097236592Efficient stream cipher system and method
68107236591Method for performing turbo decoding in mobile communication system
68117236590Method and apparatus for protecting data
68127236589Device for point compression for Jacobians of hyperelliptic curves
68137234063Method and apparatus for generating pairwise cryptographic transforms based on group keys
68147234062Authentication of remote appliance messages using an embedded cryptographic device
68157234061Methods and apparatus for verifying modules from approved vendors
68167234059Anonymous authenticated communications
68177234058Method and apparatus for generating pairwise cryptographic transforms based on group keys
68187233981System and method for multi-site load-balancing of encrypted traffic
68197233948Methods and apparatus for persistent control and protection of content
68207233929Postal system intranet and commerce processing for on-line value bearing system
68217233671Method for storing a security start value in a wireless communications system
68227233666Method and apparatus for increasing the entropy of a pseudorandom number
68237233665Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
68247233664Dynamic security authentication for wireless communication networks
68257233663Key generation performance improvement
68267233662Numerical array output device, a numerical array output method, an encryption device, and a decryption device
68277231669Binding content to a portable storage device or the like in a digital rights management (DRM) system
68287231664System and method for transmitting and receiving secure data in a virtual private group
68297231663System and method for providing key management protocol with client verification of authorization
68307231661Authorization services with external authentication
68317231657User authentication system and methods thereof
68327231528Method of editing/restoring electronic information
68337231526System and method for validating a network session
68347231525Authentification of data in a digital transmission system
68357231524Method for watermarking computer programs
68367231523Method and apparatus for facilitating secure extension of an application
68377231522Information processing apparatus, method for controlling the same, and storage medium
68387231521Scheme for authentication and dynamic key exchange
68397231519Secure inter-node communication
68407231518System and method for authenticating a storage device for use with driver software in a storage network
68417231517Apparatus and method for automatically authenticating a network client
68427231371Method and system for ordering and delivering digital certificates
68437231370Method and apparatus for organizational software license sharing
68447231369Digital contents provision system, server device incorporated in the system, digital contents provision method using the system, and computer program for executing the method
68457231271Steganographic method for covert audio communications
68467231061Adaptive prediction filtering for digital watermarking
68477231050Protection against unintentional file changing
68487231049Electronic mailing system
68497231048Key sharing system, public key cryptosystem, signature system, key sharing apparatus, encryption apparatus, decryption apparatus, signature apparatus, authentication apparatus, key sharing method, encryption method, decryption method, signature method, authentication method, and programs
68507231047Private retrieval of digital objects
68517231046Method for controlling connections to a mobile station
68527231045Secure transaction modem storing unique indicia
68537231044Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors
68547231041Method, device, and system for secure motor vehicle remote keyless entry
68557231040Multiprime RSA public key cryptosystem
68567228566Automated computer system security compromise
68577228563Shell code blocking system and method
68587228438Computer network security system employing portable storage device
68597228437Method and system for securing local database file of local content stored on end-user system
68607228435Program executing method in service system and program executing apparatus for the same
68617228430Security system for preventing a personal computer from being used by an unauthorized people
68627228429Multimedia network appliances for security and surveillance applications
68637228427Method and system to securely distribute content via a network
68647228426Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
68657228425Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections
68667228424Method and system for using optical disk drive as a biometric card reader for secure online user authentication
68677228422Packet transmission/reception device
68687228421Technique for generating control messages with reason information between nodes in a data network
68697228417Simple secure login with multiple-authentication providers
68707228415Method and apparatus for transferring a communication session
68717228414Method and apparatus for transferring a communication session
68727228413Data transmitting/receiving method and its receiver
68737228412Bufferless secure sockets layer architecture
68747227956Simple encrypted transmission system suitable for intermittent signals
68757227954Secure data transmission system and method
68767227950Distributed quantum encrypted pattern generation and scoring
68777227949Separate self-synchronizing packet-based scrambler having replay variation
68787227948Encryption apparatus and method, and decryption apparatus and method based on block encryption
68797227947Cryptographic method and cryptographic device
68807227499Dual platform location-relevant service
68817225469BIOS lock encode/decode driver
68827225467Active intrusion resistant environment of layered object and compartment keys (airelock)
68837225465Method and system for remote management of personal security devices
68847225463Secure network architecture method and apparatus
68857225343System and methods for adaptive model generation for detecting intrusions in computer systems
68867225339Information recording/playback apparatus and method
68877225336System and a method for giving run authorization to a program installed on a computer
68887225332Methods and apparatus to perform cryptographic operations on received data
68897225331System and method for securing data on private networks
68907225329Enhanced CSU/DSU (channel service unit/data service unit)
68917225262System and method for selecting an external user interface using spatial information
68927225243Device discovery methods and systems implementing the same
68937225169Method and system for commerce with full anonymity
68947225166Remote authentication of two dimensional barcoded indicia
68957225161Method and system for initializing a key management system
68967225160Digital works having usage rights and method for creating the same
68977225159Method for authenticating and securing integrated bookstore entries
68987224806Threshold cryptography scheme for conditional access systems
68997224805Consumption of content
69007224804Information processing device, information processing method, and program storage medium
69017224802Wireless communication device, and method for controlling the same, which authenticates partner device when connecting thereto
69027224799Digital watermarking device, digital watermark insertion method and digital watermark detection method
69037224798Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system
69047224796Pseudorandom number generating apparatus or encryption or decryption apparatus using the same
69057224795Variable-length key cryptosystem
69067224310Method and device for the recognition of the origin of encrypted data broadcasting
69077222368Mechanism for controlling if/when material can be printed on a specific printer
69087222365Non-algorithmic vectored steganography
69097222361Computer security with local and remote authentication
69107222312Secure exchange of information in electronic design automation
69117222242Interface for facilitating facsimile transmissions via wireless communications networks
69127222241Building security and access protection system
69137222240Token for storing installation software and drivers
69147222239Dynamic security system
69157222238Method and system for real-time registration of transactions with a security module
69167222237Secure multimedia data transmission method
69177222236Evidencing indicia of value using secret key cryptography
69187222234Method for key agreement for a cryptographic secure point--to--multipoint connection
69197222233Method for secure remote backup
69207222232License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer
69217222231Data security for distributed file systems
69227222229System for automated boot from disk image
69237222108Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method
69247222106Mechanisms for handling software license agreements on multi-user system
69257222104Method and apparatus for transferring usage rights and digital work having transferrable usage rights
69267222101System and method for securing data through a PDA portal
69277221764Security key distribution using key rollover strategies for wireless networks
69287221763High throughput AES architecture
69297221762Authenticated ID-based cryptosystem with no key escrow
69307221758Practical non-malleable public-key cryptosystem
69317221756Constructions of variable input length cryptographic primitives for high efficiency and high security
69327219238Data transfer control device, electronic instrument, and data transfer control method
69337219235Locked portal unlocking control apparatus and method
69347219234System and method for managing access rights and privileges in a data processing system
69357219233Methods and apparatus for associating a user with content in a collaborative whiteboard system
69367219231Extensible authentication system and method
69377219230Optimizing costs associated with managing encrypted data
69387219229Protected communication system
69397219227Data distribution system and recording device and data provision device used therefor
69407219226Method and apparatus for encrypting data
69417219225Network arrangement for communication
69427219224Method and apparatus for transferring fragmented audio/video control commands using an independent software layer
69437219223Method and apparatus for providing data from a service to a client based on encryption capabilities of the client
69447219222Method and system to grant access to software options resident on a medical imaging device
69457219152Packet filtering methods and systems
69467218736Data transfer method
69477218735Cryptography method on elliptic curves
69487218733Encryption method, program for encryption, memory medium for storing the program, and encryption apparatus, as well as decryption method and decryption apparatus
69497218643Relay device and communication device realizing contents protection procedure over networks
69507216368Information processing apparatus for watermarking digital content
69517216367Safe memory scanning
69527216238System and method for controlling usage of software on computing devices
69537216237System and method for trusted communication
69547216235Drive/host locking system
69557216233Apparatus, methods, and computer program products for filtering information
69567216232Method and device for inserting and authenticating a digital signature in digital data
69577216231Method and system for establishing a wireless communication link
69587216229Method based on border gateway protocol message for controlling messages security protection
69597216228Recording medium recording and/or reproduction apparatus, recording and/or reproduction method
69607216227Method and system for controlling the use of addresses using address computation techniques
69617216226Unique and secure identification of a networked computing node
69627216224Method and system for user registration using processing sensor
69637215978Mobile terminal apparatus, mobile terminal settings changing system, method used therefor, and program thereof
69647215780Method and apparatus for elliptic curve scalar multiplication
69657215779Information providing apparatus and method, information processing apparatus and method, and program storage medium
69667215778Encrypted content recovery
69677215776Method and apparatus for the compression and decompression of audio files using a chaotic system
69687215775Ad-hoc radio communication verification system
69697215773Key validation scheme
69707215771Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network
69717215770System and method for partially encrypted multimedia stream
69727215769Non-autonomous dynamical orbit cryptography
69737213267Method of protecting a microcomputer system against manipulation of data stored in a storage assembly of the microcomputer system
69747213260Systems and methods for upstream threat pushback
69757213151Method and computer system for encoding of information into a representation
69767213150Method and apparatus for secure message queuing
69777213149Message authentication
69787213148Apparatus and method for a hash processing system using integrated message digest and secure hash architectures
69797213147Methods and apparatus for managing secure collaborative transactions
69807213146System and method for establishing security profiles of computers
69817213145Method and apparatus for secure internet protocol communication in a call processing system
69827213144Efficient security association establishment negotiation technique
69837213005Digital content distribution using web broadcasting services
69847212980Trial management system, program, and computer readable recording medium recording the program
69857212638Wireless cryptographic fill system and method
69867212634Data distribution
69877212633Expansion key generating device, encryption device and encryption system
69887212631Apparatus and method for performing KASUMI ciphering
69897212630Method and apparatus for encryption using partial information
69907210166Method and system for secure, one-time password override during password-protected system boot
69917210038Method for validating an authentication chip
69927210037Method and apparatus for delegating digital signatures to a signature server
69937210036Method and system for delivering secure e-mail
69947209989Transfer acknowledgement mechanism for an MSL architecture
69957209903Method and system for facilitation of wireless e-commerce transactions
69967209902Repository with security class and method for use thereof
69977209732Audio scrambler and recorder for cellular telephones
69987209571Authenticating metadata and embedding metadata in watermarks of media signals
69997209563Process for creating and managing at least one cryptographic key, and system for its implementation
70007209562Method and apparatus for decrypting encrypted data stored on a record carrier
70017209561System and method for generating encryption seed values
70027209560Data communications
70037209556Encryption apparatus and method, and decryption apparatus and method based on block encryption
70047209555Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device
70057207068Methods and apparatus for modeling based on conversational meta-data
70067207063Method and apparatus for determining secure endpoints of tunnels in a network that uses internet security protocol
70077207062Method and apparatus for protecting web sites from distributed denial-of-service attacks
70087207060Method, system and computer program product for secure ticketing in a communications device
70097207059Wireless communication system utilizing antenna dongle
70107206945Parallel distributed sample descrambling apparatus of passive optical network and method thereof
70117206943Display unit storing and using a cryptography key
70127206940Methods and systems providing per pixel security and functionality
70137206939File storage system and a NAS server
70147206938Key sequence rhythm recognition system and method
70157206935System and method for protecting network appliances against security breaches
70167206934Distributed indexing of identity information in a peer-to-peer network
70177206933Software modem with privileged mode driver authentication
70187206932Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies
70197206850Communication system, relay device, service providing device, relaying method, service providing method and program product
70207206765System and method for supplying and managing usage rights based on rules
70217206430Data processing apparatus and method of processing data
70227206412Reception terminal, key management apparatus, and key updating method for public key cryptosystem
70237206411Rapid decryption of data by key synchronization and indexing
70247206409Motion picture anti-piracy coding
70257206408Countermeasure method in an electronic component using a dynamic secret key cryptographic algorithm
70267205883Tamper detection and secure power failure recovery circuit
70277205785Apparatus and method for repairing logic blocks
70287203967Methods and apparatus for content protection in a wireless network
70297203965System and method for home network content protection and copy management
70307203959Stream scanning through network proxy servers
70317203958Program use authorization method
70327203932Method and system for using idiom recognition during a software translation process
70337203845Multiple trust modes for handling data
70347203841Encryption in a secure computerized gaming system
70357203840Access control for interactive learning system
70367203839Method for providing secure access to information held in a shared repository
70377203837Methods and systems for unilateral authentication of messages
70387203836Method and device for the mutual authentication of components in a network using the challenge-response method
70397203834Method of updating encryption keys in a data communication system
70407203833History based rights computation for managed code
70417203343System and method for determining likely identity in a biometric database
70427203319Apparatus and method for installing a decryption key
70437203317System for enabling lazy-revocation through recursive key generation
70447203316Signing and signature authentication of messages
70457203312Data reproduction apparatus and data reproduction module
70467203311Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device
70477202773Authentication information communication system and method, portable information processing device and program furnishing medium
70487201659Data delivery system, data delivery server and video game device
70497200868Apparatus for encryption key management
70507200860Method and system for secure network service
70517200765Docking station for a wireless mouse with control of a computer
70527200761Method to use secure passwords in an unsecure program environment
70537200755Method and system for providing gated access for a third party to a secure entity or service
70547200753Authentication apparatus and computer-readable storage medium
70557200752Threshold cryptography scheme for message authentication systems
70567200751Watermark system
70577200750Method for distributing encryption keys for an overlay data network
70587200749Method and system for using electronic communications for an electronic contract
70597200748E-mail printer and e-mail printing method having authentication procedure
70607200747System for ensuring data privacy and user differentiation in a distributed file system
70617200664Distributed network storage system with virtualization
70627200655System and method for distributed management of shared computers
70637200637System for processing electronic mail messages with specially encoded addresses
70647200575Managing access to digital content
70657200574System for controlling the distribution and use digital works using digital tickets
70667200549Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information
70677200233System and method for fast data encryption/decryption using time slot numbering
70687200231Information processing system, information processing apparatus, and computer-readable recording medium
70697200229Modular communication platform
70707200226Cipher block chaining decryption
70717200225Elliptic curve point ambiguity resolution apparatus and method
70727197768Software modem for communicating data using encrypted data and unencrypted control codes
70737197765Method for securely using a single password for multiple purposes
70747197646System and method for preventing automated programs in a network
70757197644Systems and methods for providing hardcopy secure documents and for validation of such documents
70767197642Consumable authentication protocol and system
70777197641Method and device for the transfer of electronic data volumes
70787197640Use of identification codes in the handling and management of communications
70797197639Cryptographic countermeasures against connection depletion attacks
70807197638Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection
70817197568Secure cache of web session information using web browser cookies
70827197563Systems and methods for distributed network protection
70837197484Asset management advice system and recording medium containing program of the system
70847197145Method for setting up radio bearer in mobile communication system
70857197144Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users
70867197141RSA cryptographic processing apparatus for IC card
70877194767Screened subnet having a secured utility VLAN
70887194759Used trusted co-servers to enhance security of web interaction
70897194632Method for secure biometric authentication/identification, biometric data input module and verification module
70907194631Information-processing apparatus having a user-switching function and user-switching method for use in the apparatus
70917194629Apparatus for authenticating memory space of an authorized accessory
70927194628Methods and systems for group authentication using the naccache-stern cryptosystem in accordance with a prescribed rule
70937194626Hardware-based secure code authentication
70947194625Method and apparatus for authenticating registry information
70957194624Page encryption system
70967194623Data event logging in computing platform
70977194622Network partitioning using encryption
70987194621Method and apparatus for encrypting data communicated between a client and a server that use an unencrypted data transfer protocol
70997194620Method for real-time data authentication
71007194619Remotely booting devices in a dense server environment without manually installing authentication parameters on the devices to be booted
71017194617Method and apparatus to prevent the unauthorized copying of digital information
71027194438Electronic payment schemes in a mobile environment for short-range transactions
71037194092Key-based secure storage
71047194090Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium
71057194089Method for reducing a value modulo a shared secret
71067191469Methods and systems for providing a secure application environment using derived user accounts
71077191468System and method for multidimensional data compression
71087191466Flexible system and method of user authentication for password based system
71097191346Data transfer system, data transfer apparatus, data recording apparatus, edit controlling method and data processing method
71107191343Voucher driven on-device content personalization
71117191340Generation of a secret quantity based on an identifier of an integrated circuit
71127191339System and method for using a PLD identification code
71137191336Method for embedding information in an image
71147191335Method and apparatus for encrypted transmission
71157191334Embedding auxiliary data in a signal
71167191332Digital rights management for multicasting content distribution
71177191331Detection of support for security protocol and address translation integration
71187191156Digital watermarking systems
71197191155License transmitting and distributing system under offline environment and method thereof
71207190793Key generation in a communication system
71217190789Method and apparatus for finite field basis conversion
71227190788Methods and apparatus for encrypting a binary string
71237190787Stream cipher having a combiner function with storage based shuffle unit
71247188368Method and apparatus for repairing damage to a computer system using a system rollback mechanism
71257188364Personal virtual bridged local area networks
71267188362System and method of user and data verification
71277188360Universal authentication mechanism
71287188358Email access control scheme for communication network using identification concealment mechanism
71297188258Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects
71307188257Falsification detection system, and falsification detection method and medium
71317188251System and method for secure message-based leasing of resources in a distributed computing environment
71327188249Derivation and quantization of robust non-local characteristics for blind watermarking
71337188248Recovering from de-synchronization attacks against watermarking and fingerprinting
71347188247System and method of content copy control
71357188246System for adding electronic signature to a report associated with an image file
71367188241Protecting software from unauthorized use by applying machine-dependent modifications to code modules
71377188240Method and system for encryption of web browser cache
71387188161Method for configuring a network element at a customer premise via a mobile data terminal
71397188089System and method for securely storing, generating, transferring and printing electronic prepaid vouchers
71407188087Devices, systems and methods for restricting use of digital content
71417187772Anonymous transactions based on distributed processing
71427185362Method and apparatus for security in a data processing system
71437185358Method and apparatus for preventing reuse of text, images and software transmitted via networks
71447185357Method and mechanism for implementing synonym-based access control
71457185208Data processing
71467185205Crypto-pointers for secure data storage
71477185202Method and apparatus for obtaining an electronic signature from a browser
71487185201Content identifiers triggering corresponding responses
71497185200Server-side watermark data writing method and apparatus for digital signals
71507185199Apparatus and methods for providing secured communication
71517185198Apparatus and method for authentication and method for registering a person
71527185196Key caching system
71537185195Certificate based digital rights management
71547185194System and method for distributed group management
71557185193Person authentication system, person authentication method, and program providing medium
71567185192Methods and apparatus for controlling access to a resource
71577185092Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor
71587184988Methods for operating infrastructure and applications for cryptographically-supported services
71597184986Content transaction system and method, and program providing medium therefor
71607184985Method, system, and apparatus for providing secure access to a digital work
71617184572Using steganographic encoded information with maps
71627184555Quantum computation
71637184553Method and system for encryption of optical signals
71647184551Public key cryptography using matrices
71657184546Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications
71667184545Semiconductor integrated circuit and method of testing semiconductor integrated circuit
71677181769Network security system having a device profiler communicatively coupled to a traffic monitor
71687181767Keypad device security system and method
71697181766Methods and system for providing network services using at least one processor interfacing a base network
71707181765Method and apparatus for providing node security in a router of a packet network
71717181764System and method for a subscription model trusted email database for use in antispam
71727181761Rights management inter-entity message policies and enforcement
71737181624Information recording/playback apparatus and method
71747181623Scalable wide-area upload system and method
71757181622Derivation and quantization of robust non-local characteristics for blind watermarking
71767181621Methods and device for digitally signing data
71777181620Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
71787181618System and method for recovering a security profile of a computer system
71797181616Method of and apparatus for data transmission
71807181615Method and system for vehicle authentication of a remote access device
71817181614Method and arrangement in a communication network
71827181613System and method for providing secure internetwork services via an assured pipeline
71837181612Facilitating IPsec communications through devices that employ address translation in a telecommunications network
71847181602Method for exchanging at least one secret initial value between a processing station and a chip card
71857181542Method and system for managing and configuring virtual private networks
71867181431Interactive information services system and associated method for facilitating purchasing transactions
71877181043Data processing method and apparatus
71887181017System and method for secure three-party communications
71897181016Deriving a symmetric key from an asymmetric key for file encryption or decryption
71907181015Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
71917181014Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange
71927181012Secured map messages for telecommunications networks
71937181009Generating message digests according to multiple hashing procedures
71947181008Contents management method, content management apparatus, and recording medium
71957178169Method and apparatus for securing transfer of and access to digital content
71967178165Additional layer in operating system to protect system from hacking
71977178038Apparatus and method for reproducing user data
71987178035Write once system and method for facilitating digital encrypted transmissions
71997178030Electronically signing a document
72007178029Method and apparatus for validating a digital signature
72017178028Information processing apparatus and method, recording medium, and program
72027178026Identification code management method and management system
72037178025Access system utilizing multiple factor identification and authentication
72047178024Security service for an electronic marketplace
72057178023System and method to facilitate secure communication of data
72067178022Digital content cryptograph and process
72077177932Method, gateway and system for transmitting data between a device in a public network and a device in an internal network
72087177847Authorization token accompanying request and including constraint tied to request
72097177843Rights expression system
72107177426Electronic file protection using location
72117177425Device and method for securing information associated with a subscriber in a communication apparatus
72127177424Cryptographic apparatus and method
72137177423Method and apparatus for exponentiation in an RSA cryptosystem
72147177422Elliptic curve encryption processing method, elliptic curve encryption processing apparatus, and program
72157177421Authentication engine architecture and method
721671769343-D graphics texturing system using encrypted textures
72177176849Wireless security badge
72187174569Client security for networked applications
72197174568Method and system for securely distributing computer software products
72207174565Negotiating secure connections through a proxy server
72217174465Secure method for system attribute modification
72227174463Method and system for preboot user authentication
72237174460Distributed digital signature generation method and digitally signed digital document generation method and apparatus
72247174459Imprinting an identification certificate
72257174458Method of and apparatus for authenticating client terminal by making use of port access
72267174457System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party
72277174456Fast authentication and access control method for mobile networking
72287174455Method and system for delivering digital products electronically
72297174454System and method for establishing historical usage-based hardware trust
72307174021Systems and methods for providing secure server key operations
72317174019Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device
72327174018Security framework for an IP mobility system using variable-based security associations and broker redirection
72337171693Information security method and system
72347171692Asynchronous communication within a server arrangement
72357171688System, method and computer program for the detection and restriction of the network activity of denial of service attack software
72367171683Protecting against distributed denial of service attacks
72377171679Generating and maintaining encrypted passwords
72387171662System and method for software licensing
72397171567System for protecting information over the internet
72407171566Data encryption and decryption
72417171565Method and system for producing wise cards
72427171564Universal password generation method
72437171561Method and apparatus for detecting and extracting fileprints
72447171560Method and apparatus for securing and authenticating encoded data and documents containing such data
72457171559Method of exchanging digital data
72467171558Transparent digital rights management for extendible content viewers
72477171557System for optimized key management with file groups
72487171556VPN enrollment protocol gateway
72497171555Method and apparatus for communicating credential information within a network device authentication conversation
72507171554Method, computer program product and system for providing a switch user functionality in an information technological network
72517171553Method for providing a secure communication between two devices and application of this method
72527171412Restricted access model for hierarchical data structures
72537171389Identification, storage and display of land data on a website
72547171019Image processing apparatus and image processing method
72557171000Simplified addressing for private communications
72567170999Method of and apparatus for encrypting and transferring files
72577170997Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
72587170996Random number generation for encrypting cellular communications
72597170525Texturing system
72607168089Secured virtual network in a gaming environment
72617167987Use of biometrics to provide physical and logic access to computer devices
72627167986Upgradeable timestamp mechanism
72637167985System and method for providing trusted browser verification
72647167984Method and device for generating approximate message authentication codes
72657167982Securing decrypted files in a shared environment
72667167981Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email
72677167980Data comparison process
72687167979Invoking mutual anonymity by electing to become head of a return path
72697167843Apparatus for private personal identification number management
72707167842Architecture and method for operational privacy in business services
72717167841Content distributing system, content distributing service server, and community site server
72727167762System and method for implementing safety instrumented systems in a fieldbus architecture
72737167563Decoding device, decoding method and chip-card
72747167562Security method using information transmission by optical means, and an optical disk for implementing the method
72757167077Portable data carrier assembly comprising a security device
72767165180Monolithic semiconductor device for preventing external access to an encryption key
72777165179Digital signature verification and program transmission
72787165178System and method for facilitating signing by buyers in electronic commerce
72797165177Method of protecting an electronic chip against fraud
72807165176Access privilege authentication of client computer for services provided by server computer
72817165175Apparatus, system and method for selectively encrypting different portions of data sent over a network
72827165173System and method for secure over-the-air administration of a wireless mobile station
72837165110System and method for simultaneously establishing multiple connections
72847165051Electronic commerce system and method for detecting fraud
72857165050Media on demand via peering
72867164765Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack
72877162744Connected support entitlement system and method of operation
72887162649Method and apparatus for network assessment and authentication
72897162647Method and apparatus for cryptographic conversion in a data storage system
72907162645Storage device including a non-volatile memory
72917162641Weight based background discriminant functions in authentication systems
72927162639Method for generating many-time restrictive blind signatures
72937162638Electronic data management system and method
72947162637Image verification system
72957162636Method and apparatus for securing and authenticating encoded data and documents containing such data
72967162634Method for providing security on a powerline-modem network
72977162633Method and apparatus for hierarchical assignment of rights to documents and documents having such rights
72987162631Method and system for scripting commands and data for use by a personal security device
72997162630Systems and methods for implementing host-based security in a computer network
73007162536Validation of a connection between arbitrary end-nodes in a communications network
73017162456Method for private personal identification number management
73027162455Unique time generating device and authenticating device using the same
73037162453Protecting content from unauthorized reproduction
73047162452Key distribution via a memory device
73057162451Information content distribution based on privacy and/or personal information
73067162450Business method for determining quality and integrity of data content
73077162429System and method for managing sponsorships
73087162143Simplified method and related device for authentication of DVD system
73097162037Method for generating/regenerating an encryption key for a cryptographic method
73107162035Authentication method and system
73117162032Encryption of programs represented as polynomial mappings and their computations
73127162031Method and device for cryptographically processing data
73137159245Method for protecting a portable card
73147159244Audio data playback management system and method with editing apparatus and recording medium
73157159242Secure IPsec tunnels with a background system accessible via a gateway implementing NAT
73167159126Digital content cryptograph and process
73177159122Message digest instructions
73187159119Method and system for efficiently retrieving secured data by securely pre-processing provided access information
73197159118Methods and apparatus for embedding and recovering watermarking information based on host-matching codes
73207159117Electronic watermark data insertion apparatus and electronic watermark data detection apparatus
73217159116Systems, methods and devices for trusted transactions
73227159114System and method of securely installing a terminal master key on an automated banking machine
73237159113Distribution information management system and method
73247159111Isolation of communication contexts to facilitate communication of data
73257159110Identifying and coalescing identical objects encrypted with different keys
73267158953Method and system for limiting the use of user-specific software features
73277158641Recorder
73287158640Method and apparatus for re-synchronization of a stream cipher during handoff
73297158639Key generation
73307158636Multivariable cryptosystem
73317158635Generation of user equipment identification specific scrambling code for the high speed shared control channel

2006

73327155745Data storage device provided with function for user's access right
73337155742Countering infections to communications modules
73347155741Alteration of module load locations
73357155738System and method for managing a trusted email datastore
73367155737Integrating user specified extensions into an information access system
73377155645System and method for testing memory while an operating system is active
73387155615Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller
73397155612Desktop database data administration tool with row level security
73407155610Cryptocommunication system, transmission apparatus, and reception apparatus
73417155609Key exchange mechanism for streaming protected media content
73427155608Foreign network SPAM blocker
73437155607Method for authentication between apparatuses using challenge and response system
73447155605Data processing system and method for maintaining secure data blocks
73457155413Electronic apparatus and management system of the same
73467155015Optical disk apparatus and data randomizing method using for optical disk apparatus
73477154560Watermarking of digital image data
73487152693Password security utility
73497152245Installation of black box for trusted component for digital rights management (DRM) on computing device
73507152243Providing a secure hardware identifier (HWID) for use in connection with digital rights management (DRM) system
73517152242Modular system for detecting, filtering and providing notice about attack events associated with network security
73527152241Intelligent network scanning system and method
73537152240Method for communication security and apparatus therefor
73547152239System and method for preventing detection of a computer connection to an external device
73557152238Enabling mobility for point to point protocol (PPP) users using a node that does not support mobility
73567152165Trusted storage systems and methods
73577152163Content-recognition facilitator
73587152162Z-transform implementation of digital watermarks
73597152161Watermarking
73607152159Encrypted mail transmission system
73617152046Method and apparatus for tracking status of resource in a system for managing use of the resources
73627151832Dynamic encryption and decryption of a stream of data
73637151830Method, system, program product and state machine representation for encrypting and decrypting a message
73647150045Method and apparatus for protection of electronic media
73657150043Intrusion detection method and signature table
73667150040Authenticated firewall tunneling framework
73677150039Information processing system, portable electronic device, access apparatus for the portable electronic device, and method of using memory space
73687150038Facilitating single sign-on by using authenticated code to access a password store
73697149901Cryptographically protected paging system
73707149898Self-monitoring and trending service system with a cascaded pipeline with enhanced authentication and registration
73717149897Systems and methods for providing increased computer security
73727149895Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal
73737149894Public-key certificate issuance request processing system and public-key certificate issuance request processing method
73747149893System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient
73757149892Secure sockets layer proxy architecture
73767149803Method for content distribution in a network supporting a security protocol
73777149311Methods and apparatus for providing networked cryptographic devices resilient to capture
73787149310Method and system for authorizing generation of asymmetric crypto-keys
73797149309Time-dependent authorization
73807149308Cryptographic communications using in situ generated cryptographic keys for conditional access
73817146645Dedicated applications for user stations and methods for downloading dedicated applications to user stations
73827146640Personal computer internet security system
73837146638Firewall protocol providing additional information
73847146635Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service
73857146505Secure data exchange between date processing systems
73867146504Secure clock on computing device such as may be required in connection with a trust-based system
73877146503System and method of watermarking signal
73887146502Information processing apparatus and its control method, computer program, and storage medium
73897146500System for obtaining signatures on a single authoritative copy of an electronic record
73907146499Security system for replicated storage devices on computer networks
73917146498Computer and program recording medium
73927146344Method and system for making small payments using a payment card
73937146009Secure electronic messaging system requiring key retrieval for deriving decryption keys
73947143440User authentication system and method
73957143438Methods and apparatus for a computer network firewall with multiple domain support
73967143437System and user interface for managing user access to network compatible applications
73977143436Device authentication management system
73987143297Procedure for the protection of computer software and/or computer-readable data as well as protective equipment
73997143294Apparatus and method for secure field upgradability with unpredictable ciphertext
74007143292Information processing apparatus
74017143289System and method for delivering encrypted information in a communication network using location identity and key tables
74027143288Secure file system server architecture and methods
74037143286Digital certificates
74047143285Password exposure elimination for digital signature coupling with a host identity
74057143284ABDS method and verification status for authenticating entity access
74067143283Simplifying the selection of network paths for implementing and managing security policies on a network
74077143282Communication control scheme using proxy device and security protocol in combination
74087143188Method and apparatus for network address translation integration with internet protocol security
74097143163System and method for exacting a system resource access cost
74107143137Method and apparatus for security protocol and address translation integration
74117143067System and method for installing personal computer software
74127142689Image processing apparatus for determining specific images
74137142676Method and apparatus for secure communications using third-party key provider
74147142675Sequence generator and method of generating a pseudo random sequence
74157142674Method of confirming a secure key exchange
74167142673Method for the cryptographic conversion of L-bit input blocks of digital data into L-bit output blocks
74177142672Method and system for transmitting sensitive information over a network
74187142670Space-efficient, side-channel attack resistant table lookups
74197140045Method and system for user information verification
74207140043Watermark embedding and detecting method by quantization of a characteristic value of a signal
74217140039Identification of an attacker in an electronic system
74227139918Multiple secure socket layer keyfiles for client login support
74237139915Method and apparatus for authenticating an open system application to a portable IC device
74247139914System and method for network security
74257139913Method and device for the prevention of disparities or error messages and false responses in IFF type systems
74267139912Device authentication
74277139911Password exposure elimination for digital signature coupling with a host identity
74287139910Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record
74297139891Method and system for timestamped virtual worm in a SAN
74307139792Mechanism for locking client requests to a particular server
74317139759Method and a device for managing a computer network
74327139737Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses
74337139736Content rendering repository
74347139407Image generation apparatus, image file generation method, image verification apparatus and image verification method
74357139399Cryptographic system with methods for user-controlled message recovery
74367139397Hybrid architecture for realizing a random numbers generator
74377137144Technique of defending against network connection flooding attacks
74387137143Method and system for caching secure web content
74397137142Method and system for vehicle authentication of a component using key separation
74407137009Method and apparatus for securing a cookie cache in a data processing system
74417137007Device and method for authenticating user's access rights to resources
74427137006Method and system for single sign-on user access to multiple web servers
74437137005Method of watermarking digital data
74447137004Manifest-based trusted agent management in a trusted operating system environment
74457137003Subscriber identity module verification during power management
74467137002Differential authentication entity validation scheme for international emergency telephone service
74477137000Method and apparatus for article authentication
74487136999Method and system for electronic device authentication
74497136997Radio network system using multiple authentication servers with consistently maintained information
74507136996One-time logon method for distributed computing systems
74517136995Cryptographic device
74527136903Internet-based shared file service with native PC client access and semantics and distributed access control
74537136840Systems and methods for conducting transactions and communications using a trusted third party
74547136490Electronic password wallet
74557136489Method and system for enhancing network security using a multilateral authorization mechanism
74567136488Microprocessor using asynchronous public key decryption processing
74577136487System and method for automatically protecting private video content using embedded cryptographic security
74587136486Print system and printer capable of prevention of unjust copy print
74597136485Packetizing devices for scalable data streaming
74607134145Registering copy protected material in a check-out, check-in system
74617134142System and method for providing exploit protection for networks
74627134140Token-based authentication for network connection
74637134138Methods and apparatus for providing security for a data storage system
74647134022Multi-level and multi-category data labeling system
74657134020System and method for securely duplicating digital documents
74667134019Methods and systems for unilateral authentication of messages
74677134018Access control for computers
74687134016Software system with a biometric dongle function
74697134014Methods and apparatus for accelerating secure session processing
74707134012Methods, systems and computer program products for detecting a spoofed source address in IP datagrams
74717133526System and method for providing WLAN security through synchronized update and rotation of WEP keys
74727133524Key installation system, LSI for implementing the same, and key installation method
74737133523Method and system for solving the word problem in braid group cryptosystems
74747133029Keypad
74757131142Intelligent agents used to provide agent community security
74767131138Information exchanging system, information communication terminal, information exchanging method, and computer product
74777131137Communication system including a security system
74787131132Automatic access denial
74797131009Multiple factor-based user identification and authentication
74807131008Mechanism for dynamically constructing customized implementations to enforce restrictions
74817131007System and method of retrieving a watermark within a signal
74827131006Cryptographic techniques for a communications network
74837131005Method and system for component authentication of a vehicle
74847131004Method and apparatus for encrypting data transmitted over a serial link
74857131003Secure instant messaging system
74867131000Computer security system
74877130999Using authentication certificates for authorization
74887130998Using a portable security token to facilitate cross-certification between certification authorities
74897130951Method for selectively disabling interrupts on a secure execution mode-capable processor
74907130829Digital rights management
74917130615Software authentication for mobile communication devices
74927130452System and method for multi-party validation, authentication and/or authorization via biometrics
74937130427Method for providing point-to-point encryption in a communication system
74947130426Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon
74957130425Method and apparatus for providing a bus-encrypted copy protection key to an unsecured bus
74967130424Systems and methods for utilizing an application from a native portable device within a non-native communications network
74977130423Threshold encoding of frame buffers
74987127745Method of controlling access for software development via a virtual common desktop with plural viewers
74997127744Method and apparatus to protect media existing in an insecure format
75007127742Establishing a secure connection with a private corporate network over a public network
75017127739Handling information about packet data connections in a security gateway element
75027127620Power analysis resistant coding device
75037127618Data protection via reversible data damage
75047127616Semiconductor integrated circuits, data transfer systems, and the method for data transfer
75057127615Security based on subliminal and supraliminal channels for data objects
75067127614Justification authenticating system, personal certificate issuing system, and personal certificate
75077127613Secured peer-to-peer network data exchange
75087127612Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium
75097127611Method and system for vehicle authentication of a component class
75107127610Apparatus and method of implementing multicast security between multicast domains
75117127609System and user interface for adaptively processing and communicating URL data between applications
75127127608System and user interface supporting URL processing and concurrent application operation
75137127607PKI-based client/server authentication
75147127606Account-based digital signature (ABDS) system
75157127605Secure sharing of application methods on a microcontroller
75167127604Changing a codec or MAC size without affecting the encryption key in PacketCable communication
75177127432System for enabling data processing while maintaining confidentiality
75187127067Secure patch system
75197127066Limited use DVD-video disc
75207127063Method and apparatus for computing a shared secret key
75217124442System and method for insertion and retrieval of microthreads in transmitted data
75227124441Method and apparatus for securely associating an optically readable memory with a user machine
75237124408Binding by hash
75247124304Receiving device for securely storing a content item, and playback device
75257124299System, method and computer program product for auditing XML messages in a network-based message stream
75267124297Information providing apparatus and method, information processing apparatus and method, and program storage medium
75277124296Security chip architecture and implementations for cryptography acceleration
75287124295Delta CRL enhancement
75297124294Electronic certificate system
75307124293Intelligently determining which traffic streams to offload efficiently
75317124115Micro payment-based advertising
75327124114Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels
75337123722Encryption management system and method
75347123721Enhanced subscriber authentication protocol
75357123719Method and apparatus for providing authentication in a communication system
75367123718Utilizing data reduction in stegnographic and cryptographic systems
75377123717Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm
75387120929Methods and systems for automated authentication, processing and issuance of digital certificates
75397120928Secure selective sharing of account information on an internet information aggregation system
75407120927System and method for e-mail alias registration
75417120799Method and apparatus for dual hardware and software cryptography
75427120798System and method for the generation and verification of signatures associated with hardcopy documents
75437120797Methods for authenticating potential members invited to join a group
75447120794System for invoking a privileged function in a device
75457120791Bridged cryptographic VLAN
75467120274Automated copyright detection in digital images
75477120254Cryptographic system and method for geolocking and securing digital information
75487120253Method and system for protecting video data
75497120249Methods and systems for generating encryption keys using random bit generators
75507120248Multiple prime number generation using a parallel prime number search algorithm
75517117534Interfacing a conditional access circuit to a digital device using input and output stream switching
75527117493Image formation system, software acquisition method, and computer product
75537117368Anonymous participation authority management system
75547117367Method of authenticating a plurality of files linked to a text document
75557117366Public key based authentication method for transaction delegation in service-based computing environments
75567117365Method and device for generating a data stream and method and device for playing back a data stream
75577117364System and method for downloading application components to a chipcard
75587117363System and method using information-based indicia for securing and authenticating transactions
75597117362Information providing apparatus and method, information processing apparatus and method, and program storage medium
75607117361Method of transmitting information data from a sender to a receiver via a transcoder
75617117358Method and system for filtering communication
75627117356Systems and methods for secure biometric authentication
75637117250Method and system for providing a dynamic media distribution infrastructure
75647117183Airline ticket payment and reservation system and methods
75657117180System for controlling the use of digital works using removable content repositories
75667117179Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium
75677117043Method for programming a programmable logic controller
75687116786Interception of secure data in a mobile network
75697116785Data processing system, data processing method, and program providing medium
75707116784Method and apparatus for authenticated reporting in a mobile communication device
75717116783Non-deterministic method for secured data transfer
75727116782Encryption in a secure computerized gaming system
75737114182Statistical methods for detecting TCP SYN flood attacks
75747114167Content control in a device environment
75757114083Secure server architecture for web based data management
75767114082Data security for digital data storage
75777114079Security access based on facial features
75787114077Verification system for confidential data input
75797114075User authentication apparatus, method of user authentication, and storage medium therefor
75807114074Method and system for controlling encoded image production using image signatures
75817114072Apparatus and method for watermark embedding and detection using linear prediction analysis
75827114070System and method for automatic digital certificate installation on a network device in a data-over-cable system
75837113979System, method and article of manufacture for enhancing electronic messages
75847113930Conducting transactions
75857113929System for voucher or token verification
75867113928Franking machine and operating method thereof
75877113601Method and apparatus for performing secure communications
75887113600Base transceiver station automatic encryption handling
75897113596Embedding information related to a subject of an identification document in the identification document
75907113595Generation of a random number that is non-divisible by a set of prime numbers
75917113594Systems and methods for identity-based encryption and related cryptographic techniques
75927111323Method and apparatus to facilitate a global timeout in a distributed computing environment
75937111173Encryption process including a biometric unit
75947111172System and methods for maintaining and distributing personal security devices
75957111171Parallel distribution and fingerprinting of digital content
75967111170Distributed system for responding to watermarked documents
75977111169Method and apparatus for content protection across a source-to-destination interface
75987111168Digital watermarking systems
75997111167Digital watermarks with values derived from remote platforms
76007111165Key and lock device
76017111164Crisis management system, computer, and computer memory product
76027111162Load balancing approach for scaling secure sockets layer performance
76037111102Port adapter for high-bandwidth bus
76047110987Secure online purchasing
76057110858Object identification uses prediction of data in distributed network
76067110548Cryptographic communication method, encryption algorithm shared control method, encryption algorithm conversion method and network communication system
76077110547Method and apparatus for the compression and decompression of image files using a chaotic system
76087110543Content management system, content management terminal, usage rule management server, content management method, and content management program
76097110540Multi-pass hierarchical pattern matching
76107110539Method and apparatus for encrypting and decrypting data
76117110538Method for accelerating cryptographic operations on elliptic curves
76127109986Illumination apparatus
76137109894Encoding and decoding a media signal with high and low quality versions
76147107620Authentication in a packet data network
76157107615Parameter verification in an authentication system and method
76167107614System and method for network address translation integration with IP security
76177107463Manifest-based trusted agent management in a trusted operating system environment
76187107462Method and system to store and distribute encryption keys
76197107457Optical card based system for individualized tracking and record keeping
76207107454Signature system presenting user signature information
76217107453Authenticatable graphical bar codes
76227107451Optimization methods for the insertion, protection, and detection of digital watermarks in digital data
76237107450Content-based authentication of graph presented in text documents
76247107449Digital certificates
76257107448Systems and methods for governing content rendering, protection, and management applications
76267107447Use of pseudonyms vs. real names
76277107446Mechanism independent cluster security services
76287107445Method and apparatus for secure processing of sensitive data
76297107247Electronic value system
76307107051Technique to establish wireless session keys suitable for roaming
76317106864Chaos-based data protection using time-discrete dynamical systems
76327103915Data security system and method
76337103914Trusted computer system
76347103911Identity-based-encryption system with district policy information
76357103910Method and apparatus for verifying the legitimacy of an untrusted mechanism
76367103783Method and system for providing data security in a file system monitor with stack positioning
76377103781OPTICAL DISK, AN OPTICAL DISK BARCODE FORMING METHOD, AN OPTICAL DISK REPRODUCTION APPARATUS, A MARKING FORMING APPARATUS, A METHOD OF FORMING A LASER MARKING ON AN OPTICAL DISK, AND A METHOD OF MANUFACTURING AN OPTICAL DISK
76387103775Signature calculation system by use of mobile agent
76397103772Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers
76407103768Information providing method, information providing system and program
76417103678Method and apparatus for distributing digital contents to various terminals and recording medium containing same
76427103182Public encryption of a stored print job
76437100209Method to provide the generation of an incorrect or unreliable vertical/frame rate signal
76447100208Method and apparatus for source-based message authorization and rejection
76457100206Method for secured access to data in a network
76467100205Secure attention instruction central processing unit and system architecture
76477100052Electronic vehicle product and personal monitoring
76487100051Public-key signature methods and systems
76497100050Secured signal modification and verification with privacy control
76507100049Method and apparatus for authentication of users and web sites
76517100047Adaptive transparent encryption
76527100046VPN enrollment protocol gateway
76537100045System, method, and program for ensuring originality
76547100044Public key certificate using system, public key certificate using method, information processing apparatus, and program providing medium
76557100043LIFM algorithm for security association database lookup in IPSEC application
76567099847Apparatus, methods and articles of manufacture for construction and maintaining a calendaring interface
76577099846Apparatus and system for providing fee-based content
76587099479Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
76597099477Method and system for backup and restore of a context encryption key for a trusted device within a secured processing system
76607099476Method for updating a network ciphering key
76617099471Detecting compromised ballots
76627099469Method of scrambling and descrambling data in a communication system
76637096497File checking using remote signing authority via a network
76647096367System and methods for caching in connection with authorization in a computer system
76657096365Digital signature
76667096364Collusion-resistant watermarking and fingerprinting
76677096363Person identification certificate link system, information processing apparatus, information processing method, and program providing medium
76687096362Internet authentication with multiple independent certificate authorities
76697096359Authentication scheme for ad hoc and sensor wireless networks
76707096357Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium
76717096356Method and apparatus for negotiating Diffie-Hellman keys among multiple parties using a distributed recursion approach
76727096355Dynamic encoding algorithms and inline message decryption
76737096354Central key authority database in an ABDS system
76747096353Software modem with privileged mode decryption of control codes
76757096352Security protocol structure in application layer
76767096200System and method for evaluating and enhancing source anonymity for encrypted web traffic
76777095859Managing private keys in a free seating environment
76787095857Key distribution system for protection of route-update notification in micromobility networks
76797095853System and method for preventing an illegal copy of contents
76807095851Voice and data encryption method using a cryptographic key split combiner
76817095850Encryption method and apparatus with forward secrecy and random-access key updating method
76827095741Port isolation for restricting traffic flow on layer 2 switches
76837095290Method and system for generating higher order modulations with QPSK modulator
76847093299System for authenticating digital data
76857093298Apparatus and method for security object enhancement and management
76867093295Method and device for protecting digital data by double re-encryption
76877093291Method and system for detecting and preventing an intrusion in multiple platform computing environments
76887093290Security system for networks and the method thereof
76897093289Mechanism for automatically configuring integrated access device for use in voice over digital subscriber line circuit
76907093288Using packet filters and network virtualization to restrict network communications
76917093286Method and system for exchanging sensitive information in a wireless communication system
76927093136Methods, systems, computer program products, and data structures for limiting the dissemination of electronic email
76937093135Software virus detection methods and apparatus
76947093134Method and apparatus for signing and sealing objects
76957093132Method and apparatus for protecting ongoing system integrity of a software product using digital signatures
76967093131Information authenticating apparatus and authenticating station
76977093130System and method for delivering and examining digital tickets
76987093129Secured encrypted communications in a voice browser
76997093125Rote based tool delegation
77007093124Mechanism to improve authentication for remote management of a computer system
77017093122Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces
77027093121Transferring data via a secure network connection
77037093119Methods and computer program products for protecting source code of an interpreted programming language
77047093032System and method for multi-vendor authentication to remotely activate a software-based option
77057093021Electronic device for secure authentication of objects such as computers in a data network
77067092913System for inexpensively executing online purchases
77077092910Method, apparatus, and system for processing information by attaching information to digital data, and storage medium storing computer-readable program codes to carry out the method
77087092527Method, system and program product for managing a size of a key management block during content distribution
77097092525Cryptographic system with enhanced encryption function and cipher key for data encryption standard
77107092524Device for and method of cryptographically wrapping information
77117092523Method and apparatus for minimizing differential power attacks on processors
77127092522Apparatus for solving system of equations on finite field and apparatus for inverting element of extension field
77137089594Application rights management in a mobile environment
77147089587ISCSI target offload administrator
77157089585Method and system for authorizing a client computer to access a server computer
77167089584Security architecture for integration of enterprise information system with J2EE platform
77177089429Creation of local usage rights voucher
77187089428Method and system for managing computer security information
77197089427Security system method and apparatus for preventing application program unauthorized use
77207089424Peripheral device for protecting data stored on host device and method and system using the same
77217089421Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system
77227089419Control function with multiple security states for facilitating secure operation of an integrated system
77237089416Information communication apparatus and method, information communication system, and memory medium
77247089415Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet
77257089303Systems and methods for distributed network protection
77267088826Method for providing a crypto key and checkword to an encryption device
77277088822Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith
77287086089Systems and methods for network security
77297086087Information processing device, card device and information processing system
77307085937Adaptive method for amortizing authentication overhead
77317085936System and method for using login correlations to detect intrusions
77327085933Computer system apparatus and method for improved assurance of authentication
77337085931Virtual smart card system and method
77347085927Secure data report preparation and delivery
77357085925Trust ratings in group credentials
77367085924Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet
77377085923High volume secure internet server
77387085742Authenticating software licenses
77397085386System and method for secure replacement of high level cryptographic keys in a personal security device
77407085384Device for transferring data between an unconscious capture device and another device
77417085378Countermeasure method in an electronic component using a secret key cryptographic algorithm
77427085376Method and system for securely exchanging encryption key determination information
77437082540System and method for tracking programmable devices that use intellectual property
77447082538Electronically verified digital signature and document delivery system and method
77457082537Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit
77467082536System and method for computerized global messaging encryption
77477082535System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol
77487082534Method and apparatus for performing accelerated authentication and decryption using data blocks
77497082533Gauging risk in electronic communications regarding accounts in ABDS system
77507082532Method and system for providing distributed web server authentication
77517082531Method and apparatus for determining enforcement security devices in a network topology
77527082530Method and apparatus for accelerating hardware encryption with multiple networking interfaces
77537082416Method of using prepaid cash card for making purchases on the world wide web
77547082200Establishing secure peer networking in trust webs on open networks using shared secret device key
77557082199Simple encrypted transmission system suitable for intermittent signals
77567082198Data receiving method and data receiving unit therefor
77577080804Hot-start navigation information distribution system
77587080407Virus detection and removal system and method for network-based systems
77597080405Limiting device function
77607080404Automatic re-authentication
77617080356Certification test suite
77627080262Key compression
77637080259Electronic information backup system
77647080257Protecting digital goods using oblivious checking
77657080253Audio fingerprinting
77667080248System providing dynamic quality of service signaling messages in a cable telephony network
77677079656Method and communications system for ciphering information for a radio transmission and for authenticating subscribers
77687079655Encryption algorithm management system
77697079654Method for carrying out an electronic transaction using several signatures
77707079650Computing method for elliptic curve cryptography
77717076805Digital data system
77727076803Integrated intrusion detection services
77737076800IC card terminal unit and IC card duplication method
77747076797Granular authorization for network user sessions
77757076669Method and apparatus for communicating securely with a token
77767076666Hard disk drive authentication for personal video recorder
77777076665Method and system for vehicle subassembly authentication of a component
77787076664User confirmation system and method
77797076663Integrated system security method
77807076662Data alteration checking apparatus and method and recording medium
77817076661System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems
77827076659Enhanced method for digital data hiding
77837076655Multiple trusted computing environments with verifiable environment identities
77847076654Multicast system, authentication server terminal, multicast receiver terminal controlling method, and storage medium
77857076653System and method for supporting multiple encryption or authentication schemes over a connection on a network
77867076651System and method for highly secure data communications
77877076469Copyright protection of digital images transmitted over networks
77887076468Method and system for licensing digital works
77897076467Network-based method and system for transmitting digital data to a client computer and charging only for data that is used by the client computer user
77907076466System for accepting non harming mail at a receptacle
77917076067Encrypted media key management
77927076062Methods and arrangements for using a signature generating device for encryption-based authentication
77937076061Efficient and compact subgroup trace representation ("XTR")
77947073199Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine
77957073195Controlled access to credential information of delegators in delegation relationships
77967073069Apparatus and method for a programmable security processor
77977073066Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution
77987073065Watermarked material processing
77997073064Method and apparatus to provide enhanced computer protection
78007073063Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like
78017073060Data transmission system
78027073056Apparatus and method for demonstrating and confirming the status of digital certificates and other data
78037072870System and method for providing authorization and other services
78047072869Integrated circuit card with situation dependent identity authentication
78057072867System and method for third party logging server
78067072470Video scramble/descramble apparatus
78077072469Devices for emitting or receiving signals encrypted by deterministic chaos, and a transmission system, in particular a radio transmission system, including such devices
78087072433Delay locked loop fine tune
78097069593Device and method for making secure an integrated circuit
78107069590System and method for protecting data streams in hardware components
78117069584Process and apparatus for improving the security of authentication procedures using a new "Super PIN"
78127069583Detection of polymorphic virus code using dataflow analysis
78137069581Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
78147069580Function-based process control verification and security in a process control system
78157069451Systems and methods for secure transaction management and electronic rights protection
78167069450Systems and methods for compression of key sets having multiple keys
78177069448Context oriented crypto processing on a parallel processor array
78187069447Apparatus and method for secure data storage
78197069442System and method for execution of a secured environment initialization instruction
78207069441VPN enrollment protocol gateway
78217069440Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system
78227069439Computing apparatus and methods using secure authentication arrangements
78237069437Multi-level security network system
78247069436Information transmission system and method, transmitting apparatus, receiving apparatus, data processing device and data processing method, and recording medium
78257069435System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys
78267069434Secure data transfer method and system
78277069433Mobile host using a virtual single account client and server system for network access and management
78287069432System and method for providing security in a telecommunication network
78297069252Electronic transaction server, client for seller, client for buyer and electronic transaction method
78307069250Check based online payment and verification system and method
78317069249Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party
78327069246Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same
78337069245Simultaneous network news distribution
78347068791Secure packet radio network
78357068790Systems and methods for path set-up in a quantum key distribution network
78367068789Peer-to-peer name resolution protocol (PNRP) group security infrastructure and method
78377068786Dual use block/stream cipher
78387068785Table driven method for calculating arithmetic inverse for use in cryptography
78397068733Sampling technique for digital beam former
78407065789System and method for increasing heuristics suspicion levels in analyzed computer code
78417065784Systems and methods for integrating access control with a namespace
78427065783Mobile application access control list security system
78437065654Secure execution box
78447065650Method for indicating the integrity of a collection of digital objects
78457065649Method and system for controlling use of software programs
78467065648Mutual authentication method, recording apparatus, reproducing apparatus, and recording medium
78477065647Communication system, authentication communication device, control apparatus, and communication method
78487065646Remote notification of print or fax hardcopy recipient using standard identification data
78497065645System, method, and apparatus for visual authentication
78507065643Network compromise recovery methods and apparatus
78517065642System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions
78527065507Supervised license acquisition in a digital rights management system on a computing device
78537065506Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
78547065505Method for metering and pricing of digital works
78557065504Fee imposition system for application software
78567065503Cookie data stored on transportable recording medium
78577065502Media and method of updating commodity catalog information
78587065216Methods and systems of protecting digital content
78597065214Information processing apparatus, information processing method, information processing system and recording medium
78607065213In a subscriber network receiving digital packets and transmitting digital packets below a predetermined maximum bit rate
78617065210Secret key generation method, encryption method, cryptographic communications method, common key generator, cryptographic communications system, and recording media
78627062660Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority
78637062657Methods and apparatus for hardware normalization and denormalization
78647062655Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords
78657062654Cross-domain access control
78667062653Collusion-resistant watermarking and fingerprinting
78677062652Semiconductor memory card, data reading apparatus and data reading/reproducing apparatus
78687062651Network printer registration protocol
78697062650System and method for verifying integrity of system with multiple components
78707062649System and method for categorizing security profile rules within a computer system
78717062648System and method for redundant array network storage
78727062555System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
78737062469System and method for public wireless network access subsidized by dynamic display advertising
78747062468Licensed digital material distribution system and method
78757062466Method and system for operating online classified advertisements
78767062465Methods and apparatus for providing agent controlled synchronized browsing at a terminal
78777062045Media protection system and method
78787062044Method of elliptic curve cryptographic key agreement using coefficient splitting
78797062043Method of elliptic curve digital signature using coefficient splitting
78807061985Universal modulator/demodulator
78817058975Method and system for delayed write scanning for detecting computer malwares
78827058971Access privilege transferring method
78837058970On connect security scan and delivery by a network security authority
78847058969Recognition system
78857058820Information processing system, medium, information processing apparatus, information processing method, storage medium storing computer readable program for realizing such method
78867058815Method and system for digitally signing MPEG streams
78877058814System and method for providing time-limited access to people, objects and services
78887058813Method for watermarking computer programs
78897058812Collusion-resistant watermarking and fingerprinting
78907058811Apparatus and method to prevent a device driver from loading on a counterfeit hardware element
78917058809Method and system to uniquely associate multicast content with each of multiple recipients
78927058807Validation of inclusion of a platform within a data center
78937058806Method and apparatus for secure leveled access control
78947058805Systems and methods for protecting data secrecy and integrity
78957058804Data storing system, issuing apparatus, data providing apparatus and computer readable medium storing data storing program
78967058802Communication management system
78977058619Method, system and computer program product for facilitating digital certificate state change notification
78987058612System and method for producing and verifying secure negotiable instruments
78997058611Method and system for conducting secure electronic commerce transactions with authorization request data loop-back
79007058610System and method for communicating a message in a mailing system
79017058609Pay by time system for content delivery to media playback systems
79027058607Contents distribution method and system
79037058606Method for loaning digital works
79047058605Document transfer systems
79057058600Integrated proxy interface for web based data management reports
79067058181Wireless bridge for roaming in network environment
79077058180Single sign-on process
79087058179Method and system for a secure high bandwidth bus in a transceiver device
79097058177Partially encrypted bitstream method
79107058020Hardware time stamping and registration of packetized data method and system
79117055042System and method for synchronizing a user password between mainframe and alternative computer operating environments
79127055040Method and apparatus for uniquely and securely loading software to an individual computer
79137055039Protection of digital content using block cipher crytography
79147055038Method and apparatus for maintaining secure and nonsecure data in a shared memory system
79157055037High performance gray-level watermarking system
79167055036System and method to verify trusted status of peer in a peer-to-peer network environment
79177055035Method for generating a read only memory image
79187055034Method and apparatus for robust embedded data
79197055033Integrated circuit devices with steganographic authentication and steganographic authentication methods
79207055032One time password entry to access multiple network sites
79217055031Method for generation, delivery, and validation of electronic coupons through personal TV service system
79227055029Cryptographic system enabling ownership of a secure process
79237055028HTTP multiplexor/demultiplexor system for use in secure transactions
79247054905Replacing an email attachment with an address specifying where the attachment is stored
79257054844Secure electronic procurement system and method
79267054843Method and apparatus in a telecommunications system
79277054842Stored value cards and methods for their issuance
79287054841Document storage and classification
79297054840Virtual bookshelf for online storage use and sale of material
79307054839Transmission apparatus and method, reception apparatus and method, management apparatus and method, charging apparatus and method, providing apparatus and method, and recording medium
79317054447Method and apparatus for periodically removing invalid public keys from a public key server
79327054446Chaos cryptographic communication method and chaos cryptographic communication system
79337054443System and method for protecting digital goods using random and automatic code obfuscation
79347054306Method for handling ciphering status in a wireless network
79357051210Persistance and recovery of security keys
79367051208Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
79377051207Apparatus and methods for inserting and detecting electronic watermark
79387051206Self-authentication of value documents using digital signatures
79397051205Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate
79407051204Methods and system for providing a public key fingerprint list in a PK system
79417051203Data watermarks created by using an uneven sampling period
79427051202Apparatus and computer-recording medium for evaluation support of encryption algorithm strength
79437051200System and method for interfacing a software process to secure repositories
79447051199System, method and article of manufacture for providing cryptographic services utilizing a network
79457051006System and method for maintaining customer privacy
79467051005Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system
79477051004System and methods providing secure delivery of licenses and content
79487051003Method and apparatus for delivering electronic data through a proxy server
79497050892Diagnostic tool security key
79507050589Client controlled data recovery management
79517050588System for processing an information signal
79527050587Security device for guarding a vehicle
79537050584Method and system for regenerating a private key for a predetermined asymmetric cryptographic key pair
79547050582Pseudo-random one-to-one circuit synthesis
79557050166Calcium carbonate imaging technique
79567047563Command authorization via RADIUS
79577047561Firewall for real-time internet applications
79587047557Security system in a service provision system
79597047425Scaleable muti-level security method in object oriented open network systems
79607047424Methods and systems for hairpins in virtual networks
79617047422User access to a unique data subset of a database
79627047421Data signal with a database and a compressed key
79637047419Data security system
79647047416Account-based digital signature (ABDS) system
79657047414Managing database for reliably identifying information of device generating digital signatures
79667047413Collusion-resistant watermarking and fingerprinting
79677047412Digital watermark data embedding method, and digital watermark data embeddability analyzing method
79687047410Digital image watermarking method
79697047406Method and system for providing a secure peer-to-peer file delivery network
79707047405Method and apparatus for providing secure processing and data storage for a wireless communication device
79717047404Method and apparatus for self-authenticating digital records
79727047222Secure encryption of data packets for transmission over unsecured networks
79737047221Method for piracy protection of an apparatus and arrangement for the implementation of the method
79747046810Data processing method and system of same portable device data processing apparatus and method of same and program
79757046808Method and apparatus for detecting processing stages applied to a signal
79767046807Data administration method
79777046803Random keystream generation apparatus and method for use in an encryption system
79787046800Scalable methods and apparatus for Montgomery multiplication
79797043753Providing security for external access to a protected computer network
79807043643Method and apparatus for operating a computer in a secure mode
79817043642Process to manage data in a chip card
79827043641Encryption in a secure computerized gaming system
79837043640Apparatus and method for protecting a computer system
79847043638Material display
79857043636Data integrity mechanisms for static and dynamic data
79867043635Embedded synchronous random disposable code identification method and system
79877043634Detecting malicious alteration of stored computer files
79887043633Method and apparatus for providing adaptive self-synchronized dynamic address translation
79897043632End-to-end security in data networks
79907043554Networker server, method for controlling transmission of a hypertext and recording medium storing a hypertext
79917043453Method and system for conducting transactions between repositories using a repository transaction protocol
79927043025Method and apparatus for secured electronic commerce
79937043024System and method for key distribution in a hierarchical tree
79947043022Packet order determining method and apparatus
79957043020Smartcard for use with a receiver of encrypted broadcast signals, and receiver
79967043016Substitution-box for symmetric-key ciphers
79977043015Methods for point compression for Jacobians of hyperelliptic curves
79987039954Method for enabling a network-addressable device to detect use of its identity by a spoofer
79997039950System and method for network quality of service protection on security breach detection
80007039947Error protected data transfer system and method
80017039944Digital data file management method and recording medium for recording digital data file management program thereon
80027039815Method for protecting a data memory
80037039813System and method for biometric verification in a delivery process
80047039811Apparatus and method for controlling access to contents stored in card like electronic equipment
80057039810Method and apparatus to secure data transfer from medical device systems
80067039808Method for verifying a message signature
80077039807Method and system for obtaining digital signatures
80087039805Electronic signature method
80097039803Method for broadcast encryption and key revocation of stateless receivers
80107039802Conditional access system for set-top boxes
80117039801System and method for integrating secure and non-secure software objects
80127039800Translator terminal for two or more wireless networks
80137039613System and method for controlling distribution and use of digital works using price specifications
80147039191Chaining key broadcasting reception system and chaining key broadcasting reception method
80157039186Encryption key generation circuit
80167039185Method and system for securing a printhead in a closed system metering device
80177039184Encryption/decryption unit and storage medium
80187038600Method and device for adding or extracting a secondary information signal to/from a RLL code sequence
80197037196Portable toy, portable information terminal, entertainment system, and recording medium
80207036149Computer system
80217036143Methods and apparatus for virtual private network based mobility
80227036141Transmission system, a method and an apparatus providing access for IP data packets to a firewall protected network
80237036019Method for controlling database copyrights
80247036015Verification protocol
80257036014Probabilistic signature scheme
80267036012Method and system for secure cashless gaming
80277036011Digital rights management
80287035411Encryption method and apparatus encrypting and adding signature information to qubits
80297035408Method to generate pseudo-random sequence of multi-carrier data symbols, and related transmitter and receiver
80307035407Data transmission system for prevention of unauthorized copy of data from recording medium
80317035404Method and apparatus for shuffle with proof, method and apparatus for shuffle verification, method and apparatus for generating input message sequence and program for same
80327032242Method and system for distributed network address translation with network security features
80337032240Portable authorization device for authorizing use of protected information and associated method
80347032112Account authority digital signature (AADS) system using transactional account information
80357032111Method for optimizing of data transmission
80367032110PKI-based client/server authentication
80377031472Method of authenticating information, disk playback apparatus, and entertainment apparatus
80387031470Protection of data on media recording disks
80397031469Optimized enveloping via key reuse
80407031468Speed enhanced cryptographic method and apparatus
80417028337Method of virtual private network communication in security gateway apparatus and security gateway apparatus using the same
80427028335Method and system for controlling attacks on distributed network address translation enabled networks
80437028332Method and apparatus for preventing packet retransmissions during IPsec security association establishment
80447028193Method and apparatus for determining the validity of a data processing transaction
80457028192Method and apparatus that enable a computer user to verify whether they have correctly input their password into a computer
80467028191Trusted authorization device
80477028190Method and system for electronic delivery of sensitive information
80487028189Derivation and quantization of robust non-local characteristics for blind watermarking
80497028188Document authentication using the physical characteristics of underlying physical media
80507028187Electronic transaction apparatus for electronic commerce
80517028186Key management methods for wireless LANs
80527028185Managing database for identifying to recipients security features of devices generating digital signatures
80537028184Technique for digitally notarizing a collection of data streams
80547028182Secure network system and method for transfer of medical information
80557028181System and method for efficient and secure revocation of a signature certificate in a public key infrastructure
80567028180System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature
80577028179Apparatus and method for secure, automated response to distributed denial of service attacks
80587028178Scheduling system and method including creating and/or changing a scheduling system by an administrator and making appointments employing the schedule conducted through a global computer network
80597028010Method for transmitting encrypted information for registering an application program
80607027598Residue number system based pre-computation and dual-pass arithmetic modular operation approach to implement encryption protocols efficiently in electronic integrated circuits
80617027597Pre-computation and dual-pass modular arithmetic operation approach to implement encryption protocols efficiently in electronic integrated circuits
80627024700Computer with security function and method therefor
80637024699Publication of an attorney-client privilege warning message
80647024690Protected mutual authentication over an unsecured wireless communication channel
80657024687System and method for providing end to end authentication in a network environment
80667024662Executing dynamically assigned functions while providing services
80677024564Software protection device and method
80687024563Apparatus, system and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon
80697024562Method for carrying out secure digital signature and a system therefor
80707024560Power-residue calculating unit using Montgomery algorithm
80717024556Distributed system authentication
80727024554Systems and methods that authorize target devices utilizing proprietary software and/or hardware
80737024553System and method for updating encryption key for wireless LAN
80747024552Location authentication of requests to a web server system linked to a physical entity
80757024393Structural of digital rights management (DRM) system
80767024392Method for controlling use of database content
80777024226Method for enabling PKI functions in a smart card
80787023998Cryptographic key processing and storage
80797023997Secure messaging communication system
80807023990Secure parameter generating device and parameter generating method in algebraic curve crytography
80817023862Scheme for realizing communications through external network from contents processing device connected to local network in home environment
80827020785Method for automatically verifying security code of computer system operated by remote controller
80837020784Mechanism for detecting intrusion and jamming attempts in a shared media based communications network
80847020783Method and system for overcoming denial of service attacks
80857020780Method apparatus and systems for producing and writing cipher keys, reproducing information with a cipher key, and for permitting reproduction of information with a cipher key, and permitting reproduction of information with a cipher key, and optical disc recorded with a cipher key
80867020779Secure, distributed e-mail system
80877020777Derivation and quantization of robust non-local characteristics for blind watermarking
80887020776Cryptosystem based on a Jacobian of a curve
80897020775Derivation and quantization of robust non-local characteristics for blind watermarking
80907020774Communications method and device
80917020287Method and system for key insertion for stored encrypted content
80927020286Modulation of dynamical systems for communication
80937020285Stealthy audio watermarking
80947020283Random number generation apparatus and random number generation method
80957020282Simplified secure, swift cryptographic key exchange
80967020281Timing attack resistant cryptographic system
80977017189System and method for activating a rendering device in a multi-level rights-management architecture
80987017181Identity-based-encryption messaging system with public parameter host servers
80997017051System and method for enterprise authentication
81007017050Clearinghouse server for internet telephony and multimedia communications
81017017049Method and system providing secure socket layer session sharing between network based servers and a client
81027017045Multimedia watermarking system and method
81037017044Extremely secure method for keying stored contents to a specific storage device
81047017043Methods and systems for the identification of circuits and circuit designs
81057017042Method and circuit to accelerate IPSec processing
81067017041Secure communications network with user control of authenticated personal information provided to network entities
81077016992Electronic mail system
81087016877Consumer-controlled limited and constrained access to a centrally stored information account
81097016500Code exchange protocol
81107016499Secure ephemeral decryptability
81117016498Encrypting a digital object on a key ID selected therefor
81127016497Data decryption system
81137016495Multiple level access system
81147016493Key matrix system
81157013482Methods for packet filtering including packet invalidation if packet validity determination not timely made
81167013395Method and tool for network vulnerability analysis
81177013393Universal intelligent card for secure access to system functions
81187013390Cryptographic policy filters and policy control method and apparatus
81197013389Method and apparatus for creating a secure communication channel among multiple event service nodes
81207013388Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system
81217013387System for increasing realized secure sockets layer encryption and decryption connections
81227013296Using electronic security value units to control access to a resource
81237013295Tagged private information retrieval
81247013023Method and device for sending and receiving digital images using an image watermark for decoding
81257010809Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length
81267010808Binding digital content to a portable storage device or the like in a digital rights management (DRM) system
81277010701Network arrangement for smart card applications
81287010697System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software
81297010695Information input-output device, information input-output system, mobile communication terminal, and input-output control unit
81307010694Method and system for application of a safety marking
81317010693Software vault
81327010691ABDS system utilizing security information in authenticating entity access
81337010690Extensible system for building and evaluating credentials
81347010689Secure data storage and retrieval in a client-server environment
81357010688Scheme, system and equipment for inter-equipment authentication and key delivery
81367010687Transmission apparatus, reception apparatus, transmission method, reception method and recording medium
81377010686Method for enabling a file
81387010685Method and apparatus for storing scrambled digital programs by filtering product identifier
81397010683Public key validation service
81407010681Method, system and apparatus for selecting encryption levels based on policy profiling
81417010605Method and apparatus for encoding and storing session data
81427010126Method for synchronizing a plurality of chaotic systems and method for multichannel communication using synchronized chaotic systems
81437010125Method for tracing traitor receivers in a broadcast encryption system
81447010124Location dependent key for decrypting copy protected material on a recording medium
81457009419Method and apparatus for selecting an encryption integrated circuit operating mode
81467008456Computer with security function and method therefor
81477007304Method and apparatus to improve the protection of information presented by a computer
81487007298Apparatus and method for authenticating user according to biometric information
81497007174System and method for determining user identity fraud using similarity searching
81507007172Modified Harvard architecture processor having data memory space mapped to program memory space with erroneous execution protection
81517007170System, method, and apparatus for securely providing content viewable on a secure device
81527007169Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access
81537007168User authentication using member specifying discontinuous different coordinates
81547007166Method and system for digital watermarking
81557007165Watermark system
81567007164Method and array for authenticating a first instance and a second instance
81577007000Secure online purchasing
81587006997Method and program for preventing unfair use of software
81597006656Lossless embedding of data in digital objects
81607006635Method and apparatus for clock synchronization using quantum mechanical non-locality effects
81617006634Hardware-based encryption/decryption employing dual ported key storage
81627006633Global encryption system
81637006629Method and system for processing a data set
81647006628Efficient packet encryption method
81657006555Spectral audio encoding
81667006508Communication network with a collection gateway and method for providing surveillance services
81677003676Locking mechanism override and disable for personal computer ROM access protection
81687003675Encrypted content data structure package and generation thereof
81697003670Biometric rights management system
81707003667Targeted secure printing
81717003666Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon
81727003665Method for the secure transmission of messages
81737003663Distribution of deployment information for remote applications
81747003662System and method for dynamically determining CRL locations and access methods
81757003661Methods and systems for automated authentication, processing and issuance of digital certificates
81767003500Retail point of sale (RPOS) apparatus for internet merchandising
81777003493Direct payment with token
81787003117Identity-based encryption system for secure data distribution
81797003116System for encrypted file storage optimization via differentiated key lengths
81807003114Method and apparatus for achieving crypto-synchronization in a packet data communication system
81817003113Position authentication system and electronic equipment using the same
81827003112Extensible GPS receiver system
81837003110Software aging method and apparatus for discouraging software piracy
81847003109Compact crypto-engine for random number and stream cipher generation
81857003107Hybrid stream cipher
81867002450Method for authenticating a spare key for using a vehicle
81877000249Pre-boot authentication system
81887000248Virtual network and virtual network connection system
81897000119Instruction/data protection employing derived obscuring instruction/data
81907000118Asymmetric system and method for tamper-proof storage of an audit trial for a database
81917000116Password value based on geographic location
81927000115Method and apparatus for uniquely and authoritatively identifying tangible objects
81937000114Apparatus to create and/or verify digital signatures having a secure time element and an identifier of the apparatus
81947000113Recording information with a watermark related to a prerecorded medium mark on an information carrier
81957000112Method and apparatus for input of coded image data
81967000111Method for masking secret multiplicands
81977000110One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device
81987000108System, apparatus and method for presentation and manipulation of personal information syntax objects
81997000106Methods and apparatus for kernel mode encryption of computer telephony
82007000105System and method for transparently providing certificate validation and other services within an electronic transaction
82016999947License devolution apparatus
82026996844Switch-user security for UNIX computer systems
82036996842Processing internet protocol security traffic
82046996841Negotiating secure connections through a proxy server
82056996724Secret key generating method, common key generating method, encryption method, cryptographic communication method and cryptographic communication system
82066996722Data communications
82076996719Secure password entry
82086996718System and method for providing access to multiple user accounts via a common password
82096996716Dual-tier security architecture for inter-domain environments
82106996715Method for identification of a user's unique identifier without storing the identifier at the identification site
82116996714Wireless authentication protocol
82126996710Platform and method for issuing and certifying a hardware-protected attestation key
82136996238Method for generating and looking-up transaction keys in communication networks
82146996235Method and system for secure printing of documents via a printer coupled to the internet
82156996234Data decryption methodology
82166996233System and method for encrypting and verifying messages using three-phase encryption
82176993663Input buffer overrun checking and prevention
82186993662Method and system for copy protection of displayed data content
82196993656Time stamping method using aged time stamp receipts
82206993655Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics
82216993654Secure encryption processor with tamper protection
82226993138Spatial key trees for key management in wireless environments
82236993137Method and system to securely distribute content via a network
82246993135Content processing system and content protecting method
82256993134Key exchange via a portable remote control device
82266993133Data recording and reproduction apparatus
82276993132System and method for reducing fraud in a digital cable network
82286993130Methods and apparatus for mediametric data cryptoprocessing
82296990684Person authentication system, person authentication method and program providing medium
82306990592Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users
82316990587Cryptographic architecture for secure, private biometric identification
82326990585Digital signature system, digital signature method, digital signature mediation method, digital signature mediation system, information terminal and storage medium
82336990584Method of and apparatus for restricting copy of digital information, and apparatus for recording digital information
82346990582Authentication method in an agent system
82356990580Information providing apparatus and method, information processing apparatus and method, and program storage medium
82366990579Platform and method for remote attestation of a platform
82376990578Method and apparatus for encrypting electronic messages composed using abbreviated address books
82386990202Packetizing devices for secure scalable data streaming
82396990199Apparatus and method for cipher processing system using multiple port memory and parallel read/write operations
82406988267Method and device for implementing a downloadable software delivery system
82416988210Data processing system for application to access by accreditation
82426988209Uniform resource locator (URL)-based secure download system and method
82436988205Method and apparatus for the secure storage of audio signals
82446988204System and method for key distribution and network connectivity
82456988201Method and apparatus for watermarking wavetable synthesis architectures
82466988199Secure and reliable document delivery
82476988197Synchronization of authentication ciphering offset
82486988196Computer system and method for generating a digital certificate
82496988195Vault controller supervisor and method of operation for managing multiple independent vault processes and browser sessions for users in an electronic business system
82506988147Method of establishing a secure tunnel through a proxy server between a user device and a secure server
82516987855Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups
82526987853Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess
82536986062Set top box object security system
82546986061Integrated system for network layer security and fine-grained identity-based access control
82556986060Method and apparatus for sharing a security context between different sessions on a database server
82566986059Hierarchical trusted code for content protection in computers
82576986058Method and system for providing data security using file spoofing
82586986057Security device and method
82596986056Method and arrangement for generating binary sequences of random numbers
82606986051Method and system for controlling and filtering files using a virus-free certificate
82616986049Method and system for authenticating a message sender using domain keys
82626986045Single algorithm cipher suite for messaging
82636986044Method for group unit encryption/decryption, and method and apparatus for writing signature
82646986043Encrypting file system and method
82656986041System and method for remote code integrity in distributed systems
82666986040System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
82676986039Technique for synchronizing security credentials using a trusted authenticating domain
82686986038Technique for synchronizing security credentials from a master directory, platform, or registry
82696986037Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent
82706986030Portable memory device includes software program for interacting with host computing device to provide a customized configuration for the program
82716985845Security monitor of system runs software simulator in parallel
82726985591Method and apparatus for distributing keys for decrypting and re-encrypting publicly distributed media
82736985590Electronic watermarking method and apparatus for compressed audio data, and system therefor
82746985588System and method for using location identity to control access to digital information
82756985583System and method for authentication seed distribution
82766983486Method and apparatus for establishing security scanner attributes in a computer system
82776983485Method and apparatus for authentication for a multiplicity of services
82786983382Method and circuit to accelerate secure socket layer (SSL) process
82796983380Automatically generating valid behavior specifications for intrusion detection
82806983371Super-distribution of protected digital content
82816983369Authentication system, and contents-information sender and receiver
82826983368Linking public key of device to information during manufacture
82836983367Information providing apparatus and method, information processing apparatus and method, and program storage medium
82846983366Packet Processor
82856983365Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys
82866983326System and method for distributed function discovery in a peer-to-peer network environment
82876983309Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium
82886983049Storage devices for secure scalable data streaming

2005

82896968461Providing break points in a malware scanning operation
82906968459Computing environment having secure storage device
82916968456Method and system for providing a tamper-proof storage of an audit trail in a database
82926968384License management system and method for commuter licensing
82936968337Method and apparatus for identifying an unknown work
82946966003System and method for switching security associations
82956965998Time stamping method using time-based signature key
82966965995Signal processing circuit
82976965992Method and system for network security capable of doing stronger encryption with authorized devices
82986965939Method and apparatus for processing requests in a network data processing system based on a trust association between servers
82996965683Routing networks for use with watermark systems
83006963982Method and apparatus for application-independent end-to-end security in shared-link access networks
83016963977Circuits and methods for modular exponentiation
83026963976Symmetric key authenticated encryption schemes
83036963975System and method for audio fingerprinting
83046963974Method and apparatus for providing non-repudiation of transaction information that includes mark up language data
83056963971Method for authenticating electronic documents
83066963857Network-accessible account system
83076961857Authenticating endpoints of a voice over internet protocol call connection
83086961855Notification of modifications to a trusted computing base
83096961428Method of videotext information encryption and security transmission in a network
83106959420Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy
83116959394Splitting knowledge of a password
83126959392Information providing system and method for providing information
83136959390Data processing system and method for maintaining secure user private keys in non-secure storage
83146959388Method for generating many-time restrictive blind signatures
83156959384Systems and methods for authenticating and protecting the integrity of data streams and other data
83166959289Digital rights framework
83176959088Data processing apparatus and method for encryption or decryption of communication data
83186959086Cryptographic key management scheme
83196959085Secure user identification based on ring homomorphisms
83206957347Physical device placement assistant
83216957338Individual authentication system performing authentication in multiple steps
83226957335Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
83236957333System and method for encrypted communications between electronic devices
83246957332Managing a secure platform using a hierarchical executive architecture in isolated execution mode
83256957329System for encrypting data from multiple multimedia applications and method thereof
83266956890Process and device for the generation of codes, for example channeling codes for CDMA applications
83276954860Network copy protection for database programs
83286954858Computer virus avoidance system and mechanism
83296954147Method and system for providing protection against theft and loss of a portable computer system
83306952778Protecting access to microcontroller memory blocks
83316952771Shared data initialization query system and method
83326952480Self-synchronous data scrambler
83336950949Method and apparatus for password entry using dynamic interface legitimacy information
83346950943System for electronic repository of data enforcing access control on data search and retrieval
83356950938Service identification tag and communications system using the same
83366950935Pluggable authentication modules for telecommunications management network
83376950932Security association mediator for java-enabled devices
83386950810Tokenless biometric electronic financial transactions via a third party identicator
83396950523Secure storage of private keys
83406950522Encryption key updating for multiple site automated login
83416950520Method and apparatus for carrying data in a video signal so that the data is not recorded
83426948077ATM/alert
83436948075Computer controlling method, information apparatus, computer, and storage medium
83446948074Method and system for distributed generation of unique random numbers for digital tokens
83456948069Method and system for determining and maintaining trust in digital image files with certifiable time
83466948060Method and apparatus for monitoring encrypted communication in a network
83476947558Stream cipher having a shuffle network combiner function
83486947557Method and program product for maintaining security of publicly distributed information
83496945455Method and apparatus for recording content containing watermark
83506944773Method and apparatus for fingerprint authentication during on-line transactions
83516944772System and method of enforcing executable code identity verification over the network
83526944767Methods and apparatus for ensuring the privacy and security of personal medical information
83536944762System and method for encrypting data messages
83546944299Method for synchronous encryption over a communication medium
83556941465Method of enforcing a policy on a computer network
83566941463Secure computational outsourcing techniques
83576941458Managing a secure platform using a hierarchical executive architecture in isolated execution mode
83586941457Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key
83596941280Determining intra-day net asset value of an actively managed exchange traded fund
83606940976Generating user-dependent RSA keys
83616938168Interactive virtual library system for expeditiously providing automatic updates of user-desired information from content providers, at least one of which is commercial, to users
83626938166Method of downloading of data to an MPEG receiver/decoder and MPEG transmission system for implementing the same
83636938154System, method and article of manufacture for a cryptographic key infrastructure for networked devices
83646934857Security system and method for handheld computers
83656934856System of secret internet web sites for securing user access
83666934848Technique for handling subsequent user identification and password requests within a certificate-based host session
83676934838Method and apparatus for a service provider to provide secure services to a user
83686934388Method and apparatus for generating random permutations
83696931544Method and apparatus for executing multiple JAVA(.TM.) applications on a single JAVA(.TM.) virtual machine
83706931531Image object recording, compression, and encryption method and system
83716931530Secure network file access controller implementing access control and auditing
83726931529Establishing consistent, end-to-end protection for a user datagram
83736931381Methods and apparatus for authenticating the download of information onto a smart card
83746931131Method and apparatus for online geographic and user verification and restriction using a GPS system
83756931130Dynamically adjustable software encryption
83766928557Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment
83776928551Method and apparatus for selectively denying access to encoded data
83786928544Method and apparatus for securing mailing information for privacy protection in on-line business-to-customer transactions
83796928167Method for managing public key
83806928163Methods, systems and computer program products for generating user-dependent RSA values without storing seeds
83816925571Method and system of remote monitoring and support of devices, using POP3 and decryption using virtual function
83826922784Administrative security systems and methods
83836922782Apparatus and method for ensuring data integrity of unauthenticated code
83846920563System and method to securely store information in a recoverable manner on an untrusted system
83856920562Tightly coupled software protocol decode with hardware data encryption
83866920154Architectures for a modularized data optimization engine and methods therefor
83876918117Apparatus and method for dynamic load balancing of multiple cryptographic devices
83886918044Password protection for high reliability computer systems
83896918039Method and an apparatus for detecting a need for security and invoking a secured presentation of data
83906917975Method for role and resource policy management
83916915431System and method for providing security mechanisms for securing network communication
83926915429System and method for fiber channel remote activation and enhanced security
83936915426System and method for enabling authentication at different authentication strength-performance levels
83946914985Method and system for presentation and manipulation of PKCS enveloped-data objects
83956911974Information processing system and method
83966910135Method and apparatus for an intruder detection reporting and response system
83976910128Method and computer program product for processing signed applets
83986909784Recording apparatus and recording method of electronic watermark
83996909783Alphabet soup cryptography
84006907531Method and system for identifying, fixing, and updating security vulnerabilities
84016907527Cryptography-based low distortion robust data authentication system and method therefor
84026907524Extensible firmware interface virus scan
84036907395System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model
84046907126Encryption-decryption apparatus
84056904528Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus
84066904435Method and system for secure electronic distribution, archiving and retrieval
84076904150Cryptographic method and system for double encryption of messages
84086901518Method and system for establishing trust in downloaded proxy code
84096901514Secure oblivious watermarking using key-dependent mapping functions
84106898717Network domain with secured and unsecured servers
84116898714Managing and extending attribute values for public key cryptography standards
84126898706License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
84136898616Arbitrary function generating circuit using a simple operational element and an encryption method thereof
84146898287Cryptographic system using chaotic dynamics
84156895514Method and apparatus for achieving secure password access
84166895509Tamper detection system for securing data
84176895506Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism
84186895502Method and system for securely displaying and confirming request to perform operation on host computer
84196895501Method and apparatus for distributing, interpreting, and storing heterogeneous certificates in a homogenous public key infrastructure
84206894527Evolved circuits for bitstream protection
84216892940Encryption process employing chaotic maps and digital signature process
84226892175Spread spectrum signaling for speech watermarking
84236889321Protected IP telephony calls using encryption
84246889206Method for computer network operation providing basis for usage fees
84256888944Method for assigning encryption keys
84266886112Recovering from device failure
84276886103Method and apparatus for extending network address translation for unsupported protocols
84286885749Scrambling a compression-coded signal
84296885748System and method for protection of digital works
84306883097Coincidence-free media key block for content protection for recordable media
84316882730Method for secure distribution and configuration of asymmetric keying material into semiconductor devices
84326882729System and method for limiting access to data
84336880149Method for runtime code integrity validation using code block checksums
84346880089Firewall clustering for multiple network servers
84356880088Secure maintenance messaging in a digital communications network
84366880085Security system for implantable medical devices
84376880084Methods, systems and computer program products for smart card product management
84386877095Session-state manager
84396874085Medical records data security system
84406874084Method and apparatus for establishing a secure communication connection between a java application and secure server
84416873975Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method
84426871277Apparatus and method for preventing disclosure of protected information
84436871192System and method for preventing unauthorized use of protected software utilizing a portable security device
84446870929High throughput system for encryption and other data operations
84456868497Method and apparatus for automatic ID management
84466868159`Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
84476865674Dynamic trust anchor system and method
84486865671Electronic mail system with authentication methodology for supporting relaying in a message transfer agent
84496862686Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior
84506857072System and method for enabling encryption/authentication of a telephony network
84516854058Low-interference communications device using chaotic signals
84526851059Method and system for choosing a queue protection key that is tamper-proof from an application
84536850938Method and apparatus providing optimistic locking of shared computer resources
84546847719Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext
84556845446Programmable data bus
84566842695Mapping and addressing system for a secure remote access system
84576839852Firewall system and method with network mapping capabilities
84586839848Information processing system and peripheral apparatus

2004

84596836888System for reverse sandboxing
84606834382Message parser and formatter
84616834350Secure and differentiated delivery of network security information
84626832349Remote activation of enhanced functionality features in locally created documents
84636832319Content guard system for copy protection of recordable media
84646831980Random number generator and method for same
84656829358Processing channel resets while performing a ciphering configuration change in a wireless communications protocol
84666826751Ambient calculus-based modal logics for mobile ambients
84676826700Method and apparatus for a web application server to automatically solicit a new password when an existing password has expired
84686826693Information transmission apparatus
84696823456System and method for providing trusted services via trusted server agents
84706823455Method for robust watermarking of content
84716823069Encrypting/decrypting system with programmable logic device/unit and method thereof
84726823068Denial cryptography based on graph theory
84736820204System and method for selective information exchange
84746820177Protected configuration space in a protected environment
84756820063Controlling access to content based on certificates and access predicates
84766816968Consumable authentication protocol and system
84776813712Viral replication detection using a counter virus
84786813354Mixing in small batches
84796807632Content addressable information encapsulation, representation, and transfer
84806807560Method for encouraging internet publication browsing while discouraging unauthorized printing
84816804778Data quality assurance
84826802011COPYRIGHT PROTECTION INFORMATION PROTECTING METHOD, INFORMATION SIGNAL PROCESSING METHOD, INFORMATION SIGNAL REPRODUCING METHOD, INFORMATION SIGNAL RECORDING METHOD, AND INFORMATION SIGNAL PROCESSING DEVICE, INFORMATION SIGNAL REPRODUCING DEVICE, AND INFORMATION SIGNAL RECORDING DEVICE
84836802005Method and system for tracking a person's time at a location
84846802003Method and apparatus for authenticating content
84856801935Secure printing using electronic mailbox
84866801625Apparatus and method for stripping parity bits from an input stream
84876799274Device comprising encryption circuitry enabled by comparing an operating spectral signature to an initial spectral signature
84886798885Method and apparatus for encoding security information in a MIDI datastream
84896795920Vault controller secure depositor for managing secure communication
84906795554Method of transmitting medical information over a network
84916792545Enterprise computer investigation system
84926792540Data replication security
84936792532Method for encrypting data using IEEE 1394 serial bus network
84946792111Cryptation system for packet switching networks based on digital chaotic models
84956788787Pseudorandom number generator, stream encryption method, and stream encrypting communication method
84966785860Error-correcting code adapted for memories that store multiple bits per storage cell
84976785813Key agreement and transport protocol with implicit signatures
84986779044Access control for an information processing device
84996775781Administrative security systems and methods
85006766455System and method for preventing differential power analysis attacks (DPA) on a cryptographic device
85016763467Network traffic intercepting method and system
85026763465Method of ensuring that the PC is not used to make unauthorized and surreptitious telephone calls
85036760842Finite state automata security system
85046760442Method and apparatus for adjusting the quality of digital media
85056754819Method and system for providing cryptographic services in a distributed application
85066754346Method for tracing the distribution of physical digital media
85076751736Method and apparatus for E-commerce by using optional fields for virtual bar codes
85086751320Method and system for preventing reproduction of professional photographs
85096748539System and method for securely checking in and checking out digitized content
85106748534System and method for partitioned distributed scanning of a large dataset for viruses and other malware
85116748395System and method for dynamic playlist of media
85126745332Method and apparatus for enabling database privileges
85136742039System and method for connecting to a device on a protected network
85146738902Systems and methods for controlling authorized intercept
85156735699Method and system for monitoring use of digital works
85166735311Encryption and decryption of multi-media data
85176735310Technique of password encryption and decryption for user authentication in a federated content management system
85186728879Transactional log with multi-sector log block validation
85196725371Secure packet processor
85206721889Device for protecting an electronic apparatus
85216721423Lost cost countermeasures against compromising electromagnetic computer emanations
85226720860Password protection using spatial and temporal variation in a high-resolution touch sensitive display
85236715098System and method for fibrechannel fail-over through port spoofing
85246715086Data processing system and method having time-span support for input device driver
85256715085Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function
85266715083Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system
85276715073Secure server using public key registration and methods of operation
85286711686Security management tool for managing security attributes in computer systems
85296708273Apparatus and method for implementing IPSEC transforms within an integrated circuit
85306708272Information encryption system and method
85316704871Cryptographic co-processor
85326704420Device for sending or receiving a signal encrypted using deterministic chaos
85336697944Digital content distribution, transmission and protection system and method, and portable device for use therewith
85346694434Method and apparatus for controlling program execution and program distribution
85356687834Data processing system, method and program for generating a job within an automated test environment
85366681016System for transfer of secure mission data
85376678828Secure network file access control system
85386678822Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment
85396678390Method and computer program for embedding and extracting an embedded message from a digital image
854066783783-dimensional shape data encryption and decryption
85416675297Method and apparatus for generating and using a tamper-resistant encryption key

2003

85426671805System and method for document-driven processing of digitally-signed electronic documents
85436671759Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets
85446671674Computer-based auction and sale system
85456662166Tokenless biometric electronic debit and credit transactions
85466658571Security framework for dynamically wrapping software applications executing in a computing system
85476654465Method of implementing a key recovery system
85486650753System for encrypting broadcast programs in the presence of compromised receiver devices
85496647493Method and system for authentication and electronic signature
85506640303System and method for encryption using transparent keys
85516631472Kernel mode protection
85526609196E-mail firewall with stored key encryption/decryption
85536609116System and method for securely updating copy-protected media
85546597790Communication apparatus and a communication system
85556591273Method and system for secure electronic distribution, archiving and retrieval
85566587887Digital data transmission utilizing vector coordinates within a hyperbola model
85576587563Cryptographic system using chaotic dynamics
85586581042Tokenless biometric electronic check transactions
85596580809Quantization-based data hiding employing calibration and locally adaptive quantization
85606574466Method of securing transmission of information utilizing time variant techniques with error detecting code
85616571099Cell searching method in asynchronous wideband code division multiple access system
85626567914Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system
85636549624Apparatus and method for enhancing the security of negotiable documents
85646519699Method and system for voice guided secure entry of private data in a public setting
85656516415Device and method of maintaining a secret code within an integrated circuit package
85666510523Method and system for providing limited access privileges with an untrusted terminal
85676504929Encryption strength evaluation support apparatus and recording medium recording encryption strength evaluation support program

2002

85686501840Cryptographic processing apparatus cryptographic processing method and recording medium for recording a cryptographic processing program
85696442686System and methodology for messaging server-based management and enforcement of crypto policies
85706438252Method for encoding bits in a signal
85716438231Emulsion film media employing steganography
85726438230Data mapping method and apparatus with multi-party capability
85736434699Encryption processor with shared memory interconnect
85746408389System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
85756408077Descrambling device of a security element and security element comprising such a device
85766408074Hardware architecture for a configurable cipher device
85776397330Cryptographic policy filters and policy control method and apparatus
85786397198Tokenless biometric electronic transactions using an audio signature to identify the transaction processor
85796377690Safe transmission of broadband data messages
85806373952Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method
85816370248Synchronizing autonomous chaotic systems using filters
85826363153Method and apparatus for secure digital chaotic communication
85836363149Method and apparatus for accessing stored digital programs
85846363148Method, apparatus and computer program for activating an alternate encryption using an identifier embedded in data
85856360152Vehicle-control communication system
85866356637Field programmable gate arrays
85876347144Copy prevention method and apparatus for digital video system
85886341164Method and apparatus for correcting improper encryption and/or for reducing memory storage

2001

85896330673Determination of a best offset to detect an embedded pattern
85906311167Portable 2-way wireless financial messaging unit
85916307936Cryptographic key management scheme
85926301361Encoding and decoding information using randomization with an alphabet of high dimensionality
85936282657Kernel mode protection
85946278782Method of implementing a key recovery system
85956278781Wireless telephony with steganography
85966275859Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority
85976275587Secure data encoder and decoder
85986272633Methods and apparatus for transmitting, receiving, and processing secure voice over internet protocol
85996272632System and method for controlling access to a user secret using a key recovery field
86006266417Cryptographic communication process and apparatus
86016263087Method of encoding bits in a signal
86026252961Method and apparatus for performing data encryption and error code correction
86036247133Method for authenticating electronic documents on a computer network
86046243469Information transmission method and apparatus
86056233338Virtual encryption scheme combining different encryption operators into compound-encryption mechanism
86066219791Method and apparatus for generating and verifying encrypted data packets
86076219423System and method for digitally signing a digital agreement between remotely located nodes
86086219421Virtual matrix encryption (VME) and virtual key cryptographic method and apparatus
86096209098Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package
86106202056Method for computer network operation providing basis for usage fees
86116192476Controlling access to a resource
86126173403Method and apparatus for distributing information products

2000

86136154842Method and system for reducing time and power requirements for executing computer-readable instruction streams in an execution environment having run-time security constraints
86146154542Method and apparatus for simultaneously encrypting and compressing data
86156144742Optical disk, an optical disk barcode forming method, an optical disk reproduction apparatus, a marking forming apparatus, a method of forming a laser marking on an optical disk, and a method of manufacturing an optical disk
86166141116System and method for secured transmission of data over telephone communications system
86176128738Certificate based security in SNA data flows
86186128735Method and system for securely transferring a data set in a data communications system
86196119233Secure data communication system
86206118873System for encrypting broadcast programs in the presence of compromised receiver devices
86216118870Microprocessor having instruction set extensions for decryption and multimedia applications
86226115817Methods and systems for facilitating transmission of secure messages across insecure networks
86236115735Message guaranty system
86246112305Mechanism for dynamically binding a network computer client device to an approved internet service provider
86256111954Steganographic methods and media for photography
86266101255Programmable cryptographic processing system and method
86276092191Packet authentication and packet encryption/decryption scheme for security gateway
86286088800Encryption processor with shared memory interconnect
86296081895Method and system for managing data unit processing
86306078665Electronic encryption device and method
86316078663Communication apparatus and a communication system
86326075865Cryptographic communication process and apparatus
86336073235Private broadcast communication system and method for private broadcast communication over a wired or wireless network
86346069954Cryptographic data integrity with serial bit processing and pseudo-random generators
86356064738Method for encrypting and decrypting data using chaotic maps
86366064737Anti-piracy system for wireless telephony
86376058478Apparatus and method for a vetted field upgrade
86386058189Method and system for performing secure electronic monetary transactions
86396058186Information signal transmission system
86406052783Method of loading commands in the security module of a terminal
86416049613Method and apparatus for encrypting, decrypting, and providing privacy for data values
86426047069Method and apparatus for preserving error correction capabilities during data encryption/decryption
86436044469Software publisher or distributor configurable software security mechanism
86446038665System and method for backing up computer files over a wide area computer network
86456032260Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same
86466021391Method and system for dynamic data encryption
86476021203Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security
86486018801Method for authenticating electronic documents on a computer network
86496018582Optical transmission system implementing encrypting by deterministic chaos
86506016491Generic file format for multiple security requirements
86516014445Enciphering/deciphering apparatus and method incorporating random variable and keystream generation
86526014444Apparatus for encrypted communication

1999

86536005874Method of processing messages in a secure communications system having a plurality of encryption procedures, and such a secure communication system
86546003137Virtual group information managing method in bridge for network connection
86556002769Method and system for performing secure electronic messaging
86565999623Broadcast data access controller communication system
86575982889Method and apparatus for distributing information products
86585978959Method and devices for the transmission of data with transmission error checking
86595966448Cryptographic communication system
86605933501`Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism
86615930364Synchronized chaotic system and communication system using synchronized chaotic system
86625923760Chaotic communication apparatus and method for use with a wired or wireless transmission link
86635907620Method and apparatus for enforcing the use of cryptography in an international cryptography framework
86645894521System and method for encrypting sensitive information
86655892826Data processor with flexible data encryption
86665887064Cryptographic equipment
86675872846System and method for providing security in data communication systems
86685857025Electronic encryption device and method

1998

86695832214Method and apparatus for data security for a computer
86705828753Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package
86715822428Data encryption for product information and access
86725815574Provision of secure access to external resources from a distributed computing environment
86735805706Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format
86745793870System and method for encrypting sensitive information
86755793869Method and apparatus for encoding and data compressing text information
86765786784Remote-control device for a video receiver
86775764774Source data compression and decompression in code symbol printing and decoding
8678575181132N +D bit key encryption-decryption system using chaos
86795742686Device and method for dynamic encryption
86805742684Method and apparatus for data encryption and transmission
86815740252Apparatus and method for passing private demographic information between hyperlink destinations
86825732138Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system
86835721747Method and device for data transmission having improved error resilience with concomitant integrity protection

1997

86845691928Portable personal computer having removable security module
86855687236Steganographic method and device
86865680462Information encoder/decoder using chaotic systems
86875677956Method and apparatus for data encryption/decryption using cellular automata transform
86885659618Multi-size cryptographic key system
86895646994Method and apparatus for recording sensor data
86905642420Cryptoinformation repeater, subscriber terminal connected thereto, and cryptocommunication method
86915615269Ideal electronic negotiations
86925613004Steganographic method and device
86935608798Crytographic device with secure testing function
86945600724Method for the protection of messages transmitted using public communication lines
86955596327Radar encoder
86965594796Method and apparatus for detecting unauthorized distribution of data
86975592555Wireless communications privacy method and system

1996

86985579437Pitch epoch synchronous linear predictive coding vocoder and method
86995577122Secure communication of information
87005568556System and method for encrypting sensitive information
87015550809Multiple access coding using bent sequences for mobile radio communications
87025548648Encryption method and system
87035541995Method and apparatus for decoding non-sequential data packets
87045535277Encryption communication apparatus
87055533127Encryption system
87065524134Telecommunications security module
87075524072Methods and apparatus for data encryption and transmission
87085504834Pitch epoch synchronous linear predictive coding vocoder and method
87095504818Information processing system using error-correcting codes and cryptography
87105500898Scramble communication system multiplexing/demultiplexing scramble generation polynomial
87115499295Method and apparatus for feature authorization and software copy protection in RF communications devices
87125497419Method and apparatus for recording sensor data
87135483595Paging device including password accessed stored cryptographic keys

1995

87145479513Fast and secure encryption-decryption method based on chaotic dynamics
87155455864Encrypted paging message transmission
87165404402Clock frequency modulation for secure microprocessors

1994

87175369703Command and control signalling method and apparatus
87185365591Secure cryptographic logic arrangement
87195365589Method and apparatus for encryption, decryption and authentication using dynamical systems
87205355412Identifying secret data messages in a one-direction multipoint network
87215353352Multiple access coding for radio communications
87225333198Digital interface circuit
87235329623Apparatus for providing cryptographic support in a network
87245321753Secure communication of static information by electronic means
87255311595Method of transferring data, between computer systems using electronic cards
87265307409Apparatus and method for fault detection on redundant signal lines via encryption
87275303293Cryptographic device with a display means for identification of a defective function in the cryptographic device
87285285497Methods and apparatus for scrambling and unscrambling compressed data streams
87295285496Methods and apparatus for providing a secure paging system
87305283832Paging message encryption
87315280529Communication network intended for secure transmissions
87325280497Communicating on wandering channels
87335276738Software data protection mechanism

1993

87345266942Security system with memory in transmitter and receiver
87355265164Cryptographic facility environment backup/restore and replication in a public key cryptosystem
87365253293Adaptive data ciphering/deciphering apparatuses and data communication system using these apparatuses
87375249227Method and apparatus of controlling processing devices during power transition
87385245658Domain-based encryption
87395245655Method and a device for the protected transmission of data
87405233653Apparatus and method for enciphered facsimile transmission and reception
87415226081Multi-carrier communication system using ciphered carrier bit assignment information
87425224164Method and apparatus for transliterating messages
87435212729Computer data security device and method
87445208855Method and apparatus for irrigation control using evapotranspiration
87455199069Automatic encryption selector
87465193115Pseudo-random choice cipher and method
87475185797Encrypted trunked control channel system

1992

87485161191Encryption system for time division multiplexed networks
87495161186System for secure and private communication in a triple-connected network
87505159633Multimedia network system
87515150409Device for the identification of messages
87525131040Method for backing up and erasing encryption keys
87535128996Multichannel data encryption device
87545113444Random choice cipher system and method

1991

87555054068Trunked radio communication system having encrypted system control information
87565048086Encryption system based on chaos theory
87575020106Process for the cryptographic processing of data and cryptographic systems
87585010573Cryptographic system by blocs of binery data
87595007087Method and apparatus for generating secure random numbers using chaos
87604997288Power supply arrangement for fault-tolerant operation in a microcomputer-based encryption system
87614991209Random local message encryption
87624984271Cipher system with closed cipher procedure

1990

87634972478Soft logic cryptographic circuit
87644972472Method and apparatus for changing the master key in a cryptographic system
87654969188Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management
87664944006Secure data packet transmission system and method
87674932057Parallel transmission to mask data radiation
87684926475Data encryption key failure monitor
87694922533High security evolutive coding process and device for carrying out this process
87704910777Packet switching architecture providing encryption across packets

1989

87714890324Enciphering/deciphering method and arrangement for performing the method
87724887296Cryptographic system for direct broadcast satellite system
87734876718Secure data packet transmission system and method
87744866773System for interfacing a digital encryption device to a time-division multiplexed communication system
87754866772Communication system
87764853962Encryption system
87774817142Restoring framing in a communications system
87784811392Communications network
87794809327Encrtption of messages employing unique control words and randomly chosen encryption keys
87804803725Cryptographic system using interchangeable key blocks and selectable key fragments
87814802220Method and apparatus for multi-channel communication security
87824797921System for enciphering or deciphering data

1988

87834794644Method of secured communications in a telecommunications system
87844782529Decryption of messages employing unique control words and randomly chosen decryption keys
87854771458Secure data packet transmission system and method
87864763357Method and apparatus for providing secure electronic communications
87874760600Cipher system
87884760599Data encryptor

1987

87894703503Cryptographic system using pseudocomplements of vector Boolean algebra
87904694491Cryptographic system using interchangeable key blocks and selectable key fragments
87914688250Apparatus and method for effecting a key change via a cryptographically protected link
87924675477Electronic device providing automatic permutations of a Vigenere Square
87934661657Method and apparatus for transmitting and receiving encoded data
87944658093Software distribution system
87954652698Method and system for providing system security in a remote terminal environment

1986

87964591660Common control audio decryptor
87974563546Method for preventing "compromising radiation"

1985

87984555591Integrated circuit devices for secure data encryption
87994533948CATV Communication system
88004531021Two level encripting of RF signals
88014531020Multi-layer encryption system for the broadcast of encrypted information

1984

88024441095Code translator

1983

88034418425Encryption using destination addresses in a TDMA satellite communications network
88044408203Security system for electronic funds transfer system
88054408093Cryptographic encoder-decoder
88064404426Cryptographic telegraphy programming system
88074386416Data compression, encryption, and in-line transmission system

1982

88084366551Associative memory search system
88094365110Multiple-destinational cryptosystem for broadcast networks
88104329545Circuit arrangement for the control of semi-duplex data transmission system
88114323729Circuit arrangement for the control of a crypto operation in the case of procedure-controlled semi-duplex data transmission systems
88124322576Message format for secure communication over data links
88134315101Method and apparatus for securing data transmissions

1981

88144301327Reduction of message redundancy by multiple substitution: a message preprocessing scheme for secure communications
88154274085Flexible mode DES system
88164262359Five V insertion unit
88174249180Past dependent microcomputer cipher apparatus

1980

88184232187Teletype character modification unit
88194229817Portable electronic cryptographic device
88204224666Data processing system which protects the secrecy of confidential data
88214208739Integrated encryption and channel coding technique

1979

88224176247Signal scrambler-unscrambler for binary coded transmission system
88234162483Bilateral master station-plural satellite station signalling apparatus

1978

88244091423Synchronous digital data scrambling system

1976

88253984637Computer terminal security system
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017