СПИСОК патентов США - подгруппа МПК16 H04L9/00
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9609067 | Proxy captive portal traffic for input-limited devices | |||
2 | 9608980 | Environment-aware security tokens | |||
3 | 9608967 | Method and system for establishing a session key | |||
4 | 9608817 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
5 | 9608811 | Managing access to a secure digital document | |||
6 | 9608802 | Decoy bits method for direct encryption and key generation | |||
7 | 9607178 | Protection against key tampering | |||
8 | 9607173 | Information processing apparatus, information processing method, and recording medium | |||
9 | 9607158 | Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium | |||
10 | 9607143 | Provisioning account credentials via a trusted channel | |||
11 | 9603012 | Secure wireless device connection using power line messages | |||
12 | 9603010 | Automatic security action invocation for mobile communications device | |||
13 | 9602549 | Establishing trust between applications on a computer | |||
14 | 9602497 | Trusted and unsupervised digital certificate generation using a security token | |||
15 | 9602482 | Authentication for an API request | |||
16 | 9602291 | Secure connection certificate verification | |||
17 | 9602279 | Configuring devices for use on a network using a fast packet exchange with authentication | |||
18 | 9602278 | Encryption device, cipher-text comparison system, cipher-text comparison method, and cipher-text comparison program | |||
19 | 9600677 | Database apparatus, method, and program | |||
20 | 9600421 | Systems and methods for low-latency encrypted storage | |||
21 | 9600291 | Secure boot using a field programmable gate array (FPGA) | |||
22 | 9600238 | Fully digital chaotic differential equation-based systems and methods | |||
23 | 9596598 | Reducing detectability of an encryption key | |||
24 | 9596083 | Information processing technique for pattern matching | |||
25 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
26 | 9596075 | Transparent serial encryption | |||
27 | 9594769 | Computing device configured with a table network | |||
28 | 9590971 | Environment-aware security tokens | |||
29 | 9590806 | Secure provisioning of semiconductor chips in untrusted manufacturing factories | |||
30 | 9589150 | Managing confidential information | |||
31 | 9589144 | System and method for cryptographic suite management | |||
32 | 9584587 | Managing transmission and storage of sensitive data | |||
33 | 9584516 | Proxy authentication for a multiple core network device | |||
34 | 9584496 | Systems and methods for securely monitoring an individual | |||
35 | 9584492 | Cryptographic proxy service | |||
36 | 9584485 | Key encryption system, method, and network devices | |||
37 | 9584320 | Blinding function in elliptic curve cryptography | |||
38 | 9584317 | Identifying security boundaries on computing devices | |||
39 | 9584315 | Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof | |||
40 | 9584311 | Decrypting data | |||
41 | 9584310 | Protecting a white-box implementation against attacks | |||
42 | 9583704 | Complementary resistance switch, contact-connected polycrystalline piezo- or ferroelectric thin-film layer, method for encrypting a bit sequence | |||
43 | 9579562 | Prism code | |||
44 | 9578125 | Systems, devices, and methods for protecting access privacy of cached content | |||
45 | 9578036 | Access revocation | |||
46 | 9578035 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
47 | 9577822 | Secure bitstream authentication | |||
48 | 9577821 | Function masking apparatus in symmetric cryptographic algorithm for preventing side channel attacks and method thereof | |||
49 | 9576133 | Detection of data tampering of encrypted data | |||
50 | 9576116 | Secure software components anti-reverse-engineering by table interleaving | |||
51 | 9572026 | Location services for a wireless device | |||
52 | 9571525 | Policy management system, id provider system, and policy evaluation device | |||
53 | 9571499 | Apparatus and method of providing security to cloud data to prevent unauthorized access | |||
54 | 9571468 | Encoding data using a variable number of pixels and bits based on entropy | |||
55 | 9571464 | Network-enabled device provisioning | |||
56 | 9571289 | Methods and systems for glitch-resistant cryptographic signing | |||
57 | 9571286 | Authenticating the identity of initiators of TCP connections | |||
58 | 9571281 | CRT-RSA encryption method and apparatus | |||
59 | 9571279 | Systems and methods for secured backup of hardware security modules for cloud-based web services | |||
60 | 9571268 | Method and system for homomorphicly randomizing an input | |||
61 | 9571267 | Data processor and decryption method | |||
62 | 9569629 | Communication between key manager and storage subsystem kernel via management console | |||
63 | 9569623 | Secure boot with resistance to differential power analysis and other external monitoring attacks | |||
64 | 9569606 | Verification of a pattern based passcode | |||
65 | 9565189 | Method and system for providing access to administrative functionality a virtualization environment | |||
66 | 9565021 | Shape actuation encapsulant of a cryptographic module | |||
67 | 9565017 | Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks | |||
68 | 9565016 | Protection of the execution of an algorithm against side-channel attacks | |||
69 | 9563785 | Optimized encryption filtering of files | |||
70 | 9563729 | Signal transition analysis of a circuit | |||
71 | 9560059 | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection | |||
72 | 9560050 | System and method to share a resource or a capability of a device | |||
73 | 9560040 | Mitigating risk of account enumeration | |||
74 | 9559850 | Component management via secure communications | |||
75 | 9559846 | Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems | |||
76 | 9559844 | Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program | |||
77 | 9559838 | Method of processing data protected against fault injection attacks and associated device | |||
78 | 9558375 | Protection of registers against unilateral disturbances | |||
79 | 9558360 | Protecting information using policies and encryption | |||
80 | 9558113 | Secure garbage collection on a mobile device | |||
81 | 9553722 | Generating a key based on a combination of keys | |||
82 | 9552493 | Access control framework for information centric networking | |||
83 | 9548970 | Managing unlinkable identifiers for controlled privacy-friendly data exchange | |||
84 | 9548862 | Managing entropy in computing devices for cryptographic key generation | |||
85 | 9547774 | System and method for distributed deduplication of encrypted chunks | |||
86 | 9547498 | Method and chip card for transmitting information | |||
87 | 9544297 | Method for secured data processing | |||
88 | 9544284 | Secure data exchange technique | |||
89 | 9544277 | KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages | |||
90 | 9544154 | Method of authenticating a device | |||
91 | 9544153 | Compression of cryptographic chaining certificates | |||
92 | 9544139 | Method and apparatus for a non-deterministic random bit generator (NRBG) | |||
93 | 9544138 | Authenticator, authenticatee and authentication method | |||
94 | 9544133 | On-the-fly key generation for encryption and decryption | |||
95 | 9544132 | Cryptographic method for protecting a key hardware register against fault attacks | |||
96 | 9544131 | Efficient modular addition resistant to side channel attacks | |||
97 | 9544130 | Protection of a calculation against side-channel attacks | |||
98 | 9542374 | Method and apparatus for applying revision specific electronic signatures to an electronically stored document | |||
99 | 9542155 | Proxy calculation system, method, request device and program thereof | |||
100 | 9542114 | Methods and apparatus to protect memory regions during low-power states | |||
101 | 9538311 | Auto-provisioning for internet-of-things devices | |||
102 | 9537866 | Method and apparatus to control the use of applications based on network service | |||
103 | 9537837 | Method for ensuring media stream security in IP multimedia sub-system | |||
104 | 9537660 | Method of establishing public key cryptographic protocols against quantum computational attack | |||
105 | 9537653 | Encryption key generating apparatus and computer program product | |||
106 | 9537650 | Verifiable trust for data through wrapper composition | |||
107 | 9537549 | Method, terminal and base station for multi-user interference suppression | |||
108 | 9536098 | Methods and systems for concealing information | |||
109 | 9535675 | Rule based device enrollment | |||
110 | 9535658 | Secure private database querying system with content hiding bloom filters | |||
2016 | |||||
111 | 9531692 | Method of securing mobile applications using distributed keys | |||
112 | 9531548 | Security system for handheld wireless devices using time-variable encryption keys | |||
113 | 9531540 | Secure token-based signature schemes using look-up tables | |||
114 | 9531539 | Information processing apparatus, and information processing method | |||
115 | 9531535 | Secure memories using unique identification elements | |||
116 | 9531531 | Methods and devices for fixed execution flow multiplier recoding and scalar multiplication | |||
117 | 9529465 | Secure interaction with input devices | |||
118 | 9529071 | Ultrasonic-wave communication system | |||
119 | 9525678 | Non-transitory computer readable medium, server and system | |||
120 | 9525435 | Computing device storing look-up tables for computation of a function | |||
121 | 9524404 | Program execution device | |||
122 | 9524392 | Encrypting genomic data for storage and genomic computations | |||
123 | 9524370 | Method for privacy-preserving medical risk test | |||
124 | 9524240 | Obscuring memory access patterns in conjunction with deadlock detection or avoidance | |||
125 | 9524239 | Self service propagation of custom extension fields into web services | |||
126 | 9521359 | Mobile high-definition link data converter and mobile high-definition link data converting method | |||
127 | 9521124 | Secure computation using a server module | |||
128 | 9520995 | Efficient prime-number check | |||
129 | 9519618 | System and method for determining distance between signals | |||
130 | 9516364 | Secure transcoding of content | |||
131 | 9516335 | Wireless display encoder architecture | |||
132 | 9516058 | Method and system for determining whether domain names are legitimate or malicious | |||
133 | 9516002 | Systems and methods for securing data in motion | |||
134 | 9516001 | Methods and apparatus to identify media distributed via a network | |||
135 | 9515994 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | |||
136 | 9515821 | Apparatus and method for data encryption | |||
137 | 9515820 | Protection against side channels | |||
138 | 9515818 | Multi-block cryptographic operation | |||
139 | 9514307 | Method for producing a secured data object and system | |||
140 | 9509663 | Secure distribution of session credentials from client-side to server-side traffic management devices | |||
141 | 9509661 | Method and apparatus for displaying HTTPS block page without SSL inspection | |||
142 | 9509512 | Message digest generator | |||
143 | 9509497 | Method for generating a random output bit sequence | |||
144 | 9509494 | Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption | |||
145 | 9509493 | Information processing technique for secure pattern matching | |||
146 | 9509492 | Authentication device, output device, verification device and input device | |||
147 | 9503456 | Video chat abuse detection based on external context | |||
148 | 9503452 | System and method for identity recognition and affiliation of a user in a service transaction | |||
149 | 9503269 | Utilizing a stapling technique with a server-based certificate validation protocol to reduce overhead for mobile communication devices | |||
150 | 9503259 | System and method for generating and protecting cryptographic keys | |||
151 | 9503256 | SMS4 acceleration hardware | |||
152 | 9503255 | Cryptographic sequencing system and method | |||
153 | 9497632 | System and method for pairing a UICC card with a particular mobile communications device | |||
154 | 9497029 | Hardening of direct anonymous attestation from side-channel attack | |||
155 | 9497022 | Method and system for improved fault tolerance in distributed customization controls using non-volatile memory | |||
156 | 9497021 | Device for generating a message authentication code for authenticating a message | |||
157 | 9496897 | Methods and apparatus for generating authenticated error correcting codes | |||
158 | 9495818 | Information processing system, control information processing device, and program | |||
159 | 9495552 | Integrated data deduplication and encryption | |||
160 | 9495546 | Electronic signing methods, systems, and apparatus | |||
161 | 9495400 | Dynamic output selection using highly optimized data structures | |||
162 | 9495366 | System for distributing digital media to exhibitors | |||
163 | 9495240 | Encrypting data for storage in a dispersed storage network | |||
164 | 9495111 | System and method for reducing information leakage from memory | |||
165 | 9494645 | Method for testing cryptographic circuits, secured cryptographic circuit capable of being tested, and method for wiring such circuit | |||
166 | 9490972 | Method and apparatus for providing conditional access based on channel characteristics | |||
167 | 9489785 | RFID secure authentication | |||
168 | 9485609 | Pulse frequency control for wireless communications and ranging | |||
169 | 9485281 | Communication system and server | |||
170 | 9485258 | Mediation system and method for restricted access item distribution | |||
171 | 9485101 | Provisioning digital certificates in a network environment | |||
172 | 9485099 | Apparatus, systems and methods for agile enablement of secure communications for cloud based applications | |||
173 | 9485093 | Push button configuration pairing | |||
174 | 9485088 | Systems and methods for dynamic data masking | |||
175 | 9485087 | Method and circuit for cryptographic operation | |||
176 | 9483663 | Countermeasure method for protecting stored data | |||
177 | 9479571 | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements | |||
178 | 9479327 | Apparatus and method for generating key | |||
179 | 9473603 | Memory system for portable telephone | |||
180 | 9473526 | Fight-through nodes for survivable computer network | |||
181 | 9473498 | Method for using java servlets as a stack based state machine | |||
182 | 9473333 | Communications system via data scrambling and associated methods | |||
183 | 9473302 | Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device | |||
184 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
185 | 9473295 | Virtual transportation point of sale | |||
186 | 9471948 | System and method for administering licenses stored by a product unit, and administration of said unit in the field | |||
187 | 9467291 | Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object | |||
188 | 9467288 | Encryption key destruction for secure data erasure | |||
189 | 9467287 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
190 | 9465960 | Physics-based authentication | |||
191 | 9462473 | Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI) | |||
192 | 9462002 | System, method, and computer program product for sharing files based on user profile visibility | |||
193 | 9461974 | System and method to merge encrypted signals in distributed communication system | |||
194 | 9460298 | Sensitive data aliasing | |||
195 | 9455979 | System and method for establishing trust using secure transmission protocols | |||
196 | 9455968 | Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share | |||
197 | 9455831 | Order preserving encryption method | |||
198 | 9455827 | Communication apparatus, computer program product, and communication system | |||
199 | 9454346 | Extracting entropy from the vibration of multiple machines | |||
200 | 9451462 | Setup of multiple IoT network devices | |||
201 | 9450929 | Communication device, communication system, and computer program product | |||
202 | 9450765 | System and method capable of verifying contactless sensor tag | |||
203 | 9450763 | Server-side key generation | |||
204 | 9449191 | Device, system and method for securing and comparing genomic data | |||
205 | 9449164 | Method of securing a computing device | |||
206 | 9444872 | Method, server and system for data sharing | |||
207 | 9444793 | System, apparatus and method for encryption and decryption of data transmitted over a network | |||
208 | 9444618 | Defense against attacks on ring oscillator-based physically unclonable functions | |||
209 | 9444580 | Optimized data transfer utilizing optimized code table signaling | |||
210 | 9443091 | Method and system for protecting execution of cryptographic hash functions | |||
211 | 9438940 | Methods and apparatus to identify media using hash keys | |||
212 | 9438423 | Encryption device, encryption method, and information processing device | |||
213 | 9438422 | Chaotic-based synchronization for secure network communications | |||
214 | 9438420 | Unpredictable number generation | |||
215 | 9438412 | Computer-implemented system and method for multi-party data function computing using discriminative dimensionality-reducing mappings | |||
216 | 9436836 | Tamperproof regulation of a process, production, and actuating installation | |||
217 | 9436804 | Establishing a unique session key using a hardware functionality scan | |||
218 | 9432191 | Public key encryption system based on the quadratic residuosity assumption | |||
219 | 9432189 | Techniques for handshake-free encrypted communication using symmetric key caching during request-and-response | |||
220 | 9432188 | Secret sharing system, data distribution apparatus, distributed data transform apparatus, secret sharing method and program | |||
221 | 9432180 | Method and system for a programmable parallel computation and data manipulation accelerator | |||
222 | 9430676 | Processor related noise encryptor | |||
223 | 9430662 | Provisioning authorization claims using attribute-based access-control policies | |||
224 | 9430659 | Locating cryptographic keys stored in a cache | |||
225 | 9430656 | Device for carrying out a cryptographic method, and operating method for same | |||
226 | 9430188 | Method for protecting a cryptographic device against SPA, DPA and time attacks | |||
227 | 9426154 | Providing devices as a service | |||
228 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
229 | 9425960 | Searchable encryption for outsourcing data analytics | |||
230 | 9425957 | System and method for remote reset of password and encryption key | |||
231 | 9425952 | Algebraic manipulation detection codes from algebraic curves | |||
232 | 9423820 | Complimentary bit slicing side channel attack defense | |||
233 | 9423425 | Side-channel analysis apparatus and method based on profile | |||
234 | 9420457 | Multiple-persona on mobile devices | |||
235 | 9419983 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
236 | 9419800 | Secure network systems and methods | |||
237 | 9419791 | Hash value calculation device, hash value calculation method, and non-transitory computer-readable storage medium including computer executable instruction | |||
238 | 9419790 | Differential power analysis--resistant cryptographic processing | |||
239 | 9419789 | Method and apparatus for scalar multiplication secure against differential power attacks | |||
240 | 9418238 | Search system, search method of search system, and information processing device | |||
241 | 9414230 | Certificate management with consequence indication | |||
242 | 9414226 | Method and system to provide secure exchange of data between mobile phone and computer system | |||
243 | 9413729 | Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium | |||
244 | 9413687 | Automatic workload transfer to an on-demand center | |||
245 | 9413530 | System and method of lawful access to secure communications | |||
246 | 9411986 | System and method for encrypting secondary copies of data | |||
247 | 9411950 | Methods and systems for user authentication in a computer system using image-based log-ins | |||
248 | 9408079 | Apparatus and method for communication security in a nationwide wireless network using wireless routers | |||
249 | 9408078 | IP mobility security control | |||
250 | 9407438 | Cryptographic system, cryptographic method, and cryptographic program | |||
251 | 9407435 | Cryptographic key generation based on multiple biometrics | |||
252 | 9405928 | Deriving encryption rules based on file content | |||
253 | 9405729 | Cryptographic method comprising a modular exponentiation operation | |||
254 | 9401932 | Device and method for detection of anomalous behavior in a computer network | |||
255 | 9401908 | Authentication interworking in communications networks | |||
256 | 9401898 | System and method for wireless data protection | |||
257 | 9401893 | System and method for providing data security in a hosted service system | |||
258 | 9401807 | Processing non-editable fields in web pages | |||
259 | 9401805 | Encrypting device, encrypting method, and recording medium | |||
260 | 9401802 | Side channel power attack defense with pseudo random clock operation | |||
261 | 9400876 | Content data management system and method | |||
262 | 9400636 | Apparatus and method for calculating a result in a scalar multiplication | |||
263 | 9398049 | Method and device for securely transmitting data | |||
264 | 9397826 | Encryption device and method for defending a physical attack | |||
265 | 9397825 | Method and system for reconstruction of a data object from distributed redundant data parts | |||
266 | 9396359 | System and method for encrypted disk drive sanitizing | |||
267 | 9395207 | System and method to record encrypted content with access conditions | |||
268 | 9392437 | Method and system for IP multimedia bearer path optimization through a succession of border gateways | |||
269 | 9391997 | Message processing apparatus, wireless device and method of storing a message in a wireless device | |||
270 | 9391961 | Information operating device, information output device, and information processing method | |||
271 | 9391773 | Elliptic curve point multiplication procedure resistant to side-channel information leakage | |||
272 | 9391769 | Serial transmission having a low level EMI | |||
273 | 9390271 | Vectorial private equality testing | |||
274 | 9386041 | Method and system for automated incident response | |||
275 | 9386024 | System and method for detecting modified or corrupted external devices | |||
276 | 9384350 | Signature compilation on a security device | |||
277 | 9380050 | Scan image authentication | |||
278 | 9380049 | Method and system for authentication-based multi-user online video game | |||
279 | 9380044 | Supporting differentiated secure communications among heterogeneous electronic devices | |||
280 | 9380037 | Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management | |||
281 | 9380036 | Methods and devices for securing keys for a nonsecured, distributed environment with applications to virtualization and cloud-computing security and management | |||
282 | 9380033 | Implementing use-dependent security settings in a single white-box implementation | |||
283 | 9374373 | Encryption techniques for improved sharing and distribution of encrypted content | |||
284 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
285 | 9374220 | System and method for providing compressed encryption and decryption in homomorphic encryption based on integers | |||
286 | 9372791 | Method for masking the end-of-life transition of an electronic device and device comprising a corresponding control module | |||
287 | 9369754 | Video content tracking | |||
288 | 9369495 | Sensor aware security policies with embedded controller hardened enforcement | |||
289 | 9369486 | Device and method for encoding input data based on hamming distance and/or weight | |||
290 | 9369415 | Marking electronic messages to indicate human origination | |||
291 | 9369285 | Social network based PKI authentication | |||
292 | 9369277 | Encryption code generation using spin-torque NANO-oscillators | |||
293 | 9369273 | System and method for mixing VoIP streaming data for encrypted processing | |||
294 | 9367693 | Bitstream confirmation for configuration of a programmable logic device | |||
295 | 9367509 | Configurable multi-lane scrambler for flexible protocol support | |||
296 | 9363667 | System and method for user-privacy-aware communication monitoring and analysis | |||
297 | 9363258 | Secure digital signature system | |||
298 | 9363244 | Realizing authorization via incorrect functional behavior of a white-box implementation | |||
299 | 9363078 | Method and apparatus for hardware-accelerated encryption/decryption | |||
300 | 9363075 | Polymorphic encryption key matrices | |||
301 | 9363074 | Encryption processing apparatus, encryption processing method, and computer program | |||
302 | 9363073 | Cryptographic countermeasure method by deriving a secret data | |||
303 | 9361617 | Variable-length cipher system and method | |||
304 | 9361480 | Anonymization of streaming data | |||
305 | 9357373 | Method and system for IP multimedia bearer path optimization through a succession of border gateways | |||
306 | 9356965 | Method and system for providing transparent trusted computing | |||
307 | 9356943 | Systems and methods for performing security analyses on network traffic in cloud-based environments | |||
308 | 9356921 | Different authentication profiles | |||
309 | 9356784 | Cryptic notes and related apparatus and methods | |||
310 | 9356778 | Secured communication for local area network | |||
311 | 9355271 | System and method for dynamic, non-interactive, and parallelizable searchable symmetric encryption | |||
312 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
313 | 9350543 | Method and system for homomorphicly randomizing an input | |||
314 | 9350538 | Revocation status using other credentials | |||
315 | 9350533 | Method and apparatus for delivering encrypted content to web browsers based on entropy of the content | |||
316 | 9350532 | System and method for conducting searches at target devices | |||
317 | 9349023 | Database encryption system, method, and program | |||
318 | 9344895 | Method and system for securely accessing portable hotspot for intelligent mobile phones | |||
319 | 9344455 | Apparatus and method for sharing a hardware security module interface in a collaborative network | |||
320 | 9344407 | Centrally managed use case-specific entity identifiers | |||
321 | 9344278 | Secure data transfer using random ordering and random block sizing | |||
322 | 9344277 | Mass serialization analytics | |||
323 | 9344274 | Method and system for encrypting data | |||
324 | 9344273 | Cryptographic device for implementing S-box | |||
325 | 9342701 | Digital rights management system and methods for provisioning content to an intelligent storage | |||
326 | 9338146 | Method and apparatus for monitoring transmission characteristics in a network | |||
327 | 9338139 | System, apparatus and method for encryption and decryption of data transmitted over a network | |||
328 | 9338012 | Systems and methods for identifying code signing certificate misuse | |||
329 | 9338008 | System and method for secure release of secret information over a network | |||
330 | 9338005 | System for and method of remote secure backup | |||
331 | 9338004 | Method and system for smart card chip personalization | |||
332 | 9338001 | Privacy enhanced spatial analytics | |||
333 | 9338000 | Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm | |||
334 | 9336404 | Privacy-protective data transfer and storage | |||
335 | 9336092 | Secure data deduplication | |||
336 | 9332438 | Method for updating group temporal key, related apparatus and system | |||
337 | 9331990 | Trusted and unsupervised digital certificate generation using a security token | |||
338 | 9331855 | Apparatus, system, and method for providing attribute identity control associated with a processor | |||
339 | 9331852 | System and method for securing data transaction | |||
340 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
341 | 9331848 | Differential power analysis resistant encryption and decryption functions | |||
342 | 9331847 | Countermeasure method and device for protecting data circulating in an electronic component | |||
343 | 9330270 | Encryption processing device and authentication method | |||
344 | 9325944 | Secure delivery of program content via a removable storage medium | |||
345 | 9325683 | Mobile application management framework | |||
346 | 9325674 | Privacy system | |||
347 | 9325671 | System and method for merging encryption data using circular encryption key switching | |||
348 | 9325668 | System for supporting over-the-air service and method thereof | |||
349 | 9325642 | Randomness for encryption operations | |||
350 | 9325509 | Determination method for cryptographic algorithm used for signature, validation server and program | |||
351 | 9325502 | Identity management for transactional content | |||
352 | 9325494 | Method for generating a bit vector | |||
353 | 9325493 | System and methods for silencing hardware backdoors | |||
354 | 9325492 | Method for increasing I/O performance in systems having an encryption co-processor | |||
355 | 9323957 | Anti-tamper system based on dual random bits generators for integrated circuits | |||
356 | 9323944 | Conforming passwords to a password policy | |||
357 | 9323603 | Storage of sensitive data in a dispersed storage network | |||
358 | 9319877 | Secret key generation | |||
359 | 9319446 | System and method for transport stream sync byte detection with transport stream having multiple emulated sync bytes | |||
360 | 9319413 | Method for establishing resource access authorization in M2M communication | |||
361 | 9319412 | Method for establishing resource access authorization in M2M communication | |||
362 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
363 | 9317712 | Providing secure communication and/or sharing of personal data via a broadband gateway | |||
364 | 9317708 | Hardware trust anchors in SP-enabled processors | |||
365 | 9317668 | Dynamic tardos traitor tracing schemes | |||
366 | 9313182 | Protecting information using policies and encryption | |||
367 | 9313181 | System and method to merge encrypted signals in distributed communication system | |||
368 | 9313180 | Systems and methods for quantum key generation | |||
369 | 9313179 | Mixing secure and insecure data and operations at server database | |||
370 | 9313028 | Method for fully homomorphic encryption using multivariate cryptography | |||
371 | 9313027 | Protection of a calculation performed by an integrated circuit | |||
372 | 9313022 | Homomorphic cryptography modeling in support of privacy policies | |||
373 | 9313021 | Secret communication method with self-authentication capability | |||
374 | 9312923 | Personal point of sale | |||
375 | 9312861 | Protecting data from decryption from power signature analysis in secure applications | |||
376 | 9311640 | Methods and arrangements for smartphone payments and transactions | |||
377 | 9311639 | Methods, apparatus and arrangements for device to device communication | |||
378 | 9310862 | Method and apparatus for monitoring performance for secure chip operation | |||
379 | 9306946 | Intelligent electronic cryptographic cloud computing system | |||
380 | 9306746 | Randomizing current injection circuit to obscure gate noise for added security | |||
381 | 9306740 | Systems, methods, and apparatus for a quantum key distribution telescope | |||
382 | 9306738 | Managed secure computations on encrypted data | |||
383 | 9305160 | Method and system for automatic updating of randomly generated user passwords | |||
384 | 9305157 | Authentication target having ambiguous target elements | |||
385 | 9301133 | Audio summing systems and methods in radio communication systems | |||
386 | 9300656 | Secure connection certificate verification | |||
387 | 9300654 | Method of handling a certification request | |||
388 | 9300635 | Overlay network with position independent insertion and tap points | |||
389 | 9300626 | Method and system for device setup with a user network identity address provisioning server | |||
390 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
391 | 9300468 | Secure node admission in a communication network | |||
392 | 9298947 | Method for protecting the integrity of a fixed-length data structure | |||
393 | 9294915 | Localized network authentication and security using tamper-resistant keys | |||
394 | 9294468 | Application-level certificates for identity and authorization | |||
395 | 9294446 | Content encryption | |||
396 | 9294444 | Systems and methods for cryptographically splitting and storing data | |||
397 | 9294429 | Method and system for providing service for searching friends | |||
398 | 9294277 | Audio encryption systems and methods | |||
399 | 9292706 | Customer data management for data analytics outsourcing | |||
400 | 9292663 | Associating first and second watermarks with audio or video content | |||
401 | 9288229 | Device association via video handshake | |||
402 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
403 | 9288046 | Device for generating an encrypted key and method for providing an encrypted key to a receiver | |||
404 | 9288043 | Methods and systems for providing high-security cryptographic keys to mobile radios | |||
405 | 9288042 | Securely and redundantly storing encryption credentials system and method | |||
406 | 9288040 | Encryption device | |||
407 | 9288039 | Privacy-preserving text language identification using homomorphic encryption | |||
408 | 9288038 | Access-controlled data storage medium | |||
409 | 9282114 | Generation of alerts in an event management system based upon risk | |||
410 | 9281945 | Offline methods for authentication in a client/server authentication system | |||
411 | 9281941 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
412 | 9281940 | Information processing apparatus, information processing method, and program | |||
413 | 9281939 | Method and system for encrypting data delivered over a network | |||
414 | 9280911 | Context-aware training systems, apparatuses, and methods | |||
415 | 9280675 | Encrypting and storing confidential data | |||
416 | 9276753 | System and method for data authentication among processors | |||
417 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
418 | 9276741 | Content encryption key management | |||
419 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
420 | 9276739 | Method and apparatus for encrypting/decrypting data | |||
421 | 9276736 | Connection key distribution | |||
422 | 9276734 | Confidential computation system, confidential computation method, and confidential computation program | |||
423 | 9275423 | Right object renewal method and apparatus for right-protected broadcast service | |||
424 | 9275250 | Searchable encryption processing system | |||
425 | 9275243 | Communication between key manager and storage subsystem kernel via management console | |||
426 | 9275202 | Data processing method | |||
427 | 9274976 | Code tampering protection for insecure environments | |||
428 | 9270947 | Terminal device, server, data processing system, data processing method, and program | |||
429 | 9270703 | Enhanced control-plane security for network-accessible services | |||
430 | 9270648 | System and method for initiating protected instant messaging conversations | |||
431 | 9270468 | Methods to improve secure flash programming | |||
432 | 9270466 | System and method for temporary secure boot of an electronic device | |||
433 | 9270465 | Control word protection | |||
434 | 9270459 | Techniques for achieving tenant data confidentiality from cloud service provider administrators | |||
435 | 9270458 | Encryption processing device, encryption processing method, and program | |||
436 | 9270456 | System and methodology for decrypting encrypted media | |||
437 | 9270455 | CPU assisted seeding of a random number generator in an externally provable fashion | |||
438 | 9270452 | Encryption using real-world objects | |||
439 | 9270451 | Privacy enhanced spatial analytics | |||
440 | 9268736 | Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in a multi-core system | |||
441 | 9268555 | Multiple system images for over-the-air updates | |||
442 | 9264902 | Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI) | |||
443 | 9264410 | Dynamic configuration of trusted executed environment resources | |||
444 | 9264397 | Method and system for implementing a user network identity address provisioning server | |||
445 | 9264236 | Embedded extrinsic source for digital certificate validation | |||
446 | 9264229 | System and method for generating random key stream cipher texts | |||
447 | 9264220 | Secure virtual machine provisioning | |||
448 | 9262656 | Multi-protocol RFID system | |||
449 | 9262639 | Plaintext injection attack protection | |||
450 | 9262259 | One-time programmable integrated circuit security | |||
451 | 9258701 | Adding randomness internally to a wireless mobile communication device | |||
452 | 9258130 | Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property | |||
453 | 9258120 | Distributed public key revocation | |||
454 | 9258116 | System and methods for permitting open access to data objects and for securing data within the data objects | |||
455 | 9256752 | Product authorization with cross-region access | |||
456 | 9253701 | System and method for device-to-device (D2D) assisted dynamic traffic control for cellular networks | |||
457 | 9253212 | Automated production of certification controls by translating framework controls | |||
458 | 9252954 | Efficient homomorphic encryption scheme for bilinear forms | |||
459 | 9252952 | Gesture-based encryption methods and systems | |||
460 | 9252945 | Method for recognizing a manipulation of a sensor and/or sensor data of the sensor | |||
461 | 9252942 | Method and system for secure multiparty cloud computation | |||
462 | 9252941 | Enhanced digital signatures algorithm method and system utilitzing a secret generator | |||
463 | 9252898 | Music distribution systems | |||
464 | 9251900 | Data scrambling based on transition characteristic of the data | |||
465 | 9247427 | Multi-factor caller identification | |||
466 | 9246913 | Sharing content using a dongle device | |||
467 | 9246893 | Intra-computer protected communications between applications | |||
468 | 9246889 | Layered protection and validation of identity data delivered online via multiple intermediate clients | |||
469 | 9246689 | Component management via secure communications | |||
470 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
471 | 9246680 | Optical cryptography systems and methods | |||
472 | 9246672 | Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key | |||
473 | 9246671 | Motor vehicle with encrypted bus data | |||
474 | 9245153 | Semiconductor device | |||
475 | 9244673 | System and method for updating application archive files | |||
476 | 9240889 | Method and system for secure data access among two devices | |||
477 | 9240885 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
478 | 9240883 | Multi-key cryptography for encrypting file system acceleration | |||
479 | 9240880 | Distributed data storage device | |||
480 | 9239927 | Static analysis for discovery of timing attack vulnerabilities in a computer software application | |||
481 | 9239926 | Static analysis for discovery of timing attack vulnerabilities in a computer software application | |||
482 | 9237022 | Use of multiple digital signatures and quorum rules to verify aircraft information | |||
483 | 9237007 | Secure modulation and demodulation | |||
484 | 9235708 | System and method for supporting full volume encryption devices in a client hosted virtualization system | |||
485 | 9230097 | Method and system for detecting data modification within computing device | |||
486 | 9229823 | Storage and retrieval of dispersed storage network access information | |||
487 | 9229687 | Private two-party computation using partially homomorphic encryption | |||
2015 | |||||
488 | 9226142 | Mobile communication system, communication control method, and radio base station | |||
489 | 9225721 | Distributing overlay network ingress information | |||
490 | 9225618 | Method of tracing and of resurgence of pseudonymized streams on communication networks, and method of sending informative streams able to secure the data traffic and its addressees | |||
491 | 9225521 | Apparatus and method for skein hashing | |||
492 | 9225511 | Systems for determining website secure certificate status via partner browser plugin | |||
493 | 9225510 | Website secure certificate status determination via partner browser plugin | |||
494 | 9223368 | Countermeasure method and device for protecting data circulating in an electronic microcircuit | |||
495 | 9219805 | Memory system for portable telephone | |||
496 | 9219730 | Securing a secret of a user | |||
497 | 9219715 | Mediator utilizing electronic content to enforce policies to a resource | |||
498 | 9219607 | Provisioning sensitive data into third party | |||
499 | 9219604 | Generating an encrypted message for storage | |||
500 | 9219603 | System and method for encryption key management in a mixed infrastructure stream processing framework | |||
501 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
502 | 9218485 | Program execution device | |||
503 | 9215252 | Methods and apparatus to identify privacy relevant correlations between data values | |||
504 | 9215228 | Authentication of devices having unequal capabilities | |||
505 | 9215221 | Method for implementing local routing of traffic, base station and system | |||
506 | 9215219 | Method for protecting data used in cloud computing with homomorphic encryption | |||
507 | 9215072 | Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security | |||
508 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
509 | 9215068 | Search system, search method, and program | |||
510 | 9215067 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
511 | 9213581 | Method and system for a cloud frame architecture | |||
512 | 9210159 | Information processing system, information processing device, and authentication method | |||
513 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
514 | 9209970 | Method of generating key | |||
515 | 9209968 | Information processing apparatus, information processing method, and program | |||
516 | 9208346 | Persona-notitia intellection codifier | |||
517 | 9203829 | Unified user login | |||
518 | 9203815 | Systems and methods for secure third-party data storage | |||
519 | 9203811 | Authenticated encryption support in ISO/IEC 23009-4 | |||
520 | 9203801 | Storage gateway security model | |||
521 | 9203800 | Communication method, node, and network system | |||
522 | 9203734 | Optimized bi-directional communication in an information centric network | |||
523 | 9203626 | User authentication system and method for encryption and decryption | |||
524 | 9203608 | System for encrypting data with an error correction code | |||
525 | 9203607 | Keyless challenge and response system | |||
526 | 9203556 | Optimized code table signaling for authentication to a network and information system | |||
527 | 9198034 | Validating presence of a communication device using a wireless local area network | |||
528 | 9197637 | Method of comparing private data without revealing the data | |||
529 | 9197613 | Document processing method and system | |||
530 | 9197412 | Low-complexity electronic circuit protected by customized masking | |||
531 | 9195954 | Autonomic manufacturing operator authorization adjustment | |||
532 | 9191395 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
533 | 9191382 | User authentication using swappable user authentication services | |||
534 | 9191374 | Routing device data caching | |||
535 | 9191372 | Tracking electronic content | |||
536 | 9191291 | Detection and handling of aggregated online content using decision criteria to compare similar or identical content items | |||
537 | 9191196 | Secure computation using a server module | |||
538 | 9185560 | Identity management on a wireless device | |||
539 | 9185118 | Preventing inappropriate data transfers based on reputation scores | |||
540 | 9185087 | Medical device communication using encryption based on correlated motion | |||
541 | 9183841 | Identification of watermarked content | |||
542 | 9183411 | Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption | |||
543 | 9183158 | System and method for hardware based security | |||
544 | 9182748 | RFID access control reader with enhancements | |||
545 | 9179311 | Securing vehicle service tool data communications | |||
546 | 9179190 | Apparatus, method, and system for digital content and access protection | |||
547 | 9178873 | Systems and methods for secure password entry | |||
548 | 9178779 | System for detecting whether client state matches predetermined state | |||
549 | 9178703 | Method of protecting a control vector in an optional block of a standard key block | |||
550 | 9178700 | Information processing apparatus, information processing method, program, and recording medium | |||
551 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
552 | 9178694 | Securing backing storage data passed through a network | |||
553 | 9178693 | Distributed media-protection systems and methods to operate the same | |||
554 | 9177489 | Digital rights convergence place chaser | |||
555 | 9172718 | Endpoint load rebalancing controller | |||
556 | 9172711 | Originator publishing an attestation of a statement | |||
557 | 9172542 | System and method to pass a private encryption key | |||
558 | 9172529 | Hybrid encryption schemes | |||
559 | 9172528 | Method and apparatus for allowing software access to navigational data in a decrypted media stream while protecting stream payloads | |||
560 | 9171271 | Computer system, client device and method | |||
561 | 9170297 | Secure low pin count scan | |||
562 | 9167433 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
563 | 9167429 | Visible light communication system, communication terminal and server | |||
564 | 9166995 | Systems and methods for using user-input information to identify computer security threats | |||
565 | 9166956 | Priority-based ordering of cryptographic processing in wireless communication apparatus | |||
566 | 9166953 | Method and apparatus for providing identity based encryption in distributed computations | |||
567 | 9166795 | Device and method for forming a signature | |||
568 | 9166792 | Data management device, power usage calculation system, data management method, and computer program product | |||
569 | 9166789 | Cryptographic processing apparatus | |||
570 | 9166788 | Method and device for obtaining a security key | |||
571 | 9166785 | Cryptography processing device and cryptography processing method | |||
572 | 9166777 | Method and system for user authentication for computing devices utilizing PKI and other user credentials | |||
573 | 9165139 | System and method for creating secure applications | |||
574 | 9164927 | Integrated circuit and memory data protection apparatus and methods thereof | |||
575 | 9160763 | Endpoint load rebalancing controller | |||
576 | 9160728 | Message sending/receiving method | |||
577 | 9160546 | Authenticating users based upon an identity footprint | |||
578 | 9160533 | Random number generation | |||
579 | 9160528 | Distributed single sign on technologies including privacy protection and proactive updating | |||
580 | 9160525 | Apparatus and method for key update for use in a block cipher algorithm | |||
581 | 9160523 | Apparatus and method to prevent side channel power attacks in advanced encryption standard | |||
582 | 9160522 | System and method for verifying the identity of an individual by employing biometric data features associated with the individual | |||
583 | 9159179 | Common access card security and document security enhancement | |||
584 | 9158933 | Protection of encryption keys in a database | |||
585 | 9158896 | Method and system for generating a secure key | |||
586 | 9158829 | System and method of data security in synchronizing data with a wireless device | |||
587 | 9154946 | Secure coupling of hardware components | |||
588 | 9154505 | Simplified login for mobile devices | |||
589 | 9154481 | Decryption of a protected resource on a cryptographic device using wireless communication | |||
590 | 9154471 | Method and apparatus for unified encrypted messaging | |||
591 | 9154469 | System and method of protecting data on a communication device | |||
592 | 9154308 | Revocable platform identifiers | |||
593 | 9154295 | Method of generating a correspondence table for a cryptographic white box | |||
594 | 9148421 | Method and system for encryption of messages in land mobile radio systems | |||
595 | 9148411 | Known plaintext attack protection | |||
596 | 9148410 | Recording medium storing data processing program, data processing apparatus and data processing system | |||
597 | 9148409 | Method and apparatus to facilitate message transmission and reception using different transmission characteristics | |||
598 | 9148281 | Random number generation | |||
599 | 9148280 | Method and system for providing secure, modular multimedia interaction | |||
600 | 9147402 | Method and apparatus for detecting which one of symbols of watermark data is embedded in a received signal | |||
601 | 9147062 | Renewal of user identification information | |||
602 | 9143488 | Real-time encryption of voice and fax over IP | |||
603 | 9143326 | Method and system for encrypting data | |||
604 | 9143325 | Masking with shared random bits | |||
605 | 9143320 | Electronic key registration system | |||
606 | 9143317 | Protecting against white box attacks using column rotation | |||
607 | 9141824 | Dynamic database update in multi-server private information retrieval scheme | |||
608 | 9141823 | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation | |||
609 | 9141819 | Encrypted tape access control via challenge-response protocol | |||
610 | 9141816 | Authenticating a replaceable printer component | |||
611 | 9139414 | Systems and methods for fuel dispenser security | |||
612 | 9137659 | Method and system for decoupling user authentication and data encryption on mobile devices | |||
613 | 9137493 | Method and device for excerpt licensing | |||
614 | 9137214 | Encrypted content streaming | |||
615 | 9137024 | System and method for incorporating an originating site into a security protocol for a downloaded program object | |||
616 | 9137011 | Rapid data encryption and decryption for secure communication over open channels with plausible deniability | |||
617 | 9135834 | Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation | |||
618 | 9135833 | Process for selecting compressed key bits for collision resolution in hash lookup table | |||
619 | 9135459 | Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface | |||
620 | 9135453 | Preventing data extraction by side-channel attack | |||
621 | 9135418 | System and method for creating secure applications | |||
622 | 9134998 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
623 | 9134708 | Information processing device and power use adjustment system | |||
624 | 9133012 | Systems and methods for fuel dispenser security | |||
625 | 9131292 | Wireless microphone system | |||
626 | 9130745 | Encryption processing device and method | |||
627 | 9130739 | Method and apparatus for nonlinear IV setup in keystream generators | |||
628 | 9129121 | Locating cryptographic keys stored in a cache | |||
629 | 9128476 | Secure robotic operational system | |||
630 | 9124432 | Host device and authentication method for host device | |||
631 | 9124423 | Iterative data secret-sharing transformation | |||
632 | 9122893 | Trusted platform module switching | |||
633 | 9122882 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
634 | 9119062 | Methods and apparatus for providing additional security for communication of sensitive information | |||
635 | 9118684 | Method for requesting user access to an application | |||
636 | 9118663 | Agile OTP generation | |||
637 | 9118631 | Mixing secure and insecure data and operations at server database | |||
638 | 9118486 | Revocation of public key infrastructure signatures | |||
639 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
640 | 9118463 | Distributed single sign on technologies including privacy protection and proactive updating | |||
641 | 9118441 | Layout-optimized random mask distribution system and method | |||
642 | 9117095 | Data security for digital data storage | |||
643 | 9117087 | System and method for creating a secure channel for inter-application communication based on intents | |||
644 | 9117061 | Techniques for securing authentication credentials on a client device during submission in browser-based cloud applications | |||
645 | 9116888 | Customer controlled data privacy protection in public cloud | |||
646 | 9116741 | Computer program product, and information processing apparatus and method | |||
647 | 9112967 | Anonymous communication system and transmission method of information transmission unit in anonymous communication system | |||
648 | 9112698 | Cryptographic device and method for data encryption with per-round combined operations | |||
649 | 9112681 | Method and apparatus for secure information transfer to support migration | |||
650 | 9112677 | Communication device and cryptographic key creation method in cryptographic key sharing system | |||
651 | 9111103 | Remote access control of storage devices | |||
652 | 9107065 | Secure information transfer via bar codes | |||
653 | 9106617 | Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween | |||
654 | 9106407 | Key generation using multiple sets of secret shares | |||
655 | 9106366 | Distributing data to multiple clients from server | |||
656 | 9104853 | Supporting proximity based security code transfer from mobile/tablet application to access device | |||
657 | 9100548 | Feature enablement at a communications terminal | |||
658 | 9100418 | Adaptive data verification for resource-constrained systems | |||
659 | 9100193 | Method for protecting sensor data from manipulation and sensor to that end | |||
660 | 9100185 | Encryption processing apparatus and method | |||
661 | 9100183 | Computer program product and method for order preserving symbol based encryption | |||
662 | 9100091 | Framing mechanism for time-division-duplex OFDM communication systems | |||
663 | 9098978 | Game system and management apparatus having a convenient authentication process for ensuring security | |||
664 | 9094820 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
665 | 9094621 | Document management | |||
666 | 9094443 | Web redirection for content scanning | |||
667 | 9094379 | Transparent client-side cryptography for network applications | |||
668 | 9094217 | Secure credential store | |||
669 | 9094195 | Protecting de-duplication repositories against a malicious attack | |||
670 | 9092780 | User-mediator monitoring and controlling access to electronic content | |||
671 | 9092612 | Method and system for secure access to data files copied onto a second storage device from a first storage device | |||
672 | 9092385 | Facilitating access of a dispersed storage network | |||
673 | 9088933 | Apparatus and methods for anonymous paired device discovery in wireless communications systems | |||
674 | 9088890 | Method and apparatus for encrypting short data in a wireless communication system | |||
675 | 9088561 | Method and system for authentication in a computer network | |||
676 | 9088553 | Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets | |||
677 | 9088548 | Streaming system and method | |||
678 | 9088545 | Snippet matching in file sharing networks | |||
679 | 9088538 | Secure network storage | |||
680 | 9088407 | Distributed storage network and method for storing and retrieving encryption keys | |||
681 | 9087221 | Device for preventing logging of clients input data in a computer system | |||
682 | 9087212 | Methods and apparatus for securing a database | |||
683 | 9087187 | Unique credentials verification | |||
684 | 9083753 | Secure network access control | |||
685 | 9083738 | Airborne wireless device security | |||
686 | 9083684 | Communication node, key synchronization method, and key synchronization system | |||
687 | 9083682 | Communication device and computer program product | |||
688 | 9083590 | Long range WLAN data unit format | |||
689 | 9083531 | Performing client authentication using certificate store on mobile device | |||
690 | 9083526 | Fully homomorphic encryption | |||
691 | 9083515 | Forward secure pseudorandom number generation resilient to forward clock attacks | |||
692 | 9083511 | Message key generation | |||
693 | 9083506 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
694 | 9083489 | Block encryption method and apparatus | |||
695 | 9083487 | Method for transmitting and receiving encrypted digital information with encrypted parity bits and related systems | |||
696 | 9083486 | Personal point of sale | |||
697 | 9081946 | Secure mass storage device | |||
698 | 9081635 | Provision to an application of a random number not generated by an operating system | |||
699 | 9077724 | Systems and methods for analyzing application security policies | |||
700 | 9077711 | Selective complex data entry from one time passwords for authentication | |||
701 | 9077540 | Method for verification of decryption processes | |||
702 | 9077537 | Generating secure private keys for use in a public key communications environment | |||
703 | 9077522 | Two-party private estimation of dataset similarity | |||
704 | 9077520 | Method for secure communication in a network, a communication device, a network and a computer program therefor | |||
705 | 9077509 | Secure threshold decryption protocol computation | |||
706 | 9077485 | Automatic security action invocation for mobile communications device | |||
707 | 9071664 | Methods and apparatus for secure and adaptive delivery of multimedia content | |||
708 | 9071589 | Encryption key management for storage area network devices | |||
709 | 9071581 | Secure storage with SCSI storage devices | |||
710 | 9071569 | System, method, and computer program for content metadata and authorization exchange between content providers and service providers | |||
711 | 9071446 | Tamper-protected hardware and method for using same | |||
712 | 9071442 | Signcryption method and device and corresponding signcryption verification method and device | |||
713 | 9071440 | Method and system of authenticating the identity of a user of a public computer terminal | |||
714 | 9071427 | Method and apparatus for establishing a key agreement protocol | |||
715 | 9071408 | Communication system | |||
716 | 9070279 | Electronic key registration system | |||
717 | 9069940 | Secure host authentication using symmetric key cryptography | |||
718 | 9069706 | Confidential information protection system and method | |||
719 | 9066117 | Container agnostic encryption device and methods for use therewith | |||
720 | 9065640 | Method and apparatus for generating non-interactive key and method for communication security using the same | |||
721 | 9065636 | Data encryption system and method | |||
722 | 9065631 | Integrated cryptographic module providing confidentiality and integrity | |||
723 | 9065593 | Securing speech recognition data | |||
724 | 9064353 | Systems and methods for improved access to an attraction | |||
725 | 9064229 | Real-time asset tracking using discovery services | |||
726 | 9064129 | Managing data | |||
727 | 9064123 | Secure product-sum combination system, computing apparatus, secure product-sum combination method and program therefor | |||
728 | 9064091 | Coupled dynamical systems for chaos computing | |||
729 | 9063823 | Software development and distribution workflow employing meta-object time stamping | |||
730 | 9059981 | System, method, and computer program product for security verification of communications to tenants of an on-demand database service | |||
731 | 9059857 | Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message | |||
732 | 9059838 | Encryption algorithm with randomized buffer | |||
733 | 9058507 | Signal processor with an encrypting or decrypting device in a memory system | |||
734 | 9055057 | Automatic elevation of system security | |||
735 | 9055055 | Provisioning account credentials via a trusted channel | |||
736 | 9055035 | Medical device with secure data transmission | |||
737 | 9054874 | System and method for data authentication among processors | |||
738 | 9054864 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
739 | 9054863 | Industrial protocol system authentication and firewall | |||
740 | 9054861 | Enhanced key agreement and transport protocol | |||
741 | 9054848 | Electronic apparatus and encryption method thereof | |||
742 | 9052931 | Method and system for machine identification | |||
743 | 9049012 | Secured cryptographic communication system | |||
744 | 9049009 | Data transmission system | |||
745 | 9049004 | Low-power encryption apparatus and method | |||
746 | 9047477 | Distributed key encryption in servers | |||
747 | 9047461 | Computer-implemented method for replacing a data string | |||
748 | 9043868 | Network security appliance | |||
749 | 9043599 | Method and server for providing a mobility key | |||
750 | 9043596 | Method and apparatus for authenticating public key without authentication server | |||
751 | 9042549 | Apparatus and method for address privacy protection in receiver oriented channels | |||
752 | 9042548 | SPS authentication | |||
753 | 9042545 | Apparatus and method for converting random binary sequence into random integer | |||
754 | 9042543 | Method for arbitrary-precision division or modular reduction | |||
755 | 9038130 | Sensor aware security policies with embedded controller hardened enforcement | |||
756 | 9037870 | Method and system for providing a rotating key encrypted file system | |||
757 | 9037855 | Method for reproducing content data and method for generating thumbnail image | |||
758 | 9037849 | System and method for managing network access based on a history of a certificate | |||
759 | 9037845 | System and method for obtaining certificate status of subkeys | |||
760 | 9037844 | System and method for securely communicating with electronic meters | |||
761 | 9037726 | Apparatus and methods for managing messages sent between services | |||
762 | 9036817 | Network communications using quantum key distribution | |||
763 | 9032497 | System and method for securing embedded media | |||
764 | 9032211 | Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message | |||
765 | 9032210 | Mobile electronic device configured to establish secure wireless communication | |||
766 | 9032040 | Receiving device and method | |||
767 | 9031238 | Data encryption and/or decryption by integrated circuit | |||
768 | 9031234 | Encryption device and decryption device | |||
769 | 9031233 | Method and storage device for protecting content | |||
770 | 9031231 | Device and user authentication | |||
771 | 9031230 | Encryption processing device, encryption processing method, and program | |||
772 | 9031161 | Apparatus and method for scrambling in a wireless communication system | |||
773 | 9027079 | Method and system for dynamic security using authentication servers | |||
774 | 9026797 | Server apparatus having one-time scan code issuing function, user terminal having one-time scan code recognizing function and method for processing one-time scan code | |||
775 | 9026785 | Method and apparatus for smart-key management | |||
776 | 9026782 | Token-based entitlement verification for streaming media decryption | |||
777 | 9026497 | Failover systems and methods for performing backup operations | |||
778 | 9026276 | Unmanned air vehicle communications | |||
779 | 9025768 | Securing variable length keyladder key | |||
780 | 9021572 | Anonymous access to a service by means of aggregated certificates | |||
781 | 9021258 | Method and device for transcoding during an encryption-based access check on a database | |||
782 | 9021247 | Home network controlling apparatus and method to obtain encrypted control information | |||
783 | 9020151 | Secure real-time data replication with disk encryption and key management system | |||
784 | 9015855 | Secure tunneling platform system and method | |||
785 | 9015478 | System and method for preventing web crawler access | |||
786 | 9014370 | High performance hardware-based execution unit for performing C2 block cipher encryption/decryption | |||
787 | 9009845 | Distributing advertisement-supported software while ensuring certain software freedoms by license | |||
788 | 9009812 | System, method and apparatus that employ virtual private networks to resist IP QoS denial of service attacks | |||
789 | 9009483 | Replacing blinded authentication authority | |||
790 | 9009481 | System and method for protecting cryptographic assets from a white-box attack | |||
791 | 9009474 | Method and system for detecting data modification within computing device | |||
792 | 9009461 | Selectively performing man in the middle decryption | |||
793 | 9008314 | Secure wireless communications | |||
794 | 9008304 | Content protection key management | |||
795 | 9008303 | Method and apparatus for generating forward secure pseudorandom numbers | |||
796 | 9003199 | Modular cryptographic device providing multi-mode wireless LAN operation features and related methods | |||
797 | 9003192 | Protocol for protecting third party cryptographic keys | |||
798 | 9002016 | Rekey scheme on high speed links | |||
799 | 9002015 | System and method for multi-carrier network operation | |||
800 | 9002013 | System and apparatus for information display | |||
801 | 9002004 | Appending pseudo-random sub-LSB values to prevent intensity banding | |||
802 | 9002003 | Password protocol for data communication system | |||
803 | 9002002 | Method and apparatus of high speed encryption and decryption | |||
804 | 8997247 | Information processing device, information processing method, and computer-readable recording medium | |||
805 | 8997206 | Peer-to-peer network over a virtual private network | |||
806 | 8996874 | Protection of a program waiting to be executed in a memory used by a microprocessor | |||
807 | 8996871 | Method and system for generating ciphertext and message authentication codes utilizing shared hardware | |||
808 | 8996861 | Secure communications system for mobile devices | |||
809 | 8995668 | Privacy management for tracked devices | |||
810 | 8995667 | Mechanism for co-ordinated authentication key transition for IS-IS protocol | |||
811 | 8995664 | Security in wireless communication system and device | |||
812 | 8995663 | Method for implementing an encryption engine by smart key device | |||
813 | 8995660 | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |||
814 | 8995657 | Device and method for certifying one's own authenticity | |||
815 | 8995656 | Multiple hashing in a cryptographic scheme | |||
816 | 8995655 | Method for creating asymmetrical cryptographic key pairs | |||
817 | 8995651 | Multiple algorithm cryptography system | |||
818 | 8995650 | Two non-orthogonal states quantum cryptography method and apparatus with intra- and inter-qubit interference for eavesdropper detection | |||
819 | 8990935 | Activity signatures and activity replay detection | |||
820 | 8990929 | Auditing application activities | |||
821 | 8990888 | Method and apparatus for providing a one-time password | |||
822 | 8990570 | Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer | |||
823 | 8990554 | Network optimization for secure connection establishment or secure messaging | |||
824 | 8989388 | Distribution of storage area network encryption keys across data centers | |||
825 | 8989385 | Data encryption method, data verification method and electronic apparatus | |||
826 | 8989382 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
827 | 8989379 | Network encryption key rotation | |||
828 | 8989374 | Cryptographic device for secure authentication | |||
829 | 8989373 | Method for connecting an external apparatus and multimedia replaying apparatus using the same | |||
830 | 8984283 | Private certificate validation method and apparatus | |||
831 | 8984280 | Systems and methods for automating certification authority practices | |||
832 | 8984268 | Encrypted record transmission | |||
833 | 8983075 | Custodian securing a secret of a user | |||
834 | 8983074 | Input content data managing system and method of managing input content data | |||
835 | 8983072 | Portable data carrier featuring secure data processing | |||
836 | 8983071 | Key management method using hierarchical node topology, and method of registering and deregistering user using the same | |||
837 | 8983068 | Masked nonlinear feedback shift register | |||
838 | 8983067 | Cryptographic circuit and method therefor | |||
839 | 8983061 | Method and apparatus for cryptographically processing data | |||
840 | 8978097 | Method and system for authentication based on wireless identification, wireless identification and server | |||
841 | 8977864 | Programmable logic device with resistance to external monitoring attacks | |||
842 | 8976967 | Mediator monitoring and controlling access to electronic content | |||
843 | 8976960 | Methods and apparatus for correlation protected processing of cryptographic operations | |||
844 | 8976813 | Secure quality of service | |||
845 | 8972300 | Content distribution system | |||
846 | 8971535 | Multi-level key management | |||
847 | 8971530 | Cryptographic key generation using a stored input value and a stored count value | |||
848 | 8971529 | Information recording device | |||
849 | 8971528 | Modified elliptic curve signature algorithm for message recovery | |||
850 | 8971525 | Method, module and system for providing cipher data | |||
851 | 8966651 | Digital rights management (DRM) locker | |||
852 | 8966636 | Transforming unit tests for security testing | |||
853 | 8966611 | Method and apparatus for local area networks | |||
854 | 8966255 | Communication apparatus and communication system | |||
855 | 8966248 | Secure software file transfer systems and methods for vehicle control modules | |||
856 | 8966241 | Apparatus and method for sending encrypted data to conditional access module over common interface, conditional access module and system thereof | |||
857 | 8966081 | Method for device security in a heterogeneous storage network environment | |||
858 | 8964990 | Automating key rotation in a distributed system | |||
859 | 8964982 | Cryptographic system, cryptographic communication method, encryption apparatus, key generation apparatus, decryption apparatus, content server, program, and storage medium | |||
860 | 8964976 | Secure storage and retrieval of confidential information | |||
861 | 8964975 | Method of key derivation in an integrated circuit | |||
862 | 8964974 | Zero configuration of security for smart meters | |||
863 | 8964973 | Systems and methods for controlling file execution for industrial control systems | |||
864 | 8964972 | Apparatus, method, and system for digital content and access protection | |||
865 | 8959581 | Switching apparatus, authentication server, authentication system, authentication method, and computer program product | |||
866 | 8959570 | Verifying a security token | |||
867 | 8959355 | Authentication device, authentication method, program, and signature generation device | |||
868 | 8959352 | Transmarking of multimedia signals | |||
869 | 8958560 | Efficient multivariate signature generation | |||
870 | 8958559 | System and method for secure instant messaging | |||
871 | 8958556 | Method of secure cryptographic calculation, in particular, against attacks of the DFA and unidirectional type, and corresponding component | |||
872 | 8958552 | Data processing device | |||
873 | 8958549 | Countermeasure method and device for protecting data circulating in an electronic component | |||
874 | 8958416 | Standard telephone equipment (STE) based deployable secure communication system | |||
875 | 8955139 | Sound and effective data-flow analysis in the presence of aliasing | |||
876 | 8954754 | Method and apparatus to process SHA-1 secure hashing algorithm | |||
877 | 8954742 | Method and apparatus for digital authentication of valuable goods | |||
878 | 8954730 | Establishing historical usage-based hardware trust | |||
879 | 8953808 | System and method for effectively performing data restore/migration procedures | |||
880 | 8953807 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
881 | 8953806 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
882 | 8953802 | Signal security in a satellite signal distribution environment | |||
883 | 8953796 | Techniques for accessing features of a hardware adapter | |||
884 | 8953792 | Combining key control information in common cryptographic architecture services | |||
885 | 8953791 | Key derivative function for network communications | |||
886 | 8953789 | Combining key control information in common cryptographic architecture services | |||
887 | 8953646 | Method and apparatus of multiplexing media streams | |||
888 | 8949996 | Transforming unit tests for security testing | |||
889 | 8949935 | Secure account creation | |||
890 | 8949617 | Disrupting password attack using compression | |||
891 | 8949614 | Highly efficient guarantee of data consistency | |||
892 | 8949604 | System and method for issuing an authentication key for authenticating a user in a CPNS environment | |||
893 | 8949493 | Configurable multi-lane scrambler for flexible protocol support | |||
894 | 8948401 | Method for filtering of abnormal ONT with same serial number in a GPON system | |||
895 | 8948396 | Method for a communication device to operate with multiple key management facilities | |||
896 | 8948394 | Method and apparatus for distribution and synchronization of cryptographic context information | |||
897 | 8948388 | Elliptic curve random number generation | |||
898 | 8948382 | Secure protocol for peer-to-peer network | |||
899 | 8948380 | Communication apparatus, control method of communication apparatus, computer program, and storage medium | |||
900 | 8948376 | Format-preserving encryption via rotating block encryption | |||
901 | 8943605 | Proximity based digital rights management | |||
902 | 8943318 | Secure messaging by key generation information transfer | |||
903 | 8943309 | Cookie security system with interloper detection and remedial actions to protest personal data | |||
904 | 8942374 | Encryption device | |||
905 | 8942373 | Data encryption and decryption method and apparatus | |||
906 | 8942372 | Method and device for identifying objects | |||
907 | 8938624 | Encryption key destruction for secure data erasure | |||
908 | 8938070 | Encryption using real-world objects | |||
909 | 8935747 | Access right management system, access right management method, and access right management program | |||
910 | 8935541 | Method and apparatus for encrypting and processing data in flash translation layer | |||
911 | 8935534 | MACSec implementation | |||
912 | 8935531 | Privacy system | |||
913 | 8934629 | Communication apparatus, image input apparatus, image output apparatus, wireless communication circuit, method for controlling apparatus, and program | |||
914 | 8934626 | Method to manage revocations in a group of terminals | |||
915 | 8934327 | MBS with outer coding and adjusted frame reference | |||
916 | 8931042 | Dividing a data processing device into separate security domains | |||
917 | 8930689 | Securing email conversations | |||
918 | 8930423 | Method and system for restoring encrypted files from a virtual machine image | |||
919 | 8929552 | Electronic information and cryptographic key management system | |||
920 | 8929549 | Method and device for setting up wireless network connection | |||
921 | 8929544 | Scalable and secure key management for cryptographic data processing | |||
922 | 8929543 | Enhanced key management for SRNS relocation | |||
923 | 8929540 | Information processing apparatus, information recording medium manufacturing apparatus, information recording medium, method, and computer program | |||
2014 | |||||
924 | 8925075 | Method for protecting data used in cloud computing with homomorphic encryption | |||
925 | 8924740 | Encryption key transmission with power analysis attack resistance | |||
926 | 8924730 | Digital watermarking for secure transmission between a source component and a node device | |||
927 | 8924041 | Vehicle central lock antitheft method and system | |||
928 | 8923519 | Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens | |||
929 | 8923517 | Multi-terminal quantum key distribution system | |||
930 | 8923516 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
931 | 8923511 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
932 | 8923510 | Method and apparatus for efficiently implementing the advanced encryption standard | |||
933 | 8918894 | Information processing system, anonymization method, information processing device, and its control method and control program | |||
934 | 8918877 | Signature compilation on a security device | |||
935 | 8918838 | Anti-cyber hacking defense system | |||
936 | 8918651 | Cryptographic erasure of selected encrypted data | |||
937 | 8918648 | Digital signature and key agreement schemes | |||
938 | 8917870 | Methods and devices for computing a shared encryption key | |||
939 | 8917867 | Elliptic curve cryptography with fragmented key processing and methods for use therewith | |||
940 | 8914858 | Methods and apparatus for security over fibre channel | |||
941 | 8914857 | Security bypass environment for circumventing a security application in a computing environment | |||
942 | 8914647 | Method and system for protecting data | |||
943 | 8913750 | Method for managing keys and/or rights objects | |||
944 | 8913740 | Method and apparatus for generating an Advanced Encryption Standard (AES) key schedule | |||
945 | 8913721 | Systems and methods for preventing sensitive information from being communicated into a non-secure environment | |||
946 | 8909967 | Technique for secure computation | |||
947 | 8909921 | Signature management method and signature management device | |||
948 | 8908867 | Automatic recovery of TPM keys | |||
949 | 8908863 | Method, network element, and mobile station for negotiating encryption algorithms | |||
950 | 8908862 | Method, system, and devices for fast session transfer of wireless devices from one frequency band to another | |||
951 | 8908861 | AES algorithm-based encryption apparatus and method for mobile communication system | |||
952 | 8908860 | Information processing device, system, and method, including hash value replacement processing and signature verification processing as part of encrypted content playback propriety determination processing | |||
953 | 8907794 | Cryptographic lock, method of operation thereof and secure container employing the same | |||
954 | 8904503 | Systems and methods for providing access to data accounts within user profiles via cloud-based storage services | |||
955 | 8904177 | Authentication for a multi-tier wireless home mesh network | |||
956 | 8904175 | System and method for secure distribution and/or storage of data files with long term file integrity verification | |||
957 | 8904171 | Secure search and retrieval | |||
958 | 8904036 | System and method for electronic secure geo-location obscurity network | |||
959 | 8903085 | Adding randomness internally to a wireless mobile communication device | |||
960 | 8903084 | Efficient key derivation for end-to-end network security with traffic visibility | |||
961 | 8898473 | System and method for compressing secure E-mail for exchange with a mobile data communication device | |||
962 | 8898467 | Enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection | |||
963 | 8898465 | System and method for fuse enablement of a secure client hosted virtualization in an information handling system | |||
964 | 8898463 | Device | |||
965 | 8898461 | Battery authentication method and apparatus | |||
966 | 8898452 | Protocol translation | |||
967 | 8897446 | Methods for the generation of identical symmetrical cryptographic keys | |||
968 | 8897444 | Information processing apparatus and information processing method | |||
969 | 8897442 | Encryption device, decryption device, encryption method, decryption method, program, and recording medium | |||
970 | 8897441 | Packet transmitting and receiving apparatus and packet transmitting and receiving method | |||
971 | 8893227 | System and method for providing privacy in smart meter deployment | |||
972 | 8892890 | Key agreement and transport protocol | |||
973 | 8892865 | Multiple authority key derivation | |||
974 | 8892839 | Methods, systems, and storage mediums for managing content storage and selection | |||
975 | 8891771 | Communication apparatus, communication method, and computer program | |||
976 | 8891770 | Pair-wise keying for tunneled virtual private networks | |||
977 | 8891764 | Quarantine method for sellable virtual goods | |||
978 | 8891761 | Block encryption device, decryption device, encrypting method, decrypting method and program | |||
979 | 8891760 | System for checking acceptance of string by automaton | |||
980 | 8887292 | Method for encrypting and embedding information in a URL for content delivery | |||
981 | 8886948 | Identity management on a wireless device | |||
982 | 8886943 | Authentication of a vehicle-external device | |||
983 | 8885833 | One-time recovery credentials for encrypted data access | |||
984 | 8885830 | Method and apparatus for dynamically establishing and joining an encrypted collaborative communication session | |||
985 | 8885829 | Antipiracy key segmentation for HFC multicast distribution from master headend to cable hubs | |||
986 | 8885820 | Key expansion using seed values | |||
987 | 8885818 | Authentication of data streams | |||
988 | 8881246 | System and method for providing secured integrated engineering analysis | |||
989 | 8880884 | System and method for enabling seamless transfer of a secure session | |||
990 | 8880875 | System, apparatus and method for decentralizing attribute-based encryption information | |||
991 | 8879736 | Telecommunication systems and encryption of control messages in such systems | |||
992 | 8879735 | Shared secret arrangements and optical data transfer | |||
993 | 8879734 | Enhanced high availability for group VPN in broadcast environment | |||
994 | 8879728 | Key creation and rotation for data encryption | |||
995 | 8879727 | Method and apparatus for hardware-accelerated encryption/decryption | |||
996 | 8879724 | Differential power analysis--resistant cryptographic processing | |||
997 | 8875245 | Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium | |||
998 | 8875222 | Efficient XACML access control processing | |||
999 | 8874938 | Program execution device | |||
1000 | 8874936 | Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium | |||
1001 | 8874913 | Secure communications between devices using a trusted server | |||
1002 | 8874911 | Terminal device, system, connection management server, and computer readable medium | |||
1003 | 8874904 | View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device | |||
1004 | 8873756 | System for transmitting a data signal in a network, method, mobile transmitting device and network device | |||
1005 | 8873755 | Establishing secure links between wireless devices in proximity using ambient wireless signals | |||
1006 | 8873749 | Multi-user searchable encryption system and method with index validation and tracing | |||
1007 | 8872970 | System and method for transport stream sync byte detection with transport stream having multiple emulated sync bytes | |||
1008 | 8868907 | Device, method, and system for processing communications for secure operation of industrial control system field devices | |||
1009 | 8867746 | Method for protecting a control device against manipulation | |||
1010 | 8867745 | Efficient transmission of cryptographic information in secure real time protocol | |||
1011 | 8867744 | Security in wireless communication systems | |||
1012 | 8867743 | Encryption of large amounts of data using secure encryption methods | |||
1013 | 8863295 | Linking video sharing accounts with content delivery accounts | |||
1014 | 8863249 | Push button configuration of multimedia over coax alliance (MoCA) devices | |||
1015 | 8863135 | Preemptive smart card access and data transfer based on application priority | |||
1016 | 8862874 | Certificate distribution using secure handshake | |||
1017 | 8862867 | Method and system for protecting security of the third layer mobility user plane data in NGN | |||
1018 | 8861735 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
1019 | 8861734 | Secret information distribution system, method, program, and transmission system | |||
1020 | 8861733 | Method of personalizing a NFC chipset | |||
1021 | 8861731 | Efficient procedure for pairing medical devices for wireless communication with limited user interaction | |||
1022 | 8861726 | Method for generating cryptographic half-keys, and associated system | |||
1023 | 8861719 | Method of generating a random permutation, random permutation generating device, and encryption/decryption device having the same | |||
1024 | 8861718 | Method of preventing fault-injection attacks on Chinese Remainder Theorem-Rivest Shamir Adleman cryptographic operations and recording medium for storing program implementing the same | |||
1025 | 8856533 | Device, system and method for determining authenticity of an item | |||
1026 | 8856308 | Cloud scale automatic identity management | |||
1027 | 8855318 | Master key generation and distribution for storage area network devices | |||
1028 | 8855314 | Hierarchization of crytographic keys in an electronic circuit | |||
1029 | 8855309 | Apparatus and method for providing security service | |||
1030 | 8855308 | Method and apparatus for encoding security status information | |||
1031 | 8855304 | System and method for generating session keys | |||
1032 | 8855303 | Cryptography using a symmetric frequency-based encryption algorithm | |||
1033 | 8855302 | Apparatus and method for Skein hashing | |||
1034 | 8855299 | Executing an encryption instruction using stored round keys | |||
1035 | 8850538 | Agile OTP generation | |||
1036 | 8850227 | Cryptographic operations using a key hierarchy | |||
1037 | 8850222 | Electronic apparatus, display driving apparatus, and digital content display method thereof | |||
1038 | 8850195 | Tethered device systems and methods | |||
1039 | 8850179 | Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport | |||
1040 | 8848919 | Revocation status using other credentials | |||
1041 | 8848917 | Verification of the integrity of a ciphering key | |||
1042 | 8848915 | Method for automatic WLAN connection between digital devices and digital device therefor | |||
1043 | 8848914 | Spectrum authorization and related communications methods and apparatus | |||
1044 | 8848913 | Scrambling sequence generation in a communication system | |||
1045 | 8843749 | Visualization of trust in an address bar | |||
1046 | 8843747 | Communication apparatus and communication system | |||
1047 | 8842839 | Device with multiple one-time pads and method of managing such a device | |||
1048 | 8842838 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
1049 | 8842826 | Information-theoretically secure secrecy generation | |||
1050 | 8839445 | Method and device for securely transferring digital data | |||
1051 | 8839418 | Finding phishing sites | |||
1052 | 8839354 | Mobile enterprise server and client device interaction | |||
1053 | 8838979 | Advanced watermarking system and method | |||
1054 | 8838972 | Exchange of key material | |||
1055 | 8838969 | Enterprise computer investigation system | |||
1056 | 8838965 | Secure remote support automation process | |||
1057 | 8838951 | Automated workflow generation | |||
1058 | 8837734 | Managing encrypted data and encryption keys | |||
1059 | 8837729 | Method and apparatus for ensuring privacy in communications between parties | |||
1060 | 8832797 | Method and system for ensuring authorized operation of a communication system as a secondary user | |||
1061 | 8832796 | Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program | |||
1062 | 8832464 | Processor and method for implementing instruction support for hash algorithms | |||
1063 | 8832449 | Security considerations for the LTE of UMTS | |||
1064 | 8832442 | Method and device for securely distributing data in group communication | |||
1065 | 8832439 | Multiple system images for over-the-air updates | |||
1066 | 8831225 | Security mechanism for wireless video area networks | |||
1067 | 8831221 | Unified architecture for crypto functional units | |||
1068 | 8826042 | Memory controller, memory control apparatus, memory device, memory information protection system, control method for memory control apparatus, and control method for memory device | |||
1069 | 8826026 | Systems and methods for tracking electronic files in computer networks using electronic signatures | |||
1070 | 8826025 | Authentication device, authentication method, program, and signature generation device | |||
1071 | 8826009 | Method of handling a certification request | |||
1072 | 8826004 | Method and system for printing transaction documents using a multi-vendor secure printer under control of a printer authority | |||
1073 | 8826001 | Securing information within a cloud computing environment | |||
1074 | 8825223 | Hashed strings for machine-to-machine communication based on time and secret strings | |||
1075 | 8824684 | Dynamic, selective obfuscation of information for multi-party transmission | |||
1076 | 8824680 | Centralized key generation | |||
1077 | 8824679 | Methods and apparatus for protecting digital content | |||
1078 | 8824671 | Data converter, data conversion method, and computer program | |||
1079 | 8819854 | Information processing apparatus, system management method, and recording medium | |||
1080 | 8819846 | Making system constraints of a specified permission in digital rights management | |||
1081 | 8819720 | IPTV follow me content system and method | |||
1082 | 8819448 | Method and system for managing information on mobile devices | |||
1083 | 8819410 | Private electronic information exchange | |||
1084 | 8819408 | Document processing method and system | |||
1085 | 8817988 | Variable epoch scheduler for proactive cryptography systems | |||
1086 | 8817979 | Standalone hardware accelerator for advanced encryption standard (AES) encryption and decryption | |||
1087 | 8817973 | Encrypting method having countermeasure function against power analyzing attacks | |||
1088 | 8813247 | Providing cryptographic security for objective-oriented programming files | |||
1089 | 8813174 | Embedded security blades for cloud service providers | |||
1090 | 8812875 | Virtual self-destruction of stored information | |||
1091 | 8812833 | Wireless multiband security | |||
1092 | 8811615 | Index-based coding with a pseudo-random source | |||
1093 | 8811611 | Encryption/decryption of digital data using related, but independent keys | |||
1094 | 8811610 | Method, medium, and system for encrypting and/or decrypting information of microarray | |||
1095 | 8810192 | Power aggregation system for distributed electric resources | |||
1096 | 8806615 | System and method for protecting specified data combinations | |||
1097 | 8806606 | Service aggregation in a cloud services center | |||
1098 | 8806214 | Communication with non-repudiation and blind signatures | |||
1099 | 8806201 | HTTP authentication and authorization management | |||
1100 | 8804950 | Methods and apparatus for producing a hash value based on a hash function | |||
1101 | 8804701 | Reliable reporting of location data | |||
1102 | 8800022 | Method and system for handling security in an IP multimedia gateway | |||
1103 | 8799981 | Privacy protection system | |||
1104 | 8799655 | Mobile offline authentication using one-time passcodes | |||
1105 | 8799651 | Method and system for encrypted file access | |||
1106 | 8799639 | Method and apparatus for converting authentication-tokens to facilitate interactions between applications | |||
1107 | 8799637 | System, method and software application for secure communication | |||
1108 | 8798271 | Communication system, wireless communication apparatus, and communication method | |||
1109 | 8798266 | Secure data transfer on a handheld communications device | |||
1110 | 8798265 | Secure data transfer on a handheld communications device | |||
1111 | 8798264 | Technique for handling media content to be accessible via multiple media tracks | |||
1112 | 8798081 | Event delivery system, rendezvous node, broker node, load distribution method for event delivery system, load distribution method for rendezvous node, delivery route construction method for broker node, storage medium storing load distribution program, and storage medium storing delivery route construction program | |||
1113 | 8792643 | System and methodology for decrypting encrypted media | |||
1114 | 8792637 | Downloading of data to secure devices | |||
1115 | 8789185 | Method and apparatus for monitoring a computer system for malicious software | |||
1116 | 8789173 | Protecting against distributed network flood attacks | |||
1117 | 8788847 | Secure data processing method and associated device | |||
1118 | 8788842 | System and method for content protection based on a combination of a user PIN and a device specific identifier | |||
1119 | 8788824 | Selective encryption in broker-based messaging systems and methods | |||
1120 | 8788808 | Authenticating digitally encoded products without private key sharing | |||
1121 | 8788430 | Apparatus with electronic information transfer function or the like, program for electronic information transfer, and method for electronic information transfer | |||
1122 | 8788428 | Multimode retail system | |||
1123 | 8787724 | Information processing apparatus, information processing method and program | |||
1124 | 8787574 | Multicast key negotiation method suitable for group calling system and a system thereof | |||
1125 | 8787573 | Cipher communication method and apparatus for the same | |||
1126 | 8787565 | Method and apparatus for generating an advanced encryption standard (AES) key schedule | |||
1127 | 8787564 | Assessing cryptographic entropy | |||
1128 | 8787563 | Data converter, data conversion method and program | |||
1129 | 8782416 | Family dwelling restricted communication system | |||
1130 | 8782415 | System for, and method of, providing the transmission, receipt and content of an E-mail message to a recipient | |||
1131 | 8782413 | Unattended code update of storage facility | |||
1132 | 8782410 | Avoiding padding oracle attacks | |||
1133 | 8782402 | System and method for secure communications | |||
1134 | 8781128 | Method and device for automatically distributing updated key material | |||
1135 | 8781126 | Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network | |||
1136 | 8781119 | User-controlled Random-ID generation function for smartcards | |||
1137 | 8781118 | Digital fingerprints for integrated circuits | |||
1138 | 8781114 | Apparatus and method for recognizing a failure of a cryptographic unit | |||
1139 | 8781111 | System and methods for side-channel attack prevention | |||
1140 | 8781110 | Unified system architecture for elliptic-curve cryptography | |||
1141 | 8779890 | Radio devices, regulation servers, and verification servers | |||
1142 | 8776199 | Authentication of a server by a client to prevent fraudulent user interfaces | |||
1143 | 8775806 | System and method for providing unique encryption key | |||
1144 | 8775804 | Matching authentication method, device and system for wireless communication | |||
1145 | 8775803 | High security display of private data | |||
1146 | 8774413 | Method and apparatus for processing entitlement control message packets | |||
1147 | 8774407 | System and method for executing encrypted binaries in a cryptographic processor | |||
1148 | 8774401 | Right object renewal method and apparatus for right-protected broadcast service | |||
1149 | 8769610 | Distance-modified security and content sharing | |||
1150 | 8769299 | License utilization management system license wrapper | |||
1151 | 8769298 | Digital rights management using trusted processing techniques | |||
1152 | 8769289 | Authentication of a user accessing a protected resource using multi-channel protocol | |||
1153 | 8769288 | Discovery of security associations | |||
1154 | 8769283 | MTC device authentication method, MTC gateway, and related device | |||
1155 | 8769282 | Localized network authentication and security using tamper-resistant keys | |||
1156 | 8769273 | Method and system for establishing a trusted and decentralized peer-to-peer network | |||
1157 | 8767963 | Method for encrypting short message of mobile communication | |||
1158 | 8767956 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
1159 | 8767954 | Methods and systems for deriving a cryptographic framework | |||
1160 | 8763144 | Associating first and second watermarks with audio or video content | |||
1161 | 8763026 | Flexible interface for secure input of pin code | |||
1162 | 8762732 | Security method and apparatus | |||
1163 | 8762713 | User authentication system and method for encryption and decryption | |||
1164 | 8762712 | Methods and system for person-to-person secure file transfer | |||
1165 | 8762707 | Authorization, authentication and accounting protocols in multicast content distribution networks | |||
1166 | 8762705 | System and method for preventing web crawler access | |||
1167 | 8761402 | System and methods for digital content distribution | |||
1168 | 8761401 | System and method for secure key distribution to manufactured products | |||
1169 | 8761398 | Access to authorized domains | |||
1170 | 8761391 | Digital watermark key generation | |||
1171 | 8761390 | Production of cryptographic keys for an embedded processing device | |||
1172 | 8761389 | Memory | |||
1173 | 8756624 | Method for single sign-on when using a set-top box | |||
1174 | 8756410 | Polynomial evaluation delegation | |||
1175 | 8755520 | Apparatus and method for generating a key for broadcast encryption | |||
1176 | 8755519 | Lattice scheme for establishing a secure multi-identity authentication context | |||
1177 | 8752166 | Security-activated operational components | |||
1178 | 8752165 | Provisioning secrets in an unsecured environment | |||
1179 | 8751822 | Cryptography using quasigroups | |||
1180 | 8751806 | Method and apparatus to provide public key authentication with low complexity devices | |||
1181 | 8751798 | Digital rights management handler and related methods | |||
1182 | 8751789 | General purpose distributed encrypted file system | |||
1183 | 8751788 | Payment encryption accelerator | |||
1184 | 8751781 | System and method for supporting secure subsystems in a client hosted virtualization system | |||
1185 | 8750827 | LAN-based UMA network controller with aggregated transport | |||
1186 | 8750707 | System and method for establishing secure communications between transceivers in undersea optical communication systems | |||
1187 | 8750521 | Method and system for station switching when wireless terminal point completes WPI in convergent WLAN | |||
1188 | 8750520 | Appraising systems with zero knowledge proofs | |||
1189 | 8750519 | Data protection system, data protection method, and memory card | |||
1190 | 8750511 | Root node and a computer readable medium | |||
1191 | 8750509 | Wireless surveillance system releasably mountable to track lighting | |||
1192 | 8750506 | Methods, nodes, system, computer programs and computer program products for secure user subscription or registration | |||
1193 | 8750505 | Apparatus and method for controlling conversion of broadcasting program based on program protection information | |||
1194 | 8750504 | Method of providing a portable true random number generator based on the microstructure and noise found in digital images | |||
1195 | 8750503 | FPGA configuration bitstream encryption using modified key | |||
1196 | 8750500 | Multi-dimensional montgomery ladders for elliptic curves | |||
1197 | 8750498 | Method and apparatus for encoding data in accordance with the advanced encryption standard (AES) | |||
1198 | 8750497 | Cryptographic device for implementing S-box | |||
1199 | 8745759 | Associated with abnormal application-specific activity monitoring in a computing network | |||
1200 | 8745415 | Multi-drive cooperation to generate an encryption key | |||
1201 | 8745379 | Systems and methods for securing data in motion | |||
1202 | 8745372 | Systems and methods for securing data in motion | |||
1203 | 8745371 | Unified network architecture having storage devices with secure boot devices | |||
1204 | 8744085 | Hierarchical group key management approach based on linear geometry | |||
1205 | 8744079 | Secure communication system | |||
1206 | 8744078 | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | |||
1207 | 8744077 | Cryptographic encoding and decoding of secret data | |||
1208 | 8744074 | Method and device for countering fault attacks | |||
1209 | 8744072 | Exponentiation method resistant against side-channel and safe-error attacks | |||
1210 | 8739289 | Hardware interface for enabling direct access and security assessment sharing | |||
1211 | 8739247 | Verification service | |||
1212 | 8738916 | Secure peer-to-peer messaging invitation architecture | |||
1213 | 8738914 | Method and system for key exchange and method and apparatus for reducing parameter transmission bandwidth | |||
1214 | 8738912 | Accelerated signature verification on an elliptic curve | |||
1215 | 8738911 | Secure socket layer keystore and truststore generation | |||
1216 | 8737623 | Systems and methods for remotely loading encryption keys in a card reader systems | |||
1217 | 8737621 | Enabling users to select between secure service providers using a central trusted service manager | |||
1218 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
1219 | 8737615 | Content transmission system, communication device, and content transmission method | |||
1220 | 8737608 | Exponential data transform to enhance security | |||
1221 | 8737607 | Finding nearby users without revealing own location | |||
1222 | 8737605 | Privacy region masking device and method in vehicle black box | |||
1223 | 8734529 | Distribution channel loss protection for electronic devices | |||
1224 | 8732481 | Object with identity based encryption | |||
1225 | 8732472 | System and method for verification of digital certificates | |||
1226 | 8732467 | Masked digital signatures | |||
1227 | 8732461 | Client apparatus, server apparatus, and program using entity authentication and biometric authentication | |||
1228 | 8732454 | Key setting method, node, and network system | |||
1229 | 8732451 | Portable secure computing network | |||
1230 | 8731203 | Securing a secret of a user | |||
1231 | 8731201 | Techniques for securing content in an untrusted environment | |||
1232 | 8731199 | Zero knowledge proofs for arbitrary predicates over data | |||
1233 | 8726398 | System and method to anonymize data transmitted to a destination computing device | |||
1234 | 8726360 | Telecommunication method, computer program product and computer system | |||
1235 | 8726334 | Model based systems management in virtualized and non-virtualized environments | |||
1236 | 8726040 | Memory randomization for protection against side channel attacks | |||
1237 | 8726023 | Authentication using GAA functionality for unidirectional network connections | |||
1238 | 8726011 | Systems and methods for managing digital certificates | |||
1239 | 8725536 | Establishing a patient-provider consent relationship for data sharing | |||
1240 | 8724818 | Method and system for security processing during RRC connection re-establishment | |||
1241 | 8724803 | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system | |||
1242 | 8719595 | Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method | |||
1243 | 8719587 | Computer implemented method for generating a pseudonym, computer readable storage medium and computer system | |||
1244 | 8719578 | Document verifying apparatus, document verifying method, and computer product | |||
1245 | 8718281 | Rekey scheme on high speed links | |||
1246 | 8718279 | Apparatus and method for a secure broadcast system | |||
1247 | 8718276 | Cryptography on a elliptical curve | |||
1248 | 8713330 | Data scrambling in memory devices | |||
1249 | 8713326 | Software self-checking systems and methods | |||
1250 | 8713322 | Author signatures for legal purposes | |||
1251 | 8713318 | Email certificates | |||
1252 | 8713316 | System, apparatus and method for enabling/disabling display data channel access to enable/disable high-bandwidth digital content protection | |||
1253 | 8713315 | Content distribution system, mobile communication terminal device, and computer readable medium | |||
1254 | 8713312 | Method and system for detecting data modification within computing device | |||
1255 | 8713302 | Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies | |||
1256 | 8712056 | Secure mobile ad hoc network | |||
1257 | 8712055 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
1258 | 8712052 | System and method for secure power systems infrastructure communications | |||
1259 | 8712050 | Method for implementing dynamic pseudorandom keyboard remapping | |||
1260 | 8712049 | System for implementing dynamic pseudorandom keyboard remapping | |||
1261 | 8712044 | Key management system | |||
1262 | 8712043 | Secure provisioning of a portable device using a representation of a key | |||
1263 | 8712041 | Content protection apparatus and content encryption and decryption apparatus using white-box encryption table | |||
1264 | 8712040 | Data-conditioned encryption method | |||
1265 | 8712038 | Cryptography on a simplified elliptical curve | |||
1266 | 8712037 | Data encoding and decoding apparatus and method thereof for verifying data integrity | |||
1267 | 8712036 | System for encrypting and decrypting a plaintext message with authentication | |||
1268 | 8711843 | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |||
1269 | 8707406 | Always-on virtual private network access | |||
1270 | 8707059 | End to end encryption for intrusion detection system | |||
1271 | 8707054 | Establishing a secure memory path in a unitary memory architecture | |||
1272 | 8707052 | Cryptographic device with resistance to differential power analysis and other external monitoring attacks | |||
1273 | 8707021 | Data recording device, data recording method to be used in same, and data record controlling computer program | |||
1274 | 8705738 | Selective security termination in next generation mobile networks | |||
1275 | 8705734 | Method and system for authenticating a mobile terminal in a wireless communication system | |||
1276 | 8705729 | Audio content protection | |||
1277 | 8701205 | Validation and/or authentication of a device for communication with network | |||
1278 | 8700906 | Secure computing in multi-tenant data centers | |||
1279 | 8700905 | Method and device for electronically capturing a handwritten signature using embedding technique | |||
1280 | 8700897 | Method and terminal equipment for applying digital rights management | |||
1281 | 8700894 | Method and system for securing routing information of a communication using identity-based encryption scheme | |||
1282 | 8700893 | Key certification in one round trip | |||
1283 | 8699883 | Variable spectral phase encoder/decoder based on decomposition of hadamard codes | |||
1284 | 8699713 | Key update with compromise detection | |||
1285 | 8699710 | Controlled security domains | |||
1286 | 8699705 | Computer implemented method for generating a set of identifiers from a private key, computer implemented method and computing device | |||
1287 | 8699704 | Secure node admission in a communication network | |||
1288 | 8699703 | System and method for pseudo-random polymorphic tree construction | |||
1289 | 8695064 | Method and system for machine identification | |||
1290 | 8695060 | System and method for creating secure applications | |||
1291 | 8694789 | System and method for generating a non-repudiatable record of a data stream | |||
1292 | 8694772 | Method and system for managing network identity | |||
1293 | 8694767 | Method and system for NAND flash support in an autonomously loaded secure reprogrammable system | |||
1294 | 8693692 | Direct delivery of content descrambling keys using chip-unique code | |||
1295 | 8693686 | Secure telephone devices, systems and methods | |||
1296 | 8693684 | Method and apparatus for computing a shared secret key | |||
1297 | 8689343 | System and method for securely transmitting video data | |||
1298 | 8689290 | System and method for securing a credential via user and server verification | |||
1299 | 8689286 | System and method for determining a security encoding to be applied to outgoing messages | |||
1300 | 8688995 | Method and apparatus for detection of a fault attack | |||
1301 | 8688994 | Federation among services for supporting virtual-network overlays | |||
1302 | 8688991 | Media player embodiments and secure playlist packaging | |||
1303 | 8688987 | Secure key distribution with general purpose mobile device | |||
1304 | 8687810 | Chaotic cipher system and method for secure communication | |||
1305 | 8687809 | System and method for decryption of content including disconnected encryption chains | |||
1306 | 8687806 | Conditional access system employing constrained encryption keys | |||
1307 | 8687804 | Separating control and data operations to support secured data transfers | |||
1308 | 8687802 | Method and system for accelerating the deterministic enciphering of data in a small domain | |||
1309 | 8683600 | Print policy commands | |||
1310 | 8683561 | Fixed client identification system for positive identification of client to server | |||
1311 | 8681994 | Systems and methods for document control using public key encryption | |||
1312 | 8681992 | Monitoring and controlling access to electronic content | |||
1313 | 8681990 | Renewal management for data items | |||
1314 | 8681986 | Single-round password-based key exchange protocols | |||
1315 | 8681985 | Masking operation method and device for symmetric key encrypted system | |||
1316 | 8681984 | Context-aware based RFID privacy control system and personal privacy protection method using the same | |||
1317 | 8681977 | Enabling/disabling display data channel access to enable/ disable high-bandwidth digital content protection | |||
1318 | 8681974 | Array encryption core | |||
1319 | 8677470 | System, method, and computer program product for security verification of communications to tenants of an on-demand database service | |||
1320 | 8677450 | Systems and methods of controlling network access | |||
1321 | 8677125 | Authenticating a user of a communication device to a wireless network to which the user is not associated with | |||
1322 | 8677123 | Method for accelerating security and management operations on data segments | |||
1323 | 8677120 | Communication between key manager and storage subsystem kernal via management console | |||
1324 | 8677114 | Application steering and application blocking over a secure tunnel | |||
1325 | 8677113 | Transmission of secure electronic mail formats | |||
1326 | 8675875 | Optimizing use of hardware security modules | |||
1327 | 8675871 | Protecting a control vector in an optional block of a standard key block | |||
1328 | 8675863 | Passive system for recovering cryptography keys | |||
1329 | 8671278 | Multiprotocol communication authentication | |||
1330 | 8671276 | Method for passing selective encrypted attributes of specific versions of objects in a distributed system | |||
1331 | 8670799 | Interface and communication protocol for a mobile device with a smart battery | |||
1332 | 8670568 | Methods and systems for utilizing cryptographic functions of a cryptographic co-processor | |||
1333 | 8670567 | Recovery of expired decryption keys | |||
1334 | 8670565 | Encrypted packet communication system | |||
1335 | 8670563 | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |||
1336 | 8670561 | Method and apparatus for limiting use of IP | |||
1337 | 8667559 | Feature management of a communication device | |||
1338 | 8667294 | Apparatus and method for preventing falsification of client screen | |||
1339 | 8667285 | Remote authentication and transaction signatures | |||
1340 | 8667282 | Information processing device, computer program, and information processing system | |||
1341 | 8667274 | System and method for WORM data storage | |||
1342 | 8667272 | System and method for content distribution with broadcast encryption | |||
1343 | 8666079 | Decoding and encoding data | |||
1344 | 8666070 | Method and apparatus for minimizing differential power attacks on processors | |||
1345 | 8666065 | Real-time data encryption | |||
1346 | 8666064 | Endecryptor capable of performing parallel processing and encryption/decryption method thereof | |||
1347 | 8666063 | Method and apparatus for minimizing differential power attacks on processors | |||
1348 | 8666062 | Method and apparatus for performing finite field calculations | |||
1349 | 8661556 | Method and apparatus for providing network security using role-based access control | |||
1350 | 8661260 | Methods and systems for indicating trustworthiness of secure communications | |||
1351 | 8661254 | Authentication of a client using a mobile device and an optical link | |||
1352 | 8661248 | Method, apparatus, and system for sending and receiving security policy of multicast sessions | |||
1353 | 8660264 | Method and apparatus for minimizing differential power attacks on processors | |||
1354 | 8660262 | Method and device for generating random wait states | |||
1355 | 8660261 | System and apparatus for integrated video/image encoding/decoding and encryption/decryption | |||
1356 | 8656501 | Method and device for selectively protecting one of a plurality of methods of a class of an application written in an object-orientated language | |||
1357 | 8656457 | Controlling locking state transitions in a terminal | |||
1358 | 8656177 | Identity-based-encryption system | |||
1359 | 8656174 | Recovering from de-synchronization attacks against watermarking and fingerprinting | |||
1360 | 8656165 | Electronic vehicle document display | |||
1361 | 8654974 | Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices | |||
1362 | 8654970 | Apparatus and method for implementing instruction support for the data encryption standard (DES) algorithm | |||
1363 | 8653938 | Method of protection in a contactless radiofrequency communication | |||
1364 | 8650643 | Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor | |||
1365 | 8650610 | Systems and methods of controlling network access | |||
1366 | 8650401 | Network having quantum key distribution | |||
1367 | 8650399 | Memory device and chip set processor pairing | |||
1368 | 8650391 | Systems and methods for securely providing and/or accessing information | |||
1369 | 8649522 | Electronic data communication system | |||
1370 | 8649510 | Device having coded output of operational data | |||
1371 | 8649508 | System and method for implementing elliptic curve scalar multiplication in cryptography | |||
1372 | 8646038 | Automated service for blocking malware hosts | |||
1373 | 8645735 | Method for lowering power consumption in secure devices | |||
1374 | 8645716 | Method and apparatus for overwriting an encryption key of a media drive | |||
1375 | 8645715 | Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host | |||
1376 | 8645698 | Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network | |||
1377 | 8645691 | System and method for securing data while minimizing bandwidth | |||
1378 | 8645690 | Method of verifying key validity and server for performing the same | |||
1379 | 8645281 | Process for authenticating an end user | |||
1380 | 8644510 | Discovery of security associations for key management relying on public keys | |||
1381 | 8644506 | Location-based security rules | |||
1382 | 8644502 | Secure data parser method and system | |||
1383 | 8644501 | Paired carrier and pivot steganographic objects for stateful data layering | |||
1384 | 8644254 | Handover procedure and method and apparatus for controlling transmitter power of femto base station in broadband wireless communication system | |||
1385 | 8640252 | Obfuscating entry of sensitive information | |||
1386 | 8640210 | Distributed computer systems with time-dependent credentials | |||
1387 | 8639940 | Methods and systems for assigning roles on a token | |||
1388 | 8639931 | Acceleration of key agreement protocols | |||
1389 | 8639929 | Method, device and system for authenticating gateway, node and server | |||
1390 | 8639921 | Storage gateway security model | |||
1391 | 8639451 | Information processing system using nucleotide sequence-related information | |||
1392 | 8639219 | Battery pack authentication for a mobile communication device | |||
1393 | 8638940 | Control of an entity to be controlled by a control entity | |||
1394 | 8638938 | Symmetric key subscription | |||
1395 | 8638930 | Random number verification method and random number verification apparatus | |||
1396 | 8638928 | Key exchanging apparatus | |||
1397 | 8638926 | Sharing a secret with modular inverses | |||
1398 | 8638227 | Input device, input method and application of electronic combination lock | |||
1399 | 8635680 | Secure identification of intranet network | |||
1400 | 8635455 | Encrypted communication device with restricted rate of encryption key retrievals from memory | |||
1401 | 8635448 | Secure prefix authorization with untrusted mapping services | |||
1402 | 8635445 | Method for digital identity authentication | |||
1403 | 8635442 | System and method for long-term digital signature verification utilizing light weight digital signatures | |||
1404 | 8634552 | System and method for using a streaming protocol | |||
1405 | 8631507 | Method of using signatures for measurement in a trusted computing environment | |||
1406 | 8631461 | Dynamic data-protection policies within a request-reply message queuing environment | |||
1407 | 8631247 | System and method for hardware based security | |||
1408 | 8631239 | Multiple system images for over-the-air updates | |||
1409 | 8630417 | Method for recording and restoring a ciphered content by a processing unit | |||
1410 | 8627478 | Method and apparatus for inspecting non-portable executable files | |||
1411 | 8627460 | Device function restricting method and system in specific perimeters | |||
1412 | 8627415 | System and method for secure commercial multimedia rental and distribution over secure connections | |||
1413 | 8627108 | System and method for protecting data on a mobile device | |||
1414 | 8627107 | System and method of securing private health information | |||
1415 | 8627081 | Multimedia data protection | |||
1416 | 8627073 | Adaptive certificate distribution mechanism in vehicular networks using forward error correcting codes | |||
1417 | 8627060 | Trusted network interface | |||
1418 | 8626811 | Method and apparatus for providing flexible bit-length moduli on a block Montgomery machine | |||
1419 | 8625805 | Digital security bubble | |||
1420 | 8625800 | Portable secure element | |||
1421 | 8625799 | Privacy management for tracked devices | |||
1422 | 8625798 | Method and apparatus for encrypting short data in a wireless communication system | |||
1423 | 8625787 | Hierarchical key management for secure communications in multimedia communication system | |||
1424 | 8625785 | Identity based symmetric cryptosystem using secure biometric model | |||
1425 | 8625782 | Method for privacy-preserving computation of edit distance of symbol sequences | |||
1426 | 8625780 | Reduction of side-channel information by interacting crypto blocks | |||
1427 | 8625777 | Pairing computation device, pairing computation method, and pairing computation program | |||
2013 | |||||
1428 | 8621540 | Apparatus and methods for provisioning in a download-enabled system | |||
1429 | 8621239 | Method for strengthening the implementation of ECDSA against power analysis | |||
1430 | 8621227 | System and method for cryptographic key exchange using matrices | |||
1431 | 8621217 | Method and apparatus for trusted branded email | |||
1432 | 8621210 | Ad-hoc trust establishment using visual verification | |||
1433 | 8619991 | Encoding/decoding circuit | |||
1434 | 8619980 | Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key | |||
1435 | 8615663 | System and method for secure remote biometric authentication | |||
1436 | 8615658 | Dynamic foreign agent--home agent security association allocation for IP mobility systems | |||
1437 | 8615650 | Control-word deciphering, transmission and reception methods, recording medium and server for these methods | |||
1438 | 8615086 | Key agreement and re-keying over a bidirectional communication path | |||
1439 | 8615085 | Encrypted communication system with limited number of stored encryption key retrievals | |||
1440 | 8615084 | Extending a secret bit string to safeguard the secret | |||
1441 | 8615081 | Secure key creation | |||
1442 | 8612761 | Method of executing a cryptographic protocol between two electronic entities | |||
1443 | 8612759 | Communication system for communicating data utilizing challenge data | |||
1444 | 8612752 | Communicating a packet from a mesh-enabled access point to a mesh portal in a multi-hop mesh network | |||
1445 | 8612750 | Creating and using secure communications channels for virtual universes | |||
1446 | 8612747 | System and method for establishing historical usage-based hardware trust | |||
1447 | 8611539 | Group key security in a multihop relay wireless network | |||
1448 | 8611534 | Electro-optic waveguide polarisation modulator | |||
1449 | 8611533 | Method and system for the Orange family of stream ciphers and method and system for generating stream ciphers based on the ERINDALE-PLUS hashing function | |||
1450 | 8611532 | Managing media content decryption keys in encrypted media content distribution systems and methods | |||
1451 | 8611530 | Encryption via induced unweighted errors | |||
1452 | 8607343 | Ticket-based personalization | |||
1453 | 8607299 | Method and system for enforcing a security policy via a security virtual machine | |||
1454 | 8607055 | Scanned document management system | |||
1455 | 8606873 | Methods and apparatus for securely advertising identification and/or discovery information | |||
1456 | 8605629 | Lawful interception of subscriber received multicast traffic | |||
1457 | 8601558 | Pushing certificate chains to remote devices | |||
1458 | 8601535 | Mobile authorization using policy based access control | |||
1459 | 8601272 | Signature log storing apparatus | |||
1460 | 8601262 | Location privacy through IP address space scrambling | |||
1461 | 8600062 | Off-line content delivery system with layered encryption | |||
1462 | 8600058 | Generation of self-certified identity for efficient access control list management | |||
1463 | 8600053 | Message key generation | |||
1464 | 8600050 | Encrypting a data transmission using multiple channels | |||
1465 | 8600049 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
1466 | 8600047 | Exponent obfuscation | |||
1467 | 8599916 | Reliable and non-manipulatable processing of data streams in a receiver | |||
1468 | 8595512 | Data control method of cloud storage | |||
1469 | 8595511 | Securely managing the execution of screen rendering instructions in a host operating system and virtual machine | |||
1470 | 8595509 | Systems and methods for online identity verification | |||
1471 | 8595504 | Light weight authentication and secret retrieval | |||
1472 | 8595485 | Security management method and system for WAPI terminal accessing IMS network | |||
1473 | 8595484 | Method and device for distributing public key infrastructure (PKI) certificate path data | |||
1474 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
1475 | 8594326 | Method of generating arbitrary numbers given a seed | |||
1476 | 8594325 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
1477 | 8594324 | Key validation scheme | |||
1478 | 8594323 | Method and apparatus for generating large numbers of encryption keys | |||
1479 | 8590050 | Security compliant data storage management | |||
1480 | 8590042 | Storage system, and encryption key management method and encryption key management program thereof | |||
1481 | 8590004 | Method and system for dynamic security using authentication server | |||
1482 | 8589690 | Information processing apparatus, server apparatus, medium recording information processing program and information processing method | |||
1483 | 8589682 | System and method for secure provisioning of an information handling system | |||
1484 | 8589680 | System and method for synchronizing encrypted data on a device having file-level content protection | |||
1485 | 8589674 | Revocation list update for devices | |||
1486 | 8589672 | Method for securely merging multiple nodes having trusted platform modules | |||
1487 | 8588426 | Methods and apparatus to secure communications in a mobile network | |||
1488 | 8588419 | Communication system, wireless communication apparatus, and communication method | |||
1489 | 8588416 | System and method for secure communication | |||
1490 | 8588413 | Enabling seamless access to a Wi-Fi network | |||
1491 | 8588410 | Simplified secure symmetrical key management | |||
1492 | 8583944 | Method and integrated circuit for secure encryption and decryption | |||
1493 | 8583925 | Mix-net system | |||
1494 | 8583809 | Destroying a secure session maintained by a server on behalf of a connection owner | |||
1495 | 8582776 | Electronic monitoring system and method | |||
1496 | 8582774 | Method for making safe an electronic cryptography assembly with a secret key | |||
1497 | 8582762 | Method for producing key material for use in communication with network | |||
1498 | 8582759 | Method and apparatus for providing content service | |||
1499 | 8578444 | Systems and methods of controlling network access | |||
1500 | 8578166 | System and method for authentication, data transfer, and protection against phishing | |||
1501 | 8578158 | Information processing apparatus, computer-readable recording medium configured to store command execution determination program, and command execution determination method | |||
1502 | 8578155 | Address generating method and broadcast receiving apparatus | |||
1503 | 8577039 | Cryptographic communication apparatus and cryptographic communication system | |||
1504 | 8577037 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
1505 | 8577032 | Common key block encryption device, common key block encryption method, and program | |||
1506 | 8577029 | Oblivious transfer with hidden access control lists | |||
1507 | 8577024 | Concealing plain text in scrambled blocks | |||
1508 | 8572729 | System, method and computer program product for interception of user mode code execution and redirection to kernel mode | |||
1509 | 8572389 | System and method for protecting master encryption keys | |||
1510 | 8572377 | Method for authentication | |||
1511 | 8572119 | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |||
1512 | 8571221 | On-chip storage, creation, and manipulation of an encryption key | |||
1513 | 8571210 | Content protection apparatus and method using binding of additional information to encryption key | |||
1514 | 8571208 | Method and apparatus for performing trick play on scrambled data stream | |||
1515 | 8566916 | Agile OTP generation | |||
1516 | 8565437 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
1517 | 8565435 | Efficient implementation of fully homomorphic encryption | |||
1518 | 8565434 | Methods and systems for maintaining security keys for wireless communication | |||
1519 | 8565428 | Network device and network connecting method for building up network connection via high definition multimedia interface | |||
1520 | 8565421 | Block cipher improvements | |||
1521 | 8565420 | Source centric sanction server and methods for use therewith | |||
1522 | 8565185 | Framework of media-independent pre-authentication support for PANA | |||
1523 | 8561094 | Protecting identification information in usage reports | |||
1524 | 8560840 | Method and system for authenticating a widget | |||
1525 | 8559638 | Cryptographic processing system | |||
1526 | 8559634 | Encoding/decoding circuit | |||
1527 | 8559633 | Method and device for generating local interface key | |||
1528 | 8559629 | Sanctioning content source and methods for use therewith | |||
1529 | 8559628 | Sanctioned client device and methods for use therewith | |||
1530 | 8559627 | Sanctioned caching server and methods for use therewith | |||
1531 | 8559626 | Cryptographic sanction server and methods for use therewith | |||
1532 | 8555400 | Privacy-preserving aggregation of Time-series data | |||
1533 | 8555340 | Method and apparatus for determining authentication capabilities | |||
1534 | 8555066 | Systems and methods for controlling access to encrypted data stored on a mobile device | |||
1535 | 8555065 | Method and apparatus for transmitting, receiving and decoding data using encoded patterns of changing colors | |||
1536 | 8555064 | Security system and method for wireless communication system | |||
1537 | 8554903 | Network appliance for vulnerability assessment auditing over multiple networks | |||
1538 | 8554222 | Method, system and device for maintaining user service continuity | |||
1539 | 8553889 | Mix-net system | |||
1540 | 8553887 | Method for generating dynamic group key | |||
1541 | 8553880 | Pseudorandom number generating system, encryption system, and decryption system | |||
1542 | 8553878 | Data transformation system using cyclic groups | |||
1543 | 8549606 | Device for protecting digital content, device for processing protected digital content, method for protecting digital content, method for processing protected digital content, storage medium storing program for protecting digital content, and storage medium storing program for processing protected digital content | |||
1544 | 8549586 | System utilizing a secure element | |||
1545 | 8549579 | Dynamic data-protection policies within a request-reply message queuing environment | |||
1546 | 8549315 | System and method for generating and managing administrator passwords | |||
1547 | 8549310 | Method and apparatus for secure measurement certification | |||
1548 | 8549305 | Steganographic method and device | |||
1549 | 8549303 | Apparatus, system and method for electronically signing electronic transcripts | |||
1550 | 8549278 | Rights management services-based file encryption system and method | |||
1551 | 8548165 | Method of compressing a cryptographic value | |||
1552 | 8548163 | Simultaneous scalar multiplication method | |||
1553 | 8548162 | Method and a device for performing torus-based cryptography | |||
1554 | 8547848 | Traffic control within a network architecture providing many-to-one transmission with denial-of-service protection | |||
1555 | 8547706 | Electronic component, board unit, and information-processing device | |||
1556 | 8544109 | Methods and systems involving survey administration | |||
1557 | 8544081 | Secure network architecture | |||
1558 | 8543826 | MACSec implementation | |||
1559 | 8543825 | Method and apparatus for input of coded image data | |||
1560 | 8543824 | Safe distribution and use of content | |||
1561 | 8543822 | Device authentication | |||
1562 | 8543811 | Efficient identity-based ring signature scheme with anonymity and system thereof | |||
1563 | 8543804 | Adaptive security policy based scalable video service apparatus and method | |||
1564 | 8543512 | Licensed content utilization validation using cache parameters | |||
1565 | 8542870 | Methods, apparatus and programs for generating and utilizing content signatures | |||
1566 | 8542838 | Method and system for generating and distributing mobile IP key | |||
1567 | 8542828 | Cryptographic secret key distribution | |||
1568 | 8542103 | Radio frequency identification reading by using error correcting codes on sets of tags | |||
1569 | 8539562 | Automated management of system credentials | |||
1570 | 8539252 | Method and system for protecting data | |||
1571 | 8539238 | Authenticated nonvolatile memory signing operations | |||
1572 | 8539093 | Port discovery and message delivery in a portable electronic device | |||
1573 | 8538919 | System, method, and computer program for real time remote recovery of virtual computing machines | |||
1574 | 8538025 | Security performance negotiation method and a TEK management method | |||
1575 | 8538023 | Methods and apparatuses for administrator-driven profile update | |||
1576 | 8538020 | Hybrid client-server cryptography for network applications | |||
1577 | 8538017 | Encryption device | |||
1578 | 8533607 | Method and apparatus for providing multiple management interfaces to a network device | |||
1579 | 8533491 | Data security for digital data storage | |||
1580 | 8533468 | Image forming apparatus, launching method of program in the apparatus, image forming system, and program and storage medium therefor | |||
1581 | 8533457 | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |||
1582 | 8532297 | Techniques for transmitting control channel information | |||
1583 | 8531162 | Network based energy preference service for managing electric vehicle charging preferences | |||
1584 | 8528047 | Multilayer access control security system | |||
1585 | 8527763 | System and method for enabling seamless transfer of a secure session | |||
1586 | 8527761 | System and method for fuse enablement of a secure client hosted virtualization in an information handling system | |||
1587 | 8527751 | Systems and methods for secure and certified electronic messaging | |||
1588 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
1589 | 8526607 | Identity authentication and shared key generation method | |||
1590 | 8526606 | On-demand secure key generation in a vehicle-to-vehicle communication network | |||
1591 | 8526605 | Data encryption to provide data security and memory cell bit wear leveling | |||
1592 | 8526601 | Method of improving operational speed of encryption engine | |||
1593 | 8522360 | Posted move in anchor point-based digital rights management | |||
1594 | 8522311 | Authentication techniques | |||
1595 | 8522307 | Flexibly assigning security configurations to applications | |||
1596 | 8522053 | Program execution device | |||
1597 | 8522052 | Method and integrated circuit for secure encryption and decryption | |||
1598 | 8522041 | System and method for efficiently performing a data encryption operation | |||
1599 | 8522033 | Authentication device, authentication method, program, and signature generation device | |||
1600 | 8522027 | Method for authenticating an entity by a verifier | |||
1601 | 8522023 | Rural services platform | |||
1602 | 8522021 | Communication channel of a device | |||
1603 | 8522018 | Method and system for implementing a mobile trusted platform module | |||
1604 | 8522015 | Authentication of binaries in memory with proxy code execution | |||
1605 | 8520856 | Controlling the validity period of a decryption key | |||
1606 | 8520853 | Wireless communication device, method for wireless connection, and computer usable medium therefor | |||
1607 | 8520847 | Split-key key-agreement protocol | |||
1608 | 8520846 | Method and device for key generation | |||
1609 | 8520845 | Method and apparatus for expansion key generation for block ciphers | |||
1610 | 8520844 | Methods and apparatus for providing secure two-party public key cryptosystem | |||
1611 | 8516267 | Computer readable storage medium for generating an access key, computer implemented method and computing device | |||
1612 | 8516266 | System and method for intermachine markup language communications | |||
1613 | 8516244 | System, apparatus and method for decentralizing attribute-based encryption information | |||
1614 | 8515081 | Approach for managing access to messages using encryption key management policies | |||
1615 | 8515076 | Security system and method using automatic meter reading protocol | |||
1616 | 8515074 | User key allocation method for broadcast encryption | |||
1617 | 8515073 | Method and system for secure communication in near field communication network | |||
1618 | 8515072 | Method and apparatus for providing secure communications for mobile communication devices | |||
1619 | 8515066 | Method, apparatus and program for establishing encrypted communication channel between apparatuses | |||
1620 | 8515064 | Method and an apparatus for key management in a communication network | |||
1621 | 8515057 | Method and device for executing crytographic calculation | |||
1622 | 8510797 | Online user authentication | |||
1623 | 8510566 | Authentic time-stamping for archival storage | |||
1624 | 8510561 | Methods and devices for computing a shared encryption key | |||
1625 | 8510560 | Efficient key establishment for wireless networks | |||
1626 | 8510559 | Secure session key generation | |||
1627 | 8510557 | Secure message and file delivery | |||
1628 | 8510552 | System and method for file-level data protection | |||
1629 | 8509447 | Method and system for distributing cryptographic keys in a hierarchized network | |||
1630 | 8509445 | Duplication means for an electronically coded key and related method | |||
1631 | 8509444 | Scramble key management unit, scramble key management information transmitting unit, method for scramble key output management, scramble key management program, license information management unit, license management information transmitting unit, method for license information output management, and license information management program | |||
1632 | 8509443 | Rekey index generation method and rekey index generation apparatus | |||
1633 | 8509433 | Method and apparatus of generating encryption key for broadcast encryption | |||
1634 | 8509431 | Identity management on a wireless device | |||
1635 | 8509427 | Hybrid mode cryptographic method and system with message authentication | |||
1636 | 8509425 | Image processing system, program and method | |||
1637 | 8505066 | Security audit system and method | |||
1638 | 8504483 | Electronic trading system supporting anonymous negotiation and indications of interest | |||
1639 | 8503679 | Short message encryption | |||
1640 | 8503674 | Cryptographic key attack mitigation | |||
1641 | 8503673 | Method and system for secret key exchange using wireless link characteristics and random device movement | |||
1642 | 8499358 | Program executing processing and controlling | |||
1643 | 8499167 | System and method for efficient and accurate comparison of software items | |||
1644 | 8499160 | Public key encryption with digital signature scheme | |||
1645 | 8499147 | Account management system, root-account management apparatus, derived-account management apparatus, and program | |||
1646 | 8498943 | Secure and recoverable database for on-line value-bearing item system | |||
1647 | 8498419 | Wireless perimeter security device and network using same | |||
1648 | 8498411 | Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables | |||
1649 | 8495739 | System and method for ensuring scanning of files without caching the files to network device | |||
1650 | 8495390 | System and method for data obfuscation based on discrete logarithm properties | |||
1651 | 8495372 | Authentication methods and apparatus using pairing protocols and other techniques | |||
1652 | 8495371 | Network device authentication | |||
1653 | 8494966 | Method and apparatus for facilitating the transfer of a software license between computer systems | |||
1654 | 8494169 | Validating encrypted archive keys | |||
1655 | 8494168 | Locating cryptographic keys stored in a cache | |||
1656 | 8494165 | Secure communications between devices using a trusted server | |||
1657 | 8494156 | System, architecture and method for secure encryption and decryption | |||
1658 | 8494155 | Method and apparatus of high speed encryption and decryption | |||
1659 | 8493472 | Image sensing apparatus for generating image data and authentication data of the image data | |||
1660 | 8490149 | Secure session handling in a device after a policy update | |||
1661 | 8489900 | Method and apparatus for providing a specific user interface in a system for managing content | |||
1662 | 8489884 | Methods and apparatus for generating signatures | |||
1663 | 8488793 | Efficient rebinding of partitioned content encrypted using broadcast encryption | |||
1664 | 8488785 | Secure storage and retrieval of confidential information | |||
1665 | 8488784 | Organic keyed encryption | |||
1666 | 8488231 | Generator of polarization entangled photon pairs and method of generating the same | |||
1667 | 8484485 | Encryption device and encryption system | |||
1668 | 8483393 | Key management system for digital cinema | |||
1669 | 8483392 | Methods and apparatus for compensation for corrupted user identification data in wireless networks | |||
1670 | 8483390 | Systems and methods for broadcast encryption optimization and scalability | |||
1671 | 8483385 | Natural language dependent stream ciphers | |||
1672 | 8479298 | Method for encrypting and embedding information in a URL for content delivery | |||
1673 | 8479259 | Secure customer interface for web based data management | |||
1674 | 8479000 | Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit | |||
1675 | 8478989 | Method and apparatus to authenticate and authorize user access to a system | |||
1676 | 8478985 | Determining whether to encrypt outbound traffic | |||
1677 | 8477946 | Method and apparatus for protecting encryption keys in a logically partitioned computer system environment | |||
1678 | 8477939 | Polarization-insensitive one-way quantum key distribution receiver, transmitter/receiver system | |||
1679 | 8474052 | User-administered license state verification | |||
1680 | 8474007 | System and method of controlling identity privacy in a communication session | |||
1681 | 8473754 | Hardware-facilitated secure software execution environment | |||
1682 | 8473740 | Method and system for secured management of online XML document services through structure-preserving asymmetric encryption | |||
1683 | 8473735 | Systems and methods for managing digital certificates | |||
1684 | 8473701 | Storage media to storage drive centric security | |||
1685 | 8472629 | Communication system, communication device and processing method therefor | |||
1686 | 8472628 | Method of handling security key change and related communication device | |||
1687 | 8472622 | Wireless communication method, information access method, and virtual antenna radiation pattern forming method | |||
1688 | 8472619 | Multiple validly decryptable messages | |||
1689 | 8468577 | Managed website system and method | |||
1690 | 8468361 | System and method for securely provisioning and generating one-time-passwords in a remote device | |||
1691 | 8468344 | Enabling multi-level security in a single-level security computing system | |||
1692 | 8468341 | System and method for content distribution with broadcast encryption | |||
1693 | 8468336 | System and method for providing security via a top level domain | |||
1694 | 8467536 | Binding keys to secure media streams | |||
1695 | 8467533 | One-time-pad encryption with key ID and offset for starting point | |||
1696 | 8467532 | System and method for secure transaction of data between a wireless communication device and a server | |||
1697 | 8467527 | Efficient key derivation for end-to-end network security with traffic visibility | |||
1698 | 8467526 | Key evolution method and system of block ciphering | |||
1699 | 8467525 | Steganographic method and device | |||
1700 | 8464315 | Network invitation arrangement and method | |||
1701 | 8464070 | Apparatus and method for transmitting and receiving data | |||
1702 | 8464065 | Procedure and architecture for the protection of real time data | |||
1703 | 8464062 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
1704 | 8464059 | System and method for device bound public key infrastructure | |||
1705 | 8464058 | Password-based cryptographic method and apparatus | |||
1706 | 8464057 | Enterprise computer investigation system | |||
1707 | 8464049 | Method and system of accessing copy-prevented encrypted data resources over a network | |||
1708 | 8463713 | Transactional security over a network | |||
1709 | 8463264 | Early IMS security | |||
1710 | 8462953 | Communication system and method thereof | |||
1711 | 8462943 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |||
1712 | 8462942 | Method and system for securing packetized voice transmissions | |||
1713 | 8462941 | Encrypted stream processing circuit and method of processing encrypted stream | |||
1714 | 8462939 | RNS-based cryptographic system and method | |||
1715 | 8458774 | Method for secure site and user authentication | |||
1716 | 8458763 | Method of automating and personalizing systems to satisfy security requirements in an end-to-end service landscape | |||
1717 | 8458490 | System and method for supporting full volume encryption devices in a client hosted virtualization system | |||
1718 | 8458481 | Using watermarking to reduce communication overhead | |||
1719 | 8458480 | Method and apparatus for binding TPM keys to execution entities | |||
1720 | 8458477 | Communication with non-repudiation | |||
1721 | 8458475 | Systems and methods for product authentication | |||
1722 | 8458470 | Authentication in data management | |||
1723 | 8458457 | Method and system for certificate revocation list pre-compression encoding | |||
1724 | 8457638 | Mobile communication method | |||
1725 | 8457597 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | |||
1726 | 8457316 | Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing | |||
1727 | 8457308 | Communication system and method for protecting messages between two mobile phones | |||
1728 | 8457306 | Cryptographic module and IC card | |||
1729 | 8457305 | Generating genus 2 curves from invariants | |||
1730 | 8457304 | Efficient encoding processes and apparatus | |||
1731 | 8457302 | Access-controlled data storage medium | |||
1732 | 8453241 | Method for securing streaming multimedia network transmissions | |||
1733 | 8452959 | Method and system for registering a presence user with a presence service | |||
1734 | 8452016 | Interoperable keychest for use by service providers | |||
1735 | 8452014 | Group key management for mobile ad-hoc networks | |||
1736 | 8452012 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
1737 | 8447988 | Hash processing using a processor | |||
1738 | 8447981 | Method and system for generating and distributing mobile IP security key after re-authentication | |||
1739 | 8447971 | Self-signed implicit certificates | |||
1740 | 8447697 | Rights offering and granting | |||
1741 | 8447040 | Communication apparatus, control method thereof, and storage medium | |||
1742 | 8447037 | Key tree construction and key distribution method for hierarchical role-based access control | |||
1743 | 8447036 | Multi-party key agreement method using bilinear map and system therefor | |||
1744 | 8447032 | Generation of min-hash signatures | |||
1745 | 8443419 | Method, device, and system for pre-authentication | |||
1746 | 8443417 | Node authentication and node operation methods within service and access networks in NGN environment | |||
1747 | 8443416 | Techniques for secure channel messaging | |||
1748 | 8443197 | Voice-capable system and method for authentication using prior entity user interaction | |||
1749 | 8443194 | Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system | |||
1750 | 8442873 | Order processing system, method and program product | |||
1751 | 8442535 | Method, system and device for maintaining user service continuity | |||
1752 | 8442235 | Extensible management of self-encrypting storage devices | |||
1753 | 8442233 | Telecommunication systems and encryption of control messages in such systems | |||
1754 | 8442230 | Enhanced high availability for group VPN in broadcast environment | |||
1755 | 8442216 | Fault detection in exponentiation and point multiplication operations using a montgomery ladder | |||
1756 | 8442215 | Determining HDCP source KSV support | |||
1757 | 8442070 | Fractional threshold encoding and aggregation | |||
1758 | 8438649 | Streaming insertion of tokens into content to protect against CSRF | |||
1759 | 8438392 | Method and system for control of code execution on a general purpose computing device and control of code execution in a recursive security protocol | |||
1760 | 8438391 | Credential generation management servers and method for communications devices and device management servers | |||
1761 | 8437471 | System for scrambling and methods for use therewith | |||
1762 | 8437470 | Method and system for block cipher encryption | |||
1763 | 8433921 | Object authentication system | |||
1764 | 8433916 | Active hip | |||
1765 | 8433912 | Authentication device, authentication method, program, and signature generation device | |||
1766 | 8433911 | Management server, management method, management system for downloading of contents, and mobile devices | |||
1767 | 8433070 | Systems and methods for stabilization of interferometers for quantum key distribution | |||
1768 | 8429412 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
1769 | 8429408 | Masking the output of random number generators in key generation protocols | |||
1770 | 8429405 | System and method for human assisted secure information exchange | |||
1771 | 8429399 | Method and arrangement for security activation detection in a telecommunication system | |||
1772 | 8428554 | Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access | |||
1773 | 8428266 | Method and terminal for implementing hot-plug of smart card | |||
1774 | 8428265 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
1775 | 8428261 | System and method for establishing authenticated wireless connection between mobile unit and host | |||
1776 | 8428255 | Selective switching between data sources | |||
1777 | 8428254 | Distributed generation of mutual secrets | |||
1778 | 8428252 | Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables | |||
1779 | 8428251 | System and method for stream/block cipher with internal random states | |||
1780 | 8424064 | Distributed device revocation | |||
1781 | 8423788 | Secure memory card with life cycle phases | |||
1782 | 8423780 | Encryption based security system for network storage | |||
1783 | 8423769 | Method and apparatus for generating security context | |||
1784 | 8423764 | Method and apparatus for key revocation in an attribute-based encryption scheme | |||
1785 | 8423437 | Certified email system and method | |||
1786 | 8422685 | Method for elliptic curve scalar multiplication | |||
1787 | 8422684 | Security classes in a media key block | |||
1788 | 8422683 | Appraising systems with zero knowledge proofs | |||
1789 | 8422682 | Method and system of generating immutable audit logs | |||
1790 | 8422680 | Method for validating encrypted communications via selection and comparison of source transmitter and destination receiver associated encryption keys | |||
1791 | 8422675 | Data transmission system | |||
1792 | 8422674 | Application-specific secret generation | |||
1793 | 8422671 | Methods of encryption and decryption using operand ordering and encryption systems using the same | |||
1794 | 8422667 | Method and apparatus to facilitate transmission of an encrypted rolling code | |||
1795 | 8421593 | Apparatus, systems and methods for authentication of objects having multiple components | |||
1796 | 8417967 | Storage device data encryption using a binary large object (BLOB) | |||
1797 | 8417966 | System and method for measuring and reporting consumption of rights-protected media content | |||
1798 | 8417965 | Method and circuit for secure definition and integration of cores | |||
1799 | 8417949 | Total exchange session security | |||
1800 | 8417940 | System and device for parallelized processing | |||
1801 | 8417931 | Method and system for NAND flash support in an autonomously loaded secure reprogrammable system | |||
1802 | 8416954 | Systems and methods for accessing storage or network based replicas of encrypted volumes with no additional key management | |||
1803 | 8416953 | Data protection system that protects data by encrypting the data | |||
1804 | 8416951 | Method and a device for generating a pseudorandom string | |||
1805 | 8413226 | User-type handling in a wireless access network | |||
1806 | 8412957 | Encryption and decryption of records in accordance with group access vectors | |||
1807 | 8412942 | Method and system for seamless SSID creation, authentication and encryption | |||
1808 | 8412934 | System and method for backing up and restoring files encrypted with file-level content protection | |||
1809 | 8412929 | System and method for administering digital certificate checking | |||
1810 | 8411863 | Full volume encryption in a clustered environment | |||
1811 | 8411860 | Wireless communication system, base station, terminal and wireless communication method | |||
1812 | 8411859 | Non-deterministic number generation | |||
1813 | 8411858 | Dynamic foreign agent-home agent security association allocation for IP mobility systems | |||
1814 | 8411856 | Image forming apparatus, computer readable medium and medium | |||
1815 | 8411855 | Size optimization for large elliptic curve cryptography scalar multiplication acceleration tables | |||
1816 | 8411854 | Method and apparatus for authenticating a user | |||
1817 | 8411853 | Alternate galois field advanced encryption standard round | |||
1818 | 8411851 | Determining HDCP source KSV support | |||
1819 | 8407758 | Network security appliance | |||
1820 | 8407488 | Semiconductor device including encryption section, semiconductor device including external interface, and content reproduction method | |||
1821 | 8407484 | Flash memory distribution of digital content | |||
1822 | 8407483 | Apparatus and method for authenticating personal use of contents by using portable storage | |||
1823 | 8407477 | Information distribution system and program for the same | |||
1824 | 8407470 | Control device and controlled device | |||
1825 | 8406735 | Method for pairing electronic equipment in a wireless network system | |||
1826 | 8406422 | Cryptographic module management apparatus, method, and program | |||
1827 | 8406382 | Transparent voice registration and verification method and system | |||
1828 | 8402273 | Method for securing a transmission, associated system and mediation platform | |||
1829 | 8402268 | System and method for providing security aboard a moving platform | |||
1830 | 8401972 | System and method of generating a per sale watermarking on digital files | |||
1831 | 8401196 | Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications | |||
1832 | 8401195 | Method of automatically populating a list of managed secure communications group members | |||
1833 | 8401193 | System and method for securing wireless communications | |||
1834 | 8401186 | Cloud storage data access method, apparatus and system based on OTP | |||
1835 | 8401185 | Systems and methods for securely deduplicating data owned by multiple entities | |||
1836 | 8401184 | Device to generate a machine specific identification key | |||
1837 | 8401183 | Method and system for keying and securely storing data | |||
1838 | 8401181 | Segment deduplication system with encryption of segments | |||
1839 | 8400995 | System and method for descrambling data | |||
1840 | 8397292 | Method and device for online secure logging-on | |||
1841 | 8397274 | Method for authenticating device capabilities to a verified third party | |||
1842 | 8397075 | Method and apparatus for access control to installation control systems of wind energy installations | |||
1843 | 8397072 | Computer-implemented method and system for embedding ancillary information into the header of a digitally signed executable | |||
1844 | 8397071 | Generation method and update method of authorization key for mobile communication | |||
1845 | 8397070 | Systems and methods for governing content rendering, protection, and management applications | |||
1846 | 8397061 | Unattended code update of storage facility | |||
1847 | 8397058 | System and method for communication between smart cards | |||
1848 | 8396222 | Key distribution system | |||
1849 | 8396219 | Scrambler, scramble processing method, and program | |||
1850 | 8396218 | Cryptographic module distribution system, apparatus, and program | |||
1851 | 8396214 | Method and apparatus for centrally managed encrypted partition | |||
1852 | 8396213 | Elliptic curve random number generation | |||
1853 | 8396211 | System and method for dynamic modification of allowable electronic message properties | |||
1854 | 8392993 | Systems and methods for delaying termination of a process to capture data relating to a potential threat | |||
1855 | 8392713 | Secure offline activation process for licensed software application programs | |||
1856 | 8392711 | Staged establishment of secure strings of symbols | |||
1857 | 8392703 | Electronic signature verification method implemented by secret key infrastructure | |||
1858 | 8392701 | Method and apparatus for ensuring packet transmission security | |||
1859 | 8392700 | Apparatus and system for asymmetric security | |||
1860 | 8392699 | Secure communication system for mobile devices | |||
1861 | 8391884 | System and method for managing created location contexts in a location server | |||
1862 | 8391495 | Secure shell used to open a user's encrypted file system keystore | |||
1863 | 8391489 | Processor system | |||
1864 | 8391480 | Digital authentication over acoustic channel | |||
1865 | 8391477 | Cryptographic device having tamper resistance to power analysis attack | |||
1866 | 8387122 | Access control by testing for shared knowledge | |||
1867 | 8386803 | System and method for data obfuscation based on discrete logarithm properties | |||
1868 | 8386800 | Verifiable, leak-resistant encryption and decryption | |||
1869 | 8386791 | Secure data processing method based particularly on a cryptographic algorithm | |||
1870 | 8386790 | Method of using ECDSA with winternitz one time signature | |||
1871 | 8386778 | System and method of protecting data on a communication device | |||
1872 | 8386647 | Method for time source calibration and system thereof | |||
1873 | 8385553 | Portable secure element | |||
1874 | 8385552 | Techniques for managing keys using a key server in a network segment | |||
1875 | 8385551 | Highly available cryptographic key storage (HACKS) | |||
1876 | 8385550 | System and method for secure wireless multi-hop network formation | |||
1877 | 8385549 | Fast authentication between heterogeneous wireless networks | |||
1878 | 8385548 | System and method for entangled photons generation and measurement | |||
1879 | 8385547 | Method and apparatus for secure digital communications using chaotic signals | |||
1880 | 8385546 | System and method for storing and accessing digital media content using smart card technology | |||
1881 | 8385540 | Block cipher algorithm based encryption processing method | |||
1882 | 8381266 | Method and system for machine identification | |||
1883 | 8380994 | Systems and methods for generating and managing cookie signatures for prevention of HTTP denial of service in multi-core system | |||
1884 | 8380986 | Method for analyzing simultaneously transmitted, encoded data streams | |||
1885 | 8380167 | LAN-based UMA network controller with proxy connection | |||
1886 | 8379863 | Enabling users to select between secure service providers using a central trusted service manager | |||
1887 | 8379862 | Method and device for automatically distributing updated key material | |||
1888 | 8379861 | Integrated circuit and a method for secure testing | |||
1889 | 8379850 | Method and integrated circuit for secure encryption and decryption | |||
1890 | 8379848 | Method of providing a portable true random number generator based on the microstructure and noise found in digital images | |||
1891 | 8379847 | Data and control encryption | |||
1892 | 8379846 | Encryption apparatus and method therefor | |||
1893 | 8379845 | Multilayer encryption of a transport stream data and modification of a transport header | |||
1894 | 8379843 | Data converter, data conversion method, and computer program | |||
1895 | 8378786 | Security provision in standards-compliant RFID systems | |||
1896 | 8375457 | Document management device, document management method and storage medium | |||
1897 | 8375420 | Challenge-response system and method | |||
1898 | 8375419 | Information processing apparatus, method for controlling information processing apparatus, and storage medium | |||
1899 | 8375418 | Method of performing software updates (installations), on networked 32/64-bit microsoft computers in an automated environment without introducing a possible security threat | |||
1900 | 8375223 | Systems and methods for secure distributed storage | |||
1901 | 8375202 | Communications methods and appliances | |||
1902 | 8374351 | Encryption device, program, and method | |||
1903 | 8374344 | Coding | |||
1904 | 8374342 | Scalar multiplier and scalar multiplication program | |||
1905 | 8370950 | Securing mixed-mode applications | |||
1906 | 8370921 | Ensuring quality of service over VPN IPsec tunnels | |||
1907 | 8370896 | System and method for determining a security encoding to be applied to outgoing messages | |||
1908 | 8370644 | Instant hardware erase for content reset and pseudo-random number generation | |||
1909 | 8370642 | Cryptographic processing apparatus | |||
1910 | 8370633 | Apparatus, method, and computer instructions for generating a substitute signature key pair | |||
1911 | 8370626 | Method and apparatus for a configurable online public key infrastructure (PKI) management system | |||
1912 | 8370621 | Counting delegation using hidden vector encryption | |||
1913 | 8369528 | Method and apparatus for providing encrypted key based on DRM type of host device | |||
1914 | 8369526 | Device, system, and method of securely executing applications | |||
1915 | 8369521 | Smart card based encryption key and password generation and management | |||
1916 | 8369520 | Cryptographic device employing parallel processing | |||
1917 | 8369517 | Fast scalar multiplication for elliptic curve cryptosystems over prime fields | |||
1918 | 8369514 | Method for the secure determination of data | |||
1919 | 8364982 | Wireless receiver and methods for storing content from RF signals received by wireless receiver | |||
1920 | 8364967 | Multi-step digital signature method and system | |||
1921 | 8364959 | Systems and methods for using a domain-specific security sandbox to facilitate secure transactions | |||
1922 | 8364955 | Systems and methods for effectively removing access to individual files on magnetic tape media | |||
1923 | 8364951 | System for digital rights management using distributed provisioning and authentication | |||
1924 | 8364596 | System and method for providing and/or obtaining electronic documents | |||
1925 | 8363840 | Method and apparatus for providing broadcast service using encryption key in a communication system | |||
1926 | 8363839 | Image forming apparatus | |||
1927 | 8363838 | Methods for the generation of identical symmetrical cryptographic keys | |||
1928 | 8363837 | Data storage device with data transformation capability | |||
1929 | 8363833 | FPGA configuration bitstream encryption using modified key | |||
1930 | 8363830 | Cryptographic system configured to perform a mixed radix conversion with a priori defined statistical artifacts | |||
1931 | 8363829 | System for descrambling and methods for use therewith | |||
1932 | 8363825 | Device for and method of collision-free hashing for near-match inputs | |||
1933 | 8359639 | Systems and methods for increased security during logging in to web site | |||
1934 | 8359469 | One way authentication | |||
1935 | 8359468 | Masked digital signatures | |||
1936 | 8358780 | Execution unit for performing the data encryption standard | |||
1937 | 8356360 | License management system and authentication method for the same | |||
1938 | 8356342 | Method and system for issuing a kill sequence for a token | |||
1939 | 8356177 | Key transport in authentication or cryptography | |||
1940 | 8356170 | Management-apparatus card, measuring apparatus, health care system, and method for communicating vital sign data | |||
1941 | 8355503 | Adding randomness internally to a wireless mobile communication device | |||
1942 | 8353058 | Methods and systems for detecting rootkits | |||
1943 | 8353055 | Method and apparatus for processing rights object | |||
1944 | 8353033 | Collecting malware samples via unauthorized download protection | |||
1945 | 8353024 | Method of transmitting information effectively in server/client network and server and client apparatuses using the same | |||
1946 | 8352998 | Policy evaluation in controlled environment | |||
1947 | 8352742 | Receiving encrypted emails via a web-based email system | |||
1948 | 8352735 | Method and system for encrypted file access | |||
1949 | 8352724 | Microprocessor and grid computing system | |||
1950 | 8352380 | Method and system for generating a list signature | |||
1951 | 8351609 | Method for managing keys and/or rights objects | |||
1952 | 8351608 | License management apparatus and method and license management system | |||
1953 | 8351607 | Wireless communication device, method for wireless connection, and computer usable medium therefor | |||
1954 | 8351604 | Coding method, decoding method, codec and data storage medium for holographic storage | |||
1955 | 8351603 | Random number generating device, random number generating method, and security chip | |||
1956 | 8351600 | Distributed storage network and method for encrypting and decrypting data using hash functions | |||
1957 | 8351599 | Cryptographic device for fast session switching | |||
1958 | 8347407 | Authority management method, system therefor, and server and information equipment terminal used in the system | |||
1959 | 8347402 | Software development and distribution workflow employing meta-object time stamping | |||
1960 | 8347379 | Printing system and image forming apparatus | |||
1961 | 8347377 | Bridged cryptographic VLAN | |||
1962 | 8347351 | Systems and methods of controlling network access | |||
1963 | 8347350 | Systems and methods of controlling network access | |||
1964 | 8347106 | Method and apparatus for user authentication based on a user eye characteristic | |||
1965 | 8347102 | Image processing apparatus and method for transmitting encrypted data | |||
1966 | 8347096 | Authentication token with incremental key establishment capacity | |||
1967 | 8347093 | Privacy preserving name verification | |||
1968 | 8347087 | Support for multiple digital rights management systems for same content | |||
1969 | 8345876 | Encryption/decryption system and method | |||
1970 | 8345875 | System and method of creating and sending broadcast and multicast data | |||
1971 | 8345866 | Secure data transfer on a handheld communications device | |||
1972 | 8345864 | Elliptic curve cryptography scalar multiplication with on demand acceleration table generation | |||
1973 | 8345577 | High speed wireless infrastructure | |||
2012 | |||||
1974 | 8341709 | Pushing certificate chains to remote devices | |||
1975 | 8341424 | Methods for playing protected content | |||
1976 | 8341411 | Enabling use of a certificate stored in a smart card | |||
1977 | 8340299 | Key management system and method | |||
1978 | 8340298 | Key management and user authentication for quantum cryptography networks | |||
1979 | 8340296 | Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains | |||
1980 | 8340295 | High-speed cryptographic system using chaotic sequences | |||
1981 | 8340294 | Secure modulation and demodulation | |||
1982 | 8340289 | System and method for providing an indication of randomness quality of random number data generated by a random data service | |||
1983 | 8340286 | Interleaving and deinterleaving method for preventing periodic position interference | |||
1984 | 8336109 | Method and apparatus for processing rights object | |||
1985 | 8336081 | Trusted network connect system for enhancing the security | |||
1986 | 8335928 | Information providing system and method and storage medium | |||
1987 | 8335918 | MAC frame provision method and apparatus capable of establishing security in IEEE 802.15.4 network | |||
1988 | 8335915 | Encryption based security system for network storage | |||
1989 | 8335314 | Adaptive and secure modular connection | |||
1990 | 8332657 | Global copy protection system for digital home networks | |||
1991 | 8332653 | Secure processing environment | |||
1992 | 8332642 | Monitor portal, monitor system, terminal and computer readable medium thereof | |||
1993 | 8332635 | Updateable secure kernel extensions | |||
1994 | 8331568 | Efficient distribution of computation in key agreement | |||
1995 | 8331561 | Fast switching between digital video sources | |||
1996 | 8331559 | Diffused data encryption/decryption processing method | |||
1997 | 8331556 | Asymmetrical method of encryption or signature verification | |||
1998 | 8331555 | Hardware-implemented MD5 function | |||
1999 | 8327139 | System and method for securely exchanging sensitive information with an implantable medical device | |||
2000 | 8327135 | Native WI-FI architecture for 802.11 networks | |||
2001 | 8325924 | Managing group keys | |||
2002 | 8325921 | Portable memory and a method for encrypting the same | |||
2003 | 8325915 | Image output system | |||
2004 | 8325914 | Providing secure communications for active RFID tags | |||
2005 | 8321686 | Secure memory card with life cycle phases | |||
2006 | 8321682 | System and method for generating and managing administrator passwords | |||
2007 | 8321679 | Pre-processed information embedding system | |||
2008 | 8321663 | Enhanced authorization process using digital signatures | |||
2009 | 8321660 | Method and devices for reproducing encrypted content and approving reproduction | |||
2010 | 8321350 | Uniquely linking security elements in identification documents | |||
2011 | 8320742 | Method and apparatus for playing data between external device and TV set | |||
2012 | 8320569 | Generating unique aliases for keys used with tape libraries | |||
2013 | 8320566 | Method and apparatus for performing constellation scrambling in a multimedia home network | |||
2014 | 8320562 | Methods for creating secret keys based upon one or more shared characteristics and systems thereof | |||
2015 | 8320561 | Key identifier in packet data convergence protocol header | |||
2016 | 8320560 | Secure data parser method and system | |||
2017 | 8320558 | Encryption of synchronization information | |||
2018 | 8320557 | Cryptographic system including a mixed radix number generator with chosen statistical artifacts | |||
2019 | 8316235 | Method and device for manipulation-proof transmission of data | |||
2020 | 8316233 | Systems and methods for accessing secure and certified electronic messages | |||
2021 | 8316225 | Automated integration of fault reporting | |||
2022 | 8315395 | Nearly-stateless key escrow service | |||
2023 | 8315392 | Method to secure access to audio/video content in a decoding unit | |||
2024 | 8315386 | Method and apparatus for performing VoIP-based communication using bio keys | |||
2025 | 8315385 | Digital entroping for digital audio reproductions | |||
2026 | 8315382 | Method for monitoring execution of data processing program instructions in a security module | |||
2027 | 8315381 | Methods and apparatus performing hash operations in a cryptography accelerator | |||
2028 | 8312519 | Agile OTP generation | |||
2029 | 8312283 | Accelerated signature verification on an elliptic curve | |||
2030 | 8312277 | Method and system for secure communication between computers | |||
2031 | 8312276 | Method for sending and receiving an evaluation of reputation in a social network | |||
2032 | 8312269 | Challenge and response access control providing data security in data storage devices | |||
2033 | 8312265 | Encrypting received content | |||
2034 | 8311223 | Communication system, communication apparatus, display device, and communication method | |||
2035 | 8311222 | Hardware based multi-dimensional encryption | |||
2036 | 8311218 | Rounding for security | |||
2037 | 8311217 | Data transmission method and terminal | |||
2038 | 8311216 | Packet cipher algorithm based encryption processing device | |||
2039 | 8311214 | Method for elliptic curve public key cryptographic validation | |||
2040 | 8311212 | Method of processing data protected against attacks by generating errors and associated device | |||
2041 | 8307447 | Method and apparatus for making system constraint of a specified permission in the digital rights management | |||
2042 | 8307209 | Universal authentication method | |||
2043 | 8307208 | Confidential communication method | |||
2044 | 8307161 | Caching for structural integrity schemes | |||
2045 | 8306220 | Method to generate a private key in a boneh-franklin scheme | |||
2046 | 8301893 | Detecting media areas likely of hosting watermarks | |||
2047 | 8300831 | Redundant key server encryption environment | |||
2048 | 8300828 | System and method for a derivation function for key per page | |||
2049 | 8300825 | Data encryption and/or decryption by integrated circuit | |||
2050 | 8300816 | Information processing unit, terminal unit, information processing method, key generation method and program | |||
2051 | 8300815 | Process to secure a personal portable object | |||
2052 | 8300814 | Information processing unit, terminal unit, information processing method, key generation method and program | |||
2053 | 8300813 | Secure information transfer based on global position | |||
2054 | 8300809 | System and method for modulus obfuscation | |||
2055 | 8300808 | Arithmetic operation method and arithmetic operation device | |||
2056 | 8300807 | Computing isogenies between genus-2 curves for cryptography | |||
2057 | 8296851 | System and method for ensuring security of data stored on electronic computing devices | |||
2058 | 8296826 | Secure transfer of files | |||
2059 | 8296580 | System and method for protecting data on a mobile device | |||
2060 | 8296577 | Cryptographic bus architecture for the prevention of differential power analysis | |||
2061 | 8296563 | Method of handling a certification request | |||
2062 | 8295489 | Method for sharing a link key in a ZigBee network and a communication system therefor | |||
2063 | 8295482 | Image scanning system, and image scanner and computer readable medium therefor | |||
2064 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
2065 | 8295477 | Cryptanalysis method and system | |||
2066 | 8295273 | Standard telephone equipment (STE) based deployable secure communication system | |||
2067 | 8291235 | Method and system for controlling access of clients and users to a print server | |||
2068 | 8291226 | Method and apparatus for securely booting from an external storage device | |||
2069 | 8291218 | Creating and using secure communications channels for virtual universes | |||
2070 | 8291213 | Techniques for secure network searching | |||
2071 | 8291212 | System and method for compressing secure E-mail for exchange with a mobile data communication device | |||
2072 | 8291118 | Globally unique identification in communications protocols and databases | |||
2073 | 8290817 | Selectable options for downloading digital content to a mobile terminal | |||
2074 | 8290165 | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys | |||
2075 | 8290164 | Automatic recovery of TPM keys | |||
2076 | 8290162 | Combinational combiner cryptographic method and apparatus | |||
2077 | 8290161 | Incorporating shared randomness into distributed cryptography | |||
2078 | 8290159 | Data recovery method, image processing apparatus, controller board, and data recovery program | |||
2079 | 8290154 | Methods and apparatuses for key generation, encryption and decryption in broadcast encryption | |||
2080 | 8290152 | Management system for web service developer keys | |||
2081 | 8290145 | Transition between masked representations of a value during cryptographic calculations | |||
2082 | 8285997 | Backup apparatus with higher security and lower network bandwidth consumption | |||
2083 | 8284938 | Techniques for data encryption and decryption | |||
2084 | 8284937 | Method for synchronization in encrypted communications using shared key | |||
2085 | 8284934 | Systems and methods for shared secret data generation | |||
2086 | 8284933 | Encrypting variable-length passwords to yield fixed-length encrypted passwords | |||
2087 | 8284931 | System and method for using a streaming protocol | |||
2088 | 8284930 | Simultaneous scalar multiplication method | |||
2089 | 8281144 | Ownership sharing method and apparatus using secret key in home network remote controller | |||
2090 | 8281140 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
2091 | 8281135 | Enforcing use of chipset key management services for encrypted storage devices | |||
2092 | 8281127 | Method for digital identity authentication | |||
2093 | 8281126 | Out of band encryption | |||
2094 | 8280059 | Method, system and device for generating group key | |||
2095 | 8280056 | System and methods for encryption with authentication integrity | |||
2096 | 8280053 | Authentication in a radiotelephony network | |||
2097 | 8280048 | Method for strengthening the implementation of ECDSA against power analysis | |||
2098 | 8280045 | Text-input device and method | |||
2099 | 8280044 | Stream encryption method and encryption system | |||
2100 | 8280043 | System and method for protecting data in a secure system | |||
2101 | 8278870 | Battery pack authentication for a mobile communication device | |||
2102 | 8276198 | Method and apparatus for local area networks | |||
2103 | 8275993 | Author signatures for legal purposes | |||
2104 | 8275709 | Digital rights management of content when content is a future live event | |||
2105 | 8275134 | Method for guaranteeing security of critical data, terminal and secured chip | |||
2106 | 8275131 | Image forming apparatus and security setting method thereof | |||
2107 | 8275130 | System and method for registering secret key | |||
2108 | 8275129 | Data scrambling, descrambling, and data processing method, and controller and storage system using the same | |||
2109 | 8275127 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
2110 | 8274941 | Apparatus and method for subcarrier scrambling | |||
2111 | 8272060 | Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses | |||
2112 | 8272041 | Firewall control via process interrogation | |||
2113 | 8272031 | Policy-based virtualization method involving adaptive enforcement | |||
2114 | 8271802 | Secure data parser method and system | |||
2115 | 8271786 | Method and system for providing secure communications between a first and a second peer device | |||
2116 | 8271784 | Communication between key manager and storage subsystem kernel via management console | |||
2117 | 8271780 | Trusted network connect method for enhancing security | |||
2118 | 8271777 | Secure host connection | |||
2119 | 8271776 | Mobile printing | |||
2120 | 8270613 | System for disabling unauthorized person, encryption device, encryption method, and program | |||
2121 | 8270612 | Mapping compound keys | |||
2122 | 8270611 | System and method for communicating with a key variable loader (KVL) using a standard universal asynchronous receiver transmitter (UART) peripheral | |||
2123 | 8270598 | Highly secured method and device for distributing audio-visual streams | |||
2124 | 8266438 | Secure data parser method and system | |||
2125 | 8266434 | System and method for providing an user's security when setting-up a connection over insecure networks | |||
2126 | 8266421 | Private electronic information exchange | |||
2127 | 8265271 | Method and device for managing a transmission of keys | |||
2128 | 8265270 | Utilizing cryptographic keys and online services to secure devices | |||
2129 | 8265265 | Circuit arrangement and method for RSA key generation | |||
2130 | 8261366 | Method and apparatus for identifying and characterizing errant electronic files | |||
2131 | 8261359 | Systems and methods for preventing unauthorized use of digital content | |||
2132 | 8261318 | Method and apparatus for passing security configuration information between a client and a security policy server | |||
2133 | 8261317 | Moving security for virtual machines | |||
2134 | 8261099 | Method and system for securing network data | |||
2135 | 8261098 | Method and apparatus for encrypting and processing data in flash translation layer | |||
2136 | 8261084 | Unauthorized contents detection system | |||
2137 | 8261080 | System and method for managing digital certificates on a remote device | |||
2138 | 8261072 | Method and system for secure external TPM password generation and use | |||
2139 | 8261060 | Content transmitting apparatus, content transmitting method, and content transmitting program | |||
2140 | 8261056 | Digital data recording apparatus, digital data recording method, and computer-readable recording medium | |||
2141 | 8260723 | Transactional security over a network | |||
2142 | 8259950 | Method for secure key management using multi-threshold secret sharing | |||
2143 | 8259948 | Virtual TPM key migration using hardware keys | |||
2144 | 8259947 | Recreating a cryptographic key in a replacement device | |||
2145 | 8259936 | Generating a traffic encryption key | |||
2146 | 8255705 | Encryption moniker in medium auxiliary memory | |||
2147 | 8255693 | Methods and devices responsive to ambient audio | |||
2148 | 8255692 | Method of providing secure tamper-proof acquired data from process instruments | |||
2149 | 8255691 | Apparatus for batch verification and method using the same | |||
2150 | 8254882 | Intrusion prevention system for wireless networks | |||
2151 | 8254578 | Process of manufacturing a handheld device, involving keys | |||
2152 | 8254577 | Validation of encryption key | |||
2153 | 8254572 | Secure provisioning of a portable device using a representation of a key | |||
2154 | 8254571 | Cryptographic system with halting key derivation function capabilities | |||
2155 | 8254568 | Secure booting a computing device | |||
2156 | 8250665 | Digital Broadcasting system and method of processing data in digital broadcasting system | |||
2157 | 8250636 | Instrument access control system | |||
2158 | 8250633 | Techniques for flexible resource authentication | |||
2159 | 8250475 | Managing icon integrity | |||
2160 | 8250375 | Generating unique data from electronic devices | |||
2161 | 8250370 | MACSec implementation | |||
2162 | 8250366 | Method and system for electronic vehicle document display | |||
2163 | 8250359 | Method and apparatus for distributing group data in a tunneled encrypted virtual private network | |||
2164 | 8249253 | Semiconductor integrated circuit having encrypter/decrypter function for protecting input/output data transmitted on internal bus | |||
2165 | 8249250 | Secure similarity verification between homomorphically encrypted signals | |||
2166 | 8245307 | Providing secure access to a secret | |||
2167 | 8245287 | Server message block (SMB) security signatures seamless session switch | |||
2168 | 8245036 | Method and system for establishing a trusted and decentralized peer-to-peer network | |||
2169 | 8245029 | System and method for enhanced network entrance into a wireless network | |||
2170 | 8244642 | System and method for storing metering data while increasing memory endurance | |||
2171 | 8243934 | Electronic device and encryption method thereof | |||
2172 | 8243933 | Method for sharing secret information among cooperating parties | |||
2173 | 8243931 | Method for detecting security error in mobile telecommunications system and device of mobile telecommunications | |||
2174 | 8243930 | Counterfeit prevention system based on random processes and cryptography | |||
2175 | 8241369 | Distribution channel loss protection for electronic devices | |||
2176 | 8239960 | Method for network traffic mirroring with data privacy | |||
2177 | 8239680 | Secret communication method and secret communication device thereof | |||
2178 | 8239672 | Method of automatically establishing a security link for a wireless communication system and related communication device | |||
2179 | 8239671 | Channel binding mechanism based on parameter binding in key derivation | |||
2180 | 8238558 | Key agreement and re-keying over a bidirectional communication path | |||
2181 | 8238557 | Method and apparatus for key expansion to encode data | |||
2182 | 8238552 | Password key derivation system and method | |||
2183 | 8238551 | Generation of perfectly secret keys in wireless communication networks | |||
2184 | 8234689 | System and method for generating target area information of a battlefield using information acquired from multiple classification levels | |||
2185 | 8234686 | System and method for creating a security application for programmable cryptography module | |||
2186 | 8233628 | Information processing apparatus and information processing method | |||
2187 | 8233627 | Method and system for managing a key for encryption or decryption of data | |||
2188 | 8233625 | Rolling code security system | |||
2189 | 8233622 | Transmitting parallel data via high-speed serial interconnection | |||
2190 | 8233621 | Slice-based prioritized secure video streaming | |||
2191 | 8233614 | Integer division method secure against covert channel attacks | |||
2192 | 8233600 | Automated creation of multiple provider services | |||
2193 | 8230511 | Trusted operating environment for malware detection | |||
2194 | 8230483 | System, apparatus, program, and method for authentication | |||
2195 | 8230478 | Flexibly assigning security configurations to applications | |||
2196 | 8230227 | Method for generating a temporally threaded CMI watermark | |||
2197 | 8230226 | Advanced watermarking system and method | |||
2198 | 8230219 | Reduced computation for bit-by-bit password verification in mutual authentication | |||
2199 | 8229857 | Secure pre-recorded digital medium | |||
2200 | 8229115 | Use of copyright text in key derivation function | |||
2201 | 8229113 | Strengthened public key protocol | |||
2202 | 8229112 | Decipherable searchable encryption method, system for such an encryption | |||
2203 | 8229110 | Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol | |||
2204 | 8225391 | System and method for improving restrictiveness on accessing software applications | |||
2205 | 8225373 | Protection of computer resources | |||
2206 | 8225110 | Cryptographic protection of usage restrictions in electronic devices | |||
2207 | 8225107 | Methods of storing and retrieving data in/from external server | |||
2208 | 8225101 | Cross validation of data using multiple subsystems | |||
2209 | 8225097 | Anchor point-based digital content protection | |||
2210 | 8225089 | Electronic transaction systems utilizing a PEAD and a private key | |||
2211 | 8223974 | Self-healing encryption keys | |||
2212 | 8223973 | Mix-net system | |||
2213 | 8223972 | Method and device for speeding up key use in key management software with tree structure | |||
2214 | 8223968 | Image data verification program recorded on a recording medium, image data verification method, and image data verification system | |||
2215 | 8223962 | Common key generation system, common key generation method and node using the same | |||
2216 | 8220064 | Content management system and content management unit | |||
2217 | 8220037 | Centralized browser management | |||
2218 | 8219830 | Apparatus and method for management for file aggregates and file directories | |||
2219 | 8219819 | Public key encryption with digital signature scheme | |||
2220 | 8219817 | System and method for authentication of transformed documents | |||
2221 | 8219813 | System and method for protecting a peripheral device against hot plug attacks | |||
2222 | 8219808 | Session-based public key infrastructure | |||
2223 | 8219801 | Method of authenticating digitally encoded products without private key sharing | |||
2224 | 8219799 | Secure communication system | |||
2225 | 8219798 | Method and system for securing E-mail transmissions | |||
2226 | 8219493 | Messaging method and apparatus for use in digital distribution systems | |||
2227 | 8218773 | Systems and methods to securely generate shared keys | |||
2228 | 8218772 | Secure multicast content delivery | |||
2229 | 8218771 | Information processing apparatus and computer readable medium | |||
2230 | 8218767 | Security system and method for use in network | |||
2231 | 8218763 | Method for ensuring the validity of recovered electronic documents from remote storage | |||
2232 | 8218762 | Encrypting apparatus for common key cipher | |||
2233 | 8218761 | Method and apparatus for generating random data-encryption keys | |||
2234 | 8214892 | Password authentication system and methods | |||
2235 | 8214656 | Managing the encryption of data | |||
2236 | 8214652 | Biometric identification network security | |||
2237 | 8214651 | Radio frequency identification (RFID) based authentication system and methodology | |||
2238 | 8213939 | Mobile communication method | |||
2239 | 8213616 | Systems and methods for providing opportunistic security for physical communication channels | |||
2240 | 8213612 | Secure software download | |||
2241 | 8213610 | Generation of key streams in wireless communication systems | |||
2242 | 8213609 | Key generating device, encrypting device, receiving device, key generating method, encrypting method, key processing method, and program | |||
2243 | 8213608 | Roaming utilizing an asymmetric key pair | |||
2244 | 8213585 | Automated distribution and indexing of prepaid calling card information | |||
2245 | 8209546 | Data-securing method of program tool | |||
2246 | 8209541 | Method and system for single sign-on for multiple remote sites of a computer network | |||
2247 | 8209533 | Key agreement and transport protocol | |||
2248 | 8208635 | Wireless mesh network with secure automatic key loads to wireless devices | |||
2249 | 8208633 | Method and system for securing communications in a metering device | |||
2250 | 8208632 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
2251 | 8205246 | User sensitive filtering of network application layer resources | |||
2252 | 8205090 | Secure recovery in a serverless distributed file system | |||
2253 | 8205088 | Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine | |||
2254 | 8205085 | Key update system, key management device, communication terminal, and key information construction method for multihop network | |||
2255 | 8205079 | Encryption/decryption system and method thereof | |||
2256 | 8204229 | Method and system for distributing key of media stream | |||
2257 | 8204226 | Encoding and recording apparatus, playback apparatus, and program | |||
2258 | 8204220 | Simulcrypt key sharing with hashed keys | |||
2259 | 8204217 | Lightweight streaming protection by sequence number scrambling | |||
2260 | 8204215 | Method and apparatus for encrypting data | |||
2261 | 8204214 | Method and system for generating data transaction ID | |||
2262 | 8204180 | Systems and methods for preventing sensitive information from being communicated into a non-secure environment | |||
2263 | 8201222 | Authentication system for authenticating communication terminal | |||
2264 | 8201164 | Dynamically regulating content downloads | |||
2265 | 8200988 | Firmware security key upgrade algorithm | |||
2266 | 8200976 | Portable audio appliance | |||
2267 | 8200974 | Method and system for securely exchanging encryption key determination information | |||
2268 | 8200971 | Method for the provision of a network service | |||
2269 | 8200965 | Storage system for data encryption | |||
2270 | 8200957 | Using SYN-ACK cookies within a TCP/IP protocol | |||
2271 | 8200582 | Mobile device password system | |||
2272 | 8199917 | SID management for access to encrypted drives | |||
2273 | 8199914 | Detection of a change of the data of a dataset | |||
2274 | 8199912 | Security storage of electronic keys within volatile memories | |||
2275 | 8199911 | Secure encryption algorithm for data deduplication on untrusted storage | |||
2276 | 8199910 | Signature generation apparatus and signature verification apparatus | |||
2277 | 8199346 | System and method for controlling printing of a print job in a printing system | |||
2278 | 8196207 | Control automation tool | |||
2279 | 8196194 | Method and network for securely delivering streaming data | |||
2280 | 8195957 | Memory randomization for protection against side channel attacks | |||
2281 | 8195956 | Re-keying data in place | |||
2282 | 8195948 | Hybrid signature scheme | |||
2283 | 8195943 | Signaling with opaque UE identities | |||
2284 | 8195936 | Method for transmitting and receiving data of a terminal in a communication system and communication terminal thereof | |||
2285 | 8195933 | Method and system for computing digital certificate trust paths using transitive closures | |||
2286 | 8195932 | Authentication and encryption for secure data transmission | |||
2287 | 8194859 | Efficient key hierarchy for delivery of multimedia content | |||
2288 | 8194858 | Chaotic cipher system and method for secure communication | |||
2289 | 8194856 | Rolling code security system | |||
2290 | 8194854 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
2291 | 8191158 | Systems and methods for secure transaction management and electronic rights protection | |||
2292 | 8191157 | Systems and methods for secure transaction management and electronic rights protection | |||
2293 | 8190901 | Layered security in digital watermarking | |||
2294 | 8190894 | Method and system for generating ciphertext and message authentication codes utilizing shared hardware | |||
2295 | 8190888 | System and methodology providing multi-tier security for network data with industrial control components | |||
2296 | 8190665 | Random cache line refill | |||
2297 | 8190124 | Authentication in a roaming environment | |||
2298 | 8189794 | System and method for effectively performing data restore/migration procedures | |||
2299 | 8189790 | Developing initial and subsequent keyID information from a unique mediaID value | |||
2300 | 8189778 | Adaptive generation of a pseudo random number generator seed | |||
2301 | 8189772 | Method and apparatus for performing elliptic curve arithmetic | |||
2302 | 8189768 | Secure messaging | |||
2303 | 8185947 | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network | |||
2304 | 8185936 | Automatic device-profile updates based on authentication failures | |||
2305 | 8185737 | Communication across domains | |||
2306 | 8185735 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
2307 | 8185642 | Communication policy enforcement in a data network | |||
2308 | 8184813 | Encryption key generation device | |||
2309 | 8184812 | Secure computing device with monotonic counter and method therefor | |||
2310 | 8184808 | Chaotic asymmetric encryption process for data security | |||
2311 | 8184807 | Content distribution/browsing system, content distribution apparatus, content browsing apparatus and program | |||
2312 | 8184806 | Table masking for resistance to power analysis attacks | |||
2313 | 8184804 | Hash function using a piling-up process | |||
2314 | 8181264 | Method and apparatus for deferred security analysis | |||
2315 | 8181245 | Proxy-based malware scan | |||
2316 | 8181040 | Program execution device | |||
2317 | 8181033 | Data leakage prevention system, method, and computer program product for preventing a predefined type of operation on predetermined data | |||
2318 | 8181026 | Method and apparatus for input of coded image data | |||
2319 | 8181022 | Method and apparatus for controlling access restrictions for media playback | |||
2320 | 8181015 | System and method for establishing historical usage-based hardware trust | |||
2321 | 8181013 | Method, media gateway and system for transmitting content in call established via media gateway control protocol | |||
2322 | 8180873 | Detecting fraudulent activity | |||
2323 | 8180060 | Telemedical system | |||
2324 | 8180059 | Management apparatus, terminal apparatus, and copyright protection system | |||
2325 | 8180057 | Chaotic signal enabled low probability intercept communication | |||
2326 | 8180056 | Methods and systems for communicating over a quantum channel | |||
2327 | 8180055 | Cryptographic system incorporating a digitally generated chaotic numerical sequence | |||
2328 | 8180049 | Signature schemes using bilinear mappings | |||
2329 | 8180047 | Trapdoor pairings | |||
2330 | 8176540 | Resource based non-interactive entity application proxy method and system | |||
2331 | 8176324 | Method and system for a secure virtual keyboard | |||
2332 | 8176322 | Apparatus and method for moving and copying rights objects between device and portable storage device | |||
2333 | 8176110 | Modular multiplier | |||
2334 | 8175276 | Encryption apparatus with diverse key retention schemes | |||
2335 | 8175275 | Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment | |||
2336 | 8175273 | Quantum cryptography communication method, quantum cryptography communication apparatus, and quantum cryptography communication system | |||
2337 | 8175268 | Generating and securing archive keys | |||
2338 | 8175267 | Communication apparatus, communication system, transmission method, and computer program product | |||
2339 | 8175265 | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | |||
2340 | 8171561 | Secure personal content server | |||
2341 | 8171560 | Secure content pre-distribution to designated systems | |||
2342 | 8171525 | Enabling users to select between secure service providers using a central trusted service manager | |||
2343 | 8171303 | Authenticating a login | |||
2344 | 8171300 | Security method and apparatus | |||
2345 | 8171292 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
2346 | 8171291 | Method for checking the integrity of data, system and mobile terminal | |||
2347 | 8171290 | System for authenticating remotely generated optical control signals | |||
2348 | 8171282 | Encryption data integrity check with dual parallel encryption engines | |||
2349 | 8170213 | Methodology for coordinating centralized key management and encryption keys cached through proxied elements | |||
2350 | 8170207 | Split-key key-agreement protocol | |||
2351 | 8170206 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
2352 | 8170205 | Processor apparatus | |||
2353 | 8166566 | Controlling the downloading and recording of digital data | |||
2354 | 8166565 | Encryption and access method and system for peer-to-peer distributed file storage | |||
2355 | 8166561 | Security device, secure memory system and method using a security device | |||
2356 | 8166309 | System and method for a secure multi-level network access mechanism using virtual service set identifier broadcast | |||
2357 | 8166303 | Method for transmitting data among components of the system electronics of mobile systems, and such components | |||
2358 | 8166299 | Secure messaging | |||
2359 | 8166297 | Systems and methods for controlling access to encrypted data stored on a mobile device | |||
2360 | 8165963 | License scheme for use with stackable devices | |||
2361 | 8165305 | Enhanced relational database security through encryption of table indices | |||
2362 | 8165304 | Domain digital rights management system, license sharing method for domain digital rights management system, and license server | |||
2363 | 8165302 | Key table and authorization table management | |||
2364 | 8165300 | System and method for generalized authentication | |||
2365 | 8165299 | Network authentication | |||
2366 | 8165296 | Time of day encryption using TDMA timing | |||
2367 | 8165295 | Data transmission method | |||
2368 | 8165291 | Random seed stability with fuses | |||
2369 | 8165289 | Method and apparatus for the generation of code from pattern features | |||
2370 | 8165286 | Combination white box/black box cryptographic processes and apparatus | |||
2371 | 8161545 | Keyboard with programmable username and password keys and system | |||
2372 | 8161279 | Methods and systems for proofing identities using a certificate authority | |||
2373 | 8161278 | System and method for distributing keys in a wireless network | |||
2374 | 8160256 | Key calculation method and key agreement method using the same | |||
2375 | 8160247 | Providing local storage service to applications that run in an application execution environment | |||
2376 | 8160246 | Apparatus and method for generating a key for broadcast encryption | |||
2377 | 8160243 | System, apparatus, and method for the secure storing of bulk data using one-time pad encryption | |||
2378 | 8160242 | Efficient implementation of arithmetical secure hash techniques | |||
2379 | 8156556 | Method and apparatus for providing mobile honeypots | |||
2380 | 8156545 | Method and apparatus for authorizing a communication interface | |||
2381 | 8156537 | Method and system for access control using resource filters | |||
2382 | 8156338 | Systems and methods for strong authentication of electronic transactions | |||
2383 | 8156336 | Device authentication | |||
2384 | 8156334 | Public key out-of-band transfer for mutual authentication | |||
2385 | 8155320 | Data storage device, management server, integrated circuit, data update system, home electric apparatuses, data update method, encryption method, and encryption/decryption key generation method | |||
2386 | 8155312 | Optical data storage device and method | |||
2387 | 8155311 | Method and apparatus for encrypting message for maintaining message integrity, and method and apparatus for decrypting message for maintaining message integrity | |||
2388 | 8155310 | Key derivation functions to enhance security | |||
2389 | 8151344 | Method and apparatus to authenticate a user | |||
2390 | 8151119 | Method and apparatus for secure data mirroring a storage system | |||
2391 | 8151113 | Methods and devices responsive to ambient audio | |||
2392 | 8151111 | Processing device constituting an authentication system, authentication system, and the operation method thereof | |||
2393 | 8151107 | Method and system for detecting concurrent logins | |||
2394 | 8151106 | Dynamically resolving recipients to retrieve public keys during send/receive | |||
2395 | 8150317 | Method and system for managing mobility of an access terminal in a mobile communication system using mobile IP | |||
2396 | 8150039 | Single security model in booting a computing device | |||
2397 | 8146139 | System and method of user authentication using handwritten signatures for an MFP | |||
2398 | 8146134 | Scalable firewall policy management platform | |||
2399 | 8145909 | Digitally signing an electronic document using seed data | |||
2400 | 8145895 | Information transmission apparatus and method, information reception apparatus and method, and information-providing system | |||
2401 | 8145718 | Secure messaging system with personalization information | |||
2402 | 8145707 | Sending digitally signed emails via a web-based email system | |||
2403 | 8144876 | Validating encrypted archive keys with MAC value | |||
2404 | 8144875 | Method and system for establishing real-time authenticated and secured communications channels in a public network | |||
2405 | 8144874 | Method for obtaining key for use in secure communications over a network and apparatus for providing same | |||
2406 | 8144872 | System and method for generating analog-digital mixed chaotic signal, encryption communication method thereof | |||
2407 | 8144870 | Encoding and detecting apparatus | |||
2408 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
2409 | 8141165 | Systems and methods for secure transaction management and electronic rights protection | |||
2410 | 8141136 | Method and system of replacing smart card | |||
2411 | 8140851 | Approaches for automatically switching message authentication keys | |||
2412 | 8140848 | Digital watermark key generation | |||
2413 | 8140824 | Secure code authentication | |||
2414 | 8140664 | Graphical user interface based sensitive information and internal information vulnerability management system | |||
2415 | 8139769 | Processing multi-key content | |||
2416 | 8139767 | Fine-grained forward-secure signature scheme | |||
2417 | 8136155 | Security system with methodology for interprocess communication control | |||
2418 | 8135963 | Program conversion device and program execution device | |||
2419 | 8135961 | Method and computing device for interfacing with a memory device in operations | |||
2420 | 8135955 | Device and method for detecting a manipulation of an information signal | |||
2421 | 8135951 | Automated key management system and method | |||
2422 | 8135132 | Method and system for secure storage, transmission and control of cryptographic keys | |||
2423 | 8135131 | Method for calculating compressed RSA moduli | |||
2424 | 8134972 | Communication system and gateway apparatus | |||
2425 | 8132263 | Method and system for selectively controlling access to protected media on a media storage device | |||
2426 | 8132228 | Electronic document conversion device and electronic document conversion method | |||
2427 | 8131999 | Distance-preserving anonymization of data | |||
2428 | 8131997 | Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel | |||
2429 | 8131993 | System and method for a commercial multimedia rental and distribution system | |||
2430 | 8131830 | System and method for providing support services using administrative rights on a client computer | |||
2431 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
2432 | 8130963 | Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site | |||
2433 | 8130962 | Content protection method and apparatus | |||
2434 | 8130961 | Method and system for client-server mutual authentication using event-based OTP | |||
2435 | 8130956 | Efficient and low power encrypting and decrypting of data | |||
2436 | 8130955 | Random number generation through use of memory cell activity | |||
2437 | 8130954 | Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device | |||
2438 | 8130950 | Configurable random number generator | |||
2439 | 8130949 | Partially reversible key obfuscation | |||
2440 | 8127367 | Refreshing software licenses | |||
2441 | 8127361 | Hierarchical scheme for secure multimedia distribution | |||
2442 | 8127146 | Transparent trust validation of an unknown platform | |||
2443 | 8127138 | Method for embedding information in sonar | |||
2444 | 8127134 | Systems and methods for efficiently authenticating multiple objects based on access patterns | |||
2445 | 8127129 | Method and network system for negotiating a security capability between a PCC and a PCE | |||
2446 | 8126149 | Communication apparatus having power-saving communication function, and communication method | |||
2447 | 8126148 | Securing home agent to mobile node communication with HA-MN key | |||
2448 | 8126140 | Generation of a pseudorandom data sequence | |||
2449 | 8126139 | Partial encryption and full authentication of message blocks | |||
2450 | 8122494 | Apparatus and method of securing network | |||
2451 | 8122485 | Authentication techniques | |||
2452 | 8122257 | Audio-based, location-related methods | |||
2453 | 8122254 | Information processing apparatus and method thereof | |||
2454 | 8122253 | Data validation using signatures and sampling | |||
2455 | 8122251 | Method and apparatus for preventing phishing attacks | |||
2456 | 8122250 | Authentication in data communication | |||
2457 | 8122246 | Method for generating decryption key, apparatus and method using decryption key | |||
2458 | 8121952 | System, method, and service for delivering multimedia content by means of a permission to decrypt titles on a physical media | |||
2459 | 8121729 | Remote diagnostic system for robots | |||
2460 | 8121295 | Method, apparatus, and system for controlling playout of media | |||
2461 | 8121294 | System and method for a derivation function for key per page | |||
2462 | 8121293 | System for ensuring encrypted communication after handover | |||
2463 | 8121292 | Method and apparatus for scrambling information bits on a channel in a communications system | |||
2464 | 8121291 | Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data | |||
2465 | 8121290 | Pseudo-random function calculating device and method and number-limited anonymous authentication system and method | |||
2466 | 8121288 | Encrypting and decrypting a data stream | |||
2467 | 8121284 | Information processing system, information processing method, and information processing program | |||
2468 | 8117645 | Systems and methods of controlling network access | |||
2469 | 8117640 | Systems and methods for analyzing application security policies | |||
2470 | 8117634 | Media data processing apparatus and media data processing method | |||
2471 | 8117462 | Delivery point validation system | |||
2472 | 8117455 | Object authentication from a signature part | |||
2473 | 8117452 | System and method for establishing a secure association between a dedicated appliance and a computing platform | |||
2474 | 8117440 | Methods and apparatus for enabling unified (internet protocol version) IPV6/IPV4 routing services over IPv4-only interfaces | |||
2475 | 8117433 | Method and apparatus to prevent vulnerability to virus and worm attacks through instruction remapping | |||
2476 | 8116457 | Methods, apparatuses, and products for a secure circuit | |||
2477 | 8116456 | Techniques for managing heterogeneous key stores | |||
2478 | 8116455 | System and method for securely initializing and booting a security appliance | |||
2479 | 8116452 | Content playback device | |||
2480 | 8116450 | System and method for utility sampling for trust metrics in pki | |||
2481 | 8116382 | System and method of data word flipping to prevent pathological conditions on high-speed serial video data interfaces | |||
2482 | 8116352 | Method for direct chaotic communications with predetermined spectral mask | |||
2483 | 8112818 | System for identifying content of digital data | |||
2484 | 8112811 | Information playing/reproducing apparatus and method | |||
2485 | 8112788 | Systems and methods of controlling network access | |||
2486 | 8112787 | System and method for securing a credential via user and server verification | |||
2487 | 8112629 | Stateless challenge-response protocol | |||
2488 | 8112628 | Using a portable computing device as a smart key device | |||
2489 | 8112626 | Method and apparatus to provide public key authentication with low complexity devices | |||
2490 | 8112484 | Apparatus and method for auxiliary classification for generating features for a spam filtering model | |||
2491 | 8111827 | Cryptographic processing apparatus and cryptographic processing method | |||
2492 | 8111826 | Apparatus for generating elliptic curve cryptographic parameter, apparatus for processing elliptic curve cryptograph, program for generating elliptic curve cryptographic parameter, and program for processing elliptic cyptograph | |||
2493 | 8111706 | Premises gateway device | |||
2494 | 8108928 | Adaptive traitor tracing | |||
2495 | 8108905 | System and method for an isolated process to control address translation | |||
2496 | 8108678 | Identity-based signcryption system | |||
2497 | 8108675 | External signature device for a PC with wireless communication capacity | |||
2498 | 8108668 | Associating a multi-context trusted platform module with distributed platforms | |||
2499 | 8107626 | Method and system for enabling transfer of content between a storage device and a portable media player device | |||
2500 | 8107623 | Method for verifying a first identity and a second identity of an entity | |||
2501 | 8103883 | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | |||
2502 | 8103004 | Method, apparatus and system for use in distributed and parallel decryption | |||
2503 | 8103003 | Method for setting communication parameters and communication device | |||
2504 | 8103002 | Pulse position based-chaotic modulation (PPB-CM) communication system and method | |||
2505 | 8103001 | Method for verifying rights contained in a security module | |||
2506 | 8099767 | Secure agent-less enterprise infrastructure discovery | |||
2507 | 8099762 | Secure digital content trading systems and methods | |||
2508 | 8099761 | Protocol for device to station association | |||
2509 | 8099759 | System and method for determining a security encoding to be applied to outgoing messages | |||
2510 | 8099599 | Controlling access to data streams | |||
2511 | 8099597 | Service authorization for distributed authentication and authorization servers | |||
2512 | 8098879 | Information processing device, image movement instructing method, and information storage medium | |||
2513 | 8098828 | Key distribution | |||
2514 | 8098826 | QKD system laser autocalibration based on bit-error rate | |||
2515 | 8098824 | Storage apparatus and data management method | |||
2516 | 8098823 | Multi-key cryptographically generated address | |||
2517 | 8098820 | Conditional access system for broadcast digital television | |||
2518 | 8098819 | Method, system and securing means for data archiving with automatic encryption and decryption by fragmentation of keys | |||
2519 | 8098818 | Secure registration for a multicast-broadcast-multimedia system (MBMS) | |||
2520 | 8095989 | Associating first and second watermarks with audio or video content | |||
2521 | 8095971 | Universal serial bus (USB) flash drive having locking pins and locking grooves for locking swivel cap | |||
2522 | 8095796 | Content identifiers | |||
2523 | 8095790 | Information processing apparatus and method, and computer program | |||
2524 | 8095785 | Authentication of entitlement authorization in conditional access systems | |||
2525 | 8095126 | User-assisted programmable appliance control | |||
2526 | 8094825 | Integrity protection of streamed content | |||
2527 | 8094822 | Broadcast encryption key distribution system | |||
2528 | 8094821 | Key generation in a communication system | |||
2529 | 8094817 | Cryptographic key management in communication networks | |||
2530 | 8094816 | System and method for stream/block cipher with internal random states | |||
2531 | 8094815 | Arithmetic method and apparatus for supporting AES and ARIA encryption/decryption functions | |||
2532 | 8094814 | Method and apparatus for using counter-mode encryption to protect image data in frame buffer of a video compression system | |||
2533 | 8094813 | System and method for modulus obfuscation | |||
2534 | 8091116 | Communication system and method | |||
2535 | 8090945 | Systems and methods for multi-factor remote user authentication | |||
2536 | 8090920 | Recording medium, and information processing device and information processing method for the recording medium | |||
2537 | 8090787 | Aggregation system for email and non-email messages | |||
2538 | 8090552 | Sensor fusion using self evaluating process sensors | |||
2539 | 8090108 | Secure debug interface and memory of a media security circuit and method | |||
2540 | 8090107 | Key agreement and re-keying over a bidirectional communication path | |||
2541 | 8090106 | Multi-level data encryption and decryption system and method thereof | |||
2542 | 8090105 | Broadcast encryption with dual tree sizes | |||
2543 | 8090101 | Method and system for generating a secret key from joint randomness | |||
2544 | 8090100 | Storage apparatus and data management method for changing keys of a logical volume and common resource | |||
2545 | 8090099 | Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field | |||
2546 | 8090098 | Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher | |||
2011 | |||||
2547 | 8086870 | Methods and apparatus for hardware normalization and denormalization | |||
2548 | 8086868 | Data communication method and system | |||
2549 | 8086867 | Secure identity and privilege system | |||
2550 | 8086866 | Methods and apparatus for efficient computation of one-way chains in cryptographic applications | |||
2551 | 8086864 | Low power HMAC encryption apparatus | |||
2552 | 8086861 | Information processing terminal and status notification method | |||
2553 | 8086856 | Disabling on/off capacity on demand | |||
2554 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
2555 | 8086852 | Providing a trusted platform module in a hypervisor environment | |||
2556 | 8086851 | Methods for broadcasting and receiving a scrambled multimedia programme, network head, terminal, receiver and security processor for these methods | |||
2557 | 8086850 | Secure group communication among wireless devices with distributed trust | |||
2558 | 8086849 | Secure internet-scale eventing | |||
2559 | 8086844 | Online trusted platform module | |||
2560 | 8086537 | Distribution system of contents embedding license machine ID | |||
2561 | 8085938 | Secret information management scheme based on secret sharing scheme | |||
2562 | 8085936 | Method and system for content management in a secure communication system | |||
2563 | 8085934 | Reverse cryptographic key expansion | |||
2564 | 8085933 | Cipher for disk encryption | |||
2565 | 8085932 | Secure distribution of data or content using keyless transformation | |||
2566 | 8082451 | Data access control | |||
2567 | 8082448 | System and method for user authentication using non-language words | |||
2568 | 8081757 | Blind watermarking of audio signals by using phase modifications | |||
2569 | 8081755 | JPEG2000 syntax-compliant encryption with full scalability | |||
2570 | 8081754 | Key update method and apparatus thereof | |||
2571 | 8079067 | Streaming content in guest mode | |||
2572 | 8079062 | Method and system using presence information to manage network access | |||
2573 | 8078874 | Method and apparatus for transmitting data using authentication | |||
2574 | 8078872 | Method, system and device for determining a mobile IP key, notifying a mobile IP type | |||
2575 | 8078869 | System and method of protecting data on a communication device | |||
2576 | 8077871 | Content processing apparatus and encryption processing method | |||
2577 | 8077870 | Cryptographic key split binder for use with tagged data elements | |||
2578 | 8077869 | Organic keyed encryption | |||
2579 | 8077868 | Mechanism for transport-safe codings for cryptographic use | |||
2580 | 8077867 | Confidential information processing apparatus, confidential information processing device, and confidential information processing method | |||
2581 | 8077866 | Protecting against security attack | |||
2582 | 8077865 | Electronic device, content reproduction control method, program, storage medium, and integrated circuit | |||
2583 | 8077863 | Secret sharing apparatus, method, and program | |||
2584 | 8077862 | Sharing a secret using polynomials | |||
2585 | 8074264 | Secure key distribution to internet clients | |||
2586 | 8074263 | Systems and methods for increased security during logging in to web site | |||
2587 | 8074258 | Obtaining digital identities or tokens through independent endpoint resolution | |||
2588 | 8074068 | Secret sharing device, method, and program | |||
2589 | 8073336 | Entanglement-based QKD system with active phase tracking | |||
2590 | 8073143 | Information processing device and method | |||
2591 | 8073142 | Information recording/reproducing device and information recording medium | |||
2592 | 8073141 | Execution unit for performing the data encryption standard | |||
2593 | 8073140 | Encryption/decryption device, encryption/decryption method, and computer program | |||
2594 | 8073139 | Method of compressing a cryptographic value | |||
2595 | 8069489 | Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof | |||
2596 | 8069468 | Controlling access to information over a multiband network | |||
2597 | 8069467 | Privacy protection through restrictions on usernames and other online identifiers | |||
2598 | 8069116 | System and method for supplying and managing usage rights associated with an item repository | |||
2599 | 8068613 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
2600 | 8068611 | Method of playing broadcast program contents using encryption and decryption techniques | |||
2601 | 8068610 | Method and system for providing security within multiple set-top boxes assigned for a single customer | |||
2602 | 8068609 | Method and system for secured wireless data transmission to and from a remote device | |||
2603 | 8068606 | Embedding a secret in a bit string for safeguarding the secret | |||
2604 | 8065735 | Method of securing a calculation of an exponentiation or a multiplication by a scalar in an electronic device | |||
2605 | 8065728 | Malware prevention system monitoring kernel events | |||
2606 | 8065695 | Systems and methods for increased security during logging in to web site | |||
2607 | 8065533 | Reliable storage medium access control method and device | |||
2608 | 8065523 | External storage apparatus and method of preventing information leakage | |||
2609 | 8065522 | Method and system for virtualization of trusted platform modules | |||
2610 | 8065518 | Fast authentication and access control system for mobile networking | |||
2611 | 8064606 | Method and apparatus for securely registering hardware and/or software components in a computer system | |||
2612 | 8064605 | Methods and apparatus for providing upgradeable key bindings for trusted platform modules | |||
2613 | 8064604 | Method and apparatus for facilitating role-based cryptographic key management for a database | |||
2614 | 8064601 | Security in wireless communication systems | |||
2615 | 8064599 | Secure message transport using message segmentation | |||
2616 | 8064596 | Stream control device, stream encryption/decryption device, and stream encryption/decryption method | |||
2617 | 8062380 | Distribution channel loss protection for electronic devices | |||
2618 | 8060923 | Trusted license removal in a content protection system or the like | |||
2619 | 8060917 | System and method for hosting multiple kerberos service principal names | |||
2620 | 8060914 | Anonymous selectable credential system and method therefor | |||
2621 | 8060913 | Policy execution | |||
2622 | 8060902 | System for receiving broadcast digital data comprising a master digital terminal, and at least one slave digital terminal | |||
2623 | 8060757 | Decryption and encryption during write accesses to a memory | |||
2624 | 8060755 | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine | |||
2625 | 8059820 | Multi-factor content protection | |||
2626 | 8059818 | Accessing protected data on network storage from multiple devices | |||
2627 | 8059817 | Method and apparatus for encrypted communications using IPsec keys | |||
2628 | 8059816 | Secret sharing technique with low overhead information content | |||
2629 | 8059814 | Techniques for carrying out seed or key derivation | |||
2630 | 8056121 | Virtual universe account protection | |||
2631 | 8055895 | Data path security processing | |||
2632 | 8054978 | Key management for content protection | |||
2633 | 8054975 | Method and system for managing key of home device in broadcast encryption (BE) system | |||
2634 | 8054971 | Free-hand mobile messaging-method and device | |||
2635 | 8054967 | Computer system and computer program executing encryption or decryption | |||
2636 | 8051472 | Method and apparatus for personalization and identity management | |||
2637 | 8051460 | Systems and methods of controlling network access | |||
2638 | 8051300 | System and method for reducing latency on remotely-booted information handling systems | |||
2639 | 8051296 | System and method for initializing secure communications with lightweight devices | |||
2640 | 8051294 | Methods for audio watermarking and decoding | |||
2641 | 8051288 | Data validation using signatures and sampling | |||
2642 | 8051286 | Vehicle antitheft system | |||
2643 | 8051284 | Encryption communications system | |||
2644 | 8051151 | System and method for communicating with a network node behind a subscriber station with an IP convergence sub-layer | |||
2645 | 8050411 | Method of managing one-time pad data and device implementing this method | |||
2646 | 8050408 | Techniques for managing keys using a key server in a network segment | |||
2647 | 8050407 | Method and system for protecting keys | |||
2648 | 8050406 | Key table and authorization table management | |||
2649 | 8050405 | Shared key encryption using long keypads | |||
2650 | 8050404 | Bandwidth efficient method and system for obscuring the existence of encryption in a communications channel | |||
2651 | 8046582 | Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus | |||
2652 | 8045715 | Method of handling security key change and related communication device | |||
2653 | 8045714 | Systems and methods for managing multiple keys for file encryption and decryption | |||
2654 | 8045713 | Cryptographic key update management method and apparatus | |||
2655 | 8045712 | Stream ciphering of the content of a memory external to a processor | |||
2656 | 8045711 | System and method for comparison of private values | |||
2657 | 8045708 | Discrete key generation method and apparatus | |||
2658 | 8045707 | System and method for securing data | |||
2659 | 8045706 | System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources | |||
2660 | 8045705 | Simultaneous scalar multiplication method | |||
2661 | 8042192 | Information processing apparatus, information processing method, recording medium, and program | |||
2662 | 8042190 | Pre-boot protected memory channel | |||
2663 | 8042170 | Bearer control of encrypted data flows in packet data communications | |||
2664 | 8042147 | Network security appliance | |||
2665 | 8042033 | Protection of access information in wireless communications | |||
2666 | 8041950 | Random signal generator | |||
2667 | 8041948 | Application level gateway for request verification | |||
2668 | 8041943 | Revocation list improvement | |||
2669 | 8041941 | Method and apparatus for compression of data on storage units using devices inside a storage area network fabric | |||
2670 | 8041037 | Cryptographic system and methods using a one way multidimensional function | |||
2671 | 8041036 | Method and apparatus for preventing the interception of data being transmitted to a web site by a monitoring program | |||
2672 | 8041030 | Techniques for evaluating live payment terminals in a payment system | |||
2673 | 8037542 | Team based row level security system and method | |||
2674 | 8037534 | Strategies for ensuring that executable content conforms to predetermined patterns of behavior ("inverse virus checking") | |||
2675 | 8037531 | Dynamic network security system and control method thereof | |||
2676 | 8037530 | Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor | |||
2677 | 8037491 | Data transmitting method, data transmitting system, data receiving method and receiving terminal | |||
2678 | 8037321 | Method and apparatus for the secure storage of audio signals | |||
2679 | 8037314 | Replacing blinded authentication authority | |||
2680 | 8037306 | Method for realizing network access authentication | |||
2681 | 8037304 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
2682 | 8037302 | Method and system for ensuring secure forwarding of messages | |||
2683 | 8037301 | Setting an encryption key | |||
2684 | 8037298 | System and method for providing security via a top level domain | |||
2685 | 8037297 | Network and node for providing a secure transmission of mobile application part messages | |||
2686 | 8037294 | Authentication of products using identification tags | |||
2687 | 8036637 | Billing in a packet data network | |||
2688 | 8036388 | Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium | |||
2689 | 8036380 | Efficient data integrity protection | |||
2690 | 8036379 | Cryptographic processing | |||
2691 | 8036377 | Method and apparatus of high speed encryption and decryption | |||
2692 | 8036250 | Method and apparatus of mutliplexing media streams | |||
2693 | 8032942 | Configuration of virtual trusted platform module | |||
2694 | 8032921 | Computer-readable recording medium storing access rights management program, access rights management apparatus, and access rights management method | |||
2695 | 8032759 | Verifying signatures for multiple encodings | |||
2696 | 8032758 | Content authentication and recovery using digital watermarks | |||
2697 | 8032750 | Method for establishing a secure e-mail communication channel between a sender and a recipient | |||
2698 | 8032748 | System for allocating a chip card to a network operator | |||
2699 | 8032747 | Comparison of documents possessed by two parties | |||
2700 | 8031875 | Key distribution in unidirectional channels with applications to RFID | |||
2701 | 8031869 | Information recording medium, usage management method, and usage management apparatus | |||
2702 | 8031867 | Method of verifying the integrity of an encryption key obtained by combining key parts | |||
2703 | 8031865 | Multiple level security system and method for encrypting data within documents | |||
2704 | 8031239 | Image sensing apparatus for generating image data authentication data of the image data | |||
2705 | 8028340 | Piracy prevention using unique module translation | |||
2706 | 8028330 | System, apparatus, and program for biometric authentication | |||
2707 | 8028324 | Method for transmitting policy information between network equipment | |||
2708 | 8027926 | Secure and recoverable database for on-line value-bearing item system | |||
2709 | 8027475 | Methods and media for recovering lost encryption keys | |||
2710 | 8024810 | Method and apparatus for protecting digital data by double re-encryption | |||
2711 | 8024783 | Modular agent architecture | |||
2712 | 8024770 | Techniques for managing security contexts | |||
2713 | 8024583 | Confidential information processing host device and confidential information processing method | |||
2714 | 8024581 | Computer readable storage medium for generating a pseudonym, computer implemented method and computing device | |||
2715 | 8024578 | Systems and methods for online identity verification | |||
2716 | 8024566 | Persistent storage implementations for session data within a multi-tiered enterprise network | |||
2717 | 8024565 | Authorizing information flows | |||
2718 | 8024558 | Method and system for providing synchronous running encoding and encryption | |||
2719 | 8023656 | Automated key management system and method | |||
2720 | 8023655 | System, method, and service for tracing traitors from content protection circumvention devices | |||
2721 | 8023650 | Information processing apparatus, setup method and non-transitory computer-readable recording medium on which setup program is recorded | |||
2722 | 8023647 | Password self encryption method and system and encryption by keys generated from personal secret information | |||
2723 | 8023645 | Circuit arrangement for and method of performing an inversion operation in a cryptographic calculation | |||
2724 | 8023644 | Multimode block cipher architectures | |||
2725 | 8023417 | Failover mechanisms in RDMA operations | |||
2726 | 8020196 | Secure transmission and exchange of standardized data | |||
2727 | 8020007 | System and method for obtaining identities | |||
2728 | 8019991 | System and method for secure provisioning of a mobile station from a provisioning server using IP address translation at the BTS/BSC | |||
2729 | 8019080 | Method and apparatus for providing content service | |||
2730 | 8019079 | Asymmetric cryptosystem employing paraunitary matrices | |||
2731 | 8015615 | Determining advertising activity | |||
2732 | 8015607 | Messaging stamp authority | |||
2733 | 8015413 | Secure indirect addressing | |||
2734 | 8015406 | Method to create an OSI network layer 3 virtual private network (VPN) using an HTTP/S tunnel | |||
2735 | 8015403 | Method and system indicating a level of security for VoIP calls through presence | |||
2736 | 8015401 | Authentication of data transmitted in a digital transmission system | |||
2737 | 8015400 | Certificate management and transfer system and method | |||
2738 | 8015399 | Communication apparatus, communication system, certificate transmission method and program | |||
2739 | 8015211 | Secure peer-to-peer object storage system | |||
2740 | 8014528 | Method for accessing a user operable device of controlled access | |||
2741 | 8014527 | Apparatus and method for reusing pair of public and private keys | |||
2742 | 8014523 | Key management | |||
2743 | 8014522 | Optical storage media and the corresponding cryptography for data encryption thereof | |||
2744 | 8014236 | Optical disk, an optical disk barcode forming method, an optical disk reproduction apparatus, a marking forming apparatus, a method of forming a laser marking on an optical disk, and a method of manufacturing an optical disk | |||
2745 | 8011002 | Forcing a mobile browser to access web content through a proxy | |||
2746 | 8010999 | Cable installation support and management system | |||
2747 | 8010998 | Techniques for limiting remote control of a computer system | |||
2748 | 8010810 | Techniques for protecting data using an electronic encryption endpoint device | |||
2749 | 8010805 | Secure porting of information from one device to another | |||
2750 | 8010804 | Method to protect secrets against encrypted section attack | |||
2751 | 8010802 | Cryptographic device having session memory bus | |||
2752 | 8010801 | Multi-data rate security architecture for network security | |||
2753 | 8010794 | Method for securing a transmission, associated system and mediation platform | |||
2754 | 8010790 | Block-level storage device with content security | |||
2755 | 8010787 | Communication device, communication log transmitting method suitable for communication device, and communication system | |||
2756 | 8010782 | Method and system for mediated secure computation | |||
2757 | 8010781 | Method and system to accelerate cryptographic functions for secure E-commerce applications | |||
2758 | 8010779 | Techniques for secure network searching | |||
2759 | 8009833 | Data communication apparatus, control method therefor, and program for implementing the method | |||
2760 | 8009831 | Method and system for hiding the decryption key in a dispersive way | |||
2761 | 8009830 | Secure data parser method and system | |||
2762 | 8009829 | Method and system for deploying advanced cryptographic algorithms | |||
2763 | 8009828 | Integrated shuffle validity proving device, proof integrating device, integrated shuffle validity verifying device, and mix net system | |||
2764 | 8009826 | Cryptoanalysis method and system | |||
2765 | 8006314 | System for identifying content of digital data | |||
2766 | 8006103 | TPM device for multi-processor systems | |||
2767 | 8006102 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
2768 | 8006101 | Radio transceiver or other encryption device having secure tamper-detection module | |||
2769 | 8006091 | Method and apparatus to provide failover capability of cached secure sessions | |||
2770 | 8006090 | System and method for combining user and platform authentication in negotiated channel security protocols | |||
2771 | 8006085 | License management system and method | |||
2772 | 8005226 | Information sending system, information sending device, information receiving device, information distribution system, information receiving system, information sending method, information receiving method, information distribution method, apparatus, sending method of information receiving device, playback method of apparatus, method of using contents and program storing medium | |||
2773 | 8005222 | Radio communication system, radio communication device, radio communication method, and computer program | |||
2774 | 8005221 | Chaotic spread spectrum communications system receiver | |||
2775 | 8005220 | RF communication system having a chaotic signal generator and method for generating chaotic signal | |||
2776 | 8005219 | Data decryption apparatus and data encryption apparatus | |||
2777 | 8005215 | Table shuffle cipher system | |||
2778 | 8005214 | Data transmission system | |||
2779 | 8005210 | Modulus scaling for elliptic-curve cryptography | |||
2780 | 8005209 | Invariance based concurrent error detection for the advanced encryption standard | |||
2781 | 8001608 | Secure streaming container | |||
2782 | 8001388 | Software self-checking systems and methods | |||
2783 | 8001386 | Cooperative non-repudiated message exchange in a network environment | |||
2784 | 8001380 | System and method for providing unique encryption key | |||
2785 | 8001379 | Credential generation system and method for communications devices and device management servers | |||
2786 | 8001377 | Methods and apparatus for secure data processing and transmission | |||
2787 | 8001376 | Fixed client identification system for positive identification of client to server | |||
2788 | 8001370 | Encrypted communication for selectively delivering a message to multiple decrypting devices | |||
2789 | 8001053 | System and method for rights offering and granting using shared state variables | |||
2790 | 8000477 | Data security system and method for high bandwidth bus | |||
2791 | 8000474 | Client-side protection of broadcast or multicast content for non-real-time playback | |||
2792 | 8000473 | Method and apparatus for generating cryptographic sets of instructions automatically and code generator | |||
2793 | 8000472 | Information encryption apparatus and controlling method of the same, computer program and computer readable storage medium | |||
2794 | 8000471 | Robust cipher design | |||
2795 | 8000469 | Authentication engine architecture and method | |||
2796 | 8000468 | Method and system for secure data aggregation in wireless sensor networks | |||
2797 | 7996861 | Flexible interface for secure input of pin code | |||
2798 | 7996684 | Apparatus and method for a programmable security processor | |||
2799 | 7996678 | Embedding and detection of watermark in a motion image signal | |||
2800 | 7996676 | Masked digital signatures | |||
2801 | 7996673 | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |||
2802 | 7996672 | Support for multiple digital rights management systems for same content | |||
2803 | 7996669 | Computer platforms and their methods of operation | |||
2804 | 7996668 | Distributed system and computer program product for establishing security in a publish/subscribe data processing broker network | |||
2805 | 7995765 | Sharing a secret using hyperplanes over GF(q) | |||
2806 | 7995764 | Sharing a secret using hyperplanes over GF(2.sup.m) | |||
2807 | 7995761 | Data providing system, data receiving system, computer-readable recording medium storing data providing program, and computer-readable recording medium storing data receiving program | |||
2808 | 7995758 | Family of encryption keys | |||
2809 | 7995753 | Parallel cipher operations using a single data pass | |||
2810 | 7995752 | Method for accelerating cryptographic operations on elliptic curves | |||
2811 | 7995751 | Method and apparatus for encrypting data in a wireless communication system | |||
2812 | 7995749 | Cryptographic system configured for extending a repetition period of a random sequence | |||
2813 | 7995748 | Method and apparatus for providing ecryption/decryption using two sequences of numbers | |||
2814 | 7992215 | Annotation system for creating and retrieving media and methods relating to same | |||
2815 | 7992211 | Method and device for authorising conditional access | |||
2816 | 7992193 | Method and apparatus to secure AAA protocol messages | |||
2817 | 7991999 | Block-based media content authentication | |||
2818 | 7991993 | Telecommunication system, for example an IP telecommunication system, and equipment units for use in the system | |||
2819 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
2820 | 7991161 | System and method for automatic security authentication in wireless networks | |||
2821 | 7991158 | Secure messaging | |||
2822 | 7991157 | Methods and systems responsive to features sensed from imagery or other data | |||
2823 | 7991154 | Exponentiation method using multibase number representation | |||
2824 | 7991151 | Method for secure delegation of calculation of a bilinear application | |||
2825 | 7987496 | Automatic application of information protection policies | |||
2826 | 7987495 | System and method for multi-context policy management | |||
2827 | 7987367 | Method and apparatus for key agreement between devices using polynomial ring | |||
2828 | 7986787 | System, method, and service for tracing traitors from content protection circumvention devices | |||
2829 | 7986786 | Methods and systems for utilizing cryptographic functions of a cryptographic co-processor | |||
2830 | 7986785 | Data management | |||
2831 | 7986781 | Method for controlling access to encrypted data | |||
2832 | 7986779 | Efficient elliptic-curve cryptography based on primality of the order of the ECC-group | |||
2833 | 7986439 | Resource entity using resource request entity for verification | |||
2834 | 7984509 | Systems and methods for secure transaction management and electronic rights protection | |||
2835 | 7984502 | Pattern discovery in a network system | |||
2836 | 7984496 | Systems and methods for secure communication over a wireless network | |||
2837 | 7984489 | Device registration system and device registration apparatus | |||
2838 | 7984303 | Flash memory devices with security features | |||
2839 | 7984302 | Electronic document management apparatus, electronic document management method, and computer program | |||
2840 | 7984301 | Bi-processor architecture for secure systems | |||
2841 | 7984289 | Methods and systems for establishing an electronic account for a customer | |||
2842 | 7983421 | Methods to defend against tampering of audit records | |||
2843 | 7983415 | Method for performing iterative scalar multiplication which is protected against address bit attack | |||
2844 | 7979906 | Method and system for multifaceted scanning | |||
2845 | 7979890 | System and method for handling per subscriber application and bearer authorization in a communications environment | |||
2846 | 7979889 | Methods and apparatus providing security to computer systems and networks | |||
2847 | 7979722 | Flash memory distribution of digital content | |||
2848 | 7979719 | Data authentication method and data authentication system | |||
2849 | 7979718 | Operator recognition device, operator recognition method and operator recognition program | |||
2850 | 7979714 | Authentication and access control device | |||
2851 | 7979709 | Information processing apparatus, information recording medium, apparatus and method of manufacturing information recording medium, and computer program | |||
2852 | 7979698 | Apparatus and method for proving authenticity with personal characteristics | |||
2853 | 7979691 | Computer virus protection | |||
2854 | 7978858 | Terminal device, group management server, network communication system, and method for generating encryption key | |||
2855 | 7978857 | Secure device having key management function and information processing apparatus | |||
2856 | 7978856 | Methods of managing a key cache | |||
2857 | 7978854 | Asymmetric key generation | |||
2858 | 7978850 | Manufacturing embedded unique keys using a built in random number generator | |||
2859 | 7978849 | Image forming apparatus, and control method thereof | |||
2860 | 7978848 | Content encryption schema for integrating digital rights management with encrypted multicast | |||
2861 | 7978847 | System using data compression and hashing adapted for use for multimedia encryption | |||
2862 | 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | |||
2863 | 7975290 | Verifying authenticity of instant messaging messages | |||
2864 | 7975145 | Apparatus and program for update of time stamp | |||
2865 | 7975141 | Method of sharing bus key and apparatus therefor | |||
2866 | 7974937 | Adaptive embedded historians with aggregator component | |||
2867 | 7974540 | Communication system and communication method using the same | |||
2868 | 7974413 | Spread spectrum communications system and method utilizing chaotic sequence | |||
2869 | 7974410 | Cryptographic key split combiner | |||
2870 | 7974409 | Changing the order of public key cryptographic computations | |||
2871 | 7974408 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
2872 | 7974405 | Method and device for calculating a function from a large number of inputs | |||
2873 | 7971262 | Protecting against software piracy | |||
2874 | 7971228 | System and method for providing application-specific on-line charging in a communications environment | |||
2875 | 7971072 | Secure exchange of IP cores | |||
2876 | 7971066 | Transaction device with noise signal encryption | |||
2877 | 7971064 | Distributed Rivest Shamir Adleman signature method and signature generation node | |||
2878 | 7971059 | Secure channel for image transmission | |||
2879 | 7971058 | System and method for generating a plaintext / cyphertext database for use in device authentication | |||
2880 | 7971055 | Trust management systems and methods | |||
2881 | 7970707 | Shared royalty platform for content royalty management | |||
2882 | 7970143 | System, method and apparatus to obtain a key for encryption/decryption/data recovery from an enterprise cryptography key management system | |||
2883 | 7970142 | System, method and apparatus for decrypting data stored on removable media | |||
2884 | 7970141 | Method and apparatus for tracing the source of decryption keys used by a decoder | |||
2885 | 7970135 | Method for the secure, distributed generation of an encryption key | |||
2886 | 7970134 | Method for generating, operating, and using a sparse w-NAF key for encryption | |||
2887 | 7970132 | Reduced hierarchy key management system and method | |||
2888 | 7970131 | Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method | |||
2889 | 7970130 | Low-latency method and apparatus of GHASH operation for authenticated encryption Galois Counter Mode | |||
2890 | 7970129 | Selection of a lookup table with data masked with a combination of an additive and multiplicative mask | |||
2891 | 7970128 | Systems and methods for efficient generation of hash values of varying bit widths | |||
2892 | 7970127 | User equipment identification specific scrambling | |||
2893 | 7970013 | Systems and methods for wireless network content filtering | |||
2894 | 7966653 | Method and data processing system for determining user specific usage of a network | |||
2895 | 7966652 | Mashauth: using mashssl for efficient delegated authentication | |||
2896 | 7966645 | Application-aware policy enforcement | |||
2897 | 7966497 | System and method for acoustic two factor authentication | |||
2898 | 7966494 | Visual content-based internet search methods and sub-combinations | |||
2899 | 7965836 | Data cipher processors | |||
2900 | 7962965 | Semiconductor device having power consumption analysis preventing function | |||
2901 | 7962761 | Computer implemented method for generating a pseudonym, computer readable storage medium and computer system | |||
2902 | 7962757 | Secure coordinate identification method, system and program | |||
2903 | 7962753 | Method and a circuit for SHA operation with power saved | |||
2904 | 7962740 | Method and apparatus for synchronizing audio and video in encrypted videoconferences | |||
2905 | 7962417 | System and method for distributing protected information | |||
2906 | 7961886 | Wireless perimeter security device and network using same | |||
2907 | 7961885 | Encrypted JTAG interface | |||
2908 | 7961884 | Method and system for changing security information in a computer network | |||
2909 | 7961879 | Identity-based-encryption system with hidden public key attributes | |||
2910 | 7961877 | Factoring based modular exponentiation | |||
2911 | 7961876 | Method to produce new multivariate public key cryptosystems | |||
2912 | 7961875 | Means and method for ciphering and transmitting data in integrated networks | |||
2913 | 7961874 | XZ-elliptic curve cryptography with secret key embedding | |||
2914 | 7961873 | Password protocols using XZ-elliptic curve cryptography | |||
2915 | 7961614 | Information processing device, information processing method, and recording medium for reducing consumption of memory capacity | |||
2916 | 7958548 | Method for provision of access | |||
2917 | 7958542 | Methods and devices for counting user equipment units in a mobile radio telecommunication network | |||
2918 | 7958541 | Method, system and apparatus for preventing media access control address counterfeiting | |||
2919 | 7958523 | Method and system for protecting cable television subscriber-specific information allowing limited subset access | |||
2920 | 7958377 | Secure access system and method | |||
2921 | 7958366 | Information processing system | |||
2922 | 7958363 | Toolbar signature | |||
2923 | 7958357 | Network invitation arrangement and method | |||
2924 | 7958356 | System and method for establishing a shared secret among nodes of a security appliance | |||
2925 | 7958354 | High-order knowledge sharing system to distribute secret data | |||
2926 | 7958353 | Information security device | |||
2927 | 7958352 | Method and system for verifying and updating the configuration of an access device during authentication | |||
2928 | 7958351 | Method and apparatus for multi-level security implementation | |||
2929 | 7958350 | Proactive forced renewal of content protection implementations | |||
2930 | 7958349 | Method for revoking a digital signature | |||
2931 | 7957977 | Media program identification method and apparatus based on audio watermarking | |||
2932 | 7957532 | Data protection for a mobile device | |||
2933 | 7957531 | Method and apparatus for detection of loss of cipher synchronization | |||
2934 | 7957526 | Confidential information implementation system and LSI | |||
2935 | 7957525 | Encryption and signature schemes using message mappings to reduce the message size | |||
2936 | 7954163 | Method and apparatus for providing network security using role-based access control | |||
2937 | 7954139 | Arrangements for efficient authentication of service request messages | |||
2938 | 7954136 | Self-management network access using localized access management | |||
2939 | 7953227 | Method for securely and automatically configuring access points | |||
2940 | 7953226 | Apparatus and method for determining uplink ciphering activation time in universal mobile telecommunications system user equipment | |||
2941 | 7953225 | Mobile wireless communications device with software installation and verification features and related methods | |||
2942 | 7953224 | MPEG-4 encryption enabling transcoding without decryption | |||
2943 | 7953222 | Method and apparatus for partially encrypting speech packets | |||
2944 | 7953221 | Method for processing multiple operations | |||
2945 | 7950053 | Firewall system and firewall control method | |||
2946 | 7950051 | Password management for a communication network | |||
2947 | 7950044 | Centrally managed proxy-based security for legacy automation systems | |||
2948 | 7949878 | Telecommunication-assisted time stamp | |||
2949 | 7949875 | Message authentication | |||
2950 | 7949872 | Battery and authentication requesting device | |||
2951 | 7949870 | Method and apparatus for downloading information content to a wireless terminal | |||
2952 | 7949869 | Establishing relative identity | |||
2953 | 7949867 | Secure communications | |||
2954 | 7949135 | Key distribution in systems for selective access to information | |||
2955 | 7949134 | Multiplexed multilane hybrid scrambled transmission coding | |||
2956 | 7949131 | Digital security system | |||
2957 | 7949128 | Method and device for the encryption and decryption of data | |||
2958 | 7949032 | Methods and apparatus for masking and securing communications transmissions | |||
2959 | 7945959 | Secure physical distribution of a security token through a mobile telephony provider's infrastructure | |||
2960 | 7945945 | System and method for address block enhanced dynamic network policy management | |||
2961 | 7945943 | Retrieving an access token via a coded surface | |||
2962 | 7945790 | Low-cost pseudo-random nonce value generation system and method | |||
2963 | 7945782 | Method and apparatus for digitally signing electronic mail that originates from a browser | |||
2964 | 7945779 | Securing a communications exchange between computers | |||
2965 | 7945774 | Efficient security for mashups | |||
2966 | 7945517 | Data distribution system and recording device for use therein | |||
2967 | 7945052 | Method of distributing a decryption key in fixed-content data | |||
2968 | 7945051 | Method for setting up radio bearer in mobile communication system | |||
2969 | 7945050 | Suppressing power supply noise using data scrambling in double data rate memory systems | |||
2970 | 7945049 | Stream cipher using multiplication over a finite field of even characteristic | |||
2971 | 7945048 | Method, system and computer product for securing patient identity | |||
2972 | 7945047 | Cryptographic key distribution system and method for digital video systems | |||
2973 | 7945045 | Device and method for generating chaotic signal | |||
2974 | 7941864 | Audio-video output apparatus, authentication processing method, and audio-video processing system | |||
2975 | 7941841 | Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies | |||
2976 | 7941834 | Secure web-based user authentication | |||
2977 | 7941826 | Enforcing access control on multicast transmissions | |||
2978 | 7941666 | Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks | |||
2979 | 7941661 | Method of testing validity of authentication IC | |||
2980 | 7940932 | Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor | |||
2981 | 7940928 | Systems and methods for protecting data secrecy and integrity | |||
2982 | 7937762 | Tracking and identifying operations from un-trusted clients | |||
2983 | 7937596 | Adaptable microcontroller based security monitor | |||
2984 | 7937594 | Apparatus and method for a programmable security processor | |||
2985 | 7937589 | Computer grid access management system | |||
2986 | 7937588 | Techniques for detecting, analyzing, and using visible authentication patterns | |||
2987 | 7937587 | Communication terminal apparatus and information communication method | |||
2988 | 7937586 | Defending against denial of service attacks | |||
2989 | 7937583 | Method of aggregating multiple certificate authority services | |||
2990 | 7937581 | Method and network for ensuring secure forwarding of messages | |||
2991 | 7937579 | System, method and apparatus for electronically protecting data and digital content | |||
2992 | 7937427 | Digital generation of a chaotic numerical sequence | |||
2993 | 7936881 | Method and system for transmitting signaling information over a data transport network | |||
2994 | 7936878 | Secure wireless instrumentation network system | |||
2995 | 7936875 | Protection of a digital quantity contained in an integrated circuit comprising a JTAG interface | |||
2996 | 7936871 | Altering the size of windows in public key cryptographic computations | |||
2997 | 7934640 | Method, system, and computer program product for implementing pin-based data transfer activities | |||
2998 | 7934091 | Digital asset usage accountability via event journaling | |||
2999 | 7934088 | Method of secure communication between endpoints | |||
3000 | 7933414 | Secure data distribution | |||
3001 | 7933413 | Key exchange verification | |||
3002 | 7933410 | System and method for a variable key ladder | |||
3003 | 7933409 | Content playback device | |||
3004 | 7933408 | Asynchronous download | |||
3005 | 7933405 | Data access and permute unit | |||
3006 | 7930755 | System and method for ensuring security of data stored on electronic computing devices | |||
3007 | 7930742 | Multiple-level data processing system | |||
3008 | 7930550 | Content addressable information encapsulation, representation and transfer | |||
3009 | 7930549 | Accelerated signature verification on an elliptic curve | |||
3010 | 7930546 | Methods, systems, and sub-combinations useful in media identification | |||
3011 | 7930545 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
3012 | 7930542 | MashSSL: a novel multi party authentication and key exchange mechanism based on SSL | |||
3013 | 7930541 | E-mail communication apparatus | |||
3014 | 7930426 | Method for tracking transmission status of data to entities such as peers in a network | |||
3015 | 7929706 | Encryption key restoring method, information processing apparatus, and encryption key restoring program | |||
3016 | 7929704 | Modified triple wrap encryption/decryption system | |||
3017 | 7929703 | Methods and system for managing security keys within a wireless network | |||
3018 | 7929702 | System and method for generating reproducible session keys | |||
3019 | 7929701 | Multiple level public key hierarchy for performance and high security | |||
3020 | 7929697 | Secure data transmission via multichannel entitlement management and control | |||
3021 | 7929694 | Variable length private key generator and method thereof | |||
3022 | 7929693 | Key generating method and key generating apparatus | |||
3023 | 7929692 | Firmware encrypting and decrypting method and an apparatus using the same | |||
3024 | 7929689 | Call signs | |||
3025 | 7929688 | Parameter generation apparatus, encryption system, decryption system, encryption apparatus, decryption apparatus, encryption method, decryption method, and program thereof | |||
3026 | 7929549 | Method and apparatus for scrambling data for control of high-speed bidirectional signaling | |||
3027 | 7926100 | Method for preventing unauthorized connection in network system | |||
3028 | 7925885 | Method for recording and reading a code of material products for protection and control of their authenticity, and a system therefor | |||
3029 | 7925884 | Fraud detection in seals | |||
3030 | 7925883 | Attack resistant phishing detection | |||
3031 | 7925881 | Method and apparatus for preventing rogue implementations of a security-sensitive class interface | |||
3032 | 7925592 | System and method of using a proxy server to manage lazy content distribution in a social network | |||
3033 | 7925027 | Secure address proxying using multi-key cryptographically generated addresses | |||
3034 | 7925025 | Method for broadcast encryption and key revocation of stateless receivers | |||
3035 | 7925021 | Efficient handling of messages, data and keys in media access layers for network communications | |||
3036 | 7925014 | Random number generating, encrypting, and decrypting apparatus, method thereof, program thereof, and recording medium thereof | |||
3037 | 7925013 | System for data encryption and decryption of digital data entering and leaving memory | |||
3038 | 7925012 | Method and system for the secure distribution of compressed digital texts | |||
3039 | 7925011 | Method for simultaneous modular exponentiations | |||
3040 | 7925010 | Message deciphering method, system and article | |||
3041 | 7921455 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions | |||
3042 | 7921452 | Defining consistent access control policies | |||
3043 | 7921296 | Generating and matching hashes of multimedia content | |||
3044 | 7921295 | Service mobility management system using XML security and the method thereof | |||
3045 | 7921294 | Verification of encryption key | |||
3046 | 7921293 | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment | |||
3047 | 7921290 | Method and system for securely authenticating network access credentials for users | |||
3048 | 7921283 | Method for real-time data authentication | |||
3049 | 7921282 | Using SYN-ACK cookies within a TCP/IP protocol | |||
3050 | 7920706 | Method and system for managing cryptographic keys | |||
3051 | 7920704 | Systems and methods for obtaining information on a key in BB84 protocol of quantum key distribution | |||
3052 | 7920699 | Encryption operating apparatus | |||
3053 | 7917957 | Method and system for counting new destination addresses | |||
3054 | 7917947 | Secured communication channel between IT administrators using network management software as the basis to manage networks | |||
3055 | 7917946 | Method and network for securely delivering streaming data | |||
3056 | 7917769 | Transaction authentication card | |||
3057 | 7917766 | Stegotext encoder and decoder | |||
3058 | 7917764 | Signature generation device and signature verification device | |||
3059 | 7917763 | Device and method for detecting a manipulation of an information signal | |||
3060 | 7917760 | Tamper resistant module having separate control of issuance and content delivery | |||
3061 | 7917757 | Method and system for authentication of electronic communications | |||
3062 | 7917753 | Transferring control between programs of different security levels | |||
3063 | 7917752 | Method of controlling the processing of data | |||
3064 | 7917751 | Distributed filesystem network security extension | |||
3065 | 7917746 | Authentication of data transmitted in a digital transmission system | |||
3066 | 7917439 | System, method, and computer program product for video based services and commerce | |||
3067 | 7917253 | Method for making vehicle-related data available to an authorized third party | |||
3068 | 7916870 | Systems and methods for document control using public key encryption | |||
3069 | 7916867 | Content receiving apparatus | |||
3070 | 7916865 | Dynamically shifting control word | |||
3071 | 7916863 | Security printing method and system for enhancing security printing | |||
3072 | 7916862 | Stegotext encoder and decoder | |||
3073 | 7913293 | Method and communication unit for communicating between communication apparatuses | |||
3074 | 7913095 | Method and apparatus for providing a specific user interface in a system for managing content | |||
3075 | 7913090 | Authentication systems and authentication method | |||
3076 | 7913088 | Digital signature and authentication method and apparatus | |||
3077 | 7913078 | Computer network virus protection system and method | |||
3078 | 7913074 | Securely launching encrypted operating systems | |||
3079 | 7912952 | Content utilization management method corresponding to network transfer, program, and content transfer system | |||
3080 | 7912886 | Configurable exponent FIFO | |||
3081 | 7912223 | Method and apparatus for data protection | |||
3082 | 7912218 | Method of broadcasting multimedia content via distribution network | |||
3083 | 7912216 | Elliptic curve cryptosystem optimization using two phase key generation | |||
3084 | 7912214 | Method and system for generating and controlling the distribution and use of personal promotion codes by targeted customers | |||
3085 | 7912213 | Device, system and method for fast secure message encryption without key distribution | |||
3086 | 7912212 | Symmetric cryptosystem using cascaded chaotic maps | |||
3087 | 7908647 | Aggregation system | |||
3088 | 7908644 | Adaptive multi-tier authentication system | |||
3089 | 7908641 | Modular exponentiation with randomized exponent | |||
3090 | 7908491 | Method and device for controlling access to encrypted data | |||
3091 | 7908489 | Method for managing external storage devices | |||
3092 | 7908483 | Method and apparatus for binding TPM keys to execution entities | |||
3093 | 7908482 | Key confirmed authenticated key exchange with derived ephemeral keys | |||
3094 | 7908477 | System and method for enabling device dependent rights protection | |||
3095 | 7908475 | Method and apparatus for transferring a communicaton session | |||
3096 | 7908474 | Method for improved key management for ATMs and other remote devices | |||
3097 | 7908217 | Method and system for optimizing throughput of mailing machines | |||
3098 | 7907735 | System and method of creating and sending broadcast and multicast data | |||
3099 | 7907734 | Key distribution control apparatus, radio base station apparatus, and communication system | |||
3100 | 7907733 | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station | |||
3101 | 7907725 | Simple universal hash for plaintext aware encryption | |||
3102 | 7907724 | Method and apparatus for protecting an RSA calculation on an output by means of the chinese remainder theorem | |||
3103 | 7907723 | Device, system and method for fast secure message encryption without key distribution | |||
3104 | 7907722 | Protection against power analysis attacks | |||
3105 | 7904964 | Method and system for selectively controlling access to protected media on a media storage device | |||
3106 | 7904960 | Source/destination operating system type-based IDS virtualization | |||
3107 | 7904952 | System and method for access control | |||
3108 | 7904951 | Techniques for securely accelerating external domains locally | |||
3109 | 7904949 | Apparatus, systems and methods to provide authentication services to a legacy application | |||
3110 | 7904944 | Image forming apparatus, control method, and computer-readable storage medium therefor | |||
3111 | 7904929 | Log entries | |||
3112 | 7904727 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
3113 | 7904724 | Translation device, translation method, and storage medium | |||
3114 | 7904722 | Method for securely using digital signatures in a commercial cryptographic system | |||
3115 | 7904720 | System and method for providing secure resource management | |||
3116 | 7904718 | Personal digital key differentiation for secure transactions | |||
3117 | 7904717 | Method, apparatus, and manufacture for decryption of network traffic in a secure session | |||
3118 | 7903822 | Method and system for establishing a trusted and decentralized peer-to-peer network | |||
3119 | 7903819 | Memory efficient storage of large numbers of key value pairs | |||
3120 | 7903818 | Random access method for improving scrambling efficiency | |||
3121 | 7903815 | Method of identifying multiple digital streams within a multiplexed signal | |||
3122 | 7903814 | Enhancing the security of public key cryptosystem implementations | |||
3123 | 7903813 | Stream cipher encryption application accelerator and methods thereof | |||
3124 | 7903812 | Detection and handling of encryption key and initialization vector | |||
3125 | 7900265 | Method and/or system to authorize access to stored data | |||
3126 | 7900262 | Security management method and apparatus, and security management program | |||
3127 | 7900252 | Method and apparatus for managing shared passwords on a multi-user computer | |||
3128 | 7900244 | Login system and login method | |||
3129 | 7900240 | Multilayer access control security system | |||
3130 | 7900211 | Method and apparatus for data transfer across a network | |||
3131 | 7900062 | Unauthorized contents detection system | |||
3132 | 7900048 | Method for loading an application in a device, device and smart card therefor | |||
3133 | 7900046 | System and method for establishing mutual trust on a per-deployment basis between two software modules | |||
3134 | 7900044 | Enterprise computer investigation system | |||
3135 | 7900039 | TLS session management method in SUPL-based positioning system | |||
3136 | 7900032 | Method and system for NAND flash support in autonomously loaded secure reprogrammable system | |||
3137 | 7899475 | Enhanced short message service (SMS) | |||
3138 | 7899187 | Domain-based digital-rights management system with easy and secure device enrollment | |||
3139 | 7899186 | Key recovery in encrypting storage devices | |||
3140 | 7899185 | Real privacy management authentication system | |||
3141 | 7899184 | Ends-messaging protocol that recovers and has backward security | |||
3142 | 7898383 | System and method for detecting security violation | |||
3143 | 7895661 | Method and system for secure network-based distribution of content | |||
3144 | 7895643 | Secure logic interlocking | |||
3145 | 7895444 | Method and apparatus for preventing illegal access using prohibit key in electronic device | |||
3146 | 7895443 | Secure authentication using hardware token and computer fingerprint | |||
3147 | 7895438 | Method and apparatus for generating and verifying digital signature | |||
3148 | 7895432 | Method and apparatus for using a third party authentication server | |||
3149 | 7895424 | System for automated boot from disk image | |||
3150 | 7894608 | Secure approach to send data from one system to another | |||
3151 | 7894605 | Systems and methods to securely generate shared keys | |||
3152 | 7894604 | Quantum cryptographic communication apparatus | |||
3153 | 7894602 | System and method for generating pseudo-random numbers | |||
3154 | 7894601 | Method for key diversification on an IC card | |||
3155 | 7894600 | Encrypting apparatus and encrypting method | |||
3156 | 7890993 | Secret file access authorization system with fingerprint limitation | |||
3157 | 7890767 | Virtual smart card system and method | |||
3158 | 7890762 | Differentiated proxy digital signatures | |||
3159 | 7890761 | Systems and methods for strong authentication of electronic transactions | |||
3160 | 7890759 | Connection assistance apparatus and gateway apparatus | |||
3161 | 7890758 | Apparatus and method for generating keys in a network computing environment | |||
3162 | 7890756 | Verification system and method for accessing resources in a computing environment | |||
3163 | 7890751 | Method and system for increasing data access in a secure socket layer network environment | |||
3164 | 7889867 | Method for relocating SRNS in a mobile communication system | |||
3165 | 7889862 | Key update mechanism | |||
3166 | 7889861 | Multiple sequential security key encryption-decryption | |||
3167 | 7886364 | Encrypted key cache | |||
3168 | 7886362 | Media authentication via physical attributes of a medium | |||
3169 | 7886360 | Security device for data carriers | |||
3170 | 7886356 | Removing malicious code in media | |||
3171 | 7886354 | Method and apparatus for local area networks | |||
3172 | 7886342 | Distributed environment controlled access facility | |||
3173 | 7886337 | Method and apparatus for content protection | |||
3174 | 7886336 | Method of initiating a security procedure within a building | |||
3175 | 7886160 | Information processing apparatus and method, and computer program | |||
3176 | 7886159 | Data providing system and apparatus and methods of same | |||
3177 | 7886157 | Hand geometry recognition biometrics on a fob | |||
3178 | 7886153 | Communication device and communication system | |||
3179 | 7886150 | System debug and trace system and method, and applications thereof | |||
3180 | 7886143 | Multi-data rate cryptography architecture for network security | |||
3181 | 7886142 | Apparatus and method for scrambling a packet data channel and a packet data control channel in a mobile communication system for high-speed packet transmission | |||
3182 | 7885899 | System and method for secure network purchasing | |||
3183 | 7885411 | Key agreement and re-keying over a bidirectional communication path | |||
3184 | 7885406 | Computing endomorphism rings of Abelian surfaces over finite fields | |||
3185 | 7885404 | Cryptographic systems and methods supporting multiple modes | |||
3186 | 7882564 | Information recording/playback apparatus and method | |||
3187 | 7882545 | Secure wireless network | |||
3188 | 7882541 | Authentication system in information processing terminal using mobile information processing device | |||
3189 | 7882365 | Systems and methods for distinguishing between actual data and erased/blank memory with regard to encrypted data | |||
3190 | 7882361 | Method and system for accepting a pass code | |||
3191 | 7882357 | System and method of retrieving a watermark within a signal | |||
3192 | 7882355 | Encryption/decryption methods and devices utilizing the same | |||
3193 | 7882348 | System and method for administering digital certificate checking | |||
3194 | 7882346 | Method and apparatus for providing authentication, authorization and accounting to roaming nodes | |||
3195 | 7881476 | Delivering enhanced multimedia content on physical media | |||
3196 | 7881474 | System and method for secure wireless multi-hop network formation | |||
3197 | 7881473 | Quantum key distribution system and method | |||
3198 | 7881472 | Quantum key distribution method and communication apparatus | |||
3199 | 7881470 | Network mobility security management | |||
3200 | 7877799 | Performance of a service on a computing platform | |||
3201 | 7877793 | Repositing for digital content access control | |||
3202 | 7877791 | System, method and program for authentication and access control | |||
3203 | 7877790 | System and method of using personal data | |||
3204 | 7877784 | Verifying authenticity of webpages | |||
3205 | 7877782 | Method and apparatus for configuration management of computer system | |||
3206 | 7877610 | Hybrid signature scheme | |||
3207 | 7877609 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
3208 | 7877603 | Configuring a storage drive to communicate with encryption and key managers | |||
3209 | 7877595 | Modular cryptographic device and related methods | |||
3210 | 7877594 | Method and system for securing e-mail transmissions | |||
3211 | 7877492 | System and method for delegating a user authentication process for a networked application to an authentication agent | |||
3212 | 7877329 | Apparatus and method for processing license keys using dynamic field mapping | |||
3213 | 7876902 | Distribution of encrypted software update to reduce attack window | |||
3214 | 7876901 | Alternative design for quantum cryptographic entangling probe | |||
3215 | 7876897 | Data security in wireless network system | |||
3216 | 7876894 | Method and system to provide security implementation for storage devices | |||
3217 | 7873837 | Data security for electronic data flash card | |||
3218 | 7873832 | Mechanism for secure participation in a transaction by a third party | |||
3219 | 7873168 | Secret information management apparatus and secret information management system | |||
3220 | 7873167 | System and method for effectively pre-distributing key for distributed sensor network | |||
3221 | 7873166 | Method for undetectably impeding key strength of encryption usage for products exported outside the U.S | |||
3222 | 7873163 | Method and apparatus for message integrity in a CDMA communication system | |||
3223 | 7870598 | Policy specification framework for insider intrusions | |||
3224 | 7870597 | Method and apparatus for managing digital identities through a single interface | |||
3225 | 7870394 | Method and system to scan firmware for malware | |||
3226 | 7870393 | Steganographic method and device | |||
3227 | 7870390 | Data watermarks created by using an uneven sampling period | |||
3228 | 7870389 | Methods and apparatus for authenticating mobility entities using kerberos | |||
3229 | 7870381 | Schema-based portal architecture for assessment and integration of silicon IPs | |||
3230 | 7869605 | Method for generating group key | |||
3231 | 7869604 | System for an encryption key path diagnostic | |||
3232 | 7869603 | Encryption key path diagnostic | |||
3233 | 7869602 | User-based digital rights management | |||
3234 | 7869600 | Optical transmitter and transmitting method for transmitting cryptogram | |||
3235 | 7869599 | Quantum cryptography key distributing system and synchronizing method used in the same | |||
3236 | 7869598 | System and method for comparison of private values | |||
3237 | 7869595 | Content copying device and content copying method | |||
3238 | 7869591 | System and method for secure three-party communications | |||
3239 | 7869590 | Method and system for hardware accelerator for implementing f9 integrity algorithm in WCDMA compliant handsets | |||
3240 | 7865957 | Apparatus and methods for updating mobile device virus pattern data | |||
3241 | 7865955 | Apparatus and method for extracting signature candidates of attacking packets | |||
3242 | 7865950 | System of assigning permissions to a user by password | |||
3243 | 7865935 | Electronic apparatus having security function | |||
3244 | 7865731 | Securing access to an application service based on a proximity token | |||
3245 | 7865730 | Bcencryption (BCE)--a public-key based method to encrypt a data stream | |||
3246 | 7865728 | Biometric encryption and decryption | |||
3247 | 7865727 | Authentication for devices located in cable networks | |||
3248 | 7865720 | System and method for supporting multiple certificate status providers on a mobile communication device | |||
3249 | 7865719 | Method for establishing the authenticity of the identity of a service user and device for carrying out the method | |||
3250 | 7865715 | Increasing peer privacy | |||
3251 | 7865436 | Using visual images transferred from wireless computing device display screens | |||
3252 | 7865193 | Communication apparatus capable of performing a load balancing and method thereof | |||
3253 | 7865166 | Software radio transceiver | |||
3254 | 7864961 | Method of managing a mobile multicast key using a foreign group key | |||
3255 | 7864960 | Techniques for securing content in an untrusted environment | |||
3256 | 7864959 | Methods and apparatus for multi-level dynamic security system | |||
3257 | 7864955 | Print system, control method therefor, information processing apparatus, control method therefor, program for implementing the control method, and storage medium storing the control program | |||
3258 | 7864954 | Method and system for encryption and authentication | |||
3259 | 7864953 | Adding an additional level of indirection to title key encryption | |||
3260 | 7864952 | Data processing systems with format-preserving encryption and decryption engines | |||
3261 | 7864951 | Scalar multiplication method with inherent countermeasures | |||
3262 | 7864688 | Communication system, method of providing information therein and communication device | |||
2010 | |||||
3263 | 7861292 | Method and apparatus for incrementally deploying ingress filtering on the Internet | |||
3264 | 7861283 | User position utilization system | |||
3265 | 7861282 | Information processing apparatus, printing apparatus and printing system including thereof apparatuses | |||
3266 | 7861090 | Electric conference system and control method thereof | |||
3267 | 7861084 | Authentication of data transmitted in a digital transmission system | |||
3268 | 7861076 | Using authentication server accounting to create a common security database | |||
3269 | 7861075 | Atomic session-start operation combining clear-text and encrypted sessions to provide ID visibility to middleware such as load-balancers | |||
3270 | 7861006 | Apparatus, method and system for a tunneling client access point | |||
3271 | 7860254 | Computer system security via dynamic encryption | |||
3272 | 7860253 | Wireless perimeter security device and network using same | |||
3273 | 7860248 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
3274 | 7860247 | Identity based encryption | |||
3275 | 7860246 | System and method for protecting data in a secure system | |||
3276 | 7860245 | Methods and systems for multi-party sorting of private values | |||
3277 | 7860244 | Secure computation of private values | |||
3278 | 7860241 | Simple universal hash for plaintext aware encryption | |||
3279 | 7859725 | System and method for monitoring unauthorized dissemination of documents and portable media | |||
3280 | 7856664 | Method, system and computer program for a secure backup license server in a license management system | |||
3281 | 7856553 | System and method for platform activation | |||
3282 | 7856404 | Playlist burning in rights-management context | |||
3283 | 7856103 | Microcontroller and authentication method between the controllers | |||
3284 | 7856101 | Method for elliptic curve scalar multiplication | |||
3285 | 7856100 | Privacy-preserving data aggregation using homomorphic encryption | |||
3286 | 7856099 | Secure data transmission between two modules | |||
3287 | 7854010 | Method and apparatus for searching rights object and mapping method and mapping apparatus for the same | |||
3288 | 7854004 | Computer immune system and method for detecting unwanted code in a computer system | |||
3289 | 7853805 | Anti-tamper system | |||
3290 | 7853802 | Information processing system, method, and apparatus, and program | |||
3291 | 7853797 | Information processing method and information processing apparatus | |||
3292 | 7853785 | System and method for implementing digital certificate revocation in an ad-hoc network | |||
3293 | 7853784 | Filtering and application triggering platform | |||
3294 | 7853016 | Signature schemes using bilinear mappings | |||
3295 | 7853012 | Authentication system executing an elliptic curve digital signature cryptographic process | |||
3296 | 7853011 | Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission | |||
3297 | 7853010 | Testing of an algorithm executed by an integrated circuit | |||
3298 | 7849500 | System and method for wireless local area network monitoring and intrusion detection | |||
3299 | 7849495 | Method and apparatus for passing security configuration information between a client and a security policy server | |||
3300 | 7849319 | Method and device for incorporating additional information into main information through electronic watermarking technique | |||
3301 | 7849318 | Method for session security | |||
3302 | 7849317 | Method for mail address block image information encoding, protection and recovery in postal payment applications | |||
3303 | 7849316 | Methods and apparatus for secure document printing | |||
3304 | 7849314 | Method and system for secure authentication in a wireless network | |||
3305 | 7849312 | Method and system for secure external TPM password generation and use | |||
3306 | 7849307 | System and method for establishing historical usage-based hardware trust | |||
3307 | 7849304 | System and method for on-line diagnostics | |||
3308 | 7848746 | Authentication methods and apparatus utilizing hash chains | |||
3309 | 7848526 | Method of receiving session key in home network and method of reproducing content using the same | |||
3310 | 7848525 | Hybrid broadcast encryption method | |||
3311 | 7848524 | Systems and methods for a secure recording environment | |||
3312 | 7848518 | Stable disc controller ID from unstable comparator outputs | |||
3313 | 7848516 | Diffused symmetric encryption/decryption method with asymmetric keys | |||
3314 | 7848514 | Table masking for resistance to power analysis attacks | |||
3315 | 7848513 | Method for transmitting security context for handover in portable internet system | |||
3316 | 7844998 | Apparatus and method for autonomic email access control | |||
3317 | 7844835 | Systems and methods for secure transaction management and electronic rights protection | |||
3318 | 7844834 | Method and system for protecting data, related communication network and computer program product | |||
3319 | 7844831 | Secure memory device for smart cards | |||
3320 | 7844822 | Temporally threaded CMI watermark | |||
3321 | 7844814 | Methods and apparatus for protecting against IP address assignments based on a false MAC address | |||
3322 | 7840814 | Method for managing an executable code downloaded in a reprogrammable on-board system | |||
3323 | 7840811 | Network system and communication methods for securely bootstraping mobile IPv6 mobile node using pre-shared key | |||
3324 | 7840809 | Method and system for secure transmission of an encrypted media stream across a network | |||
3325 | 7840807 | Authentication of computing device through employment of determination that current location of authentication device matches initial location | |||
3326 | 7840805 | Method of and apparatus for providing secure communication of digital data between devices | |||
3327 | 7840799 | Transmission of secure electronic mail formats | |||
3328 | 7840011 | Method and apparatus for distributed management of files | |||
3329 | 7840008 | Method and apparatus for decrypting a communication | |||
3330 | 7840004 | Split-key key-agreement protocol | |||
3331 | 7840003 | High-speed GCM-AES block cipher apparatus and method | |||
3332 | 7840000 | High performance programmable cryptography system | |||
3333 | 7839999 | Encryption device, encryption processing method and program, and information protection system employing the encryption device | |||
3334 | 7836507 | Contents transmitter apparatus, contents receiver apparatus and contents transmitting method | |||
3335 | 7836498 | Device to protect victim sites during denial of service attacks | |||
3336 | 7836485 | System and method for enrolling in a biometric system | |||
3337 | 7836482 | Information management system | |||
3338 | 7836310 | Security system that uses indirect password-based encryption | |||
3339 | 7836304 | Digital signature generation apparatus, digital signature verification apparatus, and key generation apparatus | |||
3340 | 7836303 | Web browser operating system | |||
3341 | 7836300 | Security integrated circuit | |||
3342 | 7835725 | Wireless communication system, terminal, processing method for use in the terminal, and program for allowing the terminal to execute the method | |||
3343 | 7835528 | Method and apparatus for refreshing keys within a bootstrapping architecture | |||
3344 | 7835523 | Cryptographic engine abstraction layer for a software defined radio | |||
3345 | 7835519 | Mini time key creation memory medium and system | |||
3346 | 7832008 | Protection of computer resources | |||
3347 | 7831996 | Authentication techniques | |||
3348 | 7831834 | Associating a postmark with a message to indicate trust | |||
3349 | 7831833 | System and method for key recovery | |||
3350 | 7831830 | Methods and apparatus for secure document printing | |||
3351 | 7831826 | Method and system for distributing security policies | |||
3352 | 7831824 | Hallmarking verification process and system and corresponding method of and system for communication | |||
3353 | 7831822 | Real-time stateful packet inspection method and apparatus | |||
3354 | 7831048 | Secure quantum key distribution using entangled photons | |||
3355 | 7831045 | Security module revocation method used for securing broadcasted messages | |||
3356 | 7831043 | System and method for cryptographically authenticating data items | |||
3357 | 7831041 | Image forming apparatus and image forming system | |||
3358 | 7831040 | DES hardware throughput for short operations | |||
3359 | 7831039 | AES encryption circuitry with CCM | |||
3360 | 7827598 | Grouped access control list actions | |||
3361 | 7827411 | Method, system, and end user device for identifying a sender in a network | |||
3362 | 7827404 | Secure sockets layer proxy architecture | |||
3363 | 7827403 | Method and apparatus for encrypting and decrypting data in a database table | |||
3364 | 7827223 | Accelerated throughput synchronized word stream cipher, message authenticator and zero-knowledge output random number generator | |||
3365 | 7827113 | Method and system for providing a content subscription service | |||
3366 | 7826619 | Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device | |||
3367 | 7826618 | Synchronization of encryption in a wireless communication system | |||
3368 | 7826614 | Methods and apparatus for passing initialization vector information from software to hardware to perform IPsec encryption operation | |||
3369 | 7826612 | System, method and apparatus for an incremental modular process including modular multiplication and modular eduction | |||
3370 | 7823193 | Method and system for ordering, loading and using admission tickets | |||
3371 | 7823189 | System and method for dynamic role association | |||
3372 | 7822979 | Method and apparatus for secure execution using a secure memory partition | |||
3373 | 7822976 | Network data security system and protecting method thereof | |||
3374 | 7822975 | Authentication of data transmitted in a digital transmission system | |||
3375 | 7822969 | Watermark systems and methods | |||
3376 | 7822686 | Processing system for recording media content | |||
3377 | 7822208 | Process for creating and managing at least one cryptographic key, and system for its implementation | |||
3378 | 7822207 | Key protection mechanism | |||
3379 | 7822205 | Multiple matching control method | |||
3380 | 7822204 | Encryption method, cryptogram decoding method, encryptor, cryptogram decoder, transmission/reception system, and communication system | |||
3381 | 7822203 | Method, apparatus, and program for processing information | |||
3382 | 7822200 | Method and system for asymmetric key security | |||
3383 | 7822199 | Method and device for performing a cryptographic operation | |||
3384 | 7822198 | Parallel encryptor and decryptor | |||
3385 | 7822197 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
3386 | 7818807 | System and method of logical prefetching for optimizing file scanning operations | |||
3387 | 7818802 | Refining behavioral detections for early blocking of malicious code | |||
3388 | 7818796 | Bridged cryptographic VLAN | |||
3389 | 7818788 | Web application security frame | |||
3390 | 7818781 | Behavior blocking access control | |||
3391 | 7818583 | Personal authentication apparatus | |||
3392 | 7818576 | User controlled anonymity when evaluating into a role | |||
3393 | 7818260 | System and method of managing digital rights | |||
3394 | 7818259 | Prepaid licensing system and method | |||
3395 | 7818256 | Digital receipt for electronic data and methods and systems for generating same | |||
3396 | 7817800 | Cryptographic key split binder for use with tagged data elements | |||
3397 | 7817799 | Maintaining encryption key integrity | |||
3398 | 7814552 | Method and apparatus for an encryption system | |||
3399 | 7814547 | Stateful and cross-protocol intrusion detection for voice over IP | |||
3400 | 7814533 | Secure customer interface for Web based data management | |||
3401 | 7814531 | Detection of network environment for network access control | |||
3402 | 7814337 | Secure flash-memory card reader with host-encrypted data on a flash-controller-mastered bus parallel to a local CPU bus carrying encrypted hashed password and user ID | |||
3403 | 7814332 | Voiceprint biometrics on a payment device | |||
3404 | 7814329 | MACSec implementation | |||
3405 | 7814326 | Signature schemes using bilinear mappings | |||
3406 | 7814325 | System, method and computer readable medium for certifying release of electronic information on an internet | |||
3407 | 7814312 | Moving principals across security boundaries without service interruption | |||
3408 | 7814308 | Debugging applications under different permissions | |||
3409 | 7813509 | Key distribution method | |||
3410 | 7813507 | Method and system for creating random cryptographic keys in hardware | |||
3411 | 7813503 | Method and system for generation of cryptographic keys for use in cryptographic systems | |||
3412 | 7810142 | Auditing compliance with a hippocratic database | |||
3413 | 7810138 | Enabling dynamic authentication with different protocols on the same port for a switch | |||
3414 | 7810135 | Apparatus for adopting authorizations | |||
3415 | 7810133 | Encrypting operating system | |||
3416 | 7810113 | Security device and head end in conditional access system and method for controlling illegal use in the system | |||
3417 | 7809951 | System and method for automated border-crossing checks | |||
3418 | 7809945 | Examination apparatus, communication system, examination method, computer-executable program product, and computer-readable recording medium | |||
3419 | 7809940 | Remote certificate management | |||
3420 | 7809647 | Processing system for recording media content | |||
3421 | 7809269 | Systems and methods for multiplexing QKD channels | |||
3422 | 7809143 | QKD system with synchronization channel verification | |||
3423 | 7809142 | Data scrambling and encryption of database tables | |||
3424 | 7809141 | Ciphering by blocks of the content of a memory external to a processor | |||
3425 | 7809140 | Authentication of data transmitted in a digital transmission system | |||
3426 | 7809136 | Enhanced ANSI X9.17 and FIPS 186 pseudorandom number generators with forward security | |||
3427 | 7809135 | System and method for protecting computer software from a white box attack | |||
3428 | 7809134 | Method for encrypting information and device for realization of the method | |||
3429 | 7809132 | Implementations of AES algorithm for reducing hardware with improved efficiency | |||
3430 | 7808906 | Systems and methods for communicating a lossy protocol via a lossless protocol using false acknowledgements | |||
3431 | 7805762 | Method and system for reducing the false alarm rate of network intrusion detection systems | |||
3432 | 7805614 | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) | |||
3433 | 7805611 | Method for secure communication from chip card and system for performing the same | |||
3434 | 7804962 | Modeling a sensor network design to secure a network against attack | |||
3435 | 7804961 | Method and apparatus for fast crytographic key generation | |||
3436 | 7804960 | Hardware-based encryption/decryption employing dual ported key storage | |||
3437 | 7802106 | Method and system for guaranteeing the integrity of at least one software program which is transmitted to an encryption/decryption module and recording media for implementing same | |||
3438 | 7802101 | System and method of retrieving a watermark within a signal | |||
3439 | 7802100 | Watermark system | |||
3440 | 7802098 | Cryptography method and smart cards microcircuit | |||
3441 | 7802094 | Reduction of false positive detection of signature matches in intrusion detection systems | |||
3442 | 7802093 | Methods and systems for proofing identities using a certificate authority | |||
3443 | 7801310 | Nestable skeleton decryption keys for digital rights management | |||
3444 | 7801309 | Private key delivery system and a private key delivery method | |||
3445 | 7801307 | Method of symmetric key data encryption | |||
3446 | 7801305 | Secure device for the broadcasting, recording and viewing on demand of audiovisual works in a format of the MPEG-2 TS type | |||
3447 | 7801302 | Cryptographic method and apparatus | |||
3448 | 7801301 | Method and circuit for data encryption/decryption | |||
3449 | 7801300 | Data transmitter and data receiver | |||
3450 | 7797743 | File conversion in restricted process | |||
3451 | 7797742 | File blocking mitigation | |||
3452 | 7797740 | System and method for managing captured content | |||
3453 | 7797728 | Mechanism to generate restricted and unrestricted execution environments | |||
3454 | 7797547 | Information processing apparatus and method of controlling authentication process | |||
3455 | 7797545 | System and method for registering entities for code signing services | |||
3456 | 7797537 | Mobile terminal, data communication method, and computer program | |||
3457 | 7797536 | Cryptographic device with stored key data and method for using stored key data to perform an authentication exchange or self test | |||
3458 | 7797532 | Device authentication system | |||
3459 | 7797246 | Distributed system for issuing official stamps and/or titles applying dedicated smart cards | |||
3460 | 7796763 | Method and system for disaster recovery of data from a storage device | |||
3461 | 7796762 | Communication system, common key control apparatus, and general communication apparatus | |||
3462 | 7796761 | Distribution and authentication of public keys using random numbers and diffie-hellman public keys | |||
3463 | 7796760 | Approach for managing access to messages using encryption key management policies | |||
3464 | 7796759 | Diversification of a single integrated circuit identifier | |||
3465 | 7796752 | Cipher implementation | |||
3466 | 7793353 | Identification card manufacturing security | |||
3467 | 7793351 | Copy deterrent for an audiovisual product | |||
3468 | 7793350 | Apparatus, system, and method for simulated access to restricted computing resources | |||
3469 | 7793336 | Method and apparatus for communicating credential information within a network device authentication conversation | |||
3470 | 7793333 | Mobile authorization using policy based access control | |||
3471 | 7793106 | Method and system for certifying the authority of a signer of an electronic document | |||
3472 | 7793101 | Verifiable virtualized storage port assignments for virtual machines | |||
3473 | 7793100 | Reference monitor for enforcing information flow policies | |||
3474 | 7792303 | Method of delivering direct proof private keys to devices using a distribution CD | |||
3475 | 7792302 | Securely coupling an FPGA to a security IC | |||
3476 | 7792301 | Access control and encryption in multi-user systems | |||
3477 | 7792300 | Method and apparatus for re-encrypting data in a transaction-based secure storage system | |||
3478 | 7792290 | Gathering randomness in a wireless smart card reader | |||
3479 | 7792289 | Encrypted communications | |||
3480 | 7792286 | Signature generation device and signature verification device | |||
3481 | 7792285 | Method and system for securely exchanging encryption key determination information | |||
3482 | 7788716 | Token handler API | |||
3483 | 7788698 | Pre-negotiation and pre-caching media policy | |||
3484 | 7788501 | Methods for secure backup of personal identity credentials into electronic devices | |||
3485 | 7788498 | Triple-tap password entry | |||
3486 | 7788496 | First computer process and second computer process proxy-executing code on behalf thereof | |||
3487 | 7788490 | Methods for authenticating an identity of an article in electrical communication with a verifier system | |||
3488 | 7788482 | System and method for securing on-line documents using authentication codes | |||
3489 | 7788182 | Method for loaning digital works | |||
3490 | 7788168 | Method, system, and apparatus for dynamically creating electronic contracts | |||
3491 | 7787653 | Methods for controlling rendering of images and video | |||
3492 | 7787628 | Double phase encoding quantum key distribution | |||
3493 | 7787627 | Methods and apparatus for providing a key management system for wireless communication networks | |||
3494 | 7787625 | QKD cascaded network with loop-back capability | |||
3495 | 7787621 | Secure transmission using adaptive transformation and plural channels | |||
3496 | 7787619 | Method and apparatus for secure key management using multi-threshold secret sharing | |||
3497 | 7784106 | Manufacturing unique devices that generate digital signatures | |||
3498 | 7784100 | System and method for home network content protection and copy management | |||
3499 | 7784089 | System and method for providing a multi-credential authentication protocol | |||
3500 | 7783900 | Querying encrypted data in a relational database system | |||
3501 | 7783897 | Programmable logic device | |||
3502 | 7783889 | Methods and apparatus for generating signatures | |||
3503 | 7783888 | Watermarking in an audiovisual product | |||
3504 | 7783883 | System and method for validating e-mail messages | |||
3505 | 7783045 | Secure approach to send data from one system to another | |||
3506 | 7783044 | System for on-line and off-line decryption | |||
3507 | 7783042 | Communication system and synchronization method thereof | |||
3508 | 7783040 | Encryption in a secure computerized gaming system | |||
3509 | 7783039 | Digital recording device, digital reproduction device, digital recording/reproduction device, encryption device, decryption device, encryption method, and decryption method | |||
3510 | 7783035 | Systems and methods for implementing host-based security in a computer network | |||
3511 | 7779459 | Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device | |||
3512 | 7779452 | Computer access security | |||
3513 | 7779272 | Hardware cryptographic engine and encryption method | |||
3514 | 7779258 | Method for controlling security function execution with a flexible, extendable, and non-forgable block | |||
3515 | 7779255 | Multi-level security systems | |||
3516 | 7779253 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |||
3517 | 7779249 | Secure transmission of digital content between a host and a peripheral by way of a digital rights management (DRM) system | |||
3518 | 7779248 | Moving principals across security boundaries without service interruption | |||
3519 | 7778932 | Device-based access privilege to an account | |||
3520 | 7778422 | Security associations for devices | |||
3521 | 7778421 | Method for controlling access to encrypted content using multiple broadcast encryption based control blocks | |||
3522 | 7778415 | Substitution cipher text-encoding and un-encoding software and method | |||
3523 | 7778414 | Encryption method based on factorization | |||
3524 | 7778413 | Cryptographic system and method for encrypting input data | |||
3525 | 7778412 | Method and apparatus for performing elliptic curve arithmetic | |||
3526 | 7774845 | Computer security system | |||
3527 | 7774824 | Multifactor device authentication | |||
3528 | 7774612 | Method and system for single signon for multiple remote sites of a computer network | |||
3529 | 7774609 | Process for digital signing of a message | |||
3530 | 7774608 | Author signatures for legal purposes | |||
3531 | 7774607 | Fast RSA signature verification | |||
3532 | 7774603 | Wireless device registration | |||
3533 | 7774602 | Secure modem gateway concentrator | |||
3534 | 7774594 | Method and system for providing strong security in insecure networks | |||
3535 | 7774593 | Encrypted packet, processing device, method, program, and program recording medium | |||
3536 | 7774283 | Method and system for using a camera cell phone in transactions | |||
3537 | 7774279 | Rights offering and granting | |||
3538 | 7773784 | Revocable biometrics with robust distance metrics | |||
3539 | 7773754 | Key management system and method | |||
3540 | 7773753 | Efficient remotely-keyed symmetric cryptography for digital rights management | |||
3541 | 7773751 | Apparatus and method for controlling the copy and play of a digital audio contents | |||
3542 | 7773746 | Encryption system, encryption device, decryption device, program, and integrated circuit | |||
3543 | 7770225 | Method and apparatus for auditing network security | |||
3544 | 7770207 | System, apparatus, program, and method for authentication | |||
3545 | 7770020 | Face image obtaining method and apparatus | |||
3546 | 7770015 | Signatures for multiple encodings | |||
3547 | 7770013 | Digital authentication with digital and analog documents | |||
3548 | 7770012 | System and computer program product for secure authentication using digital certificates | |||
3549 | 7770011 | Secure authentication using digital certificates with individual authentication data | |||
3550 | 7769998 | Method and apparatus to authenticate and authorize user access to a system | |||
3551 | 7769176 | Systems and methods for a secure recording environment | |||
3552 | 7769169 | Method and apparatus for generating a key stream | |||
3553 | 7769165 | Semi-public white-box cipher | |||
3554 | 7769164 | Printing apparatus | |||
3555 | 7765602 | Storage on-demand system, and method for processing data in the same | |||
3556 | 7765582 | Identity-based-encryption messaging system with public parameter host servers | |||
3557 | 7765581 | System and method for enabling scalable security in a virtual private network | |||
3558 | 7765580 | Method and apparatus for providing user authentication using a back channel | |||
3559 | 7765408 | Systems and methods for online identity verification | |||
3560 | 7765406 | System, computer program and method for a crytographic system using volatile allocation of a superkey | |||
3561 | 7765392 | Method and apparatus for establishing processor as core root of trust for measurement | |||
3562 | 7764795 | Key-exchange protocol using a password-derived prime | |||
3563 | 7764792 | System and method for encoding data transmitted on a bus | |||
3564 | 7764787 | System and method for authenticating software using protected master key | |||
3565 | 7764786 | Protection of a DES algorithm | |||
3566 | 7761918 | System and method for scanning a network | |||
3567 | 7761712 | Steganographic method and device | |||
3568 | 7761711 | Signature validation and generation | |||
3569 | 7761702 | Method and apparatus for distributing group data in a tunneled encrypted virtual private network | |||
3570 | 7761700 | Methods and arrangements for providing a mark-up language based graphical user interface for user identification to an operating system | |||
3571 | 7760884 | Cryptographic method and devices for facilitating calculations during transactions | |||
3572 | 7760881 | Data processing apparatus and data reception processing apparatus | |||
3573 | 7760875 | Accelerating Diffie-Hellman key-exchange protocol with zero-biased exponent windowing | |||
3574 | 7760872 | Public key cryptographic methods and systems | |||
3575 | 7757293 | Automated computer system security compromise | |||
3576 | 7757269 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
3577 | 7757101 | Data processing apparatus, data processing system, and data processing method therefor | |||
3578 | 7757100 | Protected volume on a data storage device with dual operating systems and configurable access and encryption controls | |||
3579 | 7757098 | Method and apparatus for verifying authenticity of initial boot code | |||
3580 | 7757091 | Method and apparatus for the creation of a self-authenticating document | |||
3581 | 7757090 | System for verifying of secure document | |||
3582 | 7757088 | Methods of accessing and using web-pages | |||
3583 | 7757087 | Information processing apparatus and information processing method | |||
3584 | 7757084 | Method of validating consumable authentication chip | |||
3585 | 7756793 | Content data supply system, content data supply apparatus and method, content data reproduction apparatus and method, and program | |||
3586 | 7756510 | Authentication method for wireless distributed system | |||
3587 | 7756292 | System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities | |||
3588 | 7756272 | Interpreter using cryptographic values of a playback device's keys to authorize the playback device | |||
3589 | 7756270 | Encryption device and decryption device | |||
3590 | 7756269 | Cryptosystem for communication networks | |||
3591 | 7752466 | Systems and methods for secure transaction management and electronic rights protection | |||
3592 | 7752461 | Storage apparatus that can properly recommence input and output of classified data | |||
3593 | 7752457 | Method and apparatus for secure data mirroring a storage system | |||
3594 | 7752452 | Dynamic cache lookup based on dynamic data | |||
3595 | 7752449 | System and method for generating a non-repudiatable record of a data stream | |||
3596 | 7752444 | System and method for providing identity hiding in a shared key authentication protocol | |||
3597 | 7752443 | Method and system for a single-sign-on operation providing grid access and network access | |||
3598 | 7752440 | Method and apparatus for reducing e-mail spam and virus distribution in a communications network by authenticating the origin of e-mail messages | |||
3599 | 7752439 | Method and apparatus for providing process-based access controls on computer resources | |||
3600 | 7751570 | Method and apparatus for managing cryptographic keys | |||
3601 | 7751569 | Group admission control apparatus and methods | |||
3602 | 7751567 | Local authentication of mobile subscribers outside their home systems | |||
3603 | 7751556 | Apparatus and method of generating falsification detecting data of encrypted data in the course of process | |||
3604 | 7751497 | Method to minimize compatibility error in hierarchical modulation using variable phase | |||
3605 | 7748036 | Methods for categorizing input data | |||
3606 | 7748027 | System and method for dynamic data redaction | |||
3607 | 7747852 | Chain of trust processing | |||
3608 | 7747532 | Content use management system, content playback apparatus, content use management method, content playback method, and computer program including system date/time information validation | |||
3609 | 7747024 | System and method for generalized authentication | |||
3610 | 7747022 | Wireless perimeter security device and network using same | |||
3611 | 7747021 | Method and apparatus for fast secure session establishment on half-duplex point-to-point voice cellular network channels | |||
3612 | 7747020 | Technique for implementing a security algorithm | |||
3613 | 7747019 | Methods and systems for communicating over a quantum channel | |||
3614 | 7747018 | Method and apparatus for providing a message sequence count in a security systems | |||
3615 | 7747014 | Information transmission system, and information sending apparatus and information receiving apparatus used therein | |||
3616 | 7747013 | Early detection system and method for encrypted signals within packet networks | |||
3617 | 7747012 | Process of security of an electronic unit with cryptoprocessor | |||
3618 | 7747011 | Encryption device, encryption method, and computer program | |||
3619 | 7743261 | Unauthorized contents detection system | |||
3620 | 7743258 | Method for interacting with a memory device in cryptographic operations | |||
3621 | 7743254 | Visualization of trust in an address bar | |||
3622 | 7743250 | Traffic manager for distributed computing environments | |||
3623 | 7742605 | Method and system for authentification of a mobile user via a gateway | |||
3624 | 7742601 | Encryption method using synchronized continuously calculated pseudo-random key | |||
3625 | 7742598 | Shrinking key generator for parallel process | |||
3626 | 7742597 | Exclusive encryption system | |||
3627 | 7742596 | Reliable elliptic curve cryptography computation | |||
3628 | 7742594 | Pipelined packet encryption and decryption using counter mode with cipher-block chaining message authentication code protocol | |||
3629 | 7739742 | Theft protection method and promotion system for audio media | |||
3630 | 7739521 | Method of obscuring cryptographic computations | |||
3631 | 7739519 | Secure device | |||
3632 | 7739517 | Hardware-based authentication of a software program | |||
3633 | 7739507 | Hardware multimedia endpoint and personal computer | |||
3634 | 7739506 | Authentication processing device and security processing method | |||
3635 | 7739505 | Linking Diffie Hellman with HFS authentication by using a seed | |||
3636 | 7739502 | Localization determination process for 1394 serial bus | |||
3637 | 7739500 | Method and system for consistent recognition of ongoing digital relationships | |||
3638 | 7739496 | Secure packet-based data broadcasting architecture | |||
3639 | 7739492 | Encrypted communication for selectively delivering a message to multiple decrypting devices | |||
3640 | 7739381 | System and method for providing encryption in storage operations in a storage network, such as for use by application service providers that provide data storage services | |||
3641 | 7739338 | System and method for encoding and verifying the identity of a sender of electronic mail and preventing unsolicited bulk email | |||
3642 | 7738793 | Secure optical communication system | |||
3643 | 7738660 | Cryptographic key split binding process and apparatus | |||
3644 | 7738657 | System and method for multi-precision division | |||
3645 | 7735134 | Jumping application security system | |||
3646 | 7735129 | Firewall device | |||
3647 | 7735128 | Method of storing pattern matching policy and method of controlling alert message | |||
3648 | 7735116 | System and method for unified threat management with a relational rules methodology | |||
3649 | 7735114 | Multiple tiered network security system, method and apparatus using dynamic user policy assignment | |||
3650 | 7734930 | Click passwords | |||
3651 | 7734923 | Key transformation unit for a tamper resistant module | |||
3652 | 7734920 | Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium | |||
3653 | 7734919 | Telephone having authentication function and telephone system | |||
3654 | 7734918 | Preventing rogue implementations of a security-sensitive class interface | |||
3655 | 7734916 | Multi-level security systems | |||
3656 | 7734907 | Methods and systems for redirecting data | |||
3657 | 7734280 | Method and apparatus for authentication of mobile devices | |||
3658 | 7734069 | Image processing method, image processor, photographic apparatus, image output unit and iris verify unit | |||
3659 | 7734048 | Cryptographic system using chaotic dynamics | |||
3660 | 7734046 | Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit | |||
3661 | 7734045 | Multifactor split asymmetric crypto-key with persistent key security | |||
3662 | 7734044 | Method and apparatus for synchronous stream cipher encryption with reserved codes | |||
3663 | 7734042 | System and method for using a streaming protocol | |||
3664 | 7733366 | Computer network-based, interactive, multimedia learning system and process | |||
3665 | 7730327 | Managing the encryption of data | |||
3666 | 7730320 | Method for generating data for detection of tampering, and method and apparatus for detection of tampering | |||
3667 | 7730315 | Cryptosystem based on a Jacobian of a curve | |||
3668 | 7730314 | Method and apparatus for electronic commerce using digital ticket to provide anonymity | |||
3669 | 7730312 | Tamper resistant module certification authority | |||
3670 | 7730311 | Key transformation unit for a tamper resistant module | |||
3671 | 7730310 | Key transformation unit for a tamper resistant module | |||
3672 | 7730309 | Method and system for key management in voice over internet protocol | |||
3673 | 7730308 | System and method for providing an user's security when setting-up a connection over insecure networks | |||
3674 | 7730307 | Secure ADS-B authentication system and method | |||
3675 | 7730306 | Information processing apparatus with use-restricted functions, and system and method for canceling use restriction | |||
3676 | 7730305 | Authentication method for link protection in Ethernet passive optical network | |||
3677 | 7730299 | System and method for providing secure internetwork services via an assured pipeline | |||
3678 | 7730296 | Method and system for providing synchronous running encoding and encryption | |||
3679 | 7729496 | Efficient key updates in encrypted database systems | |||
3680 | 7725928 | System and method for establishing temporary and permanent credentials for secure online commerce | |||
3681 | 7725925 | Enforcing access control on multicast transmissions | |||
3682 | 7725921 | Systems and methods for managing networks | |||
3683 | 7725737 | System and methodology providing secure workspace environment | |||
3684 | 7725736 | Message digest instruction | |||
3685 | 7725732 | Object authentication system | |||
3686 | 7725726 | Method and apparatus for securing and authenticating encoded data and documents containing such data | |||
3687 | 7725719 | Method and system for generating ciphertext and message authentication codes utilizing shared hardware | |||
3688 | 7725717 | Method and apparatus for user authentication | |||
3689 | 7725714 | Method for checking the integrity of data, system and mobile terminal | |||
3690 | 7725712 | User authentication system and method | |||
3691 | 7725707 | Server, VPN client, VPN system, and software | |||
3692 | 7724906 | Decryption apparatus and decryption method | |||
3693 | 7724904 | Authentication system and method thereof in a communication system | |||
3694 | 7724903 | Framing of transmit encoded data and linear feedback shifting | |||
3695 | 7724902 | Faceplate for quick removal and securing of encryption device | |||
3696 | 7724899 | Method for controlling security channel in MAC security network and terminal using the same | |||
3697 | 7724897 | Program converter, encrypting device, and encrypting method | |||
3698 | 7721955 | Secure transaction method and transaction terminal for use in implementing such method | |||
3699 | 7721345 | Data security system and method | |||
3700 | 7721330 | Utility computing firewall | |||
3701 | 7721325 | Method and apparatus for managing communication security in wireless network | |||
3702 | 7721113 | Data alteration detecting method, data alteration detecting device and data alteration detecting program | |||
3703 | 7721105 | Repurposing digitally signed information | |||
3704 | 7721100 | Granting an access to a computer-based object | |||
3705 | 7721096 | Self-authenticating blade server in a secure environment | |||
3706 | 7721092 | Authenticating device, authenticated device and key updating method | |||
3707 | 7721088 | Terminal device, server device, and content distribution system | |||
3708 | 7720767 | Method and system to support dynamic rights and resources sharing | |||
3709 | 7720227 | Encryption method for SIP message and encrypted SIP communication system | |||
3710 | 7720225 | Table splitting for cryptographic processes | |||
3711 | 7720219 | Apparatus and method for implementing a hash algorithm word buffer | |||
3712 | 7716494 | Establishing a trusted platform in a digital processing system | |||
3713 | 7716488 | Trusted time stamping storage system | |||
3714 | 7716484 | System and method for increasing the security of encrypted secrets and authentication | |||
3715 | 7716482 | Conference session key distribution method in an ID-based cryptographic system | |||
3716 | 7716481 | System and method for secure exchange of trust information | |||
3717 | 7716479 | Dynamically resolving recipients to retrieve public keys during send/receive | |||
3718 | 7716478 | Method and device for data protection | |||
3719 | 7716477 | Data processing method, program of the same, and device of the same | |||
3720 | 7716475 | Mobile station and communication control method | |||
3721 | 7716474 | Anti-piracy software protection system and method | |||
3722 | 7716471 | Communication system and network control apparatus with encryption processing function, and communication control method | |||
3723 | 7716468 | Method and system for cloned cable modem detection | |||
3724 | 7715565 | Information-centric security | |||
3725 | 7715564 | License information conversion apparatus | |||
3726 | 7715563 | Rapid acquisition of state vectors in an encrypted data communication system | |||
3727 | 7715561 | System for protecting personal information of a customer when receiving on-line services from a service provider | |||
3728 | 7715557 | Method for managing rights of subscribers to a multi-operator pay-television system | |||
3729 | 7715554 | Prime number determining method | |||
3730 | 7715551 | Apparatus and method for consistency checking public key cryptography computations | |||
3731 | 7712143 | Trusted enclave for a computer system | |||
3732 | 7712141 | Determining advertising activity | |||
3733 | 7712134 | Method and apparatus for worm detection and containment in the internet core | |||
3734 | 7712126 | Method and apparatus for providing dynamic security management | |||
3735 | 7711964 | Method of securing programmable logic configuration data | |||
3736 | 7711963 | Modular cryptographic device providing enhanced interface protocol features and related methods | |||
3737 | 7711957 | Granting access to a computer-based object | |||
3738 | 7711955 | Apparatus and method for cryptographic key expansion | |||
3739 | 7711953 | Methods and systems that selectively permit changes to a cryptographic hardware unit's state | |||
3740 | 7711952 | Method and system for license management | |||
3741 | 7711950 | Methods and systems for establishing an electronic account for a customer | |||
3742 | 7711121 | System and method for distributed management of shared computers | |||
3743 | 7711119 | Method and apparatus for transition of encryption key during an ongoing media communication session | |||
3744 | 7711116 | Methods and systems for transmitting digital messages | |||
3745 | 7707643 | System and method for accessing protected content in a rights-management architecture | |||
3746 | 7707637 | Distributed threat management | |||
3747 | 7707430 | Digital content protection system | |||
3748 | 7707429 | System and method to proactively detect software tampering | |||
3749 | 7707425 | Recognizer of content of digital signals | |||
3750 | 7707424 | Secure file transfer | |||
3751 | 7707423 | Method and system for maintaining digital signature integrity | |||
3752 | 7707420 | Public key encryption with digital signature scheme | |||
3753 | 7707419 | Method and apparatus for storing and distributing encryption keys | |||
3754 | 7707415 | Tunneling security association messages through a mesh network | |||
3755 | 7707414 | Information processing device for authentication processing, information processing method, and control program for executing the method | |||
3756 | 7707408 | Key transformation unit for a tamper resistant module | |||
3757 | 7707407 | Encryption of voice and data in a single data stream in a deployable, secure communication system | |||
3758 | 7707404 | Automated process for a web site to receive a secure socket layer certificate | |||
3759 | 7707402 | Quantum cipher communication system | |||
3760 | 7706541 | Information management apparatus | |||
3761 | 7706540 | Content distribution using set of session keys | |||
3762 | 7706537 | Method for relocating SRNS in a mobile communication system | |||
3763 | 7706530 | Key information processing method, device thereof, and program | |||
3764 | 7706529 | Random signal generator | |||
3765 | 7703132 | Bridged cryptographic VLAN | |||
3766 | 7703124 | System and method for implementing a private virtual backbone on a common network infrastructure | |||
3767 | 7702920 | Storage control device, host interface control unit of storage control device, and information protection method of storage control device | |||
3768 | 7702911 | Interfacing with a system that includes a passcode authenticator | |||
3769 | 7702908 | Tamper resistant module certification authority | |||
3770 | 7702903 | License re-allocation system and method | |||
3771 | 7702902 | Method for a web site with a proxy domain name registration to receive a secure socket layer certificate | |||
3772 | 7702901 | Secure communications between internet and remote client | |||
3773 | 7702899 | Method and apparatus for verifying revocation status of a digital certificate | |||
3774 | 7702109 | Content recording/reproducing system, distribution device, reproducing device, and recording device | |||
3775 | 7702106 | Quantum secret splitting based on non-orthogonal multi-particle states | |||
3776 | 7702104 | System and method for securing genomic information | |||
3777 | 7702097 | Method and apparatus for authentication of data using different hash functions and feedback | |||
3778 | 7698735 | Method and system of integrating third party authentication into internet browser code | |||
3779 | 7698664 | Secure exchange of information in electronic design automation | |||
3780 | 7698570 | Digital content distribution system and method | |||
3781 | 7698565 | Crypto-proxy server and method of using the same | |||
3782 | 7698555 | System and method for enabling secure access to a program of a headless server device | |||
3783 | 7698551 | Method for broadcast encryption and key revocation of stateless receivers | |||
3784 | 7698550 | Native wi-fi architecture for 802.11 networks | |||
3785 | 7698549 | Program product for unified certificate requests from certificate authorities | |||
3786 | 7698227 | System and method for providing traceable acknowledgement of a digital data distribution license | |||
3787 | 7698223 | Pluggable file-based digital rights management API layer for applications and engines | |||
3788 | 7697694 | Synchronizing the exchange of cryptography information between kernel drivers | |||
3789 | 7697691 | Method of delivering Direct Proof private keys to devices using an on-line service | |||
3790 | 7697690 | Windowed backward key rotation | |||
3791 | 7697689 | Secure transmission system for a digital trunked radio system | |||
3792 | 7697688 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
3793 | 7697685 | Data dependent scrambler with reduced overhead | |||
3794 | 7697684 | Block cipher apparatus using auxiliary transformation | |||
3795 | 7697682 | Encryption apparatus and encryption method | |||
3796 | 7694336 | Aggregated authenticated identity apparatus for and method therefor | |||
3797 | 7694152 | Memory controller with performance-modulated security | |||
3798 | 7694145 | Indicating status for digital signatures | |||
3799 | 7694141 | Extended authenticated key exchange with key confirmation | |||
3800 | 7694128 | Systems and methods for secure communication delivery | |||
3801 | 7693978 | Distributing live performances | |||
3802 | 7693286 | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |||
3803 | 7693285 | Secure communication apparatus and method | |||
3804 | 7693280 | Rights management system for streamed multimedia content | |||
3805 | 7693279 | Security method and apparatus using biometric data | |||
3806 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
3807 | 7690045 | On-the-fly contents-based access control system | |||
3808 | 7690041 | Associating first and second watermarks with audio or video content | |||
3809 | 7690040 | Method for network traffic mirroring with data privacy | |||
3810 | 7689912 | Managing electronic documents utilizing a digital seal | |||
3811 | 7689836 | Encryption device | |||
3812 | 7689835 | Computer program product and computer system for controlling performance of operations within a data processing system or networks | |||
3813 | 7689828 | System and method for implementing digital signature using one time private keys | |||
3814 | 7689211 | Secure login method for establishing a wireless local area network connection, and wireless local area network system | |||
3815 | 7688982 | Protected return path from digital rights management dongle | |||
3816 | 7688981 | Network partitioning using encryption | |||
3817 | 7688980 | Cryptographic-key generation and management | |||
3818 | 7688975 | Method and apparatus for dynamic generation of symmetric encryption keys and exchange of dynamic symmetric key infrastructure | |||
3819 | 7688972 | Method and system for implementing FO function in KASUMI algorithm for accelerating cryptography in GSM (global system for mobile communication)GPRS (general packet radio service)edge(enhanced data rate for GSM evolution) compliant handsets | |||
3820 | 7685647 | Information processing apparatus | |||
3821 | 7685645 | Security containers for document components | |||
3822 | 7685631 | Authentication of a server by a client to prevent fraudulent user interfaces | |||
3823 | 7685626 | Information management system | |||
3824 | 7685437 | Query optimization in encrypted database systems | |||
3825 | 7685428 | Transmission of event markers to data stream recorder | |||
3826 | 7685425 | Server computer for guaranteeing files integrity | |||
3827 | 7685424 | Validating untrusted objects and entities | |||
3828 | 7685423 | Validation protocol and system | |||
3829 | 7685418 | Mechanisms and techniques for protecting intellectual property | |||
3830 | 7685414 | Subscription management service for secure messaging system | |||
3831 | 7684568 | Encrypting data in a communication network | |||
3832 | 7684566 | Encryption scheme for streamed multimedia content protected by rights management system | |||
3833 | 7684565 | System for securely communicating information packets | |||
3834 | 7684563 | Apparatus and method for implementing a unified hash algorithm pipeline | |||
3835 | 7681227 | Generation of encrypted video information | |||
3836 | 7681044 | Secure processor and system | |||
3837 | 7681037 | Network connection system | |||
3838 | 7681035 | Digital rights management handler and related methods | |||
3839 | 7681034 | Method and apparatus for securing electronic data | |||
3840 | 7681031 | Method and apparatus to provide authentication code | |||
3841 | 7680282 | Signal processing circuit | |||
3842 | 7680280 | Electronic device, control method thereof, security program and others | |||
3843 | 7680278 | Domino scheme for wireless cryptographic communication and communication method incorporating same | |||
3844 | 7680273 | System and method for optimizing error detection to detect unauthorized modification of transmitted data | |||
3845 | 7680271 | Zero-knowledge proof cryptography methods and devices | |||
3846 | 7680270 | System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication | |||
3847 | 7680269 | Method for ciphering a compressed audio or video stream with error tolerance | |||
3848 | 7680268 | Elliptic curve point octupling using single instruction multiple data processing | |||
3849 | 7676831 | Role-based access control management for multiple heterogeneous application components | |||
3850 | 7676679 | Method for self-synchronizing time between communicating networked systems using timestamps | |||
3851 | 7676678 | Method for signing a data package and signing apparatus | |||
3852 | 7676546 | Control and management of electronic messaging | |||
3853 | 7676037 | Cryptographic method capable of protecting elliptic curve code from side channel attacks | |||
3854 | 7673347 | Information control in federated interaction | |||
3855 | 7673333 | Flexible method of security data backup | |||
3856 | 7673332 | Method and system for access authentication | |||
3857 | 7673328 | Network authentication system using individual services providers and an authentication server | |||
3858 | 7673327 | Aggregation system | |||
3859 | 7673324 | Method and system for tracking an operating performed on an information asset with metadata associated therewith | |||
3860 | 7673151 | Processor for encrypting and/or decrypting data and method of encrypting and/or decrypting data using such a processor | |||
3861 | 7673145 | Biometric image collation apparatus and collation method therefor | |||
3862 | 7673144 | Cryptographic system for group signature | |||
3863 | 7672460 | Mix-net system | |||
3864 | 7672458 | Method and system for key insertion for stored encrypted content | |||
3865 | 7672457 | Computer-readable recording medium recording a wireless communication authentication program | |||
3866 | 7672456 | Anti-pirate method for the distribution of digital content by pro-active diversified transmission, associated transmitting device and portable receiving object | |||
3867 | 7672455 | Method and apparatus for data encryption | |||
3868 | 7669243 | Method and system for detection and neutralization of buffer overflow attacks | |||
3869 | 7669238 | Evidence-based application security | |||
3870 | 7669227 | Information management system | |||
3871 | 7669226 | Generic declarative authorization scheme for Java | |||
3872 | 7669114 | Software architecture and system for performing validated clinical studies of pharmaceutical related products | |||
3873 | 7669055 | Key transformation unit for a tamper resistant module | |||
3874 | 7669053 | System and method for using acoustic digital signature generator as oracle | |||
3875 | 7668316 | Method for encrypting and decrypting metadata | |||
3876 | 7668315 | Local authentication of mobile subscribers outside their home systems | |||
3877 | 7668314 | System and method for communicating encrypted data | |||
3878 | 7668313 | Recipient-encrypted session key cryptography | |||
3879 | 7667429 | Battery pack authentication for a mobile device | |||
3880 | 7665134 | Profiling users based on artificially constructed deceptive content | |||
3881 | 7665124 | Authentication device | |||
3882 | 7665122 | Authentication apparatus, method and program | |||
3883 | 7664961 | Wireless handheld device with local biometric authentication | |||
3884 | 7664957 | Digital signatures including identity-based aggregate signatures | |||
3885 | 7664956 | Method and system for real-time control of document printing | |||
3886 | 7664955 | Establishing shared information in a network | |||
3887 | 7664810 | Microprocessor apparatus and method for modular exponentiation | |||
3888 | 7664708 | System for controlling the distribution and use of digital works using digital tickets | |||
3889 | 7664706 | Method for granting customers access to a product | |||
3890 | 7664267 | Bit based arithmetic coding using variable size key cipher | |||
3891 | 7664265 | Controlling communications between stations | |||
3892 | 7664262 | Playback apparatus and playback control method | |||
3893 | 7664260 | Signature generation device, key generation device, and signature generation method | |||
3894 | 7661147 | System for controlling use of digitally encoded products | |||
3895 | 7661139 | System and method for detecting invalid access to computer network | |||
3896 | 7661127 | Instrument access control system | |||
3897 | 7661125 | System for providing and utilizing a network trusted context | |||
3898 | 7661000 | Information processing device, information recording medium and information processing method, and computer program | |||
3899 | 7660993 | Cryptographic puzzle cancellation service for deterring bulk electronic mail messages | |||
3900 | 7660987 | Method of establishing a secure e-mail transmission link | |||
3901 | 7660984 | Method and system for achieving individualized protected space in an operating system | |||
3902 | 7660861 | System and method for verifying the identity of a sender of electronic mail and preventing unsolicited bulk email | |||
3903 | 7660421 | Method and system for secure storage, transmission and control of cryptographic keys | |||
3904 | 7660418 | Cryptographic system and method for geolocking and securing digital information | |||
3905 | 7660415 | Method and apparatus for controlling access to storage media | |||
3906 | 7660414 | Encryption/decryption method and authentication method using multiple-affine key system | |||
3907 | 7657934 | Architecture to thwart denial of service attacks | |||
3908 | 7657924 | Method and system for implementing authorization policies for web services | |||
3909 | 7657847 | Copy control information deciding apparatus | |||
3910 | 7657761 | Multiple trust modes for handling data | |||
3911 | 7657752 | Digital signal watermaker | |||
3912 | 7657747 | System and method for specifying security, privacy, and access control to information used by others | |||
3913 | 7657744 | System and method for dynamically determining the role of a network device in a link authentication protocol exchange | |||
3914 | 7657736 | System and method for compressing secure e-mail for exchange with a mobile data communication device | |||
3915 | 7657490 | Electronic settlement system, settlement device, and terminal | |||
3916 | 7657036 | Determining a session encryption key during a broadcast/multicast service session using secure real-time transport protocol | |||
3917 | 7657035 | Encryption communication method and system | |||
3918 | 7657030 | Method for generating and distributing strong DES keys | |||
3919 | 7657028 | Method for classifying private information securely | |||
3920 | 7653947 | Image forming system, image forming apparatus, control method therefor and program implementing the control method | |||
3921 | 7653920 | Method and system for protecting cable television subscriber-specific information allowing limited subset access | |||
3922 | 7653870 | System and method of dynamically generating index information | |||
3923 | 7653817 | Signature schemes using bilinear mappings | |||
3924 | 7653809 | Method and system for controlling the on-line supply of digital products or the access to on-line services | |||
3925 | 7653210 | Method for monitoring internet dissemination of image, video, and/or audio files | |||
3926 | 7653199 | Quantum key distribution | |||
3927 | 7653197 | System and method of reliable forward secret key sharing with physical random functions | |||
3928 | 7650647 | Hardware-oriented configuration and locking of devices | |||
3929 | 7650646 | Information-recording apparatus, information reproduction apparatus, information-recording method, information reproduction method and computer program | |||
3930 | 7650642 | Peer-to-peer license tracking and control | |||
3931 | 7650629 | Enhanced trust relationship in an IEEE 802.1.times.network | |||
3932 | 7650514 | Scalable leases | |||
3933 | 7650511 | Information processing method, falsification verification method and device, storage medium, and program | |||
3934 | 7650497 | Automated digital certificate renewer | |||
3935 | 7650494 | Method and apparatus for use in relation to verifying an association between two parties | |||
3936 | 7650493 | System and method for integrating secure and non-secure software objects | |||
3937 | 7650491 | Method and system for controlled distribution of application code and content data within a computer network | |||
3938 | 7649999 | Method and apparatus for establishing a key agreement protocol | |||
3939 | 7649997 | User transparent registration process for secure communication | |||
3940 | 7649992 | Apparatuses for encoding, decoding, and authenticating data in cipher block chaining messaging authentication code | |||
3941 | 7649990 | Apparatus to implement dual hash algorithm | |||
3942 | 7647644 | Entitlement designation in web services for remote portlets environment | |||
3943 | 7647641 | Method and system for conditional access applied to protection of content | |||
3944 | 7647631 | Automated user interaction in application assessment | |||
3945 | 7647624 | Techniques for preserving and managing identities in an audit log | |||
3946 | 7647622 | Dynamic security policy through use of empirical security events | |||
3947 | 7647503 | Optimization methods for the insertion, projection, and detection of digital watermarks in digital data | |||
3948 | 7647502 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
3949 | 7647500 | Synchronous validation and acknowledgment of electronic data interchange (EDI) | |||
3950 | 7647498 | Device authentication | |||
3951 | 7647496 | Process-mode independent driver model | |||
3952 | 7647494 | Name transformation for a public key infrastructure (PKI) | |||
3953 | 7647270 | System and methods for pricing and allocation of commodities or securities | |||
3954 | 7646980 | Variable spectral phase encoder/decoder based on decomposition of Hadamard codes | |||
3955 | 7646874 | Establishing mutual authentication and secure channels in devices without previous credentials | |||
3956 | 7644437 | Method and apparatus for local area networks | |||
3957 | 7644289 | Modular cryptographic device providing enhanced communication control features and related methods | |||
3958 | 7644284 | Specifying security protocols and policy constraints in distributed systems | |||
3959 | 7644283 | Media analysis method and system for locating and reporting the presence of steganographic activity | |||
3960 | 7644276 | Method for verifying a secure association between devices | |||
3961 | 7644275 | Pass-thru for client authentication | |||
3962 | 7644273 | Modulation method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs | |||
3963 | 7644034 | System and method for pricing and allocation of commodities or securities | |||
3964 | 7643639 | Process automation system and process device for a process automation system | |||
3965 | 7643638 | System for generating pseudorandom sequences | |||
3966 | 7643637 | Efficient code constructions via cryptographic assumptions | |||
3967 | 7643636 | Managing multiple cryptographic periods in a single cryptographic group | |||
3968 | 7643633 | Adding randomness internally to a wireless mobile communication device | |||
3969 | 7643632 | Ternary and multi-value digital signal scramblers, descramblers and sequence generators | |||
3970 | 7643495 | PCI express switch with encryption and queues for performance enhancement | |||
2009 | |||||
3971 | 7640582 | Clustered filesystem for mix of trusted and untrusted nodes | |||
3972 | 7640575 | System and method for determining a security encoding to be applied to outgoing messages | |||
3973 | 7640574 | Method and system for resource based authentication | |||
3974 | 7640435 | System, method, and apparatus for securely providing content viewable on a secure device | |||
3975 | 7640432 | Electronic cash controlled by non-homomorphic signatures | |||
3976 | 7640427 | System and method for secure electronic communication in a partially keyless environment | |||
3977 | 7639834 | Software anti-piracy systems and methods utilizing certificates with digital content | |||
3978 | 7639820 | Image forming apparatus certificate sheet making method and certificate sheet processing method | |||
3979 | 7639819 | Method and apparatus for using an external security device to secure data in a database | |||
3980 | 7639818 | Structured document signature device, structured document adaptation device and structured document verification device | |||
3981 | 7639806 | Fingerprinting digital devices using electromagnetic characteristics of their communications | |||
3982 | 7639805 | Digital rights management scheme for an on-demand distributed streaming system | |||
3983 | 7639803 | Optical disk player | |||
3984 | 7639802 | Methods and apparatus for bootstrapping Mobile-Foreign and Foreign-Home authentication keys in Mobile IP | |||
3985 | 7639801 | Method of transforming serial scrambler to parallel scrambler, parallel scrambler and double-edge-triggered register with XOR operation | |||
3986 | 7639798 | High speed data encryption architecture | |||
3987 | 7639796 | Method for secure integer division or modular reduction against hidden channel attacks | |||
3988 | 7636944 | Method and apparatus for detecting and responding to email based propagation of malicious software in a trusted network | |||
3989 | 7636942 | Method and system for detecting denial-of-service attack | |||
3990 | 7636935 | Method of enforcing a policy on a computer network | |||
3991 | 7636844 | Method and system to provide a trusted channel within a computer system for a SIM device | |||
3992 | 7636841 | Systems and methods for secure data exchange in a distributed collaborative application | |||
3993 | 7636840 | Secure communications and control in a fueling environment | |||
3994 | 7636442 | Method and apparatus for migrating software-based security coprocessors | |||
3995 | 7636439 | Encryption method, encryption apparatus, data storage distribution apparatus and data delivery system | |||
3996 | 7634652 | Management of streaming content | |||
3997 | 7634171 | PC-based personal video recorder | |||
3998 | 7634091 | System and method of hiding cryptographic private keys | |||
3999 | 7634088 | Radio communications system | |||
4000 | 7634087 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
4001 | 7634086 | Cipher device using RC4 algorithm and method thereof | |||
4002 | 7634085 | Identity-based-encryption system with partial attribute matching | |||
4003 | 7634083 | Differential power analysis | |||
4004 | 7631359 | Hidden proactive replication of data | |||
4005 | 7631349 | Method and apparatus for firewall traversal | |||
4006 | 7631318 | Secure server plug-in architecture for digital rights management systems | |||
4007 | 7631195 | System and method for providing security to a portable storage device | |||
4008 | 7631193 | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |||
4009 | 7631190 | Use of variant and base keys with two entities | |||
4010 | 7631189 | Information recording device, information reproducing device, information recording medium, method, and computer program | |||
4011 | 7631187 | Method for the initialisation of mobile data supports | |||
4012 | 7631185 | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing | |||
4013 | 7631183 | System and method for retrieving related certificates | |||
4014 | 7631181 | Communication apparatus and method, and program for applying security policy | |||
4015 | 7630987 | System and method for detecting phishers by analyzing website referrals | |||
4016 | 7630940 | Content sharing system and method | |||
4017 | 7630497 | System and method for assigning sequence keys to a media player to enable hybrid traitor tracing | |||
4018 | 7630493 | Multiple factor private portion of an asymmetric key | |||
4019 | 7630492 | Secure audio stream scramble system | |||
4020 | 7627891 | Network audit and policy assurance system | |||
4021 | 7627764 | Apparatus and method for performing MD5 digesting | |||
4022 | 7627763 | Multi signature verification system, electronic signature attaching apparatus, data addition apparatus, and electronic signature verification apparatus | |||
4023 | 7627762 | Signing and authentication devices and processes and corresponding products, notably for DVB/MPEG MHP digital streams | |||
4024 | 7627760 | Extended authenticated key exchange | |||
4025 | 7627756 | Storage system for data encryption | |||
4026 | 7627755 | Secure broadcast/multicast service | |||
4027 | 7627754 | Document data identity verifying apparatus | |||
4028 | 7627752 | Communication system and network control apparatus with encryption processing function, and communication control method | |||
4029 | 7627748 | Network connection device, network connection method, and communication device realizing contents protection procedure over networks | |||
4030 | 7627122 | Method for authentication of a radio communications network with a mobile station, and radio communications network and a mobile station | |||
4031 | 7627116 | Random data method and apparatus | |||
4032 | 7627115 | Method and system for implementing the GEA3 encryption algorithm for GPRS compliant handsets | |||
4033 | 7627114 | Efficient modular reduction and modular multiplication | |||
4034 | 7627113 | Method and system for hardware accelerator for implementing f8 confidentiality algorithm in WCDMA compliant handsets | |||
4035 | 7626977 | Standard telephone equipment (STE) based deployable secure communication system | |||
4036 | 7624445 | System for dynamic network reconfiguration and quarantine in response to threat conditions | |||
4037 | 7624434 | System for providing firewall capabilities to a communication device | |||
4038 | 7624430 | Method for accessing a data processing system | |||
4039 | 7624428 | Apparatus and method for platform-independent identity manageability | |||
4040 | 7624425 | Method and apparatus for generating a security document for a farm in a utility computing environment | |||
4041 | 7624273 | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit | |||
4042 | 7624270 | Inter subnet roaming system and method | |||
4043 | 7624269 | Secure messaging system with derived keys | |||
4044 | 7624268 | Device and method for managing public key certificate attached to electronic mail and storage medium | |||
4045 | 7624264 | Using time to determine a hash extension | |||
4046 | 7623663 | Rolling code security system | |||
4047 | 7623659 | Biometric non-repudiation network security systems and methods | |||
4048 | 7623658 | Method and system for implementing the A5/3 encryption algorithm for GSM and EDGE compliant handsets | |||
4049 | 7623657 | Methods and apparatus for secure and adaptive delivery of multimedia content | |||
4050 | 7623656 | Stream cipher encryption and message authentication | |||
4051 | 7620980 | Secure data broker | |||
4052 | 7620978 | Securely propagating authentication in an ensemble of devices using single sign-on | |||
4053 | 7620974 | Distributed traffic scanning through data stream security tagging | |||
4054 | 7620824 | Data communicating apparatus, data communicating method, and program | |||
4055 | 7620822 | Information processing system for controlling integrated circuit cards at a command level | |||
4056 | 7620816 | System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment | |||
4057 | 7620812 | System for authenticating remotely generated optical control signals | |||
4058 | 7620811 | Server device and program management system | |||
4059 | 7620810 | Method and network for ensuring secure forwarding of messages | |||
4060 | 7620809 | Method and system for device registration within a digital rights management framework | |||
4061 | 7620806 | Encrypted communication for selectively delivering a message to multiple decrypting devices | |||
4062 | 7620570 | System and method for presentation of user interface for conducting contractual activity over a computer network | |||
4063 | 7620198 | Watermark coding method and recording medium thereof | |||
4064 | 7620187 | Method and apparatus for ad hoc cryptographic key transfer | |||
4065 | 7620186 | Method for establishing an encrypted communication by means of keys | |||
4066 | 7620185 | Preview of payable broadcasts | |||
4067 | 7620182 | QKD with classical bit encryption | |||
4068 | 7617528 | Smartcard with protected memory access | |||
4069 | 7617521 | Charging via policy enforcement | |||
4070 | 7617395 | Battery and authentication requesting device | |||
4071 | 7616776 | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content | |||
4072 | 7616765 | Method and system for generating shared information | |||
4073 | 7613928 | Flash device security method utilizing a check register | |||
4074 | 7613926 | Method and system for protecting a computer and a network from hostile downloadables | |||
4075 | 7613922 | Electronic device controlling apparatus, electronic device controlling system, and electronic device controlling method | |||
4076 | 7613921 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
4077 | 7613919 | Single-use password authentication | |||
4078 | 7613918 | System and method for enforcing a security context on a downloadable | |||
4079 | 7613302 | Systems and methods for compression of key sets having multiple keys | |||
4080 | 7613301 | Data storage device and data storage method | |||
4081 | 7613300 | Content-protected digital link over a single signal line | |||
4082 | 7613298 | System and process for adaptive and progressive scrambling of video streams | |||
4083 | 7613297 | Method and apparatus for data encryption | |||
4084 | 7613296 | M6 block cipher system and method for encoding content and authenticating a device | |||
4085 | 7610494 | Encrypted microcode update of an optical transceiver | |||
4086 | 7610487 | Human input security codes | |||
4087 | 7610485 | System for providing secure multi-cast broadcasts over a network | |||
4088 | 7609838 | Method of transmitting data in a network | |||
4089 | 7609834 | Personal authenticating multi-function peripheral | |||
4090 | 7607165 | Method and apparatus for multiplication and/or modular reduction processing | |||
4091 | 7607164 | Systems and processes for managing policy change in a distributed enterprise | |||
4092 | 7607020 | Communication with an external source application | |||
4093 | 7607018 | Method and apparatus for collecting electronic signatures | |||
4094 | 7607015 | Shared network access using different access keys | |||
4095 | 7607013 | Method and apparatus for access authentication in wireless mobile communication system | |||
4096 | 7607007 | Method and apparatus for message routing in a computer system | |||
4097 | 7607006 | Method for asymmetric security | |||
4098 | 7606771 | Dynamic number authentication for credit/debit cards | |||
4099 | 7606388 | Contents border detection apparatus, monitoring method, and contents location detection method and program and storage medium therefor | |||
4100 | 7606370 | System, method and computer program product for updating security criteria in wireless networks | |||
4101 | 7606368 | Method and apparatus for data encryption | |||
4102 | 7606367 | Quantum cryptography with fewer random numbers | |||
4103 | 7603721 | Restricted software and hardware usage on a computer | |||
4104 | 7603719 | Resource access control | |||
4105 | 7603706 | System security using human authorization | |||
4106 | 7603703 | Method and system for controlled distribution of application code and content data within a computer network | |||
4107 | 7603699 | Method for establishing trust online | |||
4108 | 7603561 | Methods and apparatus for input of coded image data | |||
4109 | 7603557 | Communication device, communication system and authentication method | |||
4110 | 7603555 | Providing tokens to access extranet resources | |||
4111 | 7603553 | System and method to make file handles opaque to clients | |||
4112 | 7603552 | Piracy prevention using unique module translation | |||
4113 | 7603550 | Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path | |||
4114 | 7602920 | Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor | |||
4115 | 7602918 | Method for distributing security keys during hand-off in a wireless communication system | |||
4116 | 7602916 | Access-protected data carrier | |||
4117 | 7602915 | Communication system having plurality of nodes sharing a common cipher key, cipher key dispatching apparatus for use in the system, and anti-theft apparatus utilizing information derived from cipher key utilization | |||
4118 | 7602910 | Password protection | |||
4119 | 7602909 | Self-service terminal | |||
4120 | 7602906 | Cipher for disk encryption | |||
4121 | 7602903 | Cryptography correctness detection methods and apparatuses | |||
4122 | 7602817 | Low deviation field modulation for transfer of information | |||
4123 | 7600263 | Access controlled search results | |||
4124 | 7600261 | Security attributes in trusted computing systems | |||
4125 | 7600255 | Preventing network denial of service attacks using an accumulated proof-of-work approach | |||
4126 | 7600251 | Universal peer-to-peer game download | |||
4127 | 7600134 | Theft deterrence using trusted platform module authorization | |||
4128 | 7600131 | Distributed processing in a cryptography acceleration chip | |||
4129 | 7600129 | Controlling access using additional data | |||
4130 | 7600128 | Two-factor computer password client device, system, and method | |||
4131 | 7600121 | Message security | |||
4132 | 7600119 | Data update system, data update method, data update program, and robot system | |||
4133 | 7600118 | Method and apparatus for augmenting authentication in a cryptographic system | |||
4134 | 7600116 | Authentication of messages in a communication system | |||
4135 | 7600115 | Control key capable of storing multiple and variable data packet classification results | |||
4136 | 7600108 | Gaming machine having reduced-read software authentication | |||
4137 | 7599976 | System and method for cryptographic key generation | |||
4138 | 7599934 | Server side filtering and sorting with field level security | |||
4139 | 7599496 | Secure encryption key distribution | |||
4140 | 7599493 | Asymmetric key pair having a kiosk mode | |||
4141 | 7599492 | Fast cryptographic key recovery system and method | |||
4142 | 7599491 | Method for strengthening the implementation of ECDSA against power analysis | |||
4143 | 7599488 | Differential power analysis | |||
4144 | 7596804 | Seamless cross-site user authentication status detection and automatic login | |||
4145 | 7596802 | Method and system for providing connection handling | |||
4146 | 7596703 | Hidden data backup and retrieval for a secure device | |||
4147 | 7596700 | Method and system for establishing trusting environment for sharing data between mutually mistrusting entities | |||
4148 | 7596696 | Efficiently managing keys to make data permanently unreadable | |||
4149 | 7596691 | Internet facsimile and control method thereof and communication instruction terminal | |||
4150 | 7596689 | Secure and reliable document delivery using routing lists | |||
4151 | 7596270 | Method of shuffling text in an Asian document image | |||
4152 | 7596227 | System method and model for maintaining device integrity and security among intermittently connected interoperating devices | |||
4153 | 7596226 | Mobile terminal, method and computer program product for storing and retrieving network parameters | |||
4154 | 7596225 | Method for refreshing a pairwise master key | |||
4155 | 7596224 | Method and system for secure call alert | |||
4156 | 7596223 | User control of a secure wireless computer network | |||
4157 | 7594265 | System for preventing unauthorized access to sensitive data and a method thereof | |||
4158 | 7594262 | System and method for secure group communications | |||
4159 | 7594261 | Cryptographic applications of the Cartier pairing | |||
4160 | 7594256 | Remote interface for policy decisions governing access control | |||
4161 | 7594119 | System for managing time rights linked to a digital content | |||
4162 | 7594118 | Data-processing system and method for controlling same, computer program, and computer-readable recording medium | |||
4163 | 7594116 | Mediated key exchange between source and target of communication | |||
4164 | 7594114 | Authentication apparatus and method for universal appliance communication controller | |||
4165 | 7594112 | Delegated administration for a distributed security system | |||
4166 | 7593717 | Authenticating access to a wireless local area network based on security value(s) associated with a cellular system | |||
4167 | 7593532 | Management of the retention and/or discarding of stored data | |||
4168 | 7593531 | Methods and systems for transceiving chaotic signals | |||
4169 | 7593527 | Providing digital signature and public key based on shared knowledge | |||
4170 | 7593526 | Method and apparatus for compressing rabin signatures | |||
4171 | 7591015 | Secure kernel transactions | |||
4172 | 7591013 | System and method for client initiated authentication in a session initiation protocol environment | |||
4173 | 7591006 | Security for external system management | |||
4174 | 7591003 | Security policies in trusted operating system | |||
4175 | 7591001 | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection | |||
4176 | 7591000 | System and method for hierarchical role-based entitlements | |||
4177 | 7590868 | Method and apparatus for managing encrypted data on a computer readable medium | |||
4178 | 7590866 | Super-distribution of protected digital content | |||
4179 | 7590860 | Secure data processing apparatus | |||
4180 | 7590858 | Authentication apparatus, user authentication method, user authentication card and storage medium | |||
4181 | 7590853 | Systems and methods using cryptography to protect secure computing environments | |||
4182 | 7590851 | Confirmation method of software and apparatus for executing software | |||
4183 | 7590848 | System and method for authentication and fail-safe transmission of safety messages | |||
4184 | 7590847 | Mobile authentication for network access | |||
4185 | 7590840 | Method and system for authorizing client devices to receive secured data streams | |||
4186 | 7590599 | System and method of automatically maintaining and recycling software components | |||
4187 | 7590479 | Remote login of a personal computer | |||
4188 | 7590247 | System and method for reusable efficient key distribution | |||
4189 | 7590241 | Receiver and receiving method | |||
4190 | 7590236 | Identity-based-encryption system | |||
4191 | 7590235 | Reduction calculations in elliptic curve cryptography | |||
4192 | 7587764 | Cryptic information and behavior generation for competitive environments | |||
4193 | 7587759 | Intrusion prevention for active networked applications | |||
4194 | 7587756 | Methods and apparatus for a secure proximity integrated circuit card transactions | |||
4195 | 7587752 | Methods and apparatus for providing a control channel in a data network | |||
4196 | 7587749 | Computer method and apparatus for managing data objects in a distributed context | |||
4197 | 7587609 | Method and system for secure alert messaging | |||
4198 | 7587606 | Emergency web keys | |||
4199 | 7587604 | Watermark signal generating method | |||
4200 | 7587603 | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections | |||
4201 | 7587602 | Methods and devices responsive to ambient audio | |||
4202 | 7587601 | Digital watermarking methods and apparatus for use with audio and video content | |||
4203 | 7587600 | Loading data onto an electronic device | |||
4204 | 7587599 | System and method for providing services | |||
4205 | 7587595 | Method and apparatus for providing software-based security coprocessors | |||
4206 | 7587587 | Data path security processing | |||
4207 | 7587367 | Method and system to provide feedback data within a distributed e-commerce system | |||
4208 | 7587125 | Reproducing/recording apparatus | |||
4209 | 7587051 | System and method for securing information, including a system and method for setting up a correspondent pairing | |||
4210 | 7587050 | Method, system, base station and data carrier for clash-free transmission between a base station and a number of mobile data carriers | |||
4211 | 7587049 | Active stabilization of a one-way QKD system | |||
4212 | 7587047 | Chaos generator for accumulation of stream entropy | |||
4213 | 7587046 | Method and apparatus for generating keystream | |||
4214 | 7587045 | System and method for securing document transmittal | |||
4215 | 7584512 | Restricted software and hardware usage on a computer | |||
4216 | 7584505 | Inspected secure communication protocol | |||
4217 | 7584500 | Pre-fetching secure content using proxy architecture | |||
4218 | 7584499 | Policy algebra and compatibility model | |||
4219 | 7584363 | Fair blind signature process | |||
4220 | 7584362 | Systems and methods for providing signatures | |||
4221 | 7584358 | Tamper resistant module certification authority | |||
4222 | 7584352 | Protection against denial of service attacks | |||
4223 | 7584149 | System and method for securing data through a PDA portal | |||
4224 | 7583803 | QKD stations with fast optical switches and QKD systems using same | |||
4225 | 7583801 | Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data | |||
4226 | 7583800 | Encryption apparatus and method in a wireless communications system | |||
4227 | 7581257 | System for handling network transactions | |||
4228 | 7581244 | IMX session control and authentication | |||
4229 | 7581241 | Generating an outbound connection security policy based on an inbound connections security policy | |||
4230 | 7581113 | System and method for generating and authenticating a computer password | |||
4231 | 7581109 | Delegation of electronic signature by multi-agent cryptography | |||
4232 | 7581105 | Electronic signing apparatus and methods | |||
4233 | 7581103 | Software self-checking systems and methods | |||
4234 | 7581101 | Network invitation arrangement and method | |||
4235 | 7581099 | Secure object for convenient identification | |||
4236 | 7581097 | Apparatus, system, and method for secure communications from a human interface device | |||
4237 | 7581095 | Mobile-ad-hoc network including node authentication features and related methods | |||
4238 | 7581094 | Cryptographic checksums enabling data manipulation and transcoding | |||
4239 | 7580988 | System and methods for managing the distribution of electronic content | |||
4240 | 7580529 | Method for verifying digital franking notes | |||
4241 | 7580525 | Sub-scrambling/descrambling method and sub-scrambling/descrambling device | |||
4242 | 7580523 | Distribution of video content using client to host pairing of integrated receivers/decoders | |||
4243 | 7580521 | Identity-based-encryption system with hidden public key attributes | |||
4244 | 7580520 | Methods for scaling a progressively encrypted sequence of scalable data | |||
4245 | 7577999 | Publishing digital content within a defined universe such as an organization in accordance with a digital rights management (DRM) system | |||
4246 | 7577985 | Trusted handler and data association | |||
4247 | 7577844 | Systems and methods for encoding randomly distributed features in an object | |||
4248 | 7577841 | Watermark placement in watermarking of time varying media signals | |||
4249 | 7577840 | Transferring application secrets in a trusted operating system environment | |||
4250 | 7577839 | Transferring application secrets in a trusted operating system environment | |||
4251 | 7577838 | Hybrid systems for securing digital assets | |||
4252 | 7577836 | Method and system for secured wireless data transmission to and from a remote device | |||
4253 | 7577833 | Apparatus and method for high speed IPSec processing | |||
4254 | 7577258 | Apparatus and method for group session key and establishment using a certified migration key | |||
4255 | 7577257 | Large scale quantum cryptographic key distribution network | |||
4256 | 7577255 | Proxy method and system for secure wireless administration of managed entities | |||
4257 | 7577254 | Detector autocalibration in QKD systems | |||
4258 | 7577253 | Conditional access method and devices | |||
4259 | 7577250 | Key derivation functions to enhance security | |||
4260 | 7574741 | Method and system for preventing operating system detection | |||
4261 | 7574740 | Method and system for intrusion detection in a computer network | |||
4262 | 7574737 | Systems and methods for secure communication over a wireless network | |||
4263 | 7574734 | System and method for sequentially processing a biometric sample | |||
4264 | 7574731 | Self-managed network access using localized access management | |||
4265 | 7574607 | Secure pipeline processing | |||
4266 | 7574605 | Method of managing digital signature, apparatus for processing digital signature, and a computer readable medium for recording program of managing digital signature | |||
4267 | 7574604 | Network device registration | |||
4268 | 7574603 | Method of negotiating security parameters and authenticating users interconnected to a network | |||
4269 | 7574602 | Information-processing device, information-processing method, and information-processing program product | |||
4270 | 7574600 | System and method for combining user and platform authentication in negotiated channel security protocols | |||
4271 | 7574599 | Robust authentication and key agreement protocol for next-generation wireless networks | |||
4272 | 7574594 | Network authentication based on inter-packet gap characteristics | |||
4273 | 7574571 | Hardware-based encryption/decryption employing dual ported memory and fast table initialization | |||
4274 | 7574407 | System and method for selecting, ordering and accessing copyrighted information from physical documents | |||
4275 | 7574406 | System and method maximizing video license utilization using billboard services | |||
4276 | 7574014 | Digital watermark detection utilizing host carrier information | |||
4277 | 7571484 | System and method for image authentication of a resource-sparing operating system | |||
4278 | 7571480 | Presentation of correlated events as situation classes | |||
4279 | 7571469 | Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity | |||
4280 | 7571466 | Parental consent service | |||
4281 | 7571465 | Information exchanging system, information communication terminal, information exchanging method, and computer product | |||
4282 | 7571326 | Relative latency dynamics for identity authentication | |||
4283 | 7571325 | Remote identification of blocked websites while maintaining user privacy | |||
4284 | 7571324 | Method and device for anonymous signature with a shared private key | |||
4285 | 7571323 | Image processor, method thereof, computer program, and computer readable storage medium | |||
4286 | 7571322 | Enhanced cookie management | |||
4287 | 7571321 | Identity-based-encryption messaging system | |||
4288 | 7571320 | Circuit and method for providing secure communications between devices | |||
4289 | 7571319 | Validating inbound messages | |||
4290 | 7571317 | Providing user notification signals in phones that use encryption | |||
4291 | 7571316 | Method and device for transforming a digital signal | |||
4292 | 7571315 | Method and apparatus to assign trust to a key | |||
4293 | 7571312 | Methods and apparatus for generating endorsement credentials for software-based security coprocessors | |||
4294 | 7571310 | Method for detecting security module for link protection in ethernet passive optical network | |||
4295 | 7571309 | Method and apparatus for providing security mechanism guaranteeing transparency at transport layer | |||
4296 | 7571308 | Method for controlling access to a network by a wireless client | |||
4297 | 7570782 | Method and system for watermarking | |||
4298 | 7570768 | Systems, structures, and methods for decrypting encrypted digital content when a rights management server has been decommissioned | |||
4299 | 7570767 | Decoupling error correction from privacy amplification in quantum key distribution | |||
4300 | 7570766 | Transparently embedding non-compliant data in a data stream | |||
4301 | 7570765 | Method and an apparatus to perform secure real-time transport protocol-on-the-fly | |||
4302 | 7570764 | Sequence number calculation and authentication in a communications system | |||
4303 | 7570761 | Method and system for preventing unauthorized recording of media content in the iTunes.TM. environment | |||
4304 | 7570420 | Systems and methods for transmitting quantum and classical signals over an optical network | |||
4305 | 7570419 | Quantum entanglement photon-pair producing device and quantum entanglement photon pair producing method | |||
4306 | 7568235 | Controlling data access using security label components | |||
4307 | 7568234 | Robust and flexible digital rights management involving a tamper-resistant identity module | |||
4308 | 7568223 | Internet protocol telephony security architecture | |||
4309 | 7568216 | Methods for defining and naming iSCSI targets using volume access and security policy | |||
4310 | 7568113 | Reliable storage medium access control method and device | |||
4311 | 7568110 | Cryptography accelerator interface decoupling from cryptography processing cores | |||
4312 | 7568106 | Cooperative non-repudiated message exchange in a network environment | |||
4313 | 7568105 | Parallel distribution and fingerprinting of digital content | |||
4314 | 7568104 | Method and apparatus for adding signature information to electronic documents | |||
4315 | 7568100 | Steganographic method and device | |||
4316 | 7568099 | Method and apparatus for avoiding IKE process conflict | |||
4317 | 7568098 | Systems and methods for enhancing security of communication over a public network | |||
4318 | 7568097 | Method for file system security by controlling access to the file system resources using externally stored attributes | |||
4319 | 7568096 | Rendering digital content in a content protection system according to a plurality of chained digital licenses | |||
4320 | 7568095 | Method of aggregating multiple certificate authority services | |||
4321 | 7568094 | Content providing system, user system, tracing system, apparatus, method, and program | |||
4322 | 7568093 | System and method for service tagging for enhanced packet processing in a network environment | |||
4323 | 7567921 | Method and system for providing commercial information and operating an electronic commerce system over a global communications network with company and constituency nodes | |||
4324 | 7567674 | Content transmission apparatus, content reception apparatus, content transmission program, and content reception program | |||
4325 | 7567670 | Verification information for digital video signal | |||
4326 | 7567668 | Calculating unit and method for performing an arithmetic operation with encrypted operands | |||
4327 | 7565702 | Password-based key management | |||
4328 | 7565700 | Method for tracking the expiration of encrypted content using device relative time intervals | |||
4329 | 7565699 | System and method for detecting computer port inactivity | |||
4330 | 7565697 | Systems and methods for preventing unauthorized use of digital content | |||
4331 | 7565691 | Information processing apparatus, authentication processing method, and computer program | |||
4332 | 7565690 | Intrusion detection | |||
4333 | 7565685 | Operating system independent data management | |||
4334 | 7565684 | Declarative configuration of enterprises services | |||
4335 | 7565552 | Method for protecting against manipulation of a controller for at least one motor vehicle component and controller | |||
4336 | 7565549 | System and method for the managed security control of processes on a computer system | |||
4337 | 7565548 | Biometric print quality assurance | |||
4338 | 7565547 | Trust inheritance in network authentication | |||
4339 | 7565545 | Method, system and program product for auditing electronic transactions based on biometric readings | |||
4340 | 7565543 | System and method for authenticating a web page | |||
4341 | 7565542 | Remote authentication of an object using a signature part | |||
4342 | 7565541 | Digital fingerprint identification system | |||
4343 | 7565540 | Fully electronic identity authentication | |||
4344 | 7565536 | Method for secure delegation of trust from a security device to a host computer application for enabling secure access to a resource on the web | |||
4345 | 7565535 | Systems and methods for demonstrating authenticity of a virtual machine using a security image | |||
4346 | 7565530 | Source device and method for controlling output to sink device according to each content | |||
4347 | 7565529 | Secure authentication and network management system for wireless LAN applications | |||
4348 | 7565528 | Method for generating asymmetrical cryptographic keys by the user | |||
4349 | 7565527 | Technique for asymmetric crypto-key generation | |||
4350 | 7565526 | Three component secure tunnel | |||
4351 | 7565329 | Biometric financial transaction system and method | |||
4352 | 7565322 | Systems and methods for serverless software licensing | |||
4353 | 7564991 | Device, device control method, and program | |||
4354 | 7564977 | System, method and program product for anonymous transfer of messages | |||
4355 | 7564976 | System and method for performing security operations on network data | |||
4356 | 7564973 | Digital watermark embedding device and digital watermark embedding method | |||
4357 | 7564969 | Methodology, system and computer readable medium for detecting file encryption | |||
4358 | 7562397 | Method and system for facilitating search, selection, preview, purchase evaluation, offering for sale, distribution, and/or sale of digital content and enhancing the security thereof | |||
4359 | 7562395 | System and method for accessing protected content in a rights-management architecture | |||
4360 | 7562392 | Methods of interacting with audio and ambient music | |||
4361 | 7562389 | Method and system for network security | |||
4362 | 7562387 | Method and apparatus for selective disabling of tracking of click stream data | |||
4363 | 7562222 | System and method for authenticating entities to users | |||
4364 | 7562220 | System and method for programming an isolated computing environment | |||
4365 | 7562218 | Method, system and device for authenticating a user | |||
4366 | 7562217 | Web service provider and authentication service provider | |||
4367 | 7562215 | System and method for electronic document security | |||
4368 | 7562214 | Data processing systems | |||
4369 | 7562213 | Approaches for applying service policies to encrypted packets | |||
4370 | 7562212 | Methods and systems for automated authentication, processing and issuance of digital certificates | |||
4371 | 7562211 | Inspecting encrypted communications with end-to-end integrity | |||
4372 | 7561696 | Delivering policy updates for protected content | |||
4373 | 7561695 | Key information issuing device, wireless device, and medium | |||
4374 | 7561693 | Method for automatically entering into secure communication mode in wireless communication terminal | |||
4375 | 7561689 | Generating keys having one of a number of key sizes | |||
4376 | 7559090 | Memory, information apparatus for access to the memory, and method for the information apparatus | |||
4377 | 7559088 | Method and apparatus for deleting data upon expiration | |||
4378 | 7558965 | Entity authentication in electronic communications by providing verification status of device | |||
4379 | 7558964 | Cued one-time passwords | |||
4380 | 7558962 | Method of authenticating a print medium online | |||
4381 | 7558960 | Network infrastructure validation of network management frames | |||
4382 | 7558957 | Providing fresh session keys | |||
4383 | 7558956 | Communications device and communications program | |||
4384 | 7558955 | Method and apparatus for secure instant messaging utilizing server-supervised publication | |||
4385 | 7558954 | Method and apparatus for ensuring the integrity of data | |||
4386 | 7558953 | Loading data into a mobile terminal | |||
4387 | 7558952 | Method and apparatus for accelerating public-key certificate validation | |||
4388 | 7558951 | System and method for secure transactions over a network | |||
4389 | 7558834 | Method and system to process issue data pertaining to a system | |||
4390 | 7558389 | Method and system of generating a speech signal with overlayed random frequency signal | |||
4391 | 7558387 | Gathering randomness in a wireless smart card reader | |||
4392 | 7557941 | Use of variant and base keys with three or more entities | |||
4393 | 7555785 | Method and apparatus for content management | |||
4394 | 7555783 | Wireless network credential provisioning | |||
4395 | 7555782 | Arrangement and method for limiting access to access-protected data in a system during remote servicing thereof | |||
4396 | 7555781 | Security component for a computing device | |||
4397 | 7555772 | Wireless firewall with tear down messaging | |||
4398 | 7555655 | Apparatus, system, and method for generating and authenticating a computer password | |||
4399 | 7555653 | Data processing apparatus, program for use therewith, and method for use therewith | |||
4400 | 7555652 | Method for user attestation signatures with attributes | |||
4401 | 7555651 | Time management apparatus and time management method | |||
4402 | 7555650 | Techniques for reducing the computational cost of embedding information in digital representations | |||
4403 | 7555649 | Method for generating digital watermarks for electronic documents | |||
4404 | 7555648 | Content management system, recording medium and method | |||
4405 | 7555647 | Encoding device, decoding device, encoding method, decoding method, and program therefor | |||
4406 | 7555646 | Efficient implementation of zero knowledge protocols | |||
4407 | 7555584 | Providing additional channels for an MSL architecture | |||
4408 | 7555550 | Asset tracker for identifying user of current internet protocol addresses within an organization's communications network | |||
4409 | 7555129 | Content playback apparatus, content playback method, and program | |||
4410 | 7555126 | Game apparatus managing system, game apparatus, controlling method, computer program and recording medium | |||
4411 | 7555124 | Secure video system for display adaptor | |||
4412 | 7555123 | Processing an MPEG elementary stream in a conditional access overlay environment | |||
4413 | 7555121 | Methods and apparatus for implementing a cryptography engine | |||
4414 | 7552482 | Data security system and method | |||
4415 | 7552480 | Method and system of assessing risk using a one-dimensional risk assessment model | |||
4416 | 7552479 | Detecting shellcode that modifies IAT entries | |||
4417 | 7552467 | Security systems for protecting an asset | |||
4418 | 7552345 | Implementation of storing secret information in data storage reader products | |||
4419 | 7552344 | Hardware-based encryption/decryption employing dual ported key storage | |||
4420 | 7552341 | Licensing the use of software on a particular CPU | |||
4421 | 7552340 | Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks | |||
4422 | 7552339 | Image transmission device, operations management method, and computer-readable medium having operations management program embodied therein | |||
4423 | 7552338 | Dynamic multimedia fingerprinting system | |||
4424 | 7552337 | Service protection | |||
4425 | 7552336 | Watermarking with covert channel and permutations | |||
4426 | 7552335 | Information processing apparatus, method therefor, computer program, and computer-readable storage medium | |||
4427 | 7552333 | Trusted authentication digital signature (tads) system | |||
4428 | 7552332 | Java based electronic signature capture method, device and system | |||
4429 | 7552330 | Mutual authentication system between user and system | |||
4430 | 7552329 | Masked digital signatures | |||
4431 | 7552326 | Use of kernel authorization data to maintain security in a digital processing system | |||
4432 | 7552324 | Printer and print system, and data receiving device and data transmitting and receiving system | |||
4433 | 7552322 | Using a portable security token to facilitate public key certification for devices in a network | |||
4434 | 7552321 | Method and hybrid system for authenticating communications | |||
4435 | 7552093 | Resolving license dependencies for aggregations of legally-protectable content | |||
4436 | 7551915 | Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent | |||
4437 | 7551740 | Weighted secret sharing and reconstructing method | |||
4438 | 7549922 | Software security for gaming devices | |||
4439 | 7549172 | Data processing apparatus for digital copyrights management | |||
4440 | 7549160 | Method and system for authenticated access to internet protocol (IP) multicast traffic | |||
4441 | 7549147 | Security framework for protecting rights in computer software | |||
4442 | 7549063 | Methods and systems of protecting digital content | |||
4443 | 7549062 | Organization-based content rights management and systems, structures, and methods therefor | |||
4444 | 7549061 | Unauthorized contents detection system | |||
4445 | 7549060 | Using a rights template to obtain a signed rights label (SRL) for digital content in a digital rights management system | |||
4446 | 7549058 | Method and apparatus for encrypting and decrypting digital data | |||
4447 | 7549057 | Secure transactions with passive storage media | |||
4448 | 7549056 | System and method for processing and protecting content | |||
4449 | 7549053 | Method and system for efficiently retrieving secured data by securely pre-processing provided access information | |||
4450 | 7549052 | Generating and matching hashes of multimedia content | |||
4451 | 7549051 | Long-life digital certification for publishing long-life digital content or the like in content rights management system or the like | |||
4452 | 7549049 | Dynamic auditing of electronic elections | |||
4453 | 7549048 | Efficient and secure authentication of computing systems | |||
4454 | 7549046 | Method and system for vehicle authorization of a service technician | |||
4455 | 7549045 | Delegate registration in a managed code execution environment | |||
4456 | 7549044 | Block-level storage device with content security | |||
4457 | 7548889 | Payment information security for multi-merchant purchasing environment for downloadable products | |||
4458 | 7548624 | Distribution of broadcast content for remote decryption and viewing | |||
4459 | 7548623 | Communication system, communication device, and communication method | |||
4460 | 7548622 | System and method for the concealment of device input parameters | |||
4461 | 7548621 | System and method for securing a base derivation key for use in injection of derived unique key per transaction devices | |||
4462 | 7548618 | Converter, encryption/decryption system, multi-stage converter, converting method, multi-stage converting method, program, and information recording medium | |||
4463 | 7546637 | Structures and methods for using geo-location in security detectors | |||
4464 | 7546632 | Methods and apparatus to configure a network device via an authentication protocol | |||
4465 | 7546629 | System and methodology for security policy arbitration | |||
4466 | 7546470 | Selective computer component activation apparatus method and system | |||
4467 | 7546469 | Image forming apparatus, method for controlling writing data from the same to storage device, method for controlling reading data from storage device to the same, and replacement part therefor | |||
4468 | 7546468 | Program update method and server | |||
4469 | 7546467 | Time domain watermarking of multimedia signals | |||
4470 | 7546466 | Decoding of watermarked information signals | |||
4471 | 7546465 | Instant messaging private tags | |||
4472 | 7546464 | Network access terminal, network system, method of network system, storage medium, and program code | |||
4473 | 7546463 | Method and system for delegating authority in an online collaborative environment | |||
4474 | 7546462 | Systems and methods for integration adapter security | |||
4475 | 7546460 | Secure communications across multiple protocols | |||
4476 | 7546459 | GSM-like and UMTS-like authentication in a CDMA2000 network environment | |||
4477 | 7546458 | Method for organizing virtual networks while optimizing security | |||
4478 | 7546456 | IPv6 address ownership solution based on zero-knowledge identification protocols or based on one time password | |||
4479 | 7546455 | Digital certificate transferring method, digital certificate transferring apparatus, digital certificate transferring system, program and recording medium | |||
4480 | 7546454 | Automated digital certificate discovery and management | |||
4481 | 7546453 | Certificate management and transfer system and method | |||
4482 | 7546452 | Hardware-based credential management | |||
4483 | 7546373 | Secure dynamic credential distribution over a network | |||
4484 | 7545962 | Biometric authentication system | |||
4485 | 7545943 | Apparatus, method, and computer program product for playing back content | |||
4486 | 7545942 | Security key distribution using key rollover strategies for wireless networks | |||
4487 | 7545938 | Digital watermarking which allows tampering to be detected on a block-specific basis | |||
4488 | 7545934 | Security information packaging system, LSI, and security information packaging method | |||
4489 | 7545932 | Secure authenticated channel | |||
4490 | 7545930 | Portable terminal | |||
4491 | 7545928 | Triple DES critical timing path improvement | |||
4492 | 7543293 | Privelege level changing for virtual memory mapping | |||
4493 | 7543156 | Transaction authentication card | |||
4494 | 7543153 | Digital signature generating apparatus, method, computer program and computer-readable storage medium | |||
4495 | 7543152 | Methods and arrangements for realising betting with off-line terminals | |||
4496 | 7543151 | Method and apparatus for securing and authenticating encoded data and documents containing such data | |||
4497 | 7543150 | Method and system for setting up hosting environments in safety | |||
4498 | 7543149 | Method, system and computer product for securing patient identity | |||
4499 | 7543147 | Method, system, and storage medium for creating a proof of possession confirmation for inclusion into an attribute certificate | |||
4500 | 7543145 | System and method for protecting configuration settings in distributed text-based configuration files | |||
4501 | 7543144 | System and method for lost data destruction of electronic data stored on portable electronic devices | |||
4502 | 7543143 | Service data multicasting system and method therefor and security key generating system | |||
4503 | 7543142 | Method and apparatus for performing an authentication after cipher operation in a network processor | |||
4504 | 7543141 | Method and apparatus for user authentication using infrared communication of a mobile terminal | |||
4505 | 7543139 | Revocation of anonymous certificates, credentials, and access rights | |||
4506 | 7543138 | Image server and method of controlling same | |||
4507 | 7542584 | Image processing method, image processing apparatus, program and recording medium that can reduce image quality degradation | |||
4508 | 7542572 | Method for securely and automatically configuring access points | |||
4509 | 7542571 | Transmitting second content data with reference for use with first content data | |||
4510 | 7542570 | Information encryption transmission/reception method | |||
4511 | 7542569 | Security of data connections | |||
4512 | 7542567 | Method and apparatus for providing security in a data processing system | |||
4513 | 7542071 | Image transmission system, image pickup apparatus, image pickup apparatus unit, key generating apparatus, and program | |||
4514 | 7541920 | Alarm/event encryption in an industrial environment | |||
4515 | 7540023 | Information processing apparatus and authentication program storage medium | |||
4516 | 7540019 | Processing device capable of implementing flexible access control | |||
4517 | 7540017 | Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor | |||
4518 | 7539875 | Secure repository with layers of tamper resistance and system and method for providing same | |||
4519 | 7539873 | Original data circulation method, system, apparatus, and computer readable medium | |||
4520 | 7539871 | System and method for identifying message propagation | |||
4521 | 7539870 | Media watermarking by biasing randomized statistics | |||
4522 | 7539869 | System and methods for using a signature protocol by a nonsigning client | |||
4523 | 7539866 | Method of cryptographing wireless data and apparatus using the method | |||
4524 | 7539865 | Data transfer device | |||
4525 | 7539864 | Methods and portable device for digitally signing data | |||
4526 | 7539862 | Method and system for verifying and updating the configuration of an access device during authentication | |||
4527 | 7539860 | Single use user IDS | |||
4528 | 7539858 | Packet encryption substituting device, method thereof, and program recording medium | |||
4529 | 7539857 | Cooperative processing and escalation in a multi-node application-layer security system and method | |||
4530 | 7539856 | Distributed authentication in a protocol-based sphere of trust in which a given external connection outside the sphere of trust may carry communications from multiple sources | |||
4531 | 7539855 | Server-based cryptography | |||
4532 | 7539648 | Secure user certification for electronic commerce employing value metering system | |||
4533 | 7539647 | Using power state to enforce software metering state | |||
4534 | 7539315 | Encrypted communication system, key delivery server thereof, terminal device and key sharing method | |||
4535 | 7539314 | Frame synchronization method for QKD systems | |||
4536 | 7539313 | System and method for key management across geographic domains | |||
4537 | 7539312 | Program update method and server | |||
4538 | 7539311 | Techniques for managing keys using a key server in a network segment | |||
4539 | 7539310 | Encryption key updating for multiple site automated login | |||
4540 | 7536727 | Content management method, recording and/or reproducing apparatus, and recording medium | |||
4541 | 7536726 | Restricted software and hardware usage on a computer | |||
4542 | 7536720 | Method and apparatus for accelerating CPE-based VPN transmissions over a wireless network | |||
4543 | 7536713 | Knowledge broadcasting and classification system | |||
4544 | 7536563 | Method and system to securely store and distribute content encryption keys | |||
4545 | 7536558 | Flash memory distribution of digital content | |||
4546 | 7536557 | Method for biometric authentication through layering biometric traits | |||
4547 | 7536556 | Method and device for entering a computer database password | |||
4548 | 7536555 | Methods for audio watermarking and decoding | |||
4549 | 7536554 | Third party authentication of files in digital systems | |||
4550 | 7536553 | Method and system for validating a security marking | |||
4551 | 7536552 | Upper-level protocol authentication | |||
4552 | 7536551 | Weakly computational zero-knowledge proof and evaluation | |||
4553 | 7536550 | Image forming apparatus and control method for same | |||
4554 | 7536549 | Methods for generating a partially encrypted and compressed database and decrypting and decompressing the database | |||
4555 | 7536548 | System and methodology providing multi-tier-security for network data exchange with industrial control components | |||
4556 | 7536547 | Secure data transmission in a network system of image processing devices | |||
4557 | 7536546 | System and method for providing encryption for rerouting of real time multi-media flows | |||
4558 | 7536544 | Trust information delivery scheme for certificate validation | |||
4559 | 7536542 | Method and system for intercepting, analyzing, and modifying interactions between a transport client and a transport provider | |||
4560 | 7536540 | Method of hardware driver integrity check of memory card controller firmware | |||
4561 | 7536464 | Methods and apparatus for performing layer 2 authentication and service selection in SSG based networks | |||
4562 | 7536436 | Reliable messaging using clocks with synchronized rates | |||
4563 | 7536360 | Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party | |||
4564 | 7536355 | Content security system for screening applications | |||
4565 | 7536027 | Digital content reproduction, data acquisition, metadata management, and digital watermark embedding | |||
4566 | 7536014 | Apparatus and method for generating scrambling code in UMTS mobile communication system | |||
4567 | 7536012 | Entangled quantum communications and quantum imaging | |||
4568 | 7536011 | Tamper-proof elliptic encryption with private key | |||
4569 | 7535488 | Image data verification system | |||
4570 | 7533735 | Digital authentication over acoustic channel | |||
4571 | 7533422 | Platform independent zero footprint decompression | |||
4572 | 7533419 | Human interactive proof service | |||
4573 | 7533412 | Processor secured against traps | |||
4574 | 7533408 | Portable computing system, apparatus and method | |||
4575 | 7533276 | Program execution device | |||
4576 | 7533271 | Method and apparatus for remote control and monitoring of a multimedia system | |||
4577 | 7533270 | Signature schemes using bilinear mappings | |||
4578 | 7533269 | Digital-signed digital document exchange supporting method and information processor | |||
4579 | 7533268 | Digital signature with an embedded view | |||
4580 | 7533267 | Anti-tampering signature method for rewritable media, anti-tampering signature apparatus for executing the method, anti-tampering signature system provided with the apparatus, and computer-readable recording medium storing anti-tampering signature program for achieving the method | |||
4581 | 7533266 | Watermark-based access control method and device | |||
4582 | 7533263 | System and method for registering a subscriber station on the packet service call state control function CSCF in a communications system | |||
4583 | 7533262 | Media data protection | |||
4584 | 7533261 | Method and apparatus for encoding and storing session data | |||
4585 | 7533260 | Method and apparatus for encoding and storing session data | |||
4586 | 7533259 | Encapsulation of secure encrypted data in a deployable, secure communication system allowing benign, secure commercial transport | |||
4587 | 7533258 | Using a network-service credential for access control | |||
4588 | 7533257 | Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access | |||
4589 | 7533256 | Method and apparatus for encryption of data on storage units using devices inside a storage area network fabric | |||
4590 | 7533255 | Method and apparatus for restricting address resolution protocol table updates | |||
4591 | 7533064 | E-mail invoked electronic commerce | |||
4592 | 7532876 | Communication system and associated method of performing mutual authentication | |||
4593 | 7532727 | Hardware-based encryption/decryption employing dual ported key storage | |||
4594 | 7532726 | Encryption/decryption device and method, encryption device and method, decryption device and method, and transmission/reception apparatus | |||
4595 | 7532724 | Method for encrypting and decrypting data for multi-level access control in an ad-hoc network | |||
4596 | 7532723 | Tokens/keys for wireless communications | |||
4597 | 7532722 | Apparatus and method for performing transparent block cipher cryptographic functions | |||
4598 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
4599 | 7530117 | Method and apparatus for preventing unauthorized use of software | |||
4600 | 7530116 | Controlling the downloading and recording of digital data | |||
4601 | 7530112 | Method and apparatus for providing network security using role-based access control | |||
4602 | 7530110 | System and method for fuzzy multi-level security | |||
4603 | 7530109 | Systems and methods for generating secure documents from scanned images | |||
4604 | 7530103 | Projection of trustworthiness from a trusted environment to an untrusted environment | |||
4605 | 7530093 | Securing applications and operating systems | |||
4606 | 7529944 | Support for multiple login method | |||
4607 | 7529943 | Systems and methods for end-to-end resource reservation authentication | |||
4608 | 7529942 | Time proof server, terminal, and time proving method | |||
4609 | 7529941 | System and method of retrieving a watermark within a signal | |||
4610 | 7529940 | Securing selected data within a message | |||
4611 | 7529939 | Method of and apparatus for transferring data | |||
4612 | 7529938 | Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information | |||
4613 | 7529937 | System and method for establishing that a server and a correspondent have compatible secure email | |||
4614 | 7529936 | Registration network for an optical sensing device | |||
4615 | 7529935 | Information communication device, information communication system, and computer program product for transmission control | |||
4616 | 7529934 | Individual certification method | |||
4617 | 7529933 | TLS tunneling | |||
4618 | 7529932 | Removable medium and system and method for writing data to same | |||
4619 | 7529931 | Managing elevated rights on a network | |||
4620 | 7529929 | System and method for dynamically enforcing digital rights management rules | |||
4621 | 7529928 | Certificate revocation system | |||
4622 | 7529927 | Specifying security for an element by assigning a scaled value representative of the relative security thereof | |||
4623 | 7529926 | Public key certification providing apparatus | |||
4624 | 7529925 | System and method for distributing keys in a wireless network | |||
4625 | 7529924 | Method and apparatus for aligning ciphered data | |||
4626 | 7529712 | Content distribution system and method | |||
4627 | 7529384 | Robust hidden data extraction method for scaling attacks | |||
4628 | 7529375 | Method for processing encrypted data for first domain received in a network pertaining to a second domain | |||
4629 | 7529374 | Method and apparatus for encrypting data | |||
4630 | 7529373 | Laser autocalibration for QKD systems | |||
4631 | 7529371 | Replaceable sequenced one-time pads for detection of cloned service client | |||
4632 | 7529369 | Data processing with a key | |||
4633 | 7529366 | Block encoding/decoding method, circuit, and device | |||
4634 | 7529365 | Device and method of applying check bit to encrypt instruction for protection | |||
4635 | 7529092 | Electromagnetic interference shield and heat sink apparatus | |||
4636 | 7526808 | Method and system for actively defending a wireless LAN against attacks | |||
4637 | 7526798 | System and method for credential delegation using identity assertion | |||
4638 | 7526797 | System and method for processing callback requests included in web-based procedure calls through a firewall | |||
4639 | 7526796 | Methods and apparatus for securely signing on to a website via a security website | |||
4640 | 7526793 | Method for authenticating database connections in a multi-tier environment | |||
4641 | 7526792 | Integration of policy compliance enforcement and device authentication | |||
4642 | 7526658 | Scalable, distributed method and apparatus for transforming packets to enable secure communication between two stations | |||
4643 | 7526657 | Information processing apparatus, information processing method, and program storage medium | |||
4644 | 7526653 | Method of data protection | |||
4645 | 7526651 | Electronic group signature method with revocable anonymity, equipment and programs for implementing the method | |||
4646 | 7526650 | Personal identifiers for protecting video content | |||
4647 | 7526649 | Session key exchange | |||
4648 | 7526648 | Cryptographic method of protecting an electronic chip against fraud | |||
4649 | 7526647 | Authorization protocol for network publishing | |||
4650 | 7526646 | Authentication system and an authentication method for authenticating mobile information terminals | |||
4651 | 7526645 | Electronic document authenticity assurance method and electronic document disclosure system | |||
4652 | 7526644 | Apparatus and method for demonstrating and confirming the status of digital certificates and other data | |||
4653 | 7526642 | Controlling delivery of certificates in a mobile communication system | |||
4654 | 7526641 | IPsec communication method, communication control apparatus, and network camera | |||
4655 | 7526640 | System and method for automatic negotiation of a security protocol | |||
4656 | 7526516 | System and method for file integrity monitoring using timestamps | |||
4657 | 7526092 | Rekey operation with multiplexing capability | |||
4658 | 7526088 | Code generator and device for the synchronous or asynchronous and permanent identification or encoding and decoding of data of any particular length | |||
4659 | 7526087 | Random number generator | |||
4660 | 7526085 | Throughput and latency of inbound and outbound IPsec processing | |||
4661 | 7526084 | Secure classifying of data with Gaussian distributions | |||
4662 | 7523505 | Methods and systems for managing distributed digital medical data | |||
4663 | 7523484 | Systems and methods of controlling network access | |||
4664 | 7523318 | Method and system for automated password generation | |||
4665 | 7523317 | Computer grid access management system | |||
4666 | 7523315 | Method and process for creating an electronically signed document | |||
4667 | 7523314 | Identity-based-encryption message management system | |||
4668 | 7523313 | Image data management apparatus | |||
4669 | 7523311 | Method for embedding electronic watermark, decoding method, and devices for the same | |||
4670 | 7523310 | Domain-based trust models for rights management of content | |||
4671 | 7523309 | Method of restricting access to emails by requiring multiple levels of user authentication | |||
4672 | 7523307 | Method for ensuring content protection and subscription compliance | |||
4673 | 7523306 | Simplified CCMP mode for a wireless local area network | |||
4674 | 7523305 | Employing cyclic redundancy checks to provide data security | |||
4675 | 7523304 | Generation of set coverings with free riders, and generation of ordered sets of meeting points, in systems which include, but are not limited to, systems for broadcast encryption and systems for certificate revocation | |||
4676 | 7523303 | System and method for distributing digital works, apparatus and method for reproducing digital works, and computer program product | |||
4677 | 7523302 | Electronic recipe management | |||
4678 | 7523300 | Communication systems | |||
4679 | 7523072 | System for controlling the distribution and use of digital works | |||
4680 | 7522732 | Method for controlling the distribution of software code updates | |||
4681 | 7522731 | Wireless service points having unique identifiers for secure communication | |||
4682 | 7522730 | Universal microphone for secure radio communication | |||
4683 | 7522729 | Encryption key setting system, access point, encryption key setting method, and authentication code setting system | |||
4684 | 7522727 | Method and apparatus for providing authentication in a communication system | |||
4685 | 7522726 | Transmitter device, transmitting method, receiver device, receiving method, communication system, and program storage medium | |||
4686 | 7522724 | System and method of transmission of generalized scalable bit-streams | |||
4687 | 7522723 | Password self encryption method and system and encryption by keys generated from personal secret information | |||
4688 | 7522599 | Label switching multicast trees for multicast virtual private networks | |||
4689 | 7519994 | Systems and methods for adaptive message interrogation through multiple queues | |||
4690 | 7519993 | Information processing terminal and information security and protection method therefor | |||
4691 | 7519991 | Method and apparatus for incrementally deploying ingress filtering on the internet | |||
4692 | 7519989 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions | |||
4693 | 7519986 | Method and apparatus for network security using a router based authentication system | |||
4694 | 7519985 | Radio communication system, radio communication control apparatus, radio communication control method, recording medium, and computer program | |||
4695 | 7519984 | Method and apparatus for handling files containing confidential or sensitive information | |||
4696 | 7519836 | Method and apparatus for the secure storage of audio signals | |||
4697 | 7519835 | Encrypted table indexes and searching encrypted tables | |||
4698 | 7519834 | Scalable method and apparatus for transforming packets to enable secure communication between two stations | |||
4699 | 7519825 | Electronic certification and authentication system | |||
4700 | 7519824 | Time stamping method employing multiple receipts linked by a nonce | |||
4701 | 7519823 | Concealed, non-intrusive watermarks for configuration bitstreams | |||
4702 | 7519822 | Method and apparatus for processing descriptive statements | |||
4703 | 7519819 | Layered security in digital watermarking | |||
4704 | 7519817 | Methods, systems and software applications for verifying certain requirements on electronic documents | |||
4705 | 7519816 | Portable computing environment solution | |||
4706 | 7519815 | Challenge-based authentication without requiring knowledge of secret authentication data | |||
4707 | 7519813 | System and method for a sidecar authentication mechanism | |||
4708 | 7519812 | Architecture and design for central authentication and authorization in an on-demand utility environment | |||
4709 | 7519811 | Data transmission controlling method and data transmission system | |||
4710 | 7519810 | Methods for conducting server-side encryption/decryption-on-demand | |||
4711 | 7519666 | Data transmission and reception system with accurate time information | |||
4712 | 7519559 | Messaging stamp authority | |||
4713 | 7519558 | Biometrically enabled private secure information repository | |||
4714 | 7519199 | Image processing method, image processor, photographic apparatus, image output unit and iris verify unit | |||
4715 | 7519184 | Wireless communication system | |||
4716 | 7519182 | Encryption device and decryption device | |||
4717 | 7519179 | Information transmission apparatus and method, information reception apparatus and method, and information-providing system | |||
4718 | 7519178 | Method, system and apparatus for ensuring a uniform distribution in key generation | |||
4719 | 7519177 | Method and system for processing a data set | |||
4720 | 7516495 | Hardware-based software authenticator | |||
4721 | 7516494 | Method, apparatus, and system for outputting information and forming image via network, and computer product | |||
4722 | 7516493 | Content distribution system, content distribution method, information processing apparatus, and program providing medium | |||
4723 | 7516491 | License tracking system | |||
4724 | 7516490 | System, method and software for supplying activation information to a subsystem | |||
4725 | 7516484 | Reader adapted for a portable computer | |||
4726 | 7516479 | Data communicating apparatus and method for managing memory of data communicating apparatus | |||
4727 | 7516477 | Method and system for ensuring that computer programs are trustworthy | |||
4728 | 7516333 | Hybrid Java-C network appliance | |||
4729 | 7516332 | Processing multi-key content | |||
4730 | 7516330 | Platform and method for establishing provable identities while maintaining privacy | |||
4731 | 7516327 | Distributing access to a data item | |||
4732 | 7516326 | Authentication system and method | |||
4733 | 7516324 | Information processing system, information management apparatus, and information processing apparatus | |||
4734 | 7516323 | Security management system in parallel processing system by OS for single processors | |||
4735 | 7516322 | Copy protection built into a network infrastructure | |||
4736 | 7516321 | Method, system and device for enabling delegation of authority and access control methods based on delegated authority | |||
4737 | 7516320 | Distributed processing architecture with scalable processing layers | |||
4738 | 7516104 | Methods of providing software over a network and related systems and computer program products | |||
4739 | 7515978 | Digital-audio-signal recording apparatus | |||
4740 | 7515730 | Progressive image quality control using watermarking | |||
4741 | 7515717 | Security containers for document components | |||
4742 | 7515569 | Access control for wireless systems | |||
4743 | 7512991 | Methods, systems, signals and media for encouraging users of computer readable content to register | |||
4744 | 7512987 | Adaptive digital rights management system for plural device domains | |||
4745 | 7512985 | System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation | |||
4746 | 7512976 | Method and apparatus for XSL/XML based authorization rules policy implementation | |||
4747 | 7512975 | Hardware-assisted credential validation | |||
4748 | 7512972 | Synchronizing for digital content access control | |||
4749 | 7512968 | System and method for secure management of remote systems | |||
4750 | 7512966 | System and method for visually rendering resource policy usage information | |||
4751 | 7512965 | Computer system security service | |||
4752 | 7512815 | Systems, methods and computer program products for high availability enhancements of virtual security module servers | |||
4753 | 7512814 | Secure and searchable storage system and method | |||
4754 | 7512805 | Machine readable medium and method for data storage security | |||
4755 | 7512804 | Data storage security apparatus and system | |||
4756 | 7512803 | Method for handling password errors | |||
4757 | 7512802 | Application authentication system, secure device, and terminal device | |||
4758 | 7512801 | Authentication system, authentication method, signing apparatus, signing method, certifying apparatus, certifying method, and a computer-readable recording medium with a program making a computer execute the method recording therein | |||
4759 | 7512798 | Organization-based content rights management and systems, structures, and methods therefor | |||
4760 | 7512794 | System and method for authentication | |||
4761 | 7512793 | Page encryption system | |||
4762 | 7512792 | Reference monitor method for enforcing information flow policies | |||
4763 | 7512791 | Communication apparatus and method for discriminating confidentiality of received data | |||
4764 | 7512789 | Mailing list server and mail transmission method thereof | |||
4765 | 7512788 | Method and apparatus for anonymous group messaging in a distributed messaging system | |||
4766 | 7512787 | Receive IPSEC in-line processing of mutable fields for AH algorithm | |||
4767 | 7512786 | Client-side boot domains and boot rules | |||
4768 | 7512785 | Revocation distribution | |||
4769 | 7512784 | Distributed subscriber management system | |||
4770 | 7512783 | Provision of security services for an ad-hoc network | |||
4771 | 7512782 | Method and system for using a web service license | |||
4772 | 7512781 | Firewall with stateful inspection | |||
4773 | 7512779 | Apparatus, and associated method, for communicating signaling data in secure form in a signaling network | |||
4774 | 7512567 | Method and system for providing biometric authentication at a point-of-sale via a mobile device | |||
4775 | 7512565 | Method for implementing secure transaction for electronic deposit (purse) | |||
4776 | 7512249 | System and method for decoding digital encoded images | |||
4777 | 7512242 | Systems and methods for quantum cryptographic key transport | |||
4778 | 7512241 | Method for generating pseudo-random keys | |||
4779 | 7512240 | Management of security key distribution | |||
4780 | 7512233 | Method and apparatus for computing a shared secret key | |||
4781 | 7512232 | Generation and validation of short digital signatures with implicit message embedding | |||
4782 | 7509687 | Remotely authenticated operation method | |||
4783 | 7509683 | System and method for authenticating digital content | |||
4784 | 7509682 | Copy protection method and system for digital media | |||
4785 | 7509681 | Interoperability of vulnerability and intrusion detection systems | |||
4786 | 7509500 | Random number generation for encrypting cellular communications | |||
4787 | 7509498 | Digital signature validation | |||
4788 | 7509496 | Device-type authentication in communication systems | |||
4789 | 7509495 | Authentication protocol | |||
4790 | 7509494 | Interface cable | |||
4791 | 7509493 | Method and system for distributing security policies | |||
4792 | 7509492 | Distributed scalable cryptographic access control | |||
4793 | 7509491 | System and method for dynamic secured group communication | |||
4794 | 7509489 | Format-agnostic system and method for issuing certificates | |||
4795 | 7509488 | Server apparatus, communication terminal apparatus, delivery system and delivery program | |||
4796 | 7509486 | Encryption processor for performing accelerated computations to establish secure network sessions connections | |||
4797 | 7509291 | Formatting value-bearing item indicia | |||
4798 | 7509290 | Methods and apparatuses for differentiating users in multi-player web-based entertainment environments | |||
4799 | 7508954 | System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities | |||
4800 | 7508945 | Self-corrector randomisation-encryption and method | |||
4801 | 7508939 | Image processing system and method for processing image data using the system | |||
4802 | 7508938 | Method and apparatus for generating and using a tamper-resistant encryption key | |||
4803 | 7508936 | Hardware accelerator for elliptic curve cryptography | |||
4804 | 7508935 | Cryptosystem for data security | |||
4805 | 7506381 | Method for securing an electronic device, a security system and an electronic device | |||
4806 | 7506380 | Systems and methods for boot recovery in a secure boot process on a computer with a hardware security module | |||
4807 | 7506378 | Data recording medium, program starting method, and program | |||
4808 | 7506376 | Copy protection method for digital media | |||
4809 | 7506373 | Method of automatically classifying a set of alarms emitted by sensors for detecting intrusions of an information security system | |||
4810 | 7506370 | Mobile security architecture | |||
4811 | 7506365 | Document distribution method and document management method | |||
4812 | 7506183 | Data authentication circuit, battery pack and portable electronic device | |||
4813 | 7506178 | Tamper-resistant re-writable data storage media | |||
4814 | 7506174 | Method and system for establishing a biometrically enabled password | |||
4815 | 7506173 | Data repository and method for promoting network storage of data | |||
4816 | 7506171 | Method and systems for securely supporting password change | |||
4817 | 7506169 | Digital watermarking maps and signs, and related navigational tools | |||
4818 | 7506167 | Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed | |||
4819 | 7506166 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |||
4820 | 7506164 | Automated key management system and method | |||
4821 | 7506162 | Methods for more flexible SAML session | |||
4822 | 7506161 | Communication session encryption and authentication system | |||
4823 | 7506160 | System and method for enhanced data security in office machine environment | |||
4824 | 7506159 | Printer and print system | |||
4825 | 7506157 | Access to content addressable data over a network | |||
4826 | 7506156 | Method and apparatus for prioritizing encrypted traffic at an intermediate node in a communications network | |||
4827 | 7506155 | E-mail virus protection system and method | |||
4828 | 7506154 | Transmission of secure electronic mail formats | |||
4829 | 7505955 | Information terminal and content storage/playback method | |||
4830 | 7505599 | Information processing system and method for managing encrypted data with tag information | |||
4831 | 7505594 | Discontinuous transmission (DTX) controller system and method | |||
4832 | 7505589 | Ternary and higher multi-value digital scramblers/descramblers | |||
4833 | 7505588 | Stream cipher design with revolving buffers | |||
4834 | 7505587 | Elliptic curve cryptosystem apparatus, storage medium storing elliptic curve cryptosystem program, and elliptic curve cryptosystem arithmetic method | |||
4835 | 7505585 | Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same | |||
4836 | 7505584 | Contents management method, contents management apparatus, and recording medium | |||
4837 | 7503074 | System and method for enforcing location privacy using rights management | |||
4838 | 7503072 | Hardware ID to prevent software piracy | |||
4839 | 7503068 | Secure ISN generation | |||
4840 | 7503065 | Method and system for gateway-based authentication | |||
4841 | 7503062 | Method and apparatus for enabling database privileges | |||
4842 | 7503060 | Reactive system safety verification device, method, program, and recording medium containing the program | |||
4843 | 7502937 | Digital watermarking security systems | |||
4844 | 7502936 | System and method providing secure access to a computer system | |||
4845 | 7502934 | Electronic signatures | |||
4846 | 7502933 | Identity authentication system and method | |||
4847 | 7502932 | Return routability method for secure communication | |||
4848 | 7502931 | Method and device for authenticating a user on a remote server | |||
4849 | 7502930 | Secure communications | |||
4850 | 7502929 | Method and apparatus for assigning network addresses based on connection authentication | |||
4851 | 7502928 | Methods and apparatus for secure data processing and transmission | |||
4852 | 7502927 | Directory enabled secure multicast group communications | |||
4853 | 7502926 | 802.1X protocol-based multicasting control method | |||
4854 | 7502925 | Method and apparatus for reducing TCP frame transmit latency | |||
4855 | 7502924 | Transparent on-demand certificate provisioning for secure email | |||
4856 | 7502923 | Systems and methods for secured domain name system use based on pre-existing trust | |||
4857 | 7502762 | Method and system for commerce with full anonymity | |||
4858 | 7502761 | Method and system for providing online authentication utilizing biometric data | |||
4859 | 7502760 | Providing payments automatically in accordance with predefined instructions | |||
4860 | 7502489 | Geographically watermarked imagery and methods | |||
4861 | 7502476 | Systems and methods of enhancing QKD security using a heralded photon source | |||
4862 | 7502475 | Method and system for secure key generation | |||
4863 | 7502468 | Method and system for generating a cryptographically random number stream | |||
4864 | 7502467 | System and method for authentication seed distribution | |||
4865 | 7502464 | Method of implementing one-to-one binary function and relative hardware device, especially for a Rijndael S-box | |||
4866 | 7500272 | Manufacturing unique devices that generate digital signatures | |||
4867 | 7500271 | Reproducing apparatus and information distribution system | |||
4868 | 7500270 | Method for utilizing intelligent clock controller in digital rights management | |||
4869 | 7500269 | Remote access to local content using transcryption of digital rights management schemes | |||
4870 | 7500268 | Method of authenticating a print medium before printing | |||
4871 | 7500267 | Systems and methods for disabling software components to protect digital media | |||
4872 | 7500111 | Querying encrypted data in a relational database system | |||
4873 | 7500109 | System and method for secure authentication of external software modules provided by third parties | |||
4874 | 7500105 | Hybrid encoding of data transmissions in a security system | |||
4875 | 7500103 | Data parsing and tokenizing apparatus, method and program | |||
4876 | 7500102 | Method and apparatus for fragmenting and reassembling internet key exchange data packets | |||
4877 | 7500101 | Recording/reproduction device, data processing device, and recording/reproduction system | |||
4878 | 7500100 | Method and apparatus for verifying revocation status of a digital certificate | |||
4879 | 7500099 | Method for mitigating web-based "one-click" attacks | |||
4880 | 7500097 | Extendable data-driven system and method for issuing certificates | |||
4881 | 7500096 | System and method for message filtering by a trusted third party | |||
4882 | 7499552 | Cipher method and system for verifying a decryption of an encrypted user data key | |||
4883 | 7499551 | Public key infrastructure utilizing master key encryption | |||
4884 | 7499550 | System and method for protecting a title key in a secure distribution system for recordable media content | |||
4885 | 7499541 | Cipher strength evaluation apparatus | |||
4886 | 7499405 | Method for testing branch execution and state transition logic in session initiation protocol application modular components | |||
4887 | 7496965 | Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system | |||
4888 | 7496769 | Hierarchical trusted code for content protection in computers | |||
4889 | 7496768 | Providing secure input and output to a trusted agent in a system with a high-assurance execution environment | |||
4890 | 7496764 | Data transmission method between a local server and local peripherals | |||
4891 | 7496760 | System, method and program product for managing user account information | |||
4892 | 7496759 | Multisignature method, apparatus, program, and system | |||
4893 | 7496758 | Method and apparatus for protecting an exponentiation calculation by means of the chinese remainder theorem (CRT) | |||
4894 | 7496756 | Content usage-right management system and management method | |||
4895 | 7496755 | Method and system for a single-sign-on operation providing grid access and network access | |||
4896 | 7496751 | Privacy and identification in a data communications network | |||
4897 | 7496749 | Method and apparatus for decrypting encrypted data transmitted wirelessly by updating a key-table | |||
4898 | 7496748 | Method for establishing a security association between two or more computers communicating via an interconnected computer network | |||
4899 | 7496540 | System and method for securing digital content | |||
4900 | 7496539 | Systems, methods and computer products for providing tape library dynamic price performance enhancement feature | |||
4901 | 7496538 | Franking method and apparatus | |||
4902 | 7496209 | Techniques and systems for embedding and detecting watermarks in digital data | |||
4903 | 7496204 | Passive entry system | |||
4904 | 7496203 | Quantum-key distribution method between a plurality of users or groups | |||
4905 | 7496202 | Architecture for manufacturing authenticatable gaming systems | |||
4906 | 7496200 | Architecture for manufacturing authenticatable gaming systems | |||
4907 | 7496199 | Method of controlling access to cryptographic resources | |||
4908 | 7496196 | Method apparatus and system of performing one or more encryption and/or decryption operations | |||
4909 | 7496037 | Apparatus, system, and method for facilitating delivery of asynchronous response messages | |||
4910 | 7495684 | Printer | |||
4911 | 7493659 | Network intrusion detection and analysis system and method | |||
4912 | 7493655 | Systems for and methods of placing user identification in the header of data packets usable in user demographic reporting and collecting usage data | |||
4913 | 7493619 | Methods for transmitting data between tasks of differing priority in a graphical modeling environment | |||
4914 | 7493499 | Method and apparatus for secure delivery and rights management of digital content | |||
4915 | 7493492 | Limiting access to publicly available object-oriented interfaces via password arguments | |||
4916 | 7493491 | Server, a terminal apparatus and an image management method | |||
4917 | 7493490 | Centralized detector of dynamic, robust, embedded-signals | |||
4918 | 7493489 | System and method for authentication of JPEG image data | |||
4919 | 7493488 | Method to disable on/off capacity in demand | |||
4920 | 7493487 | Portable computing environment | |||
4921 | 7493486 | Method and apparatus for supporting cryptographic-related activities in a public key infrastructure | |||
4922 | 7493483 | Method to prevent vulnerability to virus and worm attacks through instruction remapping | |||
4923 | 7493291 | System and method for locally sharing subscription of multimedia content | |||
4924 | 7493289 | Digital content store system | |||
4925 | 7493288 | RF payment via a mobile device | |||
4926 | 7493284 | Using visual images transferred from wireless computing device display screens | |||
4927 | 7492922 | Automated verification of copyrighted digital images | |||
4928 | 7492905 | Rolling code security system | |||
4929 | 7492904 | QKD system detector autocalibration based on bit-error rate | |||
4930 | 7492902 | Custom character-coding compression for encoding and watermarking media content | |||
4931 | 7492900 | Quantum communication system | |||
4932 | 7492899 | Authentication method for media gateway | |||
4933 | 7492898 | Rolling code security system | |||
4934 | 7492897 | Conditional access system for broadcast digital television | |||
4935 | 7492475 | Network apparatus with discriminating logic | |||
4936 | 7490248 | Method for reencryption of a database | |||
4937 | 7490246 | Method for encryption of data based on an iteration of a stored encryption key | |||
4938 | 7490244 | Blocking e-mail propagation of suspected malicious computer code | |||
4939 | 7490242 | Secure management of authentication information | |||
4940 | 7490241 | Time stamping method employing user specified time | |||
4941 | 7490240 | Electronically signing a document | |||
4942 | 7490238 | Implicit population of access control lists | |||
4943 | 7490237 | Systems and methods for caching in authentication systems | |||
4944 | 7490235 | Offline analysis of packets | |||
4945 | 7490070 | Apparatus and method for proving the denial of a direct proof signature | |||
4946 | 7490069 | Anonymous payment with a verification possibility by a defined party | |||
4947 | 7490068 | Apparatus and method for rendering digital content | |||
4948 | 7490065 | Cryptographic module for secure processing of value-bearing items | |||
4949 | 7489796 | Electronic watermark embedding device, electronic watermark detection device, method thereof, and program | |||
4950 | 7489783 | Digital certificate management system, digital certificate management apparatus, digital certificate management method, update procedure determination method and program | |||
4951 | 7489782 | Registry restore to original hardware | |||
4952 | 7489780 | Security integrated circuit | |||
4953 | 7489779 | Hardware implementation of the secure hash standard | |||
4954 | 7487549 | Information processing apparatus, information processing method, recording medium, and program | |||
4955 | 7487548 | Granular access control method and system | |||
4956 | 7487547 | Content processing apparatus and content protection program | |||
4957 | 7487546 | Hosts file protection system and method | |||
4958 | 7487543 | Method and apparatus for the automatic determination of potentially worm-like behavior of a program | |||
4959 | 7487535 | Authentication on demand in a distributed network environment | |||
4960 | 7487472 | Method, system and program product for synchronous communication between a public electronic environment and a private electronic environment | |||
4961 | 7487365 | Saving and retrieving data based on symmetric key encryption | |||
4962 | 7487364 | Method to store encrypted data | |||
4963 | 7487363 | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage | |||
4964 | 7487362 | Digital authentication over acoustic channel | |||
4965 | 7487361 | Dynamic cache lookup based on dynamic data | |||
4966 | 7487360 | Secure authentication and authorization for transaction processing | |||
4967 | 7487359 | Time stamping method employing a separate ticket and stub | |||
4968 | 7487358 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
4969 | 7487356 | Digital watermarking system using scrambling method | |||
4970 | 7487355 | Data processing apparatus and method | |||
4971 | 7487354 | Methods and systems for using digital signatures in uniform resource locators | |||
4972 | 7487352 | Architecture for manufacturing authenticatable gaming systems | |||
4973 | 7487351 | Data use management system, transmitting apparatus having management function, and data use management method | |||
4974 | 7487350 | Fixed client identification system for positive identification of client to server | |||
4975 | 7487348 | System for authenticating and screening grid jobs on a computing grid | |||
4976 | 7487225 | Registering device and method, information processing device and method, providing device and method, and program storage medium | |||
4977 | 7487129 | Method and apparatus for the distribution of digitised information on demand | |||
4978 | 7487128 | Updating usage conditions in lieu of download digital rights management protected content | |||
4979 | 7486795 | Method and apparatus for key management in distributed sensor networks | |||
4980 | 7486794 | Data-processing arrangement comprising confidential data | |||
4981 | 7486792 | Terrestrial broadcast copy protection system for digital television | |||
4982 | 7486789 | Device and method for calculation on elliptic curve | |||
4983 | 7486651 | Mobile node, an ad hoc network routing controlling method and an ad hoc network system | |||
4984 | 7484246 | Content distribution system, content distribution method, information processing apparatus, and program providing medium | |||
4985 | 7484243 | Heterogenous domain-based routing mechanism for user authentication | |||
4986 | 7484239 | Detecting heap and stack execution in the operating system using regions | |||
4987 | 7484238 | Method and apparatus for configuration management of computer system | |||
4988 | 7484105 | Flash update using a trusted platform module | |||
4989 | 7484101 | Coded data associated with an object and encoding a distributed signature | |||
4990 | 7484100 | Temporally threaded CMI watermark | |||
4991 | 7484099 | Method, apparatus, and product for asserting physical presence with a trusted platform module in a hypervisor environment | |||
4992 | 7484096 | Data validation using signatures and sampling | |||
4993 | 7484095 | System for communicating program data between a first device and a second device | |||
4994 | 7484094 | Opening computer files quickly and safely over a network | |||
4995 | 7484093 | Information processor and information processing method | |||
4996 | 7484092 | Techniques for searching encrypted files | |||
4997 | 7484090 | Encryption apparatus, decryption apparatus, secret key generation apparatus, and copyright protection system | |||
4998 | 7484088 | Methods and systems for proofing identities using a certificate authority | |||
4999 | 7483992 | Session load balancing and use of VIP as source address for inter-cluster traffic through the use of a session identifier | |||
5000 | 7483943 | Reliable messaging using clocks with synchronized rates | |||
5001 | 7483862 | System and method for prepaid biometric redemption accounts | |||
5002 | 7483547 | Perceptual modeling of media signals for data hiding | |||
5003 | 7483537 | Selecting cached RSA keys in response to RSA key requests | |||
5004 | 7483536 | Mini time key creation method | |||
5005 | 7483535 | Transmission of generalized scalable bit-streams | |||
5006 | 7483534 | Elliptic polynomial cryptography with multi y-coordinates embedding | |||
5007 | 7483533 | Elliptic polynomial cryptography with multi x-coordinates embedding | |||
5008 | 7483532 | RTP payload format | |||
5009 | 7480939 | Enhancement to authentication protocol that uses a key lease | |||
5010 | 7480938 | System and method for secure dual channel communication through a firewall | |||
5011 | 7480936 | Generic application architecture suitable for firewall traversal | |||
5012 | 7480931 | Volume mount authentication | |||
5013 | 7480919 | Safe exceptions | |||
5014 | 7480806 | Multi-token seal and unseal | |||
5015 | 7480804 | Method and system for hierarchical platform boot measurements in a trusted computing environment | |||
5016 | 7480803 | System and method for securing system content by automated device authentication | |||
5017 | 7480802 | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer | |||
5018 | 7480801 | Method for securing data traffic in a mobile network environment | |||
5019 | 7480800 | System and method for providing services employing trusted site indicators, and mobile device capable of displaying the trusted site indicators | |||
5020 | 7480799 | Traffic manager for distributed computing environments | |||
5021 | 7480798 | System and method for representing multiple security groups as a single data object | |||
5022 | 7480796 | System and method for authenticating data using incompatible digest functions | |||
5023 | 7480795 | Method for the application of implicit signature schemes | |||
5024 | 7480794 | System and methods for transparent encryption | |||
5025 | 7480687 | Pseudorandom number generator for a stream cipher | |||
5026 | 7480638 | Method and system automatically to remind parties to a network-based transaction to comply with obligations established under a transaction agreement | |||
5027 | 7480637 | Internet transaction authentication apparatus, method, and system for improving security of internet transactions | |||
5028 | 7480636 | Distribution system and method of operation thereof | |||
5029 | 7480635 | Method for financing multimedia content through advertising | |||
5030 | 7480631 | System and method for detecting and processing fraud and credit abuse | |||
5031 | 7480393 | Optimized digital watermarking functions for streaming data | |||
5032 | 7480384 | Method for distributing and authenticating public keys using random numbers and Diffie-Hellman public keys | |||
5033 | 7480383 | Apparatus and method for scrambling high-rate data | |||
5034 | 7480382 | Image file container | |||
5035 | 7480381 | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device | |||
5036 | 7479798 | Selectively disabled output | |||
5037 | 7478433 | Program execution system having authentication function | |||
5038 | 7478432 | Method and system for contents control | |||
5039 | 7478427 | Method and apparatus for providing adaptive VPN to enable different security levels in virtual private networks (VPNs) | |||
5040 | 7478424 | Propagation protection within a network | |||
5041 | 7478421 | System and method for role based access control of a document processing device | |||
5042 | 7478419 | Automated policy constraint matching for computing resources | |||
5043 | 7478247 | Methods and systems for securing data processing devices | |||
5044 | 7478245 | Session-state manager | |||
5045 | 7478244 | Access control method | |||
5046 | 7478241 | Message insertion and extraction in digital data | |||
5047 | 7478240 | Method and system for capture of location specific media related information and delivery through communications network | |||
5048 | 7478237 | System and method of allowing user mode applications with access to file data | |||
5049 | 7478236 | Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure | |||
5050 | 7478235 | Methods and systems for protecting data in USB systems | |||
5051 | 7478233 | Prevention of software tampering | |||
5052 | 7478158 | Bandwidth management system | |||
5053 | 7478069 | Method, communications system and receiver device for the billing of access-controlled programmes and/or data from broadcast transmitters | |||
5054 | 7478068 | System and method of selecting consumer profile and account information via biometric identifiers | |||
5055 | 7478067 | Authentication system for identification documents | |||
5056 | 7477749 | Integrity protection of streamed content | |||
5057 | 7477745 | License management apparatus, license management system and license management method | |||
5058 | 7477743 | Hybrid network encrypt/decrypt scheme | |||
5059 | 7477739 | Efficient storage of fingerprints | |||
5060 | 7475421 | Automatic re-authentication | |||
5061 | 7475398 | System and method for implementing a smart system call | |||
5062 | 7475256 | Secure message forwarding system detecting user's preferences including security preferences | |||
5063 | 7475255 | Analog physical signature devices and methods and systems for using such devices to secure the use of computer resources | |||
5064 | 7475250 | Assignment of user certificates/private keys in token enabled public key infrastructure system | |||
5065 | 7475247 | Method for using a portable computing device as a smart key device | |||
5066 | 7475246 | Secure personal content server | |||
5067 | 7475244 | Wireless communication device, portable terminal, communication control program and communication system | |||
5068 | 7475243 | Preventing a non-head end based service provider from sending media to a media processing system | |||
5069 | 7475242 | Controlling the distribution of information | |||
5070 | 7475241 | Methods and apparatus for dynamic session key generation and rekeying in mobile IP | |||
5071 | 7475240 | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |||
5072 | 7475239 | Pluggable trust adapter architecture, method and program product for processing communications | |||
5073 | 7475152 | Approach to provide self-protection function to web content at client side | |||
5074 | 7475046 | Electronic trading system supporting anonymous negotiation and indications of interest | |||
5075 | 7475044 | Electronic money system and electronic money terminal device | |||
5076 | 7475043 | Method and apparatus for data recipient storage and retrieval of data using a network communication device | |||
5077 | 7475042 | Provision of protected content files via payment system | |||
5078 | 7475041 | Method and system for generating postal indicia or the like | |||
5079 | 7474888 | Method for bypassing passkey exchange and authentication procedures | |||
5080 | 7474749 | Method and apparatus for achieving crypto-syncronization in a packet data communication system | |||
5081 | 7474748 | Modular inversion that is protected against espionage | |||
2008 | |||||
5082 | 7472425 | Information providing system and authentication medium access control method and computer program | |||
5083 | 7472423 | Method and apparatus for anonymously tracking TV and internet usage | |||
5084 | 7472421 | Computer model of security risks | |||
5085 | 7472417 | System for detection and indication of a secure status of appliances | |||
5086 | 7472286 | Selectively authorizing software functionality after installation of the software | |||
5087 | 7472285 | Apparatus and method for memory encryption with reduced decryption latency | |||
5088 | 7472283 | Method and apparatus for secured digital video and access tracking | |||
5089 | 7472282 | Illegal access discriminating apparatus and method | |||
5090 | 7472281 | Method for the automatic log-in of a subscriber station situated particularly in a motor vehicle in an external information system | |||
5091 | 7472280 | Digital rights management | |||
5092 | 7472279 | Method for automized and synchronous execution of customized code on off-loaded retrieved documents in a document processing system | |||
5093 | 7472278 | Remote authentication of an object using a signature encoded in a number of data portions | |||
5094 | 7472277 | User controlled anonymity when evaluating into a role | |||
5095 | 7472276 | Data card verification system | |||
5096 | 7472275 | System and method of electronic signature verification | |||
5097 | 7472274 | Authentication of an electronic tag | |||
5098 | 7472273 | Authentication in data communication | |||
5099 | 7472272 | Digital asset usage accountability via event journaling | |||
5100 | 7472270 | Secure transmission of digital content between a host and a peripheral by way of a digital rights management (DRM) system | |||
5101 | 7472268 | Privacy and security mechanism for presence systems with tuple spaces | |||
5102 | 7472165 | Support program for web application server and server | |||
5103 | 7472093 | Targeted delivery of informational content with privacy protection | |||
5104 | 7472092 | Money order device with identity verification and method | |||
5105 | 7471795 | Information transmission system | |||
5106 | 7471792 | Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus | |||
5107 | 7471690 | Packet transfer device, semiconductor device and packet transfer system | |||
5108 | 7471479 | System for protection against copying on magnetic tape recorders | |||
5109 | 7469417 | Infrastructure method and system for authenticated dynamic security domain boundary extension | |||
5110 | 7469340 | Selective encryption of electronic messages and data | |||
5111 | 7469338 | System and method for cryptographic control of system configurations | |||
5112 | 7469263 | Content management system for archiving data, managing histories, validity of content registration certification wherein the management device encrypts the content in response to a content storage, encrypts the encryption key with the media ID | |||
5113 | 7469232 | System and method for revenue sharing for multimedia sharing in social network | |||
5114 | 7469231 | Digital contents and system for receiving order for prints | |||
5115 | 7469230 | Method and system for automatically distributing fees, including a reseller commission, during a digital file transaction | |||
5116 | 7469050 | Organization-based content rights management and systems, structures, and methods therefor | |||
5117 | 7469049 | Data dependent scrambler with reduced overhead | |||
5118 | 7469048 | Methods for point compression for jacobians of hyperelliptic curves | |||
5119 | 7467415 | Distributed dynamic security for document collaboration | |||
5120 | 7467412 | Data transfer system, data transfer program and video server system | |||
5121 | 7467400 | Integrated security system having network enabled access control and interface devices | |||
5122 | 7467399 | Context-sensitive confidentiality within federated environments | |||
5123 | 7467301 | Authentication processor using a signature part | |||
5124 | 7467300 | Coded data including a distributed data stream | |||
5125 | 7467299 | Authentication device | |||
5126 | 7467298 | Methods and arrangements for selectively maintaining parental access consent in a network environment | |||
5127 | 7467297 | Apparatus of a flexible and common IPMP system for MPEG-2 content distribution and protection | |||
5128 | 7467213 | Portable device and a method for accessing a computer resource of a temporary registered user | |||
5129 | 7467113 | License verification system and method | |||
5130 | 7466826 | Method of secure transmission of digital data from a source to a receiver | |||
5131 | 7466825 | Systems and methods for added authentication in distributed network delivered half-duplex communications | |||
5132 | 7466824 | Method and system for encryption of streamed data | |||
5133 | 7466821 | Secure electronic component | |||
5134 | 7464407 | Attack defending system and attack defending method | |||
5135 | 7464406 | System and method for user determination of secure software | |||
5136 | 7464401 | Secure web access via an original CD | |||
5137 | 7464400 | Distributed environment controlled access facility | |||
5138 | 7464398 | Queuing methods for mitigation of packet spoofing | |||
5139 | 7464271 | Systems and methods of providing content protection for digital video products | |||
5140 | 7464269 | Secure method and system for handling and distributing digital media | |||
5141 | 7464268 | Customizable instant messaging private tags | |||
5142 | 7464267 | System and method for secure transmission of RTP packets | |||
5143 | 7464265 | Methods for iteratively deriving security keys for communications sessions | |||
5144 | 7464264 | Training filters for detecting spasm based on IP addresses and text-related features | |||
5145 | 7464262 | Method and apparatus for synchronizing audio and video in encrypted videoconferences | |||
5146 | 7464261 | Switching device, switching method and computer system capable of preventing error in data transmission, which is easy to use | |||
5147 | 7464162 | Systems and methods for testing whether access to a resource is authorized based on access information | |||
5148 | 7464059 | System and method for purchase benefits at a point of sale | |||
5149 | 7464058 | System and method for generating new licenses | |||
5150 | 7463752 | Imaging forming apparatus and copy management system | |||
5151 | 7463750 | Image data processing apparatus and method | |||
5152 | 7463738 | Method for providing multimedia files and terminal therefor | |||
5153 | 7461407 | Debugging port security interface | |||
5154 | 7461403 | System and method for providing passive screening of transient messages in a distributed computing environment | |||
5155 | 7461401 | Handling related connections in a firewall | |||
5156 | 7461399 | PIN recovery in a smart card | |||
5157 | 7461265 | System and method for single sign on process for websites with multiple applications and services | |||
5158 | 7461264 | Method for automatic identification control and management | |||
5159 | 7461263 | Method and apparatus for a non-revealing do-not-contact list system | |||
5160 | 7461262 | Methods and apparatus for providing security in a caching device | |||
5161 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
5162 | 7461259 | Method and apparatus to provide secure mobile file system | |||
5163 | 7461258 | Use of public switched telephone network for capturing electronic signatures in on-line transactions | |||
5164 | 7461257 | System for detecting spoofed hyperlinks | |||
5165 | 7461256 | Generating watermark signals | |||
5166 | 7461255 | Digital watermark processing apparatus, and digital contents distribution system using the apparatus | |||
5167 | 7461252 | Authentication method, program for implementing the method, and storage medium storing the program | |||
5168 | 7461250 | System and method for certificate exchange | |||
5169 | 7461249 | Computer platforms and their methods of operation | |||
5170 | 7461115 | Modular multiplier | |||
5171 | 7461029 | Method for clustered data transmission | |||
5172 | 7461007 | Reinsurance auction process | |||
5173 | 7460684 | Method and apparatus for embedding watermarks | |||
5174 | 7460672 | Method for securing data storage in a storage area network | |||
5175 | 7460669 | Encoding, decoding and communication method and apparatus | |||
5176 | 7460668 | Optimized secure media playback control | |||
5177 | 7458101 | Information viewing/listening system, information player, and information provider | |||
5178 | 7458100 | Adding copy protection to a computer program | |||
5179 | 7458098 | Systems and methods for enhancing electronic communication security | |||
5180 | 7458095 | Faster authentication with parallel message processing | |||
5181 | 7458094 | Intrusion prevention system | |||
5182 | 7458083 | Architecture for software for interactively communicate with a machine and remotely maintenance the machine | |||
5183 | 7457964 | Trusted path for transmitting content thereon | |||
5184 | 7457962 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
5185 | 7457961 | Authentication of an object using a signature encoded in a number of data portions | |||
5186 | 7457960 | Programmable processor supporting secure mode | |||
5187 | 7457959 | Data repository and method for promoting network storage of data | |||
5188 | 7457958 | System for detecting authentic e-mail messages | |||
5189 | 7457957 | Apparatus and method for issuing and authenticating securities, etc. using digital watermarking | |||
5190 | 7457955 | Method and apparatus for trusted branded email | |||
5191 | 7457952 | Authentication tag for S/W media | |||
5192 | 7457951 | Data integrity monitoring in trusted computing entity | |||
5193 | 7457947 | System for processing multiple wireless communications security policies | |||
5194 | 7457946 | Method and program product for privately communicating web requests | |||
5195 | 7457782 | Electronic settlement system, settlement apparatus and terminal | |||
5196 | 7457419 | Information processing method and apparatus for encrypting encoded data | |||
5197 | 7457418 | Method for accessing a user operable device of controlled access | |||
5198 | 7457417 | Approach for configuring wireless devices | |||
5199 | 7457416 | Key distribution center for quantum cryptographic key distribution networks | |||
5200 | 7457413 | Method and device for encrypting a message | |||
5201 | 7457412 | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party | |||
5202 | 7457411 | Information security via dynamic encryption with hash function | |||
5203 | 7457410 | Transmission/reception system | |||
5204 | 7454794 | Access control method | |||
5205 | 7454792 | Active network defense system and method | |||
5206 | 7454786 | Method for integrated security roles | |||
5207 | 7454785 | Proxy method and system for secure wireless administration of managed entities | |||
5208 | 7454784 | System and method for identity verification | |||
5209 | 7454778 | Enforcing rights management through edge email servers | |||
5210 | 7454628 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
5211 | 7454624 | Match template protection within biometric security systems | |||
5212 | 7454622 | Method and system for modular authentication and session management | |||
5213 | 7454620 | Method, device and arrangement for inserting extra information | |||
5214 | 7454619 | Method, apparatus, and program product for securely presenting situation information | |||
5215 | 7454618 | System and methods for transmitting encrypted data with encryption key | |||
5216 | 7454617 | Apparatus for validating the presence of an authorized accessory | |||
5217 | 7454615 | Centralized authentication system | |||
5218 | 7454614 | Method and apparatus for fault tolerant TCP handshaking | |||
5219 | 7454610 | Security association updates in a packet load-balanced system | |||
5220 | 7454609 | Network communications security agent | |||
5221 | 7454518 | System, device, and method for receiver access control in a multicast communication network | |||
5222 | 7454385 | Transaction signature | |||
5223 | 7454384 | Information distributing method and system | |||
5224 | 7454036 | Internet facsimile and control method thereof and communication instruction terminal | |||
5225 | 7454020 | System and method for encrypting data in pictorial data | |||
5226 | 7454017 | Information processing unit | |||
5227 | 7454016 | Data encryption system and method | |||
5228 | 7451491 | Method and a device for allowing only a specific kind of hardware to correctly execute software | |||
5229 | 7451489 | Active network defense system and method | |||
5230 | 7451486 | Stateful and cross-protocol intrusion detection for voice over IP | |||
5231 | 7451326 | Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies | |||
5232 | 7451323 | Password inputting apparatus, method of inputting password, and computer product | |||
5233 | 7451321 | Electronic signature management method | |||
5234 | 7451319 | System and method of watermarking a signal | |||
5235 | 7451318 | System and method of watermarking a signal | |||
5236 | 7451317 | Apparatus for and method of embedding watermark into original information, transmitting watermarked information, and reconstructing the watermark | |||
5237 | 7451316 | Method and system for pre-authentication | |||
5238 | 7451314 | Cryptographic authentication process | |||
5239 | 7451313 | Encryption method of application software | |||
5240 | 7451312 | Authenticated dynamic address assignment | |||
5241 | 7451311 | Method and system for decoding charging data records in mobile telephone networks | |||
5242 | 7451310 | Parallelizable authentication tree for random access storage | |||
5243 | 7451309 | Signature specification for encrypted packet streams | |||
5244 | 7451307 | Communication apparatus, communication system, communication apparatus control method and implementation program thereof | |||
5245 | 7451306 | Network security device | |||
5246 | 7451305 | Method and apparatus for securely exchanging cryptographic identities through a mutually trusted intermediary | |||
5247 | 7451147 | Flexible encryption scheme for GSO target passwords | |||
5248 | 7451108 | Method and system for measuring trade management performance | |||
5249 | 7450723 | Method and system for providing for security in communication | |||
5250 | 7450720 | Linear transformation for symmetric-key ciphers | |||
5251 | 7450719 | Gigabit Ethernet-based passive optical network and data encryption method | |||
5252 | 7450596 | Scheme for realizing communications through external network from contents processing device connected to local network in home environment | |||
5253 | 7448080 | Method for implementing secure corporate communication | |||
5254 | 7448073 | System and method for wireless local area network monitoring and intrusion detection | |||
5255 | 7448072 | Techniques for performing UMTS (Universal Mobile Telecommunications System) authentication using SIP (Session Initiation Protocol) messages | |||
5256 | 7448069 | Access-request control method, driver program for communication device, and communication device | |||
5257 | 7448068 | Automatic client authentication for a wireless network protected by PEAP, EAP-TLS, or other extensible authentication protocols | |||
5258 | 7448066 | Application server object-level security for distributed computing domains | |||
5259 | 7447917 | Obfuscated state store for rights management system and the like | |||
5260 | 7447912 | Protecting digital goods using oblivious checking | |||
5261 | 7447909 | Method and system for lawful interception of packet switched network services | |||
5262 | 7447908 | Method of authenticating a print medium offline | |||
5263 | 7447907 | Method and system for data delivery and reproduction | |||
5264 | 7447906 | Projector projecting password | |||
5265 | 7447904 | Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record | |||
5266 | 7447903 | Laddered authentication security using split key asymmetric cryptography | |||
5267 | 7447902 | Method for processing multiple wireless communications security policies | |||
5268 | 7447901 | Method and apparatus for establishing a dynamic multipoint encrypted virtual private network | |||
5269 | 7447792 | Method for distributing a video split up in spatial pieces | |||
5270 | 7447747 | Method for flexible, safe, robust, and efficient generation and serving of multi-source world-wide web content pages | |||
5271 | 7447673 | Enterprise computer system | |||
5272 | 7447663 | Method for on-line client set-up and authorization of automatic electronic funds transfers | |||
5273 | 7447662 | Transaction processing system | |||
5274 | 7447329 | Apparatus and method for producing a document verifiable for its forgery or alteration, and apparatus and method for authenticating the document | |||
5275 | 7447315 | System for determining successful reception of a message | |||
5276 | 7447311 | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |||
5277 | 7447310 | Lean multiplication of multi-precision numbers over GF(2.sup.m) | |||
5278 | 7444676 | Direct authentication and authorization system and method for trusted network of financial institutions | |||
5279 | 7444675 | Systems and methods for defining security information for web-services | |||
5280 | 7444670 | Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance | |||
5281 | 7444667 | Method and apparatus for trusted blade device computing | |||
5282 | 7444666 | Multi-domain authorization and authentication | |||
5283 | 7444523 | System and method for using address bits to signal security attributes of data in the address space | |||
5284 | 7444522 | Dynamic negotiation of security arrangements between web services | |||
5285 | 7444516 | Method, apparatus and article for off-line certification in mobile applications | |||
5286 | 7444515 | Method and apparatus for detecting predefined signatures in packet payload using Bloom filters | |||
5287 | 7444514 | Group key exchanges with failures | |||
5288 | 7444513 | Authentication in data communication | |||
5289 | 7444512 | Establishing trust without revealing identity | |||
5290 | 7444511 | LAN that allows non-authenticated external terminal station to access a predetermined device in LAN | |||
5291 | 7444510 | Methods and systems for accessing networks, methods and systems for accessing the internet | |||
5292 | 7444509 | Method and system for certification path processing | |||
5293 | 7444508 | Method of implementing secure access | |||
5294 | 7444507 | Method and apparatus for distribution of digital certificates | |||
5295 | 7444506 | Selective encryption with parallel networks | |||
5296 | 7444505 | Method, system and software for maintaining network access and security | |||
5297 | 7444372 | Peer-to-peer name resolution protocol (PNRP) security infrastructure and method | |||
5298 | 7443986 | Key allocating method and key allocation system for encrypted communication | |||
5299 | 7443985 | Systems and methods for providing secure server key operations | |||
5300 | 7443984 | Information processing system and method for distributing encrypted message data | |||
5301 | 7443980 | Hierarchical identity-based encryption and signature schemes | |||
5302 | 7443884 | Electronic data transmission and reception system | |||
5303 | 7441269 | Method and system for session accounting in wireless networks | |||
5304 | 7441266 | Wireless communication system utilizing wireless adapter | |||
5305 | 7441265 | Method and system for session based authorization and access control for networked application objects | |||
5306 | 7441263 | System, method and computer program product for providing unified authentication services for online applications | |||
5307 | 7441262 | Integrated VPN/firewall system | |||
5308 | 7441125 | Portable data carrier provide with access protection by rendering messages unfamiliar | |||
5309 | 7441122 | Method for providing secure access to a digital resource | |||
5310 | 7441121 | Device certificate self-individualization | |||
5311 | 7441119 | Offload processing for secure data transfer | |||
5312 | 7441118 | Network appliance having trusted device for providing verifiable identity and/or integrity information | |||
5313 | 7441116 | Secure resource distribution through encrypted pointers | |||
5314 | 7441115 | Method for verifying a digital signature | |||
5315 | 7441114 | Methods and systems for management and control of an automation control module | |||
5316 | 7441005 | Information supply system using communication line | |||
5317 | 7440572 | Secure wireless LAN device and associated methods | |||
5318 | 7440571 | Method for securing software updates | |||
5319 | 7440569 | Tate pairing techniques for use with hyperelliptic curves | |||
5320 | 7437772 | Method and system for access control based on content-ratings and client-specified rating allowances | |||
5321 | 7437770 | Data transfer system, data transfer apparatus, data recording apparatus, data transfer method | |||
5322 | 7437768 | Information processing apparatus and method, and program storage medium | |||
5323 | 7437757 | Token for use in online electronic transactions | |||
5324 | 7437752 | Client architecture for portable device with security policies | |||
5325 | 7437573 | Secure unsent message storage pending server connection | |||
5326 | 7437568 | Apparatus and method for establishing trust | |||
5327 | 7437567 | Portable device and method for accessing data key actuated devices | |||
5328 | 7437563 | Software integrity test | |||
5329 | 7437562 | Method and apparatus for digitally signing electronic mail that originates from a browser | |||
5330 | 7437561 | Authentication of data transmitted in a digital transmission system | |||
5331 | 7437560 | Method and apparatus for establishing a secure smart card communication link through a communication network | |||
5332 | 7437559 | Electronic message authentication | |||
5333 | 7437558 | Method and system for verifying identification of an electronic mail message | |||
5334 | 7437557 | Garbage collection system and method for a mobile communication terminal | |||
5335 | 7437555 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |||
5336 | 7437554 | Method and apparatus for generating queries for secure authentication and authorization of transactions | |||
5337 | 7437553 | Systems and methods for providing autonomous security | |||
5338 | 7437552 | User authentication system and user authentication method | |||
5339 | 7437551 | Public key infrastructure scalability certificate revocation status validation | |||
5340 | 7437550 | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |||
5341 | 7437549 | Datacast distribution system | |||
5342 | 7437548 | Network level protocol negotiation and operation | |||
5343 | 7437330 | System and method for categorizing transactions | |||
5344 | 7436966 | Secure approach to send data from one system to another | |||
5345 | 7436965 | Optical out-of-band key distribution | |||
5346 | 7436964 | Synchronization of encryption in a wireless communication system | |||
5347 | 7436962 | Method and apparatus for providing secured communication connections using a secured communication connection object | |||
5348 | 7436961 | Sentinel synchronization method for enhancing QKD security | |||
5349 | 7436959 | Data recording apparatus and recording method | |||
5350 | 7436957 | Audio cassette emulator with cryptographic media distribution control | |||
5351 | 7436956 | Document encryption | |||
5352 | 7436955 | Encrypting and decrypting a data stream | |||
5353 | 7436953 | Hacking prevention system | |||
5354 | 7436816 | Method and system for transmission-based billing of applications | |||
5355 | 7434265 | Information signal recording/reproducing system, information signal recording device, information signal reproducing device and information signal recording/reproducing process | |||
5356 | 7434258 | Method and communication system for controlling security association lifetime | |||
5357 | 7434256 | Security management for wireless clients | |||
5358 | 7434253 | User mapping information extension for protocols | |||
5359 | 7434250 | Dynamic management of access rights lists in a portable electronic object | |||
5360 | 7434231 | Methods and apparatus to protect a protocol interface | |||
5361 | 7434069 | Method and device for encryption/decryption of data on mass storage device | |||
5362 | 7434061 | Method and system for generating passwords | |||
5363 | 7434060 | Secure entry of a user-identifier in a publicly positioned device | |||
5364 | 7434058 | Generating signatures over a document | |||
5365 | 7434057 | System and method for watermarking in accessed data in a storage system | |||
5366 | 7434056 | Watermark-based copy management system and method for digital media copy protection | |||
5367 | 7434055 | Recording medium, recording method of recording medium, recording and/or reproducing method of recording medium, and data copy control method | |||
5368 | 7434054 | Asynchronous enhanced shared secret provisioning protocol | |||
5369 | 7434053 | Methods and systems for providing an identification key to a printing device | |||
5370 | 7434051 | Method and apparatus for facilitating secure cocktail effect authentication | |||
5371 | 7434049 | Method for making secure a session with data processing means under the control of several entities | |||
5372 | 7434048 | Controlling access to electronic documents | |||
5373 | 7434046 | Method and apparatus providing secure multicast group communication | |||
5374 | 7434045 | Method and apparatus for indexing an inbound security association database | |||
5375 | 7434044 | Fast re-authentication with dynamic credentials | |||
5376 | 7434043 | Cryptography accelerator data routing unit | |||
5377 | 7433888 | Schema packaging, distribution and availability | |||
5378 | 7433848 | System for carrying out a transaction | |||
5379 | 7433846 | Method of embedding permanent identification code into musical apparatus | |||
5380 | 7433474 | Method and apparatus of enciphering and deciphering data using keys enciphered and deciphered with other keys | |||
5381 | 7433473 | Data transmission method between a broadcasting center and a multimedia unit | |||
5382 | 7433472 | Digital content distribution system | |||
5383 | 7433470 | Cryptographic processing apparatus, cryptographic processing method, and computer program | |||
5384 | 7430762 | Identification card manufacturing security | |||
5385 | 7430755 | Method and system for providing persistence in a secure network access | |||
5386 | 7430754 | Method for dynamic application of rights management policy | |||
5387 | 7430714 | Document storage system including a user interface for associating documents into groups | |||
5388 | 7430671 | Systems and methods for preserving confidentiality of sensitive information in a point-of-care communications environment | |||
5389 | 7430668 | Protection of the configuration of modules in computing apparatus | |||
5390 | 7430667 | Media router | |||
5391 | 7430666 | Authentication of a remote user to a host in a data communication | |||
5392 | 7430664 | System and method for securely providing a configuration file over and open network | |||
5393 | 7430663 | System and method for enabling bulk retrieval of certificates | |||
5394 | 7430295 | Simple untrusted network for quantum cryptography | |||
5395 | 7430293 | Cryptographic device employing parallel processing | |||
5396 | 7430292 | Methods and systems for securing information communicated between communication devices | |||
5397 | 7428757 | System and methodology for validating anti-piracy security compliance and reporting thereupon, for one to a plurality of movie theaters | |||
5398 | 7428752 | Secure data accessing system and method | |||
5399 | 7428746 | System and method for secure network connectivity | |||
5400 | 7428641 | Session-state manager | |||
5401 | 7428638 | Architecture for manufacturing authenticatable gaming systems | |||
5402 | 7428637 | Dynamic authentication and initialization method | |||
5403 | 7428636 | Selective encryption system and method for I/O operations | |||
5404 | 7428512 | Information distribution system, information distribution device, information receiving device, information distribution method, information distribution program, recording medium recording the information distribution program, information receiving method, information receiving program, and recording medium recording the information receiving program | |||
5405 | 7428307 | Data reproduction apparatus capable of safely controlling reproduction time of encrypted content data and data reproduction circuit and data recording apparatus used for the same | |||
5406 | 7426751 | Recording medium, information transmission method, terminal, server, and recording method | |||
5407 | 7426750 | Network-based content distribution system | |||
5408 | 7426749 | Distributed computation in untrusted computing environments using distractive computational units | |||
5409 | 7426748 | Management mediating device, image processing apparatus, management mediating program, and storing medium storing management mediating program | |||
5410 | 7426745 | Methods and systems for transparent data encryption and decryption | |||
5411 | 7426642 | Integrating legacy application/data access with single sign-on in a distributed computing environment | |||
5412 | 7426639 | Information processing apparatus and method for managing grouped devices in an encrypted environment | |||
5413 | 7426638 | Controlling access to information on a network using an extended network universal resource locator | |||
5414 | 7426637 | Method and system for controlled media sharing in a network | |||
5415 | 7426636 | Compact secure data communication method | |||
5416 | 7426635 | Bulk certificate lifetime allocation systems, components and methods | |||
5417 | 7426634 | Method and apparatus for rate based denial of service attack detection and prevention | |||
5418 | 7426449 | Sensor fusion using self evaluating process sensors | |||
5419 | 7426276 | Method for the secured transfer of data | |||
5420 | 7426275 | Handling device and method of security data | |||
5421 | 7426274 | Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit | |||
5422 | 7426273 | Audio/video stream processing system and method for data copy protection | |||
5423 | 7426272 | Instrumentation privacy methods and apparatuses | |||
5424 | 7426271 | System and method for establishing secondary channels | |||
5425 | 7424746 | Intrusion detection and vulnerability assessment system, method and computer program product | |||
5426 | 7424741 | Method and system for prevention of network denial-of-service attacks | |||
5427 | 7424739 | On-machine communication verification | |||
5428 | 7424736 | Method for establishing directed circuits between parties with limited mutual trust | |||
5429 | 7424735 | System and method for computer security using multiple cages | |||
5430 | 7424621 | Data protection | |||
5431 | 7424618 | Biometric access control and time and attendance network including configurable system-on-chip (CSOC) processors with embedded programmable logic | |||
5432 | 7424617 | Offline-online incentive points system and method | |||
5433 | 7424615 | Mutually authenticated secure key exchange (MASKE) | |||
5434 | 7424614 | Identity-based encryption system | |||
5435 | 7424613 | Method of constructing domain based on public key and implementing the domain through universal plug and play (UPnP) | |||
5436 | 7424612 | Saving and retrieving data based on symmetric key encryption | |||
5437 | 7424611 | Authentication system and method | |||
5438 | 7424610 | Remote provisioning of secure systems for mandatory control | |||
5439 | 7424608 | Mechanism for layered authentication | |||
5440 | 7424606 | System and method for authenticating an operating system | |||
5441 | 7424605 | Communication system, server device, client device and method for controlling the same | |||
5442 | 7424460 | Image ordering system and method | |||
5443 | 7424458 | Method and system for generating characterizing information descriptive of printed material such as address blocks and generating postal indicia or the like incorporating such characterizing information | |||
5444 | 7424284 | Secure network/service access | |||
5445 | 7424116 | Method and apparatus for providing authentication in a communication system | |||
5446 | 7424115 | Generating asymmetric keys in a telecommunications system | |||
5447 | 7424112 | Ciphertext switching for syntax compliant encryption | |||
5448 | 7424111 | System and method of applying parity bits to protect transmitting and receiving data | |||
5449 | 7424034 | Information converting apparatus | |||
5450 | 7421741 | Securing digital content system and method | |||
5451 | 7421733 | System and method for providing multi-class processing of login requests | |||
5452 | 7421586 | Protecting mobile code against malicious hosts | |||
5453 | 7421583 | System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof | |||
5454 | 7421582 | Method and apparatus for mutual authentication at handoff in a mobile wireless communication network | |||
5455 | 7421581 | Method and system for controlling encoded image production | |||
5456 | 7421580 | Method and apparatus for synchronizing e-mail addresses | |||
5457 | 7421579 | Multiplexing a secure counter to implement second level secure counters | |||
5458 | 7421578 | Method and apparatus for electing a leader node in a computer network | |||
5459 | 7421577 | Communication device, control method of communication device, program and communication method | |||
5460 | 7421576 | Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes | |||
5461 | 7421516 | System and method for multi-vendor authentication to remotely activate a software-based option | |||
5462 | 7421473 | Method and apparatus for image communications capable of effectively performing receipt acknowledgement | |||
5463 | 7421083 | System for seamlessly updating service keys with automatic recovery | |||
5464 | 7421080 | Method of reconstructing a secret, shared secret reconstruction apparatus, and secret reconstruction system | |||
5465 | 7421078 | Valid medium management system | |||
5466 | 7420596 | Image sensing apparatus for generating image data and authentication data of the image data | |||
5467 | 7418727 | Method for PC client security authentication | |||
5468 | 7418702 | Concurrent web based multi-task support for control management system | |||
5469 | 7418598 | Architecture of an encryption circuit implementing various types of encryption algorithms simultaneously without a loss of performance | |||
5470 | 7418596 | Secure, efficient, and mutually authenticated cryptographic key distribution | |||
5471 | 7418595 | Replay prevention mechanism for EAP/SIM authentication | |||
5472 | 7418593 | Method and a system for performing testing in a device, and a device | |||
5473 | 7418592 | Automated banking machine system and method | |||
5474 | 7418500 | Mechanism for controlled sharing of files in a clustered application environment | |||
5475 | 7418478 | System and method for application discovery in a computing environment | |||
5476 | 7418428 | System and method for controlling delivering of a commodity | |||
5477 | 7418421 | Method, system, and apparatus for dynamically creating electronic contracts | |||
5478 | 7418401 | Secure internet transactions on unsecured computers | |||
5479 | 7418397 | Witness system | |||
5480 | 7418101 | Securely transferring user data using first and second communication media | |||
5481 | 7415731 | Content addressable information encapsulation, representation, and transfer | |||
5482 | 7415720 | User authentication system and method for controlling the same | |||
5483 | 7415719 | Policy specification framework for insider intrusions | |||
5484 | 7415614 | Cryptographic authentication with ephemeral modules | |||
5485 | 7415612 | Image encrypting method, and image decrypting method | |||
5486 | 7415611 | Accelerated signature verification on a elliptic curve | |||
5487 | 7415610 | Facilitating access to information stored on a network using an extended network universal resource locator | |||
5488 | 7415609 | Automated banking machine system and method | |||
5489 | 7415607 | Obtaining and maintaining real time certificate status | |||
5490 | 7415605 | Biometric identification network security | |||
5491 | 7415443 | Online card present transaction | |||
5492 | 7415440 | Method and system to provide secure key selection using a secure device in a watercrypting environment | |||
5493 | 7415436 | System and method for pricing and allocation of commodities or securities | |||
5494 | 7415157 | Image pickup apparatus | |||
5495 | 7415115 | Method and system for disaster recovery of data from a storage device | |||
5496 | 7415114 | Quantum key system and method | |||
5497 | 7415113 | Management of security key distribution | |||
5498 | 7415111 | Optical network unit and optical line terminal | |||
5499 | 7412606 | Copy protection using detailed copy control information | |||
5500 | 7412603 | Methods and systems for enabling secure storage of sensitive data | |||
5501 | 7412602 | Method and system for storing document images in a network file system | |||
5502 | 7412601 | Illegal data use prevention system | |||
5503 | 7412599 | Administrative remote notification system and method | |||
5504 | 7412598 | Method and system for real-time insertion of service during a call session over a communication network | |||
5505 | 7412450 | Method and apparatus for identifying tampering of data in a file system | |||
5506 | 7412424 | Third party certification of content in electronic commerce transactions | |||
5507 | 7412422 | Method and system for securing user identities and creating virtual users to enhance privacy on a communication network | |||
5508 | 7412420 | Systems and methods for enrolling a token in an online authentication program | |||
5509 | 7412304 | Power system for area containing a set of power consumers | |||
5510 | 7412062 | Method and apparatus for elliptic curve scalar multiplication | |||
5511 | 7412061 | Encrypting a digital object on a key ID selected therefor | |||
5512 | 7412060 | Contents data transmission/reception system, contents data transmitter, contents data receiver and contents data transmission/reception method | |||
5513 | 7412059 | Public-key encryption system | |||
5514 | 7412056 | Rolling code security system | |||
5515 | 7412055 | Method and system for fair exchange of user information | |||
5516 | 7412053 | Cryptographic device with stored key data and method for using stored key data to perform an authentication exchange or self test | |||
5517 | 7411868 | Estimation of time within untrusted time device disconnected from trusted time device | |||
5518 | 7409722 | Control status register access to enable domain reconfiguration | |||
5519 | 7409560 | Certification processing hardware, certification processing system and use management hardware | |||
5520 | 7409558 | Low-latency data decryption interface | |||
5521 | 7409557 | System and method for distributing trusted time | |||
5522 | 7409556 | Hybrid digital watermarking for video authentication | |||
5523 | 7409555 | Electronic document active content assurance | |||
5524 | 7409554 | Data processing system, memory device, data processing unit, and data processing method and program | |||
5525 | 7409553 | Public key certificate generation method, validation method and apparatus thereof | |||
5526 | 7409552 | Method for securing communications between a terminal and an additional user equipment | |||
5527 | 7409551 | Certificate validity authentication method and apparatus | |||
5528 | 7409549 | Methods and apparatus for dynamic home agent assignment in mobile IP | |||
5529 | 7409548 | Maintaining confidentiality of personal information during E-commerce transactions | |||
5530 | 7409547 | Adaptive transparent encryption | |||
5531 | 7409546 | Cryptographically signed filesystem | |||
5532 | 7409545 | Ephemeral decryption utilizing binding functions | |||
5533 | 7409544 | Methods and systems for authenticating messages | |||
5534 | 7409543 | Method and apparatus for using a third party authentication server | |||
5535 | 7409542 | Security association management through the use of lookup tables | |||
5536 | 7409541 | Method of transporting packets between an access interface of a subscriber installation and a shared network, and access interface implementing such method | |||
5537 | 7409540 | Categorizing electronic messages based on trust between electronic messaging entities | |||
5538 | 7409458 | Network system with shared filtering information | |||
5539 | 7409431 | Server apparatus, communications method, program for making computer execute the communications method, and computer-readable storage medium containing the program | |||
5540 | 7409352 | System and method for managing sponsorships | |||
5541 | 7409061 | Method and system for secure distribution of subscription-based game software | |||
5542 | 7409060 | Durable and undecipherable digital watermarking technique and detection of unauthorized use | |||
5543 | 7408953 | Information converting apparatus | |||
5544 | 7406710 | System and method for controlling devices at a location | |||
5545 | 7406709 | Apparatus and method for allowing peer-to-peer network traffic across enterprise firewalls | |||
5546 | 7406707 | Methods and systems for accessing networks methods and systems for accessing the internet | |||
5547 | 7406702 | Broadcasting method and broadcast receiver | |||
5548 | 7406602 | Authentication of data for a gaming machine | |||
5549 | 7406600 | Error-detectable license key fragmentation to facilitate errorless manual entry | |||
5550 | 7406599 | Indicating status for digital signatures | |||
5551 | 7406597 | Methods for efficiently authenticating multiple objects based on access patterns | |||
5552 | 7406596 | Data transfer and management system | |||
5553 | 7406595 | Method of packet encryption that allows for pipelining | |||
5554 | 7406594 | Method and apparatus for certification and authentication of users and computers over networks | |||
5555 | 7406593 | Method and apparatus for protecting information and privacy | |||
5556 | 7406472 | Integrated import/export system | |||
5557 | 7406447 | Opening price process for trading system | |||
5558 | 7406446 | System and method for trustworthy metering and deactivation | |||
5559 | 7406174 | System and method for n-dimensional encryption | |||
5560 | 7404205 | System for controlling client-server connection requests | |||
5561 | 7404088 | Digital content security system | |||
5562 | 7404087 | System and method for providing improved claimant authentication | |||
5563 | 7404085 | Authentication of handheld devices for access to applications | |||
5564 | 7404084 | Method and system to digitally sign and deliver content in a geographically controlled manner via a network | |||
5565 | 7404082 | System and method for providing authorized access to digital content | |||
5566 | 7404081 | Electronic storage apparatus, authentication apparatus and authentication method | |||
5567 | 7404080 | Methods and apparatus for efficient computation of one-way chains in cryptographic applications | |||
5568 | 7404079 | Automatic identity protection system with remote third party monitoring | |||
5569 | 7404077 | Extension of X.509 certificates to simultaneously support multiple cryptographic algorithms | |||
5570 | 7404076 | Encrypted data delivery system | |||
5571 | 7403623 | High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses | |||
5572 | 7403622 | Process for managing a symmetric key in a communication network and devices for the implementation of this process | |||
5573 | 7403621 | System for ensuring encrypted communication after handover | |||
5574 | 7403620 | Cyphering/decyphering performed by an integrated circuit | |||
5575 | 7403619 | Interface module and decoder for host | |||
5576 | 7403616 | Electronic apparatus, data recording method for the electronic apparatus, and storage medium storing program for executing the data recording method | |||
5577 | 7403615 | Methods and apparatus for accelerating ARC4 processing | |||
5578 | 7401358 | Method of controlling access to control registers of a microprocessor | |||
5579 | 7401354 | System and method for network address translation integration with IP Security | |||
5580 | 7401353 | Detecting and blocking malicious connections | |||
5581 | 7401352 | Secure system and method for enforcement of privacy policy and protection of confidentiality | |||
5582 | 7401233 | Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing | |||
5583 | 7401229 | Remote access system, remote access method, and medium containing remote access program | |||
5584 | 7401227 | System and method for providing a form for registering a sensing device with a relay device | |||
5585 | 7401226 | Public key cryptographic method based on braid groups | |||
5586 | 7401225 | Method and apparatus for publishing signature log entry | |||
5587 | 7401223 | Authentication chip for authenticating an untrusted chip | |||
5588 | 7401222 | Method of authentication of memory device and device therefor | |||
5589 | 7401221 | Advanced stream format (ASF) data stream header object protection | |||
5590 | 7401219 | Method and apparatus for protecting external call references | |||
5591 | 7401218 | Home device authentication system and method | |||
5592 | 7401217 | Secure routing protocol for an ad hoc network using one-way/one-time hash functions | |||
5593 | 7401216 | Addressing mechanisms in mobile IP | |||
5594 | 7401215 | Method and apparatus for facilitating cryptographic layering enforcement | |||
5595 | 7401054 | Content bank for objects | |||
5596 | 7401052 | Method for validating warranty compliance and ink compatibility assurance | |||
5597 | 7400730 | Cryptographic communication method in communication system | |||
5598 | 7400728 | Conditional access system and copy protection | |||
5599 | 7400725 | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein | |||
5600 | 7400724 | Device and method for use in quantum crytography | |||
5601 | 7400722 | Methods and apparatus for performing hash operations in a cryptography accelerator | |||
5602 | 7398557 | Accessing in a rights locker system for digital content access control | |||
5603 | 7398556 | System and method for managing copyrighted electronic media | |||
5604 | 7398399 | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network | |||
5605 | 7398398 | Authenticated and metered flow control method | |||
5606 | 7398396 | Electronic signature method, program and server for implementing the method | |||
5607 | 7398395 | Using multiple watermarks to protect content material | |||
5608 | 7398394 | Method and apparatus for authenticating nodes in a communications network | |||
5609 | 7398392 | Method for using communication channel round-trip response time for digital asset management | |||
5610 | 7398391 | Content addressable information encapsulation, representation, and transfer | |||
5611 | 7398389 | Kernel-based network security infrastructure | |||
5612 | 7398388 | Increasing peer privacy | |||
5613 | 7398386 | Transparent IPSec processing inline between a framer and a network component | |||
5614 | 7398311 | Selective cache flushing in identity and access management systems | |||
5615 | 7397928 | Insertion and extraction of a message in an image | |||
5616 | 7397918 | Dynamically shifting control word | |||
5617 | 7397917 | Method and apparatus for generating a cryptographic key | |||
5618 | 7397916 | System and method for protecting computer software from a white box attack | |||
5619 | 7397817 | Information converting apparatus | |||
5620 | 7395552 | Team based row level security system and method | |||
5621 | 7395551 | Method and apparatus for managing software use | |||
5622 | 7395550 | Trust management systems and methods | |||
5623 | 7395549 | Method and apparatus for providing a key distribution center without storing long-term server secrets | |||
5624 | 7395540 | Automated business software application integration | |||
5625 | 7395438 | Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication | |||
5626 | 7395435 | Secure memory device for smart cards | |||
5627 | 7395434 | Method for secure storage and verification of the administrator, power-on password and configuration information | |||
5628 | 7395433 | Method and system for sustainable digital watermarking | |||
5629 | 7395432 | Method of embedding/detecting digital watermark and apparatus for using thereof | |||
5630 | 7395431 | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method | |||
5631 | 7395430 | Secure authentication using digital certificates | |||
5632 | 7395429 | Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device | |||
5633 | 7395428 | Delegating certificate validation | |||
5634 | 7395427 | Authenticated key exchange based on pairwise master key | |||
5635 | 7395424 | Method and system for stepping up to certificate-based authentication without breaking an existing SSL session | |||
5636 | 7395423 | Security association storage and recovery in group key management | |||
5637 | 7395395 | Methods, systems, and storage mediums for monitoring consumption of storage space and relocating content contained in the storage when a predetermined condition is met | |||
5638 | 7395244 | Criticality classification system and method | |||
5639 | 7394902 | Encryption apparatus, decryption apparatus and encryption system | |||
5640 | 7394901 | Method for exchanging authentication information between a communication entity and an operator server | |||
5641 | 7394900 | Method and apparatus for preventing the interception of data being transmitted to a web site by a monitoring program | |||
5642 | 7394761 | System and method for delivering messages using alternate modes of communication | |||
5643 | 7392546 | System and method for server security and entitlement processing | |||
5644 | 7392535 | Access privilege transferring method | |||
5645 | 7392403 | Systems, methods and computer program products for high availability enhancements of virtual security module servers | |||
5646 | 7392396 | Transaction device with noise signal encryption | |||
5647 | 7392395 | Trusted and secure techniques, systems and methods for item delivery and execution | |||
5648 | 7392394 | Digital watermarking with variable orientation and protocols | |||
5649 | 7392393 | Content distribution system | |||
5650 | 7392392 | Forensic digital watermarking with variable orientation and protocols | |||
5651 | 7392391 | System and method for secure configuration of sensitive web services | |||
5652 | 7392390 | Method and system for binding kerberos-style authenticators to single clients | |||
5653 | 7392389 | Electronic transmission device, and signal transmission method | |||
5654 | 7392388 | Systems and methods for identity verification for secure transactions | |||
5655 | 7392387 | Apparatus and methods for providing secured communication | |||
5656 | 7392386 | Setuid-filter method for providing secure access to a credentials store for computer systems | |||
5657 | 7392385 | Client server system and devices thereof | |||
5658 | 7392384 | Method and system for secure storage, transmission and control of cryptographic keys | |||
5659 | 7392383 | Method and apparatus for providing process-based access controls on computer resources | |||
5660 | 7392382 | Method and apparatus for verifying data timeliness with time-based derived cryptographic keys | |||
5661 | 7392381 | Proactive forced renewal of content protection implementations | |||
5662 | 7392380 | Authentication and authorization infrastructure system with CRL issuance notification function | |||
5663 | 7392378 | Method and apparatus for routing data traffic in a cryptographically-protected network | |||
5664 | 7392377 | Secured centralized public key infrastructure | |||
5665 | 7392376 | Security module | |||
5666 | 7392375 | Peer-to-peer authentication for real-time collaboration | |||
5667 | 7392313 | Method and apparatus for partitioned environment for web application servers | |||
5668 | 7392225 | Revocation information updating method, revocation information updating apparatus and storage medium | |||
5669 | 7392037 | Wireless communication device and methods for protecting broadcasted management control messages in wireless networks | |||
5670 | 7391868 | Implicit certificate scheme | |||
5671 | 7391723 | Frame-level fibre channel CRC on switching platform | |||
5672 | 7391712 | Method and system for forward-looking tone allocation | |||
5673 | 7390952 | Electronic music apparatus system useful for user registration | |||
5674 | 7389536 | System and apparatus for limiting access to secure data through a portable computer to a time set with the portable computer connected to a base computer | |||
5675 | 7389535 | Password management | |||
5676 | 7389531 | Method and system to dynamically present a payment gateway for content distributed via a network | |||
5677 | 7389529 | Method and apparatus for generating and using nested encapsulation data | |||
5678 | 7389495 | Framework to facilitate Java testing in a security constrained environment | |||
5679 | 7389428 | Data processing system, data processing method, and program providing medium | |||
5680 | 7389425 | Biometric-based authentication in a nonvolatile memory device | |||
5681 | 7389424 | Technique for distributing software | |||
5682 | 7389423 | System and method for registering a sensing device with a relay device | |||
5683 | 7389422 | System for forwarding and verifying multiple digital signatures corresponding to users and contributions of the users in electronic mail | |||
5684 | 7389421 | Countermeasure against estimation-based attacks of spread-spectrum watermarks | |||
5685 | 7389419 | Methods for supplying cryptographic algorithm constants to a storage-constrained target | |||
5686 | 7389418 | Method of and system for controlling access to contents provided by a contents supplier | |||
5687 | 7389415 | Enabling cryptographic features in a cryptographic device using MAC addresses | |||
5688 | 7389414 | Printing system | |||
5689 | 7389412 | System and method for secure network roaming | |||
5690 | 7389411 | Secure transfer of host identities | |||
5691 | 7389273 | System and method for federated rights management | |||
5692 | 7389160 | Remote login of a personal computer | |||
5693 | 7386731 | Password input table creating method and apparatus and program thereof | |||
5694 | 7386730 | Remote medical supporting system | |||
5695 | 7386729 | Method of inserting/detecting digital watermark and apparatus for using thereof | |||
5696 | 7386728 | Security module and method for production of forge-proof documents | |||
5697 | 7386727 | Method for digital signing of a message | |||
5698 | 7386726 | Personal certification authority device | |||
5699 | 7386725 | Node device and communication control method for improving security of packet communications | |||
5700 | 7386724 | Assigning security levels to a shared component | |||
5701 | 7386723 | Method, apparatus and system for compressing IPSec-protected IP packets | |||
5702 | 7386722 | Certificate management system and method | |||
5703 | 7386721 | Method and apparatus for integrated provisioning of a network device with configuration information and identity certification | |||
5704 | 7386720 | Authentication protocol using a multi-factor asymmetric key pair | |||
5705 | 7386719 | System and method for eliminating viruses at a web page server | |||
5706 | 7386717 | Method and system for accelerating the conversion process between encryption schemes | |||
5707 | 7386716 | Device in a system operating with CAN-protocol and in a control and/or supervision system | |||
5708 | 7386518 | Method and system for facilitating transactions | |||
5709 | 7386517 | System and method for determining and/or transmitting and/or establishing communication with a mobile device user for providing, for example, concessions, tournaments, competitions, matching, reallocating, upgrading, selling tickets, other event admittance means, goods and/or services | |||
5710 | 7386516 | System and method for providing secure services over public and private networks using a removable portable computer-readable storage | |||
5711 | 7386515 | Fee imposition system for application software | |||
5712 | 7386514 | Method and mechanism for vending digital content | |||
5713 | 7386513 | Networked services licensing system and method | |||
5714 | 7386512 | Method and system for controlling and auditing content/service systems | |||
5715 | 7386131 | Tolerant digital certificate distribute system and distribute method | |||
5716 | 7386130 | Encryption secured against DPA | |||
5717 | 7383585 | Optical discs with controllable access times and method of the same | |||
5718 | 7383583 | Static and run-time anti-disassembly and anti-debugging | |||
5719 | 7383582 | Systems and methods for performing electronic surveillance | |||
5720 | 7383580 | Computer virus detection and prevention | |||
5721 | 7383577 | Method and system for encrypted network management and intrusion detection | |||
5722 | 7383574 | Method and system for limiting the impact of undesirable behavior of computers on a shared data network | |||
5723 | 7383571 | Automatic re-authentication | |||
5724 | 7383568 | Security management administration system and method | |||
5725 | 7383447 | Method for controlling database copyrights | |||
5726 | 7383442 | Nested strong loader apparatus and method | |||
5727 | 7383441 | Method and device for confirming the authenticity of a document and a safe for storing data | |||
5728 | 7383440 | Private user control of a shared remote process | |||
5729 | 7383438 | System and method for secure conditional access download and reconfiguration | |||
5730 | 7383437 | Method and system for implementing super-user-compatible privileges | |||
5731 | 7383436 | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication | |||
5732 | 7383435 | Method for encoding and decoding communication data | |||
5733 | 7383434 | System and method of looking up and validating a digital certificate in one pass | |||
5734 | 7383433 | Trust spectrum for certificate distribution in distributed peer-to-peer networks | |||
5735 | 7383432 | Software modem with hidden authentication commands | |||
5736 | 7383230 | System and method for the efficient exchange and pricing of services and intangible works | |||
5737 | 7383229 | Access control and metering system for streaming media | |||
5738 | 7382969 | Method and system for preventing the unauthorized copying of video content | |||
5739 | 7382884 | Key management for content protection | |||
5740 | 7382883 | Deriving a symmetric key from an asymmetric key for file encryption or decryption | |||
5741 | 7382882 | Secure session set up based on the wireless application protocol | |||
5742 | 7382881 | Lawful interception of end-to-end encrypted data traffic | |||
5743 | 7382880 | Method and apparatus for initializing multiple security modules | |||
5744 | 7382879 | Digital rights management negotiation for streaming media over a network | |||
5745 | 7382875 | Cryptographic method for distributing load among several entities and devices therefor | |||
5746 | 7382481 | Image communication device, method of communicating image, program and recording medium | |||
5747 | 7380710 | Payment card preloaded with unique numbers | |||
5748 | 7380280 | Rights locker for digital content access control | |||
5749 | 7380278 | Protecting software environment in isolated execution | |||
5750 | 7380275 | Secure and backward-compatible processor and secure software execution thereon | |||
5751 | 7380271 | Grouped access control list actions | |||
5752 | 7380209 | Managing electronic documents utilizing a digital seal | |||
5753 | 7380140 | Providing a protected volume on a data storage device | |||
5754 | 7380136 | Methods and apparatus for secure collection and display of user interface information in a pre-boot environment | |||
5755 | 7380135 | Diligent control of preview of stored contents | |||
5756 | 7380134 | Information recording/reproducing apparatus and method of executing encryption processing | |||
5757 | 7380133 | Anti-cloning method | |||
5758 | 7380131 | Copy protection without non-volatile memory | |||
5759 | 7380129 | Method and apparatus for detecting grid intrusions | |||
5760 | 7380126 | Methods and apparatus for controlling the transmission and receipt of email messages | |||
5761 | 7380125 | Smart card data transaction system and methods for providing high levels of storage and transmission security | |||
5762 | 7380124 | Security transmission protocol for a mobility IP network | |||
5763 | 7380123 | Remote activation of covert service channels | |||
5764 | 7380121 | Image processing device, image processing method, image processing program, and computer-readable recording medium storing the same therein | |||
5765 | 7380120 | Secured data format for access control | |||
5766 | 7380118 | Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method | |||
5767 | 7380013 | Method for providing information to a web server | |||
5768 | 7379917 | Printing control apparatus and a method of charging for printing | |||
5769 | 7379897 | Automatic payment system using RF ID tags | |||
5770 | 7379551 | Method and system for recovering password protected private data via a communication network without exposing the private data | |||
5771 | 7379550 | Method for the computer-assisted production of public keys for encoding information and device for carrying out said method | |||
5772 | 7379549 | Access control for digital content | |||
5773 | 7379548 | Virtual smart card device, method and system | |||
5774 | 7379546 | Method for XZ-elliptic curve cryptography | |||
5775 | 7378939 | Method and apparatus for providing proximity based authentication, security, and notification in a wireless system | |||
5776 | 7376974 | Apparatus and method for creating a trusted environment | |||
5777 | 7376971 | Computer implemented method and system for controlling use of digitally encoded products | |||
5778 | 7376845 | Method for calculating hashing of a message in a device communicating with a smart card | |||
5779 | 7376841 | Portable computer with a hand impression | |||
5780 | 7376838 | Method for controlled and audited access to privileged accounts on computer systems | |||
5781 | 7376836 | Systems and methods for preventing an attack on healthcare data processing resources in a hospital information system | |||
5782 | 7376835 | Implementing nonrepudiation and audit using authentication assertions and key servers | |||
5783 | 7376834 | System and method for securely controlling communications | |||
5784 | 7376833 | Anonymous decryption system, anonymous decryption method, and program | |||
5785 | 7376832 | Distributed method, system and computer program product for establishing security in a publish/subscribe data processing broker network | |||
5786 | 7376831 | Selectively encrypting different portions of data sent over a network | |||
5787 | 7376829 | Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data | |||
5788 | 7376828 | Method and apparatus for using incompletely trusted service provider point-to-point networks | |||
5789 | 7376826 | Methods and apparatus for performing encryption and authentication | |||
5790 | 7376706 | Email message filtering system and method | |||
5791 | 7376628 | Methods and systems for carrying out contingency-dependent payments via secure electronic bank drafts supported by online letters of credit and/or online performance bonds | |||
5792 | 7376624 | Secure communication and real-time watermarking using mutating identifiers | |||
5793 | 7376235 | Methods and systems for frustrating statistical attacks by injecting pseudo data into a data system | |||
5794 | 7376234 | Portable keying device and method | |||
5795 | 7376232 | Computer system security via dynamic encryption | |||
5796 | 7375837 | User-definable print-option conversion for heterogeneous cluster printing | |||
5797 | 7373671 | Method and system for user information verification | |||
5798 | 7373667 | Protecting a computer coupled to a network from malicious code infections | |||
5799 | 7373657 | Method and apparatus for controlling data and software access | |||
5800 | 7373656 | Automatic configuration for portable devices | |||
5801 | 7373654 | System, apparatus and method for updating security configurations of a plurality of servers from a centralized directory server | |||
5802 | 7373521 | Semiconductor IC, information processing method, information processing device, and program storage medium | |||
5803 | 7373517 | System and method for encrypting and decrypting files | |||
5804 | 7373516 | Systems and methods of securing resources through passwords | |||
5805 | 7373514 | High-performance hashing system | |||
5806 | 7373513 | Transmarking of multimedia signals | |||
5807 | 7373512 | Method and apparatus for providing information security to prevent digital signature forgery | |||
5808 | 7373511 | Identification device, identification system, and card issuing device and system needing identification | |||
5809 | 7373509 | Multi-authentication for a computing device connecting to a network | |||
5810 | 7373508 | Wireless security system and method | |||
5811 | 7373507 | System and method for establishing secure communication | |||
5812 | 7373506 | Data authentication system | |||
5813 | 7373504 | Kernel-level cryptographic kernel interface | |||
5814 | 7373503 | Public key certificate revocation list generation apparatus, revocation judgement apparatus, and authentication system | |||
5815 | 7373502 | Avoiding server storage of client state | |||
5816 | 7373501 | System and method for on-line diagnostics | |||
5817 | 7373500 | Secure network processing | |||
5818 | 7373499 | Methods and apparatus for delegation of cryptographic servers for capture-resilient devices | |||
5819 | 7373372 | Method for accrediting event participants | |||
5820 | 7372965 | Electric circuit management method and device | |||
5821 | 7372964 | Method and apparatus for recording information including secret information and method and apparatus for reproduction thereof | |||
5822 | 7372963 | Device for compression and encryption, and device for decompression and decryption | |||
5823 | 7372960 | Method and apparatus for performing finite field calculations | |||
5824 | 7370356 | Distributed network monitoring system and method | |||
5825 | 7370354 | Method of remotely managing a firewall | |||
5826 | 7370350 | Method and apparatus for re-authenticating computing devices | |||
5827 | 7370349 | Method and system for protecting information on a computer system | |||
5828 | 7370210 | Apparatus and method for managing processor configuration data | |||
5829 | 7370209 | Systems and methods for increasing the difficulty of data sniffing | |||
5830 | 7370206 | Self-signing electronic documents | |||
5831 | 7370205 | Content distribution system, content distribution method and terminal device | |||
5832 | 7370204 | Watermark data embedding apparatus and extracting apparatus | |||
5833 | 7370203 | Method for indivisibly modifying a plurality of sites in a microcircuit card non volatile memory, in particular a contactless card | |||
5834 | 7370202 | Security device for cryptographic communications | |||
5835 | 7370201 | Secure identification method between two radiofrequency network appliances | |||
5836 | 7370200 | Validation for secure device associations | |||
5837 | 7370198 | Total system for preventing information outflow from inside | |||
5838 | 7370197 | Method and system for authenticating messages | |||
5839 | 7370195 | Moving principals across security boundaries without service interruption | |||
5840 | 7370194 | Security gateway for online console-based gaming | |||
5841 | 7370190 | Data processing systems and methods with enhanced bios functionality | |||
5842 | 7370017 | Redistribution of rights-managed content and technique for encouraging same | |||
5843 | 7369677 | System reactions to the detection of embedded watermarks in a digital host content | |||
5844 | 7369662 | Maintaining end-to-end synchronization on a telecommunications connection | |||
5845 | 7369661 | Method and apparatus for detection of loss of cipher synchronization | |||
5846 | 7369658 | Secure modulation and demodulation | |||
5847 | 7369657 | Cryptography accelerator application program interface | |||
5848 | 7367061 | Systems, methods, and a storage medium for storing and securely transmitting digital media data | |||
5849 | 7367060 | Methods and apparatus for secure document printing | |||
5850 | 7367059 | Secure content activation during manufacture of mobile communication devices | |||
5851 | 7367058 | Encoding method | |||
5852 | 7367056 | Countering malicious code infections to computer files that have been infected more than once | |||
5853 | 7367053 | Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof | |||
5854 | 7367049 | System and method for enrolling in a biometric system | |||
5855 | 7367048 | Apparatus and method for autonomic email access control | |||
5856 | 7367047 | Portable information recording medium | |||
5857 | 7367045 | Trusted communications system | |||
5858 | 7366918 | Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer | |||
5859 | 7366917 | System and method for accessing discrete data | |||
5860 | 7366916 | Method and apparatus for an encrypting keyboard | |||
5861 | 7366911 | Methods and apparatus for computationally-efficient generation of secure digital signatures | |||
5862 | 7366910 | System and method for string filtering | |||
5863 | 7366909 | Dynamic wavelet feature-based watermark | |||
5864 | 7366908 | Digital watermarking with content dependent keys and autocorrelation properties for synchronization | |||
5865 | 7366907 | Information processing device and method and program storage medium | |||
5866 | 7366906 | Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium | |||
5867 | 7366905 | Method and system for user generated keys and certificates | |||
5868 | 7366903 | Card activated cash dispensing automated banking machine system and method | |||
5869 | 7366902 | System and method for authenticating a storage device for use with driver software in a storage network | |||
5870 | 7366901 | Device, system, method and computer readable medium for identifying and authenticating a cellular device using a short-range radio address | |||
5871 | 7366900 | Platform-neutral system and method for providing secure remote operations over an insecure computer network | |||
5872 | 7366899 | Architecture and method of multilayered DRM protection for multimedia service | |||
5873 | 7366898 | Method and apparatus for performing configuration over a network | |||
5874 | 7366897 | Method and system for communication via a computer network | |||
5875 | 7366896 | Systems and methods for limiting access to potentially dangerous code | |||
5876 | 7366894 | Method and apparatus for dynamically securing voice and other delay-sensitive network traffic | |||
5877 | 7366893 | Method and apparatus for protecting a network from attack | |||
5878 | 7366764 | Method for the identification and management of mass unsolicited e-mail | |||
5879 | 7366703 | Smartcard internet authorization system | |||
5880 | 7366702 | System and method for secure network purchasing | |||
5881 | 7366701 | Copy protection of data | |||
5882 | 7366542 | Wireless security | |||
5883 | 7366322 | Automated copyright detection in digital images | |||
5884 | 7366306 | Programmable logic device that supports secure and non-secure modes of decryption-key access | |||
5885 | 7366305 | Platform and method for establishing trust without revealing identity | |||
5886 | 7366301 | Optical watermark | |||
5887 | 7366300 | Methods and apparatus for implementing a cryptography engine | |||
5888 | 7363656 | Event detection/anomaly correlation heuristics | |||
5889 | 7363650 | System and method for incrementally distributing a security policy in a computer network | |||
5890 | 7363515 | Control systems and methods using a partially-observable markov decision process (PO-MDP) | |||
5891 | 7363507 | Device and method of preventing pirated copies of computer programs | |||
5892 | 7363505 | Security authentication method and system | |||
5893 | 7363504 | Method and system for keystroke scan recognition biometrics on a smartcard | |||
5894 | 7363500 | Tunneled authentication protocol for preventing man-in-the-middle attacks | |||
5895 | 7363499 | Blinded encryption and decryption | |||
5896 | 7363498 | Method and apparatus for facilitating secure distributed content delivery | |||
5897 | 7363497 | System for distribution of recorded content | |||
5898 | 7363496 | Authenticated ID-based cryptosystem with no key escrow | |||
5899 | 7363495 | System and method for message encryption and signing in a transaction processing system | |||
5900 | 7363494 | Method and apparatus for performing enhanced time-based authentication | |||
5901 | 7363493 | Method for protecting computer programs and data from hostile code | |||
5902 | 7363491 | Resource management in security enhanced processors | |||
5903 | 7363490 | Method and system for selective email acceptance via encoded email identifiers | |||
5904 | 7363488 | Method and apparatus for prefiltering received messages in a security system | |||
5905 | 7363487 | Method and system for dynamic client authentication in support of JAAS programming model | |||
5906 | 7363486 | Method and system for authentication through a communications pipe | |||
5907 | 7363326 | Archive with timestamps and deletion management | |||
5908 | 7363276 | Broadcast receiving method and apparatus and information distributing method and apparatus | |||
5909 | 7363244 | Methods, apparatus, and program products for inferring service usage | |||
5910 | 7362870 | Method and apparatus for recording/playing back information | |||
5911 | 7362869 | Method of distributing a public key | |||
5912 | 7362868 | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data | |||
5913 | 7362865 | Wireless network system | |||
5914 | 7362864 | Framing of transmit encoded data and linear feedback shifting | |||
5915 | 7362863 | DES hardware throughput for short operations | |||
5916 | 7360252 | Method and apparatus for secure distribution of software | |||
5917 | 7360250 | Illegal access data handling apparatus and method for handling illegal access data | |||
5918 | 7360249 | Refining behavioral detections for early blocking of malicious code | |||
5919 | 7360247 | Method for protection against fraudulent modification of data sent to a secure electronic medium | |||
5920 | 7360245 | Method and system for filtering spoofed packets in a network | |||
5921 | 7360239 | Biometric multimodal centralized authentication service | |||
5922 | 7360237 | System and method for secure network connectivity | |||
5923 | 7360096 | Securely processing client credentials used for Web-based access to resources | |||
5924 | 7360094 | Verifiable secret shuffles and their application to electronic voting | |||
5925 | 7360093 | System and method for authentication of JPEG image data | |||
5926 | 7360092 | Marking and identifying web-based authentication forms | |||
5927 | 7360091 | Secure data transfer method of using a smart card | |||
5928 | 7360090 | Method of and apparatus for authenticating control messages in a signaling network | |||
5929 | 7360089 | Registration network for optical sensing device including printer as base station | |||
5930 | 7360088 | Method and system for authenticating service using integrated circuit card | |||
5931 | 7360087 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers | |||
5932 | 7360086 | Communications control method and information relaying device for communications network system | |||
5933 | 7360085 | Method and system for providing a secure multimedia presentation | |||
5934 | 7360080 | Non-transferable anonymous credential system with optional anonymity revocation | |||
5935 | 7360078 | Communication methods and apparatus | |||
5936 | 7360076 | Security association data cache and structure | |||
5937 | 7360075 | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |||
5938 | 7359885 | System and method for device-based access privilege to an account | |||
5939 | 7359518 | Distribution of secured information | |||
5940 | 7359517 | Nestable skeleton decryption keys for digital rights management | |||
5941 | 7359515 | Method and apparatus for symmetric-key decryption | |||
5942 | 7359514 | Narrow-band single-photon source and QKD system using same | |||
5943 | 7359513 | Quantum cryptography protocol | |||
5944 | 7359512 | Authentication in a quantum cryptographic system | |||
5945 | 7359509 | Method and system for generation of cryptographic keys and the like | |||
5946 | 7359507 | Server-assisted regeneration of a strong secret from a weak secret | |||
5947 | 7359378 | Security system for preventing unauthorized packet transmission between customer servers in a server farm | |||
5948 | 7359333 | Approach for managing internet protocol telephony devices in networks | |||
5949 | 7356842 | Cryptographic revocation method using a chip card | |||
5950 | 7356837 | Centralized identification and authentication system and method | |||
5951 | 7356712 | Method of dynamically assigning network access priorities | |||
5952 | 7356710 | Security message authentication control instruction | |||
5953 | 7356708 | Decryption semiconductor circuit | |||
5954 | 7356706 | Personal authentication method and apparatus sensing user vicinity | |||
5955 | 7356705 | Biometric authentication for remote initiation of actions and services | |||
5956 | 7356704 | Aggregated authenticated identity apparatus for and method therefor | |||
5957 | 7356703 | Time-based computer access controls | |||
5958 | 7356701 | Data repository and method for promoting network storage of data | |||
5959 | 7356700 | Digital watermark-embedding apparatus and method, digital watermark-detecting apparatus and method, and recording medium | |||
5960 | 7356699 | Electronic watermark detection device and electronic watermark detection method | |||
5961 | 7356698 | Device authentication apparatus and method, and recorded medium on which device authentication program is recorded | |||
5962 | 7356697 | System and method for authentication to an application | |||
5963 | 7356696 | Proofs of work and bread pudding protocols | |||
5964 | 7356695 | Multi-level security systems | |||
5965 | 7356693 | Method for producing certificate revocation lists | |||
5966 | 7356692 | Method and system for enforcing access to a computing resource using a licensing attribute certificate | |||
5967 | 7356691 | Authentication of mobile wireless network component | |||
5968 | 7356690 | Method and system for managing a distributed trust path locator for public key certificates relating to the trust path of an X.509 attribute certificate | |||
5969 | 7356689 | Method and apparatus for tracing packets in a communications network | |||
5970 | 7356688 | System and method for document distribution | |||
5971 | 7356687 | Association of security parameters for a collection of related streaming protocols | |||
5972 | 7356515 | Method and system for transferring an electronic sum of money from a credit memory | |||
5973 | 7356510 | Content delivery | |||
5974 | 7356149 | Information processing method and apparatus, computer program, and computer-readable storage medium | |||
5975 | 7356148 | Information processing method and apparatus, computer program, and computer-readable storage medium | |||
5976 | 7356147 | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient | |||
5977 | 7356146 | Method for relocating SRNS in a mobile communication system | |||
5978 | 7356144 | Control of usage of contents in digital broadcasts | |||
5979 | 7356142 | Secure compact disk and player | |||
5980 | 7356141 | Baud rate modulation encoding/decoding method and device for remote controller | |||
5981 | 7353541 | Systems and methods for content distribution using one or more distribution keys | |||
5982 | 7353538 | Server resource management, analysis, and intrusion negation | |||
5983 | 7353535 | Flexible, selectable, and fine-grained network trust policies | |||
5984 | 7353533 | Administration of protection of data accessible by a mobile device | |||
5985 | 7353532 | Secure system and method for enforcement of privacy policy and protection of confidentiality | |||
5986 | 7353531 | Trusted computing environment | |||
5987 | 7353468 | Secure exchange of information in electronic design automation | |||
5988 | 7353405 | Method and systems for sharing network access capacities across internet service providers | |||
5989 | 7353402 | Obtaining a signed rights label (SRL) for digital content and obtaining a digital license corresponding to the content based on the SRL in a digital rights management system | |||
5990 | 7353398 | Article, method, system and apparatus for decentralized creation, distribution, verification and transfer of valuable documents | |||
5991 | 7353397 | Repurposing digitally signed information | |||
5992 | 7353396 | Physical access control | |||
5993 | 7353395 | Authenticated ID-based cryptosystem with no key escrow | |||
5994 | 7353394 | System and method for digital signature authentication of SMS messages | |||
5995 | 7353393 | Authentication receipt | |||
5996 | 7353388 | Key server for securing IP telephony registration, control, and maintenance | |||
5997 | 7353387 | Method and system for integrating encryption functionality into a database system | |||
5998 | 7353386 | Method and device for authenticating digital data by means of an authentication extension module | |||
5999 | 7353385 | Authentication system, authentication method, authentication apparatus, and authentication method therefor | |||
6000 | 7353384 | Collapsing chained credentials | |||
6001 | 7353383 | System and method for single session sign-on with cryptography | |||
6002 | 7353382 | Security framework and protocol for universal pervasive transactions | |||
6003 | 7353381 | Supplicant and authenticator intercommunication mechanism independent of underlying data link and physical layer protocols | |||
6004 | 7353380 | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |||
6005 | 7353353 | File security management | |||
6006 | 7353210 | Electronic means of payment with individually settable security features for the internet or for mobile networks | |||
6007 | 7353209 | Releasing decrypted digital content to an authenticated path | |||
6008 | 7353207 | Method of altering a software product in response to predetermined events | |||
6009 | 7352868 | Method and apparatus for security in a data processing system | |||
6010 | 7352867 | Method of preventing unauthorized distribution and use of electronic keys using a key seed | |||
6011 | 7352866 | Enhanced subscriber authentication protocol | |||
6012 | 7352862 | Encryption method, communication system, transmission device, and data input device | |||
6013 | 7352861 | Digital electronic component which is protected against electrical-type analyses | |||
6014 | 7352860 | Method of encipherment by permutations of fixed-length sequences | |||
6015 | 7350695 | Method, system, and computer program product for implementing pin-based data transfer activities | |||
6016 | 7350238 | Data transfer system, data transfer apparatus, data-recording apparatus, data management method and identifier generation method | |||
6017 | 7350230 | Wireless security module | |||
6018 | 7350228 | Method for securing digital content | |||
6019 | 7350227 | Cryptographic peer discovery, authentication, and authorization for on-path signaling | |||
6020 | 7350226 | System and method for analyzing security policies in a distributed computer network | |||
6021 | 7350212 | Method and apparatus for data transfer across a network | |||
6022 | 7350083 | Integrated circuit chip having firmware and hardware security primitive device(s) | |||
6023 | 7350078 | User selection of computer login | |||
6024 | 7350077 | 802.11 using a compressed reassociation exchange to facilitate fast handoff | |||
6025 | 7350076 | Scheme for device and user authentication with key distribution in a wireless network | |||
6026 | 7350075 | Method for autoconfiguration of authentication servers | |||
6027 | 7350074 | Peer-to-peer authentication and authorization | |||
6028 | 7350073 | VPN enrollment protocol gateway | |||
6029 | 7350072 | Remote management and provisioning of a system across a network based connection | |||
6030 | 7350071 | Encrypted and non-encrypted communication of message data | |||
6031 | 7350069 | System and method which employs a multi user secure scheme utilizing shared keys | |||
6032 | 7350067 | Bios security management | |||
6033 | 7349545 | Key agreement method in secure communication system using multiple access method | |||
6034 | 7349544 | Wireless perimeter security device and network using same | |||
6035 | 7349542 | Systems, methods and computer program products for encryption and decryption using wavelet transforms | |||
6036 | 7349541 | Method and apparatus for controlling content consumption | |||
6037 | 7349537 | Method for data encryption in an ethernet passive optical network | |||
6038 | 7346931 | Accepting a set of data in a computer unit | |||
6039 | 7346930 | Security framework bridge | |||
6040 | 7346929 | Method and apparatus for auditing network security | |||
6041 | 7346928 | Decentralized appliance virus scanning | |||
6042 | 7346927 | System and method for storing and accessing secure data | |||
6043 | 7346924 | Storage area network system using internet protocol, security system, security management program and storage device | |||
6044 | 7346910 | Administration of groups of computer programs, data processing systems, or system resources | |||
6045 | 7346779 | System and method for authenticating electronic documents | |||
6046 | 7346778 | Security method and apparatus for controlling the data exchange on handheld computers | |||
6047 | 7346777 | Identification information embedding apparatus and identification information analysis apparatus | |||
6048 | 7346776 | Authenticating media signals by adjusting frequency characteristics to reference values | |||
6049 | 7346775 | System and method for authentication of users and web sites | |||
6050 | 7346774 | Encrypted key cache | |||
6051 | 7346773 | Enabling stateless server-based pre-shared secrets | |||
6052 | 7346772 | Method for fast, secure 802.11 re-association without additional authentication, accounting and authorization infrastructure | |||
6053 | 7346771 | Key distribution across networks | |||
6054 | 7346770 | Method and apparatus for traversing a translation device with a security protocol | |||
6055 | 7346581 | Copyright management apparatus, copyrighted-work distribution apparatus, and copyrighted-work distribution and receiving system | |||
6056 | 7346514 | Device and method for embedding a watermark in an audio signal | |||
6057 | 7346171 | Network system, terminal, and method for encryption and decryption | |||
6058 | 7346170 | Information processing system and method | |||
6059 | 7346169 | Information processing device and method | |||
6060 | 7346168 | Method and apparatus for secure wireless delivery of converged services | |||
6061 | 7346167 | Secure mobile ad-hoc network and related methods | |||
6062 | 7346166 | Quantum key distribution system and method using regulated single-photon source | |||
6063 | 7346163 | Dynamic composition of pre-encrypted video on demand content | |||
6064 | 7346162 | Public key cryptography using matrices | |||
6065 | 7346161 | Method and apparatus for designing cipher logic, and a computer product | |||
6066 | 7346160 | Randomization-based encryption apparatus and method | |||
6067 | 7343621 | Method and apparatus for providing iSCSI target stealth operation | |||
6068 | 7343620 | Method and apparatus for adopting authorizations | |||
6069 | 7343559 | Computer-readable recorded medium on which image file is recorded, device for producing the recorded medium, medium on which image file creating program is recorded, device for transmitting image file, device for processing image file, and medium on which image file processing program is recorded | |||
6070 | 7343497 | Security in communication networks | |||
6071 | 7343493 | Encrypted file system using TCPA | |||
6072 | 7343492 | Method and system for digital watermarking | |||
6073 | 7343491 | Information processing apparatus and method | |||
6074 | 7343490 | Apparatus, and associated method, for facilitating authentication of a mobile station with a core network | |||
6075 | 7343489 | Low cost packet originator verification for intermediate nodes | |||
6076 | 7343488 | Method and apparatus for providing discrete data storage security | |||
6077 | 7343487 | Datacast distribution system | |||
6078 | 7343486 | Methods and systems for coordinating the termination of sessions on one or more systems | |||
6079 | 7343485 | System and method for maintaining protocol status information in a network device | |||
6080 | 7343441 | Method and apparatus of remote computer management | |||
6081 | 7343350 | System and method for interactive messaging and/or allocating and/or upgrading and/or rewarding tickets, other event admittance means, goods and/or services | |||
6082 | 7343349 | System and method for secure data and funds transfer | |||
6083 | 7343348 | System for performing real-estate transactions over a computer network using participant templates | |||
6084 | 7343347 | Electronic media player with metadata based control and method of operating the same | |||
6085 | 7343014 | Method for sharing the authorization to use specific resources | |||
6086 | 7343011 | Secure telecommunications system for wireless local area networks | |||
6087 | 7340778 | Method and apparatus for ensuring the copy protection of digital data | |||
6088 | 7340777 | In memory heuristic system and method for detecting viruses | |||
6089 | 7340771 | System and method for dynamically creating at least one pinhole in a firewall | |||
6090 | 7340769 | System and method for localizing data and devices | |||
6091 | 7340768 | System and method for wireless local area network monitoring and intrusion detection | |||
6092 | 7340748 | Automatic client proxy configuration for portable services | |||
6093 | 7340612 | Method for device registration in a wireless home network | |||
6094 | 7340610 | Trusted time stamping storage system | |||
6095 | 7340608 | System and method for creating, vaulting, transferring and controlling transferable electronic records with unique ownership | |||
6096 | 7340607 | Preservation system for digitally created and digitally signed documents | |||
6097 | 7340606 | Digital certificates | |||
6098 | 7340605 | System and method for secure download of waveforms to signal generators | |||
6099 | 7340604 | Using dynamic web components to remotely control the security state of web pages | |||
6100 | 7340602 | Systems and methods for authenticating and protecting the integrity of data streams and other data | |||
6101 | 7340600 | Authorization infrastructure based on public key cryptography | |||
6102 | 7340599 | Method for protection against fraud in a network by icon selection | |||
6103 | 7340482 | Preview function in a digital data preservation system | |||
6104 | 7340462 | User-configurable terminal for displaying, retrieving, inputting and processing data | |||
6105 | 7340436 | Communication network charging method and system | |||
6106 | 7340061 | Information processing apparatus, information processing method and providing medium | |||
6107 | 7340059 | Programmable scrambler and De-scrambler for digital telephony equipment | |||
6108 | 7340057 | Method and apparatus for distributing authorization to provision mobile devices on a wireless network | |||
6109 | 7340055 | Memory card and data distribution system using it | |||
6110 | 7340053 | Cipher strength estimating device | |||
6111 | 7337465 | Peer-to-peer communication apparatus and communication method | |||
6112 | 7337331 | Distributive storage controller and method | |||
6113 | 7337326 | Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation | |||
6114 | 7337323 | Boot-up and hard drive protection using a USB-compliant token | |||
6115 | 7337321 | Digital content protection using invisible and visible watermarks | |||
6116 | 7337319 | Method of comparing documents possessed by two parties | |||
6117 | 7337318 | Method and apparatus for preventing rogue implementations of a security-sensitive class interface | |||
6118 | 7337316 | Packet authentication | |||
6119 | 7337315 | Efficient certificate revocation | |||
6120 | 7337314 | Apparatus and method for allocating resources within a security processor | |||
6121 | 7337147 | Dynamic digital content licensing | |||
6122 | 7337146 | Emergency information management system | |||
6123 | 7337105 | Electronic equipment setting information creating method and apparatus, and security policy creating method and associated apparatus | |||
6124 | 7336802 | Digital watermarking system using scrambling method | |||
6125 | 7336799 | Digital watermark embedding device and digital watermark embedding method | |||
6126 | 7336791 | Information processing apparatus | |||
6127 | 7336789 | System for providing encrypted data, system for decrypting encrypted data and method for providing a communication interface in such a decrypting system | |||
6128 | 7336788 | Electronic book secure communication with home subsystem | |||
6129 | 7334267 | Email viewing security | |||
6130 | 7334266 | Reproduction control method, program and recording medium | |||
6131 | 7334263 | Detecting viruses using register state | |||
6132 | 7334262 | Proactive prevention of polymorphic SMTP worms | |||
6133 | 7334257 | Techniques for preserving content during a redirection for authentication | |||
6134 | 7334254 | Business-to-business security integration | |||
6135 | 7334178 | Randomized self-checking test system | |||
6136 | 7334134 | System and method for playback of copying-and-use-protected acoustic and image media | |||
6137 | 7334132 | Flexible and scalable architecture for transport processing | |||
6138 | 7334129 | Embedding supplemental data in an encoded signal | |||
6139 | 7334128 | Accessing information on a network using an extended network universal resource locator | |||
6140 | 7334127 | Key agreement and transport protocol | |||
6141 | 7334125 | Facilitating secure communications among multicast nodes in a telecommunications network | |||
6142 | 7334123 | Computer system including a bus bridge for connection to a security services processor | |||
6143 | 7334051 | Data distribution system, terminal apparatus, distribution center apparatus, high-efficiency encoding method, high-efficiency encoding apparatus, encoded data decoding method, encoded data decoding apparatus, data transmission method, data transmission apparatus, sub information attaching method, sub information attaching apparatus, and recording medium | |||
6144 | 7333957 | Connected audio and other media objects | |||
6145 | 7333616 | Approach for managing access to messages using encryption key management policies | |||
6146 | 7333615 | Encryption between multiple devices | |||
6147 | 7333612 | Methods and apparatus for confidentiality protection for Fibre Channel Common Transport | |||
6148 | 7333611 | Ultra-secure, ultra-efficient cryptographic system | |||
6149 | 7333610 | System and method for pre-encryption of transmitted content | |||
6150 | 7333609 | Encrypting apparatus | |||
6151 | 7333608 | Analog scrambler | |||
6152 | 7333468 | Digital phase locked loops for packet stream rate matching and restamping | |||
6153 | 7330981 | File locker and mechanisms for providing and using same | |||
6154 | 7330980 | Method of and system for encrypting digital data, method of and apparatus for reproducing digital data, and computer product | |||
6155 | 7330977 | Apparatus, system, and method for secure mass storage backup | |||
6156 | 7330974 | Method and system for delivery of a secure document | |||
6157 | 7330973 | Safety judgment method, safety judgment system, safety judgment apparatus, first authentication apparatus, and computer program product | |||
6158 | 7330972 | Remote management device key administration using network adapters | |||
6159 | 7330971 | Delegated administration of namespace management | |||
6160 | 7330970 | Methods and systems for protecting information in paging operating systems | |||
6161 | 7330969 | Method and apparatus for data validation | |||
6162 | 7330968 | Communication network system having secret concealment function, and communication method | |||
6163 | 7330871 | Online machine data collection and archiving process | |||
6164 | 7330838 | System and method for securing transactional data transmitted over a wireless network in a retail store environment | |||
6165 | 7330560 | Insertion and extraction of a message in an image | |||
6166 | 7330550 | Cryptographic system and method that uses excitation spectroscopy | |||
6167 | 7330549 | Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function | |||
6168 | 7328456 | Method and system to detect dangerous file name extensions | |||
6169 | 7328352 | Apparatus and method for reading or writing user data | |||
6170 | 7328351 | Mail processing apparatus and method | |||
6171 | 7328349 | Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses | |||
6172 | 7328348 | Method and system for securely timestamping digital data | |||
6173 | 7328347 | Method and apparatus for distinguishing the origin of operator inputs in electronic control systems and printing machine having the apparatus | |||
6174 | 7328345 | Method and system for end to end securing of content for video on demand | |||
6175 | 7328344 | Authority-neutral certification for multiple-authority PKI environments | |||
6176 | 7328342 | Method for secure communication between two devices | |||
6177 | 7328340 | Methods and apparatus to provide secure firmware storage and service access | |||
6178 | 7328339 | Method of testing the encryption function of a device | |||
6179 | 7328338 | Transaction verification protocol for smart cards | |||
6180 | 7328337 | Trust grant and revocation from a master key to secondary keys | |||
6181 | 7328336 | System and method for small-area system data processing | |||
6182 | 7327935 | Information recorder, system for copying information, method for copying information, program and computer readable recording medium | |||
6183 | 7327847 | Method for distributed computation of RSA inverses in asynchronous networks | |||
6184 | 7327846 | Secure cryptographic key exchange and verifiable digital signature | |||
6185 | 7325251 | Method and system to prevent peer-to-peer (P2P) worms | |||
6186 | 7325250 | Method and apparatus for preventing radio communication system access by an unauthorized modem | |||
6187 | 7325248 | Personal firewall with location dependent functionality | |||
6188 | 7325246 | Enhanced trust relationship in an IEEE 802.1x network | |||
6189 | 7325145 | Verifying the presence of an original data storage medium | |||
6190 | 7325144 | Portable information processor having password code checking function | |||
6191 | 7325142 | IP network and admission control method used therefor | |||
6192 | 7325141 | Method and system for secure access | |||
6193 | 7325140 | Secure management access control for computers, embedded and card embodiment | |||
6194 | 7325139 | Information processing device, method, and program | |||
6195 | 7325137 | Apparatus and method for securely realizing cooperative processing | |||
6196 | 7325136 | Method and apparatus for secured electronic commerce | |||
6197 | 7325134 | Localized network authentication and security using tamper-resistant keys | |||
6198 | 7325133 | Mass subscriber management | |||
6199 | 7325132 | Authentication method, system and apparatus of an electronic value | |||
6200 | 7325131 | Robust watermark for DSD signals | |||
6201 | 7325130 | Method for guaranteeing freshness of results for queries against a non-secure data store | |||
6202 | 7325129 | Method for altering encryption status in a relational database in a continuous process | |||
6203 | 7325127 | Security server system | |||
6204 | 7324975 | Method for managing commands in several application files and microchip card for implementing said method | |||
6205 | 7324974 | Digital data file encryption apparatus and method | |||
6206 | 7324648 | Method and apparatus for secure key delivery for decrypting bulk digital content files at an unsecure site | |||
6207 | 7324647 | Quantum cryptographic key distribution networks with untrusted switches | |||
6208 | 7324645 | Method to authenticate a mobile station, a communications system and a mobile station | |||
6209 | 7324644 | Scheme for transferring copyright protected contents data using radio link layer authentication/encryption | |||
6210 | 7322046 | Method and system for the secure use of a network service | |||
6211 | 7322042 | Secure and backward-compatible processor and secure software execution thereon | |||
6212 | 7322006 | Integrated document management system, document retrieval device, and a computer-readable recording medium with a document retrieval program recorded therein | |||
6213 | 7321971 | System and method for secure remote access | |||
6214 | 7321969 | Secure instant messaging system using instant messaging group policy certificates | |||
6215 | 7321968 | Method and apparatus for encoding, transmitting and decoding a digital message | |||
6216 | 7321910 | Microprocessor apparatus and method for performing block cipher cryptographic functions | |||
6217 | 7321877 | Managing a virtual persona through selective association | |||
6218 | 7321666 | Multilayered digital watermarking system | |||
6219 | 7321665 | Method of and apparatus for extracting watermark from repeatedly watermarked data | |||
6220 | 7321660 | Method and apparatus for encrypting/decrypting data using timed-release keys | |||
6221 | 7321659 | Simple universal hash for plaintext aware encryption | |||
6222 | 7320143 | Method of gaining secure access to intranet resources | |||
6223 | 7320142 | Method and system for configurable network intrusion detection | |||
6224 | 7320139 | Data processing system for application to access by accreditation | |||
6225 | 7320130 | Mutual exclusion lock implementation for a computer network | |||
6226 | 7320075 | Software protection method utilizing hidden application code in a protection dynamic link library object | |||
6227 | 7320073 | Secure method for roaming keys and certificates | |||
6228 | 7320072 | Method and token for authenticating a control point | |||
6229 | 7320071 | Secure universal serial bus | |||
6230 | 7320070 | Methods and apparatus for protecting against IP address assignments based on a false MAC address | |||
6231 | 7320069 | Selective encryption of media data | |||
6232 | 7319988 | System and method for processing protected audio information | |||
6233 | 7319775 | Wavelet domain watermarks | |||
6234 | 7319758 | Electronic device with encryption/decryption cells | |||
6235 | 7318238 | Security settings for markup language elements | |||
6236 | 7318237 | System and method for maintaining security in a distributed computer network | |||
6237 | 7318236 | Tying a digital license to a user and tying the user to multiple computing devices in a digital rights management (DRM) system | |||
6238 | 7318235 | Attestation using both fixed token and portable token | |||
6239 | 7318160 | Cryptographic key setup in queued cryptographic systems | |||
6240 | 7318155 | Method and system for configuring highly available online certificate status protocol responders | |||
6241 | 7318153 | Mark information issuing method and system | |||
6242 | 7317799 | Cryptographic key distribution using key folding | |||
6243 | 7317798 | Communication processing system, communication processing method, server and computer program | |||
6244 | 7316033 | Method of controlling recording of media | |||
6245 | 7316032 | Method for allowing a customer to preview, acquire and/or pay for information and a system therefor | |||
6246 | 7316030 | Method and system for authenticating a personal security device vis-a-vis at least one remote computer system | |||
6247 | 7316027 | Techniques for dynamically establishing and managing trust relationships | |||
6248 | 7315949 | Method and system for providing a personal identification security feature to a portable computing device | |||
6249 | 7315948 | Time stamping method employing a separate ticket and stub | |||
6250 | 7315947 | Author signatures for legal purposes | |||
6251 | 7315946 | Out-of-band tokens for rights access | |||
6252 | 7315945 | Directoryless public key cryptographic system and method | |||
6253 | 7315944 | Secure handling of stored-value data objects | |||
6254 | 7315943 | Method and system for authenticating communication terminals | |||
6255 | 7315942 | Network element and method for controlling access to low level computer system services | |||
6256 | 7315941 | Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity | |||
6257 | 7315824 | Internet printing by hotel guests | |||
6258 | 7314169 | Device that issues authority for automation systems by issuing an encrypted time pass | |||
2007 | |||||
6259 | 7313828 | Method and apparatus for protecting software against unauthorized use | |||
6260 | 7313826 | Connected support entitlement system method of operation | |||
6261 | 7313822 | Application-layer security method and system | |||
6262 | 7313820 | Method and system for providing an authorization framework for applications | |||
6263 | 7313815 | Protecting against spoofed DNS messages | |||
6264 | 7313812 | Application level security | |||
6265 | 7313704 | Control system having download function | |||
6266 | 7313702 | Method for issuing identification information | |||
6267 | 7313701 | Robust efficient distributed RSA-key generation | |||
6268 | 7313700 | Method and system for authenticating a message sender using domain keys | |||
6269 | 7313699 | Automatic authentication method and system in print process | |||
6270 | 7313697 | Method for authentication | |||
6271 | 7313696 | Method for authentication of JPEG image data | |||
6272 | 7313694 | Secure file access control via directory encryption | |||
6273 | 7313693 | Secure transmission using adaptive transformation and plural channels | |||
6274 | 7313692 | Trust management systems and methods | |||
6275 | 7313691 | Internet site authentication service | |||
6276 | 7313690 | Three way validation and authentication of boot files transmitted from server to client | |||
6277 | 7313689 | Method, system and service for the authentication of a public key certificate | |||
6278 | 7313688 | Method and apparatus for private messaging among users supported by independent and interoperating couriers | |||
6279 | 7313687 | Establishing a secure context at an electronic communications end-point | |||
6280 | 7313547 | Manager level device/service arbitrator and methods | |||
6281 | 7313239 | Method and system for data encryption/decryption key generation and distribution | |||
6282 | 7313238 | Method and system for relating cryptographic keys | |||
6283 | 7313236 | Methods and apparatus for secure and adaptive delivery of multimedia content | |||
6284 | 7310823 | Digital information recording apparatus and outputting apparatus | |||
6285 | 7310822 | Filtering a permission set using permission requests associated with a code assembly | |||
6286 | 7310821 | Host certification method and system | |||
6287 | 7310819 | Processing copy protection signals | |||
6288 | 7310818 | System and method for tracking computer viruses | |||
6289 | 7310812 | Service executing method and service providing system | |||
6290 | 7310733 | Method and system for maintaining login preference information of users in a network-based transaction facility | |||
6291 | 7310732 | Content distribution system authenticating a user based on an identification certificate identified in a secure container | |||
6292 | 7310731 | Contents processing system | |||
6293 | 7310730 | Method and apparatus for communicating an encrypted broadcast to virtual private network receivers | |||
6294 | 7310728 | Method of implementing a high-speed header bypass function | |||
6295 | 7310669 | Network appliance for vulnerability assessment auditing over multiple networks | |||
6296 | 7310629 | Method and apparatus for controlling file sharing of multimedia files over a fluid, de-centralized network | |||
6297 | 7310620 | Monitoring market participant responses | |||
6298 | 7310424 | Encryption key distribution and network registration system, apparatus and method | |||
6299 | 7308704 | Data structure for access control | |||
6300 | 7308703 | Protection of data accessible by a mobile device | |||
6301 | 7308702 | Locally adaptable central security management in a heterogeneous network environment | |||
6302 | 7308582 | Collation processing apparatus, data communication system and data communication method | |||
6303 | 7308581 | Systems and methods for online identity verification | |||
6304 | 7308580 | System and method for ensuring security with multiple authentication schemes | |||
6305 | 7308579 | Method and system for internationally providing trusted universal identification over a global communications network | |||
6306 | 7308578 | Method and apparatus for authorizing execution for applications in a data processing system | |||
6307 | 7308577 | Image verification system, image verification apparatus, and image verification method | |||
6308 | 7308576 | Authenticated code module | |||
6309 | 7308575 | Data scrambling system for a shared transmission media | |||
6310 | 7308574 | Method and system for key certification | |||
6311 | 7308573 | Enrolling / sub-enrolling a digital rights management (DRM) server into a DRM architecture | |||
6312 | 7308572 | Method of printing a document | |||
6313 | 7308501 | Method and apparatus for policy-based packet classification using hashing algorithm | |||
6314 | 7308104 | Forward multiple scrambling code generating method and apparatus | |||
6315 | 7308103 | Power line communication device and method of using the same | |||
6316 | 7308097 | Digital signature and authentication method and apparatus | |||
6317 | 7308096 | Elliptic scalar multiplication system | |||
6318 | 7305710 | Method for securely loading and executing software in a secure device that cannot retain software after a loss of power | |||
6319 | 7305708 | Methods and systems for intrusion detection | |||
6320 | 7305706 | Establishing a virtual private network for a road warrior | |||
6321 | 7305704 | Management of trusted flow system | |||
6322 | 7305703 | Method and system for enforcing a communication security policy | |||
6323 | 7305567 | Decoupled architecture for data ciphering operations | |||
6324 | 7305564 | System and method to proactively detect software tampering | |||
6325 | 7305562 | System, method and computer program product for an authentication management infrastructure | |||
6326 | 7305559 | Software method for improved password entry | |||
6327 | 7305558 | Digital signing method | |||
6328 | 7305557 | Management and recovery of data object annotations using digital fingerprinting | |||
6329 | 7305556 | Secure printing with authenticated printer key | |||
6330 | 7305555 | Smart card mating protocol | |||
6331 | 7305554 | Dynamic acquisition of state during security system reconfiguration | |||
6332 | 7305551 | Method of transmitting security data in an ethernet passive optical network system | |||
6333 | 7305550 | System and method for providing authentication and verification services in an enhanced media gateway | |||
6334 | 7305548 | Using atomic messaging to increase the security of transferring data across a network | |||
6335 | 7305547 | Method for upgrading a host/agent security system that includes digital certificate management and an upgradable backward compatible host/agent security system digital certificate infrastructure | |||
6336 | 7305546 | Splicing of TCP/UDP sessions in a firewalled network environment | |||
6337 | 7305545 | Automated electronic messaging encryption system | |||
6338 | 7305470 | Method for displaying web user's authentication status in a distributed single login network | |||
6339 | 7305365 | System and method for controlling access to location information | |||
6340 | 7305093 | Method and apparatus for securely transferring data | |||
6341 | 7305092 | Method and system to accelerate cryptographic functions for secure e-commerce applications | |||
6342 | 7305091 | Quantum cipher communication system | |||
6343 | 7305086 | Reducing problems caused by variations in watermark detection results | |||
6344 | 7305084 | Fast encryption and authentication for data processing systems | |||
6345 | 7304965 | Method and apparatus for generating a code in an asynchronous code division multiple access mobile communication system | |||
6346 | 7304570 | Methods, systems, and computer program products for providing context-based, hierarchical security for a mobile device | |||
6347 | 7304227 | Method and system for synthesizing electronic transparent audio | |||
6348 | 7302705 | Method and apparatus for tracing a denial-of-service attack back to its source | |||
6349 | 7302704 | Excising compromised routers from an ad-hoc network | |||
6350 | 7302700 | Method and apparatus for implementing a layer 3/layer 7 firewall in an L2 device | |||
6351 | 7302589 | Method for securing memory mapped control registers | |||
6352 | 7302584 | Mechanisms for banning computer programs from use | |||
6353 | 7302583 | Biometrics template | |||
6354 | 7302577 | Data processing apparatus and method | |||
6355 | 7302576 | Systems and methods for authenticating documents | |||
6356 | 7302575 | Apparatus for and method of preventing illicit copying of digital content | |||
6357 | 7302574 | Content identifiers triggering corresponding responses through collaborative processing | |||
6358 | 7302573 | Computer system and method for controlling output of reproduced video data | |||
6359 | 7302572 | Portable information storage medium and its authentication method | |||
6360 | 7302571 | Method and system to maintain portable computer data secure and authentication token for use therein | |||
6361 | 7302570 | Apparatus, system, and method for authorized remote access to a target system | |||
6362 | 7302566 | Internet security system | |||
6363 | 7302565 | Terminal identity masking in a wireless network | |||
6364 | 7302564 | Translation of secure communications for handshake protocols | |||
6365 | 7302563 | Mailing list server and mail re-sending method thereof | |||
6366 | 7302415 | Data copyright management system | |||
6367 | 7302078 | Apparatus and method for preventing illegal distribution of digital contents by using a fingerprinting technique | |||
6368 | 7302060 | Method and application for authentication of a wireless communication using an expiration marker | |||
6369 | 7302056 | Method and system for determining sequence parameters to limit cycle attacks in timed release cryptography | |||
6370 | 7299504 | System and method for implementing security management using a database-modeled security policy | |||
6371 | 7299502 | System and method for providing customized secure access to shared documents | |||
6372 | 7299501 | Electronic book selection and delivery system having encryption and security features | |||
6373 | 7299495 | Virus detection | |||
6374 | 7299494 | File management method and files | |||
6375 | 7299493 | Techniques for dynamically establishing and managing authentication and trust relationships | |||
6376 | 7299492 | Multi-level multi-user web services security system and method | |||
6377 | 7299390 | Apparatus and method for encrypting security sensitive data | |||
6378 | 7299360 | Method and system for fingerprint template matching | |||
6379 | 7299358 | Indirect data protection using random key encryption | |||
6380 | 7299356 | Key conversion method for communication session encryption and authentication system | |||
6381 | 7299355 | Fast SHA1 implementation | |||
6382 | 7299354 | Method to authenticate clients and hosts to provide secure network boot | |||
6383 | 7299351 | Peer-to-peer name resolution protocol (PNRP) security infrastructure and method | |||
6384 | 7299350 | Internet protocol security decryption with secondary use speculative interrupts | |||
6385 | 7299349 | Secure end-to-end notification | |||
6386 | 7298851 | Electronic book security and copyright protection system | |||
6387 | 7298850 | Encrypting keypad module | |||
6388 | 7298849 | Method and apparatus for simultaneous encryption and decryption of publicly distributed media | |||
6389 | 7298845 | Digital content protection system | |||
6390 | 7298844 | Recording/reproducing apparatus, data moving method, and data deletion method | |||
6391 | 7298843 | Method and apparatus for seeding a random number generator | |||
6392 | 7298842 | Utilizing a key for enciphering and deciphering that is modified during enciphering and deciphering | |||
6393 | 7296163 | System and methods for encrypted execution of computer programs | |||
6394 | 7296162 | Time validation system | |||
6395 | 7296161 | Image processing apparatus and image processing method | |||
6396 | 7296160 | Secure user authentication over a communication network | |||
6397 | 7296158 | Methods, apparatus, and program products for inferring service usage | |||
6398 | 7296157 | Methods and apparatus for secure document printing | |||
6399 | 7296156 | System and method for SMS authentication | |||
6400 | 7296155 | Process and system providing internet protocol security without secure domain resolution | |||
6401 | 7296154 | Secure media path methods, systems, and architectures | |||
6402 | 7296152 | System and method for providing access to a network in a communications environment | |||
6403 | 7296150 | Database management systems and methods of operating the same | |||
6404 | 7296149 | Secure user and data authentication over a communication network | |||
6405 | 7296148 | Communication system and network control apparatus with encryption processing function, and communication control method | |||
6406 | 7296147 | Authentication system and key registration apparatus | |||
6407 | 7296146 | Security measures in a partitionable computing system | |||
6408 | 7296145 | Method of secure communication over a distributed network without using secure socket layer | |||
6409 | 7295681 | Method and apparatus for providing improved workflow for digital watermarking | |||
6410 | 7295678 | Method for inserting binary messages in a digital image | |||
6411 | 7295674 | On-line randomness test for detecting irregular pattern | |||
6412 | 7295672 | Method and apparatus for fast RC4-like encryption | |||
6413 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
6414 | 7294057 | Secure method for remote game management | |||
6415 | 7293294 | Method and apparatus for using contents | |||
6416 | 7293293 | Apparatus and method for detecting illegitimate change of web resources | |||
6417 | 7293291 | System and method for detecting computer port inactivity | |||
6418 | 7293284 | Codeword-enhanced peer-to-peer authentication | |||
6419 | 7293282 | Method to block unauthorized access to TFTP server configuration files | |||
6420 | 7293176 | Strong mutual authentication of devices | |||
6421 | 7293175 | Automatic information sanitizer | |||
6422 | 7293174 | Method of enabling consumer privacy using personal storage device | |||
6423 | 7293173 | Methods and systems for protecting information in paging operating systems | |||
6424 | 7293171 | Encryption to BCC recipients with S/MIME | |||
6425 | 7292999 | Online card present transaction | |||
6426 | 7292693 | Deterministically generating block substitution tables which meet a given standard of nonlinearity | |||
6427 | 7290280 | Method and apparatus to facilitate virtual transport layer security on a virtual network | |||
6428 | 7290278 | Identity based service system | |||
6429 | 7290275 | Security maturity assessment method | |||
6430 | 7290266 | Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy | |||
6431 | 7290148 | Encryption and decryption communication semiconductor device and recording/reproducing apparatus | |||
6432 | 7290146 | Managed credential issuance | |||
6433 | 7290143 | Method of certifying transmission, reception and authenticity of electronic documents and related network unit | |||
6434 | 7290142 | System and method for initializing a simple network management protocol (SNMP) agent | |||
6435 | 7290141 | Authentication of remotely originating network messages | |||
6436 | 7290139 | System for updating an information state received from another computer based upon validation rules that apply to the information state | |||
6437 | 7290137 | Information processing apparatus, executable module generating method, and storage medium | |||
6438 | 7290135 | Method and arrangement for data communication in a cryptographic system containing a plurality of entities | |||
6439 | 7290134 | Encapsulation mechanism for packet processing | |||
6440 | 7290133 | Method and apparatus improving efficiency of end-user certificate validation | |||
6441 | 7290132 | Establishing secure peer networking in trust webs on open networks using shared secret device key | |||
6442 | 7290131 | Guaranteeing hypertext link integrity | |||
6443 | 7290130 | Information distributing system and method thereof | |||
6444 | 7289959 | Biometric identification method, portable electronic device and electronic device acquiring biometric data therefor | |||
6445 | 7289632 | System and method for distributed security | |||
6446 | 7289631 | Encryption key setting system, access point, encryption key setting method, and authentication code setting system | |||
6447 | 7289630 | Counter initialization, particularly for radio frames | |||
6448 | 7287284 | Information processing method and apparatus, and computer program and computer-readable storage medium | |||
6449 | 7287283 | Return-to-LIBC attack blocking system and method | |||
6450 | 7287281 | Send blocking system and method | |||
6451 | 7287272 | Method, data carrier and system for authentication of a user and a terminal | |||
6452 | 7287271 | System and method for enabling secure access to services in a computer network | |||
6453 | 7287167 | Record medium, recording apparatus for record medium, recording method for record medium, reproducing apparatus for record medium, reproducing medium for record medium, and data output controlling method | |||
6454 | 7287163 | Digital watermark embedding apparatus and method, and computer program | |||
6455 | 7287162 | System and method for platform activation | |||
6456 | 7287159 | Detection and identification methods for software | |||
6457 | 7287158 | Person authentication system, person authentication method, information processing apparatus, and program providing medium | |||
6458 | 7287011 | Application management for multi application devices | |||
6459 | 7286670 | Method and apparatus for chaotic opportunistic lossless compression of data | |||
6460 | 7286668 | Method of protecting copyright of digital video work | |||
6461 | 7286664 | Efficient implementation of MD5 message-digest algorithm (RFC1321) on an 8 bit micro-controller | |||
6462 | 7286515 | Method, apparatus, and software product for detecting rogue access points in a wireless network | |||
6463 | 7284277 | Secured printing | |||
6464 | 7284276 | Return-to-LIBC attack detection using branch trace records system and method | |||
6465 | 7284266 | System and method for secure biometric identification | |||
6466 | 7284263 | Rights management inter-entity message policies and enforcement | |||
6467 | 7284131 | Method for operating internet site offering encrypted contents | |||
6468 | 7284129 | Data processing apparatus and method | |||
6469 | 7284128 | Recording medium, recording medium method and apparatus , information signal output control method, recording medium reproducing apparatus, signal transmission method, and content data | |||
6470 | 7284127 | Secure communications | |||
6471 | 7284126 | Device authentication using pre-configured security keys | |||
6472 | 7284125 | Method and apparatus for personal identification | |||
6473 | 7284122 | Cryptographic method for protection against fraud | |||
6474 | 7284061 | Obtaining temporary exclusive control of a device | |||
6475 | 7283633 | Information recording and/or reproducing method and information recording and/or reproducing device | |||
6476 | 7283632 | Unauthorized access embedded software protection system | |||
6477 | 7283631 | Encryption processing apparatus and encryption processing system | |||
6478 | 7283629 | Deriving keys used to securely process electronic messages | |||
6479 | 7283259 | Image data recording device, method for controlling image data recording device, and a program for controlling an image data recording system, each using a common key | |||
6480 | 7281271 | Exception handling validation system and method | |||
6481 | 7281268 | System, method and computer program product for detection of unwanted processes | |||
6482 | 7281267 | Software audit system | |||
6483 | 7281266 | Personal computer internet security system | |||
6484 | 7281265 | System and method for communicating packets in a network environment | |||
6485 | 7281264 | Security system and method for PnP device coupled to network client | |||
6486 | 7281244 | Using a digital fingerprint to commit loaded data in a device | |||
6487 | 7281133 | Trusted and secure techniques, systems and methods for item delivery and execution | |||
6488 | 7281132 | Using token-based signing to install unsigned binaries | |||
6489 | 7281130 | Storing authentication sequences for expedited login to secure applications | |||
6490 | 7281129 | Secure computer network with a network screen | |||
6491 | 7281128 | One pass security | |||
6492 | 7281010 | Trusted computing platform with dual key trees to support multiple public/private key systems | |||
6493 | 7280983 | Information recording medium having reproduction control program recorded thereon and reproduction control program | |||
6494 | 7280669 | Digital image watermarking apparatus and method | |||
6495 | 7280663 | Encryption system based on crossed inverse quasigroups | |||
6496 | 7280661 | Data output method and apparatus, data playback method and apparatus, data recording method and apparatus, and data recording and playback method and apparatus | |||
6497 | 7280659 | Pseudorandom number generating apparatus or encryption or decryption apparatus using the same | |||
6498 | 7280658 | Systems, methods, and computer program products for accelerated dynamic protection of data | |||
6499 | 7280657 | Data encryption and decryption system and method using merged ciphers | |||
6500 | 7280529 | Providing network management access through user profiles | |||
6501 | 7278169 | Controlling the downloading and recording of digital data | |||
6502 | 7278168 | Dynamic enabling of functionality in electronic document readers | |||
6503 | 7278165 | Method and system for implementing digital rights management | |||
6504 | 7278164 | Software usage/procurement management | |||
6505 | 7278160 | Presentation of correlated events as situation classes | |||
6506 | 7278031 | Secure distribution of portable game software | |||
6507 | 7278029 | Program writable IC card and method thereof | |||
6508 | 7278021 | Information processing device, information processing system, authentication method, storage medium and program | |||
6509 | 7278020 | Digital watermarking apparatus and application apparatus using the same | |||
6510 | 7278019 | Method of hindering the propagation of a computer virus | |||
6511 | 7278018 | Optical sensing device for reading coded data on a surface and registration network for same | |||
6512 | 7278017 | Method and device for secure wireless transmission of information | |||
6513 | 7277941 | System and method for providing encryption in a storage network by storing a secured encryption key with encrypted archive data in an archive storage device | |||
6514 | 7277549 | System for implementing business processes using key server events | |||
6515 | 7277548 | Cryptographic method and computer program product for use in wireless local area networks | |||
6516 | 7277546 | Methods and apparatus for multi-level dynamic security system | |||
6517 | 7277545 | Scrambler and scrambling method | |||
6518 | 7277543 | Cryptographic combiner using two sequential non-associative operations | |||
6519 | 7277541 | Method and system for using a portion of a digital good as a substitution box | |||
6520 | 7277540 | Arithmetic method and apparatus and crypto processing apparatus for performing multiple types of cryptography | |||
6521 | 7275264 | Method of restricting access, for the benefit of authorized users, to resources belonging to interactive services with at least one package of services | |||
6522 | 7275262 | Method and system architecture for secure communication between two entities connected to an internet network comprising a wireless transmission segment | |||
6523 | 7275257 | Remote controlled computer system and method of operating the same | |||
6524 | 7275163 | Asynchronous configuration | |||
6525 | 7275162 | On-line directory assistance system | |||
6526 | 7275156 | Method and apparatus for establishing and using a secure credential infrastructure | |||
6527 | 7275155 | Chain of trust processing | |||
6528 | 7274804 | Method and apparatus for hashing data | |||
6529 | 7274790 | Scrambling and descrambling a high definition TV signal | |||
6530 | 7274789 | Information recording/reproducing apparatus with security measure | |||
6531 | 7273164 | Postage metering system | |||
6532 | 7272858 | Digital rights management (DRM) encryption and data-protection for content on a relatively simple device | |||
6533 | 7272857 | Method/system for preventing identity theft or misuse by restricting access | |||
6534 | 7272849 | System and method for sharing data | |||
6535 | 7272848 | Method for device security in a heterogeneous storage network environment | |||
6536 | 7272815 | Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects | |||
6537 | 7272727 | Method for managing external storage devices | |||
6538 | 7272724 | User alerts in an anti computer virus system | |||
6539 | 7272723 | USB-compliant personal key with integral input and output devices | |||
6540 | 7272722 | Method for industrially changing the passwords of AIX/UNIX users | |||
6541 | 7272721 | System and method for automated border-crossing checks | |||
6542 | 7272720 | Date-and-time management device and signature generation apparatus with date-and-time management function | |||
6543 | 7272719 | Method to control access between network endpoints based on trust scores calculated from information system component analysis | |||
6544 | 7272718 | Device, method and storage medium for superimposing first and second watermarking information on an audio signal based on psychological auditory sense analysis | |||
6545 | 7272716 | Enterprise secure messaging architecture | |||
6546 | 7272714 | Method, apparatus, and program for automated trust zone partitioning | |||
6547 | 7272582 | Fee determination device | |||
6548 | 7272581 | Method and system for optimizing throughput of mailing machines | |||
6549 | 7272231 | Encrypting data for access by multiple users | |||
6550 | 7272230 | Encryption system and control method thereof | |||
6551 | 7272229 | Digital work protection system, key management apparatus, and user apparatus | |||
6552 | 7272228 | System and method for securing code and ensuring proper execution using state-based encryption | |||
6553 | 7272226 | Split-key key-agreement protocol | |||
6554 | 7270193 | Method and system for distributing programs using tamper resistant processor | |||
6555 | 7269743 | Method and apparatus for secure data mirroring a storage system | |||
6556 | 7269740 | Method to protect software against unwanted use with a "variable principle" | |||
6557 | 7269737 | System and method for biometric authorization for financial transactions | |||
6558 | 7269736 | Distributed cryptographic methods and arrangements | |||
6559 | 7269735 | Instance specific digital watermarks | |||
6560 | 7269734 | Invisible digital watermarks | |||
6561 | 7269732 | Securing access to an application service based on a proximity token | |||
6562 | 7269730 | Method and apparatus for providing peer authentication for an internet key exchange | |||
6563 | 7269729 | Relational database management encryption system | |||
6564 | 7269728 | Apparatus and method for distributing management keys in a multicast domain | |||
6565 | 7269727 | System and method for optimizing authentication in a network environment | |||
6566 | 7269726 | Lightweight public key infrastructure employing unsigned certificates | |||
6567 | 7269639 | Method and system to provide secure in-band management for a packet data network | |||
6568 | 7269622 | Watermarking messaging sessions | |||
6569 | 7269576 | Content rendering apparatus | |||
6570 | 7269261 | Key escrow systems | |||
6571 | 7269259 | Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device | |||
6572 | 7269258 | Cryptographic key, encryption device, encryption/decryption device, cryptographic key management device, and decryption device | |||
6573 | 7269257 | System and method for processing information using encryption key block | |||
6574 | 7269256 | Electronic-monetary system | |||
6575 | 7267266 | Security system | |||
6576 | 7266846 | System and method of facilitating compliance with information sharing regulations | |||
6577 | 7266837 | Authentication, authorization, and accounting (AAA) server | |||
6578 | 7266703 | Single-pass cryptographic processor and method | |||
6579 | 7266702 | Method and system for managing security material and services in a distributed database system | |||
6580 | 7266699 | Cryptographic infrastructure for encrypting a database | |||
6581 | 7266697 | Stealthy audio watermarking | |||
6582 | 7266696 | Electronic postmarking without directly utilizing an electronic postmark server | |||
6583 | 7266695 | Data updating method and data updating system | |||
6584 | 7266693 | Validated mutual authentication | |||
6585 | 7266691 | Contents providing system | |||
6586 | 7266690 | Methods and systems for protecting information in paging operating systems | |||
6587 | 7266689 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |||
6588 | 7266688 | Methods for improved security of software applications | |||
6589 | 7266685 | Time certification in a wireless communications network | |||
6590 | 7266684 | Internet third-party authentication using electronic tickets | |||
6591 | 7266681 | Network communications security agent | |||
6592 | 7266531 | Mail processing system with unique mailpiece authorization assigned in advance of mailpieces entering carrier service mail processing stream | |||
6593 | 7266529 | Method and apparatus for executing code in accordance with usage rights | |||
6594 | 7266215 | Image forming apparatus and copy management system | |||
6595 | 7266203 | Information recording/reproducing system being able to limit an access and a method thereof | |||
6596 | 7266202 | Information processing device and method, and program storage medium | |||
6597 | 7266201 | Non-disruptive authentication administration | |||
6598 | 7266200 | Method and apparatus for encryption of data | |||
6599 | 7266199 | Incorporating shared randomness into distributed cryptography | |||
6600 | 7266197 | Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors | |||
6601 | 7263723 | Apparatus and method for outputting digital information | |||
6602 | 7263720 | Method and mechanism for validating legitimate software calls into secure software | |||
6603 | 7263616 | Ultrasound imaging system having computer virus protection | |||
6604 | 7263615 | Apparatus and method for detecting embedded watermarks | |||
6605 | 7263614 | Implicit access for communications pathway | |||
6606 | 7263612 | Communication system and management apparatus and method for restricting functions in communication system | |||
6607 | 7263610 | Secure multicast flow | |||
6608 | 7263608 | System and method for providing endorsement certificate | |||
6609 | 7263607 | Categorizing electronic messages based on trust between electronic messaging entities | |||
6610 | 7263508 | Method and system for online purchasing using sensor with identifier | |||
6611 | 7263205 | System and method of generic symbol recognition and user authentication using a communication device with imaging capabilities | |||
6612 | 7263192 | Establishing an encrypted session | |||
6613 | 7263191 | Method and apparatus for encrypting data | |||
6614 | 7263189 | Data transmission and receiving apparatus for digital broadcast signals which include control information | |||
6615 | 7263188 | Data delivery system, server apparatus, reproducing apparatus, data delivery method, data playback method, storage medium, control, signal, and transmission data signal | |||
6616 | 7263187 | Batch mode session-based encryption of video on demand content | |||
6617 | 7263185 | Key based decipher including its generation, distribution and usage | |||
6618 | 7263056 | Apparatus and methods for securing information in storage media | |||
6619 | 7260847 | Antivirus scanning in a hard-linked environment | |||
6620 | 7260845 | Sensor for detecting and eliminating inter-process memory breaches in multitasking operating systems | |||
6621 | 7260840 | Multi-layer based method for implementing network firewalls | |||
6622 | 7260837 | Systems and methods for user identification, user demographic reporting and collecting usage data usage biometrics | |||
6623 | 7260835 | Bluetooth.TM. based security system | |||
6624 | 7260834 | Cryptography and certificate authorities in gaming machines | |||
6625 | 7260832 | Process for preventing virus infection of data-processing system | |||
6626 | 7260830 | Method and apparatus for establishing a security policy, and method and apparatus for supporting establishment of security policy | |||
6627 | 7260726 | Method and apparatus for a secure computing environment | |||
6628 | 7260723 | Masked digital signatures | |||
6629 | 7260722 | Digital multimedia watermarking for source identification | |||
6630 | 7260720 | Device authentication system and method for determining whether a plurality of devices belong to a group | |||
6631 | 7260719 | Information processing system, information processing method, and information processing device | |||
6632 | 7260718 | Method for adding external security to file system resources through symbolic link references | |||
6633 | 7260717 | System and method for performing kernel-mode operations | |||
6634 | 7260715 | Method and apparatus for revocation list management | |||
6635 | 7260636 | Method and apparatus for preventing unauthorized access by a network device | |||
6636 | 7260556 | Content rendering device with usage rights | |||
6637 | 7260555 | Method and architecture for providing pervasive security to digital assets | |||
6638 | 7260552 | Secure remote electronic voting system and cryptographic protocols and computer programs employed | |||
6639 | 7260223 | Data transfer system | |||
6640 | 7260221 | Personal communicator authentication | |||
6641 | 7260218 | Configurable circuit with configuration data protection features | |||
6642 | 7260216 | State machine representation for encrypting and decrypting a set of data values and method for protecting the same | |||
6643 | 7260215 | Method for encryption in an un-trusted environment | |||
6644 | 7257842 | Pre-approval of computer files during a malware detection | |||
6645 | 7257839 | Calculation of identifier codes distributed among pan devices | |||
6646 | 7257836 | Security link management in dynamic networks | |||
6647 | 7257835 | Securely authorizing the performance of actions | |||
6648 | 7257833 | Architecture for an integrated policy enforcement system | |||
6649 | 7257716 | Method and apparatus for uploading mass-distributed content to a server | |||
6650 | 7257714 | Electronic data storage medium with fingerprint verification capability | |||
6651 | 7257712 | Runtime digital signatures | |||
6652 | 7257711 | Efficient authenticated dictionaries with skip lists and commutative hashing | |||
6653 | 7257710 | Additional-data embedding apparatus and additional-data embedding method | |||
6654 | 7257708 | Steganographic authentication | |||
6655 | 7257580 | Method, system, and program for restricting modifications to allocations of computational resources | |||
6656 | 7257542 | Secure on-line ticketing | |||
6657 | 7257229 | Apparatus and method for key scheduling | |||
6658 | 7257228 | Account authority digital signature (AADS) system using encoded information | |||
6659 | 7257227 | System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems | |||
6660 | 7257225 | System and method for high speed reversible data encryption | |||
6661 | 7257224 | Cryptographical pseudo-random number generation apparatus and program | |||
6662 | 7254838 | Copy protection method and system for digital media | |||
6663 | 7254716 | Security supervisor governing allowed transactions on a system bus | |||
6664 | 7254712 | System and method for compressing secure e-mail for exchange with a mobile data communication device | |||
6665 | 7254708 | Apparatus and method for wireless device set-up and authentication using audio authentication.sub.--information | |||
6666 | 7254707 | Platform and method for remote attestation of a platform | |||
6667 | 7254559 | System and method for collection, distribution, and use of information in connection with commercial real estate | |||
6668 | 7254295 | Optical fiber interferometer with relaxed loop tolerance and QKD system using the same | |||
6669 | 7254237 | System and method for establishing a secure connection | |||
6670 | 7254235 | Receiving mixed-media data | |||
6671 | 7254234 | Method and apparatus for encrypting and decrypting information | |||
6672 | 7254233 | Fast encryption and authentication for data processing systems | |||
6673 | 7251834 | Filtering a permission set using permission requests associated with a code assembly | |||
6674 | 7251832 | Secure streaming container | |||
6675 | 7251828 | Flexible method of security data backup | |||
6676 | 7251824 | Accessing a private network | |||
6677 | 7251734 | Secure integrated circuit including parts having a confidential nature and method for operating the same | |||
6678 | 7251731 | Call set-up from a mobile radio telephone terminal with biometric authentication | |||
6679 | 7251730 | Method and apparatus for simplified audio authentication | |||
6680 | 7251729 | Authentication method for establishing connection between devices | |||
6681 | 7251728 | Secure and reliable document delivery using routing lists | |||
6682 | 7251635 | Method and apparatus for managing a key management system | |||
6683 | 7251633 | Method or system for executing deferred transactions | |||
6684 | 7251330 | Content playback system, content playback method, content playback requesting apparatus, and temporary playback apparatus | |||
6685 | 7251327 | Data transmission apparatus, data transmission method, and data recording medium | |||
6686 | 7251326 | Method and apparatus for data encryption | |||
6687 | 7249382 | Distributing access to a data item | |||
6688 | 7249379 | Method and apparatus for implementing process-based security in a computer system | |||
6689 | 7249377 | Method for client delegation of security to a proxy | |||
6690 | 7249376 | Firewall providing enhanced network security and user transparency | |||
6691 | 7249372 | Network based document distribution method | |||
6692 | 7249262 | Method for restricting access to a web site by remote users | |||
6693 | 7249261 | Method for securely supporting password change | |||
6694 | 7249260 | Method and apparatus for implementing a pluggable password obscuring mechanism | |||
6695 | 7249259 | Hybrid signature scheme | |||
6696 | 7249258 | Method and system for assuring an original | |||
6697 | 7249257 | Digitally watermarked maps and signs and related navigational tools | |||
6698 | 7249256 | Encryption protocol | |||
6699 | 7249255 | Apparatus and method for a hash processing system using multiple hash storage areas | |||
6700 | 7249111 | Method of assigning value codes | |||
6701 | 7249102 | Original data circulation method, system, apparatus, and computer readable medium | |||
6702 | 7249100 | Service discovery access to user location | |||
6703 | 7248739 | Semiconductor device for compressing video signals with copy protection information | |||
6704 | 7248699 | Encryption method using synchronized continuously calculated pseudo-random key | |||
6705 | 7248698 | System for generating pseudorandom sequences | |||
6706 | 7248697 | Apparatus and method for scrambling and descrambling data wordwise in optical disk system | |||
6707 | 7248696 | Dynamic system bus encryption using improved differential transitional encoding | |||
6708 | 7248695 | Systems and methods for transmitting quantum and classical signals over an optical network | |||
6709 | 7248693 | Secure network-based system for the distributed printing of documents | |||
6710 | 7248692 | Method of and apparatus for determining a key pair and for generating RSA keys | |||
6711 | 7248691 | Hashing using multiple sub-hashes | |||
6712 | 7248069 | Method and apparatus for providing security for debug circuitry | |||
6713 | 7246378 | Controlling and tracking access to disseminated information | |||
6714 | 7246373 | Methods and apparatus for virtual private network based mobility | |||
6715 | 7246371 | System and method for filtering unavailable devices in a presence and availability management system | |||
6716 | 7246247 | Secure device | |||
6717 | 7246246 | System for keying protected electronic data to particular media to prevent unauthorized copying using a compound key | |||
6718 | 7246242 | Integrity protection method for radio network signaling | |||
6719 | 7246241 | Apparatus and method for securely realizing cooperative processing | |||
6720 | 7246240 | Quantum digital signatures | |||
6721 | 7246239 | Digital watermarks for checking authenticity of printed objects | |||
6722 | 7246238 | System and method for providing integration via a dial-up interface | |||
6723 | 7246237 | Method and device for the generation of several channels in an IFF type system | |||
6724 | 7246236 | Method and apparatus for providing peer authentication for a transport layer session | |||
6725 | 7246235 | Time varying presentation of items based on a key hash | |||
6726 | 7246234 | Transmitter device, transmitting method, receiver device, receiving method, communication system, and program storage medium | |||
6727 | 7246232 | Methods and apparatus for scalable distributed management of wireless virtual private networks | |||
6728 | 7246231 | Location privacy through IP address space scrambling | |||
6729 | 7246230 | Single sign-on over the internet using public-key cryptography | |||
6730 | 7246097 | Methods and apparatus for generating secure endorsed transactions | |||
6731 | 7245740 | Electronic watermark embedding device, electronic watermark detection device, electronic watermark embedding method, and electronic watermark detection method | |||
6732 | 7245725 | Dual processor framer | |||
6733 | 7245724 | Rekey operation with multiplexing capability | |||
6734 | 7245723 | Chaotic communication system and method using modulation of nonreactive circuit elements | |||
6735 | 7245718 | Low bandwidth zero knowledge authentication protocol and device | |||
6736 | 7243372 | Modified Harvard architecture processor having data memory space mapped to program memory space with erroneous execution protection | |||
6737 | 7243367 | Method and apparatus for starting up a network or fabric | |||
6738 | 7243366 | Key management protocol and authentication system for secure internet protocol rights management architecture | |||
6739 | 7243239 | Click passwords | |||
6740 | 7243237 | Secure communication with a keyboard or related device | |||
6741 | 7243236 | Systems and methods for using cryptography to protect secure and insecure computing environments | |||
6742 | 7243235 | Mandatory access control (MAC) method | |||
6743 | 7243233 | System and method for secure communication between electronic devices | |||
6744 | 7243232 | Key agreement and transport protocol | |||
6745 | 7243231 | Sensory verification of shared data | |||
6746 | 7243230 | Transferring application secrets in a trusted operating system environment | |||
6747 | 7243229 | Exclusive access control apparatus and method | |||
6748 | 7243228 | Data storage with CBC-mode encryption processing | |||
6749 | 7243227 | Method and apparatus to copy protect software programs | |||
6750 | 7243225 | Data handling in IPSec enabled network stack | |||
6751 | 7242776 | Method and apparatus for the generation and distribution of random bits | |||
6752 | 7242775 | Optical pulse calibration for quantum key distribution | |||
6753 | 7242774 | Quantum cryptography based on phase entangled photons | |||
6754 | 7242772 | Encryption apparatus and method for synchronizing multiple encryption keys with a data stream | |||
6755 | 7242771 | Contents management system | |||
6756 | 7242769 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
6757 | 7242768 | Super secure migratable keys in TCPA | |||
6758 | 7240830 | Layered SIM card and security function | |||
6759 | 7240369 | Plug and play device and access control method therefor | |||
6760 | 7240366 | End-to-end authentication of session initiation protocol messages using certificates | |||
6761 | 7240220 | Method and apparatus for cryptographic conversion in a data storage system | |||
6762 | 7240216 | IC card having block state of operation and method of providing information security for the same | |||
6763 | 7240212 | Method and system for secure alert messaging | |||
6764 | 7240210 | Hash value computer of content of digital signals | |||
6765 | 7240209 | Methods of invisibly embedding and hiding data into soft-copy text documents | |||
6766 | 7240208 | Encrypting digital camera with automatic encryption key deletion | |||
6767 | 7240206 | Information signal copy managing method, information signal recording method, information signal output apparatus, and recording medium | |||
6768 | 7240205 | Systems and methods for verifying documents | |||
6769 | 7240204 | Scalable and unified multiplication methods and apparatus | |||
6770 | 7240203 | Method and apparatus for establishing secure sessions | |||
6771 | 7240202 | Security context sharing | |||
6772 | 7240201 | Method and apparatus to provide secure communication between systems | |||
6773 | 7240200 | System and method for guaranteeing software integrity via combined hardware and software authentication | |||
6774 | 7240199 | System and method for verifying delivery and integrity of electronic messages | |||
6775 | 7240198 | Honesty preserving negotiation and computation | |||
6776 | 7240197 | Method and apparatus for encryption and decryption in remote data storage systems | |||
6777 | 7240195 | Certified shuffle-decrypting system, certified shuffle-decrypting method and certified shuffle-decryption verifying method | |||
6778 | 7240194 | Systems and methods for distributing trusted certification authorities | |||
6779 | 7240193 | Systems and methods that provide external network access from a protected network | |||
6780 | 7240191 | Method and apparatus for initializing security information on a network device | |||
6781 | 7240036 | Method and system for facilitation of wireless e-commerce transactions | |||
6782 | 7240035 | Method and apparatus for masking private mailing address information by manipulating delivery transactions | |||
6783 | 7240034 | Method for secure electronic transaction and corresponding system | |||
6784 | 7240033 | Information providing apparatus and method, information processing apparatus and method, program storage medium, program, and information providing system | |||
6785 | 7239709 | Data recording/reproducing method, data recording/reproducing system, recording apparatus | |||
6786 | 7239707 | Staggered pulse acquisition method and apparatus | |||
6787 | 7239701 | Key sharing method, secret key generating method, common key generating method and cryptographic communication method in ID-NIKS cryptosystem | |||
6788 | 7239346 | System and architecture that supports a multi-function semiconductor device between networks and portable wireless communications products | |||
6789 | 7237261 | Method, system and gateway allowing secured end-to-end access to WAP services | |||
6790 | 7237255 | Method and system to dynamically present a payment gateway for content distributed via a network | |||
6791 | 7237125 | Method and apparatus for automatically deploying security components in a content distribution system | |||
6792 | 7237123 | Systems and methods for preventing unauthorized use of digital content | |||
6793 | 7237122 | Method and apparatus to facilitate software installation using embedded user credentials | |||
6794 | 7237120 | Method for producing and checking forge-proof documents | |||
6795 | 7237118 | Methods and systems for authentication of a user for sub-locations of a network location | |||
6796 | 7237117 | Universal secure registry | |||
6797 | 7237116 | Digital signature system and method based on hard lattice problem | |||
6798 | 7237115 | Authenticating concealed private data while maintaining concealment | |||
6799 | 7237114 | Method and system for signing and authenticating electronic documents | |||
6800 | 7237112 | Information processing system | |||
6801 | 7237108 | Encryption of streaming control protocols and their headers | |||
6802 | 7237081 | Secure mode for processors supporting interrupts | |||
6803 | 7236958 | Electronic software license with software product installer identifier | |||
6804 | 7236957 | Method for remotely authorizing a payment transaction file over an open network | |||
6805 | 7236614 | Device, system, and method for identifying living bodies and renewing registration data | |||
6806 | 7236610 | Authenticating executable code and executions thereof | |||
6807 | 7236598 | Systems and methods for communication protection | |||
6808 | 7236594 | Random generator description | |||
6809 | 7236592 | Efficient stream cipher system and method | |||
6810 | 7236591 | Method for performing turbo decoding in mobile communication system | |||
6811 | 7236590 | Method and apparatus for protecting data | |||
6812 | 7236589 | Device for point compression for Jacobians of hyperelliptic curves | |||
6813 | 7234063 | Method and apparatus for generating pairwise cryptographic transforms based on group keys | |||
6814 | 7234062 | Authentication of remote appliance messages using an embedded cryptographic device | |||
6815 | 7234061 | Methods and apparatus for verifying modules from approved vendors | |||
6816 | 7234059 | Anonymous authenticated communications | |||
6817 | 7234058 | Method and apparatus for generating pairwise cryptographic transforms based on group keys | |||
6818 | 7233981 | System and method for multi-site load-balancing of encrypted traffic | |||
6819 | 7233948 | Methods and apparatus for persistent control and protection of content | |||
6820 | 7233929 | Postal system intranet and commerce processing for on-line value bearing system | |||
6821 | 7233671 | Method for storing a security start value in a wireless communications system | |||
6822 | 7233666 | Method and apparatus for increasing the entropy of a pseudorandom number | |||
6823 | 7233665 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
6824 | 7233664 | Dynamic security authentication for wireless communication networks | |||
6825 | 7233663 | Key generation performance improvement | |||
6826 | 7233662 | Numerical array output device, a numerical array output method, an encryption device, and a decryption device | |||
6827 | 7231669 | Binding content to a portable storage device or the like in a digital rights management (DRM) system | |||
6828 | 7231664 | System and method for transmitting and receiving secure data in a virtual private group | |||
6829 | 7231663 | System and method for providing key management protocol with client verification of authorization | |||
6830 | 7231661 | Authorization services with external authentication | |||
6831 | 7231657 | User authentication system and methods thereof | |||
6832 | 7231528 | Method of editing/restoring electronic information | |||
6833 | 7231526 | System and method for validating a network session | |||
6834 | 7231525 | Authentification of data in a digital transmission system | |||
6835 | 7231524 | Method for watermarking computer programs | |||
6836 | 7231523 | Method and apparatus for facilitating secure extension of an application | |||
6837 | 7231522 | Information processing apparatus, method for controlling the same, and storage medium | |||
6838 | 7231521 | Scheme for authentication and dynamic key exchange | |||
6839 | 7231519 | Secure inter-node communication | |||
6840 | 7231518 | System and method for authenticating a storage device for use with driver software in a storage network | |||
6841 | 7231517 | Apparatus and method for automatically authenticating a network client | |||
6842 | 7231371 | Method and system for ordering and delivering digital certificates | |||
6843 | 7231370 | Method and apparatus for organizational software license sharing | |||
6844 | 7231369 | Digital contents provision system, server device incorporated in the system, digital contents provision method using the system, and computer program for executing the method | |||
6845 | 7231271 | Steganographic method for covert audio communications | |||
6846 | 7231061 | Adaptive prediction filtering for digital watermarking | |||
6847 | 7231050 | Protection against unintentional file changing | |||
6848 | 7231049 | Electronic mailing system | |||
6849 | 7231048 | Key sharing system, public key cryptosystem, signature system, key sharing apparatus, encryption apparatus, decryption apparatus, signature apparatus, authentication apparatus, key sharing method, encryption method, decryption method, signature method, authentication method, and programs | |||
6850 | 7231047 | Private retrieval of digital objects | |||
6851 | 7231046 | Method for controlling connections to a mobile station | |||
6852 | 7231045 | Secure transaction modem storing unique indicia | |||
6853 | 7231044 | Method and apparatus for real-time digital certification of electronic files and transactions using entropy factors | |||
6854 | 7231041 | Method, device, and system for secure motor vehicle remote keyless entry | |||
6855 | 7231040 | Multiprime RSA public key cryptosystem | |||
6856 | 7228566 | Automated computer system security compromise | |||
6857 | 7228563 | Shell code blocking system and method | |||
6858 | 7228438 | Computer network security system employing portable storage device | |||
6859 | 7228437 | Method and system for securing local database file of local content stored on end-user system | |||
6860 | 7228435 | Program executing method in service system and program executing apparatus for the same | |||
6861 | 7228430 | Security system for preventing a personal computer from being used by an unauthorized people | |||
6862 | 7228429 | Multimedia network appliances for security and surveillance applications | |||
6863 | 7228427 | Method and system to securely distribute content via a network | |||
6864 | 7228426 | Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context | |||
6865 | 7228425 | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections | |||
6866 | 7228424 | Method and system for using optical disk drive as a biometric card reader for secure online user authentication | |||
6867 | 7228422 | Packet transmission/reception device | |||
6868 | 7228421 | Technique for generating control messages with reason information between nodes in a data network | |||
6869 | 7228417 | Simple secure login with multiple-authentication providers | |||
6870 | 7228415 | Method and apparatus for transferring a communication session | |||
6871 | 7228414 | Method and apparatus for transferring a communication session | |||
6872 | 7228413 | Data transmitting/receiving method and its receiver | |||
6873 | 7228412 | Bufferless secure sockets layer architecture | |||
6874 | 7227956 | Simple encrypted transmission system suitable for intermittent signals | |||
6875 | 7227954 | Secure data transmission system and method | |||
6876 | 7227950 | Distributed quantum encrypted pattern generation and scoring | |||
6877 | 7227949 | Separate self-synchronizing packet-based scrambler having replay variation | |||
6878 | 7227948 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
6879 | 7227947 | Cryptographic method and cryptographic device | |||
6880 | 7227499 | Dual platform location-relevant service | |||
6881 | 7225469 | BIOS lock encode/decode driver | |||
6882 | 7225467 | Active intrusion resistant environment of layered object and compartment keys (airelock) | |||
6883 | 7225465 | Method and system for remote management of personal security devices | |||
6884 | 7225463 | Secure network architecture method and apparatus | |||
6885 | 7225343 | System and methods for adaptive model generation for detecting intrusions in computer systems | |||
6886 | 7225339 | Information recording/playback apparatus and method | |||
6887 | 7225336 | System and a method for giving run authorization to a program installed on a computer | |||
6888 | 7225332 | Methods and apparatus to perform cryptographic operations on received data | |||
6889 | 7225331 | System and method for securing data on private networks | |||
6890 | 7225329 | Enhanced CSU/DSU (channel service unit/data service unit) | |||
6891 | 7225262 | System and method for selecting an external user interface using spatial information | |||
6892 | 7225243 | Device discovery methods and systems implementing the same | |||
6893 | 7225169 | Method and system for commerce with full anonymity | |||
6894 | 7225166 | Remote authentication of two dimensional barcoded indicia | |||
6895 | 7225161 | Method and system for initializing a key management system | |||
6896 | 7225160 | Digital works having usage rights and method for creating the same | |||
6897 | 7225159 | Method for authenticating and securing integrated bookstore entries | |||
6898 | 7224806 | Threshold cryptography scheme for conditional access systems | |||
6899 | 7224805 | Consumption of content | |||
6900 | 7224804 | Information processing device, information processing method, and program storage medium | |||
6901 | 7224802 | Wireless communication device, and method for controlling the same, which authenticates partner device when connecting thereto | |||
6902 | 7224799 | Digital watermarking device, digital watermark insertion method and digital watermark detection method | |||
6903 | 7224798 | Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system | |||
6904 | 7224796 | Pseudorandom number generating apparatus or encryption or decryption apparatus using the same | |||
6905 | 7224795 | Variable-length key cryptosystem | |||
6906 | 7224310 | Method and device for the recognition of the origin of encrypted data broadcasting | |||
6907 | 7222368 | Mechanism for controlling if/when material can be printed on a specific printer | |||
6908 | 7222365 | Non-algorithmic vectored steganography | |||
6909 | 7222361 | Computer security with local and remote authentication | |||
6910 | 7222312 | Secure exchange of information in electronic design automation | |||
6911 | 7222242 | Interface for facilitating facsimile transmissions via wireless communications networks | |||
6912 | 7222241 | Building security and access protection system | |||
6913 | 7222240 | Token for storing installation software and drivers | |||
6914 | 7222239 | Dynamic security system | |||
6915 | 7222238 | Method and system for real-time registration of transactions with a security module | |||
6916 | 7222237 | Secure multimedia data transmission method | |||
6917 | 7222236 | Evidencing indicia of value using secret key cryptography | |||
6918 | 7222234 | Method for key agreement for a cryptographic secure point--to--multipoint connection | |||
6919 | 7222233 | Method for secure remote backup | |||
6920 | 7222232 | License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer | |||
6921 | 7222231 | Data security for distributed file systems | |||
6922 | 7222229 | System for automated boot from disk image | |||
6923 | 7222108 | Electronic cash implementing method and equipment using user signature and recording medium recorded thereon a program for the method | |||
6924 | 7222106 | Mechanisms for handling software license agreements on multi-user system | |||
6925 | 7222104 | Method and apparatus for transferring usage rights and digital work having transferrable usage rights | |||
6926 | 7222101 | System and method for securing data through a PDA portal | |||
6927 | 7221764 | Security key distribution using key rollover strategies for wireless networks | |||
6928 | 7221763 | High throughput AES architecture | |||
6929 | 7221762 | Authenticated ID-based cryptosystem with no key escrow | |||
6930 | 7221758 | Practical non-malleable public-key cryptosystem | |||
6931 | 7221756 | Constructions of variable input length cryptographic primitives for high efficiency and high security | |||
6932 | 7219238 | Data transfer control device, electronic instrument, and data transfer control method | |||
6933 | 7219235 | Locked portal unlocking control apparatus and method | |||
6934 | 7219234 | System and method for managing access rights and privileges in a data processing system | |||
6935 | 7219233 | Methods and apparatus for associating a user with content in a collaborative whiteboard system | |||
6936 | 7219231 | Extensible authentication system and method | |||
6937 | 7219230 | Optimizing costs associated with managing encrypted data | |||
6938 | 7219229 | Protected communication system | |||
6939 | 7219227 | Data distribution system and recording device and data provision device used therefor | |||
6940 | 7219226 | Method and apparatus for encrypting data | |||
6941 | 7219225 | Network arrangement for communication | |||
6942 | 7219224 | Method and apparatus for transferring fragmented audio/video control commands using an independent software layer | |||
6943 | 7219223 | Method and apparatus for providing data from a service to a client based on encryption capabilities of the client | |||
6944 | 7219222 | Method and system to grant access to software options resident on a medical imaging device | |||
6945 | 7219152 | Packet filtering methods and systems | |||
6946 | 7218736 | Data transfer method | |||
6947 | 7218735 | Cryptography method on elliptic curves | |||
6948 | 7218733 | Encryption method, program for encryption, memory medium for storing the program, and encryption apparatus, as well as decryption method and decryption apparatus | |||
6949 | 7218643 | Relay device and communication device realizing contents protection procedure over networks | |||
6950 | 7216368 | Information processing apparatus for watermarking digital content | |||
6951 | 7216367 | Safe memory scanning | |||
6952 | 7216238 | System and method for controlling usage of software on computing devices | |||
6953 | 7216237 | System and method for trusted communication | |||
6954 | 7216235 | Drive/host locking system | |||
6955 | 7216233 | Apparatus, methods, and computer program products for filtering information | |||
6956 | 7216232 | Method and device for inserting and authenticating a digital signature in digital data | |||
6957 | 7216231 | Method and system for establishing a wireless communication link | |||
6958 | 7216229 | Method based on border gateway protocol message for controlling messages security protection | |||
6959 | 7216228 | Recording medium recording and/or reproduction apparatus, recording and/or reproduction method | |||
6960 | 7216227 | Method and system for controlling the use of addresses using address computation techniques | |||
6961 | 7216226 | Unique and secure identification of a networked computing node | |||
6962 | 7216224 | Method and system for user registration using processing sensor | |||
6963 | 7215978 | Mobile terminal apparatus, mobile terminal settings changing system, method used therefor, and program thereof | |||
6964 | 7215780 | Method and apparatus for elliptic curve scalar multiplication | |||
6965 | 7215779 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
6966 | 7215778 | Encrypted content recovery | |||
6967 | 7215776 | Method and apparatus for the compression and decompression of audio files using a chaotic system | |||
6968 | 7215775 | Ad-hoc radio communication verification system | |||
6969 | 7215773 | Key validation scheme | |||
6970 | 7215771 | Secure disk drive comprising a secure drive key and a drive ID for implementing secure communication over a public network | |||
6971 | 7215770 | System and method for partially encrypted multimedia stream | |||
6972 | 7215769 | Non-autonomous dynamical orbit cryptography | |||
6973 | 7213267 | Method of protecting a microcomputer system against manipulation of data stored in a storage assembly of the microcomputer system | |||
6974 | 7213260 | Systems and methods for upstream threat pushback | |||
6975 | 7213151 | Method and computer system for encoding of information into a representation | |||
6976 | 7213150 | Method and apparatus for secure message queuing | |||
6977 | 7213149 | Message authentication | |||
6978 | 7213148 | Apparatus and method for a hash processing system using integrated message digest and secure hash architectures | |||
6979 | 7213147 | Methods and apparatus for managing secure collaborative transactions | |||
6980 | 7213146 | System and method for establishing security profiles of computers | |||
6981 | 7213145 | Method and apparatus for secure internet protocol communication in a call processing system | |||
6982 | 7213144 | Efficient security association establishment negotiation technique | |||
6983 | 7213005 | Digital content distribution using web broadcasting services | |||
6984 | 7212980 | Trial management system, program, and computer readable recording medium recording the program | |||
6985 | 7212638 | Wireless cryptographic fill system and method | |||
6986 | 7212634 | Data distribution | |||
6987 | 7212633 | Expansion key generating device, encryption device and encryption system | |||
6988 | 7212631 | Apparatus and method for performing KASUMI ciphering | |||
6989 | 7212630 | Method and apparatus for encryption using partial information | |||
6990 | 7210166 | Method and system for secure, one-time password override during password-protected system boot | |||
6991 | 7210038 | Method for validating an authentication chip | |||
6992 | 7210037 | Method and apparatus for delegating digital signatures to a signature server | |||
6993 | 7210036 | Method and system for delivering secure e-mail | |||
6994 | 7209989 | Transfer acknowledgement mechanism for an MSL architecture | |||
6995 | 7209903 | Method and system for facilitation of wireless e-commerce transactions | |||
6996 | 7209902 | Repository with security class and method for use thereof | |||
6997 | 7209732 | Audio scrambler and recorder for cellular telephones | |||
6998 | 7209571 | Authenticating metadata and embedding metadata in watermarks of media signals | |||
6999 | 7209563 | Process for creating and managing at least one cryptographic key, and system for its implementation | |||
7000 | 7209562 | Method and apparatus for decrypting encrypted data stored on a record carrier | |||
7001 | 7209561 | System and method for generating encryption seed values | |||
7002 | 7209560 | Data communications | |||
7003 | 7209556 | Encryption apparatus and method, and decryption apparatus and method based on block encryption | |||
7004 | 7209555 | Elliptic curve converting device, elliptic curve converting method, elliptic curve utilization device and elliptic curve generating device | |||
7005 | 7207068 | Methods and apparatus for modeling based on conversational meta-data | |||
7006 | 7207063 | Method and apparatus for determining secure endpoints of tunnels in a network that uses internet security protocol | |||
7007 | 7207062 | Method and apparatus for protecting web sites from distributed denial-of-service attacks | |||
7008 | 7207060 | Method, system and computer program product for secure ticketing in a communications device | |||
7009 | 7207059 | Wireless communication system utilizing antenna dongle | |||
7010 | 7206945 | Parallel distributed sample descrambling apparatus of passive optical network and method thereof | |||
7011 | 7206943 | Display unit storing and using a cryptography key | |||
7012 | 7206940 | Methods and systems providing per pixel security and functionality | |||
7013 | 7206939 | File storage system and a NAS server | |||
7014 | 7206938 | Key sequence rhythm recognition system and method | |||
7015 | 7206935 | System and method for protecting network appliances against security breaches | |||
7016 | 7206934 | Distributed indexing of identity information in a peer-to-peer network | |||
7017 | 7206933 | Software modem with privileged mode driver authentication | |||
7018 | 7206932 | Firewall-tolerant voice-over-internet-protocol (VoIP) emulating SSL or HTTP sessions embedding voice data in cookies | |||
7019 | 7206850 | Communication system, relay device, service providing device, relaying method, service providing method and program product | |||
7020 | 7206765 | System and method for supplying and managing usage rights based on rules | |||
7021 | 7206430 | Data processing apparatus and method of processing data | |||
7022 | 7206412 | Reception terminal, key management apparatus, and key updating method for public key cryptosystem | |||
7023 | 7206411 | Rapid decryption of data by key synchronization and indexing | |||
7024 | 7206409 | Motion picture anti-piracy coding | |||
7025 | 7206408 | Countermeasure method in an electronic component using a dynamic secret key cryptographic algorithm | |||
7026 | 7205883 | Tamper detection and secure power failure recovery circuit | |||
7027 | 7205785 | Apparatus and method for repairing logic blocks | |||
7028 | 7203967 | Methods and apparatus for content protection in a wireless network | |||
7029 | 7203965 | System and method for home network content protection and copy management | |||
7030 | 7203959 | Stream scanning through network proxy servers | |||
7031 | 7203958 | Program use authorization method | |||
7032 | 7203932 | Method and system for using idiom recognition during a software translation process | |||
7033 | 7203845 | Multiple trust modes for handling data | |||
7034 | 7203841 | Encryption in a secure computerized gaming system | |||
7035 | 7203840 | Access control for interactive learning system | |||
7036 | 7203839 | Method for providing secure access to information held in a shared repository | |||
7037 | 7203837 | Methods and systems for unilateral authentication of messages | |||
7038 | 7203836 | Method and device for the mutual authentication of components in a network using the challenge-response method | |||
7039 | 7203834 | Method of updating encryption keys in a data communication system | |||
7040 | 7203833 | History based rights computation for managed code | |||
7041 | 7203343 | System and method for determining likely identity in a biometric database | |||
7042 | 7203319 | Apparatus and method for installing a decryption key | |||
7043 | 7203317 | System for enabling lazy-revocation through recursive key generation | |||
7044 | 7203316 | Signing and signature authentication of messages | |||
7045 | 7203312 | Data reproduction apparatus and data reproduction module | |||
7046 | 7203311 | Super encrypted storage and retrieval of media programs in a hard-paired receiver and storage device | |||
7047 | 7202773 | Authentication information communication system and method, portable information processing device and program furnishing medium | |||
7048 | 7201659 | Data delivery system, data delivery server and video game device | |||
7049 | 7200868 | Apparatus for encryption key management | |||
7050 | 7200860 | Method and system for secure network service | |||
7051 | 7200765 | Docking station for a wireless mouse with control of a computer | |||
7052 | 7200761 | Method to use secure passwords in an unsecure program environment | |||
7053 | 7200755 | Method and system for providing gated access for a third party to a secure entity or service | |||
7054 | 7200753 | Authentication apparatus and computer-readable storage medium | |||
7055 | 7200752 | Threshold cryptography scheme for message authentication systems | |||
7056 | 7200751 | Watermark system | |||
7057 | 7200750 | Method for distributing encryption keys for an overlay data network | |||
7058 | 7200749 | Method and system for using electronic communications for an electronic contract | |||
7059 | 7200748 | E-mail printer and e-mail printing method having authentication procedure | |||
7060 | 7200747 | System for ensuring data privacy and user differentiation in a distributed file system | |||
7061 | 7200664 | Distributed network storage system with virtualization | |||
7062 | 7200655 | System and method for distributed management of shared computers | |||
7063 | 7200637 | System for processing electronic mail messages with specially encoded addresses | |||
7064 | 7200575 | Managing access to digital content | |||
7065 | 7200574 | System for controlling the distribution and use digital works using digital tickets | |||
7066 | 7200549 | Method and equipment for encrypting/decrypting physical characteristic information, and identification system utilizing the physical characteristic information | |||
7067 | 7200233 | System and method for fast data encryption/decryption using time slot numbering | |||
7068 | 7200231 | Information processing system, information processing apparatus, and computer-readable recording medium | |||
7069 | 7200229 | Modular communication platform | |||
7070 | 7200226 | Cipher block chaining decryption | |||
7071 | 7200225 | Elliptic curve point ambiguity resolution apparatus and method | |||
7072 | 7197768 | Software modem for communicating data using encrypted data and unencrypted control codes | |||
7073 | 7197765 | Method for securely using a single password for multiple purposes | |||
7074 | 7197646 | System and method for preventing automated programs in a network | |||
7075 | 7197644 | Systems and methods for providing hardcopy secure documents and for validation of such documents | |||
7076 | 7197642 | Consumable authentication protocol and system | |||
7077 | 7197641 | Method and device for the transfer of electronic data volumes | |||
7078 | 7197640 | Use of identification codes in the handling and management of communications | |||
7079 | 7197639 | Cryptographic countermeasures against connection depletion attacks | |||
7080 | 7197638 | Unified permissions control for remotely and locally stored files whose informational content may be protected by smart-locking and/or bubble-protection | |||
7081 | 7197568 | Secure cache of web session information using web browser cookies | |||
7082 | 7197563 | Systems and methods for distributed network protection | |||
7083 | 7197484 | Asset management advice system and recording medium containing program of the system | |||
7084 | 7197145 | Method for setting up radio bearer in mobile communication system | |||
7085 | 7197144 | Method and apparatus to authenticate a user's system to prevent unauthorized use of software products distributed to users | |||
7086 | 7197141 | RSA cryptographic processing apparatus for IC card | |||
7087 | 7194767 | Screened subnet having a secured utility VLAN | |||
7088 | 7194759 | Used trusted co-servers to enhance security of web interaction | |||
7089 | 7194632 | Method for secure biometric authentication/identification, biometric data input module and verification module | |||
7090 | 7194631 | Information-processing apparatus having a user-switching function and user-switching method for use in the apparatus | |||
7091 | 7194629 | Apparatus for authenticating memory space of an authorized accessory | |||
7092 | 7194628 | Methods and systems for group authentication using the naccache-stern cryptosystem in accordance with a prescribed rule | |||
7093 | 7194626 | Hardware-based secure code authentication | |||
7094 | 7194625 | Method and apparatus for authenticating registry information | |||
7095 | 7194624 | Page encryption system | |||
7096 | 7194623 | Data event logging in computing platform | |||
7097 | 7194622 | Network partitioning using encryption | |||
7098 | 7194621 | Method and apparatus for encrypting data communicated between a client and a server that use an unencrypted data transfer protocol | |||
7099 | 7194620 | Method for real-time data authentication | |||
7100 | 7194619 | Remotely booting devices in a dense server environment without manually installing authentication parameters on the devices to be booted | |||
7101 | 7194617 | Method and apparatus to prevent the unauthorized copying of digital information | |||
7102 | 7194438 | Electronic payment schemes in a mobile environment for short-range transactions | |||
7103 | 7194092 | Key-based secure storage | |||
7104 | 7194090 | Encryption apparatus, decryption apparatus, expanded key generating apparatus and method therefor, and recording medium | |||
7105 | 7194089 | Method for reducing a value modulo a shared secret | |||
7106 | 7191469 | Methods and systems for providing a secure application environment using derived user accounts | |||
7107 | 7191468 | System and method for multidimensional data compression | |||
7108 | 7191466 | Flexible system and method of user authentication for password based system | |||
7109 | 7191346 | Data transfer system, data transfer apparatus, data recording apparatus, edit controlling method and data processing method | |||
7110 | 7191343 | Voucher driven on-device content personalization | |||
7111 | 7191340 | Generation of a secret quantity based on an identifier of an integrated circuit | |||
7112 | 7191339 | System and method for using a PLD identification code | |||
7113 | 7191336 | Method for embedding information in an image | |||
7114 | 7191335 | Method and apparatus for encrypted transmission | |||
7115 | 7191334 | Embedding auxiliary data in a signal | |||
7116 | 7191332 | Digital rights management for multicasting content distribution | |||
7117 | 7191331 | Detection of support for security protocol and address translation integration | |||
7118 | 7191156 | Digital watermarking systems | |||
7119 | 7191155 | License transmitting and distributing system under offline environment and method thereof | |||
7120 | 7190793 | Key generation in a communication system | |||
7121 | 7190789 | Method and apparatus for finite field basis conversion | |||
7122 | 7190788 | Methods and apparatus for encrypting a binary string | |||
7123 | 7190787 | Stream cipher having a combiner function with storage based shuffle unit | |||
7124 | 7188368 | Method and apparatus for repairing damage to a computer system using a system rollback mechanism | |||
7125 | 7188364 | Personal virtual bridged local area networks | |||
7126 | 7188362 | System and method of user and data verification | |||
7127 | 7188360 | Universal authentication mechanism | |||
7128 | 7188358 | Email access control scheme for communication network using identification concealment mechanism | |||
7129 | 7188258 | Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects | |||
7130 | 7188257 | Falsification detection system, and falsification detection method and medium | |||
7131 | 7188251 | System and method for secure message-based leasing of resources in a distributed computing environment | |||
7132 | 7188249 | Derivation and quantization of robust non-local characteristics for blind watermarking | |||
7133 | 7188248 | Recovering from de-synchronization attacks against watermarking and fingerprinting | |||
7134 | 7188247 | System and method of content copy control | |||
7135 | 7188246 | System for adding electronic signature to a report associated with an image file | |||
7136 | 7188241 | Protecting software from unauthorized use by applying machine-dependent modifications to code modules | |||
7137 | 7188240 | Method and system for encryption of web browser cache | |||
7138 | 7188161 | Method for configuring a network element at a customer premise via a mobile data terminal | |||
7139 | 7188089 | System and method for securely storing, generating, transferring and printing electronic prepaid vouchers | |||
7140 | 7188087 | Devices, systems and methods for restricting use of digital content | |||
7141 | 7187772 | Anonymous transactions based on distributed processing | |||
7142 | 7185362 | Method and apparatus for security in a data processing system | |||
7143 | 7185358 | Method and apparatus for preventing reuse of text, images and software transmitted via networks | |||
7144 | 7185357 | Method and mechanism for implementing synonym-based access control | |||
7145 | 7185208 | Data processing | |||
7146 | 7185205 | Crypto-pointers for secure data storage | |||
7147 | 7185202 | Method and apparatus for obtaining an electronic signature from a browser | |||
7148 | 7185201 | Content identifiers triggering corresponding responses | |||
7149 | 7185200 | Server-side watermark data writing method and apparatus for digital signals | |||
7150 | 7185199 | Apparatus and methods for providing secured communication | |||
7151 | 7185198 | Apparatus and method for authentication and method for registering a person | |||
7152 | 7185196 | Key caching system | |||
7153 | 7185195 | Certificate based digital rights management | |||
7154 | 7185194 | System and method for distributed group management | |||
7155 | 7185193 | Person authentication system, person authentication method, and program providing medium | |||
7156 | 7185192 | Methods and apparatus for controlling access to a resource | |||
7157 | 7185092 | Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor | |||
7158 | 7184988 | Methods for operating infrastructure and applications for cryptographically-supported services | |||
7159 | 7184986 | Content transaction system and method, and program providing medium therefor | |||
7160 | 7184985 | Method, system, and apparatus for providing secure access to a digital work | |||
7161 | 7184572 | Using steganographic encoded information with maps | |||
7162 | 7184555 | Quantum computation | |||
7163 | 7184553 | Method and system for encryption of optical signals | |||
7164 | 7184551 | Public key cryptography using matrices | |||
7165 | 7184546 | Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications | |||
7166 | 7184545 | Semiconductor integrated circuit and method of testing semiconductor integrated circuit | |||
7167 | 7181769 | Network security system having a device profiler communicatively coupled to a traffic monitor | |||
7168 | 7181767 | Keypad device security system and method | |||
7169 | 7181766 | Methods and system for providing network services using at least one processor interfacing a base network | |||
7170 | 7181765 | Method and apparatus for providing node security in a router of a packet network | |||
7171 | 7181764 | System and method for a subscription model trusted email database for use in antispam | |||
7172 | 7181761 | Rights management inter-entity message policies and enforcement | |||
7173 | 7181624 | Information recording/playback apparatus and method | |||
7174 | 7181623 | Scalable wide-area upload system and method | |||
7175 | 7181622 | Derivation and quantization of robust non-local characteristics for blind watermarking | |||
7176 | 7181621 | Methods and device for digitally signing data | |||
7177 | 7181620 | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach | |||
7178 | 7181618 | System and method for recovering a security profile of a computer system | |||
7179 | 7181616 | Method of and apparatus for data transmission | |||
7180 | 7181615 | Method and system for vehicle authentication of a remote access device | |||
7181 | 7181614 | Method and arrangement in a communication network | |||
7182 | 7181613 | System and method for providing secure internetwork services via an assured pipeline | |||
7183 | 7181612 | Facilitating IPsec communications through devices that employ address translation in a telecommunications network | |||
7184 | 7181602 | Method for exchanging at least one secret initial value between a processing station and a chip card | |||
7185 | 7181542 | Method and system for managing and configuring virtual private networks | |||
7186 | 7181431 | Interactive information services system and associated method for facilitating purchasing transactions | |||
7187 | 7181043 | Data processing method and apparatus | |||
7188 | 7181017 | System and method for secure three-party communications | |||
7189 | 7181016 | Deriving a symmetric key from an asymmetric key for file encryption or decryption | |||
7190 | 7181015 | Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique | |||
7191 | 7181014 | Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange | |||
7192 | 7181012 | Secured map messages for telecommunications networks | |||
7193 | 7181009 | Generating message digests according to multiple hashing procedures | |||
7194 | 7181008 | Contents management method, content management apparatus, and recording medium | |||
7195 | 7178169 | Method and apparatus for securing transfer of and access to digital content | |||
7196 | 7178165 | Additional layer in operating system to protect system from hacking | |||
7197 | 7178038 | Apparatus and method for reproducing user data | |||
7198 | 7178035 | Write once system and method for facilitating digital encrypted transmissions | |||
7199 | 7178030 | Electronically signing a document | |||
7200 | 7178029 | Method and apparatus for validating a digital signature | |||
7201 | 7178028 | Information processing apparatus and method, recording medium, and program | |||
7202 | 7178026 | Identification code management method and management system | |||
7203 | 7178025 | Access system utilizing multiple factor identification and authentication | |||
7204 | 7178024 | Security service for an electronic marketplace | |||
7205 | 7178023 | System and method to facilitate secure communication of data | |||
7206 | 7178022 | Digital content cryptograph and process | |||
7207 | 7177932 | Method, gateway and system for transmitting data between a device in a public network and a device in an internal network | |||
7208 | 7177847 | Authorization token accompanying request and including constraint tied to request | |||
7209 | 7177843 | Rights expression system | |||
7210 | 7177426 | Electronic file protection using location | |||
7211 | 7177425 | Device and method for securing information associated with a subscriber in a communication apparatus | |||
7212 | 7177424 | Cryptographic apparatus and method | |||
7213 | 7177423 | Method and apparatus for exponentiation in an RSA cryptosystem | |||
7214 | 7177422 | Elliptic curve encryption processing method, elliptic curve encryption processing apparatus, and program | |||
7215 | 7177421 | Authentication engine architecture and method | |||
7216 | 7176934 | 3-D graphics texturing system using encrypted textures | |||
7217 | 7176849 | Wireless security badge | |||
7218 | 7174569 | Client security for networked applications | |||
7219 | 7174568 | Method and system for securely distributing computer software products | |||
7220 | 7174565 | Negotiating secure connections through a proxy server | |||
7221 | 7174465 | Secure method for system attribute modification | |||
7222 | 7174463 | Method and system for preboot user authentication | |||
7223 | 7174460 | Distributed digital signature generation method and digitally signed digital document generation method and apparatus | |||
7224 | 7174459 | Imprinting an identification certificate | |||
7225 | 7174458 | Method of and apparatus for authenticating client terminal by making use of port access | |||
7226 | 7174457 | System and method for authenticating an operating system to a central processing unit, providing the CPU/OS with secure storage, and authenticating the CPU/OS to a third party | |||
7227 | 7174456 | Fast authentication and access control method for mobile networking | |||
7228 | 7174455 | Method and system for delivering digital products electronically | |||
7229 | 7174454 | System and method for establishing historical usage-based hardware trust | |||
7230 | 7174021 | Systems and methods for providing secure server key operations | |||
7231 | 7174019 | Cipher generating device, cipher decoding device, cipher generating program, cipher decoding program, authentication system and electronic device | |||
7232 | 7174018 | Security framework for an IP mobility system using variable-based security associations and broker redirection | |||
7233 | 7171693 | Information security method and system | |||
7234 | 7171692 | Asynchronous communication within a server arrangement | |||
7235 | 7171688 | System, method and computer program for the detection and restriction of the network activity of denial of service attack software | |||
7236 | 7171683 | Protecting against distributed denial of service attacks | |||
7237 | 7171679 | Generating and maintaining encrypted passwords | |||
7238 | 7171662 | System and method for software licensing | |||
7239 | 7171567 | System for protecting information over the internet | |||
7240 | 7171566 | Data encryption and decryption | |||
7241 | 7171565 | Method and system for producing wise cards | |||
7242 | 7171564 | Universal password generation method | |||
7243 | 7171561 | Method and apparatus for detecting and extracting fileprints | |||
7244 | 7171560 | Method and apparatus for securing and authenticating encoded data and documents containing such data | |||
7245 | 7171559 | Method of exchanging digital data | |||
7246 | 7171558 | Transparent digital rights management for extendible content viewers | |||
7247 | 7171557 | System for optimized key management with file groups | |||
7248 | 7171556 | VPN enrollment protocol gateway | |||
7249 | 7171555 | Method and apparatus for communicating credential information within a network device authentication conversation | |||
7250 | 7171554 | Method, computer program product and system for providing a switch user functionality in an information technological network | |||
7251 | 7171553 | Method for providing a secure communication between two devices and application of this method | |||
7252 | 7171412 | Restricted access model for hierarchical data structures | |||
7253 | 7171389 | Identification, storage and display of land data on a website | |||
7254 | 7171019 | Image processing apparatus and image processing method | |||
7255 | 7171000 | Simplified addressing for private communications | |||
7256 | 7170999 | Method of and apparatus for encrypting and transferring files | |||
7257 | 7170997 | Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data | |||
7258 | 7170996 | Random number generation for encrypting cellular communications | |||
7259 | 7170525 | Texturing system | |||
7260 | 7168089 | Secured virtual network in a gaming environment | |||
7261 | 7167987 | Use of biometrics to provide physical and logic access to computer devices | |||
7262 | 7167986 | Upgradeable timestamp mechanism | |||
7263 | 7167985 | System and method for providing trusted browser verification | |||
7264 | 7167984 | Method and device for generating approximate message authentication codes | |||
7265 | 7167982 | Securing decrypted files in a shared environment | |||
7266 | 7167981 | Method of transmitting email, device for implementing same method, and storing medium storing program for transmitting email | |||
7267 | 7167980 | Data comparison process | |||
7268 | 7167979 | Invoking mutual anonymity by electing to become head of a return path | |||
7269 | 7167843 | Apparatus for private personal identification number management | |||
7270 | 7167842 | Architecture and method for operational privacy in business services | |||
7271 | 7167841 | Content distributing system, content distributing service server, and community site server | |||
7272 | 7167762 | System and method for implementing safety instrumented systems in a fieldbus architecture | |||
7273 | 7167563 | Decoding device, decoding method and chip-card | |||
7274 | 7167562 | Security method using information transmission by optical means, and an optical disk for implementing the method | |||
7275 | 7167077 | Portable data carrier assembly comprising a security device | |||
7276 | 7165180 | Monolithic semiconductor device for preventing external access to an encryption key | |||
7277 | 7165179 | Digital signature verification and program transmission | |||
7278 | 7165178 | System and method for facilitating signing by buyers in electronic commerce | |||
7279 | 7165177 | Method of protecting an electronic chip against fraud | |||
7280 | 7165176 | Access privilege authentication of client computer for services provided by server computer | |||
7281 | 7165175 | Apparatus, system and method for selectively encrypting different portions of data sent over a network | |||
7282 | 7165173 | System and method for secure over-the-air administration of a wireless mobile station | |||
7283 | 7165110 | System and method for simultaneously establishing multiple connections | |||
7284 | 7165051 | Electronic commerce system and method for detecting fraud | |||
7285 | 7165050 | Media on demand via peering | |||
7286 | 7164765 | Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack | |||
7287 | 7162744 | Connected support entitlement system and method of operation | |||
7288 | 7162649 | Method and apparatus for network assessment and authentication | |||
7289 | 7162647 | Method and apparatus for cryptographic conversion in a data storage system | |||
7290 | 7162645 | Storage device including a non-volatile memory | |||
7291 | 7162641 | Weight based background discriminant functions in authentication systems | |||
7292 | 7162639 | Method for generating many-time restrictive blind signatures | |||
7293 | 7162638 | Electronic data management system and method | |||
7294 | 7162637 | Image verification system | |||
7295 | 7162636 | Method and apparatus for securing and authenticating encoded data and documents containing such data | |||
7296 | 7162634 | Method for providing security on a powerline-modem network | |||
7297 | 7162633 | Method and apparatus for hierarchical assignment of rights to documents and documents having such rights | |||
7298 | 7162631 | Method and system for scripting commands and data for use by a personal security device | |||
7299 | 7162630 | Systems and methods for implementing host-based security in a computer network | |||
7300 | 7162536 | Validation of a connection between arbitrary end-nodes in a communications network | |||
7301 | 7162456 | Method for private personal identification number management | |||
7302 | 7162455 | Unique time generating device and authenticating device using the same | |||
7303 | 7162453 | Protecting content from unauthorized reproduction | |||
7304 | 7162452 | Key distribution via a memory device | |||
7305 | 7162451 | Information content distribution based on privacy and/or personal information | |||
7306 | 7162450 | Business method for determining quality and integrity of data content | |||
7307 | 7162429 | System and method for managing sponsorships | |||
7308 | 7162143 | Simplified method and related device for authentication of DVD system | |||
7309 | 7162037 | Method for generating/regenerating an encryption key for a cryptographic method | |||
7310 | 7162035 | Authentication method and system | |||
7311 | 7162032 | Encryption of programs represented as polynomial mappings and their computations | |||
7312 | 7162031 | Method and device for cryptographically processing data | |||
7313 | 7159245 | Method for protecting a portable card | |||
7314 | 7159244 | Audio data playback management system and method with editing apparatus and recording medium | |||
7315 | 7159242 | Secure IPsec tunnels with a background system accessible via a gateway implementing NAT | |||
7316 | 7159126 | Digital content cryptograph and process | |||
7317 | 7159122 | Message digest instructions | |||
7318 | 7159119 | Method and system for efficiently retrieving secured data by securely pre-processing provided access information | |||
7319 | 7159118 | Methods and apparatus for embedding and recovering watermarking information based on host-matching codes | |||
7320 | 7159117 | Electronic watermark data insertion apparatus and electronic watermark data detection apparatus | |||
7321 | 7159116 | Systems, methods and devices for trusted transactions | |||
7322 | 7159114 | System and method of securely installing a terminal master key on an automated banking machine | |||
7323 | 7159113 | Distribution information management system and method | |||
7324 | 7159111 | Isolation of communication contexts to facilitate communication of data | |||
7325 | 7159110 | Identifying and coalescing identical objects encrypted with different keys | |||
7326 | 7158953 | Method and system for limiting the use of user-specific software features | |||
7327 | 7158641 | Recorder | |||
7328 | 7158640 | Method and apparatus for re-synchronization of a stream cipher during handoff | |||
7329 | 7158639 | Key generation | |||
7330 | 7158636 | Multivariable cryptosystem | |||
7331 | 7158635 | Generation of user equipment identification specific scrambling code for the high speed shared control channel | |||
2006 | |||||
7332 | 7155745 | Data storage device provided with function for user's access right | |||
7333 | 7155742 | Countering infections to communications modules | |||
7334 | 7155741 | Alteration of module load locations | |||
7335 | 7155738 | System and method for managing a trusted email datastore | |||
7336 | 7155737 | Integrating user specified extensions into an information access system | |||
7337 | 7155645 | System and method for testing memory while an operating system is active | |||
7338 | 7155615 | Method and apparatus for providing a secure-private partition on a hard disk drive of a computer system via IDE controller | |||
7339 | 7155612 | Desktop database data administration tool with row level security | |||
7340 | 7155610 | Cryptocommunication system, transmission apparatus, and reception apparatus | |||
7341 | 7155609 | Key exchange mechanism for streaming protected media content | |||
7342 | 7155608 | Foreign network SPAM blocker | |||
7343 | 7155607 | Method for authentication between apparatuses using challenge and response system | |||
7344 | 7155605 | Data processing system and method for maintaining secure data blocks | |||
7345 | 7155413 | Electronic apparatus and management system of the same | |||
7346 | 7155015 | Optical disk apparatus and data randomizing method using for optical disk apparatus | |||
7347 | 7154560 | Watermarking of digital image data | |||
7348 | 7152693 | Password security utility | |||
7349 | 7152245 | Installation of black box for trusted component for digital rights management (DRM) on computing device | |||
7350 | 7152243 | Providing a secure hardware identifier (HWID) for use in connection with digital rights management (DRM) system | |||
7351 | 7152242 | Modular system for detecting, filtering and providing notice about attack events associated with network security | |||
7352 | 7152241 | Intelligent network scanning system and method | |||
7353 | 7152240 | Method for communication security and apparatus therefor | |||
7354 | 7152239 | System and method for preventing detection of a computer connection to an external device | |||
7355 | 7152238 | Enabling mobility for point to point protocol (PPP) users using a node that does not support mobility | |||
7356 | 7152165 | Trusted storage systems and methods | |||
7357 | 7152163 | Content-recognition facilitator | |||
7358 | 7152162 | Z-transform implementation of digital watermarks | |||
7359 | 7152161 | Watermarking | |||
7360 | 7152159 | Encrypted mail transmission system | |||
7361 | 7152046 | Method and apparatus for tracking status of resource in a system for managing use of the resources | |||
7362 | 7151832 | Dynamic encryption and decryption of a stream of data | |||
7363 | 7151830 | Method, system, program product and state machine representation for encrypting and decrypting a message | |||
7364 | 7150045 | Method and apparatus for protection of electronic media | |||
7365 | 7150043 | Intrusion detection method and signature table | |||
7366 | 7150040 | Authenticated firewall tunneling framework | |||
7367 | 7150039 | Information processing system, portable electronic device, access apparatus for the portable electronic device, and method of using memory space | |||
7368 | 7150038 | Facilitating single sign-on by using authenticated code to access a password store | |||
7369 | 7149901 | Cryptographically protected paging system | |||
7370 | 7149898 | Self-monitoring and trending service system with a cascaded pipeline with enhanced authentication and registration | |||
7371 | 7149897 | Systems and methods for providing increased computer security | |||
7372 | 7149895 | Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal | |||
7373 | 7149894 | Public-key certificate issuance request processing system and public-key certificate issuance request processing method | |||
7374 | 7149893 | System and method for enabling the originator of an electronic mail message to preset an expiration time, date, and/or event, and to control processing or handling by a recipient | |||
7375 | 7149892 | Secure sockets layer proxy architecture | |||
7376 | 7149803 | Method for content distribution in a network supporting a security protocol | |||
7377 | 7149311 | Methods and apparatus for providing networked cryptographic devices resilient to capture | |||
7378 | 7149310 | Method and system for authorizing generation of asymmetric crypto-keys | |||
7379 | 7149309 | Time-dependent authorization | |||
7380 | 7149308 | Cryptographic communications using in situ generated cryptographic keys for conditional access | |||
7381 | 7146645 | Dedicated applications for user stations and methods for downloading dedicated applications to user stations | |||
7382 | 7146640 | Personal computer internet security system | |||
7383 | 7146638 | Firewall protocol providing additional information | |||
7384 | 7146635 | Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service | |||
7385 | 7146505 | Secure data exchange between date processing systems | |||
7386 | 7146504 | Secure clock on computing device such as may be required in connection with a trust-based system | |||
7387 | 7146503 | System and method of watermarking signal | |||
7388 | 7146502 | Information processing apparatus and its control method, computer program, and storage medium | |||
7389 | 7146500 | System for obtaining signatures on a single authoritative copy of an electronic record | |||
7390 | 7146499 | Security system for replicated storage devices on computer networks | |||
7391 | 7146498 | Computer and program recording medium | |||
7392 | 7146344 | Method and system for making small payments using a payment card | |||
7393 | 7146009 | Secure electronic messaging system requiring key retrieval for deriving decryption keys | |||
7394 | 7143440 | User authentication system and method | |||
7395 | 7143438 | Methods and apparatus for a computer network firewall with multiple domain support | |||
7396 | 7143437 | System and user interface for managing user access to network compatible applications | |||
7397 | 7143436 | Device authentication management system | |||
7398 | 7143297 | Procedure for the protection of computer software and/or computer-readable data as well as protective equipment | |||
7399 | 7143294 | Apparatus and method for secure field upgradability with unpredictable ciphertext | |||
7400 | 7143292 | Information processing apparatus | |||
7401 | 7143289 | System and method for delivering encrypted information in a communication network using location identity and key tables | |||
7402 | 7143288 | Secure file system server architecture and methods | |||
7403 | 7143286 | Digital certificates | |||
7404 | 7143285 | Password exposure elimination for digital signature coupling with a host identity | |||
7405 | 7143284 | ABDS method and verification status for authenticating entity access | |||
7406 | 7143283 | Simplifying the selection of network paths for implementing and managing security policies on a network | |||
7407 | 7143282 | Communication control scheme using proxy device and security protocol in combination | |||
7408 | 7143188 | Method and apparatus for network address translation integration with internet protocol security | |||
7409 | 7143163 | System and method for exacting a system resource access cost | |||
7410 | 7143137 | Method and apparatus for security protocol and address translation integration | |||
7411 | 7143067 | System and method for installing personal computer software | |||
7412 | 7142689 | Image processing apparatus for determining specific images | |||
7413 | 7142676 | Method and apparatus for secure communications using third-party key provider | |||
7414 | 7142675 | Sequence generator and method of generating a pseudo random sequence | |||
7415 | 7142674 | Method of confirming a secure key exchange | |||
7416 | 7142673 | Method for the cryptographic conversion of L-bit input blocks of digital data into L-bit output blocks | |||
7417 | 7142672 | Method and system for transmitting sensitive information over a network | |||
7418 | 7142670 | Space-efficient, side-channel attack resistant table lookups | |||
7419 | 7140045 | Method and system for user information verification | |||
7420 | 7140043 | Watermark embedding and detecting method by quantization of a characteristic value of a signal | |||
7421 | 7140039 | Identification of an attacker in an electronic system | |||
7422 | 7139918 | Multiple secure socket layer keyfiles for client login support | |||
7423 | 7139915 | Method and apparatus for authenticating an open system application to a portable IC device | |||
7424 | 7139914 | System and method for network security | |||
7425 | 7139913 | Method and device for the prevention of disparities or error messages and false responses in IFF type systems | |||
7426 | 7139912 | Device authentication | |||
7427 | 7139911 | Password exposure elimination for digital signature coupling with a host identity | |||
7428 | 7139910 | Systems and methods for obtaining digital signatures on a single authoritative copy of an original electronic record | |||
7429 | 7139891 | Method and system for timestamped virtual worm in a SAN | |||
7430 | 7139792 | Mechanism for locking client requests to a particular server | |||
7431 | 7139759 | Method and a device for managing a computer network | |||
7432 | 7139737 | Apparatus and method for managing software licenses and storage medium storing a program for managing software licenses | |||
7433 | 7139736 | Content rendering repository | |||
7434 | 7139407 | Image generation apparatus, image file generation method, image verification apparatus and image verification method | |||
7435 | 7139399 | Cryptographic system with methods for user-controlled message recovery | |||
7436 | 7139397 | Hybrid architecture for realizing a random numbers generator | |||
7437 | 7137144 | Technique of defending against network connection flooding attacks | |||
7438 | 7137143 | Method and system for caching secure web content | |||
7439 | 7137142 | Method and system for vehicle authentication of a component using key separation | |||
7440 | 7137009 | Method and apparatus for securing a cookie cache in a data processing system | |||
7441 | 7137007 | Device and method for authenticating user's access rights to resources | |||
7442 | 7137006 | Method and system for single sign-on user access to multiple web servers | |||
7443 | 7137005 | Method of watermarking digital data | |||
7444 | 7137004 | Manifest-based trusted agent management in a trusted operating system environment | |||
7445 | 7137003 | Subscriber identity module verification during power management | |||
7446 | 7137002 | Differential authentication entity validation scheme for international emergency telephone service | |||
7447 | 7137000 | Method and apparatus for article authentication | |||
7448 | 7136999 | Method and system for electronic device authentication | |||
7449 | 7136997 | Radio network system using multiple authentication servers with consistently maintained information | |||
7450 | 7136996 | One-time logon method for distributed computing systems | |||
7451 | 7136995 | Cryptographic device | |||
7452 | 7136903 | Internet-based shared file service with native PC client access and semantics and distributed access control | |||
7453 | 7136840 | Systems and methods for conducting transactions and communications using a trusted third party | |||
7454 | 7136490 | Electronic password wallet | |||
7455 | 7136489 | Method and system for enhancing network security using a multilateral authorization mechanism | |||
7456 | 7136488 | Microprocessor using asynchronous public key decryption processing | |||
7457 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
7458 | 7136486 | Print system and printer capable of prevention of unjust copy print | |||
7459 | 7136485 | Packetizing devices for scalable data streaming | |||
7460 | 7134145 | Registering copy protected material in a check-out, check-in system | |||
7461 | 7134142 | System and method for providing exploit protection for networks | |||
7462 | 7134140 | Token-based authentication for network connection | |||
7463 | 7134138 | Methods and apparatus for providing security for a data storage system | |||
7464 | 7134022 | Multi-level and multi-category data labeling system | |||
7465 | 7134020 | System and method for securely duplicating digital documents | |||
7466 | 7134019 | Methods and systems for unilateral authentication of messages | |||
7467 | 7134018 | Access control for computers | |||
7468 | 7134016 | Software system with a biometric dongle function | |||
7469 | 7134014 | Methods and apparatus for accelerating secure session processing | |||
7470 | 7134012 | Methods, systems and computer program products for detecting a spoofed source address in IP datagrams | |||
7471 | 7133526 | System and method for providing WLAN security through synchronized update and rotation of WEP keys | |||
7472 | 7133524 | Key installation system, LSI for implementing the same, and key installation method | |||
7473 | 7133523 | Method and system for solving the word problem in braid group cryptosystems | |||
7474 | 7133029 | Keypad | |||
7475 | 7131142 | Intelligent agents used to provide agent community security | |||
7476 | 7131138 | Information exchanging system, information communication terminal, information exchanging method, and computer product | |||
7477 | 7131137 | Communication system including a security system | |||
7478 | 7131132 | Automatic access denial | |||
7479 | 7131009 | Multiple factor-based user identification and authentication | |||
7480 | 7131008 | Mechanism for dynamically constructing customized implementations to enforce restrictions | |||
7481 | 7131007 | System and method of retrieving a watermark within a signal | |||
7482 | 7131006 | Cryptographic techniques for a communications network | |||
7483 | 7131005 | Method and system for component authentication of a vehicle | |||
7484 | 7131004 | Method and apparatus for encrypting data transmitted over a serial link | |||
7485 | 7131003 | Secure instant messaging system | |||
7486 | 7131000 | Computer security system | |||
7487 | 7130999 | Using authentication certificates for authorization | |||
7488 | 7130998 | Using a portable security token to facilitate cross-certification between certification authorities | |||
7489 | 7130951 | Method for selectively disabling interrupts on a secure execution mode-capable processor | |||
7490 | 7130829 | Digital rights management | |||
7491 | 7130615 | Software authentication for mobile communication devices | |||
7492 | 7130452 | System and method for multi-party validation, authentication and/or authorization via biometrics | |||
7493 | 7130427 | Method for providing point-to-point encryption in a communication system | |||
7494 | 7130426 | Digital data file encryption apparatus and method and recording medium for recording digital data file encryption program thereon | |||
7495 | 7130425 | Method and apparatus for providing a bus-encrypted copy protection key to an unsecured bus | |||
7496 | 7130424 | Systems and methods for utilizing an application from a native portable device within a non-native communications network | |||
7497 | 7130423 | Threshold encoding of frame buffers | |||
7498 | 7127745 | Method of controlling access for software development via a virtual common desktop with plural viewers | |||
7499 | 7127744 | Method and apparatus to protect media existing in an insecure format | |||
7500 | 7127742 | Establishing a secure connection with a private corporate network over a public network | |||
7501 | 7127739 | Handling information about packet data connections in a security gateway element | |||
7502 | 7127620 | Power analysis resistant coding device | |||
7503 | 7127618 | Data protection via reversible data damage | |||
7504 | 7127616 | Semiconductor integrated circuits, data transfer systems, and the method for data transfer | |||
7505 | 7127615 | Security based on subliminal and supraliminal channels for data objects | |||
7506 | 7127614 | Justification authenticating system, personal certificate issuing system, and personal certificate | |||
7507 | 7127613 | Secured peer-to-peer network data exchange | |||
7508 | 7127612 | Information processing apparatus, information processing method, information providing medium, information decryption apparatus, and information recording medium | |||
7509 | 7127611 | Method and system for vehicle authentication of a component class | |||
7510 | 7127610 | Apparatus and method of implementing multicast security between multicast domains | |||
7511 | 7127609 | System and user interface for adaptively processing and communicating URL data between applications | |||
7512 | 7127608 | System and user interface supporting URL processing and concurrent application operation | |||
7513 | 7127607 | PKI-based client/server authentication | |||
7514 | 7127606 | Account-based digital signature (ABDS) system | |||
7515 | 7127605 | Secure sharing of application methods on a microcontroller | |||
7516 | 7127604 | Changing a codec or MAC size without affecting the encryption key in PacketCable communication | |||
7517 | 7127432 | System for enabling data processing while maintaining confidentiality | |||
7518 | 7127067 | Secure patch system | |||
7519 | 7127066 | Limited use DVD-video disc | |||
7520 | 7127063 | Method and apparatus for computing a shared secret key | |||
7521 | 7124442 | System and method for insertion and retrieval of microthreads in transmitted data | |||
7522 | 7124441 | Method and apparatus for securely associating an optically readable memory with a user machine | |||
7523 | 7124408 | Binding by hash | |||
7524 | 7124304 | Receiving device for securely storing a content item, and playback device | |||
7525 | 7124299 | System, method and computer program product for auditing XML messages in a network-based message stream | |||
7526 | 7124297 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
7527 | 7124296 | Security chip architecture and implementations for cryptography acceleration | |||
7528 | 7124295 | Delta CRL enhancement | |||
7529 | 7124294 | Electronic certificate system | |||
7530 | 7124293 | Intelligently determining which traffic streams to offload efficiently | |||
7531 | 7124115 | Micro payment-based advertising | |||
7532 | 7124114 | Method and apparatus for determining digital A/V content distribution terms based on detected piracy levels | |||
7533 | 7123722 | Encryption management system and method | |||
7534 | 7123721 | Enhanced subscriber authentication protocol | |||
7535 | 7123719 | Method and apparatus for providing authentication in a communication system | |||
7536 | 7123718 | Utilizing data reduction in stegnographic and cryptographic systems | |||
7537 | 7123717 | Countermeasure method in an electronic component which uses an RSA-type public key cryptographic algorithm | |||
7538 | 7120929 | Methods and systems for automated authentication, processing and issuance of digital certificates | |||
7539 | 7120928 | Secure selective sharing of account information on an internet information aggregation system | |||
7540 | 7120927 | System and method for e-mail alias registration | |||
7541 | 7120799 | Method and apparatus for dual hardware and software cryptography | |||
7542 | 7120798 | System and method for the generation and verification of signatures associated with hardcopy documents | |||
7543 | 7120797 | Methods for authenticating potential members invited to join a group | |||
7544 | 7120794 | System for invoking a privileged function in a device | |||
7545 | 7120791 | Bridged cryptographic VLAN | |||
7546 | 7120274 | Automated copyright detection in digital images | |||
7547 | 7120254 | Cryptographic system and method for geolocking and securing digital information | |||
7548 | 7120253 | Method and system for protecting video data | |||
7549 | 7120249 | Methods and systems for generating encryption keys using random bit generators | |||
7550 | 7120248 | Multiple prime number generation using a parallel prime number search algorithm | |||
7551 | 7117534 | Interfacing a conditional access circuit to a digital device using input and output stream switching | |||
7552 | 7117493 | Image formation system, software acquisition method, and computer product | |||
7553 | 7117368 | Anonymous participation authority management system | |||
7554 | 7117367 | Method of authenticating a plurality of files linked to a text document | |||
7555 | 7117366 | Public key based authentication method for transaction delegation in service-based computing environments | |||
7556 | 7117365 | Method and device for generating a data stream and method and device for playing back a data stream | |||
7557 | 7117364 | System and method for downloading application components to a chipcard | |||
7558 | 7117363 | System and method using information-based indicia for securing and authenticating transactions | |||
7559 | 7117362 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
7560 | 7117361 | Method of transmitting information data from a sender to a receiver via a transcoder | |||
7561 | 7117358 | Method and system for filtering communication | |||
7562 | 7117356 | Systems and methods for secure biometric authentication | |||
7563 | 7117250 | Method and system for providing a dynamic media distribution infrastructure | |||
7564 | 7117183 | Airline ticket payment and reservation system and methods | |||
7565 | 7117180 | System for controlling the use of digital works using removable content repositories | |||
7566 | 7117179 | Method of recording and reproducing sample data to/from a recording medium and sample data containing recording medium | |||
7567 | 7117043 | Method for programming a programmable logic controller | |||
7568 | 7116786 | Interception of secure data in a mobile network | |||
7569 | 7116785 | Data processing system, data processing method, and program providing medium | |||
7570 | 7116784 | Method and apparatus for authenticated reporting in a mobile communication device | |||
7571 | 7116783 | Non-deterministic method for secured data transfer | |||
7572 | 7116782 | Encryption in a secure computerized gaming system | |||
7573 | 7114182 | Statistical methods for detecting TCP SYN flood attacks | |||
7574 | 7114167 | Content control in a device environment | |||
7575 | 7114083 | Secure server architecture for web based data management | |||
7576 | 7114082 | Data security for digital data storage | |||
7577 | 7114079 | Security access based on facial features | |||
7578 | 7114077 | Verification system for confidential data input | |||
7579 | 7114075 | User authentication apparatus, method of user authentication, and storage medium therefor | |||
7580 | 7114074 | Method and system for controlling encoded image production using image signatures | |||
7581 | 7114072 | Apparatus and method for watermark embedding and detection using linear prediction analysis | |||
7582 | 7114070 | System and method for automatic digital certificate installation on a network device in a data-over-cable system | |||
7583 | 7113979 | System, method and article of manufacture for enhancing electronic messages | |||
7584 | 7113930 | Conducting transactions | |||
7585 | 7113929 | System for voucher or token verification | |||
7586 | 7113928 | Franking machine and operating method thereof | |||
7587 | 7113601 | Method and apparatus for performing secure communications | |||
7588 | 7113600 | Base transceiver station automatic encryption handling | |||
7589 | 7113596 | Embedding information related to a subject of an identification document in the identification document | |||
7590 | 7113595 | Generation of a random number that is non-divisible by a set of prime numbers | |||
7591 | 7113594 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
7592 | 7111323 | Method and apparatus to facilitate a global timeout in a distributed computing environment | |||
7593 | 7111173 | Encryption process including a biometric unit | |||
7594 | 7111172 | System and methods for maintaining and distributing personal security devices | |||
7595 | 7111171 | Parallel distribution and fingerprinting of digital content | |||
7596 | 7111170 | Distributed system for responding to watermarked documents | |||
7597 | 7111169 | Method and apparatus for content protection across a source-to-destination interface | |||
7598 | 7111168 | Digital watermarking systems | |||
7599 | 7111167 | Digital watermarks with values derived from remote platforms | |||
7600 | 7111165 | Key and lock device | |||
7601 | 7111164 | Crisis management system, computer, and computer memory product | |||
7602 | 7111162 | Load balancing approach for scaling secure sockets layer performance | |||
7603 | 7111102 | Port adapter for high-bandwidth bus | |||
7604 | 7110987 | Secure online purchasing | |||
7605 | 7110858 | Object identification uses prediction of data in distributed network | |||
7606 | 7110548 | Cryptographic communication method, encryption algorithm shared control method, encryption algorithm conversion method and network communication system | |||
7607 | 7110547 | Method and apparatus for the compression and decompression of image files using a chaotic system | |||
7608 | 7110543 | Content management system, content management terminal, usage rule management server, content management method, and content management program | |||
7609 | 7110540 | Multi-pass hierarchical pattern matching | |||
7610 | 7110539 | Method and apparatus for encrypting and decrypting data | |||
7611 | 7110538 | Method for accelerating cryptographic operations on elliptic curves | |||
7612 | 7109986 | Illumination apparatus | |||
7613 | 7109894 | Encoding and decoding a media signal with high and low quality versions | |||
7614 | 7107620 | Authentication in a packet data network | |||
7615 | 7107615 | Parameter verification in an authentication system and method | |||
7616 | 7107614 | System and method for network address translation integration with IP security | |||
7617 | 7107463 | Manifest-based trusted agent management in a trusted operating system environment | |||
7618 | 7107462 | Method and system to store and distribute encryption keys | |||
7619 | 7107457 | Optical card based system for individualized tracking and record keeping | |||
7620 | 7107454 | Signature system presenting user signature information | |||
7621 | 7107453 | Authenticatable graphical bar codes | |||
7622 | 7107451 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
7623 | 7107450 | Content-based authentication of graph presented in text documents | |||
7624 | 7107449 | Digital certificates | |||
7625 | 7107448 | Systems and methods for governing content rendering, protection, and management applications | |||
7626 | 7107447 | Use of pseudonyms vs. real names | |||
7627 | 7107446 | Mechanism independent cluster security services | |||
7628 | 7107445 | Method and apparatus for secure processing of sensitive data | |||
7629 | 7107247 | Electronic value system | |||
7630 | 7107051 | Technique to establish wireless session keys suitable for roaming | |||
7631 | 7106864 | Chaos-based data protection using time-discrete dynamical systems | |||
7632 | 7103915 | Data security system and method | |||
7633 | 7103914 | Trusted computer system | |||
7634 | 7103911 | Identity-based-encryption system with district policy information | |||
7635 | 7103910 | Method and apparatus for verifying the legitimacy of an untrusted mechanism | |||
7636 | 7103783 | Method and system for providing data security in a file system monitor with stack positioning | |||
7637 | 7103781 | OPTICAL DISK, AN OPTICAL DISK BARCODE FORMING METHOD, AN OPTICAL DISK REPRODUCTION APPARATUS, A MARKING FORMING APPARATUS, A METHOD OF FORMING A LASER MARKING ON AN OPTICAL DISK, AND A METHOD OF MANUFACTURING AN OPTICAL DISK | |||
7638 | 7103775 | Signature calculation system by use of mobile agent | |||
7639 | 7103772 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers | |||
7640 | 7103768 | Information providing method, information providing system and program | |||
7641 | 7103678 | Method and apparatus for distributing digital contents to various terminals and recording medium containing same | |||
7642 | 7103182 | Public encryption of a stored print job | |||
7643 | 7100209 | Method to provide the generation of an incorrect or unreliable vertical/frame rate signal | |||
7644 | 7100208 | Method and apparatus for source-based message authorization and rejection | |||
7645 | 7100206 | Method for secured access to data in a network | |||
7646 | 7100205 | Secure attention instruction central processing unit and system architecture | |||
7647 | 7100052 | Electronic vehicle product and personal monitoring | |||
7648 | 7100051 | Public-key signature methods and systems | |||
7649 | 7100050 | Secured signal modification and verification with privacy control | |||
7650 | 7100049 | Method and apparatus for authentication of users and web sites | |||
7651 | 7100047 | Adaptive transparent encryption | |||
7652 | 7100046 | VPN enrollment protocol gateway | |||
7653 | 7100045 | System, method, and program for ensuring originality | |||
7654 | 7100044 | Public key certificate using system, public key certificate using method, information processing apparatus, and program providing medium | |||
7655 | 7100043 | LIFM algorithm for security association database lookup in IPSEC application | |||
7656 | 7099847 | Apparatus, methods and articles of manufacture for construction and maintaining a calendaring interface | |||
7657 | 7099846 | Apparatus and system for providing fee-based content | |||
7658 | 7099479 | Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method | |||
7659 | 7099477 | Method and system for backup and restore of a context encryption key for a trusted device within a secured processing system | |||
7660 | 7099476 | Method for updating a network ciphering key | |||
7661 | 7099471 | Detecting compromised ballots | |||
7662 | 7099469 | Method of scrambling and descrambling data in a communication system | |||
7663 | 7096497 | File checking using remote signing authority via a network | |||
7664 | 7096367 | System and methods for caching in connection with authorization in a computer system | |||
7665 | 7096365 | Digital signature | |||
7666 | 7096364 | Collusion-resistant watermarking and fingerprinting | |||
7667 | 7096363 | Person identification certificate link system, information processing apparatus, information processing method, and program providing medium | |||
7668 | 7096362 | Internet authentication with multiple independent certificate authorities | |||
7669 | 7096359 | Authentication scheme for ad hoc and sensor wireless networks | |||
7670 | 7096357 | Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium | |||
7671 | 7096356 | Method and apparatus for negotiating Diffie-Hellman keys among multiple parties using a distributed recursion approach | |||
7672 | 7096355 | Dynamic encoding algorithms and inline message decryption | |||
7673 | 7096354 | Central key authority database in an ABDS system | |||
7674 | 7096353 | Software modem with privileged mode decryption of control codes | |||
7675 | 7096352 | Security protocol structure in application layer | |||
7676 | 7096200 | System and method for evaluating and enhancing source anonymity for encrypted web traffic | |||
7677 | 7095859 | Managing private keys in a free seating environment | |||
7678 | 7095857 | Key distribution system for protection of route-update notification in micromobility networks | |||
7679 | 7095853 | System and method for preventing an illegal copy of contents | |||
7680 | 7095851 | Voice and data encryption method using a cryptographic key split combiner | |||
7681 | 7095850 | Encryption method and apparatus with forward secrecy and random-access key updating method | |||
7682 | 7095741 | Port isolation for restricting traffic flow on layer 2 switches | |||
7683 | 7095290 | Method and system for generating higher order modulations with QPSK modulator | |||
7684 | 7093299 | System for authenticating digital data | |||
7685 | 7093298 | Apparatus and method for security object enhancement and management | |||
7686 | 7093295 | Method and device for protecting digital data by double re-encryption | |||
7687 | 7093291 | Method and system for detecting and preventing an intrusion in multiple platform computing environments | |||
7688 | 7093290 | Security system for networks and the method thereof | |||
7689 | 7093289 | Mechanism for automatically configuring integrated access device for use in voice over digital subscriber line circuit | |||
7690 | 7093288 | Using packet filters and network virtualization to restrict network communications | |||
7691 | 7093286 | Method and system for exchanging sensitive information in a wireless communication system | |||
7692 | 7093136 | Methods, systems, computer program products, and data structures for limiting the dissemination of electronic email | |||
7693 | 7093135 | Software virus detection methods and apparatus | |||
7694 | 7093134 | Method and apparatus for signing and sealing objects | |||
7695 | 7093132 | Method and apparatus for protecting ongoing system integrity of a software product using digital signatures | |||
7696 | 7093131 | Information authenticating apparatus and authenticating station | |||
7697 | 7093130 | System and method for delivering and examining digital tickets | |||
7698 | 7093129 | Secured encrypted communications in a voice browser | |||
7699 | 7093125 | Rote based tool delegation | |||
7700 | 7093124 | Mechanism to improve authentication for remote management of a computer system | |||
7701 | 7093122 | Techniques for permitting access across a context barrier in a small footprint device using shared object interfaces | |||
7702 | 7093121 | Transferring data via a secure network connection | |||
7703 | 7093119 | Methods and computer program products for protecting source code of an interpreted programming language | |||
7704 | 7093032 | System and method for multi-vendor authentication to remotely activate a software-based option | |||
7705 | 7093021 | Electronic device for secure authentication of objects such as computers in a data network | |||
7706 | 7092913 | System for inexpensively executing online purchases | |||
7707 | 7092910 | Method, apparatus, and system for processing information by attaching information to digital data, and storage medium storing computer-readable program codes to carry out the method | |||
7708 | 7092527 | Method, system and program product for managing a size of a key management block during content distribution | |||
7709 | 7092525 | Cryptographic system with enhanced encryption function and cipher key for data encryption standard | |||
7710 | 7092524 | Device for and method of cryptographically wrapping information | |||
7711 | 7092523 | Method and apparatus for minimizing differential power attacks on processors | |||
7712 | 7092522 | Apparatus for solving system of equations on finite field and apparatus for inverting element of extension field | |||
7713 | 7089594 | Application rights management in a mobile environment | |||
7714 | 7089587 | ISCSI target offload administrator | |||
7715 | 7089585 | Method and system for authorizing a client computer to access a server computer | |||
7716 | 7089584 | Security architecture for integration of enterprise information system with J2EE platform | |||
7717 | 7089429 | Creation of local usage rights voucher | |||
7718 | 7089428 | Method and system for managing computer security information | |||
7719 | 7089427 | Security system method and apparatus for preventing application program unauthorized use | |||
7720 | 7089424 | Peripheral device for protecting data stored on host device and method and system using the same | |||
7721 | 7089421 | Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | |||
7722 | 7089419 | Control function with multiple security states for facilitating secure operation of an integrated system | |||
7723 | 7089416 | Information communication apparatus and method, information communication system, and memory medium | |||
7724 | 7089415 | Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet | |||
7725 | 7089303 | Systems and methods for distributed network protection | |||
7726 | 7088826 | Method for providing a crypto key and checkword to an encryption device | |||
7727 | 7088822 | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith | |||
7728 | 7086089 | Systems and methods for network security | |||
7729 | 7086087 | Information processing device, card device and information processing system | |||
7730 | 7085937 | Adaptive method for amortizing authentication overhead | |||
7731 | 7085936 | System and method for using login correlations to detect intrusions | |||
7732 | 7085933 | Computer system apparatus and method for improved assurance of authentication | |||
7733 | 7085931 | Virtual smart card system and method | |||
7734 | 7085927 | Secure data report preparation and delivery | |||
7735 | 7085925 | Trust ratings in group credentials | |||
7736 | 7085924 | Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet | |||
7737 | 7085923 | High volume secure internet server | |||
7738 | 7085742 | Authenticating software licenses | |||
7739 | 7085386 | System and method for secure replacement of high level cryptographic keys in a personal security device | |||
7740 | 7085384 | Device for transferring data between an unconscious capture device and another device | |||
7741 | 7085378 | Countermeasure method in an electronic component using a secret key cryptographic algorithm | |||
7742 | 7085376 | Method and system for securely exchanging encryption key determination information | |||
7743 | 7082540 | System and method for tracking programmable devices that use intellectual property | |||
7744 | 7082538 | Electronically verified digital signature and document delivery system and method | |||
7745 | 7082537 | Code generating method and unit thereof, code detecting method and unit thereof, and watermark embedding unit and watermark detecting unit | |||
7746 | 7082536 | System and method for computerized global messaging encryption | |||
7747 | 7082535 | System and method of controlling access by a wireless client to a network that utilizes a challenge/handshake authentication protocol | |||
7748 | 7082534 | Method and apparatus for performing accelerated authentication and decryption using data blocks | |||
7749 | 7082533 | Gauging risk in electronic communications regarding accounts in ABDS system | |||
7750 | 7082532 | Method and system for providing distributed web server authentication | |||
7751 | 7082531 | Method and apparatus for determining enforcement security devices in a network topology | |||
7752 | 7082530 | Method and apparatus for accelerating hardware encryption with multiple networking interfaces | |||
7753 | 7082416 | Method of using prepaid cash card for making purchases on the world wide web | |||
7754 | 7082200 | Establishing secure peer networking in trust webs on open networks using shared secret device key | |||
7755 | 7082199 | Simple encrypted transmission system suitable for intermittent signals | |||
7756 | 7082198 | Data receiving method and data receiving unit therefor | |||
7757 | 7080804 | Hot-start navigation information distribution system | |||
7758 | 7080407 | Virus detection and removal system and method for network-based systems | |||
7759 | 7080405 | Limiting device function | |||
7760 | 7080404 | Automatic re-authentication | |||
7761 | 7080356 | Certification test suite | |||
7762 | 7080262 | Key compression | |||
7763 | 7080259 | Electronic information backup system | |||
7764 | 7080257 | Protecting digital goods using oblivious checking | |||
7765 | 7080253 | Audio fingerprinting | |||
7766 | 7080248 | System providing dynamic quality of service signaling messages in a cable telephony network | |||
7767 | 7079656 | Method and communications system for ciphering information for a radio transmission and for authenticating subscribers | |||
7768 | 7079655 | Encryption algorithm management system | |||
7769 | 7079654 | Method for carrying out an electronic transaction using several signatures | |||
7770 | 7079650 | Computing method for elliptic curve cryptography | |||
7771 | 7076805 | Digital data system | |||
7772 | 7076803 | Integrated intrusion detection services | |||
7773 | 7076800 | IC card terminal unit and IC card duplication method | |||
7774 | 7076797 | Granular authorization for network user sessions | |||
7775 | 7076669 | Method and apparatus for communicating securely with a token | |||
7776 | 7076666 | Hard disk drive authentication for personal video recorder | |||
7777 | 7076665 | Method and system for vehicle subassembly authentication of a component | |||
7778 | 7076664 | User confirmation system and method | |||
7779 | 7076663 | Integrated system security method | |||
7780 | 7076662 | Data alteration checking apparatus and method and recording medium | |||
7781 | 7076661 | System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems | |||
7782 | 7076659 | Enhanced method for digital data hiding | |||
7783 | 7076655 | Multiple trusted computing environments with verifiable environment identities | |||
7784 | 7076654 | Multicast system, authentication server terminal, multicast receiver terminal controlling method, and storage medium | |||
7785 | 7076653 | System and method for supporting multiple encryption or authentication schemes over a connection on a network | |||
7786 | 7076651 | System and method for highly secure data communications | |||
7787 | 7076469 | Copyright protection of digital images transmitted over networks | |||
7788 | 7076468 | Method and system for licensing digital works | |||
7789 | 7076467 | Network-based method and system for transmitting digital data to a client computer and charging only for data that is used by the client computer user | |||
7790 | 7076466 | System for accepting non harming mail at a receptacle | |||
7791 | 7076067 | Encrypted media key management | |||
7792 | 7076062 | Methods and arrangements for using a signature generating device for encryption-based authentication | |||
7793 | 7076061 | Efficient and compact subgroup trace representation ("XTR") | |||
7794 | 7073199 | Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine | |||
7795 | 7073195 | Controlled access to credential information of delegators in delegation relationships | |||
7796 | 7073069 | Apparatus and method for a programmable security processor | |||
7797 | 7073066 | Offloading cryptographic processing from an access point to an access point server using Otway-Rees key distribution | |||
7798 | 7073065 | Watermarked material processing | |||
7799 | 7073064 | Method and apparatus to provide enhanced computer protection | |||
7800 | 7073063 | Binding a digital license to a portable device or the like in a digital rights management (DRM) system and checking out/checking in the digital license to/from the portable device or the like | |||
7801 | 7073060 | Data transmission system | |||
7802 | 7073056 | Apparatus and method for demonstrating and confirming the status of digital certificates and other data | |||
7803 | 7072870 | System and method for providing authorization and other services | |||
7804 | 7072869 | Integrated circuit card with situation dependent identity authentication | |||
7805 | 7072867 | System and method for third party logging server | |||
7806 | 7072470 | Video scramble/descramble apparatus | |||
7807 | 7072469 | Devices for emitting or receiving signals encrypted by deterministic chaos, and a transmission system, in particular a radio transmission system, including such devices | |||
7808 | 7072433 | Delay locked loop fine tune | |||
7809 | 7069593 | Device and method for making secure an integrated circuit | |||
7810 | 7069590 | System and method for protecting data streams in hardware components | |||
7811 | 7069584 | Process and apparatus for improving the security of authentication procedures using a new "Super PIN" | |||
7812 | 7069583 | Detection of polymorphic virus code using dataflow analysis | |||
7813 | 7069581 | Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment | |||
7814 | 7069580 | Function-based process control verification and security in a process control system | |||
7815 | 7069451 | Systems and methods for secure transaction management and electronic rights protection | |||
7816 | 7069450 | Systems and methods for compression of key sets having multiple keys | |||
7817 | 7069448 | Context oriented crypto processing on a parallel processor array | |||
7818 | 7069447 | Apparatus and method for secure data storage | |||
7819 | 7069442 | System and method for execution of a secured environment initialization instruction | |||
7820 | 7069441 | VPN enrollment protocol gateway | |||
7821 | 7069440 | Technique for obtaining a single sign-on certificate from a foreign PKI system using an existing strong authentication PKI system | |||
7822 | 7069439 | Computing apparatus and methods using secure authentication arrangements | |||
7823 | 7069437 | Multi-level security network system | |||
7824 | 7069436 | Information transmission system and method, transmitting apparatus, receiving apparatus, data processing device and data processing method, and recording medium | |||
7825 | 7069435 | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys | |||
7826 | 7069434 | Secure data transfer method and system | |||
7827 | 7069433 | Mobile host using a virtual single account client and server system for network access and management | |||
7828 | 7069432 | System and method for providing security in a telecommunication network | |||
7829 | 7069252 | Electronic transaction server, client for seller, client for buyer and electronic transaction method | |||
7830 | 7069250 | Check based online payment and verification system and method | |||
7831 | 7069249 | Electronic purchase of goods over a communications network including physical delivery while securing private and personal information of the purchasing party | |||
7832 | 7069246 | Method for minimizing pirating and/or unauthorized copying and/or unauthorized access of/to data on/from data media including compact discs and digital versatile discs, and system and data media for same | |||
7833 | 7069245 | Simultaneous network news distribution | |||
7834 | 7068791 | Secure packet radio network | |||
7835 | 7068790 | Systems and methods for path set-up in a quantum key distribution network | |||
7836 | 7068789 | Peer-to-peer name resolution protocol (PNRP) group security infrastructure and method | |||
7837 | 7068786 | Dual use block/stream cipher | |||
7838 | 7068785 | Table driven method for calculating arithmetic inverse for use in cryptography | |||
7839 | 7068733 | Sampling technique for digital beam former | |||
7840 | 7065789 | System and method for increasing heuristics suspicion levels in analyzed computer code | |||
7841 | 7065784 | Systems and methods for integrating access control with a namespace | |||
7842 | 7065783 | Mobile application access control list security system | |||
7843 | 7065654 | Secure execution box | |||
7844 | 7065650 | Method for indicating the integrity of a collection of digital objects | |||
7845 | 7065649 | Method and system for controlling use of software programs | |||
7846 | 7065648 | Mutual authentication method, recording apparatus, reproducing apparatus, and recording medium | |||
7847 | 7065647 | Communication system, authentication communication device, control apparatus, and communication method | |||
7848 | 7065646 | Remote notification of print or fax hardcopy recipient using standard identification data | |||
7849 | 7065645 | System, method, and apparatus for visual authentication | |||
7850 | 7065643 | Network compromise recovery methods and apparatus | |||
7851 | 7065642 | System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions | |||
7852 | 7065507 | Supervised license acquisition in a digital rights management system on a computing device | |||
7853 | 7065506 | Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device | |||
7854 | 7065505 | Method for metering and pricing of digital works | |||
7855 | 7065504 | Fee imposition system for application software | |||
7856 | 7065503 | Cookie data stored on transportable recording medium | |||
7857 | 7065502 | Media and method of updating commodity catalog information | |||
7858 | 7065216 | Methods and systems of protecting digital content | |||
7859 | 7065214 | Information processing apparatus, information processing method, information processing system and recording medium | |||
7860 | 7065213 | In a subscriber network receiving digital packets and transmitting digital packets below a predetermined maximum bit rate | |||
7861 | 7065210 | Secret key generation method, encryption method, cryptographic communications method, common key generator, cryptographic communications system, and recording media | |||
7862 | 7062660 | Method and apparatus for controlling the performance of a file system mount operation by a user lacking superuser authority | |||
7863 | 7062657 | Methods and apparatus for hardware normalization and denormalization | |||
7864 | 7062655 | Method, system, and storage medium for determining trivial keyboard sequences of proposed passwords | |||
7865 | 7062654 | Cross-domain access control | |||
7866 | 7062653 | Collusion-resistant watermarking and fingerprinting | |||
7867 | 7062652 | Semiconductor memory card, data reading apparatus and data reading/reproducing apparatus | |||
7868 | 7062651 | Network printer registration protocol | |||
7869 | 7062650 | System and method for verifying integrity of system with multiple components | |||
7870 | 7062649 | System and method for categorizing security profile rules within a computer system | |||
7871 | 7062648 | System and method for redundant array network storage | |||
7872 | 7062555 | System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment | |||
7873 | 7062469 | System and method for public wireless network access subsidized by dynamic display advertising | |||
7874 | 7062468 | Licensed digital material distribution system and method | |||
7875 | 7062466 | Method and system for operating online classified advertisements | |||
7876 | 7062465 | Methods and apparatus for providing agent controlled synchronized browsing at a terminal | |||
7877 | 7062045 | Media protection system and method | |||
7878 | 7062044 | Method of elliptic curve cryptographic key agreement using coefficient splitting | |||
7879 | 7062043 | Method of elliptic curve digital signature using coefficient splitting | |||
7880 | 7061985 | Universal modulator/demodulator | |||
7881 | 7058975 | Method and system for delayed write scanning for detecting computer malwares | |||
7882 | 7058971 | Access privilege transferring method | |||
7883 | 7058970 | On connect security scan and delivery by a network security authority | |||
7884 | 7058969 | Recognition system | |||
7885 | 7058820 | Information processing system, medium, information processing apparatus, information processing method, storage medium storing computer readable program for realizing such method | |||
7886 | 7058815 | Method and system for digitally signing MPEG streams | |||
7887 | 7058814 | System and method for providing time-limited access to people, objects and services | |||
7888 | 7058813 | Method for watermarking computer programs | |||
7889 | 7058812 | Collusion-resistant watermarking and fingerprinting | |||
7890 | 7058811 | Apparatus and method to prevent a device driver from loading on a counterfeit hardware element | |||
7891 | 7058809 | Method and system to uniquely associate multicast content with each of multiple recipients | |||
7892 | 7058807 | Validation of inclusion of a platform within a data center | |||
7893 | 7058806 | Method and apparatus for secure leveled access control | |||
7894 | 7058805 | Systems and methods for protecting data secrecy and integrity | |||
7895 | 7058804 | Data storing system, issuing apparatus, data providing apparatus and computer readable medium storing data storing program | |||
7896 | 7058802 | Communication management system | |||
7897 | 7058619 | Method, system and computer program product for facilitating digital certificate state change notification | |||
7898 | 7058612 | System and method for producing and verifying secure negotiable instruments | |||
7899 | 7058611 | Method and system for conducting secure electronic commerce transactions with authorization request data loop-back | |||
7900 | 7058610 | System and method for communicating a message in a mailing system | |||
7901 | 7058609 | Pay by time system for content delivery to media playback systems | |||
7902 | 7058607 | Contents distribution method and system | |||
7903 | 7058606 | Method for loaning digital works | |||
7904 | 7058605 | Document transfer systems | |||
7905 | 7058600 | Integrated proxy interface for web based data management reports | |||
7906 | 7058181 | Wireless bridge for roaming in network environment | |||
7907 | 7058180 | Single sign-on process | |||
7908 | 7058179 | Method and system for a secure high bandwidth bus in a transceiver device | |||
7909 | 7058177 | Partially encrypted bitstream method | |||
7910 | 7058020 | Hardware time stamping and registration of packetized data method and system | |||
7911 | 7055042 | System and method for synchronizing a user password between mainframe and alternative computer operating environments | |||
7912 | 7055040 | Method and apparatus for uniquely and securely loading software to an individual computer | |||
7913 | 7055039 | Protection of digital content using block cipher crytography | |||
7914 | 7055038 | Method and apparatus for maintaining secure and nonsecure data in a shared memory system | |||
7915 | 7055037 | High performance gray-level watermarking system | |||
7916 | 7055036 | System and method to verify trusted status of peer in a peer-to-peer network environment | |||
7917 | 7055035 | Method for generating a read only memory image | |||
7918 | 7055034 | Method and apparatus for robust embedded data | |||
7919 | 7055033 | Integrated circuit devices with steganographic authentication and steganographic authentication methods | |||
7920 | 7055032 | One time password entry to access multiple network sites | |||
7921 | 7055031 | Method for generation, delivery, and validation of electronic coupons through personal TV service system | |||
7922 | 7055029 | Cryptographic system enabling ownership of a secure process | |||
7923 | 7055028 | HTTP multiplexor/demultiplexor system for use in secure transactions | |||
7924 | 7054905 | Replacing an email attachment with an address specifying where the attachment is stored | |||
7925 | 7054844 | Secure electronic procurement system and method | |||
7926 | 7054843 | Method and apparatus in a telecommunications system | |||
7927 | 7054842 | Stored value cards and methods for their issuance | |||
7928 | 7054841 | Document storage and classification | |||
7929 | 7054840 | Virtual bookshelf for online storage use and sale of material | |||
7930 | 7054839 | Transmission apparatus and method, reception apparatus and method, management apparatus and method, charging apparatus and method, providing apparatus and method, and recording medium | |||
7931 | 7054447 | Method and apparatus for periodically removing invalid public keys from a public key server | |||
7932 | 7054446 | Chaos cryptographic communication method and chaos cryptographic communication system | |||
7933 | 7054443 | System and method for protecting digital goods using random and automatic code obfuscation | |||
7934 | 7054306 | Method for handling ciphering status in a wireless network | |||
7935 | 7051210 | Persistance and recovery of security keys | |||
7936 | 7051208 | Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed | |||
7937 | 7051207 | Apparatus and methods for inserting and detecting electronic watermark | |||
7938 | 7051206 | Self-authentication of value documents using digital signatures | |||
7939 | 7051205 | Sheet-shaped medium, method and apparatus for determination of genuineness or counterfeitness of the same, and apparatus for issuing certificate | |||
7940 | 7051204 | Methods and system for providing a public key fingerprint list in a PK system | |||
7941 | 7051203 | Data watermarks created by using an uneven sampling period | |||
7942 | 7051202 | Apparatus and computer-recording medium for evaluation support of encryption algorithm strength | |||
7943 | 7051200 | System and method for interfacing a software process to secure repositories | |||
7944 | 7051199 | System, method and article of manufacture for providing cryptographic services utilizing a network | |||
7945 | 7051006 | System and method for maintaining customer privacy | |||
7946 | 7051005 | Method for obtaining a black box for performing decryption and encryption functions in a digital rights management (DRM) system | |||
7947 | 7051004 | System and methods providing secure delivery of licenses and content | |||
7948 | 7051003 | Method and apparatus for delivering electronic data through a proxy server | |||
7949 | 7050892 | Diagnostic tool security key | |||
7950 | 7050589 | Client controlled data recovery management | |||
7951 | 7050588 | System for processing an information signal | |||
7952 | 7050587 | Security device for guarding a vehicle | |||
7953 | 7050584 | Method and system for regenerating a private key for a predetermined asymmetric cryptographic key pair | |||
7954 | 7050582 | Pseudo-random one-to-one circuit synthesis | |||
7955 | 7050166 | Calcium carbonate imaging technique | |||
7956 | 7047563 | Command authorization via RADIUS | |||
7957 | 7047561 | Firewall for real-time internet applications | |||
7958 | 7047557 | Security system in a service provision system | |||
7959 | 7047425 | Scaleable muti-level security method in object oriented open network systems | |||
7960 | 7047424 | Methods and systems for hairpins in virtual networks | |||
7961 | 7047422 | User access to a unique data subset of a database | |||
7962 | 7047421 | Data signal with a database and a compressed key | |||
7963 | 7047419 | Data security system | |||
7964 | 7047416 | Account-based digital signature (ABDS) system | |||
7965 | 7047414 | Managing database for reliably identifying information of device generating digital signatures | |||
7966 | 7047413 | Collusion-resistant watermarking and fingerprinting | |||
7967 | 7047412 | Digital watermark data embedding method, and digital watermark data embeddability analyzing method | |||
7968 | 7047410 | Digital image watermarking method | |||
7969 | 7047406 | Method and system for providing a secure peer-to-peer file delivery network | |||
7970 | 7047405 | Method and apparatus for providing secure processing and data storage for a wireless communication device | |||
7971 | 7047404 | Method and apparatus for self-authenticating digital records | |||
7972 | 7047222 | Secure encryption of data packets for transmission over unsecured networks | |||
7973 | 7047221 | Method for piracy protection of an apparatus and arrangement for the implementation of the method | |||
7974 | 7046810 | Data processing method and system of same portable device data processing apparatus and method of same and program | |||
7975 | 7046808 | Method and apparatus for detecting processing stages applied to a signal | |||
7976 | 7046807 | Data administration method | |||
7977 | 7046803 | Random keystream generation apparatus and method for use in an encryption system | |||
7978 | 7046800 | Scalable methods and apparatus for Montgomery multiplication | |||
7979 | 7043753 | Providing security for external access to a protected computer network | |||
7980 | 7043643 | Method and apparatus for operating a computer in a secure mode | |||
7981 | 7043642 | Process to manage data in a chip card | |||
7982 | 7043641 | Encryption in a secure computerized gaming system | |||
7983 | 7043640 | Apparatus and method for protecting a computer system | |||
7984 | 7043638 | Material display | |||
7985 | 7043636 | Data integrity mechanisms for static and dynamic data | |||
7986 | 7043635 | Embedded synchronous random disposable code identification method and system | |||
7987 | 7043634 | Detecting malicious alteration of stored computer files | |||
7988 | 7043633 | Method and apparatus for providing adaptive self-synchronized dynamic address translation | |||
7989 | 7043632 | End-to-end security in data networks | |||
7990 | 7043554 | Networker server, method for controlling transmission of a hypertext and recording medium storing a hypertext | |||
7991 | 7043453 | Method and system for conducting transactions between repositories using a repository transaction protocol | |||
7992 | 7043025 | Method and apparatus for secured electronic commerce | |||
7993 | 7043024 | System and method for key distribution in a hierarchical tree | |||
7994 | 7043022 | Packet order determining method and apparatus | |||
7995 | 7043020 | Smartcard for use with a receiver of encrypted broadcast signals, and receiver | |||
7996 | 7043016 | Substitution-box for symmetric-key ciphers | |||
7997 | 7043015 | Methods for point compression for Jacobians of hyperelliptic curves | |||
7998 | 7039954 | Method for enabling a network-addressable device to detect use of its identity by a spoofer | |||
7999 | 7039950 | System and method for network quality of service protection on security breach detection | |||
8000 | 7039947 | Error protected data transfer system and method | |||
8001 | 7039944 | Digital data file management method and recording medium for recording digital data file management program thereon | |||
8002 | 7039815 | Method for protecting a data memory | |||
8003 | 7039813 | System and method for biometric verification in a delivery process | |||
8004 | 7039811 | Apparatus and method for controlling access to contents stored in card like electronic equipment | |||
8005 | 7039810 | Method and apparatus to secure data transfer from medical device systems | |||
8006 | 7039808 | Method for verifying a message signature | |||
8007 | 7039807 | Method and system for obtaining digital signatures | |||
8008 | 7039805 | Electronic signature method | |||
8009 | 7039803 | Method for broadcast encryption and key revocation of stateless receivers | |||
8010 | 7039802 | Conditional access system for set-top boxes | |||
8011 | 7039801 | System and method for integrating secure and non-secure software objects | |||
8012 | 7039800 | Translator terminal for two or more wireless networks | |||
8013 | 7039613 | System and method for controlling distribution and use of digital works using price specifications | |||
8014 | 7039191 | Chaining key broadcasting reception system and chaining key broadcasting reception method | |||
8015 | 7039186 | Encryption key generation circuit | |||
8016 | 7039185 | Method and system for securing a printhead in a closed system metering device | |||
8017 | 7039184 | Encryption/decryption unit and storage medium | |||
8018 | 7038600 | Method and device for adding or extracting a secondary information signal to/from a RLL code sequence | |||
8019 | 7037196 | Portable toy, portable information terminal, entertainment system, and recording medium | |||
8020 | 7036149 | Computer system | |||
8021 | 7036143 | Methods and apparatus for virtual private network based mobility | |||
8022 | 7036141 | Transmission system, a method and an apparatus providing access for IP data packets to a firewall protected network | |||
8023 | 7036019 | Method for controlling database copyrights | |||
8024 | 7036015 | Verification protocol | |||
8025 | 7036014 | Probabilistic signature scheme | |||
8026 | 7036012 | Method and system for secure cashless gaming | |||
8027 | 7036011 | Digital rights management | |||
8028 | 7035411 | Encryption method and apparatus encrypting and adding signature information to qubits | |||
8029 | 7035408 | Method to generate pseudo-random sequence of multi-carrier data symbols, and related transmitter and receiver | |||
8030 | 7035407 | Data transmission system for prevention of unauthorized copy of data from recording medium | |||
8031 | 7035404 | Method and apparatus for shuffle with proof, method and apparatus for shuffle verification, method and apparatus for generating input message sequence and program for same | |||
8032 | 7032242 | Method and system for distributed network address translation with network security features | |||
8033 | 7032240 | Portable authorization device for authorizing use of protected information and associated method | |||
8034 | 7032112 | Account authority digital signature (AADS) system using transactional account information | |||
8035 | 7032111 | Method for optimizing of data transmission | |||
8036 | 7032110 | PKI-based client/server authentication | |||
8037 | 7031472 | Method of authenticating information, disk playback apparatus, and entertainment apparatus | |||
8038 | 7031470 | Protection of data on media recording disks | |||
8039 | 7031469 | Optimized enveloping via key reuse | |||
8040 | 7031468 | Speed enhanced cryptographic method and apparatus | |||
8041 | 7028337 | Method of virtual private network communication in security gateway apparatus and security gateway apparatus using the same | |||
8042 | 7028335 | Method and system for controlling attacks on distributed network address translation enabled networks | |||
8043 | 7028332 | Method and apparatus for preventing packet retransmissions during IPsec security association establishment | |||
8044 | 7028193 | Method and apparatus for determining the validity of a data processing transaction | |||
8045 | 7028192 | Method and apparatus that enable a computer user to verify whether they have correctly input their password into a computer | |||
8046 | 7028191 | Trusted authorization device | |||
8047 | 7028190 | Method and system for electronic delivery of sensitive information | |||
8048 | 7028189 | Derivation and quantization of robust non-local characteristics for blind watermarking | |||
8049 | 7028188 | Document authentication using the physical characteristics of underlying physical media | |||
8050 | 7028187 | Electronic transaction apparatus for electronic commerce | |||
8051 | 7028186 | Key management methods for wireless LANs | |||
8052 | 7028185 | Managing database for identifying to recipients security features of devices generating digital signatures | |||
8053 | 7028184 | Technique for digitally notarizing a collection of data streams | |||
8054 | 7028182 | Secure network system and method for transfer of medical information | |||
8055 | 7028181 | System and method for efficient and secure revocation of a signature certificate in a public key infrastructure | |||
8056 | 7028180 | System and method for usage of a role certificate in encryption and as a seal, digital stamp, and signature | |||
8057 | 7028179 | Apparatus and method for secure, automated response to distributed denial of service attacks | |||
8058 | 7028178 | Scheduling system and method including creating and/or changing a scheduling system by an administrator and making appointments employing the schedule conducted through a global computer network | |||
8059 | 7028010 | Method for transmitting encrypted information for registering an application program | |||
8060 | 7027598 | Residue number system based pre-computation and dual-pass arithmetic modular operation approach to implement encryption protocols efficiently in electronic integrated circuits | |||
8061 | 7027597 | Pre-computation and dual-pass modular arithmetic operation approach to implement encryption protocols efficiently in electronic integrated circuits | |||
8062 | 7024700 | Computer with security function and method therefor | |||
8063 | 7024699 | Publication of an attorney-client privilege warning message | |||
8064 | 7024690 | Protected mutual authentication over an unsecured wireless communication channel | |||
8065 | 7024687 | System and method for providing end to end authentication in a network environment | |||
8066 | 7024662 | Executing dynamically assigned functions while providing services | |||
8067 | 7024564 | Software protection device and method | |||
8068 | 7024563 | Apparatus, system and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon | |||
8069 | 7024562 | Method for carrying out secure digital signature and a system therefor | |||
8070 | 7024560 | Power-residue calculating unit using Montgomery algorithm | |||
8071 | 7024556 | Distributed system authentication | |||
8072 | 7024554 | Systems and methods that authorize target devices utilizing proprietary software and/or hardware | |||
8073 | 7024553 | System and method for updating encryption key for wireless LAN | |||
8074 | 7024552 | Location authentication of requests to a web server system linked to a physical entity | |||
8075 | 7024393 | Structural of digital rights management (DRM) system | |||
8076 | 7024392 | Method for controlling use of database content | |||
8077 | 7024226 | Method for enabling PKI functions in a smart card | |||
8078 | 7023998 | Cryptographic key processing and storage | |||
8079 | 7023997 | Secure messaging communication system | |||
8080 | 7023990 | Secure parameter generating device and parameter generating method in algebraic curve crytography | |||
8081 | 7023862 | Scheme for realizing communications through external network from contents processing device connected to local network in home environment | |||
8082 | 7020785 | Method for automatically verifying security code of computer system operated by remote controller | |||
8083 | 7020784 | Mechanism for detecting intrusion and jamming attempts in a shared media based communications network | |||
8084 | 7020783 | Method and system for overcoming denial of service attacks | |||
8085 | 7020780 | Method apparatus and systems for producing and writing cipher keys, reproducing information with a cipher key, and for permitting reproduction of information with a cipher key, and permitting reproduction of information with a cipher key, and optical disc recorded with a cipher key | |||
8086 | 7020779 | Secure, distributed e-mail system | |||
8087 | 7020777 | Derivation and quantization of robust non-local characteristics for blind watermarking | |||
8088 | 7020776 | Cryptosystem based on a Jacobian of a curve | |||
8089 | 7020775 | Derivation and quantization of robust non-local characteristics for blind watermarking | |||
8090 | 7020774 | Communications method and device | |||
8091 | 7020287 | Method and system for key insertion for stored encrypted content | |||
8092 | 7020286 | Modulation of dynamical systems for communication | |||
8093 | 7020285 | Stealthy audio watermarking | |||
8094 | 7020283 | Random number generation apparatus and random number generation method | |||
8095 | 7020282 | Simplified secure, swift cryptographic key exchange | |||
8096 | 7020281 | Timing attack resistant cryptographic system | |||
8097 | 7017189 | System and method for activating a rendering device in a multi-level rights-management architecture | |||
8098 | 7017181 | Identity-based-encryption messaging system with public parameter host servers | |||
8099 | 7017051 | System and method for enterprise authentication | |||
8100 | 7017050 | Clearinghouse server for internet telephony and multimedia communications | |||
8101 | 7017049 | Method and system providing secure socket layer session sharing between network based servers and a client | |||
8102 | 7017045 | Multimedia watermarking system and method | |||
8103 | 7017044 | Extremely secure method for keying stored contents to a specific storage device | |||
8104 | 7017043 | Methods and systems for the identification of circuits and circuit designs | |||
8105 | 7017042 | Method and circuit to accelerate IPSec processing | |||
8106 | 7017041 | Secure communications network with user control of authenticated personal information provided to network entities | |||
8107 | 7016992 | Electronic mail system | |||
8108 | 7016877 | Consumer-controlled limited and constrained access to a centrally stored information account | |||
8109 | 7016500 | Code exchange protocol | |||
8110 | 7016499 | Secure ephemeral decryptability | |||
8111 | 7016498 | Encrypting a digital object on a key ID selected therefor | |||
8112 | 7016497 | Data decryption system | |||
8113 | 7016495 | Multiple level access system | |||
8114 | 7016493 | Key matrix system | |||
8115 | 7013482 | Methods for packet filtering including packet invalidation if packet validity determination not timely made | |||
8116 | 7013395 | Method and tool for network vulnerability analysis | |||
8117 | 7013393 | Universal intelligent card for secure access to system functions | |||
8118 | 7013390 | Cryptographic policy filters and policy control method and apparatus | |||
8119 | 7013389 | Method and apparatus for creating a secure communication channel among multiple event service nodes | |||
8120 | 7013388 | Vault controller context manager and methods of operation for securely maintaining state information between successive browser connections in an electronic business system | |||
8121 | 7013387 | System for increasing realized secure sockets layer encryption and decryption connections | |||
8122 | 7013296 | Using electronic security value units to control access to a resource | |||
8123 | 7013295 | Tagged private information retrieval | |||
8124 | 7013023 | Method and device for sending and receiving digital images using an image watermark for decoding | |||
8125 | 7010809 | Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length | |||
8126 | 7010808 | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system | |||
8127 | 7010701 | Network arrangement for smart card applications | |||
8128 | 7010697 | System for dynamically encrypting information for secure internet commerce and providing embedded fulfillment software | |||
8129 | 7010695 | Information input-output device, information input-output system, mobile communication terminal, and input-output control unit | |||
8130 | 7010694 | Method and system for application of a safety marking | |||
8131 | 7010693 | Software vault | |||
8132 | 7010691 | ABDS system utilizing security information in authenticating entity access | |||
8133 | 7010690 | Extensible system for building and evaluating credentials | |||
8134 | 7010689 | Secure data storage and retrieval in a client-server environment | |||
8135 | 7010688 | Scheme, system and equipment for inter-equipment authentication and key delivery | |||
8136 | 7010687 | Transmission apparatus, reception apparatus, transmission method, reception method and recording medium | |||
8137 | 7010686 | Method for enabling a file | |||
8138 | 7010685 | Method and apparatus for storing scrambled digital programs by filtering product identifier | |||
8139 | 7010683 | Public key validation service | |||
8140 | 7010681 | Method, system and apparatus for selecting encryption levels based on policy profiling | |||
8141 | 7010605 | Method and apparatus for encoding and storing session data | |||
8142 | 7010126 | Method for synchronizing a plurality of chaotic systems and method for multichannel communication using synchronized chaotic systems | |||
8143 | 7010125 | Method for tracing traitor receivers in a broadcast encryption system | |||
8144 | 7010124 | Location dependent key for decrypting copy protected material on a recording medium | |||
8145 | 7009419 | Method and apparatus for selecting an encryption integrated circuit operating mode | |||
8146 | 7008456 | Computer with security function and method therefor | |||
8147 | 7007304 | Method and apparatus to improve the protection of information presented by a computer | |||
8148 | 7007298 | Apparatus and method for authenticating user according to biometric information | |||
8149 | 7007174 | System and method for determining user identity fraud using similarity searching | |||
8150 | 7007172 | Modified Harvard architecture processor having data memory space mapped to program memory space with erroneous execution protection | |||
8151 | 7007170 | System, method, and apparatus for securely providing content viewable on a secure device | |||
8152 | 7007169 | Method and apparatus for protecting a web server against vandals attacks without restricting legitimate access | |||
8153 | 7007168 | User authentication using member specifying discontinuous different coordinates | |||
8154 | 7007166 | Method and system for digital watermarking | |||
8155 | 7007165 | Watermark system | |||
8156 | 7007164 | Method and array for authenticating a first instance and a second instance | |||
8157 | 7007000 | Secure online purchasing | |||
8158 | 7006997 | Method and program for preventing unfair use of software | |||
8159 | 7006656 | Lossless embedding of data in digital objects | |||
8160 | 7006635 | Method and apparatus for clock synchronization using quantum mechanical non-locality effects | |||
8161 | 7006634 | Hardware-based encryption/decryption employing dual ported key storage | |||
8162 | 7006633 | Global encryption system | |||
8163 | 7006629 | Method and system for processing a data set | |||
8164 | 7006628 | Efficient packet encryption method | |||
8165 | 7006555 | Spectral audio encoding | |||
8166 | 7006508 | Communication network with a collection gateway and method for providing surveillance services | |||
8167 | 7003676 | Locking mechanism override and disable for personal computer ROM access protection | |||
8168 | 7003675 | Encrypted content data structure package and generation thereof | |||
8169 | 7003670 | Biometric rights management system | |||
8170 | 7003667 | Targeted secure printing | |||
8171 | 7003666 | Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon | |||
8172 | 7003665 | Method for the secure transmission of messages | |||
8173 | 7003663 | Distribution of deployment information for remote applications | |||
8174 | 7003662 | System and method for dynamically determining CRL locations and access methods | |||
8175 | 7003661 | Methods and systems for automated authentication, processing and issuance of digital certificates | |||
8176 | 7003500 | Retail point of sale (RPOS) apparatus for internet merchandising | |||
8177 | 7003493 | Direct payment with token | |||
8178 | 7003117 | Identity-based encryption system for secure data distribution | |||
8179 | 7003116 | System for encrypted file storage optimization via differentiated key lengths | |||
8180 | 7003114 | Method and apparatus for achieving crypto-synchronization in a packet data communication system | |||
8181 | 7003113 | Position authentication system and electronic equipment using the same | |||
8182 | 7003112 | Extensible GPS receiver system | |||
8183 | 7003110 | Software aging method and apparatus for discouraging software piracy | |||
8184 | 7003109 | Compact crypto-engine for random number and stream cipher generation | |||
8185 | 7003107 | Hybrid stream cipher | |||
8186 | 7002450 | Method for authenticating a spare key for using a vehicle | |||
8187 | 7000249 | Pre-boot authentication system | |||
8188 | 7000248 | Virtual network and virtual network connection system | |||
8189 | 7000119 | Instruction/data protection employing derived obscuring instruction/data | |||
8190 | 7000118 | Asymmetric system and method for tamper-proof storage of an audit trial for a database | |||
8191 | 7000116 | Password value based on geographic location | |||
8192 | 7000115 | Method and apparatus for uniquely and authoritatively identifying tangible objects | |||
8193 | 7000114 | Apparatus to create and/or verify digital signatures having a secure time element and an identifier of the apparatus | |||
8194 | 7000113 | Recording information with a watermark related to a prerecorded medium mark on an information carrier | |||
8195 | 7000112 | Method and apparatus for input of coded image data | |||
8196 | 7000111 | Method for masking secret multiplicands | |||
8197 | 7000110 | One-way function generation method, one-way function value generation device, proving device, authentication method, and authentication device | |||
8198 | 7000108 | System, apparatus and method for presentation and manipulation of personal information syntax objects | |||
8199 | 7000106 | Methods and apparatus for kernel mode encryption of computer telephony | |||
8200 | 7000105 | System and method for transparently providing certificate validation and other services within an electronic transaction | |||
8201 | 6999947 | License devolution apparatus | |||
8202 | 6996844 | Switch-user security for UNIX computer systems | |||
8203 | 6996842 | Processing internet protocol security traffic | |||
8204 | 6996841 | Negotiating secure connections through a proxy server | |||
8205 | 6996724 | Secret key generating method, common key generating method, encryption method, cryptographic communication method and cryptographic communication system | |||
8206 | 6996722 | Data communications | |||
8207 | 6996719 | Secure password entry | |||
8208 | 6996718 | System and method for providing access to multiple user accounts via a common password | |||
8209 | 6996716 | Dual-tier security architecture for inter-domain environments | |||
8210 | 6996715 | Method for identification of a user's unique identifier without storing the identifier at the identification site | |||
8211 | 6996714 | Wireless authentication protocol | |||
8212 | 6996710 | Platform and method for issuing and certifying a hardware-protected attestation key | |||
8213 | 6996238 | Method for generating and looking-up transaction keys in communication networks | |||
8214 | 6996235 | Method and system for secure printing of documents via a printer coupled to the internet | |||
8215 | 6996234 | Data decryption methodology | |||
8216 | 6996233 | System and method for encrypting and verifying messages using three-phase encryption | |||
8217 | 6993663 | Input buffer overrun checking and prevention | |||
8218 | 6993662 | Method and system for copy protection of displayed data content | |||
8219 | 6993656 | Time stamping method using aged time stamp receipts | |||
8220 | 6993655 | Record and related method for storing encoded information using overt code characteristics to identify covert code characteristics | |||
8221 | 6993654 | Secure encryption processor with tamper protection | |||
8222 | 6993138 | Spatial key trees for key management in wireless environments | |||
8223 | 6993137 | Method and system to securely distribute content via a network | |||
8224 | 6993135 | Content processing system and content protecting method | |||
8225 | 6993134 | Key exchange via a portable remote control device | |||
8226 | 6993133 | Data recording and reproduction apparatus | |||
8227 | 6993132 | System and method for reducing fraud in a digital cable network | |||
8228 | 6993130 | Methods and apparatus for mediametric data cryptoprocessing | |||
8229 | 6990684 | Person authentication system, person authentication method and program providing medium | |||
8230 | 6990592 | Controlling concurrent usage of network resources by multiple users at an entry point to a communications network based on identities of the users | |||
8231 | 6990587 | Cryptographic architecture for secure, private biometric identification | |||
8232 | 6990585 | Digital signature system, digital signature method, digital signature mediation method, digital signature mediation system, information terminal and storage medium | |||
8233 | 6990584 | Method of and apparatus for restricting copy of digital information, and apparatus for recording digital information | |||
8234 | 6990582 | Authentication method in an agent system | |||
8235 | 6990580 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
8236 | 6990579 | Platform and method for remote attestation of a platform | |||
8237 | 6990578 | Method and apparatus for encrypting electronic messages composed using abbreviated address books | |||
8238 | 6990202 | Packetizing devices for secure scalable data streaming | |||
8239 | 6990199 | Apparatus and method for cipher processing system using multiple port memory and parallel read/write operations | |||
8240 | 6988267 | Method and device for implementing a downloadable software delivery system | |||
8241 | 6988210 | Data processing system for application to access by accreditation | |||
8242 | 6988209 | Uniform resource locator (URL)-based secure download system and method | |||
8243 | 6988205 | Method and apparatus for the secure storage of audio signals | |||
8244 | 6988204 | System and method for key distribution and network connectivity | |||
8245 | 6988201 | Method and apparatus for watermarking wavetable synthesis architectures | |||
8246 | 6988199 | Secure and reliable document delivery | |||
8247 | 6988197 | Synchronization of authentication ciphering offset | |||
8248 | 6988196 | Computer system and method for generating a digital certificate | |||
8249 | 6988195 | Vault controller supervisor and method of operation for managing multiple independent vault processes and browser sessions for users in an electronic business system | |||
8250 | 6988147 | Method of establishing a secure tunnel through a proxy server between a user device and a secure server | |||
8251 | 6987855 | Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups | |||
8252 | 6987853 | Method and apparatus for generating a group of character sets that are both never repeating within certain period of time and difficult to guess | |||
8253 | 6986062 | Set top box object security system | |||
8254 | 6986061 | Integrated system for network layer security and fine-grained identity-based access control | |||
8255 | 6986060 | Method and apparatus for sharing a security context between different sessions on a database server | |||
8256 | 6986059 | Hierarchical trusted code for content protection in computers | |||
8257 | 6986058 | Method and system for providing data security using file spoofing | |||
8258 | 6986057 | Security device and method | |||
8259 | 6986056 | Method and arrangement for generating binary sequences of random numbers | |||
8260 | 6986051 | Method and system for controlling and filtering files using a virus-free certificate | |||
8261 | 6986049 | Method and system for authenticating a message sender using domain keys | |||
8262 | 6986045 | Single algorithm cipher suite for messaging | |||
8263 | 6986044 | Method for group unit encryption/decryption, and method and apparatus for writing signature | |||
8264 | 6986043 | Encrypting file system and method | |||
8265 | 6986041 | System and method for remote code integrity in distributed systems | |||
8266 | 6986040 | System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel | |||
8267 | 6986039 | Technique for synchronizing security credentials using a trusted authenticating domain | |||
8268 | 6986038 | Technique for synchronizing security credentials from a master directory, platform, or registry | |||
8269 | 6986037 | Electronic mail system with authentication/encryption methodology for allowing connections to/from a message transfer agent | |||
8270 | 6986030 | Portable memory device includes software program for interacting with host computing device to provide a customized configuration for the program | |||
8271 | 6985845 | Security monitor of system runs software simulator in parallel | |||
8272 | 6985591 | Method and apparatus for distributing keys for decrypting and re-encrypting publicly distributed media | |||
8273 | 6985590 | Electronic watermarking method and apparatus for compressed audio data, and system therefor | |||
8274 | 6985588 | System and method for using location identity to control access to digital information | |||
8275 | 6985583 | System and method for authentication seed distribution | |||
8276 | 6983486 | Method and apparatus for establishing security scanner attributes in a computer system | |||
8277 | 6983485 | Method and apparatus for authentication for a multiplicity of services | |||
8278 | 6983382 | Method and circuit to accelerate secure socket layer (SSL) process | |||
8279 | 6983380 | Automatically generating valid behavior specifications for intrusion detection | |||
8280 | 6983371 | Super-distribution of protected digital content | |||
8281 | 6983369 | Authentication system, and contents-information sender and receiver | |||
8282 | 6983368 | Linking public key of device to information during manufacture | |||
8283 | 6983367 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
8284 | 6983366 | Packet Processor | |||
8285 | 6983365 | Encryption systems and methods for identifying and coalescing identical objects encrypted with different keys | |||
8286 | 6983326 | System and method for distributed function discovery in a peer-to-peer network environment | |||
8287 | 6983309 | Electronic apparatus transmitting electronic mail including image information, a control apparatus, and a storage medium | |||
8288 | 6983049 | Storage devices for secure scalable data streaming | |||
2005 | |||||
8289 | 6968461 | Providing break points in a malware scanning operation | |||
8290 | 6968459 | Computing environment having secure storage device | |||
8291 | 6968456 | Method and system for providing a tamper-proof storage of an audit trail in a database | |||
8292 | 6968384 | License management system and method for commuter licensing | |||
8293 | 6968337 | Method and apparatus for identifying an unknown work | |||
8294 | 6966003 | System and method for switching security associations | |||
8295 | 6965998 | Time stamping method using time-based signature key | |||
8296 | 6965995 | Signal processing circuit | |||
8297 | 6965992 | Method and system for network security capable of doing stronger encryption with authorized devices | |||
8298 | 6965939 | Method and apparatus for processing requests in a network data processing system based on a trust association between servers | |||
8299 | 6965683 | Routing networks for use with watermark systems | |||
8300 | 6963982 | Method and apparatus for application-independent end-to-end security in shared-link access networks | |||
8301 | 6963977 | Circuits and methods for modular exponentiation | |||
8302 | 6963976 | Symmetric key authenticated encryption schemes | |||
8303 | 6963975 | System and method for audio fingerprinting | |||
8304 | 6963974 | Method and apparatus for providing non-repudiation of transaction information that includes mark up language data | |||
8305 | 6963971 | Method for authenticating electronic documents | |||
8306 | 6963857 | Network-accessible account system | |||
8307 | 6961857 | Authenticating endpoints of a voice over internet protocol call connection | |||
8308 | 6961855 | Notification of modifications to a trusted computing base | |||
8309 | 6961428 | Method of videotext information encryption and security transmission in a network | |||
8310 | 6959420 | Method and system for protecting internet users' privacy by evaluating web site platform for privacy preferences policy | |||
8311 | 6959394 | Splitting knowledge of a password | |||
8312 | 6959392 | Information providing system and method for providing information | |||
8313 | 6959390 | Data processing system and method for maintaining secure user private keys in non-secure storage | |||
8314 | 6959388 | Method for generating many-time restrictive blind signatures | |||
8315 | 6959384 | Systems and methods for authenticating and protecting the integrity of data streams and other data | |||
8316 | 6959289 | Digital rights framework | |||
8317 | 6959088 | Data processing apparatus and method for encryption or decryption of communication data | |||
8318 | 6959086 | Cryptographic key management scheme | |||
8319 | 6959085 | Secure user identification based on ring homomorphisms | |||
8320 | 6957347 | Physical device placement assistant | |||
8321 | 6957338 | Individual authentication system performing authentication in multiple steps | |||
8322 | 6957335 | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | |||
8323 | 6957333 | System and method for encrypted communications between electronic devices | |||
8324 | 6957332 | Managing a secure platform using a hierarchical executive architecture in isolated execution mode | |||
8325 | 6957329 | System for encrypting data from multiple multimedia applications and method thereof | |||
8326 | 6956890 | Process and device for the generation of codes, for example channeling codes for CDMA applications | |||
8327 | 6954860 | Network copy protection for database programs | |||
8328 | 6954858 | Computer virus avoidance system and mechanism | |||
8329 | 6954147 | Method and system for providing protection against theft and loss of a portable computer system | |||
8330 | 6952778 | Protecting access to microcontroller memory blocks | |||
8331 | 6952771 | Shared data initialization query system and method | |||
8332 | 6952480 | Self-synchronous data scrambler | |||
8333 | 6950949 | Method and apparatus for password entry using dynamic interface legitimacy information | |||
8334 | 6950943 | System for electronic repository of data enforcing access control on data search and retrieval | |||
8335 | 6950938 | Service identification tag and communications system using the same | |||
8336 | 6950935 | Pluggable authentication modules for telecommunications management network | |||
8337 | 6950932 | Security association mediator for java-enabled devices | |||
8338 | 6950810 | Tokenless biometric electronic financial transactions via a third party identicator | |||
8339 | 6950523 | Secure storage of private keys | |||
8340 | 6950522 | Encryption key updating for multiple site automated login | |||
8341 | 6950520 | Method and apparatus for carrying data in a video signal so that the data is not recorded | |||
8342 | 6948077 | ATM/alert | |||
8343 | 6948075 | Computer controlling method, information apparatus, computer, and storage medium | |||
8344 | 6948074 | Method and system for distributed generation of unique random numbers for digital tokens | |||
8345 | 6948069 | Method and system for determining and maintaining trust in digital image files with certifiable time | |||
8346 | 6948060 | Method and apparatus for monitoring encrypted communication in a network | |||
8347 | 6947558 | Stream cipher having a shuffle network combiner function | |||
8348 | 6947557 | Method and program product for maintaining security of publicly distributed information | |||
8349 | 6945455 | Method and apparatus for recording content containing watermark | |||
8350 | 6944773 | Method and apparatus for fingerprint authentication during on-line transactions | |||
8351 | 6944772 | System and method of enforcing executable code identity verification over the network | |||
8352 | 6944767 | Methods and apparatus for ensuring the privacy and security of personal medical information | |||
8353 | 6944762 | System and method for encrypting data messages | |||
8354 | 6944299 | Method for synchronous encryption over a communication medium | |||
8355 | 6941465 | Method of enforcing a policy on a computer network | |||
8356 | 6941463 | Secure computational outsourcing techniques | |||
8357 | 6941458 | Managing a secure platform using a hierarchical executive architecture in isolated execution mode | |||
8358 | 6941457 | Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key | |||
8359 | 6941280 | Determining intra-day net asset value of an actively managed exchange traded fund | |||
8360 | 6940976 | Generating user-dependent RSA keys | |||
8361 | 6938168 | Interactive virtual library system for expeditiously providing automatic updates of user-desired information from content providers, at least one of which is commercial, to users | |||
8362 | 6938166 | Method of downloading of data to an MPEG receiver/decoder and MPEG transmission system for implementing the same | |||
8363 | 6938154 | System, method and article of manufacture for a cryptographic key infrastructure for networked devices | |||
8364 | 6934857 | Security system and method for handheld computers | |||
8365 | 6934856 | System of secret internet web sites for securing user access | |||
8366 | 6934848 | Technique for handling subsequent user identification and password requests within a certificate-based host session | |||
8367 | 6934838 | Method and apparatus for a service provider to provide secure services to a user | |||
8368 | 6934388 | Method and apparatus for generating random permutations | |||
8369 | 6931544 | Method and apparatus for executing multiple JAVA(.TM.) applications on a single JAVA(.TM.) virtual machine | |||
8370 | 6931531 | Image object recording, compression, and encryption method and system | |||
8371 | 6931530 | Secure network file access controller implementing access control and auditing | |||
8372 | 6931529 | Establishing consistent, end-to-end protection for a user datagram | |||
8373 | 6931381 | Methods and apparatus for authenticating the download of information onto a smart card | |||
8374 | 6931131 | Method and apparatus for online geographic and user verification and restriction using a GPS system | |||
8375 | 6931130 | Dynamically adjustable software encryption | |||
8376 | 6928557 | Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment | |||
8377 | 6928551 | Method and apparatus for selectively denying access to encoded data | |||
8378 | 6928544 | Method and apparatus for securing mailing information for privacy protection in on-line business-to-customer transactions | |||
8379 | 6928167 | Method for managing public key | |||
8380 | 6928163 | Methods, systems and computer program products for generating user-dependent RSA values without storing seeds | |||
8381 | 6925571 | Method and system of remote monitoring and support of devices, using POP3 and decryption using virtual function | |||
8382 | 6922784 | Administrative security systems and methods | |||
8383 | 6922782 | Apparatus and method for ensuring data integrity of unauthenticated code | |||
8384 | 6920563 | System and method to securely store information in a recoverable manner on an untrusted system | |||
8385 | 6920562 | Tightly coupled software protocol decode with hardware data encryption | |||
8386 | 6920154 | Architectures for a modularized data optimization engine and methods therefor | |||
8387 | 6918117 | Apparatus and method for dynamic load balancing of multiple cryptographic devices | |||
8388 | 6918044 | Password protection for high reliability computer systems | |||
8389 | 6918039 | Method and an apparatus for detecting a need for security and invoking a secured presentation of data | |||
8390 | 6917975 | Method for role and resource policy management | |||
8391 | 6915431 | System and method for providing security mechanisms for securing network communication | |||
8392 | 6915429 | System and method for fiber channel remote activation and enhanced security | |||
8393 | 6915426 | System and method for enabling authentication at different authentication strength-performance levels | |||
8394 | 6914985 | Method and system for presentation and manipulation of PKCS enveloped-data objects | |||
8395 | 6911974 | Information processing system and method | |||
8396 | 6910135 | Method and apparatus for an intruder detection reporting and response system | |||
8397 | 6910128 | Method and computer program product for processing signed applets | |||
8398 | 6909784 | Recording apparatus and recording method of electronic watermark | |||
8399 | 6909783 | Alphabet soup cryptography | |||
8400 | 6907531 | Method and system for identifying, fixing, and updating security vulnerabilities | |||
8401 | 6907527 | Cryptography-based low distortion robust data authentication system and method therefor | |||
8402 | 6907524 | Extensible firmware interface virus scan | |||
8403 | 6907395 | System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model | |||
8404 | 6907126 | Encryption-decryption apparatus | |||
8405 | 6904528 | Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus | |||
8406 | 6904435 | Method and system for secure electronic distribution, archiving and retrieval | |||
8407 | 6904150 | Cryptographic method and system for double encryption of messages | |||
8408 | 6901518 | Method and system for establishing trust in downloaded proxy code | |||
8409 | 6901514 | Secure oblivious watermarking using key-dependent mapping functions | |||
8410 | 6898717 | Network domain with secured and unsecured servers | |||
8411 | 6898714 | Managing and extending attribute values for public key cryptography standards | |||
8412 | 6898706 | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer | |||
8413 | 6898616 | Arbitrary function generating circuit using a simple operational element and an encryption method thereof | |||
8414 | 6898287 | Cryptographic system using chaotic dynamics | |||
8415 | 6895514 | Method and apparatus for achieving secure password access | |||
8416 | 6895509 | Tamper detection system for securing data | |||
8417 | 6895506 | Secure storage and execution of processor control programs by encryption and a program loader/decryption mechanism | |||
8418 | 6895502 | Method and system for securely displaying and confirming request to perform operation on host computer | |||
8419 | 6895501 | Method and apparatus for distributing, interpreting, and storing heterogeneous certificates in a homogenous public key infrastructure | |||
8420 | 6894527 | Evolved circuits for bitstream protection | |||
8421 | 6892940 | Encryption process employing chaotic maps and digital signature process | |||
8422 | 6892175 | Spread spectrum signaling for speech watermarking | |||
8423 | 6889321 | Protected IP telephony calls using encryption | |||
8424 | 6889206 | Method for computer network operation providing basis for usage fees | |||
8425 | 6888944 | Method for assigning encryption keys | |||
8426 | 6886112 | Recovering from device failure | |||
8427 | 6886103 | Method and apparatus for extending network address translation for unsupported protocols | |||
8428 | 6885749 | Scrambling a compression-coded signal | |||
8429 | 6885748 | System and method for protection of digital works | |||
8430 | 6883097 | Coincidence-free media key block for content protection for recordable media | |||
8431 | 6882730 | Method for secure distribution and configuration of asymmetric keying material into semiconductor devices | |||
8432 | 6882729 | System and method for limiting access to data | |||
8433 | 6880149 | Method for runtime code integrity validation using code block checksums | |||
8434 | 6880089 | Firewall clustering for multiple network servers | |||
8435 | 6880088 | Secure maintenance messaging in a digital communications network | |||
8436 | 6880085 | Security system for implantable medical devices | |||
8437 | 6880084 | Methods, systems and computer program products for smart card product management | |||
8438 | 6877095 | Session-state manager | |||
8439 | 6874085 | Medical records data security system | |||
8440 | 6874084 | Method and apparatus for establishing a secure communication connection between a java application and secure server | |||
8441 | 6873975 | Content usage control system, content usage apparatus, computer readable recording medium with program recorded for computer to execute usage method | |||
8442 | 6871277 | Apparatus and method for preventing disclosure of protected information | |||
8443 | 6871192 | System and method for preventing unauthorized use of protected software utilizing a portable security device | |||
8444 | 6870929 | High throughput system for encryption and other data operations | |||
8445 | 6868497 | Method and apparatus for automatic ID management | |||
8446 | 6868159 | `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism | |||
8447 | 6865674 | Dynamic trust anchor system and method | |||
8448 | 6865671 | Electronic mail system with authentication methodology for supporting relaying in a message transfer agent | |||
8449 | 6862686 | Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior | |||
8450 | 6857072 | System and method for enabling encryption/authentication of a telephony network | |||
8451 | 6854058 | Low-interference communications device using chaotic signals | |||
8452 | 6851059 | Method and system for choosing a queue protection key that is tamper-proof from an application | |||
8453 | 6850938 | Method and apparatus providing optimistic locking of shared computer resources | |||
8454 | 6847719 | Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext | |||
8455 | 6845446 | Programmable data bus | |||
8456 | 6842695 | Mapping and addressing system for a secure remote access system | |||
8457 | 6839852 | Firewall system and method with network mapping capabilities | |||
8458 | 6839848 | Information processing system and peripheral apparatus | |||
2004 | |||||
8459 | 6836888 | System for reverse sandboxing | |||
8460 | 6834382 | Message parser and formatter | |||
8461 | 6834350 | Secure and differentiated delivery of network security information | |||
8462 | 6832349 | Remote activation of enhanced functionality features in locally created documents | |||
8463 | 6832319 | Content guard system for copy protection of recordable media | |||
8464 | 6831980 | Random number generator and method for same | |||
8465 | 6829358 | Processing channel resets while performing a ciphering configuration change in a wireless communications protocol | |||
8466 | 6826751 | Ambient calculus-based modal logics for mobile ambients | |||
8467 | 6826700 | Method and apparatus for a web application server to automatically solicit a new password when an existing password has expired | |||
8468 | 6826693 | Information transmission apparatus | |||
8469 | 6823456 | System and method for providing trusted services via trusted server agents | |||
8470 | 6823455 | Method for robust watermarking of content | |||
8471 | 6823069 | Encrypting/decrypting system with programmable logic device/unit and method thereof | |||
8472 | 6823068 | Denial cryptography based on graph theory | |||
8473 | 6820204 | System and method for selective information exchange | |||
8474 | 6820177 | Protected configuration space in a protected environment | |||
8475 | 6820063 | Controlling access to content based on certificates and access predicates | |||
8476 | 6816968 | Consumable authentication protocol and system | |||
8477 | 6813712 | Viral replication detection using a counter virus | |||
8478 | 6813354 | Mixing in small batches | |||
8479 | 6807632 | Content addressable information encapsulation, representation, and transfer | |||
8480 | 6807560 | Method for encouraging internet publication browsing while discouraging unauthorized printing | |||
8481 | 6804778 | Data quality assurance | |||
8482 | 6802011 | COPYRIGHT PROTECTION INFORMATION PROTECTING METHOD, INFORMATION SIGNAL PROCESSING METHOD, INFORMATION SIGNAL REPRODUCING METHOD, INFORMATION SIGNAL RECORDING METHOD, AND INFORMATION SIGNAL PROCESSING DEVICE, INFORMATION SIGNAL REPRODUCING DEVICE, AND INFORMATION SIGNAL RECORDING DEVICE | |||
8483 | 6802005 | Method and system for tracking a person's time at a location | |||
8484 | 6802003 | Method and apparatus for authenticating content | |||
8485 | 6801935 | Secure printing using electronic mailbox | |||
8486 | 6801625 | Apparatus and method for stripping parity bits from an input stream | |||
8487 | 6799274 | Device comprising encryption circuitry enabled by comparing an operating spectral signature to an initial spectral signature | |||
8488 | 6798885 | Method and apparatus for encoding security information in a MIDI datastream | |||
8489 | 6795920 | Vault controller secure depositor for managing secure communication | |||
8490 | 6795554 | Method of transmitting medical information over a network | |||
8491 | 6792545 | Enterprise computer investigation system | |||
8492 | 6792540 | Data replication security | |||
8493 | 6792532 | Method for encrypting data using IEEE 1394 serial bus network | |||
8494 | 6792111 | Cryptation system for packet switching networks based on digital chaotic models | |||
8495 | 6788787 | Pseudorandom number generator, stream encryption method, and stream encrypting communication method | |||
8496 | 6785860 | Error-correcting code adapted for memories that store multiple bits per storage cell | |||
8497 | 6785813 | Key agreement and transport protocol with implicit signatures | |||
8498 | 6779044 | Access control for an information processing device | |||
8499 | 6775781 | Administrative security systems and methods | |||
8500 | 6766455 | System and method for preventing differential power analysis attacks (DPA) on a cryptographic device | |||
8501 | 6763467 | Network traffic intercepting method and system | |||
8502 | 6763465 | Method of ensuring that the PC is not used to make unauthorized and surreptitious telephone calls | |||
8503 | 6760842 | Finite state automata security system | |||
8504 | 6760442 | Method and apparatus for adjusting the quality of digital media | |||
8505 | 6754819 | Method and system for providing cryptographic services in a distributed application | |||
8506 | 6754346 | Method for tracing the distribution of physical digital media | |||
8507 | 6751736 | Method and apparatus for E-commerce by using optional fields for virtual bar codes | |||
8508 | 6751320 | Method and system for preventing reproduction of professional photographs | |||
8509 | 6748539 | System and method for securely checking in and checking out digitized content | |||
8510 | 6748534 | System and method for partitioned distributed scanning of a large dataset for viruses and other malware | |||
8511 | 6748395 | System and method for dynamic playlist of media | |||
8512 | 6745332 | Method and apparatus for enabling database privileges | |||
8513 | 6742039 | System and method for connecting to a device on a protected network | |||
8514 | 6738902 | Systems and methods for controlling authorized intercept | |||
8515 | 6735699 | Method and system for monitoring use of digital works | |||
8516 | 6735311 | Encryption and decryption of multi-media data | |||
8517 | 6735310 | Technique of password encryption and decryption for user authentication in a federated content management system | |||
8518 | 6728879 | Transactional log with multi-sector log block validation | |||
8519 | 6725371 | Secure packet processor | |||
8520 | 6721889 | Device for protecting an electronic apparatus | |||
8521 | 6721423 | Lost cost countermeasures against compromising electromagnetic computer emanations | |||
8522 | 6720860 | Password protection using spatial and temporal variation in a high-resolution touch sensitive display | |||
8523 | 6715098 | System and method for fibrechannel fail-over through port spoofing | |||
8524 | 6715086 | Data processing system and method having time-span support for input device driver | |||
8525 | 6715085 | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | |||
8526 | 6715083 | Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system | |||
8527 | 6715073 | Secure server using public key registration and methods of operation | |||
8528 | 6711686 | Security management tool for managing security attributes in computer systems | |||
8529 | 6708273 | Apparatus and method for implementing IPSEC transforms within an integrated circuit | |||
8530 | 6708272 | Information encryption system and method | |||
8531 | 6704871 | Cryptographic co-processor | |||
8532 | 6704420 | Device for sending or receiving a signal encrypted using deterministic chaos | |||
8533 | 6697944 | Digital content distribution, transmission and protection system and method, and portable device for use therewith | |||
8534 | 6694434 | Method and apparatus for controlling program execution and program distribution | |||
8535 | 6687834 | Data processing system, method and program for generating a job within an automated test environment | |||
8536 | 6681016 | System for transfer of secure mission data | |||
8537 | 6678828 | Secure network file access control system | |||
8538 | 6678822 | Method and apparatus for securely transporting an information container from a trusted environment to an unrestricted environment | |||
8539 | 6678390 | Method and computer program for embedding and extracting an embedded message from a digital image | |||
8540 | 6678378 | 3-dimensional shape data encryption and decryption | |||
8541 | 6675297 | Method and apparatus for generating and using a tamper-resistant encryption key | |||
2003 | |||||
8542 | 6671805 | System and method for document-driven processing of digitally-signed electronic documents | |||
8543 | 6671759 | Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets | |||
8544 | 6671674 | Computer-based auction and sale system | |||
8545 | 6662166 | Tokenless biometric electronic debit and credit transactions | |||
8546 | 6658571 | Security framework for dynamically wrapping software applications executing in a computing system | |||
8547 | 6654465 | Method of implementing a key recovery system | |||
8548 | 6650753 | System for encrypting broadcast programs in the presence of compromised receiver devices | |||
8549 | 6647493 | Method and system for authentication and electronic signature | |||
8550 | 6640303 | System and method for encryption using transparent keys | |||
8551 | 6631472 | Kernel mode protection | |||
8552 | 6609196 | E-mail firewall with stored key encryption/decryption | |||
8553 | 6609116 | System and method for securely updating copy-protected media | |||
8554 | 6597790 | Communication apparatus and a communication system | |||
8555 | 6591273 | Method and system for secure electronic distribution, archiving and retrieval | |||
8556 | 6587887 | Digital data transmission utilizing vector coordinates within a hyperbola model | |||
8557 | 6587563 | Cryptographic system using chaotic dynamics | |||
8558 | 6581042 | Tokenless biometric electronic check transactions | |||
8559 | 6580809 | Quantization-based data hiding employing calibration and locally adaptive quantization | |||
8560 | 6574466 | Method of securing transmission of information utilizing time variant techniques with error detecting code | |||
8561 | 6571099 | Cell searching method in asynchronous wideband code division multiple access system | |||
8562 | 6567914 | Apparatus and method for reducing transmission bandwidth and storage requirements in a cryptographic security system | |||
8563 | 6549624 | Apparatus and method for enhancing the security of negotiable documents | |||
8564 | 6519699 | Method and system for voice guided secure entry of private data in a public setting | |||
8565 | 6516415 | Device and method of maintaining a secret code within an integrated circuit package | |||
8566 | 6510523 | Method and system for providing limited access privileges with an untrusted terminal | |||
8567 | 6504929 | Encryption strength evaluation support apparatus and recording medium recording encryption strength evaluation support program | |||
2002 | |||||
8568 | 6501840 | Cryptographic processing apparatus cryptographic processing method and recording medium for recording a cryptographic processing program | |||
8569 | 6442686 | System and methodology for messaging server-based management and enforcement of crypto policies | |||
8570 | 6438252 | Method for encoding bits in a signal | |||
8571 | 6438231 | Emulsion film media employing steganography | |||
8572 | 6438230 | Data mapping method and apparatus with multi-party capability | |||
8573 | 6434699 | Encryption processor with shared memory interconnect | |||
8574 | 6408389 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
8575 | 6408077 | Descrambling device of a security element and security element comprising such a device | |||
8576 | 6408074 | Hardware architecture for a configurable cipher device | |||
8577 | 6397330 | Cryptographic policy filters and policy control method and apparatus | |||
8578 | 6397198 | Tokenless biometric electronic transactions using an audio signature to identify the transaction processor | |||
8579 | 6377690 | Safe transmission of broadband data messages | |||
8580 | 6373952 | Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method | |||
8581 | 6370248 | Synchronizing autonomous chaotic systems using filters | |||
8582 | 6363153 | Method and apparatus for secure digital chaotic communication | |||
8583 | 6363149 | Method and apparatus for accessing stored digital programs | |||
8584 | 6363148 | Method, apparatus and computer program for activating an alternate encryption using an identifier embedded in data | |||
8585 | 6360152 | Vehicle-control communication system | |||
8586 | 6356637 | Field programmable gate arrays | |||
8587 | 6347144 | Copy prevention method and apparatus for digital video system | |||
8588 | 6341164 | Method and apparatus for correcting improper encryption and/or for reducing memory storage | |||
2001 | |||||
8589 | 6330673 | Determination of a best offset to detect an embedded pattern | |||
8590 | 6311167 | Portable 2-way wireless financial messaging unit | |||
8591 | 6307936 | Cryptographic key management scheme | |||
8592 | 6301361 | Encoding and decoding information using randomization with an alphabet of high dimensionality | |||
8593 | 6282657 | Kernel mode protection | |||
8594 | 6278782 | Method of implementing a key recovery system | |||
8595 | 6278781 | Wireless telephony with steganography | |||
8596 | 6275859 | Tree-based reliable multicast system where sessions are established by repair nodes that authenticate receiver nodes presenting participation certificates granted by a central authority | |||
8597 | 6275587 | Secure data encoder and decoder | |||
8598 | 6272633 | Methods and apparatus for transmitting, receiving, and processing secure voice over internet protocol | |||
8599 | 6272632 | System and method for controlling access to a user secret using a key recovery field | |||
8600 | 6266417 | Cryptographic communication process and apparatus | |||
8601 | 6263087 | Method of encoding bits in a signal | |||
8602 | 6252961 | Method and apparatus for performing data encryption and error code correction | |||
8603 | 6247133 | Method for authenticating electronic documents on a computer network | |||
8604 | 6243469 | Information transmission method and apparatus | |||
8605 | 6233338 | Virtual encryption scheme combining different encryption operators into compound-encryption mechanism | |||
8606 | 6219791 | Method and apparatus for generating and verifying encrypted data packets | |||
8607 | 6219423 | System and method for digitally signing a digital agreement between remotely located nodes | |||
8608 | 6219421 | Virtual matrix encryption (VME) and virtual key cryptographic method and apparatus | |||
8609 | 6209098 | Circuit and method for ensuring interconnect security with a multi-chip integrated circuit package | |||
8610 | 6202056 | Method for computer network operation providing basis for usage fees | |||
8611 | 6192476 | Controlling access to a resource | |||
8612 | 6173403 | Method and apparatus for distributing information products | |||
2000 | |||||
8613 | 6154842 | Method and system for reducing time and power requirements for executing computer-readable instruction streams in an execution environment having run-time security constraints | |||
8614 | 6154542 | Method and apparatus for simultaneously encrypting and compressing data | |||
8615 | 6144742 | Optical disk, an optical disk barcode forming method, an optical disk reproduction apparatus, a marking forming apparatus, a method of forming a laser marking on an optical disk, and a method of manufacturing an optical disk | |||
8616 | 6141116 | System and method for secured transmission of data over telephone communications system | |||
8617 | 6128738 | Certificate based security in SNA data flows | |||
8618 | 6128735 | Method and system for securely transferring a data set in a data communications system | |||
8619 | 6119233 | Secure data communication system | |||
8620 | 6118873 | System for encrypting broadcast programs in the presence of compromised receiver devices | |||
8621 | 6118870 | Microprocessor having instruction set extensions for decryption and multimedia applications | |||
8622 | 6115817 | Methods and systems for facilitating transmission of secure messages across insecure networks | |||
8623 | 6115735 | Message guaranty system | |||
8624 | 6112305 | Mechanism for dynamically binding a network computer client device to an approved internet service provider | |||
8625 | 6111954 | Steganographic methods and media for photography | |||
8626 | 6101255 | Programmable cryptographic processing system and method | |||
8627 | 6092191 | Packet authentication and packet encryption/decryption scheme for security gateway | |||
8628 | 6088800 | Encryption processor with shared memory interconnect | |||
8629 | 6081895 | Method and system for managing data unit processing | |||
8630 | 6078665 | Electronic encryption device and method | |||
8631 | 6078663 | Communication apparatus and a communication system | |||
8632 | 6075865 | Cryptographic communication process and apparatus | |||
8633 | 6073235 | Private broadcast communication system and method for private broadcast communication over a wired or wireless network | |||
8634 | 6069954 | Cryptographic data integrity with serial bit processing and pseudo-random generators | |||
8635 | 6064738 | Method for encrypting and decrypting data using chaotic maps | |||
8636 | 6064737 | Anti-piracy system for wireless telephony | |||
8637 | 6058478 | Apparatus and method for a vetted field upgrade | |||
8638 | 6058189 | Method and system for performing secure electronic monetary transactions | |||
8639 | 6058186 | Information signal transmission system | |||
8640 | 6052783 | Method of loading commands in the security module of a terminal | |||
8641 | 6049613 | Method and apparatus for encrypting, decrypting, and providing privacy for data values | |||
8642 | 6047069 | Method and apparatus for preserving error correction capabilities during data encryption/decryption | |||
8643 | 6044469 | Software publisher or distributor configurable software security mechanism | |||
8644 | 6038665 | System and method for backing up computer files over a wide area computer network | |||
8645 | 6032260 | Method for issuing a new authenticated electronic ticket based on an expired authenticated ticket and distributed server architecture for using same | |||
8646 | 6021391 | Method and system for dynamic data encryption | |||
8647 | 6021203 | Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security | |||
8648 | 6018801 | Method for authenticating electronic documents on a computer network | |||
8649 | 6018582 | Optical transmission system implementing encrypting by deterministic chaos | |||
8650 | 6016491 | Generic file format for multiple security requirements | |||
8651 | 6014445 | Enciphering/deciphering apparatus and method incorporating random variable and keystream generation | |||
8652 | 6014444 | Apparatus for encrypted communication | |||
1999 | |||||
8653 | 6005874 | Method of processing messages in a secure communications system having a plurality of encryption procedures, and such a secure communication system | |||
8654 | 6003137 | Virtual group information managing method in bridge for network connection | |||
8655 | 6002769 | Method and system for performing secure electronic messaging | |||
8656 | 5999623 | Broadcast data access controller communication system | |||
8657 | 5982889 | Method and apparatus for distributing information products | |||
8658 | 5978959 | Method and devices for the transmission of data with transmission error checking | |||
8659 | 5966448 | Cryptographic communication system | |||
8660 | 5933501 | `Virtual` encryption scheme combining different encryption operators into compound-encryption mechanism | |||
8661 | 5930364 | Synchronized chaotic system and communication system using synchronized chaotic system | |||
8662 | 5923760 | Chaotic communication apparatus and method for use with a wired or wireless transmission link | |||
8663 | 5907620 | Method and apparatus for enforcing the use of cryptography in an international cryptography framework | |||
8664 | 5894521 | System and method for encrypting sensitive information | |||
8665 | 5892826 | Data processor with flexible data encryption | |||
8666 | 5887064 | Cryptographic equipment | |||
8667 | 5872846 | System and method for providing security in data communication systems | |||
8668 | 5857025 | Electronic encryption device and method | |||
1998 | |||||
8669 | 5832214 | Method and apparatus for data security for a computer | |||
8670 | 5828753 | Circuit and method for ensuring interconnect security within a multi-chip integrated circuit package | |||
8671 | 5822428 | Data encryption for product information and access | |||
8672 | 5815574 | Provision of secure access to external resources from a distributed computing environment | |||
8673 | 5805706 | Apparatus and method for re-encrypting data without unsecured exposure of its non-encrypted format | |||
8674 | 5793870 | System and method for encrypting sensitive information | |||
8675 | 5793869 | Method and apparatus for encoding and data compressing text information | |||
8676 | 5786784 | Remote-control device for a video receiver | |||
8677 | 5764774 | Source data compression and decompression in code symbol printing and decoding | |||
8678 | 5751811 | 32N +D bit key encryption-decryption system using chaos | |||
8679 | 5742686 | Device and method for dynamic encryption | |||
8680 | 5742684 | Method and apparatus for data encryption and transmission | |||
8681 | 5740252 | Apparatus and method for passing private demographic information between hyperlink destinations | |||
8682 | 5732138 | Method for seeding a pseudo-random number generator with a cryptographic hash of a digitization of a chaotic system | |||
8683 | 5721747 | Method and device for data transmission having improved error resilience with concomitant integrity protection | |||
1997 | |||||
8684 | 5691928 | Portable personal computer having removable security module | |||
8685 | 5687236 | Steganographic method and device | |||
8686 | 5680462 | Information encoder/decoder using chaotic systems | |||
8687 | 5677956 | Method and apparatus for data encryption/decryption using cellular automata transform | |||
8688 | 5659618 | Multi-size cryptographic key system | |||
8689 | 5646994 | Method and apparatus for recording sensor data | |||
8690 | 5642420 | Cryptoinformation repeater, subscriber terminal connected thereto, and cryptocommunication method | |||
8691 | 5615269 | Ideal electronic negotiations | |||
8692 | 5613004 | Steganographic method and device | |||
8693 | 5608798 | Crytographic device with secure testing function | |||
8694 | 5600724 | Method for the protection of messages transmitted using public communication lines | |||
8695 | 5596327 | Radar encoder | |||
8696 | 5594796 | Method and apparatus for detecting unauthorized distribution of data | |||
8697 | 5592555 | Wireless communications privacy method and system | |||
1996 | |||||
8698 | 5579437 | Pitch epoch synchronous linear predictive coding vocoder and method | |||
8699 | 5577122 | Secure communication of information | |||
8700 | 5568556 | System and method for encrypting sensitive information | |||
8701 | 5550809 | Multiple access coding using bent sequences for mobile radio communications | |||
8702 | 5548648 | Encryption method and system | |||
8703 | 5541995 | Method and apparatus for decoding non-sequential data packets | |||
8704 | 5535277 | Encryption communication apparatus | |||
8705 | 5533127 | Encryption system | |||
8706 | 5524134 | Telecommunications security module | |||
8707 | 5524072 | Methods and apparatus for data encryption and transmission | |||
8708 | 5504834 | Pitch epoch synchronous linear predictive coding vocoder and method | |||
8709 | 5504818 | Information processing system using error-correcting codes and cryptography | |||
8710 | 5500898 | Scramble communication system multiplexing/demultiplexing scramble generation polynomial | |||
8711 | 5499295 | Method and apparatus for feature authorization and software copy protection in RF communications devices | |||
8712 | 5497419 | Method and apparatus for recording sensor data | |||
8713 | 5483595 | Paging device including password accessed stored cryptographic keys | |||
1995 | |||||
8714 | 5479513 | Fast and secure encryption-decryption method based on chaotic dynamics | |||
8715 | 5455864 | Encrypted paging message transmission | |||
8716 | 5404402 | Clock frequency modulation for secure microprocessors | |||
1994 | |||||
8717 | 5369703 | Command and control signalling method and apparatus | |||
8718 | 5365591 | Secure cryptographic logic arrangement | |||
8719 | 5365589 | Method and apparatus for encryption, decryption and authentication using dynamical systems | |||
8720 | 5355412 | Identifying secret data messages in a one-direction multipoint network | |||
8721 | 5353352 | Multiple access coding for radio communications | |||
8722 | 5333198 | Digital interface circuit | |||
8723 | 5329623 | Apparatus for providing cryptographic support in a network | |||
8724 | 5321753 | Secure communication of static information by electronic means | |||
8725 | 5311595 | Method of transferring data, between computer systems using electronic cards | |||
8726 | 5307409 | Apparatus and method for fault detection on redundant signal lines via encryption | |||
8727 | 5303293 | Cryptographic device with a display means for identification of a defective function in the cryptographic device | |||
8728 | 5285497 | Methods and apparatus for scrambling and unscrambling compressed data streams | |||
8729 | 5285496 | Methods and apparatus for providing a secure paging system | |||
8730 | 5283832 | Paging message encryption | |||
8731 | 5280529 | Communication network intended for secure transmissions | |||
8732 | 5280497 | Communicating on wandering channels | |||
8733 | 5276738 | Software data protection mechanism | |||
1993 | |||||
8734 | 5266942 | Security system with memory in transmitter and receiver | |||
8735 | 5265164 | Cryptographic facility environment backup/restore and replication in a public key cryptosystem | |||
8736 | 5253293 | Adaptive data ciphering/deciphering apparatuses and data communication system using these apparatuses | |||
8737 | 5249227 | Method and apparatus of controlling processing devices during power transition | |||
8738 | 5245658 | Domain-based encryption | |||
8739 | 5245655 | Method and a device for the protected transmission of data | |||
8740 | 5233653 | Apparatus and method for enciphered facsimile transmission and reception | |||
8741 | 5226081 | Multi-carrier communication system using ciphered carrier bit assignment information | |||
8742 | 5224164 | Method and apparatus for transliterating messages | |||
8743 | 5212729 | Computer data security device and method | |||
8744 | 5208855 | Method and apparatus for irrigation control using evapotranspiration | |||
8745 | 5199069 | Automatic encryption selector | |||
8746 | 5193115 | Pseudo-random choice cipher and method | |||
8747 | 5185797 | Encrypted trunked control channel system | |||
1992 | |||||
8748 | 5161191 | Encryption system for time division multiplexed networks | |||
8749 | 5161186 | System for secure and private communication in a triple-connected network | |||
8750 | 5159633 | Multimedia network system | |||
8751 | 5150409 | Device for the identification of messages | |||
8752 | 5131040 | Method for backing up and erasing encryption keys | |||
8753 | 5128996 | Multichannel data encryption device | |||
8754 | 5113444 | Random choice cipher system and method | |||
1991 | |||||
8755 | 5054068 | Trunked radio communication system having encrypted system control information | |||
8756 | 5048086 | Encryption system based on chaos theory | |||
8757 | 5020106 | Process for the cryptographic processing of data and cryptographic systems | |||
8758 | 5010573 | Cryptographic system by blocs of binery data | |||
8759 | 5007087 | Method and apparatus for generating secure random numbers using chaos | |||
8760 | 4997288 | Power supply arrangement for fault-tolerant operation in a microcomputer-based encryption system | |||
8761 | 4991209 | Random local message encryption | |||
8762 | 4984271 | Cipher system with closed cipher procedure | |||
1990 | |||||
8763 | 4972478 | Soft logic cryptographic circuit | |||
8764 | 4972472 | Method and apparatus for changing the master key in a cryptographic system | |||
8765 | 4969188 | Process and apparatus for the protection of secret elements in a network of encrypting devices with open key management | |||
8766 | 4944006 | Secure data packet transmission system and method | |||
8767 | 4932057 | Parallel transmission to mask data radiation | |||
8768 | 4926475 | Data encryption key failure monitor | |||
8769 | 4922533 | High security evolutive coding process and device for carrying out this process | |||
8770 | 4910777 | Packet switching architecture providing encryption across packets | |||
1989 | |||||
8771 | 4890324 | Enciphering/deciphering method and arrangement for performing the method | |||
8772 | 4887296 | Cryptographic system for direct broadcast satellite system | |||
8773 | 4876718 | Secure data packet transmission system and method | |||
8774 | 4866773 | System for interfacing a digital encryption device to a time-division multiplexed communication system | |||
8775 | 4866772 | Communication system | |||
8776 | 4853962 | Encryption system | |||
8777 | 4817142 | Restoring framing in a communications system | |||
8778 | 4811392 | Communications network | |||
8779 | 4809327 | Encrtption of messages employing unique control words and randomly chosen encryption keys | |||
8780 | 4803725 | Cryptographic system using interchangeable key blocks and selectable key fragments | |||
8781 | 4802220 | Method and apparatus for multi-channel communication security | |||
8782 | 4797921 | System for enciphering or deciphering data | |||
1988 | |||||
8783 | 4794644 | Method of secured communications in a telecommunications system | |||
8784 | 4782529 | Decryption of messages employing unique control words and randomly chosen decryption keys | |||
8785 | 4771458 | Secure data packet transmission system and method | |||
8786 | 4763357 | Method and apparatus for providing secure electronic communications | |||
8787 | 4760600 | Cipher system | |||
8788 | 4760599 | Data encryptor | |||
1987 | |||||
8789 | 4703503 | Cryptographic system using pseudocomplements of vector Boolean algebra | |||
8790 | 4694491 | Cryptographic system using interchangeable key blocks and selectable key fragments | |||
8791 | 4688250 | Apparatus and method for effecting a key change via a cryptographically protected link | |||
8792 | 4675477 | Electronic device providing automatic permutations of a Vigenere Square | |||
8793 | 4661657 | Method and apparatus for transmitting and receiving encoded data | |||
8794 | 4658093 | Software distribution system | |||
8795 | 4652698 | Method and system for providing system security in a remote terminal environment | |||
1986 | |||||
8796 | 4591660 | Common control audio decryptor | |||
8797 | 4563546 | Method for preventing "compromising radiation" | |||
1985 | |||||
8798 | 4555591 | Integrated circuit devices for secure data encryption | |||
8799 | 4533948 | CATV Communication system | |||
8800 | 4531021 | Two level encripting of RF signals | |||
8801 | 4531020 | Multi-layer encryption system for the broadcast of encrypted information | |||
1984 | |||||
8802 | 4441095 | Code translator | |||
1983 | |||||
8803 | 4418425 | Encryption using destination addresses in a TDMA satellite communications network | |||
8804 | 4408203 | Security system for electronic funds transfer system | |||
8805 | 4408093 | Cryptographic encoder-decoder | |||
8806 | 4404426 | Cryptographic telegraphy programming system | |||
8807 | 4386416 | Data compression, encryption, and in-line transmission system | |||
1982 | |||||
8808 | 4366551 | Associative memory search system | |||
8809 | 4365110 | Multiple-destinational cryptosystem for broadcast networks | |||
8810 | 4329545 | Circuit arrangement for the control of semi-duplex data transmission system | |||
8811 | 4323729 | Circuit arrangement for the control of a crypto operation in the case of procedure-controlled semi-duplex data transmission systems | |||
8812 | 4322576 | Message format for secure communication over data links | |||
8813 | 4315101 | Method and apparatus for securing data transmissions | |||
1981 | |||||
8814 | 4301327 | Reduction of message redundancy by multiple substitution: a message preprocessing scheme for secure communications | |||
8815 | 4274085 | Flexible mode DES system | |||
8816 | 4262359 | Five V insertion unit | |||
8817 | 4249180 | Past dependent microcomputer cipher apparatus | |||
1980 | |||||
8818 | 4232187 | Teletype character modification unit | |||
8819 | 4229817 | Portable electronic cryptographic device | |||
8820 | 4224666 | Data processing system which protects the secrecy of confidential data | |||
8821 | 4208739 | Integrated encryption and channel coding technique | |||
1979 | |||||
8822 | 4176247 | Signal scrambler-unscrambler for binary coded transmission system | |||
8823 | 4162483 | Bilateral master station-plural satellite station signalling apparatus | |||
1978 | |||||
8824 | 4091423 | Synchronous digital data scrambling system | |||
1976 | |||||
8825 | 3984637 | Computer terminal security system | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |