СПИСОК патентов США - подгруппа МПК16 H04L9/08
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9609280 | Method for controlling access to a plurality of channels by a receiver/decoder | |||
2 | 9609024 | Method and system for policy based authentication | |||
3 | 9608971 | Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers | |||
4 | 9608968 | Connection architecture for a mobile network | |||
5 | 9608967 | Method and system for establishing a session key | |||
6 | 9608945 | Sending messages to multiple receiving electronic devices using a message server | |||
7 | 9608825 | Trusted platform module certification and attestation utilizing an anonymous key system | |||
8 | 9608823 | Secure remote kernel module signing | |||
9 | 9608822 | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |||
10 | 9608819 | Learning parity with noise-based relational encryption for proximity relations | |||
11 | 9608818 | Cryptographic communication system and cryptographic communication method | |||
12 | 9608817 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
13 | 9608816 | Shared data encryption and confidentiality | |||
14 | 9608814 | System and method for centralized key distribution | |||
15 | 9608813 | Key rotation techniques | |||
16 | 9608812 | Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program | |||
17 | 9608811 | Managing access to a secure digital document | |||
18 | 9608810 | Systems and methods for encryption and provision of information security using platform services | |||
19 | 9608809 | Systems and methods for encryption and provision of information security using platform services | |||
20 | 9608808 | Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof | |||
21 | 9608807 | Hearing device with communication protection and related method | |||
22 | 9608806 | Extending data confidentiality into a player application | |||
23 | 9608805 | Encryption key generation | |||
24 | 9608804 | Secure key authentication and ladder system | |||
25 | 9607256 | Augmenting and updating data using encrypted machine-readable identifiers | |||
26 | 9607180 | Information processing apparatus, control method for controlling the information processing apparatus in a maintenance mode, and storage medium | |||
27 | 9607177 | Method for securing content in dynamically allocated memory using different domain-specific keys | |||
28 | 9607173 | Information processing apparatus, information processing method, and recording medium | |||
29 | 9607159 | Intelligent key selection and generation | |||
30 | 9607131 | Secure and efficient content screening in a networked environment | |||
31 | 9603015 | Encrypted communication between paired devices | |||
32 | 9602507 | Virtual smart card to perform security-critical operations | |||
33 | 9602500 | Secure import and export of keying material | |||
34 | 9602485 | Network, network node with privacy preserving source attribution and admission control and device implemented method therfor | |||
35 | 9602480 | Methods and apparatus for data access control | |||
36 | 9602479 | Encryption based on network information | |||
37 | 9602478 | Trust relationships in a computerized system | |||
38 | 9602457 | Mobile device having power save feature for establishing communications | |||
39 | 9602286 | Electronic device and method for extracting encrypted message | |||
40 | 9602285 | Authentication device, authentication method, and program | |||
41 | 9602284 | Secure offline authentication | |||
42 | 9602282 | Secure software and hardware association technique | |||
43 | 9602280 | System and method for content encryption in a key/value store | |||
44 | 9602278 | Encryption device, cipher-text comparison system, cipher-text comparison method, and cipher-text comparison program | |||
45 | 9602277 | User interface systems and methods for secure message oriented communications | |||
46 | 9602276 | Method and apparatus for virtual pairing with a group of semi-connected devices | |||
47 | 9602275 | Server pool kerberos authentication scheme | |||
48 | 9602274 | Secure password generation | |||
49 | 9602220 | Quantum repeater network system | |||
50 | 9601016 | Communication system, vehicle-mounted terminal, roadside device | |||
51 | 9600686 | Augmented reality based privacy and decryption | |||
52 | 9600649 | Authentication method using liveness verification | |||
53 | 9600640 | Multimedia network system with content importation, content exportation, and integrated content management | |||
54 | 9596436 | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box | |||
55 | 9596344 | System and method for encrypting and recording media for a contact center | |||
56 | 9596221 | Encryption of user data for storage in a cloud server | |||
57 | 9596220 | Secure protocol for peer-to-peer network | |||
58 | 9596181 | Two stage bloom filter for longest prefix match | |||
59 | 9596090 | Method for controlling data acquisition for a plurality of field devices | |||
60 | 9596088 | Systems and methods for biometric e-signature | |||
61 | 9596086 | Password-based authentication | |||
62 | 9596081 | Order preserving tokenization | |||
63 | 9596080 | Method of generating prime numbers proven suitable for chip cards | |||
64 | 9596079 | Secure telecommunications | |||
65 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
66 | 9596077 | Community of interest-based secured communications over IPsec | |||
67 | 9596076 | Encrypted data exchange between computer systems | |||
68 | 9594927 | Providing a trusted execution environment using a processor | |||
69 | 9594922 | Non-persistent shared authentication tokens in a cluster of nodes | |||
70 | 9594920 | Managing keys used for encrypting data | |||
71 | 9594918 | Computer data protection using tunable key derivation function | |||
72 | 9594916 | Method and devices for providing secure data backup from a mobile communication device to an external computing device | |||
73 | 9594698 | Local keying for self-encrypting drives (SED) | |||
74 | 9591682 | Automatic password handling | |||
75 | 9591479 | Secure telecommunications | |||
76 | 9591068 | Updating error recovery information in a dispersed storage network | |||
77 | 9590989 | Data access and anonymity management | |||
78 | 9590981 | System, method, and device for delivering communications and storing and delivering data | |||
79 | 9590963 | System and method for key management for issuer security domain using global platform specifications | |||
80 | 9590959 | Data security service | |||
81 | 9590807 | Identity based public key cryptosystem | |||
82 | 9590806 | Secure provisioning of semiconductor chips in untrusted manufacturing factories | |||
83 | 9590805 | Ladder-based cryptographic techniques using pre-computed points | |||
84 | 9590804 | Identification information generation device and identification information generation method | |||
85 | 9589397 | Securing internet of things (IoT) based entrance/exit with multi-factor authentication | |||
86 | 9589309 | Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval | |||
87 | 9589159 | Creating secure communication channels between processing elements | |||
88 | 9589158 | Programmable intelligent search memory (PRISM) and cryptography engine enabled secure DRAM | |||
89 | 9589156 | System and method for intercept of UEFI block I/O protocol services for bios based hard drive encryption support | |||
90 | 9589151 | Techniques and architecture for anonymizing user data | |||
91 | 9589148 | Systems and methods for securing data in motion | |||
92 | 9589143 | Semi-trusted Data-as-a-Service platform | |||
93 | 9588705 | Efficient elimination of access to data on a writable storage media | |||
94 | 9584696 | Imaging systems with embedded data transmission capabilities | |||
95 | 9584508 | Peer to peer enterprise file sharing | |||
96 | 9584495 | Method and system for establishing secure communications using composite key cryptography | |||
97 | 9584490 | Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus | |||
98 | 9584326 | Creating a new file for a dispersed storage network | |||
99 | 9584325 | User-configurable cryptographic interface controller | |||
100 | 9584323 | Compressing encrypted data without the encryption key | |||
101 | 9584320 | Blinding function in elliptic curve cryptography | |||
102 | 9584319 | Optical receiving device in optical communication system, control method and device of photon detector, and dark count evaluation method of photon detector | |||
103 | 9584318 | Perfect forward secrecy distributed denial of service attack defense | |||
104 | 9584317 | Identifying security boundaries on computing devices | |||
105 | 9584316 | Digital security bubble | |||
106 | 9584315 | Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof | |||
107 | 9584314 | Event-driven, asset-centric key management in a smart grid | |||
108 | 9582678 | Method for secure storing of a data file via a computer communication network | |||
109 | 9582672 | Encrypted file storage | |||
110 | 9582671 | Security and data privacy for lighting sensory networks | |||
111 | 9578035 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
112 | 9578017 | Secure management of operations on protected virtual machines | |||
113 | 9577997 | Authentication system and authentication method | |||
114 | 9577993 | System and method for authenticating users | |||
115 | 9577992 | Data encryption/decryption using neuro and neuro-mechanical fingerprints | |||
116 | 9577990 | Control of access to a secondary system | |||
117 | 9577828 | Batch verification method and apparatus thereof | |||
118 | 9577827 | Information processing device, information processing method, and program | |||
119 | 9577826 | Method of generating proven prime numbers suitable for being implemented in a smart card | |||
120 | 9577825 | Quantum key distribution via pulse position modulation | |||
121 | 9577824 | Delivering a content item from a server to a device | |||
122 | 9577823 | Rule-based validity of cryptographic key material | |||
123 | 9577764 | Quantum key distribution terminal and system | |||
124 | 9576156 | Download security system | |||
125 | 9576149 | Methods, systems and computer program product for providing verification code recovery and remote authentication | |||
126 | 9576133 | Detection of data tampering of encrypted data | |||
127 | 9575727 | Methods for generating random data using phase change materials and related devices and systems | |||
128 | 9572033 | Systems and methods for encrypted mobile voice communications | |||
129 | 9571527 | System and method for interactive session provision | |||
130 | 9571494 | Authorization server and client apparatus, server cooperative system, and token management method | |||
131 | 9571485 | Spatial and temporal verification of users and/or user devices | |||
132 | 9571475 | Call encryption systems and methods | |||
133 | 9571469 | Computer implemented system and method for ahead-of-time delivery of electronic content | |||
134 | 9571467 | Information management system, information processing device, and non-transitory computer readable medium | |||
135 | 9571464 | Network-enabled device provisioning | |||
136 | 9571463 | Policy-based access control in content networks | |||
137 | 9571462 | Extensible personality-based messaging system in a distributed computerized infrastructure for establishing a social network | |||
138 | 9571459 | Synchronizing a routing-plane and crypto-plane for routers in virtual private networks | |||
139 | 9571284 | Controlling access to personal information stored in a vehicle using a cryptographic key | |||
140 | 9571279 | Systems and methods for secured backup of hardware security modules for cloud-based web services | |||
141 | 9571278 | Encryption key recovery in the event of storage management failure | |||
142 | 9571277 | Method for generating a key in a network and user on a network and network | |||
143 | 9571276 | Derivation of a device-specific value | |||
144 | 9571275 | Single use identifier values for network accessible devices | |||
145 | 9571274 | Key agreement protocol | |||
146 | 9571273 | Method and system for the accelerated decryption of cryptographically protected user data units | |||
147 | 9571272 | Image forming apparatus, information processing method, and control method | |||
148 | 9571271 | Sending messages by oblivious transfer | |||
149 | 9571268 | Method and system for homomorphicly randomizing an input | |||
150 | 9571267 | Data processor and decryption method | |||
151 | 9569774 | System and method for processing feedback entries received from software | |||
152 | 9569731 | Quantum communication device, quantum communication method, and computer program product | |||
153 | 9569630 | Method and system for providing an encryption proxy | |||
154 | 9569629 | Communication between key manager and storage subsystem kernel via management console | |||
155 | 9569628 | Specialized circuitry for cryptographic authentication and other purposes | |||
156 | 9569627 | Systems and methods for governing content rendering, protection, and management applications | |||
157 | 9569623 | Secure boot with resistance to differential power analysis and other external monitoring attacks | |||
158 | 9565559 | Method and system for preserving privacy during data aggregation in a wireless sensor network | |||
159 | 9565558 | Securing communications of a wireless access point and a mobile device | |||
160 | 9565296 | Call event tagging and call recording stitching for contact center call recordings | |||
161 | 9565172 | Method for enabling a secure provisioning of a credential, and related wireless devices and servers | |||
162 | 9565171 | Efficient key hierarchy for delivery of multimedia content | |||
163 | 9565020 | System and method for generating a server-assisted strong password from a weak secret | |||
164 | 9565019 | Secure and anonymous distributed authentication | |||
165 | 9563853 | Efficient information reconciliation method using turbo codes over the quantum channel | |||
166 | 9563773 | Systems and methods for securing BIOS variables | |||
167 | 9563762 | Method for generating an identifier | |||
168 | 9563507 | Rebuilding a data revision in a dispersed storage network | |||
169 | 9560059 | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection | |||
170 | 9560024 | Pairwise temporal key creation for secure networks | |||
171 | 9559852 | Cryptographic security functions based on anticipated changes in dynamic minutiae | |||
172 | 9559851 | Secure pairing for secure communication across devices | |||
173 | 9559848 | Method, apparatus, and instructions for safely storing secrets in system memory | |||
174 | 9559847 | Content access for duration of calendar events | |||
175 | 9559845 | Systems, methods and apparatuses for the secure transmission of media content | |||
176 | 9559844 | Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program | |||
177 | 9559842 | Trusted key management for virtualized platforms | |||
178 | 9559840 | Low-bandwidth time-embargoed content disclosure | |||
179 | 9559839 | Message key generation | |||
180 | 9559837 | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |||
181 | 9559748 | Methods and apparatuses using filter banks for multi-carrier spread spectrum signals | |||
182 | 9558680 | Payload in picture encoding | |||
183 | 9558511 | Method and system for providing electronic content to a user | |||
184 | 9558374 | Methods and systems for securing stored information | |||
185 | 9558370 | Cloud key directory for federating data exchanges | |||
186 | 9558362 | Data encryption using an external arguments encryption algorithm | |||
187 | 9558358 | Random number generator in a virtualized environment | |||
188 | 9558354 | Method for generating and executing encrypted BIOS firmware and system therefor | |||
189 | 9554419 | Pairing method and apparatus for ad-hoc connection in wireless communication terminal | |||
190 | 9554270 | Enhanced security for direct link communications | |||
191 | 9553857 | Communication system, communication apparatus, communication method, and computer program | |||
192 | 9553856 | Secure session capability using public-key cryptography without access to the private key | |||
193 | 9553731 | Transmission method and system for terminal unique information | |||
194 | 9553726 | Method for distributed identification of a station in a network | |||
195 | 9553725 | System and method for authenticating data | |||
196 | 9553723 | Multi-dimensional encryption | |||
197 | 9553722 | Generating a key based on a combination of keys | |||
198 | 9553721 | Secure execution environment communication | |||
199 | 9553720 | Using key material protocol services transparently | |||
200 | 9553719 | Transmitting terminal, receiving terminal, ID numbering device, and key transmission method | |||
201 | 9552498 | On-chip storage, creation, and manipulation of an encryption key | |||
202 | 9548972 | Multi-drive cooperation to generate an encryption key | |||
203 | 9548862 | Managing entropy in computing devices for cryptographic key generation | |||
204 | 9548861 | Encrypted statistical processing system, device, method, and program | |||
205 | 9548860 | Asymmetric-computing type shared key establishing method suitable for cloud computing and IoT | |||
206 | 9548859 | Ticket-based implementation of content leasing | |||
207 | 9548814 | System and method for communication over color encoded light patterns | |||
208 | 9547860 | System for processing feedback entries received from software | |||
209 | 9547774 | System and method for distributed deduplication of encrypted chunks | |||
210 | 9547771 | Policy enforcement with associated data | |||
211 | 9544929 | Communication apparatus and communication parameter configuration method thereof | |||
212 | 9544769 | Method for providing application service | |||
213 | 9544282 | Changing group member reachability information | |||
214 | 9544280 | Utilization of a protected module to prevent offline dictionary attacks | |||
215 | 9544277 | KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages | |||
216 | 9544276 | Method for transmitting and receiving a multimedia content | |||
217 | 9544145 | Device, method, and medium for facility management verification | |||
218 | 9544144 | Data encryption | |||
219 | 9544142 | Data authentication using plural electronic keys | |||
220 | 9544141 | Secure key storage using physically unclonable functions | |||
221 | 9544140 | Multi-level key hierarchy for securing cloud-based data sets | |||
222 | 9544139 | Method and apparatus for a non-deterministic random bit generator (NRBG) | |||
223 | 9544138 | Authenticator, authenticatee and authentication method | |||
224 | 9544137 | Encrypted boot volume access in resource-on-demand environments | |||
225 | 9544136 | Key agreement in wireless networks with active adversaries | |||
226 | 9544135 | Methods of and systems for facilitating decryption of encrypted electronic information | |||
227 | 9544134 | Searchable encrypted data | |||
228 | 9544130 | Protection of a calculation against side-channel attacks | |||
229 | 9542157 | Random number generator and method for generating random numbers | |||
230 | 9538373 | Method and device for negotiating security capability when terminal moves | |||
231 | 9537918 | File sharing with client side encryption | |||
232 | 9537864 | Encryption system using web browsers and untrusted web servers | |||
233 | 9537847 | Image based key derivation function | |||
234 | 9537841 | Key management for compromised enterprise endpoints | |||
235 | 9537837 | Method for ensuring media stream security in IP multimedia sub-system | |||
236 | 9537835 | Secure mobile app connection bus | |||
237 | 9537832 | Method, system and device for establishing link | |||
238 | 9537716 | Establishing a direct connection between remote devices | |||
239 | 9537660 | Method of establishing public key cryptographic protocols against quantum computational attack | |||
240 | 9537658 | Password-based authentication | |||
241 | 9537656 | Systems and methods for managing cryptographic keys in a secure microcontroller | |||
242 | 9537655 | Random number generating device, cipher processing device, storage device, and information processing system | |||
243 | 9537654 | Biometric validation method and biometric terminal | |||
244 | 9537653 | Encryption key generating apparatus and computer program product | |||
245 | 9537652 | Polymorphic encryption key allocation scheme | |||
246 | 9536581 | Tamper-resistant non-volatile memory device | |||
247 | 9536113 | Information processing apparatus, information processing system, and computer program product | |||
248 | 9536102 | Privacy-protective data transfer | |||
249 | 9536098 | Methods and systems for concealing information | |||
250 | 9536047 | Privacy-enhancing technologies for medical tests using genomic data | |||
251 | 9535852 | System and method for secured host-slave communication | |||
252 | 9535702 | Asset management device and method in a hardware platform | |||
253 | 9535658 | Secure private database querying system with content hiding bloom filters | |||
2016 | |||||
254 | 9532223 | Method for downloading a subscription from an operator to a UICC embedded in a terminal | |||
255 | 9531775 | Mobile application migration to cloud computing platform | |||
256 | 9531772 | Dynamic profile sharing using expiring tokens | |||
257 | 9531691 | Providing forward secrecy in a terminating TLS connection proxy | |||
258 | 9531688 | Approach for message level encryption for service APIs | |||
259 | 9531685 | Providing forward secrecy in a terminating SSL/TLS connection proxy using Ephemeral Diffie-Hellman key exchange | |||
260 | 9531682 | Splicing into an active TLS session without a certificate or private key | |||
261 | 9531679 | Content-based transport security for distributed producers | |||
262 | 9531537 | System and method for performing secure communications | |||
263 | 9531536 | Shared keys in a computerized system | |||
264 | 9531535 | Secure memories using unique identification elements | |||
265 | 9531534 | Generating device, re-encrypting device, method, and computer program product | |||
266 | 9531533 | Rule-based validity of cryptographic key material | |||
267 | 9531532 | Method for establishing a secure communication channel | |||
268 | 9530137 | Method and apparatus for secure access payment and identification | |||
269 | 9530013 | Supporting the use of a secret key | |||
270 | 9530011 | Method and system for provision of cryptographic services | |||
271 | 9530009 | Secure execution and update of application module code | |||
272 | 9530005 | Techniques for secure data management in a distributed environment | |||
273 | 9529735 | Secure data encryption in shared storage using namespaces | |||
274 | 9529734 | Smart storage device | |||
275 | 9529733 | Systems and methods for securely accessing encrypted data stores | |||
276 | 9529732 | Key rotation for a memory controller | |||
277 | 9526009 | Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card | |||
278 | 9526007 | Location brokering for providing security, privacy and services | |||
279 | 9525999 | Method of securely transferring services between mobile devices | |||
280 | 9525676 | Message content adjudication based on security token | |||
281 | 9525674 | Method for the encryption of data | |||
282 | 9525670 | Computer product, recording medium, communications apparatus, and communications method | |||
283 | 9525557 | Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method | |||
284 | 9525548 | Provisioning techniques | |||
285 | 9525547 | Transmission of media keys | |||
286 | 9525546 | Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic | |||
287 | 9524746 | Server device, playback device and content distribution system | |||
288 | 9524400 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
289 | 9524370 | Method for privacy-preserving medical risk test | |||
290 | 9521546 | Secure RF communication method, terminal and system | |||
291 | 9521370 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | |||
292 | 9521132 | Secure data storage | |||
293 | 9521124 | Secure computation using a server module | |||
294 | 9521123 | Method for file encryption | |||
295 | 9521090 | Authorizing stations into a centrally managed network | |||
296 | 9521001 | Privacy preserving electronic document signature service | |||
297 | 9520996 | Ciphering data for transmission in a network | |||
298 | 9520995 | Efficient prime-number check | |||
299 | 9520994 | System and method for deriving secrets from a master key bound to an application on a device | |||
300 | 9520993 | Renewable traitor tracing | |||
301 | 9520992 | Logical-to-physical address translation for a removable data storage device | |||
302 | 9520991 | Apparatus for handling bills and/or coins, and method for initializing and operating such an apparatus | |||
303 | 9520990 | System and method for software protection and secure software distribution | |||
304 | 9519808 | Method and apparatus for protecting data in a portable electronic device | |||
305 | 9519757 | AES-GCM based enhanced security setup for media encryption | |||
306 | 9516500 | ID-based control unit-key fob pairing | |||
307 | 9516364 | Secure transcoding of content | |||
308 | 9516002 | Systems and methods for securing data in motion | |||
309 | 9515999 | Automated access, key, certificate, and credential management | |||
310 | 9515994 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | |||
311 | 9515832 | Process authentication and resource permissions | |||
312 | 9515830 | Universal hash function computing device, method and program | |||
313 | 9515829 | Information distribution method, information distribution system and in-vehicle terminal | |||
314 | 9515828 | Sharing a secret via linear interpolation | |||
315 | 9515827 | Key management device, communication device, communication system, and computer program product | |||
316 | 9515826 | Network topology aided by smart agent download | |||
317 | 9515825 | Method for password based authentication and apparatus executing the method | |||
318 | 9515824 | Provisioning devices for secure wireless local area networks | |||
319 | 9515823 | Cryptographic device with detachable data planes | |||
320 | 9515822 | System and method of secure encryption for electronic data transfer | |||
321 | 9515821 | Apparatus and method for data encryption | |||
322 | 9515818 | Multi-block cryptographic operation | |||
323 | 9514329 | Computer-implemented system and method for individual message encryption using a unique key | |||
324 | 9514321 | Electro device for protecting user's privacy and method for controlling thereof | |||
325 | 9510385 | Methods and apparatus to connect wireless-enabled devices | |||
326 | 9510375 | Method and apparatus for accelerated link setup | |||
327 | 9510194 | Open and encrypted wireless network access | |||
328 | 9509737 | Client side encryption with recovery method | |||
329 | 9509720 | Techniques for improved run time trustworthiness | |||
330 | 9509690 | Methods and systems for managing network activity using biometrics | |||
331 | 9509686 | Secure element authentication | |||
332 | 9509679 | System and method for non-replayable communication sessions | |||
333 | 9509669 | Efficient routing of streams encrypted using point-to-point authentication protocol | |||
334 | 9509668 | Content distribution method, content distribution system, source device, and sink device | |||
335 | 9509667 | Method and system for digital rights management of documents | |||
336 | 9509516 | Apparatus and method for providing digital signature | |||
337 | 9509514 | Deleting encoded data slices in a dispersed storage network | |||
338 | 9509510 | Communication device, communication method, and computer program product | |||
339 | 9509509 | Random identifier generation for offline database | |||
340 | 9509508 | Generating a session key for authentication and secure data transfer | |||
341 | 9509507 | Information distribution system using quantum entanglement in a timed network delivery system | |||
342 | 9509506 | Quantum key management | |||
343 | 9509505 | Group management of authenticated entities | |||
344 | 9509504 | Cryptographic key manager for application servers | |||
345 | 9509503 | Encrypted boot volume access in resource-on-demand environments | |||
346 | 9509502 | Symmetric keying and chain of trust | |||
347 | 9509501 | Storage encryption | |||
348 | 9509500 | Method and apparatus for migrating encrypted data | |||
349 | 9509499 | Electronic key registration method and electronic key registration system | |||
350 | 9509498 | System and method for transmitting data | |||
351 | 9509497 | Method for generating a random output bit sequence | |||
352 | 9509496 | Electronic key registration system | |||
353 | 9509494 | Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption | |||
354 | 9509414 | Encryption and decryption method and device | |||
355 | 9507964 | Regulating access using information regarding a host machine of a portable storage drive | |||
356 | 9507751 | Managing seed data | |||
357 | 9507735 | Digital content retrieval utilizing dispersed storage | |||
358 | 9503939 | Neighbor list broadcasting techniques | |||
359 | 9503898 | Hybrid mobile device and radio system | |||
360 | 9503764 | Processing and/or distributing media content associated with at least one parameter related to a memory operation | |||
361 | 9503453 | OTP-based authentication system and method | |||
362 | 9503435 | Load balancing hash computation for network switches | |||
363 | 9503433 | Method and apparatus for cloud-assisted cryptography | |||
364 | 9503431 | Simple protocol for tangible security | |||
365 | 9503264 | Attribute based encryption using lattices | |||
366 | 9503263 | Method and apparatus for storing encrypted data files across distributed storage media | |||
367 | 9503260 | Security token and service access system | |||
368 | 9503259 | System and method for generating and protecting cryptographic keys | |||
369 | 9503258 | System and method for communication using orbital angular momentum with multiple layer overlay modulation | |||
370 | 9503257 | Quantum key distribution device, quantum key distribution system, and quantum key distribution method | |||
371 | 9503256 | SMS4 acceleration hardware | |||
372 | 9501675 | RFID tag and reader authentication by trusted authority | |||
373 | 9501665 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
374 | 9501429 | Dynamic key and rule storage protection | |||
375 | 9497625 | Method for negotiating security capability when terminal moves | |||
376 | 9497514 | DTCP converter for HLS | |||
377 | 9497185 | Systems, methods, and computer program products for providing application validation | |||
378 | 9497175 | Iterative data secret-sharing transformation | |||
379 | 9497174 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
380 | 9497172 | Method of encrypting and transferring data between a sender and a receiver using a network | |||
381 | 9497171 | Method, device, and system for securely sharing media content from a source device | |||
382 | 9497029 | Hardening of direct anonymous attestation from side-channel attack | |||
383 | 9497026 | Authorizing removable medium access | |||
384 | 9497024 | Electronic file sending method | |||
385 | 9497023 | Multiply-encrypted message for filtering | |||
386 | 9495588 | Biometric template security and key generation | |||
387 | 9495544 | Secure data transmission and verification with untrusted computing devices | |||
388 | 9491618 | Serving network authentication | |||
389 | 9491521 | Trick play seek operation for HLS converted from DTCP | |||
390 | 9491146 | Computational systems and methods for encrypting data for anonymous storage | |||
391 | 9491040 | Determination and display of LUN encryption paths | |||
392 | 9490982 | Method and storage device for protecting content | |||
393 | 9490980 | Authentication and secured information exchange system, and method therefor | |||
394 | 9490977 | Method and apparatus for enabling physical layer secret key generation | |||
395 | 9490976 | Systems and methods for providing recommendations to obfuscate an entity context | |||
396 | 9490975 | Information assurance for networked systems | |||
397 | 9490974 | Identity-based decryption | |||
398 | 9490973 | System and method for managing cryptographic keys | |||
399 | 9490972 | Method and apparatus for providing conditional access based on channel characteristics | |||
400 | 9490970 | Methods and system for secure communication between an RFID tag and a reader | |||
401 | 9490909 | Method and system for estimating the noise of a two-photon entangled state | |||
402 | 9489999 | Magnetic tunnel junction resistance comparison based physical unclonable function | |||
403 | 9489542 | Split-key arrangement in a multi-device storage enclosure | |||
404 | 9489540 | Memory controller with encryption and decryption engine | |||
405 | 9489528 | Single use recovery key | |||
406 | 9489525 | Secure storage system | |||
407 | 9489510 | Detecting generation of virtual machine authentication | |||
408 | 9489506 | Linking ad hoc networks | |||
409 | 9485254 | Method and system for authenticating a security device | |||
410 | 9485232 | User equipment credential system | |||
411 | 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
412 | 9485098 | System and method of user authentication using digital signatures | |||
413 | 9485096 | Encryption / decryption of data with non-persistent, non-shared passkey | |||
414 | 9485095 | Client control through content key format | |||
415 | 9485094 | Systems and methods for stable physically unclonable functions | |||
416 | 9485093 | Push button configuration pairing | |||
417 | 9485092 | Electronic authentication systems | |||
418 | 9485091 | Dual-party session key derivation | |||
419 | 9485090 | Managed authentication on a distributed network | |||
420 | 9485089 | Stego key management | |||
421 | 9483664 | Address dependent data encryption | |||
422 | 9483663 | Countermeasure method for protecting stored data | |||
423 | 9483662 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
424 | 9483656 | Efficient and secure data storage utilizing a dispersed data storage system | |||
425 | 9483655 | File backup with selective encryption | |||
426 | 9483422 | Access to memory region including confidential information | |||
427 | 9479932 | ID-based control unit-key fob pairing | |||
428 | 9479533 | Time based authentication codes | |||
429 | 9479514 | Method and system for controlling access to wireless apparatuses | |||
430 | 9479333 | Method of managing sensitive data in mobile terminal and escrow server for performing same | |||
431 | 9479332 | Key revocation in system on chip devices | |||
432 | 9479331 | Managing security in a system on a chip (SOC) that powers down a secure processor | |||
433 | 9479330 | Method, information service system and program for information encryption/decryption | |||
434 | 9479329 | Motor vehicle control unit having a cryptographic device | |||
435 | 9479328 | Secure key provisioning | |||
436 | 9479327 | Apparatus and method for generating key | |||
437 | 9477825 | System for transparent authentication across installed applications | |||
438 | 9477824 | Cloud control system and method for LAN-based controlled apparatus | |||
439 | 9473494 | Access credentials using biometrically generated public/private key pairs | |||
440 | 9473485 | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |||
441 | 9473474 | Communicating an identity of a group shared secret to a server | |||
442 | 9473311 | Method and device for managing certificates | |||
443 | 9473301 | Systems and methods for telecommunication using high-dimensional temporal quantum key distribution | |||
444 | 9473300 | Authenticated sensor interface device | |||
445 | 9473299 | Dual-party session key derivation | |||
446 | 9473298 | Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration | |||
447 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
448 | 9473295 | Virtual transportation point of sale | |||
449 | 9471796 | Intelligent key selection and generation | |||
450 | 9471786 | Method for booting and dumping a confidential image on a trusted computer system | |||
451 | 9471279 | Random number generation using untrusted quantum devices | |||
452 | 9467850 | Handheld device association via shared vibration | |||
453 | 9467432 | Method and device for generating local interface key | |||
454 | 9467430 | Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware | |||
455 | 9467296 | Virally distributable trusted messaging | |||
456 | 9467290 | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |||
457 | 9467288 | Encryption key destruction for secure data erasure | |||
458 | 9467287 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
459 | 9467286 | Encryption device, decryption device, encryption method, decryption method, and program | |||
460 | 9467285 | Security of a multimedia stream | |||
461 | 9467284 | Transmitter, receiver, quantum key distribution (QKD) system and quantum key distribution method | |||
462 | 9467283 | Securing method for lawful interception | |||
463 | 9467282 | Encryption scheme in a shared data store | |||
464 | 9467281 | Information processing apparatus and program product | |||
465 | 9467280 | Methods and systems for personal authentication | |||
466 | 9467279 | Instructions and logic to provide SIMD SM4 cryptographic block cipher functionality | |||
467 | 9466054 | Interoperable systems and methods for peer-to-peer service orchestration | |||
468 | 9465953 | Secure virtual file management system | |||
469 | 9465952 | Systems and methods for secure multi-tenant data storage | |||
470 | 9465950 | Methods, apparatuses, and computer-readable storage media for securely accessing social networking data | |||
471 | 9465947 | System and method for encryption and key management in cloud storage | |||
472 | 9465824 | Rebuilding an encoded data slice within a dispersed storage network | |||
473 | 9465755 | Security parameter zeroization | |||
474 | 9465652 | Hardware-based mechanisms for updating computer systems | |||
475 | 9464937 | Method and device for differential optical phase modulation in quantum key distribution system | |||
476 | 9464905 | Over-the-air vehicle systems updating and associate security protocols | |||
477 | 9462624 | Authenticated session establishment | |||
478 | 9462475 | UICCs embedded in terminals or removable therefrom | |||
479 | 9462022 | Mobile application migration to cloud computing platform | |||
480 | 9461993 | System and methods for UICC-based secure communication | |||
481 | 9461975 | Method and system for traffic engineering in secured networks | |||
482 | 9461826 | Tamper-protected hardware and method for using same | |||
483 | 9461825 | Method and system for preventing revocation denial of service attacks | |||
484 | 9461824 | Transmitting a document | |||
485 | 9461822 | Image forming apparatus, control method, and storage medium | |||
486 | 9461821 | System and method for key material protection on devices using a secret sharing scheme | |||
487 | 9461820 | Method and apparatus for providing a conditional single sign on | |||
488 | 9461819 | Information sharing system, computer, project managing server, and information sharing method used in them | |||
489 | 9461818 | Method for encrypting a program for subsequent execution by a microprocessor configured to decrypt and execute the encrypted program | |||
490 | 9461817 | Method and system for encrypting JavaScript object notation (JSON) messages | |||
491 | 9460313 | Secure escrow service | |||
492 | 9460302 | Method and system for shielding data in transit and data in memory | |||
493 | 9459833 | System and method with specific ordered execution over physical elements | |||
494 | 9456342 | Security for network load broadcasts over cellular networks | |||
495 | 9455978 | System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added | |||
496 | 9455967 | Load balancing hash computation for network switches | |||
497 | 9455966 | Load balancing hash computation for network switches | |||
498 | 9455834 | Securely providing secret data from a sender to a receiver | |||
499 | 9455830 | Method for securing credentials in a remote repository | |||
500 | 9455829 | Method and system for decrypting a transport stream | |||
501 | 9455828 | Re-encryption system, re-encryption method and re-encryption program | |||
502 | 9455827 | Communication apparatus, computer program product, and communication system | |||
503 | 9454666 | Method for protecting data | |||
504 | 9454661 | Key versioning including hash stick technology | |||
505 | 9454648 | Distributing token records in a market environment | |||
506 | 9454346 | Extracting entropy from the vibration of multiple machines | |||
507 | 9454343 | Creating spectral wells for inserting watermarks in audio signals | |||
508 | 9451453 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
509 | 9451452 | Method of triggering a key delivery from a mesh key distributor | |||
510 | 9450966 | Method and apparatus for lifecycle integrity verification of virtual machines | |||
511 | 9450950 | Secure session capability using public-key cryptography without access to the private key | |||
512 | 9450929 | Communication device, communication system, and computer program product | |||
513 | 9450928 | Secure registration of group of clients using single registration procedure | |||
514 | 9450927 | Enabling users to select between secure service providers using a key escrow service | |||
515 | 9450926 | Upload and download streaming encryption to/from a cloud-based platform | |||
516 | 9450763 | Server-side key generation | |||
517 | 9450752 | Method and apparatus for providing service provider-controlled communication security | |||
518 | 9450751 | Smart card, electronic device, and portable electronic device | |||
519 | 9450750 | Communication apparatus and secret information sharing method | |||
520 | 9450749 | One-time-pad encryption with central key service | |||
521 | 9449191 | Device, system and method for securing and comparing genomic data | |||
522 | 9449183 | Secure file drawer and safe | |||
523 | 9449180 | Secure data parser method and system | |||
524 | 9449177 | General protocol for proactively secure computation | |||
525 | 9448949 | Mobile data vault | |||
526 | 9445265 | Method and device for processing SRVCC switching, and terminal | |||
527 | 9445263 | Method for ensuring security and privacy in a wireless cognitive network | |||
528 | 9444789 | System and method for secure cloud service delivery with prioritized services in a network environment | |||
529 | 9444632 | Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF) | |||
530 | 9444622 | Computing platform with system key | |||
531 | 9444621 | Electronic key system | |||
532 | 9444620 | Methods for binding a session identifier to machine-specific identifiers and systems thereof | |||
533 | 9444619 | Generation of randomized messages for cryptographic hash functions | |||
534 | 9443240 | Transaction verification on RFID enabled payment and transaction instruments | |||
535 | 9443107 | Method for protecting the integrity of a group of memory elements using an aggregate authentication code | |||
536 | 9443097 | Systems and methods for securing data in motion | |||
537 | 9443092 | System and method for matching data sets while maintaining privacy of each data set | |||
538 | 9443068 | System and method for preventing unauthorized access to information | |||
539 | 9443066 | Decrypting content samples including distinct encryption chains | |||
540 | 9442890 | Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system | |||
541 | 9439067 | Systems and methods of performing link setup and authentication | |||
542 | 9438571 | Securely connecting control device to target device | |||
543 | 9438569 | Secured embedded data encryption systems | |||
544 | 9438568 | System and method for email and file decryption without direct access to required decryption key | |||
545 | 9438550 | Mobile device power management in data synchronization over a mobile network with or without a trigger notification | |||
546 | 9438429 | Method for authentication and electronic device for performing the authentication | |||
547 | 9438423 | Encryption device, encryption method, and information processing device | |||
548 | 9438421 | Supporting a fixed transaction rate with a variably-backed logical cryptographic key | |||
549 | 9438420 | Unpredictable number generation | |||
550 | 9438419 | Probabilistic password cracking system | |||
551 | 9438418 | Systems and methods for generating a key difficult to clone | |||
552 | 9438417 | System and method for shared key agreement over untrusted communication channels | |||
553 | 9438416 | Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation | |||
554 | 9438415 | Method and system for securing communication on a home gateway in an IP content streaming system | |||
555 | 9438413 | Generating and merging keys for grouping and differentiating volumes of files | |||
556 | 9436846 | Semiconductor device and a method of manufacturing a semiconductor device | |||
557 | 9436845 | Physically unclonable fuse using a NOR type memory array | |||
558 | 9436841 | Enhanced system security | |||
559 | 9436819 | Securely pairing computing devices | |||
560 | 9436815 | Block management unification system and method | |||
561 | 9436812 | Platform-hardened digital rights management key provisioning | |||
562 | 9436804 | Establishing a unique session key using a hardware functionality scan | |||
563 | 9432346 | Protocol for controlling access to encryption keys | |||
564 | 9432340 | System and method for secure end-to-end chat system | |||
565 | 9432195 | Method of operating data security and electronic device supporting the same | |||
566 | 9432190 | Computational systems and methods for double-encrypting data for subsequent anonymous storage | |||
567 | 9432188 | Secret sharing system, data distribution apparatus, distributed data transform apparatus, secret sharing method and program | |||
568 | 9432187 | Data scrambling initialization | |||
569 | 9432186 | Password-based key derivation without changing key | |||
570 | 9432185 | Key exchange for a network architecture | |||
571 | 9432184 | Provisioning of secure storage for both static and dynamic rules for cryptographic key information | |||
572 | 9432183 | Encrypted data exchange between computer systems | |||
573 | 9432182 | Techniques for sharing data | |||
574 | 9430659 | Locating cryptographic keys stored in a cache | |||
575 | 9430655 | Split tokenization | |||
576 | 9430628 | Access authorization based on synthetic biometric data and non-biometric data | |||
577 | 9430620 | System and method for securing the life-cycle of user domain rights objects | |||
578 | 9430406 | System for generating a cryptographic key from a memory used as a physically unclonable function | |||
579 | 9429602 | Partial information generating device, power usage amount calculation system, and partial information generating method | |||
580 | 9426659 | Service activation using algorithmically defined key | |||
581 | 9426650 | Autonomous-mode content delivery and key management | |||
582 | 9426648 | Systems and methods of performing link setup and authentication | |||
583 | 9426148 | Increased communication security | |||
584 | 9426147 | Protected device management | |||
585 | 9426134 | Method and systems for the authentication of a user | |||
586 | 9426131 | Server apparatus and program to re-encrypt ciphertext data | |||
587 | 9426116 | Multiple-master DNS system | |||
588 | 9425968 | System and method for updating an encryption key across a network | |||
589 | 9425958 | System, method and apparatus for cryptography key management for mobile devices | |||
590 | 9425957 | System and method for remote reset of password and encryption key | |||
591 | 9425956 | Method and system for transferring firmware or software to a plurality of devices | |||
592 | 9425955 | Power line communication (PLC) network nodes using cipher then segment security | |||
593 | 9425954 | Device and method for resonant cryptography | |||
594 | 9424564 | Interoperable systems and methods for peer-to-peer service orchestration | |||
595 | 9424436 | Over network operation restriction enforcement | |||
596 | 9424055 | Multi-function instruction that determines whether functions are installed on a system | |||
597 | 9420458 | Method for the use of a mobile appliance using a motor vehicle | |||
598 | 9420454 | Method for ensuring security and privacy in a wireless cognitive network | |||
599 | 9419994 | Method for identifying potentially malicious network elements within a network using cross-domain collaborative data sharing | |||
600 | 9419983 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
601 | 9419979 | Increased communication security | |||
602 | 9419960 | Secure user authentication in a dynamic network | |||
603 | 9419949 | Increased communication security | |||
604 | 9419798 | Public encryption method based on user ID | |||
605 | 9419797 | System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords | |||
606 | 9419796 | Method for storing and recovering data, utilization of the method in a storage cloud, storage server and computer program product | |||
607 | 9419795 | Digital device and method for performing secure communication using same | |||
608 | 9419794 | Key management using security enclave processor | |||
609 | 9419793 | Method for generating large prime number in embedded system | |||
610 | 9418242 | Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database | |||
611 | 9418238 | Search system, search method of search system, and information processing device | |||
612 | 9418027 | Secure boot information with validation control data specifying a validation technique | |||
613 | 9418026 | Transition between states in a processor | |||
614 | 9413771 | Protecting documents using policies and encryption | |||
615 | 9413769 | Key management system for toll-free data service | |||
616 | 9413759 | Apparatus and method for secure delivery of data from a communication device | |||
617 | 9413730 | Encryption in the cloud using enterprise managed keys | |||
618 | 9413729 | Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium | |||
619 | 9413686 | Establishing a unique end-to-end management key | |||
620 | 9413613 | Mesh network commissioning | |||
621 | 9413606 | Automation of networked devices | |||
622 | 9413533 | System and method for authorizing a new authenticator | |||
623 | 9413532 | Information recording device | |||
624 | 9413531 | Cryptographic system, cryptographic method, cryptographic program, and decryption device | |||
625 | 9413530 | System and method of lawful access to secure communications | |||
626 | 9413529 | Distributed storage network and method for storing and retrieving encryption keys | |||
627 | 9413528 | Method for attribute based broadcast encryption with permanent revocation | |||
628 | 9413527 | Optimizing signature computation and sampling for fast adaptive similarity detection based on algorithm-specific performance | |||
629 | 9413526 | System and method to anonymize data transmitted to a destination computing device | |||
630 | 9413393 | Encoding multi-media content for a centralized digital video storage system | |||
631 | 9411984 | Cryptographic processing apparatus, cryptographic processing system, and cryptographic processing method | |||
632 | 9411975 | Methods and apparatus to securely share data | |||
633 | 9411972 | System and method for creating and protecting secrets for a plurality of groups | |||
634 | 9411949 | Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same | |||
635 | 9408133 | Mesh network commissioning | |||
636 | 9407637 | Method for managing and checking data from different identity domains organized into a structured set | |||
637 | 9407619 | Un-password.TM.: risk aware end-to-end multi-factor authentication via dynamic pairing | |||
638 | 9407612 | Technologies for secure inter-virtual network function communication | |||
639 | 9407610 | Method and system for securing communication | |||
640 | 9407446 | Communication device, communication method, reader/writer, and communication system | |||
641 | 9407440 | Multiple authority data security and access | |||
642 | 9407437 | Secure initialization vector generation | |||
643 | 9407436 | Portable device registration system and portable device registration method | |||
644 | 9407435 | Cryptographic key generation based on multiple biometrics | |||
645 | 9407434 | Secrets renewability | |||
646 | 9407433 | Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management | |||
647 | 9407432 | System and method for efficient and secure distribution of digital content | |||
648 | 9407431 | Systems and methods for distributing and securing data | |||
649 | 9406066 | Multiple DRM management | |||
650 | 9405925 | Content item encryption on mobile devices | |||
651 | 9405924 | Self-keyed protection of anticipatory content | |||
652 | 9405919 | Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers | |||
653 | 9405912 | Hardware rooted attestation | |||
654 | 9405891 | User authentication | |||
655 | 9401919 | Web form protection | |||
656 | 9401907 | Information processing apparatus and method, recording medium and program | |||
657 | 9401902 | Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) | |||
658 | 9401898 | System and method for wireless data protection | |||
659 | 9401895 | Device configuration for secure communication | |||
660 | 9401894 | Proximity signature for secure communication with implantable medical device | |||
661 | 9401888 | Internet protocol mapping resolution in fixed mobile convergence networks | |||
662 | 9401808 | Measuring device, information processor, key management device, and consumption calculating system | |||
663 | 9401807 | Processing non-editable fields in web pages | |||
664 | 9401806 | Data security method used in a wireless communication system | |||
665 | 9401805 | Encrypting device, encrypting method, and recording medium | |||
666 | 9401766 | Quantum communication network | |||
667 | 9400876 | Content data management system and method | |||
668 | 9398455 | System and method for generating an identification based on a public key of an asymmetric key pair | |||
669 | 9398321 | Multimedia network system with content importation, content exportation, and integrated content management | |||
670 | 9398063 | Customizing distribution of an operating system based on detected network carrier by retrieving differences between the distributed operating system and an operating system currently installed on a computing device | |||
671 | 9398024 | System and method for reliably authenticating an appliance | |||
672 | 9398003 | Token device re-synchronization through a network solution | |||
673 | 9397996 | Establishing historical usage-based hardware trust | |||
674 | 9397986 | Authenticating acceptance of a string using an automaton | |||
675 | 9397839 | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI) | |||
676 | 9397836 | Securing devices to process control systems | |||
677 | 9397834 | Scrambling an address and encrypting write data for storing in a storage device | |||
678 | 9397831 | Encrypted communication device and method for performing encrypted communication while reducing traffic in communication system | |||
679 | 9397830 | Method and apparatus for encrypting and decrypting data | |||
680 | 9397829 | Electronic key registration method and electronic key registration system | |||
681 | 9397828 | Embedding keys in hardware | |||
682 | 9397827 | Systems and methods for managing cryptographic keys | |||
683 | 9397826 | Encryption device and method for defending a physical attack | |||
684 | 9397825 | Method and system for reconstruction of a data object from distributed redundant data parts | |||
685 | 9396506 | System providing an improved skimming resistance for an electronic identity document | |||
686 | 9396359 | System and method for encrypted disk drive sanitizing | |||
687 | 9396357 | Physically unclonable function (PUF) with improved error correction | |||
688 | 9396325 | Provisioning an app on a device and implementing a keystore | |||
689 | 9396320 | System and method for non-intrusive, privacy-preserving authentication | |||
690 | 9396310 | Method and apparatus for providing secure image encryption and decryption | |||
691 | 9396136 | Cascaded data encryption dependent on attributes of physical memory | |||
692 | 9395929 | Network storage server with integrated encryption, compression and deduplication capability | |||
693 | 9392450 | Securely joining a secure wireless communications network | |||
694 | 9392448 | Wireless communications system | |||
695 | 9392443 | Shared secret for wireless devices | |||
696 | 9391963 | Differential client-side encryption of information originating from a client | |||
697 | 9391778 | Secure password management systems, methods and apparatuses | |||
698 | 9391774 | Strauss greenmail system and method | |||
699 | 9391772 | Key information generation device and key information generation method | |||
700 | 9391771 | Server-client secret generation with cached data | |||
701 | 9391770 | Method of cryption | |||
702 | 9390295 | Device with capacitive security shield | |||
703 | 9390291 | Secure key derivation and cryptography logic for integrated circuits | |||
704 | 9390290 | Applying group policies | |||
705 | 9390246 | Creating secure original equipment manufacturer (OEM) identification | |||
706 | 9390098 | Fast approximation to optimal compression of digital data | |||
707 | 9386096 | Server and method, non-transitory computer readable storage medium, and mobile client terminal and method | |||
708 | 9385997 | Protection of control words employed by conditional access systems | |||
709 | 9385996 | Method of operating a computing device, computing device and computer program | |||
710 | 9385871 | Method and apparatus for authenticating a non-volatile memory device | |||
711 | 9385869 | Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions | |||
712 | 9385867 | Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program | |||
713 | 9385864 | Secure session capability using public-key cryptography without access to the private key | |||
714 | 9385863 | System and method for authenticating a communication device | |||
715 | 9385862 | Method and apparatus for binding subscriber authentication and device authentication in communication systems | |||
716 | 9384777 | Efficient elimination of access to data on a writable storage media | |||
717 | 9384682 | Electronic circuit, electronic apparatus, and authentication system | |||
718 | 9384368 | Instruction and logic for mid-level caching of random numbers distributed to multiple units | |||
719 | 9384333 | Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content | |||
720 | 9384149 | Block-level data storage security system | |||
721 | 9383969 | Random number generating system based on memory start-up noise | |||
722 | 9380457 | Method and system of secured direct link set-up (DLS) for wireless networks | |||
723 | 9380093 | Mobile device application streaming | |||
724 | 9380043 | System and method for providing a one-time key for identification | |||
725 | 9380038 | Bootstrap authentication framework | |||
726 | 9380037 | Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management | |||
727 | 9380036 | Methods and devices for securing keys for a nonsecured, distributed environment with applications to virtualization and cloud-computing security and management | |||
728 | 9380034 | Systems and methods for data gathering without internet | |||
729 | 9380032 | Encrypting data for storage in a dispersed storage network | |||
730 | 9379892 | Trusted manager bridge | |||
731 | 9379891 | Method and system for ID-based encryption and decryption | |||
732 | 9379890 | System and method for managing cryptographic keys | |||
733 | 9379889 | Simplified management of group secrets by group members | |||
734 | 9379888 | Powerline communication network analyzer | |||
735 | 9379887 | Efficient cryptographic key stream generation using optimized S-box configurations | |||
736 | 9378396 | Storage device and memory controller thereof | |||
737 | 9378388 | Managing keys used for encrypting data | |||
738 | 9378348 | Adding biometric identification to the server security infrastructure for an enterprise service bus system | |||
739 | 9378179 | RDMA-optimized high-performance distributed cache | |||
740 | 9374706 | Wireless sensor network and central node device thereof | |||
741 | 9374444 | Frame structure for medium access in body area networks (BAN) | |||
742 | 9374422 | Secure distributed data storage | |||
743 | 9374407 | Mobile device application streaming | |||
744 | 9374378 | Access method and communication system for accessing a protected communication service | |||
745 | 9374376 | Anti-hacking system for quantum communication | |||
746 | 9374350 | Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method | |||
747 | 9374347 | Method and system for authentication over a public network using multiple out-of-band communications channels to send keys | |||
748 | 9374228 | Verifying a geographic location of a virtual disk image executing at a data center server within a data center | |||
749 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
750 | 9374224 | System and methods for encrypting data | |||
751 | 9374222 | Secure communication of data between devices | |||
752 | 9374220 | System and method for providing compressed encryption and decryption in homomorphic encryption based on integers | |||
753 | 9373004 | Methods and systems for deleting requested information | |||
754 | 9372977 | Screen unlocking method, device and terminal | |||
755 | 9372826 | RDMA-optimized high-performance distributed cache | |||
756 | 9369873 | Network application function authorisation in a generic bootstrapping architecture | |||
757 | 9369866 | Methods and apparatuses using filter banks for multi-carrier spread spectrum signals | |||
758 | 9369442 | System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers | |||
759 | 9369287 | System and method for applying a digital signature and authenticating physical documents | |||
760 | 9369281 | Method and system for secure use of services by untrusted storage providers | |||
761 | 9369280 | Secure processing systems and methods | |||
762 | 9369279 | Handling key rotation problems | |||
763 | 9369278 | Method for maintenance or exchange of encryption function in storage system and storage device | |||
764 | 9369277 | Encryption code generation using spin-torque NANO-oscillators | |||
765 | 9369276 | Digital signature authentication without a certification authority | |||
766 | 9369275 | Key agreement in wireless networks with active adversaries | |||
767 | 9369274 | Cipher text translation | |||
768 | 9369273 | System and method for mixing VoIP streaming data for encrypted processing | |||
769 | 9367702 | Automatic file encryption | |||
770 | 9367699 | Automating the creation and maintenance of policy compliant environments | |||
771 | 9367693 | Bitstream confirmation for configuration of a programmable logic device | |||
772 | 9367676 | System and method for confirming location using supplemental sensor and/or location data | |||
773 | 9367339 | Cryptographically attested resources for hosting virtual machines | |||
774 | 9363733 | Mesh network commissioning | |||
775 | 9363732 | Mesh network commissioning | |||
776 | 9363668 | Sensor network, sensor management server, key updating method and key updating program | |||
777 | 9363578 | Communication system, communication device, communication method, and computer program | |||
778 | 9363248 | Data encryption in a network memory architecture for providing data based on local accessibility | |||
779 | 9363247 | Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption | |||
780 | 9363245 | Secure network access | |||
781 | 9363242 | Trusted communications between untrusting parties | |||
782 | 9363087 | End-to-end security for hardware running verified software | |||
783 | 9363082 | Cryptographic communication system and cryptographic communication method | |||
784 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
785 | 9363079 | Method of generating message authentication code and authentication device and authentication request device using the method | |||
786 | 9363078 | Method and apparatus for hardware-accelerated encryption/decryption | |||
787 | 9363077 | Time-based authentication | |||
788 | 9363076 | Implementing encrypted content in a game | |||
789 | 9363075 | Polymorphic encryption key matrices | |||
790 | 9363034 | Method to encrypt information that is transferred between two communication units | |||
791 | 9361619 | Secure and convenient mobile authentication techniques | |||
792 | 9361483 | Anti-wikileaks USB/CD device | |||
793 | 9361482 | Device specific information generation device and device specific generation method | |||
794 | 9361452 | Mobile credential revocation | |||
795 | 9357269 | Method and system for providing secure handling of information for complete internet anywhere | |||
796 | 9356935 | Selective access to portions of digital content | |||
797 | 9356921 | Different authentication profiles | |||
798 | 9356916 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
799 | 9356783 | Method for ciphering and deciphering, corresponding electronic device and computer program product | |||
800 | 9356782 | Block encryption | |||
801 | 9356781 | Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device | |||
802 | 9356780 | Device, method, and system for encrypted communication by using encryption key | |||
803 | 9356779 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
804 | 9356778 | Secured communication for local area network | |||
805 | 9356777 | Secure communications system for direct transfer between mobile device | |||
806 | 9356776 | Key managing system and method for sensor network security | |||
807 | 9356718 | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor | |||
808 | 9356622 | Apparatus and method for reconstructing a bit sequence with preliminary correction | |||
809 | 9355374 | Systems and methods for creating fingerprints of encryption devices | |||
810 | 9355274 | Method and device for archiving a document | |||
811 | 9355259 | Method and apparatus for accessing sensitive information on-demand | |||
812 | 9355045 | Memory device for converting data received from controller controlling reading and writing of data | |||
813 | 9351232 | Mesh network commissioning | |||
814 | 9351162 | Network supporting two-factor authentication for modules with embedded universal integrated circuit cards | |||
815 | 9351102 | Accessing a vehicle using portable devices | |||
816 | 9350721 | Air interface security method and device | |||
817 | 9350713 | System and method for encrypting traffic on a network | |||
818 | 9350709 | Synchronizing a routing-plane and crypto-plane for routers in virtual private networks | |||
819 | 9350555 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
820 | 9350554 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
821 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
822 | 9350549 | Selective shredding in a deduplication system | |||
823 | 9350545 | Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens | |||
824 | 9350543 | Method and system for homomorphicly randomizing an input | |||
825 | 9350542 | Quantum key distribution device, quantum key distribution system, and quantum key distribution method | |||
826 | 9350541 | Communication apparatus, communication method, communication system, and computer program | |||
827 | 9350540 | System and method of secure encryption for electronic data transfer | |||
828 | 9350539 | Secure distribution of content | |||
829 | 9350538 | Revocation status using other credentials | |||
830 | 9350537 | Enhanced key management for SRNS relocation | |||
831 | 9350536 | Cloud key management system | |||
832 | 9350535 | Secure content distribution system | |||
833 | 9350330 | Physical unclonable function | |||
834 | 9349023 | Database encryption system, method, and program | |||
835 | 9348996 | Method and device for the authentication of at least two agricultural devices coupled via a data bus | |||
836 | 9348995 | Nonvolatile memory device having authentication, and methods of operation and manufacture thereof | |||
837 | 9348835 | Stopping functions for grouping and differentiating files based on content | |||
838 | 9345058 | Efficient communication for devices of a home network | |||
839 | 9344895 | Method and system for securely accessing portable hotspot for intelligent mobile phones | |||
840 | 9344884 | Module for authenticity verification of authentication messages | |||
841 | 9344428 | Method and system for digitally certifying the association between an entity and a place | |||
842 | 9344416 | File vault and cloud based document notary service | |||
843 | 9344411 | Key handling in communication systems | |||
844 | 9344393 | Secure end-to-end transport through intermediary nodes | |||
845 | 9344284 | Method of anonymous entity authentication using group-based anonymous signatures | |||
846 | 9344276 | Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program | |||
847 | 9344275 | System, device, and method of secure entry and handling of passwords | |||
848 | 9343135 | Physically unclonable function based on programming voltage of magnetoresistive random-access memory | |||
849 | 9342706 | Secure desktop applications for an open computing platform | |||
850 | 9342701 | Digital rights management system and methods for provisioning content to an intelligent storage | |||
851 | 9342406 | Dispersed storage re-dispersion method based on a failure | |||
852 | 9338810 | Efficient communication for devices of a home network | |||
853 | 9338166 | System and method for a single request and single response authentication protocol | |||
854 | 9338140 | Secure data parser method and system | |||
855 | 9338136 | Security key generation for simultaneous multiple cell connections for mobile device | |||
856 | 9338005 | System for and method of remote secure backup | |||
857 | 9338004 | Method and system for smart card chip personalization | |||
858 | 9338003 | Secure modules using unique identification elements | |||
859 | 9338002 | Method and apparatus for wireless communication using an acoustic signal | |||
860 | 9338001 | Privacy enhanced spatial analytics | |||
861 | 9338000 | Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm | |||
862 | 9337999 | Application usage continuum across platforms | |||
863 | 9336696 | Enhanced security setup for media decryption | |||
864 | 9336412 | Storage system and method for controlling storage system | |||
865 | 9336404 | Privacy-protective data transfer and storage | |||
866 | 9336363 | Method and system for secure deployment of information technology (IT) solutions in untrusted environments | |||
867 | 9336160 | Low latency block cipher | |||
868 | 9335970 | Method of entropy randomization on a parallel computer | |||
869 | 9335969 | Method of entropy randomization on a parallel computer | |||
870 | 9332428 | Method and device for managing encrypted group rekeying in a radio network link layer encryption system | |||
871 | 9332320 | PC secure video path | |||
872 | 9332012 | Apparatus and methods for storing electronic access clients | |||
873 | 9331997 | Systems and methods for managing disclosure of protectable information | |||
874 | 9331988 | System and method for provisioning secrets to an application (TA) on a device | |||
875 | 9331984 | Secret sharing method and system | |||
876 | 9331852 | System and method for securing data transaction | |||
877 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
878 | 9331850 | System and method for secure communication of components inside self-service automats | |||
879 | 9331849 | Information setting method and wireless communication system | |||
880 | 9330511 | Apparatus and methods for identity verification | |||
881 | 9330270 | Encryption processing device and authentication method | |||
882 | 9330241 | Applying digital rights management to multi-media file playback | |||
883 | 9329836 | Extracting entropy from the vibration of multiple machines | |||
884 | 9326307 | Efficient communication for devices of a home network | |||
885 | 9326146 | Method for downloading a subscription in an UICC embedded in a terminal | |||
886 | 9326142 | Cryptographic key generation | |||
887 | 9326136 | Method and apparatus for managing group key for mobile device | |||
888 | 9325677 | Method of registering devices | |||
889 | 9325673 | Communication system and communication method | |||
890 | 9325508 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
891 | 9325507 | System and method for managing mobile device using device-to-device communication | |||
892 | 9325505 | Apparatus and method for content encryption and decryption based on storage device ID | |||
893 | 9325497 | Power line based theft protection of electronic devices | |||
894 | 9325496 | Encryption key providing method, semiconductor integrated circuit, and encryption key management device | |||
895 | 9325495 | Encrypted server-less communication between devices | |||
896 | 9324123 | Storage of keyID in customer data area | |||
897 | 9323952 | Cryptographic equipment implementing red/black communication modes | |||
898 | 9323950 | Generating signatures using a secure device | |||
899 | 9323945 | Systems, methods, and computer program products for managing secure elements | |||
900 | 9323884 | Computer program, method, and system for locksmithing | |||
901 | 9323696 | Data security system | |||
902 | 9323603 | Storage of sensitive data in a dispersed storage network | |||
903 | 9323560 | Interpreting I/O operation requests from pageable guests without host intervention | |||
904 | 9319946 | System for efficient recovery of Node-B buffered data following MAC layer reset | |||
905 | 9319878 | Streaming alignment of key stream to unaligned data stream | |||
906 | 9319877 | Secret key generation | |||
907 | 9319402 | Digital handshake for authentication of devices | |||
908 | 9319396 | Trust relationships in a computerized system | |||
909 | 9319389 | Data recording device, and method of processing data recording device | |||
910 | 9319387 | Secure spin torque transfer magnetic random access memory (STTMRAM) | |||
911 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
912 | 9319220 | Method and apparatus for secure network enclaves | |||
913 | 9319219 | Method of operating a computing device, computing device and computer program | |||
914 | 9319070 | Method and device for decoding polar codes | |||
915 | 9317843 | Interoperable systems and methods for peer-to-peer service orchestration | |||
916 | 9317708 | Hardware trust anchors in SP-enabled processors | |||
917 | 9317705 | Secure data parser method and system | |||
918 | 9317526 | Data protection compliant version control | |||
919 | 9317449 | Secure key access with one-time programmable memory and applications thereof | |||
920 | 9317316 | Host virtual machine assisting booting of a fully-encrypted user virtual machine on a cloud environment | |||
921 | 9313530 | Technique for securely communicating programming content | |||
922 | 9313458 | Downloadable security and protection methods and apparatus | |||
923 | 9313184 | Communication apparatus, communication system, and computer program product | |||
924 | 9313178 | Method and system for secure over-the-top live video delivery | |||
925 | 9313032 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
926 | 9313026 | Key negotiation method and apparatus according to SM2 key exchange protocol | |||
927 | 9313025 | Generating and processing an authentication certificate | |||
928 | 9313024 | Keyed communication token | |||
929 | 9312923 | Personal point of sale | |||
930 | 9311956 | Information processing device, information processing method, and program | |||
931 | 9311507 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
932 | 9311500 | Data security using request-supplied keys | |||
933 | 9311487 | Tampering monitoring system, management device, protection control module, and detection module | |||
934 | 9311465 | Secure information storage and retrieval apparatus and method | |||
935 | 9311186 | Dispersed storage network slice name verification | |||
936 | 9307411 | Partially virtualizing PCR banks in mobile TPM | |||
937 | 9307091 | Method and apparatus for the secure storage of audio signals | |||
938 | 9306919 | Information processing apparatus, information processing system, information processing method, and non-transitory computer readable storage medium | |||
939 | 9306918 | System and method for secure transmission of media content | |||
940 | 9306748 | Authentication method and apparatus in a communication system | |||
941 | 9306745 | Secure key management | |||
942 | 9306744 | Video cryptography system and method | |||
943 | 9306743 | One-way key fob and vehicle pairing verification, retention, and revocation | |||
944 | 9306742 | Communicating a secret | |||
945 | 9306741 | Updating keys for use in authentication | |||
946 | 9306740 | Systems, methods, and apparatus for a quantum key distribution telescope | |||
947 | 9306739 | Quantum key distribution protocol process | |||
948 | 9306738 | Managed secure computations on encrypted data | |||
949 | 9306737 | Systems and methods for secure handling of data | |||
950 | 9306736 | Power-line communications with communication channel to and/or from endpoint circuits with authentication methodology | |||
951 | 9306735 | Electronic key registration system | |||
952 | 9306734 | Communication device, key generating device, and computer readable medium | |||
953 | 9305597 | Accessing stored multi-media content based on a subscription priority level | |||
954 | 9305298 | System and method for location-based authentication | |||
955 | 9305177 | Source identification for unauthorized copies of content | |||
956 | 9305173 | Portable authorization device for authorizing use of protected information and associated method | |||
957 | 9305172 | Multi-ring encryption approach to securing a payload using hardware modules | |||
958 | 9305156 | Integrity protected smart card transaction | |||
959 | 9305144 | Digital receipt for use with an interoperable keychest | |||
960 | 9304941 | Self-encrypting flash drive | |||
961 | 9301328 | Communication apparatus and communication parameter configuration method thereof | |||
962 | 9301145 | UICCs embedded in terminals or removable therefrom | |||
963 | 9301138 | Wireless communication apparatus, recording medium, and method | |||
964 | 9301133 | Audio summing systems and methods in radio communication systems | |||
965 | 9300639 | Device coordination | |||
966 | 9300638 | Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor | |||
967 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
968 | 9300468 | Secure node admission in a communication network | |||
969 | 9300467 | Real-time communication security for automation networks | |||
970 | 9300466 | Transmitting device, receiving device, transmitting method, receiving method, and program | |||
971 | 9300465 | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient | |||
972 | 9300464 | Probabilistic key rotation | |||
973 | 9298948 | Method and apparatus for remotely provisioning software-based security coprocessors | |||
974 | 9298946 | Physically unclonable function based on breakdown voltage of metal-insulator-metal device | |||
975 | 9298939 | Privacy-protective data transfer | |||
976 | 9298937 | Secure data parser method and system | |||
977 | 9298929 | Systems and methods for governing content rendering, protection, and management applications | |||
978 | 9298722 | Optimal sequential (de)compression of digital data | |||
979 | 9294915 | Localized network authentication and security using tamper-resistant keys | |||
980 | 9294615 | System and method for handling call recording failures for a contact center | |||
981 | 9294478 | Hardware-based device authentication | |||
982 | 9294468 | Application-level certificates for identity and authorization | |||
983 | 9294448 | Cryptographic security functions based on anticipated changes in dynamic minutiae | |||
984 | 9294447 | Access control | |||
985 | 9294445 | Secure data parser method and system | |||
986 | 9294444 | Systems and methods for cryptographically splitting and storing data | |||
987 | 9294433 | Multiple-master DNS system | |||
988 | 9294429 | Method and system for providing service for searching friends | |||
989 | 9294285 | Information recording device | |||
990 | 9294280 | Location verification in quantum communications | |||
991 | 9294276 | Countering server-based attacks on encrypted content | |||
992 | 9294275 | Method and apparatus for updating a group key in a wireless communication system | |||
993 | 9294274 | Technologies for synchronizing and restoring reference templates | |||
994 | 9294273 | Method and system for conditional access to a digital content, associated terminal and subscriber device | |||
995 | 9294272 | System and method for quantum key distribution | |||
996 | 9294271 | Quantum-key-distribution receiving device and method for using single-photon detector | |||
997 | 9294270 | Detection of stale encryption policy by group members | |||
998 | 9294269 | Communication apparatus and communication method | |||
999 | 9294268 | System and method for variable length encryption | |||
1000 | 9294267 | Method, system and program product for secure storage of content | |||
1001 | 9294191 | Method to mitigate propagation loss in waveguide transmission of quantum states | |||
1002 | 9292992 | Simplified smartcard personalization method, and corresponding device | |||
1003 | 9292699 | Encrypted file storage | |||
1004 | 9292674 | Password encryption key | |||
1005 | 9292673 | Virtual key management and isolation of data deployments in multi-tenant environments | |||
1006 | 9292665 | Secure serial number | |||
1007 | 9292258 | Secure sum-of-product computation method, secure sum-of-product computation system, computation apparatus and programs therefor | |||
1008 | 9288208 | Cryptographic key escrow | |||
1009 | 9288192 | System and method for securing data from a remote input device | |||
1010 | 9288061 | Safe communication method with card | |||
1011 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
1012 | 9288055 | Method for verifying correct encryption key utilization | |||
1013 | 9288054 | Method and apparatus for authenticating and managing application using trusted platform module | |||
1014 | 9288051 | Secure key management | |||
1015 | 9288050 | Unified storage and management of cryptographic keys and certificates | |||
1016 | 9288049 | Cryptographically linking data and authentication identifiers without explicit storage of linkage | |||
1017 | 9288048 | Real-time frame authentication using ID anonymization in automotive networks | |||
1018 | 9288047 | System and method for content protection based on a combination of a user pin and a device specific identifier | |||
1019 | 9288046 | Device for generating an encrypted key and method for providing an encrypted key to a receiver | |||
1020 | 9288045 | Spectral and temporal stealthy fiber optic communication using sampling and phase encoding detection systems | |||
1021 | 9288044 | Method for providing cryptographic key pairs | |||
1022 | 9288043 | Methods and systems for providing high-security cryptographic keys to mobile radios | |||
1023 | 9288042 | Securely and redundantly storing encryption credentials system and method | |||
1024 | 9286602 | Secure financial transactions | |||
1025 | 9286487 | Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers | |||
1026 | 9286458 | Systems and methods for online identity verification | |||
1027 | 9286457 | Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties | |||
1028 | 9286241 | Cryptographic transmission system | |||
1029 | 9282095 | Security and privacy enhancements for security devices | |||
1030 | 9282093 | Synchronizing credential hashes between directory services | |||
1031 | 9282084 | Method and apparatus for provisioning a temporary identity module using a key-sharing scheme | |||
1032 | 9282082 | Compressing encrypted data without the encryption key | |||
1033 | 9281944 | Attribute based encryption using lattices | |||
1034 | 9281942 | Password encryption for controlling access to electronic control units | |||
1035 | 9281941 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
1036 | 9281939 | Method and system for encrypting data delivered over a network | |||
1037 | 9280704 | Communicating wireless pairing information for pairing an electronic device to a host system | |||
1038 | 9280681 | Environmental monitoring device | |||
1039 | 9279656 | Interferometer and method for controlling the coalescence of a pair of photons | |||
1040 | 9277259 | Method and apparatus for providing secure internet protocol media services | |||
1041 | 9276980 | Data synchronization based on file system activities | |||
1042 | 9276912 | Dispersed storage network with slice refresh and methods for use therewith | |||
1043 | 9276818 | Mesh network commissioning | |||
1044 | 9276754 | Key rotation with external workflows | |||
1045 | 9276753 | System and method for data authentication among processors | |||
1046 | 9276748 | Data-encrypting method and decrypting method for a mobile phone | |||
1047 | 9276746 | Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization | |||
1048 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
1049 | 9276742 | Unified storage and management of cryptographic keys and certificates | |||
1050 | 9276741 | Content encryption key management | |||
1051 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
1052 | 9276739 | Method and apparatus for encrypting/decrypting data | |||
1053 | 9276738 | Digital tachograph | |||
1054 | 9276737 | Securing a command path between a vehicle and personal wireless device | |||
1055 | 9276736 | Connection key distribution | |||
1056 | 9276735 | Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program | |||
1057 | 9275241 | Cryptographic method | |||
1058 | 9274864 | Accessing large amounts of data in a dispersed storage network | |||
1059 | 9270719 | Device connection proxy through cloud to optimize network messages | |||
1060 | 9270673 | Terminal device, verification device, key distribution device, content playback method, key distribution method, and computer program | |||
1061 | 9270663 | System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added | |||
1062 | 9270651 | Authentication and initial key exchange in ethernet passive optical network over coaxial network | |||
1063 | 9270466 | System and method for temporary secure boot of an electronic device | |||
1064 | 9270465 | Control word protection | |||
1065 | 9270461 | System and method for efficient support for short cryptoperiods in template mode | |||
1066 | 9270459 | Techniques for achieving tenant data confidentiality from cloud service provider administrators | |||
1067 | 9270458 | Encryption processing device, encryption processing method, and program | |||
1068 | 9270457 | Optimizing security bits in a media access control (MAC) header | |||
1069 | 9270456 | System and methodology for decrypting encrypted media | |||
1070 | 9270455 | CPU assisted seeding of a random number generator in an externally provable fashion | |||
1071 | 9270454 | Public key generation utilizing media access control address | |||
1072 | 9270453 | Local security key generation | |||
1073 | 9270452 | Encryption using real-world objects | |||
1074 | 9270451 | Privacy enhanced spatial analytics | |||
1075 | 9270450 | Method and device for mutual authentication | |||
1076 | 9270449 | Secured communication in network environments | |||
1077 | 9270448 | Encryption key distribution system and method | |||
1078 | 9270447 | Demand based encryption and key generation and distribution systems and methods | |||
1079 | 9270446 | Privacy-enhancing technologies for medical tests using genomic data | |||
1080 | 9268949 | System and method for defining programmable processing steps applied when protecting the data | |||
1081 | 9268934 | Cryptographic passcode reset | |||
1082 | 9268918 | Encryption and decryption of a dataset in at least two dimensions | |||
1083 | 9268555 | Multiple system images for over-the-air updates | |||
1084 | 9264892 | Method and apparatus for attack resistant mesh networks | |||
1085 | 9264405 | Switch equipment and data processing method for supporting link layer security transmission | |||
1086 | 9264230 | Secure key management | |||
1087 | 9264229 | System and method for generating random key stream cipher texts | |||
1088 | 9264228 | System and method for a secure display module | |||
1089 | 9264227 | System and method of lawful access to secure communications | |||
1090 | 9264226 | Method and apparatus for selectively routing entanglement building | |||
1091 | 9264225 | Quantum communication using quantum teleportation | |||
1092 | 9264224 | Systems and methods for secure data sharing | |||
1093 | 9264223 | System and method for distributed security | |||
1094 | 9264220 | Secure virtual machine provisioning | |||
1095 | 9264148 | Two dimensional photonic cluster state generator from sequential photons with multiple entanglement gates | |||
1096 | 9264048 | Secret operations using reconfigurable logics | |||
1097 | 9262637 | System and method for verifying integrity of platform object using locally stored measurement | |||
1098 | 9262620 | Secure communications kit and client device for securely communicating using the same | |||
1099 | 9262594 | Tamper evidence per device protected identity | |||
1100 | 9262247 | Updating data stored in a dispersed storage network | |||
1101 | 9258714 | Broadcast replenishment of account parameters for groups of wireless devices | |||
1102 | 9258705 | Apparatus, method and system for creating and maintaining multicast data encryption key in machine to machine communication system | |||
1103 | 9258701 | Adding randomness internally to a wireless mobile communication device | |||
1104 | 9258303 | Method of providing real-time secure communication between end points in a network | |||
1105 | 9258283 | Key management system, key management method, and communication device | |||
1106 | 9258281 | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption | |||
1107 | 9258279 | Bookmarking content for users associated with multiple devices | |||
1108 | 9258130 | Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property | |||
1109 | 9258129 | Resilient device authentication system | |||
1110 | 9258124 | Time and event based one time password | |||
1111 | 9258122 | Systems and methods for securing data at third-party storage services | |||
1112 | 9258121 | Method to manage modification of encryption credentials | |||
1113 | 9258120 | Distributed public key revocation | |||
1114 | 9258119 | Trusted tamper reactive secure storage | |||
1115 | 9258118 | Decentralized verification in a distributed system | |||
1116 | 9258117 | Mutual authentication with symmetric secrets and signatures | |||
1117 | 9258116 | System and methods for permitting open access to data objects and for securing data within the data objects | |||
1118 | 9258115 | Securing information exchanged via a network | |||
1119 | 9258114 | Quantum key distribution (QSD) scheme using photonic integrated circuit (PIC) | |||
1120 | 9258113 | Username based key exchange | |||
1121 | 9258112 | Configurable key-based data shuffling and encryption | |||
1122 | 9258111 | Memory device which protects secure data, method of operating the memory device, and method of generating authentication information | |||
1123 | 9256763 | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |||
1124 | 9256750 | Secure credential unlock using trusted execution environments | |||
1125 | 9256499 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
1126 | 9256210 | Safe method for card issuing, card issuing device and system | |||
1127 | 9253633 | Method and mobile device for generating a data authentication key | |||
1128 | 9253288 | Location-aware mobile connectivity and information exchange system | |||
1129 | 9253178 | Method and apparatus for authenticating a communication device | |||
1130 | 9253172 | Changing group member reachability information | |||
1131 | 9253171 | Distributed network encryption key generation | |||
1132 | 9252960 | System for establishing a cryptographic key depending on a physical system | |||
1133 | 9252957 | Method for preventing laundering and repackaging of multimedia content in content distribution systems | |||
1134 | 9252954 | Efficient homomorphic encryption scheme for bilinear forms | |||
1135 | 9252953 | Instruction for performing a pseudorandom number generate operation | |||
1136 | 9252952 | Gesture-based encryption methods and systems | |||
1137 | 9252951 | Vehicle key function control from a mobile phone based on radio frequency link from phone to vehicle | |||
1138 | 9252950 | Methods and apparatus for interactive multimedia communication | |||
1139 | 9252949 | Broadcast encryption based media key block security class-based signing | |||
1140 | 9252948 | Broadcast encryption based media key block security class-based signing | |||
1141 | 9252947 | Secure key distribution service | |||
1142 | 9252946 | Method and system to securely migrate and provision virtual machine images and content | |||
1143 | 9252945 | Method for recognizing a manipulation of a sensor and/or sensor data of the sensor | |||
1144 | 9252944 | Key wrapping for common cryptographic architecture (CCA) key token | |||
1145 | 9251007 | Data storage arrangement and key distribution | |||
1146 | 9250870 | Automated creation of shim programs and interfaces | |||
1147 | 9247429 | Key derivation | |||
1148 | 9247311 | Systems and methods for playing back alternative streams of protected content protected using common cryptographic information | |||
1149 | 9246900 | Using a single certificate request to generate credentials with multiple ECQV certificates | |||
1150 | 9246889 | Layered protection and validation of identity data delivered online via multiple intermediate clients | |||
1151 | 9246888 | Systems and methods for secure communication over an unsecured communication channel | |||
1152 | 9246687 | Method for authorizing and authenticating data | |||
1153 | 9246686 | Salt value service | |||
1154 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
1155 | 9246682 | Communication apparatus, method for controlling communication apparatus, and program | |||
1156 | 9246681 | Use of 32-bit random numbers to produce cipher key stream for 8-bit data stream | |||
1157 | 9246680 | Optical cryptography systems and methods | |||
1158 | 9246679 | Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks | |||
1159 | 9246678 | Secure cloud storage and encryption management system | |||
1160 | 9246677 | Method and system for secure data communication between a user device and a server | |||
1161 | 9246676 | Secure access for encrypted data | |||
1162 | 9246675 | Cryptographic systems using pairing with errors | |||
1163 | 9246674 | Generation of cryptographic keys | |||
1164 | 9246673 | Taste-based authentication to securely share data | |||
1165 | 9246672 | Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key | |||
1166 | 9246602 | Quantum encryption communication apparatus, quantum encryption communication method, and quantum encryption communication system | |||
1167 | 9245155 | Virtual self-destruction of stored information | |||
1168 | 9245153 | Semiconductor device | |||
1169 | 9245148 | Secure storage and accelerated transmission of information over communication networks | |||
1170 | 9245139 | Non-retained message system | |||
1171 | 9244864 | Information providing system, information processing apparatus, computer readable medium, and information providing method for providing encrypted information | |||
1172 | 9241262 | Apparatus and method for securing beacons | |||
1173 | 9241261 | Method, system and device for negotiating security capability when terminal moves | |||
1174 | 9240983 | Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management | |||
1175 | 9240980 | Management of group secrets by group members | |||
1176 | 9240979 | Distributing keypairs between network appliances, servers, and other network assets | |||
1177 | 9240889 | Method and system for secure data access among two devices | |||
1178 | 9240884 | Method and apparatus for verifiable generation of public keys | |||
1179 | 9240883 | Multi-key cryptography for encrypting file system acceleration | |||
1180 | 9240882 | Key generating device and key generating method | |||
1181 | 9240881 | Secure communications for computing devices utilizing proximity services | |||
1182 | 9240880 | Distributed data storage device | |||
1183 | 9240837 | Systems and methods using optical communication for commissioning of network nodes | |||
1184 | 9239937 | Targeted security policy override | |||
1185 | 9239920 | Generation of working security key based on security parameters | |||
1186 | 9237150 | Method and system for protecting a password during an authentication process | |||
1187 | 9237133 | Detecting matched cloud infrastructure connections for secure off-channel secret generation | |||
1188 | 9237016 | System and method for wiping encrypted data on a device having file-level content protection | |||
1189 | 9237013 | Encrypted data management device, encrypted data management method, and encrypted data management program | |||
1190 | 9237012 | Establishing secure communication between an implantable medical device and an external device | |||
1191 | 9237011 | Unique surrogate key generation using cryptographic hashing | |||
1192 | 9237010 | Secure transmission of a message | |||
1193 | 9237009 | Disrupting offline password attacks | |||
1194 | 9237008 | Encryption device, encryption method, and encryption program | |||
1195 | 9235834 | Interoperable systems and methods for peer-to-peer service orchestration | |||
1196 | 9235833 | Interoperable systems and methods for peer-to-peer service orchestration | |||
1197 | 9235697 | One-time passcodes with asymmetric keys | |||
1198 | 9232268 | Unified video delivery system for supporting IP video streaming service | |||
1199 | 9232065 | Group pseudo-profiles for online sessions | |||
1200 | 9232024 | Communicating an identity to a server | |||
1201 | 9231952 | Key-based content management and access systems and methods | |||
1202 | 9231947 | RFID authentication architecture and methods for RFID authentication | |||
1203 | 9231929 | Methods and devices for security key renewal in a communication system | |||
1204 | 9231926 | System and method for secured host-slave communication | |||
1205 | 9231924 | Gesture-initiated encryption using error correction coding | |||
1206 | 9231762 | Method of secure communication, controlled device, and control program | |||
1207 | 9231760 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications | |||
1208 | 9231759 | Internet key exchange protocol using security associations | |||
1209 | 9231758 | System, device, and method of provisioning cryptographic data to electronic devices | |||
1210 | 9231757 | Proxy signature scheme | |||
1211 | 9230630 | Physically unclonable function based on the initial logical state of magnetoresistive random-access memory | |||
1212 | 9230113 | Encrypting and decrypting a virtual disc | |||
1213 | 9230109 | Trusted platform module security | |||
1214 | 9229823 | Storage and retrieval of dispersed storage network access information | |||
2015 | |||||
1215 | 9226336 | Wireless network area limiting method and system based on near field communication | |||
1216 | 9226144 | Systems and methods of performing link setup and authentication | |||
1217 | 9225754 | Ad-hoc network communications | |||
1218 | 9225742 | Managed real-time communications between user devices | |||
1219 | 9225719 | System and method for trusted pair security | |||
1220 | 9225698 | Fine grain rights management of streaming content | |||
1221 | 9225696 | Method for different users to securely access their respective partitioned data in an electronic apparatus | |||
1222 | 9225529 | Encrypted virtual machines in a cloud | |||
1223 | 9225523 | Authentication system and authentication method | |||
1224 | 9225522 | Techniques for populating a content stream on a mobile device | |||
1225 | 9225521 | Apparatus and method for skein hashing | |||
1226 | 9225520 | System and method for deterministic generation of a common content encryption key on distinct encryption units | |||
1227 | 9225519 | Method, system, and apparatus for enabling secure functionalities | |||
1228 | 9225518 | Method of providing fresh keys for message authentication | |||
1229 | 9225517 | Secure device association | |||
1230 | 9225516 | Combined authentication and encryption | |||
1231 | 9225515 | Shared portal context session | |||
1232 | 9225514 | Method for image encryption and decryption incorporating physiological features and image capture device thereof | |||
1233 | 9225513 | Authenticator, authenticatee and authentication method | |||
1234 | 9225512 | Encryption and decryption using a physically unclonable function | |||
1235 | 9224005 | Cloud key directory for federating data exchanges | |||
1236 | 9224003 | Method for secure storing and sharing of a data file via a computer communication network and open cloud services | |||
1237 | 9224000 | Systems and methods for providing information security using context-based keys | |||
1238 | 9223947 | Authentication apparatus and computer-readable medium storing authentication program code | |||
1239 | 9223945 | Code diversity method and system | |||
1240 | 9219730 | Securing a secret of a user | |||
1241 | 9219716 | Distributed tokenization using several substitution steps | |||
1242 | 9219715 | Mediator utilizing electronic content to enforce policies to a resource | |||
1243 | 9219609 | Method and system for multiple passcode generation | |||
1244 | 9219605 | Quantum key distribution | |||
1245 | 9219604 | Generating an encrypted message for storage | |||
1246 | 9219603 | System and method for encryption key management in a mixed infrastructure stream processing framework | |||
1247 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
1248 | 9218493 | Key camouflaging using a machine identifier | |||
1249 | 9218477 | Electronic physical unclonable functions | |||
1250 | 9218301 | Storage device security system | |||
1251 | 9218159 | Memory system generating random number and method generating random number | |||
1252 | 9215587 | Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems | |||
1253 | 9215249 | Systems and methods for distributed trust computing and key management | |||
1254 | 9215244 | Context aware network security monitoring for threat detection | |||
1255 | 9215230 | Method for authentication, RF chip document, RF chip reader and computer program products | |||
1256 | 9215228 | Authentication of devices having unequal capabilities | |||
1257 | 9215221 | Method for implementing local routing of traffic, base station and system | |||
1258 | 9215220 | Remote verification of attributes in a communication network | |||
1259 | 9215073 | Key insulation method and device | |||
1260 | 9215070 | Method for the cryptographic protection of an application | |||
1261 | 9215068 | Search system, search method, and program | |||
1262 | 9215067 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
1263 | 9215066 | Method and system for making information in a data set of a copy-on-write file system inaccessible | |||
1264 | 9215065 | Media player security for full length episodes | |||
1265 | 9215064 | Distributing keys for decrypting client data | |||
1266 | 9214184 | Digital rights management system, devices, and methods for binding content to an intelligent storage device | |||
1267 | 9214183 | Secure storage | |||
1268 | 9213871 | RFID tag and reader authentication by trusted authority | |||
1269 | 9213870 | RFID tag and reader authentication by trusted authority | |||
1270 | 9213857 | Systems and methods for securing data in motion | |||
1271 | 9213696 | Methods and systems for securely accessing translation resource manager | |||
1272 | 9210464 | Digital broadcast receiver device and digital broadcast receiving method | |||
1273 | 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
1274 | 9210137 | Local digital network, methods for installing new devices and data broadcast and reception methods in such a network | |||
1275 | 9210125 | System, method and apparatus for binding communication devices through common association | |||
1276 | 9209980 | Provisioning a shared secret to a portable electronic device and to a service entity | |||
1277 | 9209978 | Methods and apparatus to measure exposure to streaming media | |||
1278 | 9209974 | Functional encryption key management | |||
1279 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
1280 | 9209970 | Method of generating key | |||
1281 | 9209969 | System and method of per-packet keying | |||
1282 | 9209968 | Information processing apparatus, information processing method, and program | |||
1283 | 9208491 | Format-preserving cryptographic systems | |||
1284 | 9208351 | Processing information | |||
1285 | 9208333 | Secure data recorder | |||
1286 | 9208330 | System for execution of security related functions | |||
1287 | 9208294 | Managing license keys | |||
1288 | 9208105 | System and method for intercept of UEFI block I/O protocol services for BIOS based hard drive encryption support | |||
1289 | 9204473 | Method and apparatus for accelerated link setup | |||
1290 | 9204297 | Information processing apparatus, information processing method, operation terminal, and information processing system | |||
1291 | 9204296 | Apparatus and methods for key generation | |||
1292 | 9203832 | DTCP certificate authentication over TLS protocol | |||
1293 | 9203827 | Methods for determining authentication requirements of information centric network based services and devices thereof | |||
1294 | 9203816 | Controlling access to copies of media content by a client device | |||
1295 | 9203815 | Systems and methods for secure third-party data storage | |||
1296 | 9203813 | Content distribution method, content distribution system, source device, and sink device | |||
1297 | 9203812 | Dispersed storage network with encrypted portion withholding and methods for use therewith | |||
1298 | 9203800 | Communication method, node, and network system | |||
1299 | 9203626 | User authentication system and method for encryption and decryption | |||
1300 | 9203625 | Transferring encoded data slices in a distributed storage network | |||
1301 | 9203622 | Cryptographic processing system, cryptographic processing method, cryptograhpic processing program, and key generation device | |||
1302 | 9203621 | Policy-based data management | |||
1303 | 9203620 | System, method and apparatus for secure use of cryptographic credentials in mobile devices | |||
1304 | 9203619 | Online data transformation | |||
1305 | 9203618 | Information theoretic security mechanisms using a time-varying key | |||
1306 | 9203617 | Secure provisioning of integrated circuits at various states of deployment, methods thereof | |||
1307 | 9203616 | Multi-server fault tolerant data store update | |||
1308 | 9203615 | Confidential provisioning of secret keys over the air | |||
1309 | 9203614 | Method, apparatus, and system for protecting cloud data security | |||
1310 | 9203613 | Techniques for client constructed sessions | |||
1311 | 9203612 | Systems and methods for controlling media distribution | |||
1312 | 9203611 | Techniques for handshake-free encrypted communication using symmetric key caching during application backgrounding | |||
1313 | 9203610 | Systems and methods for secure peer-to-peer communications | |||
1314 | 9203609 | Method and apparatus for implementing key stream hierarchy | |||
1315 | 9202042 | Automatic device pairing | |||
1316 | 9202040 | Chip authentication using multi-domain intrinsic identifiers | |||
1317 | 9198036 | Method for providing application service | |||
1318 | 9198035 | Simple pairing to generate private keys for different protocol communications | |||
1319 | 9198033 | Method and apparatus for authenticating nodes in a wireless network | |||
1320 | 9197669 | Apparatus and method for signaling enhanced security context for session encryption and integrity keys | |||
1321 | 9197637 | Method of comparing private data without revealing the data | |||
1322 | 9197615 | Method and system for providing access-specific key | |||
1323 | 9197422 | System and method for differential encryption | |||
1324 | 9197421 | Methods and apparatus to measure exposure to streaming media | |||
1325 | 9197418 | Communication system for authenticating messages with uniquely specified genuine information | |||
1326 | 9197411 | Protocol and method for client-server mutual authentication using event-based OTP | |||
1327 | 9197410 | Key management system | |||
1328 | 9197409 | Key derivation techniques | |||
1329 | 9197408 | Systems and methods for providing a secure data exchange | |||
1330 | 9197407 | Method and system for providing secret-less application framework | |||
1331 | 9197406 | Key management using quasi out of band authentication architecture | |||
1332 | 9197405 | System and method for controlling user access to encrypted data | |||
1333 | 9197404 | Method and apparatus for providing broadcast service using encryption key in a communication system | |||
1334 | 9196110 | System and method for dynamic FOB synchronization and personalization | |||
1335 | 9195858 | Encrypted data storage device | |||
1336 | 9195851 | Offloading encryption to the client | |||
1337 | 9195848 | Computational systems and methods for anonymized storage of double-encrypted data | |||
1338 | 9195836 | Techniques for secure data management in a distributed environment | |||
1339 | 9191811 | Method and system for managing information on mobile devices | |||
1340 | 9191395 | Method and apparatus for providing an adaptable security level in an electronic communication | |||
1341 | 9191386 | Authentication using one-time passcode and predefined swipe pattern | |||
1342 | 9191376 | Securing digital content system and method | |||
1343 | 9191291 | Detection and handling of aggregated online content using decision criteria to compare similar or identical content items | |||
1344 | 9191209 | Efficient communication for devices of a home network | |||
1345 | 9191208 | Schemes for signcryption | |||
1346 | 9191206 | Multiple transform utilization and application for secure digital watermarking | |||
1347 | 9191205 | Multiple transform utilization and application for secure digital watermarking | |||
1348 | 9191204 | Encryption key distribution method in mobile broadcasting system and system for the same | |||
1349 | 9191203 | Secure industrial control system | |||
1350 | 9191202 | Information processing device and computer program product | |||
1351 | 9191201 | Optimizing secure communications | |||
1352 | 9191200 | System and method for changing the security level of a communications terminal during operation | |||
1353 | 9191199 | Method and apparatus for public-key cryptography based on error correcting codes | |||
1354 | 9191198 | Method and device using one-time pad data | |||
1355 | 9191196 | Secure computation using a server module | |||
1356 | 9189777 | Electronic commerce with cryptographic authentication | |||
1357 | 9189647 | Encrypted database system, linking method, and medium | |||
1358 | 9189627 | System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection | |||
1359 | 9185115 | Secure access using location-based encrypted authorization | |||
1360 | 9185108 | Token sharing system and method | |||
1361 | 9185097 | Method and system for traffic engineering in secured networks | |||
1362 | 9185094 | Systems, methods and apparatuses for the secure transmission and restricted use of media content | |||
1363 | 9185087 | Medical device communication using encryption based on correlated motion | |||
1364 | 9184916 | System and method for using a streaming protocol | |||
1365 | 9184912 | Secure quantum authentication system | |||
1366 | 9184911 | Secure session capability using public-key cryptography without access to the private key | |||
1367 | 9184910 | Distributed single sign on technologies including privacy protection and proactive updating | |||
1368 | 9183415 | Regulating access using information regarding a host machine of a portable storage drive | |||
1369 | 9183411 | Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption | |||
1370 | 9183357 | Recording/reproducing system, recording medium device, and recording/reproducing device | |||
1371 | 9183159 | Authentication method | |||
1372 | 9183158 | System and method for hardware based security | |||
1373 | 9178989 | Call event tagging and call recording stitching for contact center call recordings | |||
1374 | 9178876 | Strength-based password expiration | |||
1375 | 9178703 | Method of protecting a control vector in an optional block of a standard key block | |||
1376 | 9178702 | Revocation list generation device, revocation list generation method, and content management system | |||
1377 | 9178701 | Parameter based key derivation | |||
1378 | 9178700 | Information processing apparatus, information processing method, program, and recording medium | |||
1379 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
1380 | 9178698 | Dynamic key management | |||
1381 | 9178697 | Security for remote access VPN | |||
1382 | 9178696 | Key management for secure communication | |||
1383 | 9178695 | Method for identifying a device used by a hacked terminal, and related device | |||
1384 | 9178623 | Photon phase modulating system | |||
1385 | 9177488 | Method, system and program product for securing data written to a storage device coupled to a computer system | |||
1386 | 9177159 | Secure data parser method and system | |||
1387 | 9176897 | Writing area security system | |||
1388 | 9176822 | Adjusting dispersed storage error encoding parameters | |||
1389 | 9173095 | Techniques for authenticating a device for wireless docking | |||
1390 | 9172711 | Originator publishing an attestation of a statement | |||
1391 | 9172683 | Method and apparatus for key distribution with implicit offline authorization | |||
1392 | 9172547 | Apparatus and method for signature verification | |||
1393 | 9172542 | System and method to pass a private encryption key | |||
1394 | 9172536 | Audio communication based electronic signature system and method thereof | |||
1395 | 9172535 | Key implementation system | |||
1396 | 9172534 | Range search system, range search method, and range search program | |||
1397 | 9172533 | Method and system for securing communication | |||
1398 | 9172532 | Multi-tiered encryption system for efficiently regulating use of encryption keys | |||
1399 | 9172531 | Information processing apparatus and method | |||
1400 | 9172530 | Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method | |||
1401 | 9172529 | Hybrid encryption schemes | |||
1402 | 9172464 | Handshake synchronization method and system based on visible light communication | |||
1403 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
1404 | 9171170 | Data and key separation using a secure central processing unit | |||
1405 | 9171144 | Electronic physical unclonable functions | |||
1406 | 9171135 | Method for acquisition of software applications | |||
1407 | 9167429 | Visible light communication system, communication terminal and server | |||
1408 | 9167428 | Method and system for authenticating entities by means of terminals | |||
1409 | 9167422 | Method for ensuring media stream security in IP multimedia sub-system | |||
1410 | 9167038 | Social networking with depth and security factors | |||
1411 | 9167037 | Server and method, non-transitory computer readable storage medium, and mobile client terminal and method | |||
1412 | 9166972 | Shared information distributing device, holding device, certificate authority device, and system | |||
1413 | 9166953 | Method and apparatus for providing identity based encryption in distributed computations | |||
1414 | 9166799 | IMS security for femtocells | |||
1415 | 9166796 | Secure biometric cloud storage system | |||
1416 | 9166791 | Method and apparatus for user identity verification | |||
1417 | 9166790 | Commission information generator for making processes on communication performed by another computer | |||
1418 | 9166787 | Securing encrypted virtual hard disks | |||
1419 | 9166786 | Personal portable secured network access system | |||
1420 | 9166785 | Cryptography processing device and cryptography processing method | |||
1421 | 9166783 | Protection method, decryption method, player, storage medium, and encryption apparatus of digital content | |||
1422 | 9166782 | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks | |||
1423 | 9166781 | Key change management apparatus and key change management method | |||
1424 | 9166780 | Information processing apparatus and method | |||
1425 | 9166779 | System and method of secure encryption for electronic data transfer | |||
1426 | 9166778 | Secure group messaging | |||
1427 | 9165159 | Encryption based on touch gesture | |||
1428 | 9165158 | Encryption key management using distributed storage of encryption-key fragments | |||
1429 | 9165154 | Trusted cloud computing and services framework | |||
1430 | 9165148 | Generating secure device secret key | |||
1431 | 9164926 | Security control method of network storage | |||
1432 | 9161215 | Wireless device, registration server and method for provisioning of wireless devices | |||
1433 | 9160744 | Increasing entropy for password and key generation on a mobile device | |||
1434 | 9160734 | Service activation using algorithmically defined key | |||
1435 | 9160731 | Establishing a trust relationship between two product systems | |||
1436 | 9160723 | Framework for provisioning devices with externally acquired component-based identity data | |||
1437 | 9160721 | Information processing apparatus and information processing method | |||
1438 | 9160542 | Authorizing use of a test key signed build | |||
1439 | 9160535 | Truly anonymous cloud key broker | |||
1440 | 9160533 | Random number generation | |||
1441 | 9160532 | Dynamic seed and key generation from biometric indicia | |||
1442 | 9160531 | Host device, semiconductor memory device, and authentication method | |||
1443 | 9160530 | Method and apparatus for verifiable generation of public keys | |||
1444 | 9160529 | Secret communication system and method for generating shared secret information | |||
1445 | 9160528 | Distributed single sign on technologies including privacy protection and proactive updating | |||
1446 | 9160527 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
1447 | 9160526 | Sharing encryption-related metadata between a host and an external intermediate device | |||
1448 | 9159113 | Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval | |||
1449 | 9158939 | Security chip, program, information processing apparatus, and information processing system | |||
1450 | 9158933 | Protection of encryption keys in a database | |||
1451 | 9158925 | Server-aided private set intersection (PSI) with data transfer | |||
1452 | 9158906 | Authenticating a device and a user | |||
1453 | 9158896 | Method and system for generating a secure key | |||
1454 | 9154494 | Self-signed implicit certificates | |||
1455 | 9154481 | Decryption of a protected resource on a cryptographic device using wireless communication | |||
1456 | 9154464 | Obscuring temporary user equipment identities | |||
1457 | 9154310 | Resilient device authentication system | |||
1458 | 9154302 | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number | |||
1459 | 9154300 | Method and apparatus for determining joint randomness | |||
1460 | 9154299 | Remote management of endpoint computing device with full disk encryption | |||
1461 | 9154298 | Securely storing data in a dispersed storage network | |||
1462 | 9154297 | Method for granting a plurality of electronic communication devices access to a local area network | |||
1463 | 9154296 | Secure and anonymous distributed authentication | |||
1464 | 9154295 | Method of generating a correspondence table for a cryptographic white box | |||
1465 | 9148783 | Method of managing sensitive data in an electronic token | |||
1466 | 9148449 | Efficient encryption, escrow and digital signatures | |||
1467 | 9148421 | Method and system for encryption of messages in land mobile radio systems | |||
1468 | 9148419 | User administering a trustworthy workspace | |||
1469 | 9148415 | Method and system for accessing e-book data | |||
1470 | 9148283 | Storing encrypted objects | |||
1471 | 9148281 | Random number generation | |||
1472 | 9148225 | Optical transmitters and receivers for quantum key distribution | |||
1473 | 9147400 | Method and apparatus for generating speaker-specific spoken passwords | |||
1474 | 9147189 | Secure reports for electronic payment systems | |||
1475 | 9147087 | Method of accessing a data storage device | |||
1476 | 9147079 | Encrypted database system, client terminal, encrypted database server, natural joining method, and program | |||
1477 | 9147076 | System and method for establishing perpetual trust among platform domains | |||
1478 | 9146881 | Mobile data vault | |||
1479 | 9146441 | Apparatus and method for a symmetric sequential entangler of periodic photons in a single input and output mode | |||
1480 | 9143485 | Method for data privacy in a fixed content distributed data storage | |||
1481 | 9143383 | Method and system for managing device identification | |||
1482 | 9143331 | Methods and devices for authentication and key exchange | |||
1483 | 9143324 | Secure messaging | |||
1484 | 9143323 | Securing a link between two devices | |||
1485 | 9143322 | Communication apparatus, data communication method, and network system | |||
1486 | 9143321 | Communication protocol for secure communications systems | |||
1487 | 9143320 | Electronic key registration system | |||
1488 | 9143319 | Mechanism for managing authentication device lifecycles | |||
1489 | 9143318 | Secure recoverable offline storage of a shared secret | |||
1490 | 9143027 | Intelligent power supervisor | |||
1491 | 9141952 | EGM authentication mechanism using multiple key pairs at the bios with PKI | |||
1492 | 9141815 | System and method for intelligence based security | |||
1493 | 9141813 | Ordered deletion of content in storage systems | |||
1494 | 9141779 | Usable security of online password management with sensor-based authentication | |||
1495 | 9137659 | Method and system for decoupling user authentication and data encryption on mobile devices | |||
1496 | 9137658 | Electronic key registration system | |||
1497 | 9137493 | Method and device for excerpt licensing | |||
1498 | 9137480 | Secure escrow and recovery of media device content keys | |||
1499 | 9137304 | Method and apparatus for achieving data security in a distributed cloud computing environment | |||
1500 | 9137303 | Pre-fetching data segments stored in a dispersed storage network | |||
1501 | 9137246 | Systems, methods and apparatus for multivariate authentication | |||
1502 | 9137226 | Authentication method and authentication device for performing group authentication using a group key | |||
1503 | 9137218 | Splicing into an active TLS session without a certificate or private key | |||
1504 | 9137113 | System and method for dynamically allocating resources | |||
1505 | 9137095 | Methods and devices for maintaining a domain | |||
1506 | 9137025 | Managing data for authentication devices | |||
1507 | 9137017 | Key recovery mechanism | |||
1508 | 9137016 | Key pair updates based on digital signature states | |||
1509 | 9137015 | Protection scheme for AACS keys | |||
1510 | 9137014 | Systems and methods for controlling electronic document use | |||
1511 | 9137013 | Method and system for a hardware-efficient universal hash function | |||
1512 | 9137012 | Wireless authentication methods and apparatus | |||
1513 | 9137011 | Rapid data encryption and decryption for secure communication over open channels with plausible deniability | |||
1514 | 9137010 | Watermark with data integrity verification | |||
1515 | 9137009 | Portable keying device and method | |||
1516 | 9135833 | Process for selecting compressed key bits for collision resolution in hash lookup table | |||
1517 | 9135820 | Communication system, vehicle-mounted terminal, roadside device | |||
1518 | 9135761 | Method of migrating RFID transponders in situ | |||
1519 | 9135464 | Secure storage system for distributed data | |||
1520 | 9135462 | Upload and download streaming encryption to/from a cloud-based platform | |||
1521 | 9135456 | Secure data parser method and system | |||
1522 | 9135450 | Systems and methods for protecting symmetric encryption keys | |||
1523 | 9135417 | Apparatus for generating secure key using device and user authentication information | |||
1524 | 9130757 | Method for authenticated communication in dynamic federated environments | |||
1525 | 9130754 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
1526 | 9130752 | Tamper-resistant coating for an integrated circuit | |||
1527 | 9130745 | Encryption processing device and method | |||
1528 | 9130744 | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |||
1529 | 9130743 | Method and apparatus for communicating between low message rate wireless devices and users via monitoring, control and information systems | |||
1530 | 9130742 | Key agreement in wireless networks with active adversaries | |||
1531 | 9130741 | Data protection system that protects data by encrypting the data | |||
1532 | 9130693 | Generation of perfectly secret keys in wireless communication networks | |||
1533 | 9129671 | Semiconductor device identifier generation method and semiconductor device | |||
1534 | 9129536 | Circuit for secure provisioning in an untrusted environment | |||
1535 | 9129121 | Locating cryptographic keys stored in a cache | |||
1536 | 9129108 | Systems, methods and computer programs providing impact mitigation of cyber-security failures | |||
1537 | 9124432 | Host device and authentication method for host device | |||
1538 | 9124424 | System, apparatus and method for license key permutation | |||
1539 | 9124423 | Iterative data secret-sharing transformation | |||
1540 | 9124422 | System and method for digital rights management with secure application-content binding | |||
1541 | 9124421 | Data prioritization, storage and protection in a vehicular communication system | |||
1542 | 9124420 | Encryption processing device and encryption processing method | |||
1543 | 9124419 | Method, device, and system of secure entry and handling of passwords | |||
1544 | 9122882 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
1545 | 9122859 | Browser based event information delivery mechanism using application resident on removable storage device | |||
1546 | 9122504 | Apparatus and method for encryption in virtualized environment using auxiliary medium | |||
1547 | 9119064 | Method and apparatus for providing broadcast channel encryption to enhance cellular network security | |||
1548 | 9118639 | Trusted data processing in the public cloud | |||
1549 | 9118481 | Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity | |||
1550 | 9118467 | Generating keys using secure hardware | |||
1551 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
1552 | 9118463 | Distributed single sign on technologies including privacy protection and proactive updating | |||
1553 | 9118462 | Content sharing systems and methods | |||
1554 | 9118461 | Code diversity method and system | |||
1555 | 9118441 | Layout-optimized random mask distribution system and method | |||
1556 | 9117095 | Data security for digital data storage | |||
1557 | 9117089 | Method and apparatus for controlling access in a social network service | |||
1558 | 9116849 | Community-based de-duplication for encrypted data | |||
1559 | 9113499 | Multiple domain smartphone | |||
1560 | 9113330 | Wireless authentication using beacon messages | |||
1561 | 9113226 | Methods and systems for re-securing a compromised channel in a satellite signal distribution environment | |||
1562 | 9112860 | Method and apparatus for mutual authentication | |||
1563 | 9112732 | Security measures for countering unauthorized decryption | |||
1564 | 9112700 | Personal assistance safety systems and methods | |||
1565 | 9112699 | System, processing device, computer program and method, to tranparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords | |||
1566 | 9112683 | Maintaining triggered session state in secure user plane location (SUPL) enabled system | |||
1567 | 9112682 | Generating modular security delegates for applications | |||
1568 | 9112681 | Method and apparatus for secure information transfer to support migration | |||
1569 | 9112680 | Distribution of credentials | |||
1570 | 9112679 | Storing a key in a remote security module | |||
1571 | 9112678 | Information processing apparatus and method | |||
1572 | 9112677 | Communication device and cryptographic key creation method in cryptographic key sharing system | |||
1573 | 9112676 | Communication apparatus, control method thereof, and storage medium | |||
1574 | 9111229 | Quantum repeater and system and method for creating extended entanglements | |||
1575 | 9111123 | Firmware for protecting data from software threats | |||
1576 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
1577 | 9111115 | Oblivious transfer with hidden access control lists | |||
1578 | 9110799 | Method and apparatus for providing intelligent error messaging | |||
1579 | 9106882 | Terminal device, content recording system, title key recording method, and computer program | |||
1580 | 9106797 | Content reproducing device and content reproducing method | |||
1581 | 9106795 | Computational efficiently obtaining a control word in a receiver using transformations | |||
1582 | 9106721 | Application state synchronization across multiple devices | |||
1583 | 9106644 | Authentication | |||
1584 | 9106635 | System and method for connecting client devices to a network | |||
1585 | 9106629 | Distributed algorithm for changing a shared value | |||
1586 | 9106628 | Efficient key management system and method | |||
1587 | 9106426 | Username based authentication and key generation | |||
1588 | 9106414 | Method and apparatus for wirelessly transmitting high volume content to an electronic device | |||
1589 | 9106413 | Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications | |||
1590 | 9106412 | Data protection using programmatically generated key pairs from a master key and a descriptor | |||
1591 | 9106411 | Secure escrow service | |||
1592 | 9106410 | Identity based authenticated key agreement protocol | |||
1593 | 9106409 | Method and apparatus for handling keys used for encryption and integrity | |||
1594 | 9106408 | Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program | |||
1595 | 9106407 | Key generation using multiple sets of secret shares | |||
1596 | 9106406 | Communication apparatus and key managing method | |||
1597 | 9106405 | Multi-user secret decay | |||
1598 | 9105432 | Apparatus and method for generating digital value | |||
1599 | 9105027 | Verification of portable consumer device for secure services | |||
1600 | 9104889 | Encryption on computing device | |||
1601 | 9104847 | Method for generating an identifier | |||
1602 | 9104691 | Securing data in a dispersed storage network using an encoding equation | |||
1603 | 9104541 | Obtaining a signed certificate for a dispersed storage network | |||
1604 | 9100826 | Method and apparatus for secure access payment and identification | |||
1605 | 9100820 | Apparatus for managing members of at least one group of decoders having access to broadcast data | |||
1606 | 9100677 | Server, client device, method for generating a transport stream thereof and processing the transport stream thereof | |||
1607 | 9100374 | Method for managing remote upgrading keys in an information security apparatus | |||
1608 | 9100235 | Secure desktop applications for an open computing platform | |||
1609 | 9100189 | Secure provisioning in an untrusted environment | |||
1610 | 9100187 | Authenticator | |||
1611 | 9100186 | Secure file sharing method and system | |||
1612 | 9100185 | Encryption processing apparatus and method | |||
1613 | 9100183 | Computer program product and method for order preserving symbol based encryption | |||
1614 | 9100175 | Embedded universal integrated circuit card supporting two-factor authentication | |||
1615 | 9100174 | Secure provisioning in an untrusted environment | |||
1616 | 9100173 | Security USB storage medium generation and decryption method, and medium recorded with program for generating security USB storage medium | |||
1617 | 9100172 | Method for interworking with trustzone between normal domain and secure domain, and management method of trusted application download, management server, device and system using it | |||
1618 | 9100171 | Computer-implemented forum for enabling secure exchange of information | |||
1619 | 9098721 | Method for strongly encrypting .ZIP files | |||
1620 | 9098718 | Systems and methods for securing data using multi-factor or keyed dispersal | |||
1621 | 9098694 | Clone-resistant logic | |||
1622 | 9094873 | Classified relation networking optimization platform in open wireless architecture (OWA) mobile cloud terminal device | |||
1623 | 9094826 | Wireless communication system and terminal-device authentication method in wireless communication system | |||
1624 | 9094820 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
1625 | 9094699 | System and method for security key transmission with strong pairing to destination client | |||
1626 | 9094471 | Method of lawful interception for UMTS | |||
1627 | 9094405 | Methods and systems for establishing secure communications | |||
1628 | 9094402 | Retrieving access information in a dispersed storage network | |||
1629 | 9094383 | Personal security manager for ubiquitous patient monitoring | |||
1630 | 9094382 | Electronic key registration system | |||
1631 | 9094379 | Transparent client-side cryptography for network applications | |||
1632 | 9094217 | Secure credential store | |||
1633 | 9094215 | Method and system for digital rights management of documents | |||
1634 | 9094205 | Secure provisioning in an untrusted environment | |||
1635 | 9094204 | Image encryption system and image decryption system | |||
1636 | 9094195 | Protecting de-duplication repositories against a malicious attack | |||
1637 | 9094194 | Method and system for automating the recovery of a credential store when a user has forgotten their password using a temporary key pair created based on a new password provided by the user | |||
1638 | 9094193 | Information recording device | |||
1639 | 9094192 | Method of and apparatus for sharing secret information between device in home network | |||
1640 | 9094191 | Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks | |||
1641 | 9094190 | Method of managing key for secure storage of data and apparatus therefor | |||
1642 | 9094189 | Cryptographic method for communicating confidential information | |||
1643 | 9093128 | Electronic device with a plurality of memory cells and with physically unclonable function | |||
1644 | 9092780 | User-mediator monitoring and controlling access to electronic content | |||
1645 | 9092643 | Secure access to personal health records in emergency situations | |||
1646 | 9092640 | Access control for server applications | |||
1647 | 9092633 | Authorizing removable medium access | |||
1648 | 9092608 | Random-ID function for smartcards | |||
1649 | 9092385 | Facilitating access of a dispersed storage network | |||
1650 | 9088888 | Secure wireless communication using rate-adaptive codes | |||
1651 | 9088616 | Method and apparatus for authentication | |||
1652 | 9088557 | Encryption key management program, data management system | |||
1653 | 9088552 | Method and apparatus for key distribution using near-field communication | |||
1654 | 9088408 | Key agreement using a key derivation key | |||
1655 | 9088407 | Distributed storage network and method for storing and retrieving encryption keys | |||
1656 | 9087432 | Creation and monitoring of "fair play" online gaming | |||
1657 | 9087204 | Airport security check system and method therefor | |||
1658 | 9087180 | Control of access to a secondary system | |||
1659 | 9087016 | Detecting intentional corruption of data in a dispersed storage network | |||
1660 | 9086905 | Interpreting I/O operation requests from pageable guests without host intervention | |||
1661 | 9084110 | Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network | |||
1662 | 9084031 | Content license storage | |||
1663 | 9083682 | Communication device and computer program product | |||
1664 | 9083681 | System, apparatus, method and computer program for transferring content | |||
1665 | 9083527 | Using mobile data to establish a shared secret in second-factor authentication | |||
1666 | 9083516 | Securing virtual lane physical layers | |||
1667 | 9083515 | Forward secure pseudorandom number generation resilient to forward clock attacks | |||
1668 | 9083514 | Distributed single sign on technologies including privacy protection and proactive updating | |||
1669 | 9083513 | Technique for securely communicating and storing programming material in a trusted domain | |||
1670 | 9083512 | Recording device, and content-data playback system | |||
1671 | 9083511 | Message key generation | |||
1672 | 9083510 | Generation and management of crypto key for cloud data | |||
1673 | 9083486 | Personal point of sale | |||
1674 | 9083473 | Two dimensional photonic cluster state generator from sequential photons with fixed delay loopback | |||
1675 | 9081972 | Method of distributing a decryption key in fixed-content data | |||
1676 | 9081945 | Information processing device and method | |||
1677 | 9081726 | Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device | |||
1678 | 9081715 | Utilizing a dispersed storage network access token module to retrieve data from a dispersed storage network memory | |||
1679 | 9081714 | Utilizing a dispersed storage network access token module to store data in a dispersed storage network memory | |||
1680 | 9078126 | Method of sharing a session key between wireless communication terminals using a variable-length authentication code | |||
1681 | 9077710 | Distributed storage of password data | |||
1682 | 9077698 | Group security in machine-type communication | |||
1683 | 9077539 | Server-aided multi-party protocols | |||
1684 | 9077537 | Generating secure private keys for use in a public key communications environment | |||
1685 | 9077526 | Method and system for ensuring sequential playback of digital media | |||
1686 | 9077525 | User-controlled data encryption with obfuscated policy | |||
1687 | 9077523 | Communication system and authentication card | |||
1688 | 9077522 | Two-party private estimation of dataset similarity | |||
1689 | 9077521 | Method and system for secure communication | |||
1690 | 9077520 | Method for secure communication in a network, a communication device, a network and a computer program therefor | |||
1691 | 9077457 | Two dimensional photonic cluster state generator from sequential photons with variable delay loopback | |||
1692 | 9076188 | Method and system for shipment authentication | |||
1693 | 9076018 | Encryption key generation in encrypted storage devices | |||
1694 | 9076002 | Stored authorization status for cryptographic operations | |||
1695 | 9075980 | Integrity protected smart card transaction | |||
1696 | 9075283 | Polarization-entangled photon pair source and method for the manufacture thereof | |||
1697 | 9075282 | Sequential entangler of periodic photons in a single input and output mode | |||
1698 | 9071962 | Evolved packet system non access stratum deciphering using real-time LTE monitoring | |||
1699 | 9071598 | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | |||
1700 | 9071589 | Encryption key management for storage area network devices | |||
1701 | 9071588 | Secure group communications | |||
1702 | 9071446 | Tamper-protected hardware and method for using same | |||
1703 | 9071439 | Method and apparatus for remote administration of cryptographic devices | |||
1704 | 9071429 | Revocable shredding of security credentials | |||
1705 | 9071428 | Methods and systems for hardware piracy prevention | |||
1706 | 9071427 | Method and apparatus for establishing a key agreement protocol | |||
1707 | 9071426 | Generating a symmetric key to secure a communication link | |||
1708 | 9071425 | Quantum communication system | |||
1709 | 9071424 | Token-based key generation | |||
1710 | 9071423 | Identification of a compromised content player | |||
1711 | 9071422 | Access authentication method for multiple devices and platforms | |||
1712 | 9071421 | Encrypted content streaming | |||
1713 | 9071420 | Information processing apparatus, tampering detection apparatus, information processing method, tampering detection method, and computer product | |||
1714 | 9071416 | Galois/counter mode encryption in a wireless network | |||
1715 | 9070193 | Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval | |||
1716 | 9069943 | Method and apparatus for token-based tamper detection | |||
1717 | 9069940 | Secure host authentication using symmetric key cryptography | |||
1718 | 9069934 | Method and system for providing electronic content to a user | |||
1719 | 9066226 | Initialization of embedded secure elements | |||
1720 | 9065977 | Identification of a compromised content player | |||
1721 | 9065830 | Network recording and speech analytics system and method | |||
1722 | 9065642 | Intercepting key sessions | |||
1723 | 9065641 | Method and device for updating a key | |||
1724 | 9065640 | Method and apparatus for generating non-interactive key and method for communication security using the same | |||
1725 | 9065639 | Device for generating encryption key, method thereof and computer readable medium | |||
1726 | 9065638 | System, method, and program for information management | |||
1727 | 9065637 | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | |||
1728 | 9065636 | Data encryption system and method | |||
1729 | 9065635 | Information processing apparatus, IC chip, and information processing method | |||
1730 | 9065633 | Wireless communication apparatus for setting frequency band for wireless communications using encryption key information to predetermined frequency band | |||
1731 | 9064229 | Real-time asset tracking using discovery services | |||
1732 | 9064131 | Protecting documents using policies and encryption | |||
1733 | 9064127 | Systems and methods for securing data in the cloud | |||
1734 | 9064123 | Secure product-sum combination system, computing apparatus, secure product-sum combination method and program therefor | |||
1735 | 9063881 | Slice retrieval in accordance with an access sequence in a dispersed storage network | |||
1736 | 9060265 | Wireless sensor network and central node device thereof | |||
1737 | 9059989 | Hash synchronization for preventing unauthorized server access using stolen passwords | |||
1738 | 9059978 | System and methods for remote maintenance in an electronic network with multiple clients | |||
1739 | 9059851 | Method and computer program product for order preserving symbol based encryption | |||
1740 | 9059843 | Information protection apparatus, information protection method, and storage medium | |||
1741 | 9059842 | System and method for grid based cyber security | |||
1742 | 9059841 | Auto-discovery of a non-advertised public network address | |||
1743 | 9059840 | Recipient blind cryptographic access control for publicly hosted message and data streams | |||
1744 | 9059839 | Communication terminal using a temporary network key for assembling a secure communication frame | |||
1745 | 9059838 | Encryption algorithm with randomized buffer | |||
1746 | 9059746 | Data sharing method, transmitter, receiver and data sharing system | |||
1747 | 9058507 | Signal processor with an encrypting or decrypting device in a memory system | |||
1748 | 9058497 | Cryptographic key management | |||
1749 | 9055440 | Geospatial cryptography | |||
1750 | 9055428 | Communication apparatus, control method for communication apparatus, and program | |||
1751 | 9055087 | Method and system for securely providing and storing content in a multiple dwelling unit system | |||
1752 | 9055071 | Automated false statement alerts | |||
1753 | 9055058 | Method and apparatus for serial device registration | |||
1754 | 9055051 | Imparting cryptographic information in network communications | |||
1755 | 9055038 | Apparatus, system, and method to garble programs | |||
1756 | 9054880 | Information processing device, controller, key issuing authority, method for judging revocation list validity, and key issuing method | |||
1757 | 9054878 | System and method for security authentication of power system | |||
1758 | 9054874 | System and method for data authentication among processors | |||
1759 | 9054871 | Physical key-protected one time pad | |||
1760 | 9054864 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
1761 | 9054863 | Industrial protocol system authentication and firewall | |||
1762 | 9054862 | Access control key management in a virtual world | |||
1763 | 9054861 | Enhanced key agreement and transport protocol | |||
1764 | 9054860 | Digital verified identification system and method | |||
1765 | 9054859 | FPGA configuration bitstream encryption using modified key | |||
1766 | 9054848 | Electronic apparatus and encryption method thereof | |||
1767 | 9053739 | Information processing apparatus, information processing method and program | |||
1768 | 9053342 | Multi-identity for secure file sharing | |||
1769 | 9053341 | Multi-identity for secure file sharing | |||
1770 | 9053330 | Method and devices for providing secure data backup from a mobile communication device to an external computing device | |||
1771 | 9053325 | Decryption key management system | |||
1772 | 9053130 | Binary data store | |||
1773 | 9053120 | Grouping and differentiating files based on content | |||
1774 | 9053062 | Memory chip for converting data received from controller controlling reading and writing of data | |||
1775 | 9049592 | Techniques for key derivation for secure communication in wireless mesh networks | |||
1776 | 9049181 | Network key update system, a server, a network key update method and a recording medium | |||
1777 | 9049010 | Portable data encryption device with configurable security functionality and method for file encryption | |||
1778 | 9049008 | Distributed key-based encryption system | |||
1779 | 9044855 | Processing context information | |||
1780 | 9043929 | Minimizing sensitive data exposure during preparation of redacted documents | |||
1781 | 9043604 | Method and apparatus for key provisioning of hardware devices | |||
1782 | 9043596 | Method and apparatus for authenticating public key without authentication server | |||
1783 | 9042553 | Communicating device and communicating method | |||
1784 | 9042552 | Managing encryption keys in a computer system | |||
1785 | 9037865 | Method and system to securely send secrets to users | |||
1786 | 9037848 | Mobile IPTV service system using downloadable conditional access system and method thereof | |||
1787 | 9030226 | System and methods for generating unclonable security keys in integrated circuits | |||
1788 | 9027084 | Methods and apparatuses for securely operating shared host devices with portable apparatuses | |||
1789 | 9026805 | Key management using trusted platform modules | |||
1790 | 9025772 | Information processing apparatus and program product | |||
1791 | 9020149 | Protected storage for cryptographic materials | |||
1792 | 9015479 | Host device and method for super-distribution of content protected with a localized content encryption key | |||
1793 | 9014551 | Method and apparatus for simulating a photon-counting detector array as used in a communication link | |||
1794 | 9014376 | Method and apparatus for low-power AP-assisted fast wireless roaming using optimized neighbor graphs | |||
1795 | 9003197 | Methods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor | |||
1796 | 9002017 | Method and apparatus for key distribution for secure digital cinema presentations | |||
1797 | 9002009 | Quantum key distribution using card, base station and trusted authority | |||
1798 | 8995665 | Role based encryption without key management system | |||
1799 | 8990571 | Host device, semiconductor memory device, and authentication method | |||
1800 | 8989389 | Method and apparatus for device-to-device key management | |||
1801 | 8989388 | Distribution of storage area network encryption keys across data centers | |||
1802 | 8989375 | Video receiving apparatus and video receiving method | |||
1803 | 8983076 | Methods and apparatus for key delivery in HTTP live streaming | |||
1804 | 8977842 | Hypervisor enabled secure inter-container communications | |||
1805 | 8977841 | Sending messages by oblivious transfer | |||
1806 | 8976968 | Intercepting a communication session in a telecommunication network | |||
1807 | 8976966 | Information processor, information processing method and system | |||
1808 | 8972745 | Secure data handling in a computer system | |||
1809 | 8972734 | Symmetric dynamic authentication and key exchange system and method thereof | |||
1810 | 8972731 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
1811 | 8971540 | Authentication | |||
1812 | 8971539 | Management of SSL certificate escrow | |||
1813 | 8971536 | Balanced entropy random number generator | |||
1814 | 8966651 | Digital rights management (DRM) locker | |||
1815 | 8966601 | Connection of peripheral devices to wireless networks | |||
1816 | 8964990 | Automating key rotation in a distributed system | |||
1817 | 8964989 | Method for adding nodes to a quantum key distribution system | |||
1818 | 8964988 | Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium | |||
1819 | 8959654 | Minimizing sensitive data exposure during preparation of redacted documents | |||
1820 | 8958563 | Method of generating a public key for an electronic device and electronic device | |||
1821 | 8958562 | Format-preserving cryptographic systems | |||
1822 | 8954745 | Method and apparatus for generating one-time passwords | |||
1823 | 8953808 | System and method for effectively performing data restore/migration procedures | |||
1824 | 8953805 | Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method | |||
1825 | 8949605 | Communication system, communication apparatus, communication method, and computer program | |||
1826 | 8948401 | Method for filtering of abnormal ONT with same serial number in a GPON system | |||
1827 | 8948400 | Host device | |||
1828 | 8948399 | Dynamic key management | |||
1829 | 8948397 | Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof | |||
1830 | 8948382 | Secure protocol for peer-to-peer network | |||
1831 | 8938076 | Method and arrangement in a telecommunication system | |||
1832 | 8938075 | Method and device for establishing a communication session | |||
1833 | 8938072 | Cryptographic key derivation device and method therefor | |||
1834 | 8935537 | Storage device and its control method | |||
1835 | 8930700 | Remote device secure data file storage system and method | |||
1836 | 8930699 | Short-range secure data communication method based on sound wave or audio, and apparatus thereof | |||
1837 | 8929555 | Data encryption systems and methods | |||
1838 | 8929554 | Secure multi-party communication with quantum key distribution managed by trusted authority | |||
2014 | |||||
1839 | 8924710 | Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key | |||
1840 | 8923520 | System and method for recovery key management | |||
1841 | 8923519 | Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens | |||
1842 | 8923518 | Key distribution system, key distribution method, and recording medium | |||
1843 | 8918897 | Dispersed storage network data slice integrity verification | |||
1844 | 8918651 | Cryptographic erasure of selected encrypted data | |||
1845 | 8918648 | Digital signature and key agreement schemes | |||
1846 | 8917872 | Encryption key storage with key fragment stores | |||
1847 | 8914646 | Information processing apparatus and information processing method for determining access permission | |||
1848 | 8913751 | Key management and node authentication method for sensor network | |||
1849 | 8913742 | Cryptographic processing system, key generation device, encryption device, decryption device, signature processing system, signature device, and verification device | |||
1850 | 8913741 | Method for performing a cryptographic task in an electronic hardware component | |||
1851 | 8909943 | Verifying identity | |||
1852 | 8908871 | Mobile internet protocol system and method for updating home agent root key | |||
1853 | 8908870 | Method and system for transferring information to a device | |||
1854 | 8908869 | Anchor point for digital content protection | |||
1855 | 8908868 | Key rotation with external workflows | |||
1856 | 8903084 | Efficient key derivation for end-to-end network security with traffic visibility | |||
1857 | 8897449 | Quantum computing on encrypted data | |||
1858 | 8897445 | Combination-based broadcast encryption method | |||
1859 | 8893307 | Information processing system and method for providing authorized content | |||
1860 | 8891772 | Cloud key escrow system | |||
1861 | 8891771 | Communication apparatus, communication method, and computer program | |||
1862 | 8891767 | Method and apparatus for direct counterfactual quantum communication | |||
1863 | 8886931 | Key sharing system, communication terminal, management device, key sharing method, and computer program | |||
1864 | 8885833 | One-time recovery credentials for encrypted data access | |||
1865 | 8885832 | Secure peer-to-peer distribution of an updatable keyring | |||
1866 | 8879738 | System and method of updating key based on communication cost and security damage cost | |||
1867 | 8879728 | Key creation and rotation for data encryption | |||
1868 | 8873754 | Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system | |||
1869 | 8868910 | Elliptic curve cryptographic signature | |||
1870 | 8868904 | Information processing device, disc, information processing method, and program | |||
1871 | 8867747 | Key generation for networks | |||
1872 | 8862867 | Method and system for protecting security of the third layer mobility user plane data in NGN | |||
1873 | 8861735 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
1874 | 8861733 | Method of personalizing a NFC chipset | |||
1875 | 8861726 | Method for generating cryptographic half-keys, and associated system | |||
1876 | 8861721 | System and method for securing scalar multiplication against simple power attacks | |||
1877 | 8856512 | Method and system for enterprise network single-sign-on by a manageability engine | |||
1878 | 8856510 | Method for joining user domain and method for exchanging information in user domain | |||
1879 | 8855318 | Master key generation and distribution for storage area network devices | |||
1880 | 8855316 | Quantum cryptography apparatus | |||
1881 | 8855315 | Method and system for realizing secure forking call session in IP multimedia subsystem | |||
1882 | 8848924 | Privacy-preserving location tracking for devices | |||
1883 | 8848923 | Key distribution scheme for networks of information | |||
1884 | 8843766 | Method and system for protecting against access to a machine code of a device | |||
1885 | 8842841 | Cryptographic method and system | |||
1886 | 8842832 | Method and apparatus for supporting security in muliticast communication | |||
1887 | 8837740 | Device and method for securing a negotiation of at least one cryptographic key between units | |||
1888 | 8837739 | Encryption messaging system | |||
1889 | 8837738 | Methods, systems, and apparatuses for optimal group key management for secure multicast communication | |||
1890 | 8837737 | Key management in a communication network | |||
1891 | 8837735 | Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing | |||
1892 | 8837730 | Apparatus and method for reducing channel reproduction delay in mobile terminal | |||
1893 | 8832442 | Method and device for securely distributing data in group communication | |||
1894 | 8831229 | Key transport method, memory controller and memory storage apparatus | |||
1895 | 8831228 | System and method for decentralized management of keys and policies | |||
1896 | 8825999 | Extending encrypting web service | |||
1897 | 8824687 | Method and system for pacing, acking, timing, and handicapping (path) for simultaneous receipt of documents employing encryption | |||
1898 | 8824686 | Cluster key synchronization | |||
1899 | 8824685 | Method for detection of a hacked decoder | |||
1900 | 8824684 | Dynamic, selective obfuscation of information for multi-party transmission | |||
1901 | 8824682 | Method and system for backing up encryption key generated on computer device and accessing encrypted information stored on computer device | |||
1902 | 8824674 | Information distribution system and program for the same | |||
1903 | 8819803 | Validating association of client devices with authenticated clients | |||
1904 | 8819720 | IPTV follow me content system and method | |||
1905 | 8819456 | Content receiving terminal, content exporting and reproducing method, and recording medium | |||
1906 | 8819436 | Protection method, decryption method, recording medium and terminal for said protection method | |||
1907 | 8819418 | Communication system, vehicle-mounted terminal, roadside device | |||
1908 | 8819410 | Private electronic information exchange | |||
1909 | 8819407 | Personal messaging security | |||
1910 | 8817990 | Kerberized handover keying improvements | |||
1911 | 8817975 | Cryptographic processing apparatus and operation method | |||
1912 | 8811611 | Encryption/decryption of digital data using related, but independent keys | |||
1913 | 8806199 | Writing application data to a secure element | |||
1914 | 8804965 | Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods | |||
1915 | 8804963 | Computer readable medium storing key generating program, computer readable medium storing key recording program, key generating device, PKI card, key recording system, key generating method and key recording method | |||
1916 | 8798687 | Cellular phone | |||
1917 | 8793488 | Detection of embedded resource location data | |||
1918 | 8792646 | Systems and methods for group key distribution and management for wireless communications systems | |||
1919 | 8792638 | Method to verify that a user has made an external copy of a cryptographic key | |||
1920 | 8787582 | Key implementation system | |||
1921 | 8787581 | Teired key communication system and method in support of controlled vendor message processing | |||
1922 | 8787579 | Key-based content management and access systems and methods | |||
1923 | 8781132 | Method and device for managing encrypted group rekeying in a radio network link layer encryption system | |||
1924 | 8781130 | Access control | |||
1925 | 8774415 | Key sharing device, key sharing method, and computer program product | |||
1926 | 8774414 | Method and apparatus for transmitting/receiving encryption information in a mobile broadcast system | |||
1927 | 8774403 | Key creation and rotation for data encryption | |||
1928 | 8769622 | Authentication and authorization methods for cloud computing security | |||
1929 | 8769289 | Authentication of a user accessing a protected resource using multi-channel protocol | |||
1930 | 8767954 | Methods and systems for deriving a cryptographic framework | |||
1931 | 8762728 | Method of performing authentication between network nodes | |||
1932 | 8762726 | System and method for secure access | |||
1933 | 8761403 | Method and system of secured data storage and recovery | |||
1934 | 8761402 | System and methods for digital content distribution | |||
1935 | 8761401 | System and method for secure key distribution to manufactured products | |||
1936 | 8761393 | Method and apparatus for providing secure internet protocol media services | |||
1937 | 8761390 | Production of cryptographic keys for an embedded processing device | |||
1938 | 8755527 | Key management policies for cryptographic keys | |||
1939 | 8750523 | Interoperable digital rights management | |||
1940 | 8750522 | Method and security system for the secure and unequivocal encoding of a security module | |||
1941 | 8750516 | Rekeying encryption keys for removable storage media | |||
1942 | 8750512 | Authenticating an ephemeral Diffie-Hellman using a trusted third party | |||
1943 | 8745405 | Dynamic seed and key generation from biometric indicia | |||
1944 | 8745392 | Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel | |||
1945 | 8744086 | Method and apparatus for distributing a quantum key | |||
1946 | 8744079 | Secure communication system | |||
1947 | 8738911 | Secure socket layer keystore and truststore generation | |||
1948 | 8738900 | Method and devices for secure communications in a telecommunications network | |||
1949 | 8737624 | Secure email communication system | |||
1950 | 8737623 | Systems and methods for remotely loading encryption keys in a card reader systems | |||
1951 | 8737622 | Method for importing rights object and rights issuer | |||
1952 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
1953 | 8732461 | Client apparatus, server apparatus, and program using entity authentication and biometric authentication | |||
1954 | 8732423 | Data encryption in a network memory architecture for providing data based on local accessibility | |||
1955 | 8731201 | Techniques for securing content in an untrusted environment | |||
1956 | 8731200 | Key distribution | |||
1957 | 8726023 | Authentication using GAA functionality for unidirectional network connections | |||
1958 | 8724817 | Secure management of keys in a key repository | |||
1959 | 8724812 | Methods for establishing a secure point-to-point call on a trunked network | |||
1960 | 8724803 | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system | |||
1961 | 8718282 | Apparatus and method for enabling a transfer of data | |||
1962 | 8713669 | Multi-domain dynamic group virtual private networks | |||
1963 | 8713597 | Authenticating and off-loading IPTV operations from mobile devices to fixed rendering viewing devices | |||
1964 | 8713321 | Method and apparatus for verifiable generation of public keys | |||
1965 | 8711843 | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |||
1966 | 8707450 | Digital rights management (DRM) locker | |||
1967 | 8705744 | Wireless sensor network key distribution | |||
1968 | 8705735 | Implicit certificate scheme | |||
1969 | 8700894 | Method and system for securing routing information of a communication using identity-based encryption scheme | |||
1970 | 8699714 | Distributed PUF | |||
1971 | 8699709 | Methods for obtaining authentication credentials for attaching a wireless device to a foreign 3GPP wireless domain | |||
1972 | 8698605 | Determining the validity of a connection between a reader and a transponder | |||
1973 | 8694789 | System and method for generating a non-repudiatable record of a data stream | |||
1974 | 8694786 | Virtual machine images encryption using trusted computing group sealing | |||
1975 | 8694782 | Wireless authentication using beacon messages | |||
1976 | 8694769 | System and method for controlling data communications between a server and a client device | |||
1977 | 8694768 | Determination and display of LUN encryption paths | |||
1978 | 8693695 | Systems and methods to securely generate shared keys | |||
1979 | 8693694 | Information recording device | |||
1980 | 8693692 | Direct delivery of content descrambling keys using chip-unique code | |||
1981 | 8693690 | Organizing an extensible table for storing cryptographic objects | |||
1982 | 8687814 | Securing encrypted virtual hard disks | |||
1983 | 8687810 | Chaotic cipher system and method for secure communication | |||
1984 | 8687806 | Conditional access system employing constrained encryption keys | |||
1985 | 8683229 | Data encryption device | |||
1986 | 8683194 | Method and devices for secure communications in a telecommunications network | |||
1987 | 8683189 | On-chip security method and apparatus | |||
1988 | 8682294 | Wireless transmission system | |||
1989 | 8681994 | Systems and methods for document control using public key encryption | |||
1990 | 8681993 | Local area network | |||
1991 | 8675876 | Differential phase shift keying quantum key distribution | |||
1992 | 8670565 | Encrypted packet communication system | |||
1993 | 8661248 | Method, apparatus, and system for sending and receiving security policy of multicast sessions | |||
1994 | 8654981 | System and method for conditional access key encryption | |||
1995 | 8654980 | Quantum key distribution method and apparatus | |||
1996 | 8654979 | Quantum key device | |||
1997 | 8654974 | Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices | |||
1998 | 8645715 | Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host | |||
1999 | 8645698 | Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network | |||
2000 | 8645499 | Image processing system, image processing apparatus, image processing method and recording medium | |||
2001 | 8644516 | Universal secure messaging for cryptographic modules | |||
2002 | 8639451 | Information processing system using nucleotide sequence-related information | |||
2003 | 8638944 | Security countermeasures for power analysis attacks | |||
2004 | 8638941 | Distributing keypairs between network appliances, servers, and other network assets | |||
2005 | 8634560 | Time-based secure key synchronization | |||
2006 | 8631227 | Processing encrypted electronic documents | |||
2007 | 8630421 | Cryptographic key backup and escrow system | |||
2008 | 8630420 | Method for auto-configuration of a network terminal address | |||
2009 | 8630418 | Secure management of keys in a key repository | |||
2010 | 8627091 | Generating a secure signature utilizing a plurality of key shares | |||
2011 | 8625805 | Digital security bubble | |||
2012 | 8625802 | Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management | |||
2013 | |||||
2013 | 8621210 | Ad-hoc trust establishment using visual verification | |||
2014 | 8619995 | Methods and apparatus related to address generation, communication and/or validation | |||
2015 | 8619992 | Secure key creation | |||
2016 | 8619990 | Secure key creation | |||
2017 | 8619979 | Physically unclonable function implemented through threshold voltage comparison | |||
2018 | 8615085 | Encrypted communication system with limited number of stored encryption key retrievals | |||
2019 | 8611543 | Method and system for providing a mobile IP key | |||
2020 | 8607301 | Deploying group VPNS and security groups over an end-to-end enterprise network | |||
2021 | 8605908 | Method and device for obtaining security key in relay system | |||
2022 | 8600064 | Apparatus, method, and computer program product for processing information | |||
2023 | 8600063 | Key distribution system | |||
2024 | 8600062 | Off-line content delivery system with layered encryption | |||
2025 | 8600061 | Generating secure device secret key | |||
2026 | 8600060 | Telecommunications device security | |||
2027 | 8600052 | Key generation device, encryption device, reception device, key generation method, key processing method, and program | |||
2028 | 8595505 | Apparatus and method for direct anonymous attestation from bilinear maps | |||
2029 | 8595485 | Security management method and system for WAPI terminal accessing IMS network | |||
2030 | 8594334 | Key management method | |||
2031 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
2032 | 8588426 | Methods and apparatus to secure communications in a mobile network | |||
2033 | 8588425 | Encryption key recovery in the event of storage management failure | |||
2034 | 8588423 | Group/multicast key distribution method and update method based upon unicast session key and base station | |||
2035 | 8588420 | Systems and methods for determining a time delay for sending a key update request | |||
2036 | 8583560 | Method and apparatus for third party control of a device | |||
2037 | 8582779 | System and method for secure communications in a communication system | |||
2038 | 8582777 | Method and system for lightweight key distribution in a wireless network | |||
2039 | 8582775 | Method of securing and authenticating data using micro-certificates | |||
2040 | 8582759 | Method and apparatus for providing content service | |||
2041 | 8581618 | Apparatus for controlling the usability of intellectual property within a programmable device and method of using | |||
2042 | 8578166 | System and method for authentication, data transfer, and protection against phishing | |||
2043 | 8577044 | Method and apparatus for automatic and secure distribution of an asymmetric key security credential in a utility computing environment | |||
2044 | 8577043 | System and service to facilitate encryption in data storage devices | |||
2045 | 8577042 | Location-based security, privacy, access control and monitoring system | |||
2046 | 8577039 | Cryptographic communication apparatus and cryptographic communication system | |||
2047 | 8577038 | Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number | |||
2048 | 8572389 | System and method for protecting master encryption keys | |||
2049 | 8571223 | Method for combining authentication and secret keys management mechanism in a sensor network | |||
2050 | 8565438 | Method of storing broadcast contents in mobile broadcast service terminal | |||
2051 | 8565436 | Secure self managed data (SSMD) | |||
2052 | 8561158 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
2053 | 8560835 | Method and apparatus for machine-to-machine communication | |||
2054 | 8553888 | Generation of communication device signatures for use in securing nomadic electronic transactions | |||
2055 | 8553887 | Method for generating dynamic group key | |||
2056 | 8549605 | System and method for automatically establishing new session with interactive service after previous session expiration | |||
2057 | 8549299 | Accelerated key agreement with assisted computations | |||
2058 | 8549298 | Secure online service provider communication | |||
2059 | 8548172 | Secure dissemination of events in a publish/subscribe network | |||
2060 | 8548167 | System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module revocation method used for securing broadcasted messages | |||
2061 | 8548163 | Simultaneous scalar multiplication method | |||
2062 | 8543808 | Trusted intermediary for network data processing | |||
2063 | 8542825 | Imparting cryptographic information in network communications | |||
2064 | 8539606 | Data protection method and data protection system | |||
2065 | 8539220 | Secure computation using a server module | |||
2066 | 8538030 | Use of graphics processors as parallel math co-processors for password recovery | |||
2067 | 8538029 | Encryption key fragment distribution | |||
2068 | 8538012 | Performing AES encryption or decryption in multiple modes with a single instruction | |||
2069 | 8532303 | Symmetric key distribution framework for the internet | |||
2070 | 8532302 | System and method for registering a personal computing device to a service processor | |||
2071 | 8532300 | Symmetric is encryption key management | |||
2072 | 8527765 | Shared secret verification method and system | |||
2073 | 8527759 | IMS user equipment, control method thereof, host device, and control method thereof | |||
2074 | 8526621 | Method and apparatus for time-lapse cryptography | |||
2075 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
2076 | 8522014 | Method and system for storing a key in a remote security module | |||
2077 | 8520840 | System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet | |||
2078 | 8516566 | Systems and methods for using external authentication service for Kerberos pre-authentication | |||
2079 | 8516259 | Verifying authenticity of voice mail participants in telephony networks | |||
2080 | 8515080 | Method, system, and computer program product for encryption key management in a secure processor vault | |||
2081 | 8515077 | Automatic application management in a short-range wireless system | |||
2082 | 8515057 | Method and device for executing crytographic calculation | |||
2083 | 8510561 | Methods and devices for computing a shared encryption key | |||
2084 | 8510552 | System and method for file-level data protection | |||
2085 | 8509446 | Time-bin polarization format exchange technique for entangled optical source | |||
2086 | 8509443 | Rekey index generation method and rekey index generation apparatus | |||
2087 | 8505076 | Proactive authentication | |||
2088 | 8503538 | Method, apparatus, system, and program for content encoding, content distribution, and content reception | |||
2089 | 8495380 | Methods and systems for server-side key generation | |||
2090 | 8494154 | Cryptographic ignition key system | |||
2091 | 8489885 | Method and device for managing digital content | |||
2092 | 8488794 | Method for access control to a scrambled content | |||
2093 | 8488788 | Method for simulcrypting scrambled data to a plurality of conditional access devices | |||
2094 | 8483393 | Key management system for digital cinema | |||
2095 | 8479020 | Method and apparatus for providing an asymmetric encrypted cookie for product data storage | |||
2096 | 8479000 | Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit | |||
2097 | 8478995 | Method of encrypting and transferring data between a sender and a receiver using a network | |||
2098 | 8474052 | User-administered license state verification | |||
2099 | 8472629 | Communication system, communication device and processing method therefor | |||
2100 | 8472628 | Method of handling security key change and related communication device | |||
2101 | 8472620 | Generation of device dependent RSA key | |||
2102 | 8467536 | Binding keys to secure media streams | |||
2103 | 8467535 | Accelerated verification of digital signatures and public keys | |||
2104 | 8467532 | System and method for secure transaction of data between a wireless communication device and a server | |||
2105 | 8464062 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
2106 | 8464049 | Method and system of accessing copy-prevented encrypted data resources over a network | |||
2107 | 8462955 | Key protectors based on online keys | |||
2108 | 8462954 | Content encryption using at least one content pre-key | |||
2109 | 8462953 | Communication system and method thereof | |||
2110 | 8457318 | Method and system for continuously transmitting encrypted data of broadcast service to mobile terminal | |||
2111 | 8457317 | Method for data privacy in a fixed content distributed data storage | |||
2112 | 8452016 | Interoperable keychest for use by service providers | |||
2113 | 8452014 | Group key management for mobile ad-hoc networks | |||
2114 | 8452012 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
2115 | 8447978 | Wireless communication method using WPS | |||
2116 | 8447037 | Key tree construction and key distribution method for hierarchical role-based access control | |||
2117 | 8437477 | Key information issuing device, wireless operation device, and program | |||
2118 | 8437476 | Hybrid method for distributing keys for the diffusion of encrypted data | |||
2119 | 8433070 | Systems and methods for stabilization of interferometers for quantum key distribution | |||
2120 | 8423470 | Distributed secure anonymous conferencing | |||
2121 | 8421593 | Apparatus, systems and methods for authentication of objects having multiple components | |||
2122 | 8416955 | Method for determining functions applied to signals | |||
2123 | 8416949 | Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system | |||
2124 | 8413147 | Method, apparatus and system for making a decision about virtual machine migration | |||
2125 | 8412948 | Method and apparatus for digital signature generation and validation | |||
2126 | 8412942 | Method and system for seamless SSID creation, authentication and encryption | |||
2127 | 8412784 | Storage model for maintaining structured document fidelity | |||
2128 | 8411867 | Scalable and secure key management for cryptographic data processing | |||
2129 | 8411865 | Key management method for broadcast encryption in tree topology network | |||
2130 | 8411850 | Password searching method and system in multi-node parallel-processing environment | |||
2131 | 8407466 | Controlling download and playback of media content | |||
2132 | 8402519 | Transparent client authentication | |||
2133 | 8401195 | Method of automatically populating a list of managed secure communications group members | |||
2134 | 8396222 | Key distribution system | |||
2135 | 8392703 | Electronic signature verification method implemented by secret key infrastructure | |||
2136 | 8392684 | Data encryption in a network memory architecture for providing data based on local accessibility | |||
2137 | 8391497 | Method for importing rights object and rights issuer | |||
2138 | 8391496 | Smart energy network configuration using an auxiliary gateway | |||
2139 | 8391495 | Secure shell used to open a user's encrypted file system keystore | |||
2140 | 8387152 | Attested content protection | |||
2141 | 8380167 | LAN-based UMA network controller with proxy connection | |||
2142 | 8379867 | Secure email communication system | |||
2143 | 8379866 | Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor | |||
2144 | 8379865 | Multikey support for multiple office system | |||
2145 | 8379857 | Secure key distribution for private communication in an unsecured communication channel | |||
2146 | 8375207 | Method and apparatus for authenticating a network device | |||
2147 | 8374354 | System and method to pass a private encryption key | |||
2148 | 8374350 | Quantum communication system | |||
2149 | 8369530 | Network set-up device | |||
2150 | 8369529 | Re-keying based on pre-generated keys | |||
2151 | 8364964 | Registering client devices with a registration server | |||
2152 | 8364958 | Sharing a secret via linear interpolation | |||
2153 | 8363841 | Method for managing and controlling the access keys to services in a communication system | |||
2154 | 8363834 | Systems and methods for complex encryption keys | |||
2155 | 8351610 | Communication system and communication method | |||
2156 | 8347376 | Techniques for distributing a new communication key within a virtual private network | |||
2157 | 8347073 | Inspection and rewriting of cryptographically protected data from group VPNs | |||
2158 | 8345881 | Communication system, information processing apparatus, method and computer program | |||
2159 | 8345862 | Method of sharing a strong secret between two parties, one of whom has little processing power | |||
2012 | |||||
2160 | 8340300 | Non-disruptive authentication administration | |||
2161 | 8340299 | Key management system and method | |||
2162 | 8340298 | Key management and user authentication for quantum cryptography networks | |||
2163 | 8340296 | Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains | |||
2164 | 8335921 | Writing application data to a secure element | |||
2165 | 8335490 | Roaming Wi-Fi access in fixed network architectures | |||
2166 | 8335314 | Adaptive and secure modular connection | |||
2167 | 8332629 | Mail certificate responder | |||
2168 | 8331568 | Efficient distribution of computation in key agreement | |||
2169 | 8331567 | Methods and apparatuses for generating dynamic pairwise master keys using an image | |||
2170 | 8325928 | Security countermeasure for power analysis attacks | |||
2171 | 8325927 | Anchor point-based digital content protection with an escrow anchor point | |||
2172 | 8325926 | Method for providing a broadcast encryption based home security system | |||
2173 | 8320570 | Apparatus and method for generating secret key | |||
2174 | 8320558 | Encryption of synchronization information | |||
2175 | 8316461 | Method for sharing rights objects between users | |||
2176 | 8315395 | Nearly-stateless key escrow service | |||
2177 | 8315393 | System for on-line and off-line decryption | |||
2178 | 8315386 | Method and apparatus for performing VoIP-based communication using bio keys | |||
2179 | 8312279 | Secure modem gateway concentrator | |||
2180 | 8312277 | Method and system for secure communication between computers | |||
2181 | 8311221 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
2182 | 8311216 | Packet cipher algorithm based encryption processing device | |||
2183 | 8310346 | Verification of movement of items | |||
2184 | 8307455 | Decryption-key distribution method and authentication apparatus | |||
2185 | 8307217 | Trusted storage | |||
2186 | 8306230 | Information processing apparatus playing encrypted content distributed through network | |||
2187 | 8306228 | Universal secure messaging for cryptographic modules | |||
2188 | 8301909 | System and method for managing external storage devices | |||
2189 | 8300832 | System and method for copy protection for digital signals | |||
2190 | 8300830 | Secure group communications | |||
2191 | 8300829 | Verification key handling | |||
2192 | 8296829 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
2193 | 8295492 | Automated key management system | |||
2194 | 8295491 | Method for aggregating data in a network | |||
2195 | 8295490 | Method and system for storing and providing an encryption key for data storage | |||
2196 | 8295489 | Method for sharing a link key in a ZigBee network and a communication system therefor | |||
2197 | 8295488 | Exchange of key material | |||
2198 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
2199 | 8291235 | Method and system for controlling access of clients and users to a print server | |||
2200 | 8290152 | Management system for web service developer keys | |||
2201 | 8285994 | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |||
2202 | 8284945 | Automatic change of symmetrical encryption key | |||
2203 | 8284944 | Unified and persistent system and method for automatic configuration of encryption | |||
2204 | 8284943 | IP encryption over resilient BGP/MPLS IP VPN | |||
2205 | 8284932 | Imparting cryptographic information in network communications | |||
2206 | 8284930 | Simultaneous scalar multiplication method | |||
2207 | 8281135 | Enforcing use of chipset key management services for encrypted storage devices | |||
2208 | 8280059 | Method, system and device for generating group key | |||
2209 | 8280020 | Transparent caller name authentication for authorized third party callers | |||
2210 | 8270614 | Method of updating group key and group key update device using the same | |||
2211 | 8261357 | Systems and methods for license entitlement key distribution | |||
2212 | 8261061 | Methods and systems for encouraging secure communications | |||
2213 | 8259951 | Method and system for managing encryption key | |||
2214 | 8259950 | Method for secure key management using multi-threshold secret sharing | |||
2215 | 8259948 | Virtual TPM key migration using hardware keys | |||
2216 | 8255679 | Receiver and receiving method | |||
2217 | 8254891 | Initiating contact using protected contact data in an electronic directory | |||
2218 | 8254581 | Lightweight key distribution and management method for sensor networks | |||
2219 | 8254580 | Key distribution in a hierarchy of nodes | |||
2220 | 8254578 | Process of manufacturing a handheld device, involving keys | |||
2221 | 8254577 | Validation of encryption key | |||
2222 | 8250665 | Digital Broadcasting system and method of processing data in digital broadcasting system | |||
2223 | 8250375 | Generating unique data from electronic devices | |||
2224 | 8245042 | Shielding a sensitive file | |||
2225 | 8244303 | Apparatus and method for transmitting a plurality of key data | |||
2226 | 8243934 | Electronic device and encryption method thereof | |||
2227 | 8243933 | Method for sharing secret information among cooperating parties | |||
2228 | 8238559 | IPTV follow me content system and method | |||
2229 | 8230223 | Approach for managing access to messages using encryption key management policies | |||
2230 | 8229857 | Secure pre-recorded digital medium | |||
2231 | 8225415 | Content distribution system, terminal, and server | |||
2232 | 8225108 | Method and system for mixed symmetric and asymmetric encryption of .ZIP files | |||
2233 | 8225089 | Electronic transaction systems utilizing a PEAD and a private key | |||
2234 | 8223974 | Self-healing encryption keys | |||
2235 | 8219808 | Session-based public key infrastructure | |||
2236 | 8218771 | Information processing apparatus and computer readable medium | |||
2237 | 8214652 | Biometric identification network security | |||
2238 | 8213901 | Subscriber identities | |||
2239 | 8213620 | Method for managing cryptographic information | |||
2240 | 8213619 | Method and apparatus for establishing communication via service provider | |||
2241 | 8213611 | Two-stage block synchronization and scrambling | |||
2242 | 8213608 | Roaming utilizing an asymmetric key pair | |||
2243 | 8209546 | Data-securing method of program tool | |||
2244 | 8209545 | FPGA configuration bitstream protection using multiple keys | |||
2245 | 8208638 | Set of equipment for secure direct information transfer over the internet | |||
2246 | 8208637 | Migration of computer secrets | |||
2247 | 8208636 | Method for transmitting/receiving encryption information in a mobile broadcast system, and system therefor | |||
2248 | 8204232 | Accelerated verification of digital signatures and public keys | |||
2249 | 8204231 | Method and device for managing cryptographic keys in secret communications network | |||
2250 | 8204230 | Communication device, method for establishing a communication connection and method for using a communication connection | |||
2251 | 8204228 | Group key management re-registration method | |||
2252 | 8199916 | Selectively loading security enforcement points with security association information | |||
2253 | 8196194 | Method and network for securely delivering streaming data | |||
2254 | 8195933 | Method and system for computing digital certificate trust paths using transitive closures | |||
2255 | 8194858 | Chaotic cipher system and method for secure communication | |||
2256 | 8189966 | QKD arrangement | |||
2257 | 8189794 | System and method for effectively performing data restore/migration procedures | |||
2258 | 8189793 | Key terminal apparatus, crypto-processing LSI, unique key generation method, and content system | |||
2259 | 8189789 | Intrusion-tolerant group management for mobile ad-hoc networks | |||
2260 | 8185947 | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network | |||
2261 | 8180342 | System, method and computer program product for delivering a service guide of a first broadcast/multicast system as a program of a second broadcast/multicast system | |||
2262 | 8180060 | Telemedical system | |||
2263 | 8180051 | Methods and apparatus for securing communications of a user operated device | |||
2264 | 8179860 | Systems and method for performing handovers, or key management while performing handovers in a wireless communication system | |||
2265 | 8175277 | Intercepting a communication session in a telecommunication network | |||
2266 | 8171293 | Receiver non-repudiation via a secure device | |||
2267 | 8171292 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
2268 | 8170216 | Techniques for validating and sharing secrets | |||
2269 | 8161565 | Key release systems, components and methods | |||
2270 | 8161278 | System and method for distributing keys in a wireless network | |||
2271 | 8160257 | Tape failover across a cluster | |||
2272 | 8155321 | Methods and apparatus for protecting digital content | |||
2273 | 8150040 | Key providing system, terminal device, and information processing method | |||
2274 | 8145707 | Sending digitally signed emails via a web-based email system | |||
2275 | 8145270 | Smart card and method for generating response message to be delivered to mobile terminal supporting mobile broadcast, and mobile terminal therefor | |||
2276 | 8144877 | Method and apparatus for updating a key in an active state | |||
2277 | 8135134 | Systems and methods for managing cryptographic keys | |||
2278 | 8130965 | Retrieval and transfer of encrypted hard drive content from DVR set-top boxes to a content transcription device | |||
2279 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
2280 | 8130959 | Rekeying encryption for removable storage media | |||
2281 | 8127367 | Refreshing software licenses | |||
2282 | 8126150 | Storage medium processing method, storage medium processing device, and program | |||
2283 | 8126146 | Method of quantum cryptography using blind photon polarization quibits with multiple stages | |||
2284 | 8121296 | Method and apparatus for security in a data processing system | |||
2285 | 8121290 | Pseudo-random function calculating device and method and number-limited anonymous authentication system and method | |||
2286 | 8121289 | Cryptographic method with integrated encryption and revocation, system, device and programs for implementing this method | |||
2287 | 8116455 | System and method for securely initializing and booting a security appliance | |||
2288 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
2289 | 8116243 | Wireless sensor network and adaptive method for monitoring the security thereof | |||
2290 | 8112790 | Methods and apparatus for authenticating a remote service to another service on behalf of a user | |||
2291 | 8108674 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith | |||
2292 | 8107630 | Apparatus and method for managing stations associated with WPA-PSK wireless network | |||
2293 | 8103883 | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | |||
2294 | 8103001 | Method for verifying rights contained in a security module | |||
2295 | 8099607 | Asymmetric crypto-graphy with rolling key security | |||
2296 | 8099602 | Methods for integrating security in network communications and systems thereof | |||
2297 | 8099592 | System and method for controlling data communications between a server and a client device | |||
2298 | 8098829 | Methods and systems for secure key delivery | |||
2299 | 8098828 | Key distribution | |||
2300 | 8098827 | Data processing system, data processing method, and program providing medium | |||
2301 | 8098826 | QKD system laser autocalibration based on bit-error rate | |||
2302 | 8098822 | Secure communication system and method using shared random source for key changing | |||
2303 | 8095804 | Storing deleted data in a file system snapshot | |||
2304 | 8094824 | Encrypting device, decrypting device, information system, encrypting method, decrypting method, and program | |||
2305 | 8094823 | Extended diffie-hellman group key generation | |||
2306 | 8094820 | Information recording/reproducing device | |||
2307 | 8091138 | Method and apparatus for controlling the presentation of confidential content | |||
2011 | |||||
2308 | 8085938 | Secret information management scheme based on secret sharing scheme | |||
2309 | 8085937 | System and method for securing calls between endpoints | |||
2310 | 8082443 | Pedigrees for quantum cryptography | |||
2311 | 8081760 | Offline message security via selective data replication | |||
2312 | 8081754 | Key update method and apparatus thereof | |||
2313 | 8077861 | Permutation data transform to enhance security | |||
2314 | 8068614 | Methods and apparatus for batch bound authentication | |||
2315 | 8068612 | Security device for cryptographic communications | |||
2316 | 8060918 | Method and system for verifying identity | |||
2317 | 8060902 | System for receiving broadcast digital data comprising a master digital terminal, and at least one slave digital terminal | |||
2318 | 8059964 | QKD system with common-mode dithering | |||
2319 | 8059821 | Method and system for disaster recovery in network systems | |||
2320 | 8059819 | Systems and methods for distributing updates for a key at a maximum rekey rate | |||
2321 | 8059816 | Secret sharing technique with low overhead information content | |||
2322 | 8055911 | Method for backing up and restoring an encryption key | |||
2323 | 8054978 | Key management for content protection | |||
2324 | 8054977 | Monitoring apparatus, method of controlling the monitoring apparatus, and program therefor | |||
2325 | 8054976 | Quantum key distribution apparatus and method | |||
2326 | 8054974 | Opportunistic use of null packets during encryption/decryption | |||
2327 | 8054973 | User key management method for broadcast encryption (BE) | |||
2328 | 8050566 | System and methods for quantum key distribution over WDM links | |||
2329 | 8050410 | Distributed encryption methods and systems | |||
2330 | 8050409 | Threshold and identity-based key management and authentication for wireless ad hoc networks | |||
2331 | 8050405 | Shared key encryption using long keypads | |||
2332 | 8045716 | System and method for the concealment of device input parameters | |||
2333 | 8045715 | Method of handling security key change and related communication device | |||
2334 | 8045705 | Simultaneous scalar multiplication method | |||
2335 | 8041944 | Group signature system and information processing method | |||
2336 | 8041039 | Secret communications system and channel control method | |||
2337 | 8037319 | System and method for securely storing cryptographic keys with encrypted data | |||
2338 | 8036387 | Method for the transmission of management data | |||
2339 | 8032926 | Method of configuring hierarchical network of user group and resource group and key distribution center | |||
2340 | 8032744 | Method and apparatus for self-authenticating digital records | |||
2341 | 8031875 | Key distribution in unidirectional channels with applications to RFID | |||
2342 | 8031867 | Method of verifying the integrity of an encryption key obtained by combining key parts | |||
2343 | 8028157 | On-chip security method and apparatus | |||
2344 | 8023658 | Method and apparatus for updating a key in an active state | |||
2345 | 8023657 | Cryptography and certificate authorities in gaming machines | |||
2346 | 8019085 | System and method for sending encrypted messages to a distribution list | |||
2347 | 8019084 | Automated banking machine remote key load system and method | |||
2348 | 8019080 | Method and apparatus for providing content service | |||
2349 | 8014530 | Method and apparatus for authenticated, recoverable key distribution with no database secrets | |||
2350 | 8014527 | Apparatus and method for reusing pair of public and private keys | |||
2351 | 8014526 | Secure wireless local or metropolitan area network and related methods | |||
2352 | 8014523 | Key management | |||
2353 | 8010810 | Techniques for protecting data using an electronic encryption endpoint device | |||
2354 | 8010809 | Method and system for securing network data | |||
2355 | 8010782 | Method and system for mediated secure computation | |||
2356 | 8009984 | Method and apparatus for measuring optical power of very weak light, and optical communication system using the same | |||
2357 | 8009831 | Method and system for hiding the decryption key in a dispersive way | |||
2358 | 8006102 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
2359 | 8005227 | Key information consistency checking in encrypting data storage system | |||
2360 | 8001391 | Method of encrypting and decrypting data stored on a storage device using an embedded encryption/decryption means | |||
2361 | 8000478 | Key handshaking method and system for wireless local area networks | |||
2362 | 8000476 | Data encryption/decryption method, and device | |||
2363 | 7996673 | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |||
2364 | 7995766 | Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor | |||
2365 | 7995763 | User apparatus and program | |||
2366 | 7995762 | Key issuing method, group signature system, information processing apparatus, and program | |||
2367 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
2368 | 7987366 | Key management for network elements | |||
2369 | 7987359 | Information communication system, information communication apparatus and method, and computer program | |||
2370 | 7983423 | Re-keying based on pre-generated keys | |||
2371 | 7983422 | Quantum cryptography | |||
2372 | 7978858 | Terminal device, group management server, network communication system, and method for generating encryption key | |||
2373 | 7975147 | Electronic device network supporting enciphering and deciphering and update generation in electronic devices | |||
2374 | 7975141 | Method of sharing bus key and apparatus therefor | |||
2375 | 7974926 | Content use system, information terminal, and settlement system | |||
2376 | 7974416 | Providing a secure execution mode in a pre-boot environment | |||
2377 | 7971062 | Token-based encryption key secure conveyance | |||
2378 | 7970135 | Method for the secure, distributed generation of an encryption key | |||
2379 | 7970133 | System and method for secure and flexible key schedule generation | |||
2380 | 7965846 | Client distributed system and inter-client RTP encrypting method | |||
2381 | 7965845 | System and methods for efficient authentication of medical wireless ad hoc network nodes | |||
2382 | 7961887 | Content distribution system and tracking system | |||
2383 | 7961878 | Imparting cryptographic information in network communications | |||
2384 | 7958364 | System and method for digitally signing electronic documents | |||
2385 | 7958356 | System and method for establishing a shared secret among nodes of a security appliance | |||
2386 | 7958351 | Method and apparatus for multi-level security implementation | |||
2387 | 7957537 | Information processing system and method using encryption key block | |||
2388 | 7957532 | Data protection for a mobile device | |||
2389 | 7949138 | Secure instant messaging | |||
2390 | 7949137 | Virtual disk management methods | |||
2391 | 7949136 | Security circuit having an electrical fuse ROM | |||
2392 | 7945779 | Securing a communications exchange between computers | |||
2393 | 7945053 | Methods and apparatus for a keying mechanism for end-to-end service control protection | |||
2394 | 7945052 | Method of distributing a decryption key in fixed-content data | |||
2395 | 7940935 | Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium | |||
2396 | 7936883 | Quantum key distribution protocol | |||
2397 | 7936871 | Altering the size of windows in public key cryptographic computations | |||
2398 | 7936869 | Verifying digital signature based on shared knowledge | |||
2399 | 7933413 | Key exchange verification | |||
2400 | 7933408 | Asynchronous download | |||
2401 | 7930537 | Architecture for encrypted application installation | |||
2402 | 7929707 | Use of graphics processors as parallel math co-processors for password recovery | |||
2403 | 7929706 | Encryption key restoring method, information processing apparatus, and encryption key restoring program | |||
2404 | 7929705 | Method of managing user key for broadcast encryption | |||
2405 | 7929694 | Variable length private key generator and method thereof | |||
2406 | 7925027 | Secure address proxying using multi-key cryptographically generated addresses | |||
2407 | 7925026 | Systems and methods for providing autonomous security | |||
2408 | 7925025 | Method for broadcast encryption and key revocation of stateless receivers | |||
2409 | 7925024 | Method and system for data encryption/decryption key generation and distribution | |||
2410 | 7925023 | Method and apparatus for managing cryptographic keys | |||
2411 | 7921283 | Method for real-time data authentication | |||
2412 | 7917946 | Method and network for securely delivering streaming data | |||
2413 | 7916871 | Technique for split knowledge backup and recovery of a cryptographic key | |||
2414 | 7916870 | Systems and methods for document control using public key encryption | |||
2415 | 7916865 | Dynamically shifting control word | |||
2416 | 7913309 | Information rights management | |||
2417 | 7913301 | Remote feature activation authentication file system | |||
2418 | 7912224 | Wireless network system and communication method for external device to temporarily access wireless network | |||
2419 | 7907733 | Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station | |||
2420 | 7904709 | System and method for controlling data communications between a server and a client device | |||
2421 | 7903821 | Method for managing key in multimedia broadcast and multicast service | |||
2422 | 7903820 | Key production system | |||
2423 | 7899475 | Enhanced short message service (SMS) | |||
2424 | 7899190 | Security countermeasures for power analysis attacks | |||
2425 | 7899188 | Method and system to authenticate a peer in a peer-to-peer network | |||
2426 | 7895666 | Data structure representation using hash-based directed acyclic graphs and related method | |||
2427 | 7895450 | Data management system, data management method and storage medium storing program for data management | |||
2428 | 7895432 | Method and apparatus for using a third party authentication server | |||
2429 | 7894607 | System, method and media drive for selectively encrypting a data packet | |||
2430 | 7894606 | Systems and methods for facilitating secure key distribution to an embedded device | |||
2431 | 7894604 | Quantum cryptographic communication apparatus | |||
2432 | 7890997 | Remote feature activation authentication file system | |||
2433 | 7890995 | System and method for remote management of communications networks | |||
2434 | 7890759 | Connection assistance apparatus and gateway apparatus | |||
2435 | 7890758 | Apparatus and method for generating keys in a network computing environment | |||
2436 | 7890757 | Receiver non-repudiation | |||
2437 | 7889863 | Recording device, recording medium, and content protection system | |||
2438 | 7886364 | Encrypted key cache | |||
2439 | 7885413 | Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data | |||
2440 | 7885412 | Pre-generation of generic session keys for use in communicating within communications environments | |||
2441 | 7882368 | System for publishing content on a portable digital storage medium | |||
2442 | 7882359 | Method and system for user attestation-signatures with attributes | |||
2443 | 7882354 | Use of device driver to function as a proxy between an encryption capable tape drive and a key manager | |||
2444 | 7881478 | Method for controlling access to an encrypted programme | |||
2445 | 7881477 | Method for key distribution in a hierarchical multicast traffic security system for an internetwork | |||
2446 | 7881472 | Quantum key distribution method and communication apparatus | |||
2447 | 7881470 | Network mobility security management | |||
2448 | 7876902 | Distribution of encrypted software update to reduce attack window | |||
2449 | 7873987 | Content distribution system and distribution method, and content processing device and processing method | |||
2450 | 7873170 | Maintaining keys removed from a keystore in an inactive key repository | |||
2451 | 7873169 | Methods, devices and systems for generating anonymous public keys in a secure communication system | |||
2452 | 7873168 | Secret information management apparatus and secret information management system | |||
2453 | 7869605 | Method for generating group key | |||
2454 | 7864960 | Techniques for securing content in an untrusted environment | |||
2455 | 7864954 | Method and system for encryption and authentication | |||
2010 | |||||
2456 | 7860255 | Content distribution server, key assignment method, content output apparatus, and key issuing center | |||
2457 | 7860254 | Computer system security via dynamic encryption | |||
2458 | 7860247 | Identity based encryption | |||
2459 | 7859744 | Tunable compact entangled-photon source and QKD system using same | |||
2460 | 7856664 | Method, system and computer program for a secure backup license server in a license management system | |||
2461 | 7853801 | System and method for providing authenticated encryption in GPON network | |||
2462 | 7853691 | Method and system for securing a network utilizing IPsec and MACsec protocols | |||
2463 | 7853020 | Systems and methods for enhanced quantum key formation using an actively compensated QKD system | |||
2464 | 7853019 | Tape failover across a cluster | |||
2465 | 7853018 | Method and apparatus for hiding a private key | |||
2466 | 7849329 | Licensing the use of a particular feature of software | |||
2467 | 7849314 | Method and system for secure authentication in a wireless network | |||
2468 | 7844818 | Authentication apparatus and method for home network devices | |||
2469 | 7840810 | Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key | |||
2470 | 7840010 | Interactive security control system with conflict checking | |||
2471 | 7836300 | Security integrated circuit | |||
2472 | 7835528 | Method and apparatus for refreshing keys within a bootstrapping architecture | |||
2473 | 7831051 | Secure communication between a hardware device and a computer | |||
2474 | 7831050 | Fast multi-photon key distribution scheme secured by quantum noise | |||
2475 | 7831045 | Security module revocation method used for securing broadcasted messages | |||
2476 | 7827403 | Method and apparatus for encrypting and decrypting data in a database table | |||
2477 | 7826749 | Method and system for quantum key distribution over multi-user WDM network with wavelength routing | |||
2478 | 7826620 | Information processor, information processing method, and computer program | |||
2479 | 7826619 | Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device | |||
2480 | 7823190 | System and method for implementing a distributed keystore within an enterprise network | |||
2481 | 7822209 | Methods and systems for key recovery for a token | |||
2482 | 7822206 | Systems and methods for management and auto-generation of encryption keys | |||
2483 | 7822205 | Multiple matching control method | |||
2484 | 7818579 | Information processor having information dispersing function | |||
2485 | 7817986 | Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices | |||
2486 | 7817802 | Cryptographic key management in a communication network | |||
2487 | 7813512 | Encrypted communication system and communication device | |||
2488 | 7813511 | Facilitating mobility for a mobile station | |||
2489 | 7813510 | Key management for group communications | |||
2490 | 7813509 | Key distribution method | |||
2491 | 7809939 | Trusted point-to-point communication over open bus | |||
2492 | 7805614 | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) | |||
2493 | 7805611 | Method for secure communication from chip card and system for performing the same | |||
2494 | 7801309 | Private key delivery system and a private key delivery method | |||
2495 | 7801302 | Cryptographic method and apparatus | |||
2496 | 7796763 | Method and system for disaster recovery of data from a storage device | |||
2497 | 7796762 | Communication system, common key control apparatus, and general communication apparatus | |||
2498 | 7796760 | Approach for managing access to messages using encryption key management policies | |||
2499 | 7792288 | Communication system using quantum cryptography and comprising switching stations | |||
2500 | 7788728 | Method and apparatus for limiting number of times contents can be accessed using hash chain | |||
2501 | 7787629 | Use of graphics processors as parallel math co-processors for password recovery | |||
2502 | 7787619 | Method and apparatus for secure key management using multi-threshold secret sharing | |||
2503 | 7783046 | Probabilistic cryptographic key identification with deterministic result | |||
2504 | 7783044 | System for on-line and off-line decryption | |||
2505 | 7783043 | Secure group communications | |||
2506 | 7783042 | Communication system and synchronization method thereof | |||
2507 | 7779262 | Security method using electronic signature | |||
2508 | 7779251 | Information communication apparatus and method, information communication system, and memory medium | |||
2509 | 7778423 | Method for establishing a common key for a group of at least three subscribers | |||
2510 | 7778422 | Security associations for devices | |||
2511 | 7778414 | Encryption method based on factorization | |||
2512 | 7774597 | System and method for nodes communicating in a shared network segment | |||
2513 | 7773972 | Functionality and policies based on wireless device dynamic associations | |||
2514 | 7769177 | Method for managing digital rights in broadcast/multicast service | |||
2515 | 7769173 | Methods and systems for executing bit-commitment protocols that are based on entangled quantum states and a third party | |||
2516 | 7769166 | Dual mode AES implementation to support single and multiple AES operations | |||
2517 | 7768692 | Single-photon generator | |||
2518 | 7765582 | Identity-based-encryption messaging system with public parameter host servers | |||
2519 | 7760885 | Method of distributing encryption keys among nodes in mobile ad hoc network and network device using the same | |||
2520 | 7760884 | Cryptographic method and devices for facilitating calculations during transactions | |||
2521 | 7760883 | Any-point-to-any-point (AP2AP) quantum key distribution protocol for optical ring network | |||
2522 | 7752449 | System and method for generating a non-repudiatable record of a data stream | |||
2523 | 7751570 | Method and apparatus for managing cryptographic keys | |||
2524 | 7751567 | Local authentication of mobile subscribers outside their home systems | |||
2525 | 7747025 | Method and apparatus for maintaining privacy of data decryption keys in configuration bitstream decryption | |||
2526 | 7747023 | Multi-user quantum cryptography method and system using wavelength division multiplexing | |||
2527 | 7747016 | Data transmitting/receiving method, data transmission apparatus, data reception apparatus, data transmission/reception system, AV contents transmitting method, AV contents receiving method, AV contents transmission apparatus, AV contents reception apparatus, and program recording medium | |||
2528 | 7747014 | Information transmission system, and information sending apparatus and information receiving apparatus used therein | |||
2529 | 7743249 | Method of securing a document in a system and controlling access to the document and a seal for use in the method | |||
2530 | 7738663 | Light-weight key distribution scheme in wireless network | |||
2531 | 7734181 | Devices, systems and methods for ad hoc wireless communication | |||
2532 | 7734052 | Method and system for secure processing of authentication key material in an ad hoc wireless network | |||
2533 | 7734051 | Key distribution | |||
2534 | 7729496 | Efficient key updates in encrypted database systems | |||
2535 | 7725721 | Method and system for transferring software and hardware feature licenses between devices | |||
2536 | 7724907 | Mechanism for protecting the transfer of digital content | |||
2537 | 7724905 | Method and arrangement for generation of a secret session key | |||
2538 | 7721092 | Authenticating device, authenticated device and key updating method | |||
2539 | 7720227 | Encryption method for SIP message and encrypted SIP communication system | |||
2540 | 7716483 | Method for establishing a communication between two devices | |||
2541 | 7716482 | Conference session key distribution method in an ID-based cryptographic system | |||
2542 | 7715552 | Data authentication with a secure environment | |||
2543 | 7711122 | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys | |||
2544 | 7711120 | Cryptographic key management | |||
2545 | 7707428 | Personal identification number recovery method | |||
2546 | 7702904 | Key management system and multicast delivery system using the same | |||
2547 | 7702110 | Electronic document protection system and method | |||
2548 | 7702102 | Method for encoded data transmission via a communication network | |||
2549 | 7698735 | Method and system of integrating third party authentication into internet browser code | |||
2550 | 7697693 | Quantum cryptography with multi-party randomness | |||
2551 | 7697691 | Method of delivering Direct Proof private keys to devices using an on-line service | |||
2552 | 7693286 | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |||
2553 | 7693285 | Secure communication apparatus and method | |||
2554 | 7689822 | Communication device for providing security in a group communication network | |||
2555 | 7688982 | Protected return path from digital rights management dongle | |||
2556 | 7688976 | Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I | |||
2557 | 7685639 | Using inserted e-mail headers to enforce a security policy | |||
2558 | 7681037 | Network connection system | |||
2559 | 7676042 | Terminal apparatus, server apparatus, and digital content distribution system | |||
2560 | 7676041 | Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system | |||
2561 | 7676037 | Cryptographic method capable of protecting elliptic curve code from side channel attacks | |||
2562 | 7672459 | Key distribution and caching mechanism to facilitate client handoffs in wireless network systems | |||
2563 | 7672458 | Method and system for key insertion for stored encrypted content | |||
2564 | 7669230 | Secure switching system for networks and method for securing switching | |||
2565 | 7664269 | Encrypting message for secure transmission | |||
2566 | 7664268 | Conditional access system for digital receivers | |||
2567 | 7660988 | Electronic notary | |||
2568 | 7660423 | Method and apparatus for maintaining ephemeral keys in limited space | |||
2569 | 7660422 | Encryption key updating for multiple site automated login | |||
2570 | 7657760 | Method for sharing encrypted data region among processes in tamper resistant processor | |||
2571 | 7657745 | Secure electronic transfer without requiring knowledge of secret data | |||
2572 | 7657037 | Apparatus and method for identity-based encryption within a conventional public-key infrastructure | |||
2573 | 7653201 | Implicit certificate scheme | |||
2574 | 7649998 | Facilitating secure data communications that use key-based encryption | |||
2575 | 7646874 | Establishing mutual authentication and secure channels in devices without previous credentials | |||
2576 | 7646873 | Key manager for QKD networks | |||
2577 | 7644285 | Recovery access to secure data | |||
2578 | 7644268 | Automated electronic messaging encryption system | |||
2579 | 7643636 | Managing multiple cryptographic periods in a single cryptographic group | |||
2009 | |||||
2580 | 7639947 | System and methods for quantum key distribution over WDM links | |||
2581 | 7639809 | Quantum cryptography transmission method and system | |||
2582 | 7636840 | Secure communications and control in a fueling environment | |||
2583 | 7636441 | Method for secure key exchange | |||
2584 | 7634091 | System and method of hiding cryptographic private keys | |||
2585 | 7634087 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
2586 | 7630499 | Retrieval and transfer of encrypted hard drive content from DVR set-top boxes | |||
2587 | 7627126 | Systems and methods for implementing path length control for quantum cryptographic systems | |||
2588 | 7620186 | Method for establishing an encrypted communication by means of keys | |||
2589 | 7620180 | Preparation of content for multiple conditional access methods in video on demand | |||
2590 | 7617537 | Communication system and its method and communication apparatus and its method | |||
2591 | 7613304 | System and method for sending encrypted messages to a distribution list | |||
2592 | 7609839 | Quantum key distribution method and communication device | |||
2593 | 7609837 | System and method for automatic setup of a network device with secure network transmission of setup parameters | |||
2594 | 7606371 | Two-way QKD system with active compensation | |||
2595 | 7606369 | Process for establishing a common cryptographic key for N subscribers | |||
2596 | 7600238 | Method for verifying television receiver sets with access control and corresponding receiver set | |||
2597 | 7600134 | Theft deterrence using trusted platform module authorization | |||
2598 | 7600129 | Controlling access using additional data | |||
2599 | 7599497 | Key management protocol | |||
2600 | 7594116 | Mediated key exchange between source and target of communication | |||
2601 | 7583887 | Recording medium having data structure for managing main data additional content data thereof and recording and reproducing methods and apparatuses | |||
2602 | 7583803 | QKD stations with fast optical switches and QKD systems using same | |||
2603 | 7577257 | Large scale quantum cryptographic key distribution network | |||
2604 | 7577254 | Detector autocalibration in QKD systems | |||
2605 | 7571456 | Downloading apparatus and method therof for digital broadcast receiver | |||
2606 | 7571315 | Method and apparatus to assign trust to a key | |||
2607 | 7570759 | System and method for secure encryption | |||
2608 | 7567673 | Common key sharing method and wireless communication terminal in ad hoc network | |||
2609 | 7565528 | Method for generating asymmetrical cryptographic keys by the user | |||
2610 | 7564991 | Device, device control method, and program | |||
2611 | 7561696 | Delivering policy updates for protected content | |||
2612 | 7552334 | System and method for presentation integrity | |||
2613 | 7549043 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
2614 | 7548620 | Token provisioning | |||
2615 | 7542573 | Providing apparatus, communication device, method, and program | |||
2616 | 7539314 | Frame synchronization method for QKD systems | |||
2617 | 7529925 | System and method for distributing keys in a wireless network | |||
2618 | 7529373 | Laser autocalibration for QKD systems | |||
2619 | 7515716 | Systems and methods for reserving cryptographic key material | |||
2620 | 7512989 | Data loader using location identity to provide secure communication of data to recipient devices | |||
2621 | 7512789 | Mailing list server and mail transmission method thereof | |||
2622 | 7477748 | Session key distribution methods using a hierarchy of key servers | |||
2623 | 7477738 | Data sequence encryption and decryption | |||
2624 | 7475245 | System and method for providing secure exchange of sensitive information with an implantable medical device | |||
2008 | |||||
2625 | 7471796 | Apparatus for and method of controlling propagation of decryption keys | |||
2626 | 7463739 | Method and system providing improved security for the transfer of root keys | |||
2627 | 7461251 | Public key certification issuing apparatus | |||
2628 | 7454628 | Method and apparatus for transmitting content data and recording and/or reproducing apparatus | |||
2629 | 7450722 | Subset difference method for multi-cast rekeying | |||
2630 | 7434052 | Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream | |||
2631 | 7434047 | System, method and computer program product for detecting a rogue member in a multicast group | |||
2632 | 7421082 | Data delivery method and data delivery system using sets of passkeys generated by dividing an encryption key | |||
2633 | 7421081 | Method and apparatus for generating hierarchical keys of digital assets | |||
2634 | 7421079 | Method and apparatus for secure key replacement | |||
2635 | 7415115 | Method and system for disaster recovery of data from a storage device | |||
2636 | 7409562 | Method and apparatus for encrypting media programs for later purchase and viewing | |||
2637 | 7409063 | Contents distribution system | |||
2638 | 7400730 | Cryptographic communication method in communication system | |||
2639 | 7395429 | Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device | |||
2640 | 7380118 | Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method | |||
2641 | 7372961 | Method of public key generation | |||
2642 | 7366912 | Method of identifying participants in secure web sessions | |||
2643 | 7359514 | Narrow-band single-photon source and QKD system using same | |||
2644 | 7349538 | Hierarchical identity-based encryption and signature schemes | |||
2645 | 7340061 | Information processing apparatus, information processing method and providing medium | |||
2646 | 7336791 | Information processing apparatus | |||
2647 | 7333617 | Method for establishing a common key for a group of at least three subscribers | |||
2007 | |||||
2648 | 7299357 | Opaque message archives | |||
2649 | 7298847 | Secure key distribution protocol in AAA for mobile IP | |||
2650 | 7272714 | Method, apparatus, and program for automated trust zone partitioning | |||
2651 | 7266687 | Method and apparatus for storing and distributing encryption keys | |||
2652 | 7266201 | Non-disruptive authentication administration | |||
2653 | 7260224 | Automated secure key transfer | |||
2654 | 7257706 | Method of securing a document in a system and controlling access to the document and a seal for use in the method | |||
2655 | 7237113 | Keyed authentication rollover for routers | |||
2656 | 7236597 | Key transport in quantum cryptographic networks | |||
2657 | 7233672 | Constant modulation for enhancing QKD security | |||
2658 | 7231517 | Apparatus and method for automatically authenticating a network client | |||
2659 | 7181620 | Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach | |||
2660 | 7171001 | Method and apparatus for managing secure collaborative transactions | |||
2006 | |||||
2661 | 7155611 | Method of operating a conditional access system for broadcast applications | |||
2662 | 7146009 | Secure electronic messaging system requiring key retrieval for deriving decryption keys | |||
2663 | 7127069 | Secured virtual network in a gaming environment | |||
2664 | 7120792 | System and method for secure communication of routing messages | |||
2665 | 7099478 | Apparatus for and method of controlling propagation of decryption keys | |||
2666 | 7072865 | Broadcast receiving method and apparatus and information distributing method and apparatus | |||
2667 | 7068791 | Secure packet radio network | |||
2668 | 7065787 | Publishing content in connection with digital rights management (DRM) architecture | |||
2669 | 7043018 | Prime number generation method, prime number generation apparatus, and cryptographic system | |||
2670 | 7023994 | Method and device for customer personalization of GSM chips | |||
2671 | 6993664 | Method and system for licensing a software product | |||
2672 | 6993138 | Spatial key trees for key management in wireless environments | |||
2005 | |||||
2673 | 6968061 | Method which uses a non-volatile memory to store a crypto key and a check word for an encryption device | |||
2674 | 6968060 | Method for verifying the use of public keys generated by an on-board system | |||
2675 | 6965675 | Structure and method for loading encryption keys through a test access port | |||
2676 | 6965674 | System and method for providing WLAN security through synchronized update and rotation of WEP keys | |||
2677 | 6960779 | Photon source and method of operating a photon source | |||
2678 | 6959086 | Cryptographic key management scheme | |||
2679 | 6956947 | Extraction of multiple single keys from a compressed key | |||
2680 | 6952768 | Security protocol | |||
2681 | 6952475 | Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit | |||
2682 | 6948065 | Platform and method for securely transmitting an authorization secret | |||
2683 | 6948062 | Location dependent encryption and/or decryption | |||
2684 | 6947563 | Method for assigning encryption keys | |||
2685 | 6947560 | Method and device for effective key length control | |||
2686 | 6947556 | Secure data storage and retrieval with key management and user authentication | |||
2687 | 6944770 | Methods and systems for generating and validating value-bearing documents | |||
2688 | 6940980 | High security cryptosystem | |||
2689 | 6937726 | System and method for protecting data files by periodically refreshing a decryption key | |||
2690 | 6934839 | Evidencing and verifying indicia of value using secret key cryptography | |||
2691 | 6934392 | Split-key key-agreement protocol | |||
2692 | 6934389 | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus | |||
2693 | 6931532 | Selective data encryption using style sheet processing | |||
2694 | 6931528 | Secure handshake protocol | |||
2695 | 6931133 | Method and system of securely escrowing private keys in a public key infrastructure | |||
2696 | 6931128 | Methods and systems for generating encryption keys using random bit generators | |||
2697 | 6928167 | Method for managing public key | |||
2698 | 6925182 | Administration and utilization of private keys in a networked environment | |||
2699 | 6922775 | User support system for cryptographic communication in network systems | |||
2700 | 6920559 | Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed | |||
2701 | 6917685 | IP key management mechanism with divergence barrier increasing entropy against computational crypto-analyses | |||
2702 | 6915434 | Electronic data storage apparatus with key management function and electronic data storage method | |||
2703 | 6912656 | Method and apparatus for sending encrypted electronic mail through a distribution list exploder | |||
2704 | 6912655 | Network security architecture system utilizing seals | |||
2705 | 6912654 | Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system | |||
2706 | 6912285 | Mechanism for efficient private bulk messaging | |||
2707 | 6911974 | Information processing system and method | |||
2708 | 6910129 | Remote authentication based on exchanging signals representing biometrics information | |||
2709 | 6909786 | Cryptographic trap door with timed lock and controlled escrow | |||
2710 | 6909702 | Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system | |||
2711 | 6901512 | Centralized cryptographic key administration scheme for enabling secure context-free application operation | |||
2712 | 6901510 | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure | |||
2713 | 6901241 | System, method and apparatus for secure transmission of confidential information | |||
2714 | 6901145 | Generation of repeatable cryptographic key based on varying parameters | |||
2715 | 6898708 | Device for reproducing data | |||
2716 | 6898288 | Method and system for secure key exchange | |||
2717 | 6895504 | Enabling secure communications with a client | |||
2718 | 6895092 | Cryptographic key distribution method and apparatus thereof | |||
2719 | 6895091 | Systems and methods for encryption key archival and auditing in a quantum-cryptographic communications network | |||
2720 | 6889324 | Digital measurement apparatus and image measurement apparatus | |||
2721 | 6889323 | Method and apparatus for contents information | |||
2722 | 6888944 | Method for assigning encryption keys | |||
2723 | 6886098 | Systems and methods for compression of key sets having multiple keys | |||
2724 | 6885747 | Cryptographic key split combiner | |||
2725 | 6884990 | METHOD FOR CHANGING THE POLARIZATION OF AT LEAST ONE OF THE PHOTONS EMITTED FROM A PHOTON-PAIR SOURCE INTO VARIOUS PARTIAL PATHS OF RAYS, AND METHOD FOR OPTIONALLY GENERATING INDIVIDUAL PHOTONS OR PHOTON PAIRS IN AN OPTICAL CHANNEL | |||
2726 | 6883097 | Coincidence-free media key block for content protection for recordable media | |||
2727 | 6882729 | System and method for limiting access to data | |||
2728 | 6880081 | Key management for content protection | |||
2729 | 6877092 | Apparatus, method, and computer program product for achieving interoperability between cryptographic key recovery enabled and unaware systems | |||
2730 | 6870930 | Methods and systems for TMDS encryption | |||
2731 | 6868615 | Telescopic weapon aiming system | |||
2732 | 6859537 | Non-volatile memory for use with an encryption device | |||
2733 | 6857076 | Data security for digital data storage | |||
2734 | 6857075 | Key conversion system and method | |||
2735 | 6857070 | Data processing method and apparatus, and storage medium capable of being read by a computer | |||
2736 | 6851049 | Method and apparatus for facilitating secure anonymous email recipients | |||
2737 | 6850620 | Method for preventing key share attacks | |||
2738 | 6845453 | Multiple factor-based user identification and authentication | |||
2739 | 6845450 | Display unit storing and using a cryptography key | |||
2740 | 6845160 | Apparatus and method for depositing encryption keys | |||
2741 | 6842523 | Encryption apparatus, cryptographic communication system, key recovery system, and storage medium | |||
2742 | 6839839 | Public key distribution using an approximate linear function | |||
2743 | 6839838 | Data management system, information processing apparatus, authentification management apparatus, method and storage medium | |||
2744 | 6839837 | Cryptosystem key updating system and method for preventing illegal use of software | |||
2745 | 6839437 | Method and apparatus for managing keys for cryptographic operations | |||
2746 | 6839436 | Method for providing long-lived broadcast encrypton | |||
2747 | 6839434 | Method and apparatus for performing a key update using bidirectional validation | |||
2004 | |||||
2748 | 6834346 | Content processing system | |||
2749 | 6834112 | Secure distribution of private keys to multiple clients | |||
2750 | 6834111 | DATA TRANSMITTING/RECEIVING METHOD, DATA TRANSMITTER, DATA RECEIVER, DATA TRANSMITTING/RECEIVING SYSTEM, AV CONTENT TRANSMITTING METHOD, AV CONTENT RECEIVING METHOD, AV CONTENT TRANSMITTER, AV CONTENT RECEIVER, AND PROGRAM RECORDING MEDIUM | |||
2751 | 6832319 | Content guard system for copy protection of recordable media | |||
2752 | 6832314 | Methods and apparatus for selective encryption and decryption of point to multi-point messages | |||
2753 | 6831982 | Encryption key management system using multiple smart cards | |||
2754 | 6831981 | Information transceiver system | |||
2755 | 6829356 | Server-assisted regeneration of a strong secret from a weak secret | |||
2756 | 6826689 | Method and system for emulating a secret code between two hardware modules | |||
2757 | 6823070 | Method for key escrow in a communication system and apparatus therefor | |||
2758 | 6819766 | Method and system for managing keys for encrypted data | |||
2759 | 6816970 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
2760 | 6816595 | Mini time key creation method and system | |||
2761 | 6813714 | Multicast conference security architecture | |||
2762 | 6813358 | Method and system for timed-release cryptosystems | |||
2763 | 6813357 | Exclusive key sharing method | |||
2764 | 6813292 | Controllable low proton source | |||
2765 | 6810122 | Secret sharing system and storage medium | |||
2766 | 6801626 | Cryptographic key distribution using light pulses of three macroscopic quantum states | |||
2767 | 6799272 | Remote device authentication system | |||
2768 | 6799270 | System and method for secure distribution of digital information to a chain of computer system nodes in a network | |||
2769 | 6795555 | Encryption key exchange protocol | |||
2770 | 6792533 | Cryptographic methods for remote authentication | |||
2771 | 6792530 | Implicit certificate scheme | |||
2772 | 6792425 | Secure multi database system including a client, multi database server, and database server | |||
2773 | 6789192 | Semiconductor memory card, data reading apparatus, and data reading/reproducing apparatus | |||
2774 | 6788788 | Cryptographic communication method, encryption method, and cryptographic communication system | |||
2775 | 6785810 | System and method for providing secure transmission, search, and storage of data | |||
2776 | 6785809 | Server group key for distributed group key management | |||
2777 | 6785390 | System and method for asynchronous decryption | |||
2778 | 6782476 | Data processing apparatus and authentication method applied to the apparatus | |||
2779 | 6782475 | Method and apparatus for conveying a private message to selected members | |||
2780 | 6782103 | Cryptographic key management | |||
2781 | 6778669 | Quantum encryption device | |||
2782 | 6775382 | Method and apparatus for recovering encryption session keys | |||
2783 | 6772339 | Mix and match: a new approach to secure multiparty computation | |||
2784 | 6766453 | Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party | |||
2785 | 6760843 | Maintaining a soft-token private key store in a distributed environment | |||
2786 | 6760445 | Method for identifying betrayers of proprietary data | |||
2787 | 6757825 | Secure mutual network authentication protocol | |||
2788 | 6754820 | Multiple level access system | |||
2789 | 6754349 | Cryptographic key, or other secret material, recovery | |||
2790 | 6748530 | Certification apparatus and method | |||
2791 | 6748084 | Data access control system and method thereof | |||
2792 | 6748083 | Method and apparatus for free-space quantum key distribution in daylight | |||
2793 | 6748082 | Method and device for introducing a service key into a terminal | |||
2794 | 6748081 | Quantum cryptography system for a secure transmission of random keys using a polarization setting method | |||
2795 | 6742116 | Security method, security software and security system for electronic communications | |||
2796 | 6738907 | Maintaining a soft-token private key store in a distributed environment | |||
2797 | 6735312 | Cryptographic method for restricting access to transmitted programming content using .function.-redundant establishment key combinations | |||
2798 | 6735311 | Encryption and decryption of multi-media data | |||
2799 | 6731755 | Split-key cryptographic system and method | |||
2800 | 6724893 | Method of passing a cryptographic key that allows third party access to the key | |||
2801 | 6721887 | Data copyright management system | |||
2802 | 6718467 | Password based protocol for secure communications | |||
2803 | 6711264 | Security improvement method and security system | |||
2804 | 6708273 | Apparatus and method for implementing IPSEC transforms within an integrated circuit | |||
2805 | 6707801 | Method and apparatus for data transport in a wireless communication system | |||
2806 | 6701435 | Cryptographic key generation system | |||
2807 | 6690798 | Key transforms to discriminate between beams in a multi-beam satellite communication system | |||
2808 | 6687375 | Generating user-dependent keys and random numbers | |||
2809 | 6684331 | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure | |||
2810 | 6684330 | Cryptographic information and flow control | |||
2811 | 6683955 | Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels | |||
2812 | 6683954 | Key encryption using a client-unique additional key for fraud prevention | |||
2813 | 6681017 | Simplified secure shared key establishment and data delivery protocols for electronic commerce | |||
2814 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2815 | 6678379 | Quantum key distribution method and apparatus | |||
2816 | 6677888 | Secure aircraft communications addressing and reporting system (ACARS) | |||
2003 | |||||
2817 | 6671759 | Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets | |||
2818 | 6658566 | Process for storage and use of sensitive information in a security module and the associated security module | |||
2819 | 6658114 | Key management method | |||
2820 | 6654883 | Device authentication and encrypted communication system offering increased security | |||
2821 | 6654465 | Method of implementing a key recovery system | |||
2822 | 6650753 | System for encrypting broadcast programs in the presence of compromised receiver devices | |||
2823 | 6636968 | Multi-node encryption and key delivery | |||
2824 | 6631472 | Kernel mode protection | |||
2825 | 6629243 | Secure communications system | |||
2826 | 6611913 | Escrowed key distribution for over-the-air service provisioning in wireless communication networks | |||
2827 | 6611194 | Method for inserting a service key in a terminal and devices for implementing said method | |||
2828 | 6609116 | System and method for securely updating copy-protected media | |||
2829 | 6608901 | Cryptographic key split combiner | |||
2830 | 6606707 | Semiconductor memory card | |||
2831 | 6606386 | Cryptographic key split combiner | |||
2832 | 6603857 | Method and apparatus for controlling release of time sensitive information | |||
2833 | 6584566 | Distributed group key management for multicast security | |||
2834 | 6584563 | User support system for cryptographic communication in network systems | |||
2835 | 6578146 | System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol | |||
2836 | 6577734 | Data encryption key management system | |||
2837 | 6563928 | Strengthened public key protocol | |||
2838 | 6560337 | Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key | |||
2839 | 6549626 | Method and apparatus for encoding keys | |||
2840 | 6549623 | Cryptographic key split combiner | |||
2841 | 6542608 | Cryptographic key split combiner | |||
2842 | 6539479 | System and method for securely logging onto a remotely located computer | |||
2843 | 6539092 | Leak-resistant cryptographic indexed key update | |||
2844 | 6535607 | Method and apparatus for providing interoperability between key recovery and non-key recovery systems | |||
2845 | 6532290 | Authentication methods | |||
2846 | 6529601 | Method and apparatus for polarization-insensitive quantum cryptography | |||
2847 | 6526509 | Method for interchange of cryptographic codes between a first computer unit and a second computer unit | |||
2848 | 6526506 | Multi-level encryption access point for wireless network | |||
2849 | 6522749 | Quantum cryptographic communication channel based on quantum coherence | |||
2850 | 6512829 | Key distribution method and system in secure broadcast communication | |||
2851 | 6510515 | Broadcast service access control | |||
2852 | 6504930 | Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm | |||
2853 | 6502861 | Seat belt guide | |||
2002 | |||||
2854 | 6493823 | Instrument for making secure data exchanges | |||
2855 | 6493449 | Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids | |||
2856 | 6490353 | Data encrypting and decrypting apparatus and method | |||
2857 | 6487661 | Key agreement and transport protocol | |||
2858 | 6483921 | Method and apparatus for regenerating secret keys in Diffie-Hellman communication sessions | |||
2859 | 6483920 | Key recovery process used for strong encryption of messages | |||
2860 | 6480608 | Method for exchanging cryptographic keys in an ATM network using multiple virtual paths or circuits | |||
2861 | 6477649 | Information recording apparatus, information reproducing apparatus, and information distribution system | |||
2862 | 6463536 | Data copyright management system | |||
2863 | 6460137 | Encryption processing system | |||
2864 | 6445797 | Method and system for performing secure electronic digital streaming | |||
2865 | 6445794 | System and method for synchronizing one time pad encryption keys for secure communication and access control | |||
2866 | 6444999 | Quantum circuit | |||
2867 | 6442690 | Apparatus and methods for managing key material in heterogeneous cryptographic assets | |||
2868 | 6438234 | Quantum cryptography device and method | |||
2869 | 6430345 | Method and device for producing a choice of either single photons or pairs of photons in an optical channel | |||
2870 | 6430292 | System and method for controlling disclosure time of information | |||
2871 | 6424713 | Cryptographic system with concealed work factor | |||
2872 | 6418225 | Method and apparatus for feature configuration in remotely located ultrasound imaging system | |||
2873 | 6412072 | Parasitically powered microprocessor capable of transmitting data over a single data line and ground | |||
2874 | 6411716 | Method of changing key fragments in a multi-step digital signature system | |||
2875 | 6401204 | Process for cryptographic code management between a first computer unit and a second computer unit | |||
2876 | 6396929 | Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery | |||
2877 | 6396612 | System, method and apparatus for secure transmission of confidential information | |||
2878 | 6393564 | Decrypting device | |||
2879 | 6393127 | Method for transferring an encryption key | |||
2880 | 6389136 | Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys | |||
2881 | 6385318 | Encrypting method, deciphering method and certifying method | |||
2882 | 6385317 | Method for providing a secure communication between two devices and application of this method | |||
2883 | 6381699 | Leak-resistant cryptographic method and apparatus | |||
2884 | 6381331 | Information sending system and method for sending encrypted information | |||
2885 | 6377689 | Key transmission system | |||
2886 | 6373952 | Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method | |||
2887 | 6373946 | Communication security | |||
2888 | 6370251 | Traffic key access method and terminal for secure communication without key escrow facility | |||
2889 | 6367010 | Method for generating secure symmetric encryption and decryption | |||
2890 | 6363485 | Multi-factor biometric authenticating device and method | |||
2891 | 6363481 | Method and apparatus for secure data storage using distributed databases | |||
2892 | 6363480 | Ephemeral decryptability | |||
2893 | 6363154 | Decentralized systems methods and computer program products for sending secure messages among a group of nodes | |||
2894 | 6363152 | Hybrid one time pad encryption and decryption apparatus with methods for encrypting and decrypting data | |||
2895 | 6359986 | Encryption system capable of specifying a type of an encrytion device that produced a distribution medium | |||
2896 | 6351536 | Encryption network system and method | |||
2897 | 6343283 | Data copyright management system | |||
2898 | 6337910 | Method and apparatus for generating one time pads simultaneously in separate encryption/decryption systems | |||
2899 | 6336188 | Authenticated key agreement protocol | |||
2900 | 6335972 | Framework-based cryptographic key recovery system | |||
2001 | |||||
2901 | 6333983 | Method and apparatus for performing strong encryption or decryption data using special encryption functions | |||
2902 | 6330674 | Use of biometrics as a methodology for defining components for ECC encryption | |||
2903 | 6330671 | Method and system for secure distribution of cryptographic keys on multicast networks | |||
2904 | 6317834 | Biometric authentication system with encrypted models | |||
2905 | 6317831 | Method and apparatus for establishing a secure connection over a one-way data path | |||
2906 | 6317829 | Public key cryptography based security system to facilitate secure roaming of users | |||
2907 | 6314190 | Cryptographic system with methods for user-controlled message recovery | |||
2908 | 6307936 | Cryptographic key management scheme | |||
2909 | 6304658 | Leak-resistant cryptographic method and apparatus | |||
2910 | 6301661 | Enhanced security for applications employing downloadable executable content | |||
2911 | 6292896 | Method and apparatus for entity authentication and session key generation | |||
2912 | 6292895 | Public key cryptosystem with roaming user capability | |||
2913 | 6289451 | System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection | |||
2914 | 6289104 | Free-space quantum cryptography system | |||
2915 | 6282657 | Kernel mode protection | |||
2916 | 6282649 | Method for controlling access to electronically provided services and system for implementing such method | |||
2917 | 6282295 | Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers | |||
2918 | 6278782 | Method of implementing a key recovery system | |||
2919 | 6272635 | Data copyright management system | |||
2920 | 6272225 | Key recovery condition encryption and decryption apparatuses | |||
2921 | 6272224 | Method and apparatus for quantum distribution of an encryption key | |||
2922 | 6266421 | Key recovery system and key recovery method | |||
2923 | 6266420 | Method and apparatus for secure group communications | |||
2924 | 6266413 | System and method for synchronizing one time pad encryption keys for secure communication and access control | |||
2925 | 6263437 | Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks | |||
2926 | 6263435 | Dual encryption protocol for scalable secure group communication | |||
2927 | 6260147 | Wireless subscription portability | |||
2928 | 6260142 | Access and storage of secure group communication cryptographic keys | |||
2929 | 6259791 | Method and apparatus in a wireless messaging system for controlling a hierarchical provision of service | |||
2930 | 6256733 | Access and storage of secure group communication cryptographic keys | |||
2931 | 6252961 | Method and apparatus for performing data encryption and error code correction | |||
2932 | 6249867 | Method for transferring sensitive information using initially unsecured communication | |||
2933 | 6249585 | Publicly verifiable key recovery | |||
2934 | 6246771 | Session key recovery system and method | |||
2935 | 6246770 | Method and apparatus for feature configuration in remotely located ultrasound imaging system | |||
2936 | 6243466 | Auto-escrowable and auto-certifiable cryptosystems with fast key generation | |||
2937 | 6240188 | Distributed group key management scheme for secure many-to-many communication | |||
2938 | 6240187 | Key replacement in a public key cryptosystem | |||
2939 | 6236729 | Key recovery method and system | |||
2940 | 6233339 | Physical property based cryptographics | |||
2941 | 6230269 | Distributed authentication system and method | |||
2942 | 6226383 | Cryptographic methods for remote authentication | |||
2943 | 6222923 | Method for securing system protected by a key hierarchy | |||
2944 | 6219794 | Method for secure key management using a biometric | |||
2945 | 6219789 | Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities | |||
2946 | 6216229 | Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets | |||
2947 | 6215878 | Group key distribution | |||
2948 | 6215877 | Key management server, chat system terminal unit, chat system and recording medium | |||
2949 | 6212280 | Apparatus and methods for managing key material in heterogeneous cryptographic assets | |||
2950 | 6212279 | Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form | |||
2951 | 6209091 | Multi-step digital signature method and system | |||
2952 | 6202150 | Auto-escrowable and auto-certifiable cryptosystems | |||
2953 | 6198824 | System for providing secure remote command execution network | |||
2954 | 6195433 | Private key validity and validation | |||
2955 | 6192474 | Method for establishing a key using over-the-air communication and password protocol and password protocol | |||
2956 | 6192130 | Information security subscriber trust authority transfer system with private key history transfer | |||
2957 | 6188768 | Autocompensating quantum cryptographic key distribution system based on polarization splitting of light | |||
2958 | 6185685 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
2959 | 6185308 | Key recovery system | |||
2960 | 6182214 | Exchanging a secret over an unreliable network | |||
2961 | 6181795 | Portable cryptographic key | |||
2962 | 6178506 | Wireless subscription portability | |||
2963 | 6178244 | Cryptosystem | |||
2964 | 6173400 | Methods and systems for establishing a shared secret using an authentication token | |||
2965 | 6169805 | System and method of operation for providing user's security on-demand over insecure networks | |||
2966 | 6169803 | Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key | |||
2967 | 6169802 | Dynamic private key security system for personal messaging devices | |||
2000 | |||||
2968 | 6167514 | Method, apparatus, system and information storage medium for wireless communication | |||
2969 | 6166650 | Secure self learning system | |||
2970 | 6160891 | Methods and apparatus for recovering keys | |||
2971 | 6160890 | Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded | |||
2972 | 6157723 | Method and apparatus for secure communications with encryption key scheduling | |||
2973 | 6157722 | Encryption key management system and method | |||
2974 | 6154543 | Public key cryptosystem with roaming user capability | |||
2975 | 6151679 | System and method for preventing a first node from being emulated by another node | |||
2976 | 6151395 | System and method for regenerating secret keys in diffie-hellman communication sessions | |||
2977 | 6151394 | Encrypted communication system that limits the damage caused when a secret key has been leaked | |||
2978 | 6144744 | Method and apparatus for the secure transfer of objects between cryptographic processors | |||
2979 | 6141423 | Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets | |||
2980 | 6134431 | Personal station authentication system and authentication method | |||
2981 | 6134325 | Key transmission system | |||
2982 | 6131090 | Method and system for providing controlled access to information stored on a portable recording medium | |||
2983 | 6128391 | Method and apparatus for asymetric key management in a cryptographic system | |||
2984 | 6125185 | System and method for encryption key generation | |||
2985 | 6122742 | Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys | |||
2986 | 6122737 | Method for using fingerprints to distribute information over a network | |||
2987 | 6122736 | Key agreement and transport protocol with implicit signatures | |||
2988 | 6118874 | Encrypted data recovery method using split storage key and system thereof | |||
2989 | 6118873 | System for encrypting broadcast programs in the presence of compromised receiver devices | |||
2990 | 6111956 | Method for secure key distribution over a nonsecure communications network | |||
2991 | 6111955 | Security in cellular telephones | |||
2992 | 6105133 | Bilateral authentication and encryption system | |||
2993 | 6098056 | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet | |||
2994 | 6097818 | Data copyright management method | |||
2995 | 6094487 | Apparatus and method for encryption key generation | |||
2996 | 6091820 | Method and apparatus for achieving perfect forward secrecy in closed user groups | |||
2997 | 6091819 | Accelerating public-key cryptography by precomputing randomly generated pairs | |||
2998 | 6088454 | Key management method, encryption system, and sharing digital signature system which have hierarchies | |||
2999 | 6088449 | Tri-signature security architecture systems and methods | |||
3000 | 6085323 | Information processing system having function of securely protecting confidential information | |||
3001 | 6081794 | Data copyright management system | |||
3002 | 6076077 | Data management system | |||
3003 | 6073235 | Private broadcast communication system and method for private broadcast communication over a wired or wireless network | |||
3004 | 6073125 | Token key distribution system controlled acceptance mail payment and evidencing system | |||
3005 | 6069957 | Method and apparatus for providing hierarchical key system in restricted-access television system | |||
3006 | 6064741 | Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N | |||
3007 | 6061791 | Initial secret key establishment including facilities for verification of identity | |||
3008 | 6061790 | Network computer system with remote user data encipher methodology | |||
3009 | 6061454 | System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver | |||
3010 | 6058188 | Method and apparatus for interoperable validation of key recovery information in a cryptographic system | |||
3011 | 6058187 | Secure telecommunications data transmission | |||
3012 | 6055639 | Synchronous message control system in a Kerberos domain | |||
3013 | 6052787 | Process for group-based cryptographic code management between a first computer unit and group computer units | |||
3014 | 6052715 | Interactive communication system for downloading large amount data | |||
3015 | 6052469 | Interoperable cryptographic key recovery system with verification by comparison | |||
3016 | 6052468 | Method of securing a cryptographic key | |||
3017 | 6052466 | Encryption of data packets using a sequence of private keys generated from a public key exchange | |||
3018 | 6049878 | Efficient, secure multicasting with global knowledge | |||
3019 | 6049612 | File encryption method and system | |||
3020 | 6047072 | Method for secure key distribution over a nonsecure communications network | |||
3021 | 6047069 | Method and apparatus for preserving error correction capabilities during data encryption/decryption | |||
3022 | 6044464 | Method of protecting broadcast data by fingerprinting a common decryption function | |||
3023 | 6041408 | Key distribution method and system in secure broadcast communication | |||
3024 | 6041123 | Centralized secure communications system | |||
3025 | 6041122 | Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation | |||
3026 | 6038322 | Group key distribution | |||
3027 | 6035398 | Cryptographic key generation using biometric data | |||
3028 | 6031913 | Apparatus and method for secure communication based on channel characteristics | |||
3029 | 6028935 | Cryptographic receiver | |||
3030 | 6026167 | Method and apparatus for sending secure datagram multicasts | |||
3031 | 6023689 | Method for secure communication in a telecommunications system | |||
3032 | 6018581 | Communication system and communication method | |||
1999 | |||||
3033 | 6009177 | Enhanced cryptographic system and method with key escrow feature | |||
3034 | 6009174 | Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded | |||
3035 | 6009173 | Encryption and decryption method and apparatus | |||
3036 | 6005943 | Electronic identifiers for network terminal devices | |||
3037 | 6005487 | Electronic security system with novel electronic T-handle lock | |||
3038 | 5999629 | Data encryption security module | |||
3039 | 5999285 | Positive-operator-valued-measure receiver for quantum cryptography | |||
3040 | 5995624 | Bilateral authentication and information encryption token system and method | |||
3041 | 5995533 | Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics | |||
3042 | 5991408 | Identification and security using biometric measurements | |||
3043 | 5991406 | System and method for data recovery | |||
3044 | 5991405 | Method for dynamically updating cellular phone unique encryption keys | |||
3045 | 5991404 | System for diversifying information in a network for distributing goods or services | |||
3046 | 5987572 | Method and apparatus employing a dynamic encryption interface between a processor and a memory | |||
3047 | 5987131 | Cryptographic key exchange using pre-computation | |||
3048 | 5987130 | Simiplified secure swift cryptographic key exchange | |||
3049 | 5987129 | Method of sharing cryptokey | |||
3050 | 5987128 | Method of effecting communications using common cryptokey | |||
3051 | 5987125 | Method for communicating seismic data | |||
3052 | 5970147 | System and method for configuring and registering a cryptographic device | |||
3053 | 5966449 | Method and network for communicating between a group of entities a text encrypted using an encryption key intrinsic to the group of entities in a network having a plurality of entities and a center | |||
3054 | 5966444 | Method and system for establishing a cryptographic key agreement using linear protocols | |||
3055 | 5966443 | Method for correcting subscriber-based secure call keys | |||
3056 | 5966224 | Secure communications with low-orbit spacecraft using quantum cryptography | |||
3057 | 5963646 | Secure deterministic encryption key generator system and method | |||
3058 | 5960086 | Unified end-to-end security methods and systems for operating on insecure networks | |||
3059 | 5956406 | Method of setting up secure communications and associated encryption/decryption system | |||
3060 | 5956403 | System and method for access field verification | |||
3061 | 5956402 | Passwordless secure and efficient remote data update | |||
3062 | 5953424 | Cryptographic system and protocol for establishing secure authenticated remote access | |||
3063 | 5953421 | Quantum cryptography | |||
3064 | 5953420 | Method and apparatus for establishing an authenticated shared secret value between a pair of users | |||
3065 | 5940508 | Method and apparatus for seamless crypto rekey system | |||
3066 | 5937066 | Two-phase cryptographic key recovery system | |||
3067 | 5933504 | Strengthened public key protocol | |||
3068 | 5930362 | Generation of encryption key | |||
3069 | 5923756 | Method for providing secure remote command execution over an insecure computer network | |||
3070 | 5920630 | Method of public key cryptography that includes key escrow | |||
3071 | 5920627 | Encryption device and decryption device for information conveyed by asynchronous transfer mode cells | |||
3072 | 5917911 | Method and system for hierarchical key access and recovery | |||
3073 | 5915025 | Data processing apparatus with software protecting functions | |||
3074 | 5915021 | Method for secure communications in a telecommunications system | |||
3075 | 5915018 | Key management system for DVD copyright management | |||
3076 | 5907618 | Method and apparatus for verifiably providing key recovery information in a cryptographic system | |||
3077 | 5903649 | Method for establishing a common code for authorized persons through a central office | |||
3078 | 5901227 | Method and apparatus for implementing partial and complete optional key escrow | |||
3079 | 5896455 | Key agreement and transport protocol with implicit signatures | |||
3080 | 5889865 | Key agreement and transport protocol with implicit signatures | |||
3081 | 5889861 | Identity confidentiality method in radio communication system | |||
3082 | 5887063 | Communication system for portable appliances | |||
3083 | 5878136 | Encryption key control system for mail processing system having data center verification | |||
3084 | 5872849 | Enhanced cryptographic system and method with key escrow feature | |||
3085 | 5870475 | Facilitating secure communications in a distribution network | |||
3086 | 5867578 | Adaptive multi-step digital signature system and method of operation thereof | |||
3087 | 5864667 | Method for safe communications | |||
3088 | 5864625 | Methods and apparatus for secure optical communications links | |||
3089 | 5857022 | Enhanced cryptographic system and method with key escrow feature | |||
1998 | |||||
3090 | 5852665 | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow | |||
3091 | 5850451 | Enhanced cryptographic system and method with key escrow feature | |||
3092 | 5850450 | Method and apparatus for encryption key creation | |||
3093 | 5850444 | Method and apparatus for encrypting radio traffic in a telecommunications network | |||
3094 | 5850443 | Key management system for mixed-trust environments | |||
3095 | 5850441 | System and method for key distribution using quantum cryptography | |||
3096 | 5848158 | Data copyright management system | |||
3097 | 5848156 | Communication method and apparatus for carrying out cipher communications telephonically | |||
3098 | 5841865 | Enhanced cryptographic system and method with key escrow feature | |||
3099 | 5841864 | Apparatus and method for authentication and session key exchange in a communication system | |||
3100 | 5838792 | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
3101 | 5835592 | Secure, swift cryptographic key exchange | |||
3102 | 5832207 | Secure module with microprocessor and co-processor | |||
3103 | 5832092 | Communication system based on shared cipher key, server unit for the same system, client unit for the same system, and method of sharing cipher key in communication system | |||
3104 | 5832091 | Fingerprint controlled public key cryptographic system | |||
3105 | 5832087 | Apparatus for generating encryption/decryption look-up tables using a session key | |||
3106 | 5832086 | Method for updating a communication unit parameter in a wireless communication system | |||
3107 | 5825880 | Multi-step digital signature method and system | |||
3108 | 5825300 | Method of protected distribution of keying and certificate material | |||
3109 | 5815573 | Cryptographic key recovery system | |||
3110 | 5812666 | Cryptographic key management and validation system | |||
3111 | 5812664 | Key distribution system | |||
3112 | 5809140 | Session key distribution using smart cards | |||
3113 | 5805705 | Synchronization of encryption/decryption keys in a data communication network | |||
3114 | 5802175 | Computer file backup encryption system and method | |||
3115 | 5799088 | Non-deterministic public key encrypton system | |||
3116 | 5799086 | Enhanced cryptographic system and method with key escrow feature | |||
3117 | 5799080 | Semiconductor chip having identification/encryption code | |||
3118 | 5796839 | Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium | |||
3119 | 5796830 | Interoperable cryptographic key recovery system | |||
3120 | 5794139 | Automatic generation of private authentication key for wireless communication systems | |||
3121 | 5787173 | Cryptographic key management method and apparatus | |||
3122 | 5784463 | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method | |||
3123 | 5784462 | Digital signal receiver capable of receiving data encrypted and transmitted in online processing | |||
3124 | 5778065 | Method and system for changing an authorization password or key in a distributed communication network | |||
3125 | 5768389 | Method and system for generation and management of secret key of public key cryptosystem | |||
3126 | 5768388 | Time delayed key escrow | |||
3127 | 5768381 | Apparatus for key distribution in an encryption system | |||
3128 | 5768380 | Method for sending a communication unit parameter to a plurality of communication units | |||
3129 | 5768378 | Key distribution in a multiple access network using quantum cryptography | |||
3130 | 5764772 | Differential work factor cryptography method and system | |||
3131 | 5764771 | Method for processing a digital signal in a so-called secure communication system and use of this method for access control and/or binary signature | |||
3132 | 5764768 | Blind encryption | |||
3133 | 5764767 | System for reconstruction of a secret shared by a plurality of participants | |||
3134 | 5764766 | System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same | |||
3135 | 5764765 | Method for key distribution using quantum cryptography | |||
3136 | 5761311 | Blind encryption | |||
3137 | 5761307 | Method for securing data in a telecommunications system | |||
3138 | 5761306 | Key replacement in a public key cryptosystem | |||
3139 | 5761305 | Key agreement and transport protocol with implicit signatures | |||
3140 | 5757924 | Network security device which performs MAC address translation without affecting the IP address | |||
3141 | 5757912 | System and method for quantum cryptography | |||
3142 | 5757911 | Encryption communication process and terminal for encryption communication | |||
3143 | 5748736 | System and method for secure group communications via multicast or broadcast | |||
3144 | 5748735 | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |||
3145 | 5748734 | Circuit and method for generating cryptographic keys | |||
3146 | 5745578 | Apparatus and method for secure communication based on channel characteristics | |||
3147 | 5745576 | Method and apparatus for initialization of cryptographic terminal | |||
3148 | 5745573 | System and method for controlling access to a user secret | |||
3149 | 5745572 | Cryptographic key management | |||
3150 | 5745044 | Electronic security system | |||
3151 | 5742682 | Method of manufacturing secure boxes in a key management system | |||
3152 | 5737420 | Method for secure data transmission between remote stations | |||
3153 | 5737419 | Computer system for securing communications using split private key asymmetric cryptography | |||
3154 | 5732139 | Quantum cryptographic system with reduced data loss | |||
3155 | 5729609 | Method for producing a common key in two devices, in order to implement a common cryptographic procedure, and associated apparatus | |||
3156 | 5721777 | Escrow key management system for accessing encrypted data with portable cryptographic modules | |||
3157 | 5720034 | Method for secure key production | |||
3158 | 5719938 | Methods for providing secure access to shared information | |||
3159 | 5712912 | Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques | |||
3160 | 5712800 | Broadcast key distribution apparatus and method using chinese remainder | |||
3161 | 5708711 | Method for selecting a preferred time interval in which to update a communication unit parameter | |||
3162 | 5708710 | Method and apparatus for authentication in a communication system | |||
3163 | 5706348 | Use of marker packets for synchronization of encryption/decryption keys in a data communication network | |||
3164 | 5706347 | Method and system for authenticating a computer network node | |||
1997 | |||||
3165 | 5696823 | High-bandwidth encryption system with low-bandwidth cryptographic modules | |||
3166 | 5687237 | Encryption key management system for an integrated circuit | |||
3167 | 5686904 | Secure self learning system | |||
3168 | 5680460 | Biometric controlled key generation | |||
3169 | 5680458 | Root key compromise recovery | |||
3170 | 5680456 | Method of manufacturing generic meters in a key management system | |||
3171 | 5677954 | Cryptical control method for personal communication | |||
3172 | 5675649 | Process for cryptographic key generation and safekeeping | |||
3173 | 5675648 | System and method for key distribution using quantum cryptography | |||
3174 | 5668877 | Method and apparatus for stepping pair keys in a key-management scheme | |||
3175 | 5666414 | Guaranteed partial key-escrow | |||
3176 | 5664017 | Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow | |||
3177 | 5663896 | Broadcast key distribution apparatus and method using Chinese Remainder | |||
3178 | 5661803 | Method of token verification in a key management system | |||
3179 | 5659615 | Secure satellite receive-only local area network with address filter | |||
3180 | 5651066 | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information | |||
3181 | 5647000 | Failsafe key escrow system | |||
3182 | 5640454 | System and method for access field verification | |||
3183 | 5638445 | Blind encryption | |||
3184 | 5638444 | Secure computer communication method and system | |||
3185 | 5633933 | Method and apparatus for a key-management scheme for internet protocols | |||
3186 | 5633929 | Cryptographic key escrow system having reduced vulnerability to harvesting attacks | |||
3187 | 5633928 | Key escrow method with warrant bounds | |||
3188 | 5631961 | Device for and method of cryptography that allows third party access | |||
3189 | 5625692 | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing | |||
3190 | 5623546 | Encryption method and system for portable data | |||
3191 | 5621795 | System and method for fault tolerant key management | |||
3192 | 5619572 | Method and apparatus for providing secure communications for a requested call | |||
3193 | 5615266 | Secure communication setup method | |||
3194 | 5615265 | Process for the transmission and reception of conditional access programs controlled by the same operator | |||
3195 | 5604806 | Apparatus and method for secure radio communication | |||
3196 | 5604801 | Public key data communications system under control of a portable security device | |||
3197 | 5602918 | Application level security system and method | |||
3198 | 5602917 | Method for secure session key generation | |||
3199 | 5602915 | Process for the control of secret keys between two smart cards | |||
3200 | 5600725 | Digital signature method and key agreement method | |||
3201 | 5592554 | Method for data security in a digital telecommunication system | |||
3202 | 5592552 | Broadcast encryption | |||
1996 | |||||
3203 | 5588060 | Method and apparatus for a key-management scheme for internet protocols | |||
3204 | 5588059 | Computer system and method for secure remote communication sessions | |||
3205 | 5586185 | Communications system capable of communicating encrypted information | |||
3206 | 5583939 | Secure, swift cryptographic key exchange | |||
3207 | 5574785 | Enciphered communication system | |||
3208 | 5568301 | Optical communication system with secure key transfer | |||
3209 | 5564106 | Method for providing blind access to an encryption key | |||
3210 | 5563950 | System and methods for data encryption using public key cryptography | |||
3211 | 5559889 | System and methods for data encryption using public key cryptography | |||
3212 | 5557765 | System and method for data recovery | |||
3213 | 5557678 | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
3214 | 5557346 | System and method for key escrow encryption | |||
3215 | 5555309 | Cryptographic key management apparatus and methods | |||
3216 | 5548649 | Network security bridge and associated method | |||
3217 | 5541994 | Fingerprint controlled public key cryptographic system | |||
3218 | 5541581 | Electronic combination lock security system | |||
3219 | 5539824 | Method and system for key distribution and authentication in a data communication network | |||
3220 | 5535276 | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | |||
3221 | 5519778 | Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications between the users | |||
3222 | 5519706 | Dynamic user registration method in a mobile communications network | |||
3223 | 5517567 | Key distribution system | |||
3224 | 5515441 | Secure communication method and apparatus | |||
3225 | 5515439 | Exchange certificate for one way validation of information | |||
3226 | 5515438 | Quantum key distribution using non-orthogonal macroscopic signals | |||
3227 | 5513263 | Method for establishing classes within a communication network | |||
3228 | 5513245 | Automatic generation of private authentication key for wireless communication systems | |||
3229 | 5509077 | Method for data security in a digital telecommunication system | |||
3230 | 5506904 | System and method for transmitting and receiving variable length authorization control for digital services | |||
3231 | 5504817 | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications | |||
3232 | 5495533 | Personal key archive | |||
3233 | 5491752 | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | |||
3234 | 5491750 | Method and apparatus for three-party entity authentication and key distribution using message authentication codes | |||
3235 | 5491749 | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks | |||
3236 | 5485577 | Method and apparatus for incremental delivery of access rights | |||
3237 | 5481613 | Computer network cryptographic key distribution system | |||
3238 | 5481610 | Digital radio transceiver with encrypted key storage | |||
1995 | |||||
3239 | 5475757 | Secure data transmission method | |||
3240 | 5471532 | Method of rekeying roaming communication units | |||
3241 | 5469507 | Secure communication and computation in an insecure environment | |||
3242 | 5467398 | Method of messaging in a communication system | |||
3243 | 5457748 | Method and apparatus for improved security within encrypted communication devices | |||
3244 | 5455862 | Apparatus and method for encrypting communications without exchanging an encryption key | |||
3245 | 5450493 | Secure communication method and apparatus | |||
3246 | 5448638 | Security apparatus and system for retail environments | |||
3247 | 5444781 | Method and apparatus for decryption using cache storage | |||
3248 | 5442703 | Method for identifying corrupt encryption keys within a secure communication system | |||
3249 | 5440635 | Cryptographic protocol for remote authentication | |||
3250 | 5436972 | Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets | |||
3251 | 5420577 | Method for providing communication between a distribution panel and console interface units | |||
3252 | 5416842 | Method and apparatus for key-management scheme for use with internet protocols at site firewalls | |||
3253 | 5416841 | Cryptography system | |||
3254 | 5412723 | Mechanism for keeping a key secret from mobile eavesdroppers | |||
3255 | 5412722 | Encryption key management | |||
3256 | 5412721 | Method for loading and utilizing a key in a secure transmission device | |||
3257 | 5410602 | Method for key management of point-to-point communications | |||
3258 | 5406628 | Public key authentication and key agreement for low-cost terminals | |||
3259 | 5404404 | Method for updating encryption key information in communication units | |||
3260 | 5404403 | Key management in encryption systems | |||
3261 | 5402491 | Method for providing limited secure services in secure trunking communication systems | |||
3262 | 5400403 | Abuse-resistant object distribution system and method | |||
3263 | 5386471 | Method and apparatus for securely conveying network control data across a cryptographic boundary | |||
3264 | 5384850 | Security apparatus and system for retail environments | |||
3265 | 5381481 | Method and apparatus for uniquely encrypting a plurality of services at a transmission site | |||
3266 | 5381479 | Method for over the air rekeying of multiple communication groups | |||
3267 | 5381478 | Cipher communication system for transaction data | |||
1994 | |||||
3268 | 5375169 | Cryptographic key management method and apparatus | |||
3269 | 5371794 | Method and apparatus for privacy and authentication in wireless networks | |||
3270 | 5369705 | Multi-party secure session/conference | |||
3271 | 5363447 | Method for loading encryption keys into secure transmission devices | |||
3272 | 5357571 | Method for point-to-point communications within secure communication systems | |||
3273 | 5351294 | Limited broadcast system | |||
3274 | 5351293 | System method and apparatus for authenticating an encrypted signal | |||
3275 | 5345508 | Method and apparatus for variable-overhead cached encryption | |||
3276 | 5345506 | Mutual authentication/cipher key distribution system | |||
3277 | 5341427 | Algorithm independent cryptographic key management apparatus | |||
3278 | 5341426 | Cryptographic key management apparatus and method | |||
3279 | 5341425 | Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site | |||
3280 | 5337357 | Method of software distribution protection | |||
3281 | 5335281 | Network controller and method | |||
3282 | 5325434 | Method for authenticating communications participants, system for application of the method and first communications participant and second communication participant for application in the system | |||
3283 | 5325433 | Encryption communication system | |||
3284 | 5325432 | Method for updating encryption key information in communication units | |||
3285 | 5315658 | Fair cryptosystems and methods of use | |||
3286 | 5313521 | Key distribution protocol for file transfer in the local area network | |||
3287 | 5309516 | Group cipher communication method and group cipher communication system | |||
3288 | 5307523 | Protective eyewear | |||
3289 | 5307411 | Means for identification and exchange of encryption keys | |||
3290 | 5307410 | Interferometric quantum cryptographic key distribution system | |||
3291 | 5301247 | Method for ensuring secure communications | |||
3292 | 5301233 | Process for the transmission and reception of personalized programs | |||
3293 | 5301232 | Method and apparatus for over-the-air programming of communication devices | |||
3294 | 5299263 | Two-way public key authentication and key agreement for low-cost terminals | |||
3295 | 5276737 | Fair cryptosystems and methods of use | |||
1993 | |||||
3296 | 5272752 | Authorization code lockout mechanism for preventing unauthorized reception of transmitted data | |||
3297 | 5268962 | Computer network with modified host-to-host encryption keys | |||
3298 | 5265164 | Cryptographic facility environment backup/restore and replication in a public key cryptosystem | |||
3299 | 5253294 | Secure transmission system | |||
3300 | 5251258 | Key distribution system for distributing a cipher key between two subsystems by one-way communication | |||
3301 | 5247576 | Key variable identification method | |||
3302 | 5243649 | Apparatus and method for quantum mechanical encryption for the transmission of secure communications | |||
3303 | 5241599 | Cryptographic protocol for secure communications | |||
3304 | 5241598 | Rolling key resynchronization in cellular verification and validation system | |||
3305 | 5237611 | Encryption/decryption apparatus with non-accessible table of keys | |||
3306 | 5230020 | Algorithm independent cryptographic key management | |||
3307 | 5228084 | Security apparatus and system for retail environments | |||
3308 | 5227613 | Secure encrypted data communication system having physically secure IC cards and session key generation based on card identifying information | |||
3309 | 5222140 | Cryptographic method for key agreement and user authentication | |||
3310 | 5222136 | Encrypted communication system | |||
3311 | 5220606 | Cryptographic system and method | |||
3312 | 5218638 | Encipher method and decipher method | |||
3313 | 5216715 | Key distribution in public communication networks taking account of security gradations | |||
3314 | 5214698 | Method and apparatus for validating entry of cryptographic keys | |||
3315 | 5208859 | Method for rekeying secure communication units by group | |||
3316 | 5204901 | Public key cryptographic mechanism | |||
3317 | 5202922 | Data communication system | |||
3318 | 5202921 | Method and apparatus for authenticating users of a communication system to each other | |||
3319 | 5201000 | Method for generating public and private key pairs without using a passphrase | |||
3320 | 5200999 | Public key cryptosystem key management based on control vectors | |||
3321 | 5199072 | Method and apparatus for restricting access within a wireless local area network | |||
3322 | 5179591 | Method for algorithm independent cryptographic key management | |||
3323 | 5177791 | Secure translation of usage-control values for cryptographic keys | |||
1992 | |||||
3324 | 5175766 | Signalling scheme for controlling data encryption device in an electronic fund transaction processing system | |||
3325 | 5173938 | Key management system | |||
3326 | 5164988 | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem | |||
3327 | 5161244 | Cryptographic system based on information difference | |||
3328 | 5161189 | Encryption and decryption of chained messages | |||
3329 | 5151938 | Security enhancement in a data processor through use of dynamic parameter authentication | |||
3330 | 5150411 | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction | |||
3331 | 5150408 | Key distribution communication system | |||
3332 | 5146498 | Remote key manipulations for over-the-air re-keying | |||
3333 | 5146497 | Group rekey in a communication system | |||
3334 | 5144667 | Method of secure remote access | |||
3335 | 5144665 | Cryptographic communication method and system | |||
3336 | 5142578 | Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors | |||
3337 | 5142577 | Method and apparatus for authenticating messages | |||
3338 | 5140317 | Electronic security system | |||
3339 | 5136642 | Cryptographic communication method and cryptographic communication device | |||
3340 | 5124117 | Cryptographic key distribution method and system | |||
3341 | 5117458 | Secret information service system and method | |||
3342 | 5115467 | Signal encryption apparatus for generating common and distinct keys | |||
3343 | 5115466 | Communication network intended for secure transmission of speech and data | |||
3344 | 5111504 | Information processing apparatus with replaceable security element | |||
3345 | 5103478 | Secure management of keys using control vectors with multi-path checking | |||
3346 | 5093860 | Key management system | |||
3347 | 5081678 | Method for utilizing an encrypted key as a key identifier in a data packet in a computer network | |||
1991 | |||||
3348 | 5073935 | Method for secure communication | |||
3349 | 5073934 | Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key | |||
3350 | 5048087 | Key management for encrypted packet based networks | |||
3351 | 5029208 | Cipher-key distribution system | |||
3352 | 5016276 | Common cryptokey generation system and communication system using common cryptokeys | |||
3353 | 5010572 | Distributed information system having automatic invocation of key management negotiations protocol and method | |||
3354 | 5007089 | Secure key management using programable control vector checking | |||
3355 | 5003593 | Teleconferencing method for a secure key management system | |||
3356 | 5001756 | Decryption device with variable clock | |||
3357 | 4995080 | Television signal scrambling system and method | |||
3358 | 4993069 | Secure key management using control vector translation | |||
3359 | 4993067 | Secure satellite over-the-air rekeying method and system | |||
1990 | |||||
3360 | 4965804 | Key management for encrypted packet based networks | |||
3361 | 4956863 | Cryptographic method and apparatus for public key exchange with authentication | |||
3362 | 4941176 | Secure management of keys using control vectors | |||
3363 | 4941173 | Device and method to render secure the transfer of data between a videotex terminal and a server | |||
3364 | 4935961 | Method and apparatus for the generation and synchronization of cryptographic keys | |||
3365 | 4933971 | Method for encrypting transmitted data using a unique key | |||
3366 | 4924515 | Secure management of keys using extended control vectors | |||
3367 | 4924513 | Apparatus and method for secure transmission of data over an unsecure transmission channel | |||
3368 | 4918728 | Data cryptography operations using control vectors | |||
3369 | 4912762 | Management of cryptographic keys | |||
3370 | 4910773 | Method of dispatching secret keys to security modules and user cards in a data processing network | |||
1989 | |||||
3371 | 4888801 | Hierarchical key management system | |||
3372 | 4888800 | Secure messaging systems | |||
3373 | 4881263 | Apparatus and method for secure transmission of data over an unsecure transmission channel | |||
3374 | 4876716 | Key distribution method | |||
3375 | 4864615 | Reproduction of secure keys by using distributed key generation data | |||
3376 | 4850017 | Controlled use of cryptographic keys via generating station established control values | |||
3377 | 4811393 | Method and system for diversification of a basic key and for authentication of a thus-diversified key | |||
3378 | 4797672 | Voice network security system | |||
1988 | |||||
3379 | 4771461 | Initialization of cryptographic variables in an EFT/POS network with a large number of terminals | |||
3380 | 4771459 | System for storing and distributing keys for cryptographically protected communication | |||
3381 | 4731840 | Method for encryption and transmission of digital keying data | |||
1987 | |||||
3382 | 4658292 | Enciphering key distribution system for subscription TV broadcast or catv system | |||
1986 | |||||
3383 | 4607137 | Method of distributing and utilizing enciphering keys | |||
3384 | 4578532 | Method and apparatus for code transmission | |||
3385 | 4578531 | Encryption system key distribution method and apparatus | |||
1981 | |||||
3386 | 4288659 | Method and means for securing the distribution of encoding keys | |||
1980 | |||||
3387 | 4200770 | Cryptographic apparatus and method | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |