СПИСОК патентов США - подгруппа МПК16 H04L9/08



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19609280Method for controlling access to a plurality of channels by a receiver/decoder
29609024Method and system for policy based authentication
39608971Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers
49608968Connection architecture for a mobile network
59608967Method and system for establishing a session key
69608945Sending messages to multiple receiving electronic devices using a message server
79608825Trusted platform module certification and attestation utilizing an anonymous key system
89608823Secure remote kernel module signing
99608822Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided
109608819Learning parity with noise-based relational encryption for proximity relations
119608818Cryptographic communication system and cryptographic communication method
129608817Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
139608816Shared data encryption and confidentiality
149608814System and method for centralized key distribution
159608813Key rotation techniques
169608812Common secret key generation device, encryption device, decryption device, common secret key generation method, encryption method, decryption method, and program
179608811Managing access to a secure digital document
189608810Systems and methods for encryption and provision of information security using platform services
199608809Systems and methods for encryption and provision of information security using platform services
209608808Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof
219608807Hearing device with communication protection and related method
229608806Extending data confidentiality into a player application
239608805Encryption key generation
249608804Secure key authentication and ladder system
259607256Augmenting and updating data using encrypted machine-readable identifiers
269607180Information processing apparatus, control method for controlling the information processing apparatus in a maintenance mode, and storage medium
279607177Method for securing content in dynamically allocated memory using different domain-specific keys
289607173Information processing apparatus, information processing method, and recording medium
299607159Intelligent key selection and generation
309607131Secure and efficient content screening in a networked environment
319603015Encrypted communication between paired devices
329602507Virtual smart card to perform security-critical operations
339602500Secure import and export of keying material
349602485Network, network node with privacy preserving source attribution and admission control and device implemented method therfor
359602480Methods and apparatus for data access control
369602479Encryption based on network information
379602478Trust relationships in a computerized system
389602457Mobile device having power save feature for establishing communications
399602286Electronic device and method for extracting encrypted message
409602285Authentication device, authentication method, and program
419602284Secure offline authentication
429602282Secure software and hardware association technique
439602280System and method for content encryption in a key/value store
449602278Encryption device, cipher-text comparison system, cipher-text comparison method, and cipher-text comparison program
459602277User interface systems and methods for secure message oriented communications
469602276Method and apparatus for virtual pairing with a group of semi-connected devices
479602275Server pool kerberos authentication scheme
489602274Secure password generation
499602220Quantum repeater network system
509601016Communication system, vehicle-mounted terminal, roadside device
519600686Augmented reality based privacy and decryption
529600649Authentication method using liveness verification
539600640Multimedia network system with content importation, content exportation, and integrated content management
549596436Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box
559596344System and method for encrypting and recording media for a contact center
569596221Encryption of user data for storage in a cloud server
579596220Secure protocol for peer-to-peer network
589596181Two stage bloom filter for longest prefix match
599596090Method for controlling data acquisition for a plurality of field devices
609596088Systems and methods for biometric e-signature
619596086Password-based authentication
629596081Order preserving tokenization
639596080Method of generating prime numbers proven suitable for chip cards
649596079Secure telecommunications
659596078Set of servers for "machine-to-machine" communications using public key infrastructure
669596077Community of interest-based secured communications over IPsec
679596076Encrypted data exchange between computer systems
689594927Providing a trusted execution environment using a processor
699594922Non-persistent shared authentication tokens in a cluster of nodes
709594920Managing keys used for encrypting data
719594918Computer data protection using tunable key derivation function
729594916Method and devices for providing secure data backup from a mobile communication device to an external computing device
739594698Local keying for self-encrypting drives (SED)
749591682Automatic password handling
759591479Secure telecommunications
769591068Updating error recovery information in a dispersed storage network
779590989Data access and anonymity management
789590981System, method, and device for delivering communications and storing and delivering data
799590963System and method for key management for issuer security domain using global platform specifications
809590959Data security service
819590807Identity based public key cryptosystem
829590806Secure provisioning of semiconductor chips in untrusted manufacturing factories
839590805Ladder-based cryptographic techniques using pre-computed points
849590804Identification information generation device and identification information generation method
859589397Securing internet of things (IoT) based entrance/exit with multi-factor authentication
869589309Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
879589159Creating secure communication channels between processing elements
889589158Programmable intelligent search memory (PRISM) and cryptography engine enabled secure DRAM
899589156System and method for intercept of UEFI block I/O protocol services for bios based hard drive encryption support
909589151Techniques and architecture for anonymizing user data
919589148Systems and methods for securing data in motion
929589143Semi-trusted Data-as-a-Service platform
939588705Efficient elimination of access to data on a writable storage media
949584696Imaging systems with embedded data transmission capabilities
959584508Peer to peer enterprise file sharing
969584495Method and system for establishing secure communications using composite key cryptography
979584490Computer-readable, non-transitory medium storing digital content distributing program, computer-readable, non-transitory medium storing digital content playback program, digital content distributing apparatus and digital content playback apparatus
989584326Creating a new file for a dispersed storage network
999584325User-configurable cryptographic interface controller
1009584323Compressing encrypted data without the encryption key
1019584320Blinding function in elliptic curve cryptography
1029584319Optical receiving device in optical communication system, control method and device of photon detector, and dark count evaluation method of photon detector
1039584318Perfect forward secrecy distributed denial of service attack defense
1049584317Identifying security boundaries on computing devices
1059584316Digital security bubble
1069584315Order-preserving encryption system, encryption device, decryption device, encryption method, decryption method, and programs thereof
1079584314Event-driven, asset-centric key management in a smart grid
1089582678Method for secure storing of a data file via a computer communication network
1099582672Encrypted file storage
1109582671Security and data privacy for lighting sensory networks
1119578035System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
1129578017Secure management of operations on protected virtual machines
1139577997Authentication system and authentication method
1149577993System and method for authenticating users
1159577992Data encryption/decryption using neuro and neuro-mechanical fingerprints
1169577990Control of access to a secondary system
1179577828Batch verification method and apparatus thereof
1189577827Information processing device, information processing method, and program
1199577826Method of generating proven prime numbers suitable for being implemented in a smart card
1209577825Quantum key distribution via pulse position modulation
1219577824Delivering a content item from a server to a device
1229577823Rule-based validity of cryptographic key material
1239577764Quantum key distribution terminal and system
1249576156Download security system
1259576149Methods, systems and computer program product for providing verification code recovery and remote authentication
1269576133Detection of data tampering of encrypted data
1279575727Methods for generating random data using phase change materials and related devices and systems
1289572033Systems and methods for encrypted mobile voice communications
1299571527System and method for interactive session provision
1309571494Authorization server and client apparatus, server cooperative system, and token management method
1319571485Spatial and temporal verification of users and/or user devices
1329571475Call encryption systems and methods
1339571469Computer implemented system and method for ahead-of-time delivery of electronic content
1349571467Information management system, information processing device, and non-transitory computer readable medium
1359571464Network-enabled device provisioning
1369571463Policy-based access control in content networks
1379571462Extensible personality-based messaging system in a distributed computerized infrastructure for establishing a social network
1389571459Synchronizing a routing-plane and crypto-plane for routers in virtual private networks
1399571284Controlling access to personal information stored in a vehicle using a cryptographic key
1409571279Systems and methods for secured backup of hardware security modules for cloud-based web services
1419571278Encryption key recovery in the event of storage management failure
1429571277Method for generating a key in a network and user on a network and network
1439571276Derivation of a device-specific value
1449571275Single use identifier values for network accessible devices
1459571274Key agreement protocol
1469571273Method and system for the accelerated decryption of cryptographically protected user data units
1479571272Image forming apparatus, information processing method, and control method
1489571271Sending messages by oblivious transfer
1499571268Method and system for homomorphicly randomizing an input
1509571267Data processor and decryption method
1519569774System and method for processing feedback entries received from software
1529569731Quantum communication device, quantum communication method, and computer program product
1539569630Method and system for providing an encryption proxy
1549569629Communication between key manager and storage subsystem kernel via management console
1559569628Specialized circuitry for cryptographic authentication and other purposes
1569569627Systems and methods for governing content rendering, protection, and management applications
1579569623Secure boot with resistance to differential power analysis and other external monitoring attacks
1589565559Method and system for preserving privacy during data aggregation in a wireless sensor network
1599565558Securing communications of a wireless access point and a mobile device
1609565296Call event tagging and call recording stitching for contact center call recordings
1619565172Method for enabling a secure provisioning of a credential, and related wireless devices and servers
1629565171Efficient key hierarchy for delivery of multimedia content
1639565020System and method for generating a server-assisted strong password from a weak secret
1649565019Secure and anonymous distributed authentication
1659563853Efficient information reconciliation method using turbo codes over the quantum channel
1669563773Systems and methods for securing BIOS variables
1679563762Method for generating an identifier
1689563507Rebuilding a data revision in a dispersed storage network
1699560059System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
1709560024Pairwise temporal key creation for secure networks
1719559852Cryptographic security functions based on anticipated changes in dynamic minutiae
1729559851Secure pairing for secure communication across devices
1739559848Method, apparatus, and instructions for safely storing secrets in system memory
1749559847Content access for duration of calendar events
1759559845Systems, methods and apparatuses for the secure transmission of media content
1769559844Non-linear processor, stream-cipher encrypting device, stream-cipher decrypting device, mask processing method, stream-cipher encrypting method, stream-cipher decrypting method, and program
1779559842Trusted key management for virtualized platforms
1789559840Low-bandwidth time-embargoed content disclosure
1799559839Message key generation
1809559837Methods for cryptographic delegation and enforcement of dynamic access to stored data
1819559748Methods and apparatuses using filter banks for multi-carrier spread spectrum signals
1829558680Payload in picture encoding
1839558511Method and system for providing electronic content to a user
1849558374Methods and systems for securing stored information
1859558370Cloud key directory for federating data exchanges
1869558362Data encryption using an external arguments encryption algorithm
1879558358Random number generator in a virtualized environment
1889558354Method for generating and executing encrypted BIOS firmware and system therefor
1899554419Pairing method and apparatus for ad-hoc connection in wireless communication terminal
1909554270Enhanced security for direct link communications
1919553857Communication system, communication apparatus, communication method, and computer program
1929553856Secure session capability using public-key cryptography without access to the private key
1939553731Transmission method and system for terminal unique information
1949553726Method for distributed identification of a station in a network
1959553725System and method for authenticating data
1969553723Multi-dimensional encryption
1979553722Generating a key based on a combination of keys
1989553721Secure execution environment communication
1999553720Using key material protocol services transparently
2009553719Transmitting terminal, receiving terminal, ID numbering device, and key transmission method
2019552498On-chip storage, creation, and manipulation of an encryption key
2029548972Multi-drive cooperation to generate an encryption key
2039548862Managing entropy in computing devices for cryptographic key generation
2049548861Encrypted statistical processing system, device, method, and program
2059548860Asymmetric-computing type shared key establishing method suitable for cloud computing and IoT
2069548859Ticket-based implementation of content leasing
2079548814System and method for communication over color encoded light patterns
2089547860System for processing feedback entries received from software
2099547774System and method for distributed deduplication of encrypted chunks
2109547771Policy enforcement with associated data
2119544929Communication apparatus and communication parameter configuration method thereof
2129544769Method for providing application service
2139544282Changing group member reachability information
2149544280Utilization of a protected module to prevent offline dictionary attacks
2159544277KAFKA: A cellular automation / complex Fibonacci sequences-based technique for encrypting and decrypting audio, video and text messages
2169544276Method for transmitting and receiving a multimedia content
2179544145Device, method, and medium for facility management verification
2189544144Data encryption
2199544142Data authentication using plural electronic keys
2209544141Secure key storage using physically unclonable functions
2219544140Multi-level key hierarchy for securing cloud-based data sets
2229544139Method and apparatus for a non-deterministic random bit generator (NRBG)
2239544138Authenticator, authenticatee and authentication method
2249544137Encrypted boot volume access in resource-on-demand environments
2259544136Key agreement in wireless networks with active adversaries
2269544135Methods of and systems for facilitating decryption of encrypted electronic information
2279544134Searchable encrypted data
2289544130Protection of a calculation against side-channel attacks
2299542157Random number generator and method for generating random numbers
2309538373Method and device for negotiating security capability when terminal moves
2319537918File sharing with client side encryption
2329537864Encryption system using web browsers and untrusted web servers
2339537847Image based key derivation function
2349537841Key management for compromised enterprise endpoints
2359537837Method for ensuring media stream security in IP multimedia sub-system
2369537835Secure mobile app connection bus
2379537832Method, system and device for establishing link
2389537716Establishing a direct connection between remote devices
2399537660Method of establishing public key cryptographic protocols against quantum computational attack
2409537658Password-based authentication
2419537656Systems and methods for managing cryptographic keys in a secure microcontroller
2429537655Random number generating device, cipher processing device, storage device, and information processing system
2439537654Biometric validation method and biometric terminal
2449537653Encryption key generating apparatus and computer program product
2459537652Polymorphic encryption key allocation scheme
2469536581Tamper-resistant non-volatile memory device
2479536113Information processing apparatus, information processing system, and computer program product
2489536102Privacy-protective data transfer
2499536098Methods and systems for concealing information
2509536047Privacy-enhancing technologies for medical tests using genomic data
2519535852System and method for secured host-slave communication
2529535702Asset management device and method in a hardware platform
2539535658Secure private database querying system with content hiding bloom filters

2016

2549532223Method for downloading a subscription from an operator to a UICC embedded in a terminal
2559531775Mobile application migration to cloud computing platform
2569531772Dynamic profile sharing using expiring tokens
2579531691Providing forward secrecy in a terminating TLS connection proxy
2589531688Approach for message level encryption for service APIs
2599531685Providing forward secrecy in a terminating SSL/TLS connection proxy using Ephemeral Diffie-Hellman key exchange
2609531682Splicing into an active TLS session without a certificate or private key
2619531679Content-based transport security for distributed producers
2629531537System and method for performing secure communications
2639531536Shared keys in a computerized system
2649531535Secure memories using unique identification elements
2659531534Generating device, re-encrypting device, method, and computer program product
2669531533Rule-based validity of cryptographic key material
2679531532Method for establishing a secure communication channel
2689530137Method and apparatus for secure access payment and identification
2699530013Supporting the use of a secret key
2709530011Method and system for provision of cryptographic services
2719530009Secure execution and update of application module code
2729530005Techniques for secure data management in a distributed environment
2739529735Secure data encryption in shared storage using namespaces
2749529734Smart storage device
2759529733Systems and methods for securely accessing encrypted data stores
2769529732Key rotation for a memory controller
2779526009Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card
2789526007Location brokering for providing security, privacy and services
2799525999Method of securely transferring services between mobile devices
2809525676Message content adjudication based on security token
2819525674Method for the encryption of data
2829525670Computer product, recording medium, communications apparatus, and communications method
2839525557Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method
2849525548Provisioning techniques
2859525547Transmission of media keys
2869525546Cryptographic operation by applying sub-keys to multiplication units in accordance with galois-field arithmetic
2879524746Server device, playback device and content distribution system
2889524400Method and apparatus for remotely provisioning software-based security coprocessors
2899524370Method for privacy-preserving medical risk test
2909521546Secure RF communication method, terminal and system
2919521370Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
2929521132Secure data storage
2939521124Secure computation using a server module
2949521123Method for file encryption
2959521090Authorizing stations into a centrally managed network
2969521001Privacy preserving electronic document signature service
2979520996Ciphering data for transmission in a network
2989520995Efficient prime-number check
2999520994System and method for deriving secrets from a master key bound to an application on a device
3009520993Renewable traitor tracing
3019520992Logical-to-physical address translation for a removable data storage device
3029520991Apparatus for handling bills and/or coins, and method for initializing and operating such an apparatus
3039520990System and method for software protection and secure software distribution
3049519808Method and apparatus for protecting data in a portable electronic device
3059519757AES-GCM based enhanced security setup for media encryption
3069516500ID-based control unit-key fob pairing
3079516364Secure transcoding of content
3089516002Systems and methods for securing data in motion
3099515999Automated access, key, certificate, and credential management
3109515994Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario
3119515832Process authentication and resource permissions
3129515830Universal hash function computing device, method and program
3139515829Information distribution method, information distribution system and in-vehicle terminal
3149515828Sharing a secret via linear interpolation
3159515827Key management device, communication device, communication system, and computer program product
3169515826Network topology aided by smart agent download
3179515825Method for password based authentication and apparatus executing the method
3189515824Provisioning devices for secure wireless local area networks
3199515823Cryptographic device with detachable data planes
3209515822System and method of secure encryption for electronic data transfer
3219515821Apparatus and method for data encryption
3229515818Multi-block cryptographic operation
3239514329Computer-implemented system and method for individual message encryption using a unique key
3249514321Electro device for protecting user's privacy and method for controlling thereof
3259510385Methods and apparatus to connect wireless-enabled devices
3269510375Method and apparatus for accelerated link setup
3279510194Open and encrypted wireless network access
3289509737Client side encryption with recovery method
3299509720Techniques for improved run time trustworthiness
3309509690Methods and systems for managing network activity using biometrics
3319509686Secure element authentication
3329509679System and method for non-replayable communication sessions
3339509669Efficient routing of streams encrypted using point-to-point authentication protocol
3349509668Content distribution method, content distribution system, source device, and sink device
3359509667Method and system for digital rights management of documents
3369509516Apparatus and method for providing digital signature
3379509514Deleting encoded data slices in a dispersed storage network
3389509510Communication device, communication method, and computer program product
3399509509Random identifier generation for offline database
3409509508Generating a session key for authentication and secure data transfer
3419509507Information distribution system using quantum entanglement in a timed network delivery system
3429509506Quantum key management
3439509505Group management of authenticated entities
3449509504Cryptographic key manager for application servers
3459509503Encrypted boot volume access in resource-on-demand environments
3469509502Symmetric keying and chain of trust
3479509501Storage encryption
3489509500Method and apparatus for migrating encrypted data
3499509499Electronic key registration method and electronic key registration system
3509509498System and method for transmitting data
3519509497Method for generating a random output bit sequence
3529509496Electronic key registration system
3539509494Computer-implemented system and method for providing secure data processing in a cloud using discrete homomorphic encryption
3549509414Encryption and decryption method and device
3559507964Regulating access using information regarding a host machine of a portable storage drive
3569507751Managing seed data
3579507735Digital content retrieval utilizing dispersed storage
3589503939Neighbor list broadcasting techniques
3599503898Hybrid mobile device and radio system
3609503764Processing and/or distributing media content associated with at least one parameter related to a memory operation
3619503453OTP-based authentication system and method
3629503435Load balancing hash computation for network switches
3639503433Method and apparatus for cloud-assisted cryptography
3649503431Simple protocol for tangible security
3659503264Attribute based encryption using lattices
3669503263Method and apparatus for storing encrypted data files across distributed storage media
3679503260Security token and service access system
3689503259System and method for generating and protecting cryptographic keys
3699503258System and method for communication using orbital angular momentum with multiple layer overlay modulation
3709503257Quantum key distribution device, quantum key distribution system, and quantum key distribution method
3719503256SMS4 acceleration hardware
3729501675RFID tag and reader authentication by trusted authority
3739501665Method and apparatus for remotely provisioning software-based security coprocessors
3749501429Dynamic key and rule storage protection
3759497625Method for negotiating security capability when terminal moves
3769497514DTCP converter for HLS
3779497185Systems, methods, and computer program products for providing application validation
3789497175Iterative data secret-sharing transformation
3799497174Systems, methods, and computer-readable media for secure digital communications and networks
3809497172Method of encrypting and transferring data between a sender and a receiver using a network
3819497171Method, device, and system for securely sharing media content from a source device
3829497029Hardening of direct anonymous attestation from side-channel attack
3839497026Authorizing removable medium access
3849497024Electronic file sending method
3859497023Multiply-encrypted message for filtering
3869495588Biometric template security and key generation
3879495544Secure data transmission and verification with untrusted computing devices
3889491618Serving network authentication
3899491521Trick play seek operation for HLS converted from DTCP
3909491146Computational systems and methods for encrypting data for anonymous storage
3919491040Determination and display of LUN encryption paths
3929490982Method and storage device for protecting content
3939490980Authentication and secured information exchange system, and method therefor
3949490977Method and apparatus for enabling physical layer secret key generation
3959490976Systems and methods for providing recommendations to obfuscate an entity context
3969490975Information assurance for networked systems
3979490974Identity-based decryption
3989490973System and method for managing cryptographic keys
3999490972Method and apparatus for providing conditional access based on channel characteristics
4009490970Methods and system for secure communication between an RFID tag and a reader
4019490909Method and system for estimating the noise of a two-photon entangled state
4029489999Magnetic tunnel junction resistance comparison based physical unclonable function
4039489542Split-key arrangement in a multi-device storage enclosure
4049489540Memory controller with encryption and decryption engine
4059489528Single use recovery key
4069489525Secure storage system
4079489510Detecting generation of virtual machine authentication
4089489506Linking ad hoc networks
4099485254Method and system for authenticating a security device
4109485232User equipment credential system
4119485230Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
4129485098System and method of user authentication using digital signatures
4139485096Encryption / decryption of data with non-persistent, non-shared passkey
4149485095Client control through content key format
4159485094Systems and methods for stable physically unclonable functions
4169485093Push button configuration pairing
4179485092Electronic authentication systems
4189485091Dual-party session key derivation
4199485090Managed authentication on a distributed network
4209485089Stego key management
4219483664Address dependent data encryption
4229483663Countermeasure method for protecting stored data
4239483662Method and apparatus for remotely provisioning software-based security coprocessors
4249483656Efficient and secure data storage utilizing a dispersed data storage system
4259483655File backup with selective encryption
4269483422Access to memory region including confidential information
4279479932ID-based control unit-key fob pairing
4289479533Time based authentication codes
4299479514Method and system for controlling access to wireless apparatuses
4309479333Method of managing sensitive data in mobile terminal and escrow server for performing same
4319479332Key revocation in system on chip devices
4329479331Managing security in a system on a chip (SOC) that powers down a secure processor
4339479330Method, information service system and program for information encryption/decryption
4349479329Motor vehicle control unit having a cryptographic device
4359479328Secure key provisioning
4369479327Apparatus and method for generating key
4379477825System for transparent authentication across installed applications
4389477824Cloud control system and method for LAN-based controlled apparatus
4399473494Access credentials using biometrically generated public/private key pairs
4409473485Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
4419473474Communicating an identity of a group shared secret to a server
4429473311Method and device for managing certificates
4439473301Systems and methods for telecommunication using high-dimensional temporal quantum key distribution
4449473300Authenticated sensor interface device
4459473299Dual-party session key derivation
4469473298Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration
4479473297Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
4489473295Virtual transportation point of sale
4499471796Intelligent key selection and generation
4509471786Method for booting and dumping a confidential image on a trusted computer system
4519471279Random number generation using untrusted quantum devices
4529467850Handheld device association via shared vibration
4539467432Method and device for generating local interface key
4549467430Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware
4559467296Virally distributable trusted messaging
4569467290Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
4579467288Encryption key destruction for secure data erasure
4589467287Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method
4599467286Encryption device, decryption device, encryption method, decryption method, and program
4609467285Security of a multimedia stream
4619467284Transmitter, receiver, quantum key distribution (QKD) system and quantum key distribution method
4629467283Securing method for lawful interception
4639467282Encryption scheme in a shared data store
4649467281Information processing apparatus and program product
4659467280Methods and systems for personal authentication
4669467279Instructions and logic to provide SIMD SM4 cryptographic block cipher functionality
4679466054Interoperable systems and methods for peer-to-peer service orchestration
4689465953Secure virtual file management system
4699465952Systems and methods for secure multi-tenant data storage
4709465950Methods, apparatuses, and computer-readable storage media for securely accessing social networking data
4719465947System and method for encryption and key management in cloud storage
4729465824Rebuilding an encoded data slice within a dispersed storage network
4739465755Security parameter zeroization
4749465652Hardware-based mechanisms for updating computer systems
4759464937Method and device for differential optical phase modulation in quantum key distribution system
4769464905Over-the-air vehicle systems updating and associate security protocols
4779462624Authenticated session establishment
4789462475UICCs embedded in terminals or removable therefrom
4799462022Mobile application migration to cloud computing platform
4809461993System and methods for UICC-based secure communication
4819461975Method and system for traffic engineering in secured networks
4829461826Tamper-protected hardware and method for using same
4839461825Method and system for preventing revocation denial of service attacks
4849461824Transmitting a document
4859461822Image forming apparatus, control method, and storage medium
4869461821System and method for key material protection on devices using a secret sharing scheme
4879461820Method and apparatus for providing a conditional single sign on
4889461819Information sharing system, computer, project managing server, and information sharing method used in them
4899461818Method for encrypting a program for subsequent execution by a microprocessor configured to decrypt and execute the encrypted program
4909461817Method and system for encrypting JavaScript object notation (JSON) messages
4919460313Secure escrow service
4929460302Method and system for shielding data in transit and data in memory
4939459833System and method with specific ordered execution over physical elements
4949456342Security for network load broadcasts over cellular networks
4959455978System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added
4969455967Load balancing hash computation for network switches
4979455966Load balancing hash computation for network switches
4989455834Securely providing secret data from a sender to a receiver
4999455830Method for securing credentials in a remote repository
5009455829Method and system for decrypting a transport stream
5019455828Re-encryption system, re-encryption method and re-encryption program
5029455827Communication apparatus, computer program product, and communication system
5039454666Method for protecting data
5049454661Key versioning including hash stick technology
5059454648Distributing token records in a market environment
5069454346Extracting entropy from the vibration of multiple machines
5079454343Creating spectral wells for inserting watermarks in audio signals
5089451453Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
5099451452Method of triggering a key delivery from a mesh key distributor
5109450966Method and apparatus for lifecycle integrity verification of virtual machines
5119450950Secure session capability using public-key cryptography without access to the private key
5129450929Communication device, communication system, and computer program product
5139450928Secure registration of group of clients using single registration procedure
5149450927Enabling users to select between secure service providers using a key escrow service
5159450926Upload and download streaming encryption to/from a cloud-based platform
5169450763Server-side key generation
5179450752Method and apparatus for providing service provider-controlled communication security
5189450751Smart card, electronic device, and portable electronic device
5199450750Communication apparatus and secret information sharing method
5209450749One-time-pad encryption with central key service
5219449191Device, system and method for securing and comparing genomic data
5229449183Secure file drawer and safe
5239449180Secure data parser method and system
5249449177General protocol for proactively secure computation
5259448949Mobile data vault
5269445265Method and device for processing SRVCC switching, and terminal
5279445263Method for ensuring security and privacy in a wireless cognitive network
5289444789System and method for secure cloud service delivery with prioritized services in a network environment
5299444632Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF)
5309444622Computing platform with system key
5319444621Electronic key system
5329444620Methods for binding a session identifier to machine-specific identifiers and systems thereof
5339444619Generation of randomized messages for cryptographic hash functions
5349443240Transaction verification on RFID enabled payment and transaction instruments
5359443107Method for protecting the integrity of a group of memory elements using an aggregate authentication code
5369443097Systems and methods for securing data in motion
5379443092System and method for matching data sets while maintaining privacy of each data set
5389443068System and method for preventing unauthorized access to information
5399443066Decrypting content samples including distinct encryption chains
5409442890Distribution apparatus, restoration apparatus, distribution method, restoration method, and distribution and restoration system
5419439067Systems and methods of performing link setup and authentication
5429438571Securely connecting control device to target device
5439438569Secured embedded data encryption systems
5449438568System and method for email and file decryption without direct access to required decryption key
5459438550Mobile device power management in data synchronization over a mobile network with or without a trigger notification
5469438429Method for authentication and electronic device for performing the authentication
5479438423Encryption device, encryption method, and information processing device
5489438421Supporting a fixed transaction rate with a variably-backed logical cryptographic key
5499438420Unpredictable number generation
5509438419Probabilistic password cracking system
5519438418Systems and methods for generating a key difficult to clone
5529438417System and method for shared key agreement over untrusted communication channels
5539438416Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation
5549438415Method and system for securing communication on a home gateway in an IP content streaming system
5559438413Generating and merging keys for grouping and differentiating volumes of files
5569436846Semiconductor device and a method of manufacturing a semiconductor device
5579436845Physically unclonable fuse using a NOR type memory array
5589436841Enhanced system security
5599436819Securely pairing computing devices
5609436815Block management unification system and method
5619436812Platform-hardened digital rights management key provisioning
5629436804Establishing a unique session key using a hardware functionality scan
5639432346Protocol for controlling access to encryption keys
5649432340System and method for secure end-to-end chat system
5659432195Method of operating data security and electronic device supporting the same
5669432190Computational systems and methods for double-encrypting data for subsequent anonymous storage
5679432188Secret sharing system, data distribution apparatus, distributed data transform apparatus, secret sharing method and program
5689432187Data scrambling initialization
5699432186Password-based key derivation without changing key
5709432185Key exchange for a network architecture
5719432184Provisioning of secure storage for both static and dynamic rules for cryptographic key information
5729432183Encrypted data exchange between computer systems
5739432182Techniques for sharing data
5749430659Locating cryptographic keys stored in a cache
5759430655Split tokenization
5769430628Access authorization based on synthetic biometric data and non-biometric data
5779430620System and method for securing the life-cycle of user domain rights objects
5789430406System for generating a cryptographic key from a memory used as a physically unclonable function
5799429602Partial information generating device, power usage amount calculation system, and partial information generating method
5809426659Service activation using algorithmically defined key
5819426650Autonomous-mode content delivery and key management
5829426648Systems and methods of performing link setup and authentication
5839426148Increased communication security
5849426147Protected device management
5859426134Method and systems for the authentication of a user
5869426131Server apparatus and program to re-encrypt ciphertext data
5879426116Multiple-master DNS system
5889425968System and method for updating an encryption key across a network
5899425958System, method and apparatus for cryptography key management for mobile devices
5909425957System and method for remote reset of password and encryption key
5919425956Method and system for transferring firmware or software to a plurality of devices
5929425955Power line communication (PLC) network nodes using cipher then segment security
5939425954Device and method for resonant cryptography
5949424564Interoperable systems and methods for peer-to-peer service orchestration
5959424436Over network operation restriction enforcement
5969424055Multi-function instruction that determines whether functions are installed on a system
5979420458Method for the use of a mobile appliance using a motor vehicle
5989420454Method for ensuring security and privacy in a wireless cognitive network
5999419994Method for identifying potentially malicious network elements within a network using cross-domain collaborative data sharing
6009419983Method and apparatus for providing an adaptable security level in an electronic communication
6019419979Increased communication security
6029419960Secure user authentication in a dynamic network
6039419949Increased communication security
6049419798Public encryption method based on user ID
6059419797System, processing device, computer program and method, to transparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords
6069419796Method for storing and recovering data, utilization of the method in a storage cloud, storage server and computer program product
6079419795Digital device and method for performing secure communication using same
6089419794Key management using security enclave processor
6099419793Method for generating large prime number in embedded system
6109418242Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
6119418238Search system, search method of search system, and information processing device
6129418027Secure boot information with validation control data specifying a validation technique
6139418026Transition between states in a processor
6149413771Protecting documents using policies and encryption
6159413769Key management system for toll-free data service
6169413759Apparatus and method for secure delivery of data from a communication device
6179413730Encryption in the cloud using enterprise managed keys
6189413729Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
6199413686Establishing a unique end-to-end management key
6209413613Mesh network commissioning
6219413606Automation of networked devices
6229413533System and method for authorizing a new authenticator
6239413532Information recording device
6249413531Cryptographic system, cryptographic method, cryptographic program, and decryption device
6259413530System and method of lawful access to secure communications
6269413529Distributed storage network and method for storing and retrieving encryption keys
6279413528Method for attribute based broadcast encryption with permanent revocation
6289413527Optimizing signature computation and sampling for fast adaptive similarity detection based on algorithm-specific performance
6299413526System and method to anonymize data transmitted to a destination computing device
6309413393Encoding multi-media content for a centralized digital video storage system
6319411984Cryptographic processing apparatus, cryptographic processing system, and cryptographic processing method
6329411975Methods and apparatus to securely share data
6339411972System and method for creating and protecting secrets for a plurality of groups
6349411949Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same
6359408133Mesh network commissioning
6369407637Method for managing and checking data from different identity domains organized into a structured set
6379407619Un-password.TM.: risk aware end-to-end multi-factor authentication via dynamic pairing
6389407612Technologies for secure inter-virtual network function communication
6399407610Method and system for securing communication
6409407446Communication device, communication method, reader/writer, and communication system
6419407440Multiple authority data security and access
6429407437Secure initialization vector generation
6439407436Portable device registration system and portable device registration method
6449407435Cryptographic key generation based on multiple biometrics
6459407434Secrets renewability
6469407433Mechanism for implementing key-based security for nodes within a networked virtualization environment for storage management
6479407432System and method for efficient and secure distribution of digital content
6489407431Systems and methods for distributing and securing data
6499406066Multiple DRM management
6509405925Content item encryption on mobile devices
6519405924Self-keyed protection of anticipatory content
6529405919Dynamic encryption keys for use with XTS encryption systems employing reduced-round ciphers
6539405912Hardware rooted attestation
6549405891User authentication
6559401919Web form protection
6569401907Information processing apparatus and method, recording medium and program
6579401902Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN)
6589401898System and method for wireless data protection
6599401895Device configuration for secure communication
6609401894Proximity signature for secure communication with implantable medical device
6619401888Internet protocol mapping resolution in fixed mobile convergence networks
6629401808Measuring device, information processor, key management device, and consumption calculating system
6639401807Processing non-editable fields in web pages
6649401806Data security method used in a wireless communication system
6659401805Encrypting device, encrypting method, and recording medium
6669401766Quantum communication network
6679400876Content data management system and method
6689398455System and method for generating an identification based on a public key of an asymmetric key pair
6699398321Multimedia network system with content importation, content exportation, and integrated content management
6709398063Customizing distribution of an operating system based on detected network carrier by retrieving differences between the distributed operating system and an operating system currently installed on a computing device
6719398024System and method for reliably authenticating an appliance
6729398003Token device re-synchronization through a network solution
6739397996Establishing historical usage-based hardware trust
6749397986Authenticating acceptance of a string using an automaton
6759397839Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI)
6769397836Securing devices to process control systems
6779397834Scrambling an address and encrypting write data for storing in a storage device
6789397831Encrypted communication device and method for performing encrypted communication while reducing traffic in communication system
6799397830Method and apparatus for encrypting and decrypting data
6809397829Electronic key registration method and electronic key registration system
6819397828Embedding keys in hardware
6829397827Systems and methods for managing cryptographic keys
6839397826Encryption device and method for defending a physical attack
6849397825Method and system for reconstruction of a data object from distributed redundant data parts
6859396506System providing an improved skimming resistance for an electronic identity document
6869396359System and method for encrypted disk drive sanitizing
6879396357Physically unclonable function (PUF) with improved error correction
6889396325Provisioning an app on a device and implementing a keystore
6899396320System and method for non-intrusive, privacy-preserving authentication
6909396310Method and apparatus for providing secure image encryption and decryption
6919396136Cascaded data encryption dependent on attributes of physical memory
6929395929Network storage server with integrated encryption, compression and deduplication capability
6939392450Securely joining a secure wireless communications network
6949392448Wireless communications system
6959392443Shared secret for wireless devices
6969391963Differential client-side encryption of information originating from a client
6979391778Secure password management systems, methods and apparatuses
6989391774Strauss greenmail system and method
6999391772Key information generation device and key information generation method
7009391771Server-client secret generation with cached data
7019391770Method of cryption
7029390295Device with capacitive security shield
7039390291Secure key derivation and cryptography logic for integrated circuits
7049390290Applying group policies
7059390246Creating secure original equipment manufacturer (OEM) identification
7069390098Fast approximation to optimal compression of digital data
7079386096Server and method, non-transitory computer readable storage medium, and mobile client terminal and method
7089385997Protection of control words employed by conditional access systems
7099385996Method of operating a computing device, computing device and computer program
7109385871Method and apparatus for authenticating a non-volatile memory device
7119385869Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions
7129385867Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program
7139385864Secure session capability using public-key cryptography without access to the private key
7149385863System and method for authenticating a communication device
7159385862Method and apparatus for binding subscriber authentication and device authentication in communication systems
7169384777Efficient elimination of access to data on a writable storage media
7179384682Electronic circuit, electronic apparatus, and authentication system
7189384368Instruction and logic for mid-level caching of random numbers distributed to multiple units
7199384333Method and system for secure distribution of selected content to be protected on an appliance-specific basis with definable permitted associated usage rights for the selected content
7209384149Block-level data storage security system
7219383969Random number generating system based on memory start-up noise
7229380457Method and system of secured direct link set-up (DLS) for wireless networks
7239380093Mobile device application streaming
7249380043System and method for providing a one-time key for identification
7259380038Bootstrap authentication framework
7269380037Methods and devices for trusted protocols for a non-secured, distributed environment with applications to virtualization and cloud-computing security and management
7279380036Methods and devices for securing keys for a nonsecured, distributed environment with applications to virtualization and cloud-computing security and management
7289380034Systems and methods for data gathering without internet
7299380032Encrypting data for storage in a dispersed storage network
7309379892Trusted manager bridge
7319379891Method and system for ID-based encryption and decryption
7329379890System and method for managing cryptographic keys
7339379889Simplified management of group secrets by group members
7349379888Powerline communication network analyzer
7359379887Efficient cryptographic key stream generation using optimized S-box configurations
7369378396Storage device and memory controller thereof
7379378388Managing keys used for encrypting data
7389378348Adding biometric identification to the server security infrastructure for an enterprise service bus system
7399378179RDMA-optimized high-performance distributed cache
7409374706Wireless sensor network and central node device thereof
7419374444Frame structure for medium access in body area networks (BAN)
7429374422Secure distributed data storage
7439374407Mobile device application streaming
7449374378Access method and communication system for accessing a protected communication service
7459374376Anti-hacking system for quantum communication
7469374350Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method
7479374347Method and system for authentication over a public network using multiple out-of-band communications channels to send keys
7489374228Verifying a geographic location of a virtual disk image executing at a data center server within a data center
7499374226Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
7509374224System and methods for encrypting data
7519374222Secure communication of data between devices
7529374220System and method for providing compressed encryption and decryption in homomorphic encryption based on integers
7539373004Methods and systems for deleting requested information
7549372977Screen unlocking method, device and terminal
7559372826RDMA-optimized high-performance distributed cache
7569369873Network application function authorisation in a generic bootstrapping architecture
7579369866Methods and apparatuses using filter banks for multi-carrier spread spectrum signals
7589369442System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers
7599369287System and method for applying a digital signature and authenticating physical documents
7609369281Method and system for secure use of services by untrusted storage providers
7619369280Secure processing systems and methods
7629369279Handling key rotation problems
7639369278Method for maintenance or exchange of encryption function in storage system and storage device
7649369277Encryption code generation using spin-torque NANO-oscillators
7659369276Digital signature authentication without a certification authority
7669369275Key agreement in wireless networks with active adversaries
7679369274Cipher text translation
7689369273System and method for mixing VoIP streaming data for encrypted processing
7699367702Automatic file encryption
7709367699Automating the creation and maintenance of policy compliant environments
7719367693Bitstream confirmation for configuration of a programmable logic device
7729367676System and method for confirming location using supplemental sensor and/or location data
7739367339Cryptographically attested resources for hosting virtual machines
7749363733Mesh network commissioning
7759363732Mesh network commissioning
7769363668Sensor network, sensor management server, key updating method and key updating program
7779363578Communication system, communication device, communication method, and computer program
7789363248Data encryption in a network memory architecture for providing data based on local accessibility
7799363247Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
7809363245Secure network access
7819363242Trusted communications between untrusting parties
7829363087End-to-end security for hardware running verified software
7839363082Cryptographic communication system and cryptographic communication method
7849363080System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
7859363079Method of generating message authentication code and authentication device and authentication request device using the method
7869363078Method and apparatus for hardware-accelerated encryption/decryption
7879363077Time-based authentication
7889363076Implementing encrypted content in a game
7899363075Polymorphic encryption key matrices
7909363034Method to encrypt information that is transferred between two communication units
7919361619Secure and convenient mobile authentication techniques
7929361483Anti-wikileaks USB/CD device
7939361482Device specific information generation device and device specific generation method
7949361452Mobile credential revocation
7959357269Method and system for providing secure handling of information for complete internet anywhere
7969356935Selective access to portions of digital content
7979356921Different authentication profiles
7989356916System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
7999356783Method for ciphering and deciphering, corresponding electronic device and computer program product
8009356782Block encryption
8019356781Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device
8029356780Device, method, and system for encrypted communication by using encryption key
8039356779Systems and methods for identity-based encryption and related cryptographic techniques
8049356778Secured communication for local area network
8059356777Secure communications system for direct transfer between mobile device
8069356776Key managing system and method for sensor network security
8079356718Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor
8089356622Apparatus and method for reconstructing a bit sequence with preliminary correction
8099355374Systems and methods for creating fingerprints of encryption devices
8109355274Method and device for archiving a document
8119355259Method and apparatus for accessing sensitive information on-demand
8129355045Memory device for converting data received from controller controlling reading and writing of data
8139351232Mesh network commissioning
8149351162Network supporting two-factor authentication for modules with embedded universal integrated circuit cards
8159351102Accessing a vehicle using portable devices
8169350721Air interface security method and device
8179350713System and method for encrypting traffic on a network
8189350709Synchronizing a routing-plane and crypto-plane for routers in virtual private networks
8199350555Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
8209350554Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
8219350550Power management and security for wireless modules in "machine-to-machine" communications
8229350549Selective shredding in a deduplication system
8239350545Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens
8249350543Method and system for homomorphicly randomizing an input
8259350542Quantum key distribution device, quantum key distribution system, and quantum key distribution method
8269350541Communication apparatus, communication method, communication system, and computer program
8279350540System and method of secure encryption for electronic data transfer
8289350539Secure distribution of content
8299350538Revocation status using other credentials
8309350537Enhanced key management for SRNS relocation
8319350536Cloud key management system
8329350535Secure content distribution system
8339350330Physical unclonable function
8349349023Database encryption system, method, and program
8359348996Method and device for the authentication of at least two agricultural devices coupled via a data bus
8369348995Nonvolatile memory device having authentication, and methods of operation and manufacture thereof
8379348835Stopping functions for grouping and differentiating files based on content
8389345058Efficient communication for devices of a home network
8399344895Method and system for securely accessing portable hotspot for intelligent mobile phones
8409344884Module for authenticity verification of authentication messages
8419344428Method and system for digitally certifying the association between an entity and a place
8429344416File vault and cloud based document notary service
8439344411Key handling in communication systems
8449344393Secure end-to-end transport through intermediary nodes
8459344284Method of anonymous entity authentication using group-based anonymous signatures
8469344276Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program
8479344275System, device, and method of secure entry and handling of passwords
8489343135Physically unclonable function based on programming voltage of magnetoresistive random-access memory
8499342706Secure desktop applications for an open computing platform
8509342701Digital rights management system and methods for provisioning content to an intelligent storage
8519342406Dispersed storage re-dispersion method based on a failure
8529338810Efficient communication for devices of a home network
8539338166System and method for a single request and single response authentication protocol
8549338140Secure data parser method and system
8559338136Security key generation for simultaneous multiple cell connections for mobile device
8569338005System for and method of remote secure backup
8579338004Method and system for smart card chip personalization
8589338003Secure modules using unique identification elements
8599338002Method and apparatus for wireless communication using an acoustic signal
8609338001Privacy enhanced spatial analytics
8619338000Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm
8629337999Application usage continuum across platforms
8639336696Enhanced security setup for media decryption
8649336412Storage system and method for controlling storage system
8659336404Privacy-protective data transfer and storage
8669336363Method and system for secure deployment of information technology (IT) solutions in untrusted environments
8679336160Low latency block cipher
8689335970Method of entropy randomization on a parallel computer
8699335969Method of entropy randomization on a parallel computer
8709332428Method and device for managing encrypted group rekeying in a radio network link layer encryption system
8719332320PC secure video path
8729332012Apparatus and methods for storing electronic access clients
8739331997Systems and methods for managing disclosure of protectable information
8749331988System and method for provisioning secrets to an application (TA) on a device
8759331984Secret sharing method and system
8769331852System and method for securing data transaction
8779331851Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
8789331850System and method for secure communication of components inside self-service automats
8799331849Information setting method and wireless communication system
8809330511Apparatus and methods for identity verification
8819330270Encryption processing device and authentication method
8829330241Applying digital rights management to multi-media file playback
8839329836Extracting entropy from the vibration of multiple machines
8849326307Efficient communication for devices of a home network
8859326146Method for downloading a subscription in an UICC embedded in a terminal
8869326142Cryptographic key generation
8879326136Method and apparatus for managing group key for mobile device
8889325677Method of registering devices
8899325673Communication system and communication method
8909325508Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
8919325507System and method for managing mobile device using device-to-device communication
8929325505Apparatus and method for content encryption and decryption based on storage device ID
8939325497Power line based theft protection of electronic devices
8949325496Encryption key providing method, semiconductor integrated circuit, and encryption key management device
8959325495Encrypted server-less communication between devices
8969324123Storage of keyID in customer data area
8979323952Cryptographic equipment implementing red/black communication modes
8989323950Generating signatures using a secure device
8999323945Systems, methods, and computer program products for managing secure elements
9009323884Computer program, method, and system for locksmithing
9019323696Data security system
9029323603Storage of sensitive data in a dispersed storage network
9039323560Interpreting I/O operation requests from pageable guests without host intervention
9049319946System for efficient recovery of Node-B buffered data following MAC layer reset
9059319878Streaming alignment of key stream to unaligned data stream
9069319877Secret key generation
9079319402Digital handshake for authentication of devices
9089319396Trust relationships in a computerized system
9099319389Data recording device, and method of processing data recording device
9109319387Secure spin torque transfer magnetic random access memory (STTMRAM)
9119319223Key derivation for a module using an embedded universal integrated circuit card
9129319220Method and apparatus for secure network enclaves
9139319219Method of operating a computing device, computing device and computer program
9149319070Method and device for decoding polar codes
9159317843Interoperable systems and methods for peer-to-peer service orchestration
9169317708Hardware trust anchors in SP-enabled processors
9179317705Secure data parser method and system
9189317526Data protection compliant version control
9199317449Secure key access with one-time programmable memory and applications thereof
9209317316Host virtual machine assisting booting of a fully-encrypted user virtual machine on a cloud environment
9219313530Technique for securely communicating programming content
9229313458Downloadable security and protection methods and apparatus
9239313184Communication apparatus, communication system, and computer program product
9249313178Method and system for secure over-the-top live video delivery
9259313032Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer
9269313026Key negotiation method and apparatus according to SM2 key exchange protocol
9279313025Generating and processing an authentication certificate
9289313024Keyed communication token
9299312923Personal point of sale
9309311956Information processing device, information processing method, and program
9319311507Method and apparatus for remotely provisioning software-based security coprocessors
9329311500Data security using request-supplied keys
9339311487Tampering monitoring system, management device, protection control module, and detection module
9349311465Secure information storage and retrieval apparatus and method
9359311186Dispersed storage network slice name verification
9369307411Partially virtualizing PCR banks in mobile TPM
9379307091Method and apparatus for the secure storage of audio signals
9389306919Information processing apparatus, information processing system, information processing method, and non-transitory computer readable storage medium
9399306918System and method for secure transmission of media content
9409306748Authentication method and apparatus in a communication system
9419306745Secure key management
9429306744Video cryptography system and method
9439306743One-way key fob and vehicle pairing verification, retention, and revocation
9449306742Communicating a secret
9459306741Updating keys for use in authentication
9469306740Systems, methods, and apparatus for a quantum key distribution telescope
9479306739Quantum key distribution protocol process
9489306738Managed secure computations on encrypted data
9499306737Systems and methods for secure handling of data
9509306736Power-line communications with communication channel to and/or from endpoint circuits with authentication methodology
9519306735Electronic key registration system
9529306734Communication device, key generating device, and computer readable medium
9539305597Accessing stored multi-media content based on a subscription priority level
9549305298System and method for location-based authentication
9559305177Source identification for unauthorized copies of content
9569305173Portable authorization device for authorizing use of protected information and associated method
9579305172Multi-ring encryption approach to securing a payload using hardware modules
9589305156Integrity protected smart card transaction
9599305144Digital receipt for use with an interoperable keychest
9609304941Self-encrypting flash drive
9619301328Communication apparatus and communication parameter configuration method thereof
9629301145UICCs embedded in terminals or removable therefrom
9639301138Wireless communication apparatus, recording medium, and method
9649301133Audio summing systems and methods in radio communication systems
9659300639Device coordination
9669300638Method and apparatus for providing adaptive self-synchronized dynamic address translation as an intrusion detection sensor
9679300473Module for "machine-to-machine" communications using public key infrastructure
9689300468Secure node admission in a communication network
9699300467Real-time communication security for automation networks
9709300466Transmitting device, receiving device, transmitting method, receiving method, and program
9719300465Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient
9729300464Probabilistic key rotation
9739298948Method and apparatus for remotely provisioning software-based security coprocessors
9749298946Physically unclonable function based on breakdown voltage of metal-insulator-metal device
9759298939Privacy-protective data transfer
9769298937Secure data parser method and system
9779298929Systems and methods for governing content rendering, protection, and management applications
9789298722Optimal sequential (de)compression of digital data
9799294915Localized network authentication and security using tamper-resistant keys
9809294615System and method for handling call recording failures for a contact center
9819294478Hardware-based device authentication
9829294468Application-level certificates for identity and authorization
9839294448Cryptographic security functions based on anticipated changes in dynamic minutiae
9849294447Access control
9859294445Secure data parser method and system
9869294444Systems and methods for cryptographically splitting and storing data
9879294433Multiple-master DNS system
9889294429Method and system for providing service for searching friends
9899294285Information recording device
9909294280Location verification in quantum communications
9919294276Countering server-based attacks on encrypted content
9929294275Method and apparatus for updating a group key in a wireless communication system
9939294274Technologies for synchronizing and restoring reference templates
9949294273Method and system for conditional access to a digital content, associated terminal and subscriber device
9959294272System and method for quantum key distribution
9969294271Quantum-key-distribution receiving device and method for using single-photon detector
9979294270Detection of stale encryption policy by group members
9989294269Communication apparatus and communication method
9999294268System and method for variable length encryption
10009294267Method, system and program product for secure storage of content
10019294191Method to mitigate propagation loss in waveguide transmission of quantum states
10029292992Simplified smartcard personalization method, and corresponding device
10039292699Encrypted file storage
10049292674Password encryption key
10059292673Virtual key management and isolation of data deployments in multi-tenant environments
10069292665Secure serial number
10079292258Secure sum-of-product computation method, secure sum-of-product computation system, computation apparatus and programs therefor
10089288208Cryptographic key escrow
10099288192System and method for securing data from a remote input device
10109288061Safe communication method with card
10119288059Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys
10129288055Method for verifying correct encryption key utilization
10139288054Method and apparatus for authenticating and managing application using trusted platform module
10149288051Secure key management
10159288050Unified storage and management of cryptographic keys and certificates
10169288049Cryptographically linking data and authentication identifiers without explicit storage of linkage
10179288048Real-time frame authentication using ID anonymization in automotive networks
10189288047System and method for content protection based on a combination of a user pin and a device specific identifier
10199288046Device for generating an encrypted key and method for providing an encrypted key to a receiver
10209288045Spectral and temporal stealthy fiber optic communication using sampling and phase encoding detection systems
10219288044Method for providing cryptographic key pairs
10229288043Methods and systems for providing high-security cryptographic keys to mobile radios
10239288042Securely and redundantly storing encryption credentials system and method
10249286602Secure financial transactions
10259286487Method for protecting confidentiality of a file distributed and stored at a plurality of storage service providers
10269286458Systems and methods for online identity verification
10279286457Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties
10289286241Cryptographic transmission system
10299282095Security and privacy enhancements for security devices
10309282093Synchronizing credential hashes between directory services
10319282084Method and apparatus for provisioning a temporary identity module using a key-sharing scheme
10329282082Compressing encrypted data without the encryption key
10339281944Attribute based encryption using lattices
10349281942Password encryption for controlling access to electronic control units
10359281941Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
10369281939Method and system for encrypting data delivered over a network
10379280704Communicating wireless pairing information for pairing an electronic device to a host system
10389280681Environmental monitoring device
10399279656Interferometer and method for controlling the coalescence of a pair of photons
10409277259Method and apparatus for providing secure internet protocol media services
10419276980Data synchronization based on file system activities
10429276912Dispersed storage network with slice refresh and methods for use therewith
10439276818Mesh network commissioning
10449276754Key rotation with external workflows
10459276753System and method for data authentication among processors
10469276748Data-encrypting method and decrypting method for a mobile phone
10479276746Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization
10489276743Probabilistic key distribution in vehicular networks with infrastructure support
10499276742Unified storage and management of cryptographic keys and certificates
10509276741Content encryption key management
10519276740Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
10529276739Method and apparatus for encrypting/decrypting data
10539276738Digital tachograph
10549276737Securing a command path between a vehicle and personal wireless device
10559276736Connection key distribution
10569276735Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
10579275241Cryptographic method
10589274864Accessing large amounts of data in a dispersed storage network
10599270719Device connection proxy through cloud to optimize network messages
10609270673Terminal device, verification device, key distribution device, content playback method, key distribution method, and computer program
10619270663System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added
10629270651Authentication and initial key exchange in ethernet passive optical network over coaxial network
10639270466System and method for temporary secure boot of an electronic device
10649270465Control word protection
10659270461System and method for efficient support for short cryptoperiods in template mode
10669270459Techniques for achieving tenant data confidentiality from cloud service provider administrators
10679270458Encryption processing device, encryption processing method, and program
10689270457Optimizing security bits in a media access control (MAC) header
10699270456System and methodology for decrypting encrypted media
10709270455CPU assisted seeding of a random number generator in an externally provable fashion
10719270454Public key generation utilizing media access control address
10729270453Local security key generation
10739270452Encryption using real-world objects
10749270451Privacy enhanced spatial analytics
10759270450Method and device for mutual authentication
10769270449Secured communication in network environments
10779270448Encryption key distribution system and method
10789270447Demand based encryption and key generation and distribution systems and methods
10799270446Privacy-enhancing technologies for medical tests using genomic data
10809268949System and method for defining programmable processing steps applied when protecting the data
10819268934Cryptographic passcode reset
10829268918Encryption and decryption of a dataset in at least two dimensions
10839268555Multiple system images for over-the-air updates
10849264892Method and apparatus for attack resistant mesh networks
10859264405Switch equipment and data processing method for supporting link layer security transmission
10869264230Secure key management
10879264229System and method for generating random key stream cipher texts
10889264228System and method for a secure display module
10899264227System and method of lawful access to secure communications
10909264226Method and apparatus for selectively routing entanglement building
10919264225Quantum communication using quantum teleportation
10929264224Systems and methods for secure data sharing
10939264223System and method for distributed security
10949264220Secure virtual machine provisioning
10959264148Two dimensional photonic cluster state generator from sequential photons with multiple entanglement gates
10969264048Secret operations using reconfigurable logics
10979262637System and method for verifying integrity of platform object using locally stored measurement
10989262620Secure communications kit and client device for securely communicating using the same
10999262594Tamper evidence per device protected identity
11009262247Updating data stored in a dispersed storage network
11019258714Broadcast replenishment of account parameters for groups of wireless devices
11029258705Apparatus, method and system for creating and maintaining multicast data encryption key in machine to machine communication system
11039258701Adding randomness internally to a wireless mobile communication device
11049258303Method of providing real-time secure communication between end points in a network
11059258283Key management system, key management method, and communication device
11069258281Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
11079258279Bookmarking content for users associated with multiple devices
11089258130Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property
11099258129Resilient device authentication system
11109258124Time and event based one time password
11119258122Systems and methods for securing data at third-party storage services
11129258121Method to manage modification of encryption credentials
11139258120Distributed public key revocation
11149258119Trusted tamper reactive secure storage
11159258118Decentralized verification in a distributed system
11169258117Mutual authentication with symmetric secrets and signatures
11179258116System and methods for permitting open access to data objects and for securing data within the data objects
11189258115Securing information exchanged via a network
11199258114Quantum key distribution (QSD) scheme using photonic integrated circuit (PIC)
11209258113Username based key exchange
11219258112Configurable key-based data shuffling and encryption
11229258111Memory device which protects secure data, method of operating the memory device, and method of generating authentication information
11239256763Method and system for providing a public key/secret key pair for encrypting and decrypting data
11249256750Secure credential unlock using trusted execution environments
11259256499Method and apparatus of securely processing data for file backup, de-duplication, and restoration
11269256210Safe method for card issuing, card issuing device and system
11279253633Method and mobile device for generating a data authentication key
11289253288Location-aware mobile connectivity and information exchange system
11299253178Method and apparatus for authenticating a communication device
11309253172Changing group member reachability information
11319253171Distributed network encryption key generation
11329252960System for establishing a cryptographic key depending on a physical system
11339252957Method for preventing laundering and repackaging of multimedia content in content distribution systems
11349252954Efficient homomorphic encryption scheme for bilinear forms
11359252953Instruction for performing a pseudorandom number generate operation
11369252952Gesture-based encryption methods and systems
11379252951Vehicle key function control from a mobile phone based on radio frequency link from phone to vehicle
11389252950Methods and apparatus for interactive multimedia communication
11399252949Broadcast encryption based media key block security class-based signing
11409252948Broadcast encryption based media key block security class-based signing
11419252947Secure key distribution service
11429252946Method and system to securely migrate and provision virtual machine images and content
11439252945Method for recognizing a manipulation of a sensor and/or sensor data of the sensor
11449252944Key wrapping for common cryptographic architecture (CCA) key token
11459251007Data storage arrangement and key distribution
11469250870Automated creation of shim programs and interfaces
11479247429Key derivation
11489247311Systems and methods for playing back alternative streams of protected content protected using common cryptographic information
11499246900Using a single certificate request to generate credentials with multiple ECQV certificates
11509246889Layered protection and validation of identity data delivered online via multiple intermediate clients
11519246888Systems and methods for secure communication over an unsecured communication channel
11529246687Method for authorizing and authenticating data
11539246686Salt value service
11549246683Re-encryption key generator, re-encryption apparatus, and program
11559246682Communication apparatus, method for controlling communication apparatus, and program
11569246681Use of 32-bit random numbers to produce cipher key stream for 8-bit data stream
11579246680Optical cryptography systems and methods
11589246679Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks
11599246678Secure cloud storage and encryption management system
11609246677Method and system for secure data communication between a user device and a server
11619246676Secure access for encrypted data
11629246675Cryptographic systems using pairing with errors
11639246674Generation of cryptographic keys
11649246673Taste-based authentication to securely share data
11659246672Two indices moving in opposite directions for cryptographic bidirectional communications using a shared master key
11669246602Quantum encryption communication apparatus, quantum encryption communication method, and quantum encryption communication system
11679245155Virtual self-destruction of stored information
11689245153Semiconductor device
11699245148Secure storage and accelerated transmission of information over communication networks
11709245139Non-retained message system
11719244864Information providing system, information processing apparatus, computer readable medium, and information providing method for providing encrypted information
11729241262Apparatus and method for securing beacons
11739241261Method, system and device for negotiating security capability when terminal moves
11749240983Extending data over cable service interface specification (DOCSIS) provisioning of ethernet passive optical network (EPON) (DPoE) to EPON over coax (EPoC) multicast key management
11759240980Management of group secrets by group members
11769240979Distributing keypairs between network appliances, servers, and other network assets
11779240889Method and system for secure data access among two devices
11789240884Method and apparatus for verifiable generation of public keys
11799240883Multi-key cryptography for encrypting file system acceleration
11809240882Key generating device and key generating method
11819240881Secure communications for computing devices utilizing proximity services
11829240880Distributed data storage device
11839240837Systems and methods using optical communication for commissioning of network nodes
11849239937Targeted security policy override
11859239920Generation of working security key based on security parameters
11869237150Method and system for protecting a password during an authentication process
11879237133Detecting matched cloud infrastructure connections for secure off-channel secret generation
11889237016System and method for wiping encrypted data on a device having file-level content protection
11899237013Encrypted data management device, encrypted data management method, and encrypted data management program
11909237012Establishing secure communication between an implantable medical device and an external device
11919237011Unique surrogate key generation using cryptographic hashing
11929237010Secure transmission of a message
11939237009Disrupting offline password attacks
11949237008Encryption device, encryption method, and encryption program
11959235834Interoperable systems and methods for peer-to-peer service orchestration
11969235833Interoperable systems and methods for peer-to-peer service orchestration
11979235697One-time passcodes with asymmetric keys
11989232268Unified video delivery system for supporting IP video streaming service
11999232065Group pseudo-profiles for online sessions
12009232024Communicating an identity to a server
12019231952Key-based content management and access systems and methods
12029231947RFID authentication architecture and methods for RFID authentication
12039231929Methods and devices for security key renewal in a communication system
12049231926System and method for secured host-slave communication
12059231924Gesture-initiated encryption using error correction coding
12069231762Method of secure communication, controlled device, and control program
12079231760Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications
12089231759Internet key exchange protocol using security associations
12099231758System, device, and method of provisioning cryptographic data to electronic devices
12109231757Proxy signature scheme
12119230630Physically unclonable function based on the initial logical state of magnetoresistive random-access memory
12129230113Encrypting and decrypting a virtual disc
12139230109Trusted platform module security
12149229823Storage and retrieval of dispersed storage network access information

2015

12159226336Wireless network area limiting method and system based on near field communication
12169226144Systems and methods of performing link setup and authentication
12179225754Ad-hoc network communications
12189225742Managed real-time communications between user devices
12199225719System and method for trusted pair security
12209225698Fine grain rights management of streaming content
12219225696Method for different users to securely access their respective partitioned data in an electronic apparatus
12229225529Encrypted virtual machines in a cloud
12239225523Authentication system and authentication method
12249225522Techniques for populating a content stream on a mobile device
12259225521Apparatus and method for skein hashing
12269225520System and method for deterministic generation of a common content encryption key on distinct encryption units
12279225519Method, system, and apparatus for enabling secure functionalities
12289225518Method of providing fresh keys for message authentication
12299225517Secure device association
12309225516Combined authentication and encryption
12319225515Shared portal context session
12329225514Method for image encryption and decryption incorporating physiological features and image capture device thereof
12339225513Authenticator, authenticatee and authentication method
12349225512Encryption and decryption using a physically unclonable function
12359224005Cloud key directory for federating data exchanges
12369224003Method for secure storing and sharing of a data file via a computer communication network and open cloud services
12379224000Systems and methods for providing information security using context-based keys
12389223947Authentication apparatus and computer-readable medium storing authentication program code
12399223945Code diversity method and system
12409219730Securing a secret of a user
12419219716Distributed tokenization using several substitution steps
12429219715Mediator utilizing electronic content to enforce policies to a resource
12439219609Method and system for multiple passcode generation
12449219605Quantum key distribution
12459219604Generating an encrypted message for storage
12469219603System and method for encryption key management in a mixed infrastructure stream processing framework
12479219602Method and system for securely computing a base point in direct anonymous attestation
12489218493Key camouflaging using a machine identifier
12499218477Electronic physical unclonable functions
12509218301Storage device security system
12519218159Memory system generating random number and method generating random number
12529215587Methods and apparatuses for self-generating fault-tolerant keys in spread-spectrum systems
12539215249Systems and methods for distributed trust computing and key management
12549215244Context aware network security monitoring for threat detection
12559215230Method for authentication, RF chip document, RF chip reader and computer program products
12569215228Authentication of devices having unequal capabilities
12579215221Method for implementing local routing of traffic, base station and system
12589215220Remote verification of attributes in a communication network
12599215073Key insulation method and device
12609215070Method for the cryptographic protection of an application
12619215068Search system, search method, and program
12629215067Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
12639215066Method and system for making information in a data set of a copy-on-write file system inaccessible
12649215065Media player security for full length episodes
12659215064Distributing keys for decrypting client data
12669214184Digital rights management system, devices, and methods for binding content to an intelligent storage device
12679214183Secure storage
12689213871RFID tag and reader authentication by trusted authority
12699213870RFID tag and reader authentication by trusted authority
12709213857Systems and methods for securing data in motion
12719213696Methods and systems for securely accessing translation resource manager
12729210464Digital broadcast receiver device and digital broadcast receiving method
12739210138Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
12749210137Local digital network, methods for installing new devices and data broadcast and reception methods in such a network
12759210125System, method and apparatus for binding communication devices through common association
12769209980Provisioning a shared secret to a portable electronic device and to a service entity
12779209978Methods and apparatus to measure exposure to streaming media
12789209974Functional encryption key management
12799209972Mediator device monitoring and controlling access to electronic content
12809209970Method of generating key
12819209969System and method of per-packet keying
12829209968Information processing apparatus, information processing method, and program
12839208491Format-preserving cryptographic systems
12849208351Processing information
12859208333Secure data recorder
12869208330System for execution of security related functions
12879208294Managing license keys
12889208105System and method for intercept of UEFI block I/O protocol services for BIOS based hard drive encryption support
12899204473Method and apparatus for accelerated link setup
12909204297Information processing apparatus, information processing method, operation terminal, and information processing system
12919204296Apparatus and methods for key generation
12929203832DTCP certificate authentication over TLS protocol
12939203827Methods for determining authentication requirements of information centric network based services and devices thereof
12949203816Controlling access to copies of media content by a client device
12959203815Systems and methods for secure third-party data storage
12969203813Content distribution method, content distribution system, source device, and sink device
12979203812Dispersed storage network with encrypted portion withholding and methods for use therewith
12989203800Communication method, node, and network system
12999203626User authentication system and method for encryption and decryption
13009203625Transferring encoded data slices in a distributed storage network
13019203622Cryptographic processing system, cryptographic processing method, cryptograhpic processing program, and key generation device
13029203621Policy-based data management
13039203620System, method and apparatus for secure use of cryptographic credentials in mobile devices
13049203619Online data transformation
13059203618Information theoretic security mechanisms using a time-varying key
13069203617Secure provisioning of integrated circuits at various states of deployment, methods thereof
13079203616Multi-server fault tolerant data store update
13089203615Confidential provisioning of secret keys over the air
13099203614Method, apparatus, and system for protecting cloud data security
13109203613Techniques for client constructed sessions
13119203612Systems and methods for controlling media distribution
13129203611Techniques for handshake-free encrypted communication using symmetric key caching during application backgrounding
13139203610Systems and methods for secure peer-to-peer communications
13149203609Method and apparatus for implementing key stream hierarchy
13159202042Automatic device pairing
13169202040Chip authentication using multi-domain intrinsic identifiers
13179198036Method for providing application service
13189198035Simple pairing to generate private keys for different protocol communications
13199198033Method and apparatus for authenticating nodes in a wireless network
13209197669Apparatus and method for signaling enhanced security context for session encryption and integrity keys
13219197637Method of comparing private data without revealing the data
13229197615Method and system for providing access-specific key
13239197422System and method for differential encryption
13249197421Methods and apparatus to measure exposure to streaming media
13259197418Communication system for authenticating messages with uniquely specified genuine information
13269197411Protocol and method for client-server mutual authentication using event-based OTP
13279197410Key management system
13289197409Key derivation techniques
13299197408Systems and methods for providing a secure data exchange
13309197407Method and system for providing secret-less application framework
13319197406Key management using quasi out of band authentication architecture
13329197405System and method for controlling user access to encrypted data
13339197404Method and apparatus for providing broadcast service using encryption key in a communication system
13349196110System and method for dynamic FOB synchronization and personalization
13359195858Encrypted data storage device
13369195851Offloading encryption to the client
13379195848Computational systems and methods for anonymized storage of double-encrypted data
13389195836Techniques for secure data management in a distributed environment
13399191811Method and system for managing information on mobile devices
13409191395Method and apparatus for providing an adaptable security level in an electronic communication
13419191386Authentication using one-time passcode and predefined swipe pattern
13429191376Securing digital content system and method
13439191291Detection and handling of aggregated online content using decision criteria to compare similar or identical content items
13449191209Efficient communication for devices of a home network
13459191208Schemes for signcryption
13469191206Multiple transform utilization and application for secure digital watermarking
13479191205Multiple transform utilization and application for secure digital watermarking
13489191204Encryption key distribution method in mobile broadcasting system and system for the same
13499191203Secure industrial control system
13509191202Information processing device and computer program product
13519191201Optimizing secure communications
13529191200System and method for changing the security level of a communications terminal during operation
13539191199Method and apparatus for public-key cryptography based on error correcting codes
13549191198Method and device using one-time pad data
13559191196Secure computation using a server module
13569189777Electronic commerce with cryptographic authentication
13579189647Encrypted database system, linking method, and medium
13589189627System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
13599185115Secure access using location-based encrypted authorization
13609185108Token sharing system and method
13619185097Method and system for traffic engineering in secured networks
13629185094Systems, methods and apparatuses for the secure transmission and restricted use of media content
13639185087Medical device communication using encryption based on correlated motion
13649184916System and method for using a streaming protocol
13659184912Secure quantum authentication system
13669184911Secure session capability using public-key cryptography without access to the private key
13679184910Distributed single sign on technologies including privacy protection and proactive updating
13689183415Regulating access using information regarding a host machine of a portable storage drive
13699183411Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption
13709183357Recording/reproducing system, recording medium device, and recording/reproducing device
13719183159Authentication method
13729183158System and method for hardware based security
13739178989Call event tagging and call recording stitching for contact center call recordings
13749178876Strength-based password expiration
13759178703Method of protecting a control vector in an optional block of a standard key block
13769178702Revocation list generation device, revocation list generation method, and content management system
13779178701Parameter based key derivation
13789178700Information processing apparatus, information processing method, program, and recording medium
13799178699Public key encryption algorithms for hard lock file encryption
13809178698Dynamic key management
13819178697Security for remote access VPN
13829178696Key management for secure communication
13839178695Method for identifying a device used by a hacked terminal, and related device
13849178623Photon phase modulating system
13859177488Method, system and program product for securing data written to a storage device coupled to a computer system
13869177159Secure data parser method and system
13879176897Writing area security system
13889176822Adjusting dispersed storage error encoding parameters
13899173095Techniques for authenticating a device for wireless docking
13909172711Originator publishing an attestation of a statement
13919172683Method and apparatus for key distribution with implicit offline authorization
13929172547Apparatus and method for signature verification
13939172542System and method to pass a private encryption key
13949172536Audio communication based electronic signature system and method thereof
13959172535Key implementation system
13969172534Range search system, range search method, and range search program
13979172533Method and system for securing communication
13989172532Multi-tiered encryption system for efficiently regulating use of encryption keys
13999172531Information processing apparatus and method
14009172530Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method
14019172529Hybrid encryption schemes
14029172464Handshake synchronization method and system based on visible light communication
14039171324Hybrid virtual account and token-based digital cash protocols
14049171170Data and key separation using a secure central processing unit
14059171144Electronic physical unclonable functions
14069171135Method for acquisition of software applications
14079167429Visible light communication system, communication terminal and server
14089167428Method and system for authenticating entities by means of terminals
14099167422Method for ensuring media stream security in IP multimedia sub-system
14109167038Social networking with depth and security factors
14119167037Server and method, non-transitory computer readable storage medium, and mobile client terminal and method
14129166972Shared information distributing device, holding device, certificate authority device, and system
14139166953Method and apparatus for providing identity based encryption in distributed computations
14149166799IMS security for femtocells
14159166796Secure biometric cloud storage system
14169166791Method and apparatus for user identity verification
14179166790Commission information generator for making processes on communication performed by another computer
14189166787Securing encrypted virtual hard disks
14199166786Personal portable secured network access system
14209166785Cryptography processing device and cryptography processing method
14219166783Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
14229166782Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks
14239166781Key change management apparatus and key change management method
14249166780Information processing apparatus and method
14259166779System and method of secure encryption for electronic data transfer
14269166778Secure group messaging
14279165159Encryption based on touch gesture
14289165158Encryption key management using distributed storage of encryption-key fragments
14299165154Trusted cloud computing and services framework
14309165148Generating secure device secret key
14319164926Security control method of network storage
14329161215Wireless device, registration server and method for provisioning of wireless devices
14339160744Increasing entropy for password and key generation on a mobile device
14349160734Service activation using algorithmically defined key
14359160731Establishing a trust relationship between two product systems
14369160723Framework for provisioning devices with externally acquired component-based identity data
14379160721Information processing apparatus and information processing method
14389160542Authorizing use of a test key signed build
14399160535Truly anonymous cloud key broker
14409160533Random number generation
14419160532Dynamic seed and key generation from biometric indicia
14429160531Host device, semiconductor memory device, and authentication method
14439160530Method and apparatus for verifiable generation of public keys
14449160529Secret communication system and method for generating shared secret information
14459160528Distributed single sign on technologies including privacy protection and proactive updating
14469160527Systems, methods, and computer-readable media for secure digital communications and networks
14479160526Sharing encryption-related metadata between a host and an external intermediate device
14489159113Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval
14499158939Security chip, program, information processing apparatus, and information processing system
14509158933Protection of encryption keys in a database
14519158925Server-aided private set intersection (PSI) with data transfer
14529158906Authenticating a device and a user
14539158896Method and system for generating a secure key
14549154494Self-signed implicit certificates
14559154481Decryption of a protected resource on a cryptographic device using wireless communication
14569154464Obscuring temporary user equipment identities
14579154310Resilient device authentication system
14589154302System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number
14599154300Method and apparatus for determining joint randomness
14609154299Remote management of endpoint computing device with full disk encryption
14619154298Securely storing data in a dispersed storage network
14629154297Method for granting a plurality of electronic communication devices access to a local area network
14639154296Secure and anonymous distributed authentication
14649154295Method of generating a correspondence table for a cryptographic white box
14659148783Method of managing sensitive data in an electronic token
14669148449Efficient encryption, escrow and digital signatures
14679148421Method and system for encryption of messages in land mobile radio systems
14689148419User administering a trustworthy workspace
14699148415Method and system for accessing e-book data
14709148283Storing encrypted objects
14719148281Random number generation
14729148225Optical transmitters and receivers for quantum key distribution
14739147400Method and apparatus for generating speaker-specific spoken passwords
14749147189Secure reports for electronic payment systems
14759147087Method of accessing a data storage device
14769147079Encrypted database system, client terminal, encrypted database server, natural joining method, and program
14779147076System and method for establishing perpetual trust among platform domains
14789146881Mobile data vault
14799146441Apparatus and method for a symmetric sequential entangler of periodic photons in a single input and output mode
14809143485Method for data privacy in a fixed content distributed data storage
14819143383Method and system for managing device identification
14829143331Methods and devices for authentication and key exchange
14839143324Secure messaging
14849143323Securing a link between two devices
14859143322Communication apparatus, data communication method, and network system
14869143321Communication protocol for secure communications systems
14879143320Electronic key registration system
14889143319Mechanism for managing authentication device lifecycles
14899143318Secure recoverable offline storage of a shared secret
14909143027Intelligent power supervisor
14919141952EGM authentication mechanism using multiple key pairs at the bios with PKI
14929141815System and method for intelligence based security
14939141813Ordered deletion of content in storage systems
14949141779Usable security of online password management with sensor-based authentication
14959137659Method and system for decoupling user authentication and data encryption on mobile devices
14969137658Electronic key registration system
14979137493Method and device for excerpt licensing
14989137480Secure escrow and recovery of media device content keys
14999137304Method and apparatus for achieving data security in a distributed cloud computing environment
15009137303Pre-fetching data segments stored in a dispersed storage network
15019137246Systems, methods and apparatus for multivariate authentication
15029137226Authentication method and authentication device for performing group authentication using a group key
15039137218Splicing into an active TLS session without a certificate or private key
15049137113System and method for dynamically allocating resources
15059137095Methods and devices for maintaining a domain
15069137025Managing data for authentication devices
15079137017Key recovery mechanism
15089137016Key pair updates based on digital signature states
15099137015Protection scheme for AACS keys
15109137014Systems and methods for controlling electronic document use
15119137013Method and system for a hardware-efficient universal hash function
15129137012Wireless authentication methods and apparatus
15139137011Rapid data encryption and decryption for secure communication over open channels with plausible deniability
15149137010Watermark with data integrity verification
15159137009Portable keying device and method
15169135833Process for selecting compressed key bits for collision resolution in hash lookup table
15179135820Communication system, vehicle-mounted terminal, roadside device
15189135761Method of migrating RFID transponders in situ
15199135464Secure storage system for distributed data
15209135462Upload and download streaming encryption to/from a cloud-based platform
15219135456Secure data parser method and system
15229135450Systems and methods for protecting symmetric encryption keys
15239135417Apparatus for generating secure key using device and user authentication information
15249130757Method for authenticated communication in dynamic federated environments
15259130754Systems and methods for securely transmitting and receiving discovery and paging messages
15269130752Tamper-resistant coating for an integrated circuit
15279130745Encryption processing device and method
15289130744Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
15299130743Method and apparatus for communicating between low message rate wireless devices and users via monitoring, control and information systems
15309130742Key agreement in wireless networks with active adversaries
15319130741Data protection system that protects data by encrypting the data
15329130693Generation of perfectly secret keys in wireless communication networks
15339129671Semiconductor device identifier generation method and semiconductor device
15349129536Circuit for secure provisioning in an untrusted environment
15359129121Locating cryptographic keys stored in a cache
15369129108Systems, methods and computer programs providing impact mitigation of cyber-security failures
15379124432Host device and authentication method for host device
15389124424System, apparatus and method for license key permutation
15399124423Iterative data secret-sharing transformation
15409124422System and method for digital rights management with secure application-content binding
15419124421Data prioritization, storage and protection in a vehicular communication system
15429124420Encryption processing device and encryption processing method
15439124419Method, device, and system of secure entry and handling of passwords
15449122882Method and apparatus of securely processing data for file backup, de-duplication, and restoration
15459122859Browser based event information delivery mechanism using application resident on removable storage device
15469122504Apparatus and method for encryption in virtualized environment using auxiliary medium
15479119064Method and apparatus for providing broadcast channel encryption to enhance cellular network security
15489118639Trusted data processing in the public cloud
15499118481Method and system for efficiently generating a high quality pseudo-random sequence of numbers with extraordinarily long periodicity
15509118467Generating keys using secure hardware
15519118464Set of servers for "machine-to-machine" communications using public key infrastructure
15529118463Distributed single sign on technologies including privacy protection and proactive updating
15539118462Content sharing systems and methods
15549118461Code diversity method and system
15559118441Layout-optimized random mask distribution system and method
15569117095Data security for digital data storage
15579117089Method and apparatus for controlling access in a social network service
15589116849Community-based de-duplication for encrypted data
15599113499Multiple domain smartphone
15609113330Wireless authentication using beacon messages
15619113226Methods and systems for re-securing a compromised channel in a satellite signal distribution environment
15629112860Method and apparatus for mutual authentication
15639112732Security measures for countering unauthorized decryption
15649112700Personal assistance safety systems and methods
15659112699System, processing device, computer program and method, to tranparently encrypt and store data objects such that owners of the data object and permitted viewers are able to view decrypted data objects after entering user selected passwords
15669112683Maintaining triggered session state in secure user plane location (SUPL) enabled system
15679112682Generating modular security delegates for applications
15689112681Method and apparatus for secure information transfer to support migration
15699112680Distribution of credentials
15709112679Storing a key in a remote security module
15719112678Information processing apparatus and method
15729112677Communication device and cryptographic key creation method in cryptographic key sharing system
15739112676Communication apparatus, control method thereof, and storage medium
15749111229Quantum repeater and system and method for creating extended entanglements
15759111123Firmware for protecting data from software threats
15769111122Asymmetric cryptographic device with local private key generation and method therefor
15779111115Oblivious transfer with hidden access control lists
15789110799Method and apparatus for providing intelligent error messaging
15799106882Terminal device, content recording system, title key recording method, and computer program
15809106797Content reproducing device and content reproducing method
15819106795Computational efficiently obtaining a control word in a receiver using transformations
15829106721Application state synchronization across multiple devices
15839106644Authentication
15849106635System and method for connecting client devices to a network
15859106629Distributed algorithm for changing a shared value
15869106628Efficient key management system and method
15879106426Username based authentication and key generation
15889106414Method and apparatus for wirelessly transmitting high volume content to an electronic device
15899106413Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications
15909106412Data protection using programmatically generated key pairs from a master key and a descriptor
15919106411Secure escrow service
15929106410Identity based authenticated key agreement protocol
15939106409Method and apparatus for handling keys used for encryption and integrity
15949106408Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program
15959106407Key generation using multiple sets of secret shares
15969106406Communication apparatus and key managing method
15979106405Multi-user secret decay
15989105432Apparatus and method for generating digital value
15999105027Verification of portable consumer device for secure services
16009104889Encryption on computing device
16019104847Method for generating an identifier
16029104691Securing data in a dispersed storage network using an encoding equation
16039104541Obtaining a signed certificate for a dispersed storage network
16049100826Method and apparatus for secure access payment and identification
16059100820Apparatus for managing members of at least one group of decoders having access to broadcast data
16069100677Server, client device, method for generating a transport stream thereof and processing the transport stream thereof
16079100374Method for managing remote upgrading keys in an information security apparatus
16089100235Secure desktop applications for an open computing platform
16099100189Secure provisioning in an untrusted environment
16109100187Authenticator
16119100186Secure file sharing method and system
16129100185Encryption processing apparatus and method
16139100183Computer program product and method for order preserving symbol based encryption
16149100175Embedded universal integrated circuit card supporting two-factor authentication
16159100174Secure provisioning in an untrusted environment
16169100173Security USB storage medium generation and decryption method, and medium recorded with program for generating security USB storage medium
16179100172Method for interworking with trustzone between normal domain and secure domain, and management method of trusted application download, management server, device and system using it
16189100171Computer-implemented forum for enabling secure exchange of information
16199098721Method for strongly encrypting .ZIP files
16209098718Systems and methods for securing data using multi-factor or keyed dispersal
16219098694Clone-resistant logic
16229094873Classified relation networking optimization platform in open wireless architecture (OWA) mobile cloud terminal device
16239094826Wireless communication system and terminal-device authentication method in wireless communication system
16249094820Systems and methods for securely transmitting and receiving discovery and paging messages
16259094699System and method for security key transmission with strong pairing to destination client
16269094471Method of lawful interception for UMTS
16279094405Methods and systems for establishing secure communications
16289094402Retrieving access information in a dispersed storage network
16299094383Personal security manager for ubiquitous patient monitoring
16309094382Electronic key registration system
16319094379Transparent client-side cryptography for network applications
16329094217Secure credential store
16339094215Method and system for digital rights management of documents
16349094205Secure provisioning in an untrusted environment
16359094204Image encryption system and image decryption system
16369094195Protecting de-duplication repositories against a malicious attack
16379094194Method and system for automating the recovery of a credential store when a user has forgotten their password using a temporary key pair created based on a new password provided by the user
16389094193Information recording device
16399094192Method of and apparatus for sharing secret information between device in home network
16409094191Master key encryption functions for transmitter-receiver pairing as a countermeasure to thwart key recovery attacks
16419094190Method of managing key for secure storage of data and apparatus therefor
16429094189Cryptographic method for communicating confidential information
16439093128Electronic device with a plurality of memory cells and with physically unclonable function
16449092780User-mediator monitoring and controlling access to electronic content
16459092643Secure access to personal health records in emergency situations
16469092640Access control for server applications
16479092633Authorizing removable medium access
16489092608Random-ID function for smartcards
16499092385Facilitating access of a dispersed storage network
16509088888Secure wireless communication using rate-adaptive codes
16519088616Method and apparatus for authentication
16529088557Encryption key management program, data management system
16539088552Method and apparatus for key distribution using near-field communication
16549088408Key agreement using a key derivation key
16559088407Distributed storage network and method for storing and retrieving encryption keys
16569087432Creation and monitoring of "fair play" online gaming
16579087204Airport security check system and method therefor
16589087180Control of access to a secondary system
16599087016Detecting intentional corruption of data in a dispersed storage network
16609086905Interpreting I/O operation requests from pageable guests without host intervention
16619084110Apparatus and method for transitioning enhanced security context from a UTRAN/GERAN-based serving network to an E-UTRAN-based serving network
16629084031Content license storage
16639083682Communication device and computer program product
16649083681System, apparatus, method and computer program for transferring content
16659083527Using mobile data to establish a shared secret in second-factor authentication
16669083516Securing virtual lane physical layers
16679083515Forward secure pseudorandom number generation resilient to forward clock attacks
16689083514Distributed single sign on technologies including privacy protection and proactive updating
16699083513Technique for securely communicating and storing programming material in a trusted domain
16709083512Recording device, and content-data playback system
16719083511Message key generation
16729083510Generation and management of crypto key for cloud data
16739083486Personal point of sale
16749083473Two dimensional photonic cluster state generator from sequential photons with fixed delay loopback
16759081972Method of distributing a decryption key in fixed-content data
16769081945Information processing device and method
16779081726Controller to be incorporated in storage medium device, storage medium device, system for manufacturing storage medium device, and method for manufacturing storage medium device
16789081715Utilizing a dispersed storage network access token module to retrieve data from a dispersed storage network memory
16799081714Utilizing a dispersed storage network access token module to store data in a dispersed storage network memory
16809078126Method of sharing a session key between wireless communication terminals using a variable-length authentication code
16819077710Distributed storage of password data
16829077698Group security in machine-type communication
16839077539Server-aided multi-party protocols
16849077537Generating secure private keys for use in a public key communications environment
16859077526Method and system for ensuring sequential playback of digital media
16869077525User-controlled data encryption with obfuscated policy
16879077523Communication system and authentication card
16889077522Two-party private estimation of dataset similarity
16899077521Method and system for secure communication
16909077520Method for secure communication in a network, a communication device, a network and a computer program therefor
16919077457Two dimensional photonic cluster state generator from sequential photons with variable delay loopback
16929076188Method and system for shipment authentication
16939076018Encryption key generation in encrypted storage devices
16949076002Stored authorization status for cryptographic operations
16959075980Integrity protected smart card transaction
16969075283Polarization-entangled photon pair source and method for the manufacture thereof
16979075282Sequential entangler of periodic photons in a single input and output mode
16989071962Evolved packet system non access stratum deciphering using real-time LTE monitoring
16999071598Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE)
17009071589Encryption key management for storage area network devices
17019071588Secure group communications
17029071446Tamper-protected hardware and method for using same
17039071439Method and apparatus for remote administration of cryptographic devices
17049071429Revocable shredding of security credentials
17059071428Methods and systems for hardware piracy prevention
17069071427Method and apparatus for establishing a key agreement protocol
17079071426Generating a symmetric key to secure a communication link
17089071425Quantum communication system
17099071424Token-based key generation
17109071423Identification of a compromised content player
17119071422Access authentication method for multiple devices and platforms
17129071421Encrypted content streaming
17139071420Information processing apparatus, tampering detection apparatus, information processing method, tampering detection method, and computer product
17149071416Galois/counter mode encryption in a wireless network
17159070193Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval
17169069943Method and apparatus for token-based tamper detection
17179069940Secure host authentication using symmetric key cryptography
17189069934Method and system for providing electronic content to a user
17199066226Initialization of embedded secure elements
17209065977Identification of a compromised content player
17219065830Network recording and speech analytics system and method
17229065642Intercepting key sessions
17239065641Method and device for updating a key
17249065640Method and apparatus for generating non-interactive key and method for communication security using the same
17259065639Device for generating encryption key, method thereof and computer readable medium
17269065638System, method, and program for information management
17279065637System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
17289065636Data encryption system and method
17299065635Information processing apparatus, IC chip, and information processing method
17309065633Wireless communication apparatus for setting frequency band for wireless communications using encryption key information to predetermined frequency band
17319064229Real-time asset tracking using discovery services
17329064131Protecting documents using policies and encryption
17339064127Systems and methods for securing data in the cloud
17349064123Secure product-sum combination system, computing apparatus, secure product-sum combination method and program therefor
17359063881Slice retrieval in accordance with an access sequence in a dispersed storage network
17369060265Wireless sensor network and central node device thereof
17379059989Hash synchronization for preventing unauthorized server access using stolen passwords
17389059978System and methods for remote maintenance in an electronic network with multiple clients
17399059851Method and computer program product for order preserving symbol based encryption
17409059843Information protection apparatus, information protection method, and storage medium
17419059842System and method for grid based cyber security
17429059841Auto-discovery of a non-advertised public network address
17439059840Recipient blind cryptographic access control for publicly hosted message and data streams
17449059839Communication terminal using a temporary network key for assembling a secure communication frame
17459059838Encryption algorithm with randomized buffer
17469059746Data sharing method, transmitter, receiver and data sharing system
17479058507Signal processor with an encrypting or decrypting device in a memory system
17489058497Cryptographic key management
17499055440Geospatial cryptography
17509055428Communication apparatus, control method for communication apparatus, and program
17519055087Method and system for securely providing and storing content in a multiple dwelling unit system
17529055071Automated false statement alerts
17539055058Method and apparatus for serial device registration
17549055051Imparting cryptographic information in network communications
17559055038Apparatus, system, and method to garble programs
17569054880Information processing device, controller, key issuing authority, method for judging revocation list validity, and key issuing method
17579054878System and method for security authentication of power system
17589054874System and method for data authentication among processors
17599054871Physical key-protected one time pad
17609054864Method and apparatus of securely processing data for file backup, de-duplication, and restoration
17619054863Industrial protocol system authentication and firewall
17629054862Access control key management in a virtual world
17639054861Enhanced key agreement and transport protocol
17649054860Digital verified identification system and method
17659054859FPGA configuration bitstream encryption using modified key
17669054848Electronic apparatus and encryption method thereof
17679053739Information processing apparatus, information processing method and program
17689053342Multi-identity for secure file sharing
17699053341Multi-identity for secure file sharing
17709053330Method and devices for providing secure data backup from a mobile communication device to an external computing device
17719053325Decryption key management system
17729053130Binary data store
17739053120Grouping and differentiating files based on content
17749053062Memory chip for converting data received from controller controlling reading and writing of data
17759049592Techniques for key derivation for secure communication in wireless mesh networks
17769049181Network key update system, a server, a network key update method and a recording medium
17779049010Portable data encryption device with configurable security functionality and method for file encryption
17789049008Distributed key-based encryption system
17799044855Processing context information
17809043929Minimizing sensitive data exposure during preparation of redacted documents
17819043604Method and apparatus for key provisioning of hardware devices
17829043596Method and apparatus for authenticating public key without authentication server
17839042553Communicating device and communicating method
17849042552Managing encryption keys in a computer system
17859037865Method and system to securely send secrets to users
17869037848Mobile IPTV service system using downloadable conditional access system and method thereof
17879030226System and methods for generating unclonable security keys in integrated circuits
17889027084Methods and apparatuses for securely operating shared host devices with portable apparatuses
17899026805Key management using trusted platform modules
17909025772Information processing apparatus and program product
17919020149Protected storage for cryptographic materials
17929015479Host device and method for super-distribution of content protected with a localized content encryption key
17939014551Method and apparatus for simulating a photon-counting detector array as used in a communication link
17949014376Method and apparatus for low-power AP-assisted fast wireless roaming using optimized neighbor graphs
17959003197Methods, apparatus and system for authenticating a programmable hardware device and for authenticating commands received in the programmable hardware device from a secure processor
17969002017Method and apparatus for key distribution for secure digital cinema presentations
17979002009Quantum key distribution using card, base station and trusted authority
17988995665Role based encryption without key management system
17998990571Host device, semiconductor memory device, and authentication method
18008989389Method and apparatus for device-to-device key management
18018989388Distribution of storage area network encryption keys across data centers
18028989375Video receiving apparatus and video receiving method
18038983076Methods and apparatus for key delivery in HTTP live streaming
18048977842Hypervisor enabled secure inter-container communications
18058977841Sending messages by oblivious transfer
18068976968Intercepting a communication session in a telecommunication network
18078976966Information processor, information processing method and system
18088972745Secure data handling in a computer system
18098972734Symmetric dynamic authentication and key exchange system and method thereof
18108972731Systems, devices, and methods for securely transmitting a security parameter to a computing device
18118971540Authentication
18128971539Management of SSL certificate escrow
18138971536Balanced entropy random number generator
18148966651Digital rights management (DRM) locker
18158966601Connection of peripheral devices to wireless networks
18168964990Automating key rotation in a distributed system
18178964989Method for adding nodes to a quantum key distribution system
18188964988Secret sharing system, sharing apparatus, share management apparatus, acquisition apparatus, secret sharing method, program and recording medium
18198959654Minimizing sensitive data exposure during preparation of redacted documents
18208958563Method of generating a public key for an electronic device and electronic device
18218958562Format-preserving cryptographic systems
18228954745Method and apparatus for generating one-time passwords
18238953808System and method for effectively performing data restore/migration procedures
18248953805Authentication information generating system, authentication information generating method, client apparatus, and authentication information generating program for implementing the method
18258949605Communication system, communication apparatus, communication method, and computer program
18268948401Method for filtering of abnormal ONT with same serial number in a GPON system
18278948400Host device
18288948399Dynamic key management
18298948397Major management apparatus, authorized management apparatus, electronic apparatus for delegated key management, and key management methods thereof
18308948382Secure protocol for peer-to-peer network
18318938076Method and arrangement in a telecommunication system
18328938075Method and device for establishing a communication session
18338938072Cryptographic key derivation device and method therefor
18348935537Storage device and its control method
18358930700Remote device secure data file storage system and method
18368930699Short-range secure data communication method based on sound wave or audio, and apparatus thereof
18378929555Data encryption systems and methods
18388929554Secure multi-party communication with quantum key distribution managed by trusted authority

2014

18398924710Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key
18408923520System and method for recovery key management
18418923519Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens
18428923518Key distribution system, key distribution method, and recording medium
18438918897Dispersed storage network data slice integrity verification
18448918651Cryptographic erasure of selected encrypted data
18458918648Digital signature and key agreement schemes
18468917872Encryption key storage with key fragment stores
18478914646Information processing apparatus and information processing method for determining access permission
18488913751Key management and node authentication method for sensor network
18498913742Cryptographic processing system, key generation device, encryption device, decryption device, signature processing system, signature device, and verification device
18508913741Method for performing a cryptographic task in an electronic hardware component
18518909943Verifying identity
18528908871Mobile internet protocol system and method for updating home agent root key
18538908870Method and system for transferring information to a device
18548908869Anchor point for digital content protection
18558908868Key rotation with external workflows
18568903084Efficient key derivation for end-to-end network security with traffic visibility
18578897449Quantum computing on encrypted data
18588897445Combination-based broadcast encryption method
18598893307Information processing system and method for providing authorized content
18608891772Cloud key escrow system
18618891771Communication apparatus, communication method, and computer program
18628891767Method and apparatus for direct counterfactual quantum communication
18638886931Key sharing system, communication terminal, management device, key sharing method, and computer program
18648885833One-time recovery credentials for encrypted data access
18658885832Secure peer-to-peer distribution of an updatable keyring
18668879738System and method of updating key based on communication cost and security damage cost
18678879728Key creation and rotation for data encryption
18688873754Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system
18698868910Elliptic curve cryptographic signature
18708868904Information processing device, disc, information processing method, and program
18718867747Key generation for networks
18728862867Method and system for protecting security of the third layer mobility user plane data in NGN
18738861735Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
18748861733Method of personalizing a NFC chipset
18758861726Method for generating cryptographic half-keys, and associated system
18768861721System and method for securing scalar multiplication against simple power attacks
18778856512Method and system for enterprise network single-sign-on by a manageability engine
18788856510Method for joining user domain and method for exchanging information in user domain
18798855318Master key generation and distribution for storage area network devices
18808855316Quantum cryptography apparatus
18818855315Method and system for realizing secure forking call session in IP multimedia subsystem
18828848924Privacy-preserving location tracking for devices
18838848923Key distribution scheme for networks of information
18848843766Method and system for protecting against access to a machine code of a device
18858842841Cryptographic method and system
18868842832Method and apparatus for supporting security in muliticast communication
18878837740Device and method for securing a negotiation of at least one cryptographic key between units
18888837739Encryption messaging system
18898837738Methods, systems, and apparatuses for optimal group key management for secure multicast communication
18908837737Key management in a communication network
18918837735Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing
18928837730Apparatus and method for reducing channel reproduction delay in mobile terminal
18938832442Method and device for securely distributing data in group communication
18948831229Key transport method, memory controller and memory storage apparatus
18958831228System and method for decentralized management of keys and policies
18968825999Extending encrypting web service
18978824687Method and system for pacing, acking, timing, and handicapping (path) for simultaneous receipt of documents employing encryption
18988824686Cluster key synchronization
18998824685Method for detection of a hacked decoder
19008824684Dynamic, selective obfuscation of information for multi-party transmission
19018824682Method and system for backing up encryption key generated on computer device and accessing encrypted information stored on computer device
19028824674Information distribution system and program for the same
19038819803Validating association of client devices with authenticated clients
19048819720IPTV follow me content system and method
19058819456Content receiving terminal, content exporting and reproducing method, and recording medium
19068819436Protection method, decryption method, recording medium and terminal for said protection method
19078819418Communication system, vehicle-mounted terminal, roadside device
19088819410Private electronic information exchange
19098819407Personal messaging security
19108817990Kerberized handover keying improvements
19118817975Cryptographic processing apparatus and operation method
19128811611Encryption/decryption of digital data using related, but independent keys
19138806199Writing application data to a secure element
19148804965Methods for decrypting, transmitting and receiving control words, recording medium and control word server to implement these methods
19158804963Computer readable medium storing key generating program, computer readable medium storing key recording program, key generating device, PKI card, key recording system, key generating method and key recording method
19168798687Cellular phone
19178793488Detection of embedded resource location data
19188792646Systems and methods for group key distribution and management for wireless communications systems
19198792638Method to verify that a user has made an external copy of a cryptographic key
19208787582Key implementation system
19218787581Teired key communication system and method in support of controlled vendor message processing
19228787579Key-based content management and access systems and methods
19238781132Method and device for managing encrypted group rekeying in a radio network link layer encryption system
19248781130Access control
19258774415Key sharing device, key sharing method, and computer program product
19268774414Method and apparatus for transmitting/receiving encryption information in a mobile broadcast system
19278774403Key creation and rotation for data encryption
19288769622Authentication and authorization methods for cloud computing security
19298769289Authentication of a user accessing a protected resource using multi-channel protocol
19308767954Methods and systems for deriving a cryptographic framework
19318762728Method of performing authentication between network nodes
19328762726System and method for secure access
19338761403Method and system of secured data storage and recovery
19348761402System and methods for digital content distribution
19358761401System and method for secure key distribution to manufactured products
19368761393Method and apparatus for providing secure internet protocol media services
19378761390Production of cryptographic keys for an embedded processing device
19388755527Key management policies for cryptographic keys
19398750523Interoperable digital rights management
19408750522Method and security system for the secure and unequivocal encoding of a security module
19418750516Rekeying encryption keys for removable storage media
19428750512Authenticating an ephemeral Diffie-Hellman using a trusted third party
19438745405Dynamic seed and key generation from biometric indicia
19448745392Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel
19458744086Method and apparatus for distributing a quantum key
19468744079Secure communication system
19478738911Secure socket layer keystore and truststore generation
19488738900Method and devices for secure communications in a telecommunications network
19498737624Secure email communication system
19508737623Systems and methods for remotely loading encryption keys in a card reader systems
19518737622Method for importing rights object and rights issuer
19528737617Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
19538732461Client apparatus, server apparatus, and program using entity authentication and biometric authentication
19548732423Data encryption in a network memory architecture for providing data based on local accessibility
19558731201Techniques for securing content in an untrusted environment
19568731200Key distribution
19578726023Authentication using GAA functionality for unidirectional network connections
19588724817Secure management of keys in a key repository
19598724812Methods for establishing a secure point-to-point call on a trunked network
19608724803Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
19618718282Apparatus and method for enabling a transfer of data
19628713669Multi-domain dynamic group virtual private networks
19638713597Authenticating and off-loading IPTV operations from mobile devices to fixed rendering viewing devices
19648713321Method and apparatus for verifiable generation of public keys
19658711843Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol
19668707450Digital rights management (DRM) locker
19678705744Wireless sensor network key distribution
19688705735Implicit certificate scheme
19698700894Method and system for securing routing information of a communication using identity-based encryption scheme
19708699714Distributed PUF
19718699709Methods for obtaining authentication credentials for attaching a wireless device to a foreign 3GPP wireless domain
19728698605Determining the validity of a connection between a reader and a transponder
19738694789System and method for generating a non-repudiatable record of a data stream
19748694786Virtual machine images encryption using trusted computing group sealing
19758694782Wireless authentication using beacon messages
19768694769System and method for controlling data communications between a server and a client device
19778694768Determination and display of LUN encryption paths
19788693695Systems and methods to securely generate shared keys
19798693694Information recording device
19808693692Direct delivery of content descrambling keys using chip-unique code
19818693690Organizing an extensible table for storing cryptographic objects
19828687814Securing encrypted virtual hard disks
19838687810Chaotic cipher system and method for secure communication
19848687806Conditional access system employing constrained encryption keys
19858683229Data encryption device
19868683194Method and devices for secure communications in a telecommunications network
19878683189On-chip security method and apparatus
19888682294Wireless transmission system
19898681994Systems and methods for document control using public key encryption
19908681993Local area network
19918675876Differential phase shift keying quantum key distribution
19928670565Encrypted packet communication system
19938661248Method, apparatus, and system for sending and receiving security policy of multicast sessions
19948654981System and method for conditional access key encryption
19958654980Quantum key distribution method and apparatus
19968654979Quantum key device
19978654974Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices
19988645715Configuring host settings to specify an encryption setting and a key label referencing a key encryption key to use to encrypt an encryption key provided to a storage drive to use to encrypt data from the host
19998645698Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network
20008645499Image processing system, image processing apparatus, image processing method and recording medium
20018644516Universal secure messaging for cryptographic modules
20028639451Information processing system using nucleotide sequence-related information
20038638944Security countermeasures for power analysis attacks
20048638941Distributing keypairs between network appliances, servers, and other network assets
20058634560Time-based secure key synchronization
20068631227Processing encrypted electronic documents
20078630421Cryptographic key backup and escrow system
20088630420Method for auto-configuration of a network terminal address
20098630418Secure management of keys in a key repository
20108627091Generating a secure signature utilizing a plurality of key shares
20118625805Digital security bubble
20128625802Methods, devices, and media for secure key management in a non-secured, distributed, virtualized environment with applications to cloud-computing security and management

2013

20138621210Ad-hoc trust establishment using visual verification
20148619995Methods and apparatus related to address generation, communication and/or validation
20158619992Secure key creation
20168619990Secure key creation
20178619979Physically unclonable function implemented through threshold voltage comparison
20188615085Encrypted communication system with limited number of stored encryption key retrievals
20198611543Method and system for providing a mobile IP key
20208607301Deploying group VPNS and security groups over an end-to-end enterprise network
20218605908Method and device for obtaining security key in relay system
20228600064Apparatus, method, and computer program product for processing information
20238600063Key distribution system
20248600062Off-line content delivery system with layered encryption
20258600061Generating secure device secret key
20268600060Telecommunications device security
20278600052Key generation device, encryption device, reception device, key generation method, key processing method, and program
20288595505Apparatus and method for direct anonymous attestation from bilinear maps
20298595485Security management method and system for WAPI terminal accessing IMS network
20308594334Key management method
20318594332Key generating apparatus, encrypting apparatus and decrypting appatatus
20328588426Methods and apparatus to secure communications in a mobile network
20338588425Encryption key recovery in the event of storage management failure
20348588423Group/multicast key distribution method and update method based upon unicast session key and base station
20358588420Systems and methods for determining a time delay for sending a key update request
20368583560Method and apparatus for third party control of a device
20378582779System and method for secure communications in a communication system
20388582777Method and system for lightweight key distribution in a wireless network
20398582775Method of securing and authenticating data using micro-certificates
20408582759Method and apparatus for providing content service
20418581618Apparatus for controlling the usability of intellectual property within a programmable device and method of using
20428578166System and method for authentication, data transfer, and protection against phishing
20438577044Method and apparatus for automatic and secure distribution of an asymmetric key security credential in a utility computing environment
20448577043System and service to facilitate encryption in data storage devices
20458577042Location-based security, privacy, access control and monitoring system
20468577039Cryptographic communication apparatus and cryptographic communication system
20478577038Method and device for generating pseudorandom number, and method and device for encryption using pseudorandom number
20488572389System and method for protecting master encryption keys
20498571223Method for combining authentication and secret keys management mechanism in a sensor network
20508565438Method of storing broadcast contents in mobile broadcast service terminal
20518565436Secure self managed data (SSMD)
20528561158Providing certificate matching in a system and method for searching and retrieving certificates
20538560835Method and apparatus for machine-to-machine communication
20548553888Generation of communication device signatures for use in securing nomadic electronic transactions
20558553887Method for generating dynamic group key
20568549605System and method for automatically establishing new session with interactive service after previous session expiration
20578549299Accelerated key agreement with assisted computations
20588549298Secure online service provider communication
20598548172Secure dissemination of events in a publish/subscribe network
20608548167System for traceable decryption of bandwidth-efficient broadcast of encrypted messages and security module revocation method used for securing broadcasted messages
20618548163Simultaneous scalar multiplication method
20628543808Trusted intermediary for network data processing
20638542825Imparting cryptographic information in network communications
20648539606Data protection method and data protection system
20658539220Secure computation using a server module
20668538030Use of graphics processors as parallel math co-processors for password recovery
20678538029Encryption key fragment distribution
20688538012Performing AES encryption or decryption in multiple modes with a single instruction
20698532303Symmetric key distribution framework for the internet
20708532302System and method for registering a personal computing device to a service processor
20718532300Symmetric is encryption key management
20728527765Shared secret verification method and system
20738527759IMS user equipment, control method thereof, host device, and control method thereof
20748526621Method and apparatus for time-lapse cryptography
20758526614Method to manage members of at least one group of decoders having access to broadcast data
20768522014Method and system for storing a key in a remote security module
20778520840System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet
20788516566Systems and methods for using external authentication service for Kerberos pre-authentication
20798516259Verifying authenticity of voice mail participants in telephony networks
20808515080Method, system, and computer program product for encryption key management in a secure processor vault
20818515077Automatic application management in a short-range wireless system
20828515057Method and device for executing crytographic calculation
20838510561Methods and devices for computing a shared encryption key
20848510552System and method for file-level data protection
20858509446Time-bin polarization format exchange technique for entangled optical source
20868509443Rekey index generation method and rekey index generation apparatus
20878505076Proactive authentication
20888503538Method, apparatus, system, and program for content encoding, content distribution, and content reception
20898495380Methods and systems for server-side key generation
20908494154Cryptographic ignition key system
20918489885Method and device for managing digital content
20928488794Method for access control to a scrambled content
20938488788Method for simulcrypting scrambled data to a plurality of conditional access devices
20948483393Key management system for digital cinema
20958479020Method and apparatus for providing an asymmetric encrypted cookie for product data storage
20968479000Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
20978478995Method of encrypting and transferring data between a sender and a receiver using a network
20988474052User-administered license state verification
20998472629Communication system, communication device and processing method therefor
21008472628Method of handling security key change and related communication device
21018472620Generation of device dependent RSA key
21028467536Binding keys to secure media streams
21038467535Accelerated verification of digital signatures and public keys
21048467532System and method for secure transaction of data between a wireless communication device and a server
21058464062Systems, devices, and methods for securely transmitting a security parameter to a computing device
21068464049Method and system of accessing copy-prevented encrypted data resources over a network
21078462955Key protectors based on online keys
21088462954Content encryption using at least one content pre-key
21098462953Communication system and method thereof
21108457318Method and system for continuously transmitting encrypted data of broadcast service to mobile terminal
21118457317Method for data privacy in a fixed content distributed data storage
21128452016Interoperable keychest for use by service providers
21138452014Group key management for mobile ad-hoc networks
21148452012Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
21158447978Wireless communication method using WPS
21168447037Key tree construction and key distribution method for hierarchical role-based access control
21178437477Key information issuing device, wireless operation device, and program
21188437476Hybrid method for distributing keys for the diffusion of encrypted data
21198433070Systems and methods for stabilization of interferometers for quantum key distribution
21208423470Distributed secure anonymous conferencing
21218421593Apparatus, systems and methods for authentication of objects having multiple components
21228416955Method for determining functions applied to signals
21238416949Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system
21248413147Method, apparatus and system for making a decision about virtual machine migration
21258412948Method and apparatus for digital signature generation and validation
21268412942Method and system for seamless SSID creation, authentication and encryption
21278412784Storage model for maintaining structured document fidelity
21288411867Scalable and secure key management for cryptographic data processing
21298411865Key management method for broadcast encryption in tree topology network
21308411850Password searching method and system in multi-node parallel-processing environment
21318407466Controlling download and playback of media content
21328402519Transparent client authentication
21338401195Method of automatically populating a list of managed secure communications group members
21348396222Key distribution system
21358392703Electronic signature verification method implemented by secret key infrastructure
21368392684Data encryption in a network memory architecture for providing data based on local accessibility
21378391497Method for importing rights object and rights issuer
21388391496Smart energy network configuration using an auxiliary gateway
21398391495Secure shell used to open a user's encrypted file system keystore
21408387152Attested content protection
21418380167LAN-based UMA network controller with proxy connection
21428379867Secure email communication system
21438379866Method of distributing encoding/decoding program and symmetric key in security domain environment and data divider and data injector therefor
21448379865Multikey support for multiple office system
21458379857Secure key distribution for private communication in an unsecured communication channel
21468375207Method and apparatus for authenticating a network device
21478374354System and method to pass a private encryption key
21488374350Quantum communication system
21498369530Network set-up device
21508369529Re-keying based on pre-generated keys
21518364964Registering client devices with a registration server
21528364958Sharing a secret via linear interpolation
21538363841Method for managing and controlling the access keys to services in a communication system
21548363834Systems and methods for complex encryption keys
21558351610Communication system and communication method
21568347376Techniques for distributing a new communication key within a virtual private network
21578347073Inspection and rewriting of cryptographically protected data from group VPNs
21588345881Communication system, information processing apparatus, method and computer program
21598345862Method of sharing a strong secret between two parties, one of whom has little processing power

2012

21608340300Non-disruptive authentication administration
21618340299Key management system and method
21628340298Key management and user authentication for quantum cryptography networks
21638340296Method and system for registering and verifying smart card certificate for users moving between public key infrastructure domains
21648335921Writing application data to a secure element
21658335490Roaming Wi-Fi access in fixed network architectures
21668335314Adaptive and secure modular connection
21678332629Mail certificate responder
21688331568Efficient distribution of computation in key agreement
21698331567Methods and apparatuses for generating dynamic pairwise master keys using an image
21708325928Security countermeasure for power analysis attacks
21718325927Anchor point-based digital content protection with an escrow anchor point
21728325926Method for providing a broadcast encryption based home security system
21738320570Apparatus and method for generating secret key
21748320558Encryption of synchronization information
21758316461Method for sharing rights objects between users
21768315395Nearly-stateless key escrow service
21778315393System for on-line and off-line decryption
21788315386Method and apparatus for performing VoIP-based communication using bio keys
21798312279Secure modem gateway concentrator
21808312277Method and system for secure communication between computers
21818311221Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
21828311216Packet cipher algorithm based encryption processing device
21838310346Verification of movement of items
21848307455Decryption-key distribution method and authentication apparatus
21858307217Trusted storage
21868306230Information processing apparatus playing encrypted content distributed through network
21878306228Universal secure messaging for cryptographic modules
21888301909System and method for managing external storage devices
21898300832System and method for copy protection for digital signals
21908300830Secure group communications
21918300829Verification key handling
21928296829Providing certificate matching in a system and method for searching and retrieving certificates
21938295492Automated key management system
21948295491Method for aggregating data in a network
21958295490Method and system for storing and providing an encryption key for data storage
21968295489Method for sharing a link key in a ZigBee network and a communication system therefor
21978295488Exchange of key material
21988295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
21998291235Method and system for controlling access of clients and users to a print server
22008290152Management system for web service developer keys
22018285994Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel
22028284945Automatic change of symmetrical encryption key
22038284944Unified and persistent system and method for automatic configuration of encryption
22048284943IP encryption over resilient BGP/MPLS IP VPN
22058284932Imparting cryptographic information in network communications
22068284930Simultaneous scalar multiplication method
22078281135Enforcing use of chipset key management services for encrypted storage devices
22088280059Method, system and device for generating group key
22098280020Transparent caller name authentication for authorized third party callers
22108270614Method of updating group key and group key update device using the same
22118261357Systems and methods for license entitlement key distribution
22128261061Methods and systems for encouraging secure communications
22138259951Method and system for managing encryption key
22148259950Method for secure key management using multi-threshold secret sharing
22158259948Virtual TPM key migration using hardware keys
22168255679Receiver and receiving method
22178254891Initiating contact using protected contact data in an electronic directory
22188254581Lightweight key distribution and management method for sensor networks
22198254580Key distribution in a hierarchy of nodes
22208254578Process of manufacturing a handheld device, involving keys
22218254577Validation of encryption key
22228250665Digital Broadcasting system and method of processing data in digital broadcasting system
22238250375Generating unique data from electronic devices
22248245042Shielding a sensitive file
22258244303Apparatus and method for transmitting a plurality of key data
22268243934Electronic device and encryption method thereof
22278243933Method for sharing secret information among cooperating parties
22288238559IPTV follow me content system and method
22298230223Approach for managing access to messages using encryption key management policies
22308229857Secure pre-recorded digital medium
22318225415Content distribution system, terminal, and server
22328225108Method and system for mixed symmetric and asymmetric encryption of .ZIP files
22338225089Electronic transaction systems utilizing a PEAD and a private key
22348223974Self-healing encryption keys
22358219808Session-based public key infrastructure
22368218771Information processing apparatus and computer readable medium
22378214652Biometric identification network security
22388213901Subscriber identities
22398213620Method for managing cryptographic information
22408213619Method and apparatus for establishing communication via service provider
22418213611Two-stage block synchronization and scrambling
22428213608Roaming utilizing an asymmetric key pair
22438209546Data-securing method of program tool
22448209545FPGA configuration bitstream protection using multiple keys
22458208638Set of equipment for secure direct information transfer over the internet
22468208637Migration of computer secrets
22478208636Method for transmitting/receiving encryption information in a mobile broadcast system, and system therefor
22488204232Accelerated verification of digital signatures and public keys
22498204231Method and device for managing cryptographic keys in secret communications network
22508204230Communication device, method for establishing a communication connection and method for using a communication connection
22518204228Group key management re-registration method
22528199916Selectively loading security enforcement points with security association information
22538196194Method and network for securely delivering streaming data
22548195933Method and system for computing digital certificate trust paths using transitive closures
22558194858Chaotic cipher system and method for secure communication
22568189966QKD arrangement
22578189794System and method for effectively performing data restore/migration procedures
22588189793Key terminal apparatus, crypto-processing LSI, unique key generation method, and content system
22598189789Intrusion-tolerant group management for mobile ad-hoc networks
22608185947System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network
22618180342System, method and computer program product for delivering a service guide of a first broadcast/multicast system as a program of a second broadcast/multicast system
22628180060Telemedical system
22638180051Methods and apparatus for securing communications of a user operated device
22648179860Systems and method for performing handovers, or key management while performing handovers in a wireless communication system
22658175277Intercepting a communication session in a telecommunication network
22668171293Receiver non-repudiation via a secure device
22678171292Systems, devices, and methods for securely transmitting a security parameter to a computing device
22688170216Techniques for validating and sharing secrets
22698161565Key release systems, components and methods
22708161278System and method for distributing keys in a wireless network
22718160257Tape failover across a cluster
22728155321Methods and apparatus for protecting digital content
22738150040Key providing system, terminal device, and information processing method
22748145707Sending digitally signed emails via a web-based email system
22758145270Smart card and method for generating response message to be delivered to mobile terminal supporting mobile broadcast, and mobile terminal therefor
22768144877Method and apparatus for updating a key in an active state
22778135134Systems and methods for managing cryptographic keys
22788130965Retrieval and transfer of encrypted hard drive content from DVR set-top boxes to a content transcription device
22798130964Systems and methods for identity-based encryption and related cryptographic techniques
22808130959Rekeying encryption for removable storage media
22818127367Refreshing software licenses
22828126150Storage medium processing method, storage medium processing device, and program
22838126146Method of quantum cryptography using blind photon polarization quibits with multiple stages
22848121296Method and apparatus for security in a data processing system
22858121290Pseudo-random function calculating device and method and number-limited anonymous authentication system and method
22868121289Cryptographic method with integrated encryption and revocation, system, device and programs for implementing this method
22878116455System and method for securely initializing and booting a security appliance
22888116454Method and apparatus for providing security in a radio frequency identification system
22898116243Wireless sensor network and adaptive method for monitoring the security thereof
22908112790Methods and apparatus for authenticating a remote service to another service on behalf of a user
22918108674Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith
22928107630Apparatus and method for managing stations associated with WPA-PSK wireless network
22938103883Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption
22948103001Method for verifying rights contained in a security module
22958099607Asymmetric crypto-graphy with rolling key security
22968099602Methods for integrating security in network communications and systems thereof
22978099592System and method for controlling data communications between a server and a client device
22988098829Methods and systems for secure key delivery
22998098828Key distribution
23008098827Data processing system, data processing method, and program providing medium
23018098826QKD system laser autocalibration based on bit-error rate
23028098822Secure communication system and method using shared random source for key changing
23038095804Storing deleted data in a file system snapshot
23048094824Encrypting device, decrypting device, information system, encrypting method, decrypting method, and program
23058094823Extended diffie-hellman group key generation
23068094820Information recording/reproducing device
23078091138Method and apparatus for controlling the presentation of confidential content

2011

23088085938Secret information management scheme based on secret sharing scheme
23098085937System and method for securing calls between endpoints
23108082443Pedigrees for quantum cryptography
23118081760Offline message security via selective data replication
23128081754Key update method and apparatus thereof
23138077861Permutation data transform to enhance security
23148068614Methods and apparatus for batch bound authentication
23158068612Security device for cryptographic communications
23168060918Method and system for verifying identity
23178060902System for receiving broadcast digital data comprising a master digital terminal, and at least one slave digital terminal
23188059964QKD system with common-mode dithering
23198059821Method and system for disaster recovery in network systems
23208059819Systems and methods for distributing updates for a key at a maximum rekey rate
23218059816Secret sharing technique with low overhead information content
23228055911Method for backing up and restoring an encryption key
23238054978Key management for content protection
23248054977Monitoring apparatus, method of controlling the monitoring apparatus, and program therefor
23258054976Quantum key distribution apparatus and method
23268054974Opportunistic use of null packets during encryption/decryption
23278054973User key management method for broadcast encryption (BE)
23288050566System and methods for quantum key distribution over WDM links
23298050410Distributed encryption methods and systems
23308050409Threshold and identity-based key management and authentication for wireless ad hoc networks
23318050405Shared key encryption using long keypads
23328045716System and method for the concealment of device input parameters
23338045715Method of handling security key change and related communication device
23348045705Simultaneous scalar multiplication method
23358041944Group signature system and information processing method
23368041039Secret communications system and channel control method
23378037319System and method for securely storing cryptographic keys with encrypted data
23388036387Method for the transmission of management data
23398032926Method of configuring hierarchical network of user group and resource group and key distribution center
23408032744Method and apparatus for self-authenticating digital records
23418031875Key distribution in unidirectional channels with applications to RFID
23428031867Method of verifying the integrity of an encryption key obtained by combining key parts
23438028157On-chip security method and apparatus
23448023658Method and apparatus for updating a key in an active state
23458023657Cryptography and certificate authorities in gaming machines
23468019085System and method for sending encrypted messages to a distribution list
23478019084Automated banking machine remote key load system and method
23488019080Method and apparatus for providing content service
23498014530Method and apparatus for authenticated, recoverable key distribution with no database secrets
23508014527Apparatus and method for reusing pair of public and private keys
23518014526Secure wireless local or metropolitan area network and related methods
23528014523Key management
23538010810Techniques for protecting data using an electronic encryption endpoint device
23548010809Method and system for securing network data
23558010782Method and system for mediated secure computation
23568009984Method and apparatus for measuring optical power of very weak light, and optical communication system using the same
23578009831Method and system for hiding the decryption key in a dispersive way
23588006102Method and apparatus for transmitting content data and recording and/or reproducing apparatus
23598005227Key information consistency checking in encrypting data storage system
23608001391Method of encrypting and decrypting data stored on a storage device using an embedded encryption/decryption means
23618000478Key handshaking method and system for wireless local area networks
23628000476Data encryption/decryption method, and device
23637996673System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient
23647995766Group subordinate terminal, group managing terminal, server, key updating system, and key updating method therefor
23657995763User apparatus and program
23667995762Key issuing method, group signature system, information processing apparatus, and program
23677991162Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
23687987366Key management for network elements
23697987359Information communication system, information communication apparatus and method, and computer program
23707983423Re-keying based on pre-generated keys
23717983422Quantum cryptography
23727978858Terminal device, group management server, network communication system, and method for generating encryption key
23737975147Electronic device network supporting enciphering and deciphering and update generation in electronic devices
23747975141Method of sharing bus key and apparatus therefor
23757974926Content use system, information terminal, and settlement system
23767974416Providing a secure execution mode in a pre-boot environment
23777971062Token-based encryption key secure conveyance
23787970135Method for the secure, distributed generation of an encryption key
23797970133System and method for secure and flexible key schedule generation
23807965846Client distributed system and inter-client RTP encrypting method
23817965845System and methods for efficient authentication of medical wireless ad hoc network nodes
23827961887Content distribution system and tracking system
23837961878Imparting cryptographic information in network communications
23847958364System and method for digitally signing electronic documents
23857958356System and method for establishing a shared secret among nodes of a security appliance
23867958351Method and apparatus for multi-level security implementation
23877957537Information processing system and method using encryption key block
23887957532Data protection for a mobile device
23897949138Secure instant messaging
23907949137Virtual disk management methods
23917949136Security circuit having an electrical fuse ROM
23927945779Securing a communications exchange between computers
23937945053Methods and apparatus for a keying mechanism for end-to-end service control protection
23947945052Method of distributing a decryption key in fixed-content data
23957940935Content playback apparatus, content playback method, computer program, key relay apparatus, and recording medium
23967936883Quantum key distribution protocol
23977936871Altering the size of windows in public key cryptographic computations
23987936869Verifying digital signature based on shared knowledge
23997933413Key exchange verification
24007933408Asynchronous download
24017930537Architecture for encrypted application installation
24027929707Use of graphics processors as parallel math co-processors for password recovery
24037929706Encryption key restoring method, information processing apparatus, and encryption key restoring program
24047929705Method of managing user key for broadcast encryption
24057929694Variable length private key generator and method thereof
24067925027Secure address proxying using multi-key cryptographically generated addresses
24077925026Systems and methods for providing autonomous security
24087925025Method for broadcast encryption and key revocation of stateless receivers
24097925024Method and system for data encryption/decryption key generation and distribution
24107925023Method and apparatus for managing cryptographic keys
24117921283Method for real-time data authentication
24127917946Method and network for securely delivering streaming data
24137916871Technique for split knowledge backup and recovery of a cryptographic key
24147916870Systems and methods for document control using public key encryption
24157916865Dynamically shifting control word
24167913309Information rights management
24177913301Remote feature activation authentication file system
24187912224Wireless network system and communication method for external device to temporarily access wireless network
24197907733Method for managing traffic encryption key in wireless portable internet system and protocol configuration method thereof, and operation method of traffic encryption key state machine in subscriber station
24207904709System and method for controlling data communications between a server and a client device
24217903821Method for managing key in multimedia broadcast and multicast service
24227903820Key production system
24237899475Enhanced short message service (SMS)
24247899190Security countermeasures for power analysis attacks
24257899188Method and system to authenticate a peer in a peer-to-peer network
24267895666Data structure representation using hash-based directed acyclic graphs and related method
24277895450Data management system, data management method and storage medium storing program for data management
24287895432Method and apparatus for using a third party authentication server
24297894607System, method and media drive for selectively encrypting a data packet
24307894606Systems and methods for facilitating secure key distribution to an embedded device
24317894604Quantum cryptographic communication apparatus
24327890997Remote feature activation authentication file system
24337890995System and method for remote management of communications networks
24347890759Connection assistance apparatus and gateway apparatus
24357890758Apparatus and method for generating keys in a network computing environment
24367890757Receiver non-repudiation
24377889863Recording device, recording medium, and content protection system
24387886364Encrypted key cache
24397885413Hidden link dynamic key manager for use in computer systems with database structure for storage of encrypted data and method for storage and retrieval of encrypted data
24407885412Pre-generation of generic session keys for use in communicating within communications environments
24417882368System for publishing content on a portable digital storage medium
24427882359Method and system for user attestation-signatures with attributes
24437882354Use of device driver to function as a proxy between an encryption capable tape drive and a key manager
24447881478Method for controlling access to an encrypted programme
24457881477Method for key distribution in a hierarchical multicast traffic security system for an internetwork
24467881472Quantum key distribution method and communication apparatus
24477881470Network mobility security management
24487876902Distribution of encrypted software update to reduce attack window
24497873987Content distribution system and distribution method, and content processing device and processing method
24507873170Maintaining keys removed from a keystore in an inactive key repository
24517873169Methods, devices and systems for generating anonymous public keys in a secure communication system
24527873168Secret information management apparatus and secret information management system
24537869605Method for generating group key
24547864960Techniques for securing content in an untrusted environment
24557864954Method and system for encryption and authentication

2010

24567860255Content distribution server, key assignment method, content output apparatus, and key issuing center
24577860254Computer system security via dynamic encryption
24587860247Identity based encryption
24597859744Tunable compact entangled-photon source and QKD system using same
24607856664Method, system and computer program for a secure backup license server in a license management system
24617853801System and method for providing authenticated encryption in GPON network
24627853691Method and system for securing a network utilizing IPsec and MACsec protocols
24637853020Systems and methods for enhanced quantum key formation using an actively compensated QKD system
24647853019Tape failover across a cluster
24657853018Method and apparatus for hiding a private key
24667849329Licensing the use of a particular feature of software
24677849314Method and system for secure authentication in a wireless network
24687844818Authentication apparatus and method for home network devices
24697840810Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key
24707840010Interactive security control system with conflict checking
24717836300Security integrated circuit
24727835528Method and apparatus for refreshing keys within a bootstrapping architecture
24737831051Secure communication between a hardware device and a computer
24747831050Fast multi-photon key distribution scheme secured by quantum noise
24757831045Security module revocation method used for securing broadcasted messages
24767827403Method and apparatus for encrypting and decrypting data in a database table
24777826749Method and system for quantum key distribution over multi-user WDM network with wavelength routing
24787826620Information processor, information processing method, and computer program
24797826619Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device
24807823190System and method for implementing a distributed keystore within an enterprise network
24817822209Methods and systems for key recovery for a token
24827822206Systems and methods for management and auto-generation of encryption keys
24837822205Multiple matching control method
24847818579Information processor having information dispersing function
24857817986Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices
24867817802Cryptographic key management in a communication network
24877813512Encrypted communication system and communication device
24887813511Facilitating mobility for a mobile station
24897813510Key management for group communications
24907813509Key distribution method
24917809939Trusted point-to-point communication over open bus
24927805614Secure local or remote biometric(s) identity and privilege (BIOTOKEN)
24937805611Method for secure communication from chip card and system for performing the same
24947801309Private key delivery system and a private key delivery method
24957801302Cryptographic method and apparatus
24967796763Method and system for disaster recovery of data from a storage device
24977796762Communication system, common key control apparatus, and general communication apparatus
24987796760Approach for managing access to messages using encryption key management policies
24997792288Communication system using quantum cryptography and comprising switching stations
25007788728Method and apparatus for limiting number of times contents can be accessed using hash chain
25017787629Use of graphics processors as parallel math co-processors for password recovery
25027787619Method and apparatus for secure key management using multi-threshold secret sharing
25037783046Probabilistic cryptographic key identification with deterministic result
25047783044System for on-line and off-line decryption
25057783043Secure group communications
25067783042Communication system and synchronization method thereof
25077779262Security method using electronic signature
25087779251Information communication apparatus and method, information communication system, and memory medium
25097778423Method for establishing a common key for a group of at least three subscribers
25107778422Security associations for devices
25117778414Encryption method based on factorization
25127774597System and method for nodes communicating in a shared network segment
25137773972Functionality and policies based on wireless device dynamic associations
25147769177Method for managing digital rights in broadcast/multicast service
25157769173Methods and systems for executing bit-commitment protocols that are based on entangled quantum states and a third party
25167769166Dual mode AES implementation to support single and multiple AES operations
25177768692Single-photon generator
25187765582Identity-based-encryption messaging system with public parameter host servers
25197760885Method of distributing encryption keys among nodes in mobile ad hoc network and network device using the same
25207760884Cryptographic method and devices for facilitating calculations during transactions
25217760883Any-point-to-any-point (AP2AP) quantum key distribution protocol for optical ring network
25227752449System and method for generating a non-repudiatable record of a data stream
25237751570Method and apparatus for managing cryptographic keys
25247751567Local authentication of mobile subscribers outside their home systems
25257747025Method and apparatus for maintaining privacy of data decryption keys in configuration bitstream decryption
25267747023Multi-user quantum cryptography method and system using wavelength division multiplexing
25277747016Data transmitting/receiving method, data transmission apparatus, data reception apparatus, data transmission/reception system, AV contents transmitting method, AV contents receiving method, AV contents transmission apparatus, AV contents reception apparatus, and program recording medium
25287747014Information transmission system, and information sending apparatus and information receiving apparatus used therein
25297743249Method of securing a document in a system and controlling access to the document and a seal for use in the method
25307738663Light-weight key distribution scheme in wireless network
25317734181Devices, systems and methods for ad hoc wireless communication
25327734052Method and system for secure processing of authentication key material in an ad hoc wireless network
25337734051Key distribution
25347729496Efficient key updates in encrypted database systems
25357725721Method and system for transferring software and hardware feature licenses between devices
25367724907Mechanism for protecting the transfer of digital content
25377724905Method and arrangement for generation of a secret session key
25387721092Authenticating device, authenticated device and key updating method
25397720227Encryption method for SIP message and encrypted SIP communication system
25407716483Method for establishing a communication between two devices
25417716482Conference session key distribution method in an ID-based cryptographic system
25427715552Data authentication with a secure environment
25437711122Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys
25447711120Cryptographic key management
25457707428Personal identification number recovery method
25467702904Key management system and multicast delivery system using the same
25477702110Electronic document protection system and method
25487702102Method for encoded data transmission via a communication network
25497698735Method and system of integrating third party authentication into internet browser code
25507697693Quantum cryptography with multi-party randomness
25517697691Method of delivering Direct Proof private keys to devices using an on-line service
25527693286Method of delivering direct proof private keys in signed groups to devices using a distribution CD
25537693285Secure communication apparatus and method
25547689822Communication device for providing security in a group communication network
25557688982Protected return path from digital rights management dongle
25567688976Random wave envelope derived random numbers and their use in generating transient keys in communication security application part I
25577685639Using inserted e-mail headers to enforce a security policy
25587681037Network connection system
25597676042Terminal apparatus, server apparatus, and digital content distribution system
25607676041Method for creating and distributing cryptographic keys in a mobile radio system and corresponding mobile radio system
25617676037Cryptographic method capable of protecting elliptic curve code from side channel attacks
25627672459Key distribution and caching mechanism to facilitate client handoffs in wireless network systems
25637672458Method and system for key insertion for stored encrypted content
25647669230Secure switching system for networks and method for securing switching
25657664269Encrypting message for secure transmission
25667664268Conditional access system for digital receivers
25677660988Electronic notary
25687660423Method and apparatus for maintaining ephemeral keys in limited space
25697660422Encryption key updating for multiple site automated login
25707657760Method for sharing encrypted data region among processes in tamper resistant processor
25717657745Secure electronic transfer without requiring knowledge of secret data
25727657037Apparatus and method for identity-based encryption within a conventional public-key infrastructure
25737653201Implicit certificate scheme
25747649998Facilitating secure data communications that use key-based encryption
25757646874Establishing mutual authentication and secure channels in devices without previous credentials
25767646873Key manager for QKD networks
25777644285Recovery access to secure data
25787644268Automated electronic messaging encryption system
25797643636Managing multiple cryptographic periods in a single cryptographic group

2009

25807639947System and methods for quantum key distribution over WDM links
25817639809Quantum cryptography transmission method and system
25827636840Secure communications and control in a fueling environment
25837636441Method for secure key exchange
25847634091System and method of hiding cryptographic private keys
25857634087Systems and methods for identity-based encryption and related cryptographic techniques
25867630499Retrieval and transfer of encrypted hard drive content from DVR set-top boxes
25877627126Systems and methods for implementing path length control for quantum cryptographic systems
25887620186Method for establishing an encrypted communication by means of keys
25897620180Preparation of content for multiple conditional access methods in video on demand
25907617537Communication system and its method and communication apparatus and its method
25917613304System and method for sending encrypted messages to a distribution list
25927609839Quantum key distribution method and communication device
25937609837System and method for automatic setup of a network device with secure network transmission of setup parameters
25947606371Two-way QKD system with active compensation
25957606369Process for establishing a common cryptographic key for N subscribers
25967600238Method for verifying television receiver sets with access control and corresponding receiver set
25977600134Theft deterrence using trusted platform module authorization
25987600129Controlling access using additional data
25997599497Key management protocol
26007594116Mediated key exchange between source and target of communication
26017583887Recording medium having data structure for managing main data additional content data thereof and recording and reproducing methods and apparatuses
26027583803QKD stations with fast optical switches and QKD systems using same
26037577257Large scale quantum cryptographic key distribution network
26047577254Detector autocalibration in QKD systems
26057571456Downloading apparatus and method therof for digital broadcast receiver
26067571315Method and apparatus to assign trust to a key
26077570759System and method for secure encryption
26087567673Common key sharing method and wireless communication terminal in ad hoc network
26097565528Method for generating asymmetrical cryptographic keys by the user
26107564991Device, device control method, and program
26117561696Delivering policy updates for protected content
26127552334System and method for presentation integrity
26137549043Providing certificate matching in a system and method for searching and retrieving certificates
26147548620Token provisioning
26157542573Providing apparatus, communication device, method, and program
26167539314Frame synchronization method for QKD systems
26177529925System and method for distributing keys in a wireless network
26187529373Laser autocalibration for QKD systems
26197515716Systems and methods for reserving cryptographic key material
26207512989Data loader using location identity to provide secure communication of data to recipient devices
26217512789Mailing list server and mail transmission method thereof
26227477748Session key distribution methods using a hierarchy of key servers
26237477738Data sequence encryption and decryption
26247475245System and method for providing secure exchange of sensitive information with an implantable medical device

2008

26257471796Apparatus for and method of controlling propagation of decryption keys
26267463739Method and system providing improved security for the transfer of root keys
26277461251Public key certification issuing apparatus
26287454628Method and apparatus for transmitting content data and recording and/or reproducing apparatus
26297450722Subset difference method for multi-cast rekeying
26307434052Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream
26317434047System, method and computer program product for detecting a rogue member in a multicast group
26327421082Data delivery method and data delivery system using sets of passkeys generated by dividing an encryption key
26337421081Method and apparatus for generating hierarchical keys of digital assets
26347421079Method and apparatus for secure key replacement
26357415115Method and system for disaster recovery of data from a storage device
26367409562Method and apparatus for encrypting media programs for later purchase and viewing
26377409063Contents distribution system
26387400730Cryptographic communication method in communication system
26397395429Mutual authentication method, program, recording medium, signal processing system, reproduction device, and information processing device
26407380118Data transmitting apparatus, data receiving apparatus, data transmission system and data transmission method
26417372961Method of public key generation
26427366912Method of identifying participants in secure web sessions
26437359514Narrow-band single-photon source and QKD system using same
26447349538Hierarchical identity-based encryption and signature schemes
26457340061Information processing apparatus, information processing method and providing medium
26467336791Information processing apparatus
26477333617Method for establishing a common key for a group of at least three subscribers

2007

26487299357Opaque message archives
26497298847Secure key distribution protocol in AAA for mobile IP
26507272714Method, apparatus, and program for automated trust zone partitioning
26517266687Method and apparatus for storing and distributing encryption keys
26527266201Non-disruptive authentication administration
26537260224Automated secure key transfer
26547257706Method of securing a document in a system and controlling access to the document and a seal for use in the method
26557237113Keyed authentication rollover for routers
26567236597Key transport in quantum cryptographic networks
26577233672Constant modulation for enhancing QKD security
26587231517Apparatus and method for automatically authenticating a network client
26597181620Method and apparatus providing secure initialization of network devices using a cryptographic key distribution approach
26607171001Method and apparatus for managing secure collaborative transactions

2006

26617155611Method of operating a conditional access system for broadcast applications
26627146009Secure electronic messaging system requiring key retrieval for deriving decryption keys
26637127069Secured virtual network in a gaming environment
26647120792System and method for secure communication of routing messages
26657099478Apparatus for and method of controlling propagation of decryption keys
26667072865Broadcast receiving method and apparatus and information distributing method and apparatus
26677068791Secure packet radio network
26687065787Publishing content in connection with digital rights management (DRM) architecture
26697043018Prime number generation method, prime number generation apparatus, and cryptographic system
26707023994Method and device for customer personalization of GSM chips
26716993664Method and system for licensing a software product
26726993138Spatial key trees for key management in wireless environments

2005

26736968061Method which uses a non-volatile memory to store a crypto key and a check word for an encryption device
26746968060Method for verifying the use of public keys generated by an on-board system
26756965675Structure and method for loading encryption keys through a test access port
26766965674System and method for providing WLAN security through synchronized update and rotation of WEP keys
26776960779Photon source and method of operating a photon source
26786959086Cryptographic key management scheme
26796956947Extraction of multiple single keys from a compressed key
26806952768Security protocol
26816952475Method and arrangement for the computer-aided exchange of cryptographic keys between a first computer unit and a second computer unit
26826948065Platform and method for securely transmitting an authorization secret
26836948062Location dependent encryption and/or decryption
26846947563Method for assigning encryption keys
26856947560Method and device for effective key length control
26866947556Secure data storage and retrieval with key management and user authentication
26876944770Methods and systems for generating and validating value-bearing documents
26886940980High security cryptosystem
26896937726System and method for protecting data files by periodically refreshing a decryption key
26906934839Evidencing and verifying indicia of value using secret key cryptography
26916934392Split-key key-agreement protocol
26926934389Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus
26936931532Selective data encryption using style sheet processing
26946931528Secure handshake protocol
26956931133Method and system of securely escrowing private keys in a public key infrastructure
26966931128Methods and systems for generating encryption keys using random bit generators
26976928167Method for managing public key
26986925182Administration and utilization of private keys in a networked environment
26996922775User support system for cryptographic communication in network systems
27006920559Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed
27016917685IP key management mechanism with divergence barrier increasing entropy against computational crypto-analyses
27026915434Electronic data storage apparatus with key management function and electronic data storage method
27036912656Method and apparatus for sending encrypted electronic mail through a distribution list exploder
27046912655Network security architecture system utilizing seals
27056912654Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system
27066912285Mechanism for efficient private bulk messaging
27076911974Information processing system and method
27086910129Remote authentication based on exchanging signals representing biometrics information
27096909786Cryptographic trap door with timed lock and controlled escrow
27106909702Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system
27116901512Centralized cryptographic key administration scheme for enabling secure context-free application operation
27126901510Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
27136901241System, method and apparatus for secure transmission of confidential information
27146901145Generation of repeatable cryptographic key based on varying parameters
27156898708Device for reproducing data
27166898288Method and system for secure key exchange
27176895504Enabling secure communications with a client
27186895092Cryptographic key distribution method and apparatus thereof
27196895091Systems and methods for encryption key archival and auditing in a quantum-cryptographic communications network
27206889324Digital measurement apparatus and image measurement apparatus
27216889323Method and apparatus for contents information
27226888944Method for assigning encryption keys
27236886098Systems and methods for compression of key sets having multiple keys
27246885747Cryptographic key split combiner
27256884990METHOD FOR CHANGING THE POLARIZATION OF AT LEAST ONE OF THE PHOTONS EMITTED FROM A PHOTON-PAIR SOURCE INTO VARIOUS PARTIAL PATHS OF RAYS, AND METHOD FOR OPTIONALLY GENERATING INDIVIDUAL PHOTONS OR PHOTON PAIRS IN AN OPTICAL CHANNEL
27266883097Coincidence-free media key block for content protection for recordable media
27276882729System and method for limiting access to data
27286880081Key management for content protection
27296877092Apparatus, method, and computer program product for achieving interoperability between cryptographic key recovery enabled and unaware systems
27306870930Methods and systems for TMDS encryption
27316868615Telescopic weapon aiming system
27326859537Non-volatile memory for use with an encryption device
27336857076Data security for digital data storage
27346857075Key conversion system and method
27356857070Data processing method and apparatus, and storage medium capable of being read by a computer
27366851049Method and apparatus for facilitating secure anonymous email recipients
27376850620Method for preventing key share attacks
27386845453Multiple factor-based user identification and authentication
27396845450Display unit storing and using a cryptography key
27406845160Apparatus and method for depositing encryption keys
27416842523Encryption apparatus, cryptographic communication system, key recovery system, and storage medium
27426839839Public key distribution using an approximate linear function
27436839838Data management system, information processing apparatus, authentification management apparatus, method and storage medium
27446839837Cryptosystem key updating system and method for preventing illegal use of software
27456839437Method and apparatus for managing keys for cryptographic operations
27466839436Method for providing long-lived broadcast encrypton
27476839434Method and apparatus for performing a key update using bidirectional validation

2004

27486834346Content processing system
27496834112Secure distribution of private keys to multiple clients
27506834111DATA TRANSMITTING/RECEIVING METHOD, DATA TRANSMITTER, DATA RECEIVER, DATA TRANSMITTING/RECEIVING SYSTEM, AV CONTENT TRANSMITTING METHOD, AV CONTENT RECEIVING METHOD, AV CONTENT TRANSMITTER, AV CONTENT RECEIVER, AND PROGRAM RECORDING MEDIUM
27516832319Content guard system for copy protection of recordable media
27526832314Methods and apparatus for selective encryption and decryption of point to multi-point messages
27536831982Encryption key management system using multiple smart cards
27546831981Information transceiver system
27556829356Server-assisted regeneration of a strong secret from a weak secret
27566826689Method and system for emulating a secret code between two hardware modules
27576823070Method for key escrow in a communication system and apparatus therefor
27586819766Method and system for managing keys for encrypted data
27596816970Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
27606816595Mini time key creation method and system
27616813714Multicast conference security architecture
27626813358Method and system for timed-release cryptosystems
27636813357Exclusive key sharing method
27646813292Controllable low proton source
27656810122Secret sharing system and storage medium
27666801626Cryptographic key distribution using light pulses of three macroscopic quantum states
27676799272Remote device authentication system
27686799270System and method for secure distribution of digital information to a chain of computer system nodes in a network
27696795555Encryption key exchange protocol
27706792533Cryptographic methods for remote authentication
27716792530Implicit certificate scheme
27726792425Secure multi database system including a client, multi database server, and database server
27736789192Semiconductor memory card, data reading apparatus, and data reading/reproducing apparatus
27746788788Cryptographic communication method, encryption method, and cryptographic communication system
27756785810System and method for providing secure transmission, search, and storage of data
27766785809Server group key for distributed group key management
27776785390System and method for asynchronous decryption
27786782476Data processing apparatus and authentication method applied to the apparatus
27796782475Method and apparatus for conveying a private message to selected members
27806782103Cryptographic key management
27816778669Quantum encryption device
27826775382Method and apparatus for recovering encryption session keys
27836772339Mix and match: a new approach to secure multiparty computation
27846766453Authenticated diffie-hellman key agreement protocol where the communicating parties share a secret key with a third party
27856760843Maintaining a soft-token private key store in a distributed environment
27866760445Method for identifying betrayers of proprietary data
27876757825Secure mutual network authentication protocol
27886754820Multiple level access system
27896754349Cryptographic key, or other secret material, recovery
27906748530Certification apparatus and method
27916748084Data access control system and method thereof
27926748083Method and apparatus for free-space quantum key distribution in daylight
27936748082Method and device for introducing a service key into a terminal
27946748081Quantum cryptography system for a secure transmission of random keys using a polarization setting method
27956742116Security method, security software and security system for electronic communications
27966738907Maintaining a soft-token private key store in a distributed environment
27976735312Cryptographic method for restricting access to transmitted programming content using .function.-redundant establishment key combinations
27986735311Encryption and decryption of multi-media data
27996731755Split-key cryptographic system and method
28006724893Method of passing a cryptographic key that allows third party access to the key
28016721887Data copyright management system
28026718467Password based protocol for secure communications
28036711264Security improvement method and security system
28046708273Apparatus and method for implementing IPSEC transforms within an integrated circuit
28056707801Method and apparatus for data transport in a wireless communication system
28066701435Cryptographic key generation system
28076690798Key transforms to discriminate between beams in a multi-beam satellite communication system
28086687375Generating user-dependent keys and random numbers
28096684331Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
28106684330Cryptographic information and flow control
28116683955Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
28126683954Key encryption using a client-unique additional key for fraud prevention
28136681017Simplified secure shared key establishment and data delivery protocols for electronic commerce
28146678821Method and system for restricting access to the private key of a user in a public key infrastructure
28156678379Quantum key distribution method and apparatus
28166677888Secure aircraft communications addressing and reporting system (ACARS)

2003

28176671759Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets
28186658566Process for storage and use of sensitive information in a security module and the associated security module
28196658114Key management method
28206654883Device authentication and encrypted communication system offering increased security
28216654465Method of implementing a key recovery system
28226650753System for encrypting broadcast programs in the presence of compromised receiver devices
28236636968Multi-node encryption and key delivery
28246631472Kernel mode protection
28256629243Secure communications system
28266611913Escrowed key distribution for over-the-air service provisioning in wireless communication networks
28276611194Method for inserting a service key in a terminal and devices for implementing said method
28286609116System and method for securely updating copy-protected media
28296608901Cryptographic key split combiner
28306606707Semiconductor memory card
28316606386Cryptographic key split combiner
28326603857Method and apparatus for controlling release of time sensitive information
28336584566Distributed group key management for multicast security
28346584563User support system for cryptographic communication in network systems
28356578146System, method and article of manufacture to remotely configure and utilize an emulated device controller via an encrypted validation communication protocol
28366577734Data encryption key management system
28376563928Strengthened public key protocol
28386560337Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key
28396549626Method and apparatus for encoding keys
28406549623Cryptographic key split combiner
28416542608Cryptographic key split combiner
28426539479System and method for securely logging onto a remotely located computer
28436539092Leak-resistant cryptographic indexed key update
28446535607Method and apparatus for providing interoperability between key recovery and non-key recovery systems
28456532290Authentication methods
28466529601Method and apparatus for polarization-insensitive quantum cryptography
28476526509Method for interchange of cryptographic codes between a first computer unit and a second computer unit
28486526506Multi-level encryption access point for wireless network
28496522749Quantum cryptographic communication channel based on quantum coherence
28506512829Key distribution method and system in secure broadcast communication
28516510515Broadcast service access control
28526504930Encryption and decryption method and apparatus using a work key which is generated by executing a decryption algorithm
28536502861Seat belt guide

2002

28546493823Instrument for making secure data exchanges
28556493449Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids
28566490353Data encrypting and decrypting apparatus and method
28576487661Key agreement and transport protocol
28586483921Method and apparatus for regenerating secret keys in Diffie-Hellman communication sessions
28596483920Key recovery process used for strong encryption of messages
28606480608Method for exchanging cryptographic keys in an ATM network using multiple virtual paths or circuits
28616477649Information recording apparatus, information reproducing apparatus, and information distribution system
28626463536Data copyright management system
28636460137Encryption processing system
28646445797Method and system for performing secure electronic digital streaming
28656445794System and method for synchronizing one time pad encryption keys for secure communication and access control
28666444999Quantum circuit
28676442690Apparatus and methods for managing key material in heterogeneous cryptographic assets
28686438234Quantum cryptography device and method
28696430345Method and device for producing a choice of either single photons or pairs of photons in an optical channel
28706430292System and method for controlling disclosure time of information
28716424713Cryptographic system with concealed work factor
28726418225Method and apparatus for feature configuration in remotely located ultrasound imaging system
28736412072Parasitically powered microprocessor capable of transmitting data over a single data line and ground
28746411716Method of changing key fragments in a multi-step digital signature system
28756401204Process for cryptographic code management between a first computer unit and a second computer unit
28766396929Apparatus, method, and computer program product for high-availability multi-agent cryptographic key recovery
28776396612System, method and apparatus for secure transmission of confidential information
28786393564Decrypting device
28796393127Method for transferring an encryption key
28806389136Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys
28816385318Encrypting method, deciphering method and certifying method
28826385317Method for providing a secure communication between two devices and application of this method
28836381699Leak-resistant cryptographic method and apparatus
28846381331Information sending system and method for sending encrypted information
28856377689Key transmission system
28866373952Data transmitting apparatus, data transmitting method, data receiving apparatus, data receiving method, data transmission apparatus, and data transmission method
28876373946Communication security
28886370251Traffic key access method and terminal for secure communication without key escrow facility
28896367010Method for generating secure symmetric encryption and decryption
28906363485Multi-factor biometric authenticating device and method
28916363481Method and apparatus for secure data storage using distributed databases
28926363480Ephemeral decryptability
28936363154Decentralized systems methods and computer program products for sending secure messages among a group of nodes
28946363152Hybrid one time pad encryption and decryption apparatus with methods for encrypting and decrypting data
28956359986Encryption system capable of specifying a type of an encrytion device that produced a distribution medium
28966351536Encryption network system and method
28976343283Data copyright management system
28986337910Method and apparatus for generating one time pads simultaneously in separate encryption/decryption systems
28996336188Authenticated key agreement protocol
29006335972Framework-based cryptographic key recovery system

2001

29016333983Method and apparatus for performing strong encryption or decryption data using special encryption functions
29026330674Use of biometrics as a methodology for defining components for ECC encryption
29036330671Method and system for secure distribution of cryptographic keys on multicast networks
29046317834Biometric authentication system with encrypted models
29056317831Method and apparatus for establishing a secure connection over a one-way data path
29066317829Public key cryptography based security system to facilitate secure roaming of users
29076314190Cryptographic system with methods for user-controlled message recovery
29086307936Cryptographic key management scheme
29096304658Leak-resistant cryptographic method and apparatus
29106301661Enhanced security for applications employing downloadable executable content
29116292896Method and apparatus for entity authentication and session key generation
29126292895Public key cryptosystem with roaming user capability
29136289451System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection
29146289104Free-space quantum cryptography system
29156282657Kernel mode protection
29166282649Method for controlling access to electronically provided services and system for implementing such method
29176282295Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers
29186278782Method of implementing a key recovery system
29196272635Data copyright management system
29206272225Key recovery condition encryption and decryption apparatuses
29216272224Method and apparatus for quantum distribution of an encryption key
29226266421Key recovery system and key recovery method
29236266420Method and apparatus for secure group communications
29246266413System and method for synchronizing one time pad encryption keys for secure communication and access control
29256263437Method and apparatus for conducting crypto-ignition processes between thin client devices and server devices over data networks
29266263435Dual encryption protocol for scalable secure group communication
29276260147Wireless subscription portability
29286260142Access and storage of secure group communication cryptographic keys
29296259791Method and apparatus in a wireless messaging system for controlling a hierarchical provision of service
29306256733Access and storage of secure group communication cryptographic keys
29316252961Method and apparatus for performing data encryption and error code correction
29326249867Method for transferring sensitive information using initially unsecured communication
29336249585Publicly verifiable key recovery
29346246771Session key recovery system and method
29356246770Method and apparatus for feature configuration in remotely located ultrasound imaging system
29366243466Auto-escrowable and auto-certifiable cryptosystems with fast key generation
29376240188Distributed group key management scheme for secure many-to-many communication
29386240187Key replacement in a public key cryptosystem
29396236729Key recovery method and system
29406233339Physical property based cryptographics
29416230269Distributed authentication system and method
29426226383Cryptographic methods for remote authentication
29436222923Method for securing system protected by a key hierarchy
29446219794Method for secure key management using a biometric
29456219789Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities
29466216229Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
29476215878Group key distribution
29486215877Key management server, chat system terminal unit, chat system and recording medium
29496212280Apparatus and methods for managing key material in heterogeneous cryptographic assets
29506212279Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form
29516209091Multi-step digital signature method and system
29526202150Auto-escrowable and auto-certifiable cryptosystems
29536198824System for providing secure remote command execution network
29546195433Private key validity and validation
29556192474Method for establishing a key using over-the-air communication and password protocol and password protocol
29566192130Information security subscriber trust authority transfer system with private key history transfer
29576188768Autocompensating quantum cryptographic key distribution system based on polarization splitting of light
29586185685Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
29596185308Key recovery system
29606182214Exchanging a secret over an unreliable network
29616181795Portable cryptographic key
29626178506Wireless subscription portability
29636178244Cryptosystem
29646173400Methods and systems for establishing a shared secret using an authentication token
29656169805System and method of operation for providing user's security on-demand over insecure networks
29666169803Encryption key processing system to be incorporated into data recovery system or key setting system for generating encryption key
29676169802Dynamic private key security system for personal messaging devices

2000

29686167514Method, apparatus, system and information storage medium for wireless communication
29696166650Secure self learning system
29706160891Methods and apparatus for recovering keys
29716160890Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded
29726157723Method and apparatus for secure communications with encryption key scheduling
29736157722Encryption key management system and method
29746154543Public key cryptosystem with roaming user capability
29756151679System and method for preventing a first node from being emulated by another node
29766151395System and method for regenerating secret keys in diffie-hellman communication sessions
29776151394Encrypted communication system that limits the damage caused when a secret key has been leaked
29786144744Method and apparatus for the secure transfer of objects between cryptographic processors
29796141423Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
29806134431Personal station authentication system and authentication method
29816134325Key transmission system
29826131090Method and system for providing controlled access to information stored on a portable recording medium
29836128391Method and apparatus for asymetric key management in a cryptographic system
29846125185System and method for encryption key generation
29856122742Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys
29866122737Method for using fingerprints to distribute information over a network
29876122736Key agreement and transport protocol with implicit signatures
29886118874Encrypted data recovery method using split storage key and system thereof
29896118873System for encrypting broadcast programs in the presence of compromised receiver devices
29906111956Method for secure key distribution over a nonsecure communications network
29916111955Security in cellular telephones
29926105133Bilateral authentication and encryption system
29936098056System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
29946097818Data copyright management method
29956094487Apparatus and method for encryption key generation
29966091820Method and apparatus for achieving perfect forward secrecy in closed user groups
29976091819Accelerating public-key cryptography by precomputing randomly generated pairs
29986088454Key management method, encryption system, and sharing digital signature system which have hierarchies
29996088449Tri-signature security architecture systems and methods
30006085323Information processing system having function of securely protecting confidential information
30016081794Data copyright management system
30026076077Data management system
30036073235Private broadcast communication system and method for private broadcast communication over a wired or wireless network
30046073125Token key distribution system controlled acceptance mail payment and evidencing system
30056069957Method and apparatus for providing hierarchical key system in restricted-access television system
30066064741Method for the computer-aided exchange of cryptographic keys between a user computer unit U and a network computer unit N
30076061791Initial secret key establishment including facilities for verification of identity
30086061790Network computer system with remote user data encipher methodology
30096061454System, method, and computer program for communicating a key recovery block to enable third party monitoring without modification to the intended receiver
30106058188Method and apparatus for interoperable validation of key recovery information in a cryptographic system
30116058187Secure telecommunications data transmission
30126055639Synchronous message control system in a Kerberos domain
30136052787Process for group-based cryptographic code management between a first computer unit and group computer units
30146052715Interactive communication system for downloading large amount data
30156052469Interoperable cryptographic key recovery system with verification by comparison
30166052468Method of securing a cryptographic key
30176052466Encryption of data packets using a sequence of private keys generated from a public key exchange
30186049878Efficient, secure multicasting with global knowledge
30196049612File encryption method and system
30206047072Method for secure key distribution over a nonsecure communications network
30216047069Method and apparatus for preserving error correction capabilities during data encryption/decryption
30226044464Method of protecting broadcast data by fingerprinting a common decryption function
30236041408Key distribution method and system in secure broadcast communication
30246041123Centralized secure communications system
30256041122Method and apparatus for hiding crytographic keys utilizing autocorrelation timing encoding and computation
30266038322Group key distribution
30276035398Cryptographic key generation using biometric data
30286031913Apparatus and method for secure communication based on channel characteristics
30296028935Cryptographic receiver
30306026167Method and apparatus for sending secure datagram multicasts
30316023689Method for secure communication in a telecommunications system
30326018581Communication system and communication method

1999

30336009177Enhanced cryptographic system and method with key escrow feature
30346009174Secret key transfer method which is highly secure and can restrict the damage caused when the secret key is leaked or decoded
30356009173Encryption and decryption method and apparatus
30366005943Electronic identifiers for network terminal devices
30376005487Electronic security system with novel electronic T-handle lock
30385999629Data encryption security module
30395999285Positive-operator-valued-measure receiver for quantum cryptography
30405995624Bilateral authentication and information encryption token system and method
30415995533Apparatus and method for generating pseudorandom quantities based upon radio channel characteristics
30425991408Identification and security using biometric measurements
30435991406System and method for data recovery
30445991405Method for dynamically updating cellular phone unique encryption keys
30455991404System for diversifying information in a network for distributing goods or services
30465987572Method and apparatus employing a dynamic encryption interface between a processor and a memory
30475987131Cryptographic key exchange using pre-computation
30485987130Simiplified secure swift cryptographic key exchange
30495987129Method of sharing cryptokey
30505987128Method of effecting communications using common cryptokey
30515987125Method for communicating seismic data
30525970147System and method for configuring and registering a cryptographic device
30535966449Method and network for communicating between a group of entities a text encrypted using an encryption key intrinsic to the group of entities in a network having a plurality of entities and a center
30545966444Method and system for establishing a cryptographic key agreement using linear protocols
30555966443Method for correcting subscriber-based secure call keys
30565966224Secure communications with low-orbit spacecraft using quantum cryptography
30575963646Secure deterministic encryption key generator system and method
30585960086Unified end-to-end security methods and systems for operating on insecure networks
30595956406Method of setting up secure communications and associated encryption/decryption system
30605956403System and method for access field verification
30615956402Passwordless secure and efficient remote data update
30625953424Cryptographic system and protocol for establishing secure authenticated remote access
30635953421Quantum cryptography
30645953420Method and apparatus for establishing an authenticated shared secret value between a pair of users
30655940508Method and apparatus for seamless crypto rekey system
30665937066Two-phase cryptographic key recovery system
30675933504Strengthened public key protocol
30685930362Generation of encryption key
30695923756Method for providing secure remote command execution over an insecure computer network
30705920630Method of public key cryptography that includes key escrow
30715920627Encryption device and decryption device for information conveyed by asynchronous transfer mode cells
30725917911Method and system for hierarchical key access and recovery
30735915025Data processing apparatus with software protecting functions
30745915021Method for secure communications in a telecommunications system
30755915018Key management system for DVD copyright management
30765907618Method and apparatus for verifiably providing key recovery information in a cryptographic system
30775903649Method for establishing a common code for authorized persons through a central office
30785901227Method and apparatus for implementing partial and complete optional key escrow
30795896455Key agreement and transport protocol with implicit signatures
30805889865Key agreement and transport protocol with implicit signatures
30815889861Identity confidentiality method in radio communication system
30825887063Communication system for portable appliances
30835878136Encryption key control system for mail processing system having data center verification
30845872849Enhanced cryptographic system and method with key escrow feature
30855870475Facilitating secure communications in a distribution network
30865867578Adaptive multi-step digital signature system and method of operation thereof
30875864667Method for safe communications
30885864625Methods and apparatus for secure optical communications links
30895857022Enhanced cryptographic system and method with key escrow feature

1998

30905852665Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
30915850451Enhanced cryptographic system and method with key escrow feature
30925850450Method and apparatus for encryption key creation
30935850444Method and apparatus for encrypting radio traffic in a telecommunications network
30945850443Key management system for mixed-trust environments
30955850441System and method for key distribution using quantum cryptography
30965848158Data copyright management system
30975848156Communication method and apparatus for carrying out cipher communications telephonically
30985841865Enhanced cryptographic system and method with key escrow feature
30995841864Apparatus and method for authentication and session key exchange in a communication system
31005838792Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
31015835592Secure, swift cryptographic key exchange
31025832207Secure module with microprocessor and co-processor
31035832092Communication system based on shared cipher key, server unit for the same system, client unit for the same system, and method of sharing cipher key in communication system
31045832091Fingerprint controlled public key cryptographic system
31055832087Apparatus for generating encryption/decryption look-up tables using a session key
31065832086Method for updating a communication unit parameter in a wireless communication system
31075825880Multi-step digital signature method and system
31085825300Method of protected distribution of keying and certificate material
31095815573Cryptographic key recovery system
31105812666Cryptographic key management and validation system
31115812664Key distribution system
31125809140Session key distribution using smart cards
31135805705Synchronization of encryption/decryption keys in a data communication network
31145802175Computer file backup encryption system and method
31155799088Non-deterministic public key encrypton system
31165799086Enhanced cryptographic system and method with key escrow feature
31175799080Semiconductor chip having identification/encryption code
31185796839Encryption method, encryption apparatus, recording method, decoding method, decoding apparatus and recording medium
31195796830Interoperable cryptographic key recovery system
31205794139Automatic generation of private authentication key for wireless communication systems
31215787173Cryptographic key management method and apparatus
31225784463Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method
31235784462Digital signal receiver capable of receiving data encrypted and transmitted in online processing
31245778065Method and system for changing an authorization password or key in a distributed communication network
31255768389Method and system for generation and management of secret key of public key cryptosystem
31265768388Time delayed key escrow
31275768381Apparatus for key distribution in an encryption system
31285768380Method for sending a communication unit parameter to a plurality of communication units
31295768378Key distribution in a multiple access network using quantum cryptography
31305764772Differential work factor cryptography method and system
31315764771Method for processing a digital signal in a so-called secure communication system and use of this method for access control and/or binary signature
31325764768Blind encryption
31335764767System for reconstruction of a secret shared by a plurality of participants
31345764766System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same
31355764765Method for key distribution using quantum cryptography
31365761311Blind encryption
31375761307Method for securing data in a telecommunications system
31385761306Key replacement in a public key cryptosystem
31395761305Key agreement and transport protocol with implicit signatures
31405757924Network security device which performs MAC address translation without affecting the IP address
31415757912System and method for quantum cryptography
31425757911Encryption communication process and terminal for encryption communication
31435748736System and method for secure group communications via multicast or broadcast
31445748735Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
31455748734Circuit and method for generating cryptographic keys
31465745578Apparatus and method for secure communication based on channel characteristics
31475745576Method and apparatus for initialization of cryptographic terminal
31485745573System and method for controlling access to a user secret
31495745572Cryptographic key management
31505745044Electronic security system
31515742682Method of manufacturing secure boxes in a key management system
31525737420Method for secure data transmission between remote stations
31535737419Computer system for securing communications using split private key asymmetric cryptography
31545732139Quantum cryptographic system with reduced data loss
31555729609Method for producing a common key in two devices, in order to implement a common cryptographic procedure, and associated apparatus
31565721777Escrow key management system for accessing encrypted data with portable cryptographic modules
31575720034Method for secure key production
31585719938Methods for providing secure access to shared information
31595712912Method and apparatus for securely handling a personal identification number or cryptographic key using biometric techniques
31605712800Broadcast key distribution apparatus and method using chinese remainder
31615708711Method for selecting a preferred time interval in which to update a communication unit parameter
31625708710Method and apparatus for authentication in a communication system
31635706348Use of marker packets for synchronization of encryption/decryption keys in a data communication network
31645706347Method and system for authenticating a computer network node

1997

31655696823High-bandwidth encryption system with low-bandwidth cryptographic modules
31665687237Encryption key management system for an integrated circuit
31675686904Secure self learning system
31685680460Biometric controlled key generation
31695680458Root key compromise recovery
31705680456Method of manufacturing generic meters in a key management system
31715677954Cryptical control method for personal communication
31725675649Process for cryptographic key generation and safekeeping
31735675648System and method for key distribution using quantum cryptography
31745668877Method and apparatus for stepping pair keys in a key-management scheme
31755666414Guaranteed partial key-escrow
31765664017Internationally regulated system for one to one cryptographic communications with national sovereignty without key escrow
31775663896Broadcast key distribution apparatus and method using Chinese Remainder
31785661803Method of token verification in a key management system
31795659615Secure satellite receive-only local area network with address filter
31805651066Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information
31815647000Failsafe key escrow system
31825640454System and method for access field verification
31835638445Blind encryption
31845638444Secure computer communication method and system
31855633933Method and apparatus for a key-management scheme for internet protocols
31865633929Cryptographic key escrow system having reduced vulnerability to harvesting attacks
31875633928Key escrow method with warrant bounds
31885631961Device for and method of cryptography that allows third party access
31895625692Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
31905623546Encryption method and system for portable data
31915621795System and method for fault tolerant key management
31925619572Method and apparatus for providing secure communications for a requested call
31935615266Secure communication setup method
31945615265Process for the transmission and reception of conditional access programs controlled by the same operator
31955604806Apparatus and method for secure radio communication
31965604801Public key data communications system under control of a portable security device
31975602918Application level security system and method
31985602917Method for secure session key generation
31995602915Process for the control of secret keys between two smart cards
32005600725Digital signature method and key agreement method
32015592554Method for data security in a digital telecommunication system
32025592552Broadcast encryption

1996

32035588060Method and apparatus for a key-management scheme for internet protocols
32045588059Computer system and method for secure remote communication sessions
32055586185Communications system capable of communicating encrypted information
32065583939Secure, swift cryptographic key exchange
32075574785Enciphered communication system
32085568301Optical communication system with secure key transfer
32095564106Method for providing blind access to an encryption key
32105563950System and methods for data encryption using public key cryptography
32115559889System and methods for data encryption using public key cryptography
32125557765System and method for data recovery
32135557678System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
32145557346System and method for key escrow encryption
32155555309Cryptographic key management apparatus and methods
32165548649Network security bridge and associated method
32175541994Fingerprint controlled public key cryptographic system
32185541581Electronic combination lock security system
32195539824Method and system for key distribution and authentication in a data communication network
32205535276Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
32215519778Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications between the users
32225519706Dynamic user registration method in a mobile communications network
32235517567Key distribution system
32245515441Secure communication method and apparatus
32255515439Exchange certificate for one way validation of information
32265515438Quantum key distribution using non-orthogonal macroscopic signals
32275513263Method for establishing classes within a communication network
32285513245Automatic generation of private authentication key for wireless communication systems
32295509077Method for data security in a digital telecommunication system
32305506904System and method for transmitting and receiving variable length authorization control for digital services
32315504817Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications
32325495533Personal key archive
32335491752System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens
32345491750Method and apparatus for three-party entity authentication and key distribution using message authentication codes
32355491749Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks
32365485577Method and apparatus for incremental delivery of access rights
32375481613Computer network cryptographic key distribution system
32385481610Digital radio transceiver with encrypted key storage

1995

32395475757Secure data transmission method
32405471532Method of rekeying roaming communication units
32415469507Secure communication and computation in an insecure environment
32425467398Method of messaging in a communication system
32435457748Method and apparatus for improved security within encrypted communication devices
32445455862Apparatus and method for encrypting communications without exchanging an encryption key
32455450493Secure communication method and apparatus
32465448638Security apparatus and system for retail environments
32475444781Method and apparatus for decryption using cache storage
32485442703Method for identifying corrupt encryption keys within a secure communication system
32495440635Cryptographic protocol for remote authentication
32505436972Method for preventing inadvertent betrayal by a trustee of escrowed digital secrets
32515420577Method for providing communication between a distribution panel and console interface units
32525416842Method and apparatus for key-management scheme for use with internet protocols at site firewalls
32535416841Cryptography system
32545412723Mechanism for keeping a key secret from mobile eavesdroppers
32555412722Encryption key management
32565412721Method for loading and utilizing a key in a secure transmission device
32575410602Method for key management of point-to-point communications
32585406628Public key authentication and key agreement for low-cost terminals
32595404404Method for updating encryption key information in communication units
32605404403Key management in encryption systems
32615402491Method for providing limited secure services in secure trunking communication systems
32625400403Abuse-resistant object distribution system and method
32635386471Method and apparatus for securely conveying network control data across a cryptographic boundary
32645384850Security apparatus and system for retail environments
32655381481Method and apparatus for uniquely encrypting a plurality of services at a transmission site
32665381479Method for over the air rekeying of multiple communication groups
32675381478Cipher communication system for transaction data

1994

32685375169Cryptographic key management method and apparatus
32695371794Method and apparatus for privacy and authentication in wireless networks
32705369705Multi-party secure session/conference
32715363447Method for loading encryption keys into secure transmission devices
32725357571Method for point-to-point communications within secure communication systems
32735351294Limited broadcast system
32745351293System method and apparatus for authenticating an encrypted signal
32755345508Method and apparatus for variable-overhead cached encryption
32765345506Mutual authentication/cipher key distribution system
32775341427Algorithm independent cryptographic key management apparatus
32785341426Cryptographic key management apparatus and method
32795341425Methods and apparatus for uniquely encrypting data at a plurality of data transmission sites for transmission to a reception site
32805337357Method of software distribution protection
32815335281Network controller and method
32825325434Method for authenticating communications participants, system for application of the method and first communications participant and second communication participant for application in the system
32835325433Encryption communication system
32845325432Method for updating encryption key information in communication units
32855315658Fair cryptosystems and methods of use
32865313521Key distribution protocol for file transfer in the local area network
32875309516Group cipher communication method and group cipher communication system
32885307523Protective eyewear
32895307411Means for identification and exchange of encryption keys
32905307410Interferometric quantum cryptographic key distribution system
32915301247Method for ensuring secure communications
32925301233Process for the transmission and reception of personalized programs
32935301232Method and apparatus for over-the-air programming of communication devices
32945299263Two-way public key authentication and key agreement for low-cost terminals
32955276737Fair cryptosystems and methods of use

1993

32965272752Authorization code lockout mechanism for preventing unauthorized reception of transmitted data
32975268962Computer network with modified host-to-host encryption keys
32985265164Cryptographic facility environment backup/restore and replication in a public key cryptosystem
32995253294Secure transmission system
33005251258Key distribution system for distributing a cipher key between two subsystems by one-way communication
33015247576Key variable identification method
33025243649Apparatus and method for quantum mechanical encryption for the transmission of secure communications
33035241599Cryptographic protocol for secure communications
33045241598Rolling key resynchronization in cellular verification and validation system
33055237611Encryption/decryption apparatus with non-accessible table of keys
33065230020Algorithm independent cryptographic key management
33075228084Security apparatus and system for retail environments
33085227613Secure encrypted data communication system having physically secure IC cards and session key generation based on card identifying information
33095222140Cryptographic method for key agreement and user authentication
33105222136Encrypted communication system
33115220606Cryptographic system and method
33125218638Encipher method and decipher method
33135216715Key distribution in public communication networks taking account of security gradations
33145214698Method and apparatus for validating entry of cryptographic keys
33155208859Method for rekeying secure communication units by group
33165204901Public key cryptographic mechanism
33175202922Data communication system
33185202921Method and apparatus for authenticating users of a communication system to each other
33195201000Method for generating public and private key pairs without using a passphrase
33205200999Public key cryptosystem key management based on control vectors
33215199072Method and apparatus for restricting access within a wireless local area network
33225179591Method for algorithm independent cryptographic key management
33235177791Secure translation of usage-control values for cryptographic keys

1992

33245175766Signalling scheme for controlling data encryption device in an electronic fund transaction processing system
33255173938Key management system
33265164988Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
33275161244Cryptographic system based on information difference
33285161189Encryption and decryption of chained messages
33295151938Security enhancement in a data processor through use of dynamic parameter authentication
33305150411Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction
33315150408Key distribution communication system
33325146498Remote key manipulations for over-the-air re-keying
33335146497Group rekey in a communication system
33345144667Method of secure remote access
33355144665Cryptographic communication method and system
33365142578Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
33375142577Method and apparatus for authenticating messages
33385140317Electronic security system
33395136642Cryptographic communication method and cryptographic communication device
33405124117Cryptographic key distribution method and system
33415117458Secret information service system and method
33425115467Signal encryption apparatus for generating common and distinct keys
33435115466Communication network intended for secure transmission of speech and data
33445111504Information processing apparatus with replaceable security element
33455103478Secure management of keys using control vectors with multi-path checking
33465093860Key management system
33475081678Method for utilizing an encrypted key as a key identifier in a data packet in a computer network

1991

33485073935Method for secure communication
33495073934Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
33505048087Key management for encrypted packet based networks
33515029208Cipher-key distribution system
33525016276Common cryptokey generation system and communication system using common cryptokeys
33535010572Distributed information system having automatic invocation of key management negotiations protocol and method
33545007089Secure key management using programable control vector checking
33555003593Teleconferencing method for a secure key management system
33565001756Decryption device with variable clock
33574995080Television signal scrambling system and method
33584993069Secure key management using control vector translation
33594993067Secure satellite over-the-air rekeying method and system

1990

33604965804Key management for encrypted packet based networks
33614956863Cryptographic method and apparatus for public key exchange with authentication
33624941176Secure management of keys using control vectors
33634941173Device and method to render secure the transfer of data between a videotex terminal and a server
33644935961Method and apparatus for the generation and synchronization of cryptographic keys
33654933971Method for encrypting transmitted data using a unique key
33664924515Secure management of keys using extended control vectors
33674924513Apparatus and method for secure transmission of data over an unsecure transmission channel
33684918728Data cryptography operations using control vectors
33694912762Management of cryptographic keys
33704910773Method of dispatching secret keys to security modules and user cards in a data processing network

1989

33714888801Hierarchical key management system
33724888800Secure messaging systems
33734881263Apparatus and method for secure transmission of data over an unsecure transmission channel
33744876716Key distribution method
33754864615Reproduction of secure keys by using distributed key generation data
33764850017Controlled use of cryptographic keys via generating station established control values
33774811393Method and system for diversification of a basic key and for authentication of a thus-diversified key
33784797672Voice network security system

1988

33794771461Initialization of cryptographic variables in an EFT/POS network with a large number of terminals
33804771459System for storing and distributing keys for cryptographically protected communication
33814731840Method for encryption and transmission of digital keying data

1987

33824658292Enciphering key distribution system for subscription TV broadcast or catv system

1986

33834607137Method of distributing and utilizing enciphering keys
33844578532Method and apparatus for code transmission
33854578531Encryption system key distribution method and apparatus

1981

33864288659Method and means for securing the distribution of encoding keys

1980

33874200770Cryptographic apparatus and method
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017