СПИСОК патентов США - подгруппа МПК16 H04L9/14
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9608980 | Environment-aware security tokens | |||
2 | 9608968 | Connection architecture for a mobile network | |||
3 | 9608825 | Trusted platform module certification and attestation utilizing an anonymous key system | |||
4 | 9608816 | Shared data encryption and confidentiality | |||
5 | 9608808 | Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof | |||
6 | 9608806 | Extending data confidentiality into a player application | |||
7 | 9608805 | Encryption key generation | |||
8 | 9607159 | Intelligent key selection and generation | |||
9 | 9602457 | Mobile device having power save feature for establishing communications | |||
10 | 9602279 | Configuring devices for use on a network using a fast packet exchange with authentication | |||
11 | 9602274 | Secure password generation | |||
12 | 9602273 | Implementing key scheduling for white-box DES implementation | |||
13 | 9600656 | System and method for domain password reset in a secured distributed network environment | |||
14 | 9600640 | Multimedia network system with content importation, content exportation, and integrated content management | |||
15 | 9596436 | Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box | |||
16 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
17 | 9590971 | Environment-aware security tokens | |||
18 | 9589268 | Integration of payment capability into secure elements of computers | |||
19 | 9588908 | Memory circuit using resistive random access memory arrays in a secure element | |||
20 | 9584310 | Protecting a white-box implementation against attacks | |||
21 | 9578496 | Method and user equipment for negotiating security during handover between different radio access technologies | |||
22 | 9577993 | System and method for authenticating users | |||
23 | 9577827 | Information processing device, information processing method, and program | |||
24 | 9577824 | Delivering a content item from a server to a device | |||
25 | 9572023 | Method and system for providing services to mobile communication subscribers | |||
26 | 9571472 | Establishing an initial root of trust for individual components of a distributed security infrastructure | |||
27 | 9571289 | Methods and systems for glitch-resistant cryptographic signing | |||
28 | 9571280 | Application integrity protection via secure interaction and processing | |||
29 | 9571271 | Sending messages by oblivious transfer | |||
30 | 9569774 | System and method for processing feedback entries received from software | |||
31 | 9565022 | RFID tags with dynamic key replacement | |||
32 | 9565020 | System and method for generating a server-assisted strong password from a weak secret | |||
33 | 9563753 | Method for booting and dumping a confidential image on a trusted computer system | |||
34 | 9560474 | Device for transfering data between an unconscious capture device and another device | |||
35 | 9559846 | Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems | |||
36 | 9559845 | Systems, methods and apparatuses for the secure transmission of media content | |||
37 | 9559837 | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |||
38 | 9558373 | 3D graphics system using encrypted texture tiles | |||
39 | 9558362 | Data encryption using an external arguments encryption algorithm | |||
40 | 9554270 | Enhanced security for direct link communications | |||
41 | 9548866 | Deletion of content in digital storage systems | |||
42 | 9548863 | Method for unambiguous marking of an object | |||
43 | 9548861 | Encrypted statistical processing system, device, method, and program | |||
44 | 9547860 | System for processing feedback entries received from software | |||
45 | 9544151 | Controlling access to clinical data analyzed by remote computing resources | |||
46 | 9544142 | Data authentication using plural electronic keys | |||
47 | 9536047 | Privacy-enhancing technologies for medical tests using genomic data | |||
48 | 9535852 | System and method for secured host-slave communication | |||
2016 | |||||
49 | 9532213 | Lawful interception for device-to-device (D2D) communication | |||
50 | 9531687 | Techniques for secure message offloading | |||
51 | 9531537 | System and method for performing secure communications | |||
52 | 9526007 | Location brokering for providing security, privacy and services | |||
53 | 9526001 | Device-to-device discovery with direct radio signals | |||
54 | 9525668 | Face based secure messaging | |||
55 | 9525538 | Apparatus, system and method of communicating non-cellular access network information over a cellular network | |||
56 | 9524594 | Mobile access control system and method | |||
57 | 9521370 | Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box | |||
58 | 9520995 | Efficient prime-number check | |||
59 | 9516500 | ID-based control unit-key fob pairing | |||
60 | 9515828 | Sharing a secret via linear interpolation | |||
61 | 9510216 | Node device and communication control method | |||
62 | 9509501 | Storage encryption | |||
63 | 9509498 | System and method for transmitting data | |||
64 | 9509493 | Information processing technique for secure pattern matching | |||
65 | 9503892 | Mapping special subframes in a wireless communication network | |||
66 | 9503256 | SMS4 acceleration hardware | |||
67 | 9503255 | Cryptographic sequencing system and method | |||
68 | 9497174 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
69 | 9495588 | Biometric template security and key generation | |||
70 | 9495240 | Encrypting data for storage in a dispersed storage network | |||
71 | 9491040 | Determination and display of LUN encryption paths | |||
72 | 9489519 | Method and apparatus for encrypting data messages after detecting infected VM | |||
73 | 9485101 | Provisioning digital certificates in a network environment | |||
74 | 9485096 | Encryption / decryption of data with non-persistent, non-shared passkey | |||
75 | 9485090 | Managed authentication on a distributed network | |||
76 | 9483655 | File backup with selective encryption | |||
77 | 9479932 | ID-based control unit-key fob pairing | |||
78 | 9479334 | Method, system, and terminal for communication between cluster system encryption terminal and encryption module | |||
79 | 9479329 | Motor vehicle control unit having a cryptographic device | |||
80 | 9473302 | Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device | |||
81 | 9473298 | Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration | |||
82 | 9471796 | Intelligent key selection and generation | |||
83 | 9467281 | Information processing apparatus and program product | |||
84 | 9465952 | Systems and methods for secure multi-tenant data storage | |||
85 | 9461823 | System and method for limiting exploitable or potentially exploitable sub-components in software components | |||
86 | 9461822 | Image forming apparatus, control method, and storage medium | |||
87 | 9455834 | Securely providing secret data from a sender to a receiver | |||
88 | 9454673 | Searchable encryption for cloud storage | |||
89 | 9450752 | Method and apparatus for providing service provider-controlled communication security | |||
90 | 9449183 | Secure file drawer and safe | |||
91 | 9449178 | System, method and computer product for fast and secure data searching | |||
92 | 9443107 | Method for protecting the integrity of a group of memory elements using an aggregate authentication code | |||
93 | 9442865 | Processor extensions for execution of secure embedded containers | |||
94 | 9438569 | Secured embedded data encryption systems | |||
95 | 9438550 | Mobile device power management in data synchronization over a mobile network with or without a trigger notification | |||
96 | 9438423 | Encryption device, encryption method, and information processing device | |||
97 | 9438418 | Systems and methods for generating a key difficult to clone | |||
98 | 9438416 | Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation | |||
99 | 9438413 | Generating and merging keys for grouping and differentiating volumes of files | |||
100 | 9436815 | Block management unification system and method | |||
101 | 9432182 | Techniques for sharing data | |||
102 | 9426131 | Server apparatus and program to re-encrypt ciphertext data | |||
103 | 9425964 | Display device with mobile high-definition link port and signal processing method thereof | |||
104 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
105 | 9425959 | Security variable scrambling | |||
106 | 9425957 | System and method for remote reset of password and encryption key | |||
107 | 9418246 | Decryption systems and related methods for on-the-fly decryption within integrated circuits | |||
108 | 9413529 | Distributed storage network and method for storing and retrieving encryption keys | |||
109 | 9412209 | Prevention device for operating vehicle running record | |||
110 | 9407440 | Multiple authority data security and access | |||
111 | 9407437 | Secure initialization vector generation | |||
112 | 9407432 | System and method for efficient and secure distribution of digital content | |||
113 | 9407431 | Systems and methods for distributing and securing data | |||
114 | 9402270 | Secure device bootstrap identity | |||
115 | 9402108 | Receiver software protection | |||
116 | 9401919 | Web form protection | |||
117 | 9401804 | Leakage resilient garbled circuit generation using reduced memory hardware token | |||
118 | 9398321 | Multimedia network system with content importation, content exportation, and integrated content management | |||
119 | 9397833 | Receipt, data reduction, and storage of encrypted data | |||
120 | 9397832 | Shared data encryption and confidentiality | |||
121 | 9397826 | Encryption device and method for defending a physical attack | |||
122 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
123 | 9392443 | Shared secret for wireless devices | |||
124 | 9392077 | Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices | |||
125 | 9391963 | Differential client-side encryption of information originating from a client | |||
126 | 9391770 | Method of cryption | |||
127 | 9386120 | Single sign-on access in an orchestration framework for connected devices | |||
128 | 9385997 | Protection of control words employed by conditional access systems | |||
129 | 9385866 | System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised | |||
130 | 9385865 | Correcting deciphering mis-synchronization in a mobile communication terminal | |||
131 | 9374222 | Secure communication of data between devices | |||
132 | 9373113 | Payment terminal sharing | |||
133 | 9369490 | Method for the secure exchange of data over an ad-hoc network implementing an Xcast broadcasting service and associated node | |||
134 | 9369441 | End-to-end secure communication system | |||
135 | 9369281 | Method and system for secure use of services by untrusted storage providers | |||
136 | 9367702 | Automatic file encryption | |||
137 | 9363668 | Sensor network, sensor management server, key updating method and key updating program | |||
138 | 9363247 | Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption | |||
139 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
140 | 9363075 | Polymorphic encryption key matrices | |||
141 | 9357463 | Techniques and systems for extended discontinuous reception | |||
142 | 9357389 | Security identity discovery and communication method | |||
143 | 9356783 | Method for ciphering and deciphering, corresponding electronic device and computer program product | |||
144 | 9356782 | Block encryption | |||
145 | 9351157 | Methods, systems, and devices to reduce audio truncation during transcoding | |||
146 | 9350544 | Apparatus for encrypting data | |||
147 | 9349023 | Database encryption system, method, and program | |||
148 | 9344393 | Secure end-to-end transport through intermediary nodes | |||
149 | 9338004 | Method and system for smart card chip personalization | |||
150 | 9336363 | Method and system for secure deployment of information technology (IT) solutions in untrusted environments | |||
151 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
152 | 9326142 | Cryptographic key generation | |||
153 | 9325673 | Communication system and communication method | |||
154 | 9325642 | Randomness for encryption operations | |||
155 | 9325506 | Cryptographically enforcing strict separation of environments | |||
156 | 9323603 | Storage of sensitive data in a dispersed storage network | |||
157 | 9313170 | Identity protection and management for electronic communication | |||
158 | 9313026 | Key negotiation method and apparatus according to SM2 key exchange protocol | |||
159 | 9313023 | Format-preserving cipher | |||
160 | 9313022 | Homomorphic cryptography modeling in support of privacy policies | |||
161 | 9311487 | Tampering monitoring system, management device, protection control module, and detection module | |||
162 | 9311256 | Storage device | |||
163 | 9306753 | Mobile system and method for improving safety of impromptu meetings | |||
164 | 9306746 | Randomizing current injection circuit to obscure gate noise for added security | |||
165 | 9305172 | Multi-ring encryption approach to securing a payload using hardware modules | |||
166 | 9301147 | Method, apparatus, and system for data protection on interface in communications system | |||
167 | 9301134 | Security key generation for dual connectivity | |||
168 | 9294276 | Countering server-based attacks on encrypted content | |||
169 | 9286602 | Secure financial transactions | |||
170 | 9282074 | Multi-version message condition based delivery | |||
171 | 9276913 | Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program | |||
172 | 9276754 | Key rotation with external workflows | |||
173 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
174 | 9270460 | Instructions to perform JH cryptographic hashing in a 256 bit data path | |||
175 | 9270452 | Encryption using real-world objects | |||
176 | 9270446 | Privacy-enhancing technologies for medical tests using genomic data | |||
177 | 9268911 | Field optimized assay devices, methods, and systems | |||
178 | 9258281 | Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption | |||
179 | 9258122 | Systems and methods for securing data at third-party storage services | |||
180 | 9247429 | Key derivation | |||
181 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
182 | 9246675 | Cryptographic systems using pairing with errors | |||
183 | 9240885 | Cryptographic processing apparatus, cryptographic processing method, and computer program therefor | |||
184 | 9240883 | Multi-key cryptography for encrypting file system acceleration | |||
185 | 9240880 | Distributed data storage device | |||
186 | 9232268 | Unified video delivery system for supporting IP video streaming service | |||
2015 | |||||
187 | 9226211 | Centralized partitioning of user devices in a heterogeneous wireless network | |||
188 | 9225514 | Method for image encryption and decryption incorporating physiological features and image capture device thereof | |||
189 | 9219730 | Securing a secret of a user | |||
190 | 9219715 | Mediator utilizing electronic content to enforce policies to a resource | |||
191 | 9219606 | Method and device for digital data blocks encryption and decryption | |||
192 | 9215066 | Method and system for making information in a data set of a copy-on-write file system inaccessible | |||
193 | 9210571 | Secure wireless communication | |||
194 | 9209974 | Functional encryption key management | |||
195 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
196 | 9209971 | Method and system for shielding data in untrusted environments | |||
197 | 9208357 | FPGA configuration bitstream protection using multiple keys | |||
198 | 9203980 | Unit using operating system and image forming apparatus using the same | |||
199 | 9203614 | Method, apparatus, and system for protecting cloud data security | |||
200 | 9197410 | Key management system | |||
201 | 9195848 | Computational systems and methods for anonymized storage of double-encrypted data | |||
202 | 9191812 | Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node | |||
203 | 9191374 | Routing device data caching | |||
204 | 9191206 | Multiple transform utilization and application for secure digital watermarking | |||
205 | 9191205 | Multiple transform utilization and application for secure digital watermarking | |||
206 | 9189900 | Methods and systems for assigning e-keys to users to access and drive vehicles | |||
207 | 9189645 | Sharing content across applications and devices having multiple operation modes in an orchestration framework for connected devices | |||
208 | 9185080 | Data transmitting devices, data receiving devices, methods for controlling a data transmitting device, and methods for controlling a data receiving device | |||
209 | 9184913 | Authenticating a telecommunication terminal in a telecommunication network | |||
210 | 9183357 | Recording/reproducing system, recording medium device, and recording/reproducing device | |||
211 | 9172537 | Array encryption core | |||
212 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
213 | 9166788 | Method and device for obtaining a security key | |||
214 | 9166787 | Securing encrypted virtual hard disks | |||
215 | 9166713 | System for providing access to operation information | |||
216 | 9160527 | Systems, methods, and computer-readable media for secure digital communications and networks | |||
217 | 9148419 | User administering a trustworthy workspace | |||
218 | 9147195 | Data custodian and curation system | |||
219 | 9141769 | Secure transfer and use of secret material in a shared environment | |||
220 | 9137015 | Protection scheme for AACS keys | |||
221 | 9125050 | Secure near field communication server information handling system lock | |||
222 | 9124564 | Context awareness during first negotiation of secure key exchange | |||
223 | 9124417 | Computation of garbled tables in garbled circuit | |||
224 | 9118467 | Generating keys using secure hardware | |||
225 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
226 | 9106413 | Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications | |||
227 | 9104610 | Method, system and medium for analog encryption in a flash memory | |||
228 | 9094379 | Transparent client-side cryptography for network applications | |||
229 | 9092780 | User-mediator monitoring and controlling access to electronic content | |||
230 | 9088410 | Accessing local applications when roaming using a NFC mobile device | |||
231 | 9088409 | Accessing local applications when roaming using a NFC mobile device | |||
232 | 9084112 | Secure group key agreement for wireless networks | |||
233 | 9069940 | Secure host authentication using symmetric key cryptography | |||
234 | 9065639 | Device for generating encryption key, method thereof and computer readable medium | |||
235 | 9064135 | Hardware implemented key management system and method | |||
236 | 9064127 | Systems and methods for securing data in the cloud | |||
237 | 9059840 | Recipient blind cryptographic access control for publicly hosted message and data streams | |||
238 | 9058507 | Signal processor with an encrypting or decrypting device in a memory system | |||
239 | 9054865 | Cryptographic system and methodology for securing software cryptography | |||
240 | 9053340 | Enterprise application store for an orchestration framework for connected devices | |||
241 | 9053130 | Binary data store | |||
242 | 9042552 | Managing encryption keys in a computer system | |||
243 | 9015479 | Host device and method for super-distribution of content protected with a localized content encryption key | |||
244 | 9008317 | Key encryption and decryption | |||
245 | 8984298 | Managing access to a secure content-part of a PPCD using a key reset point | |||
246 | 8984294 | System of authenticating an individual memory device via reading data including prohibited data and readable data | |||
247 | 8966287 | Systems and methods for secure third-party data storage | |||
248 | 8943316 | Document security system that permits external users to gain access to secured files | |||
249 | 8928454 | Computer room security | |||
2014 | |||||
250 | 8924709 | Print release with end to end encryption and print tracking | |||
251 | 8918651 | Cryptographic erasure of selected encrypted data | |||
252 | 8904171 | Secure search and retrieval | |||
253 | 8848922 | Distributed encryption key management | |||
254 | 8848906 | Encrypting data for storage in a dispersed storage network | |||
255 | 8842836 | System for and method of cryptographic provisioning | |||
256 | 8837718 | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store | |||
257 | 8832445 | System and method for handling secure messages | |||
258 | 8804962 | Method and system for establishing enhanced air interface key | |||
259 | 8782392 | Privacy-protective data transfer and storage | |||
260 | 8745416 | Systems and methods for secure third-party data storage | |||
261 | 8731191 | Data encryption method and system and data decryption method | |||
262 | 8718280 | Securing keys of a cipher using properties of the cipher process | |||
263 | 8712057 | Apparatus and method for an iterative cryptographic block | |||
264 | 8687814 | Securing encrypted virtual hard disks | |||
265 | 8683189 | On-chip security method and apparatus | |||
266 | 8677152 | Method and apparatus for encrypting media programs for later purchase and viewing | |||
267 | 8659388 | Variable strength wireless communication system | |||
268 | 8645712 | Electronic circuit design copy protection | |||
269 | 8638943 | Communication device, communication method, communication system and service issuing method | |||
270 | 8638935 | System and method for key space division and sub-key derivation for mixed media digital rights management content | |||
2013 | |||||
271 | 8611542 | Peer to peer key synchronization | |||
272 | 8584228 | Packet authentication and encryption in virtual networks | |||
273 | 8583936 | Key generation using biometric data and secret extraction codes | |||
274 | 8582777 | Method and system for lightweight key distribution in a wireless network | |||
275 | 8550339 | Utilization of digit sequences for biometric authentication | |||
276 | 8516271 | Securing non-volatile memory regions | |||
277 | 8487740 | Vehicle function restriction system | |||
278 | 8487739 | Television theft deterrence | |||
279 | 8464069 | Secure data access methods and apparatus | |||
280 | 8464049 | Method and system of accessing copy-prevented encrypted data resources over a network | |||
281 | 8458494 | Systems and methods for secure third-party data storage | |||
282 | 8456275 | Electric wiring system of a motor vehicle with replaceable cryptographic key and/or certificate | |||
283 | 8453258 | Protecting an electronic document by embedding an executable script | |||
284 | 8451086 | Remote control signaling using audio watermarks | |||
285 | 8379853 | Descrambler | |||
286 | 8364964 | Registering client devices with a registration server | |||
287 | 8358197 | Mesh network door lock | |||
288 | 8342400 | Systems controlled by data bearing records for maintaining inventory data | |||
2012 | |||||
289 | 8321677 | Pre-binding and tight binding of an on-line identity to a digital signature | |||
290 | 8300824 | System and method for encrypting data using a cipher text in a communications environment | |||
291 | 8299891 | Antitheft system for vehicle | |||
292 | 8284938 | Techniques for data encryption and decryption | |||
293 | 8264320 | Aftermarket keyless starter | |||
294 | 8259948 | Virtual TPM key migration using hardware keys | |||
295 | 8259946 | Communication apparatus, reader/writer, communication system, and communication method | |||
296 | 8250380 | Implementing secure erase for solid state drives | |||
297 | 8233617 | Resilient cryptographic scheme | |||
298 | 8232861 | Remote controller capable of selectively controlling a plurality of electric appliances, remote control system and method thereof | |||
299 | 8230218 | Mobile station authentication in tetra networks | |||
300 | 8218771 | Information processing apparatus and computer readable medium | |||
301 | 8189772 | Method and apparatus for performing elliptic curve arithmetic | |||
302 | 8188837 | Method of finding a key to a mobile vehicle | |||
303 | 8180049 | Signature schemes using bilinear mappings | |||
304 | 8171564 | Systems and methods for one-to-many secure video encryption | |||
305 | 8169297 | Electronic assembly having means to prevent non-permitted disassembling of its components | |||
306 | 8144866 | Method and system for securing data utilizing redundant secure key storage | |||
307 | 8135135 | Secure data protection during disasters | |||
308 | 8127148 | Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith | |||
309 | 8125311 | Medical diagnostic imaging system, information processing method for medical diagnostic imaging system, ultrasonic imaging diagnostic apparatus, and operation device | |||
310 | 8116455 | System and method for securely initializing and booting a security appliance | |||
311 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
312 | 8107621 | Encrypted file system mechanisms | |||
313 | 8106745 | Remote control signaling using audio watermarks | |||
314 | 8106744 | Remote control signaling using audio watermarks | |||
315 | 8099771 | Method for issuing IC card storing encryption key information | |||
2011 | |||||
316 | 8085126 | Identification with RFID asset locator for entry authorization | |||
317 | 8078877 | Fast batch verification method and apparatus there-of | |||
318 | 8064606 | Method and apparatus for securely registering hardware and/or software components in a computer system | |||
319 | 8059816 | Secret sharing technique with low overhead information content | |||
320 | 8050401 | High speed configurable cryptographic architecture | |||
321 | 8037301 | Setting an encryption key | |||
322 | 8028157 | On-chip security method and apparatus | |||
323 | 8006280 | Security system for generating keys from access rules in a decentralized manner and methods therefor | |||
324 | 8005213 | Method, apparatus, and computer program for generating session keys for encryption of image data | |||
325 | 7986158 | Methods, apparatuses, and products for a secure circuit | |||
326 | 7982624 | System and method for accident prevention | |||
327 | 7975140 | Key negotiation and management for third party access to a secure communication session | |||
328 | 7969285 | Management of badge access to different zones | |||
329 | 7965844 | System and method for processing user data in an encryption pipeline | |||
330 | 7929694 | Variable length private key generator and method thereof | |||
331 | 7921283 | Method for real-time data authentication | |||
332 | 7920703 | Descrambler | |||
333 | 7917771 | Method for selective encryption within documents | |||
334 | 7898384 | System for checking the single crossing of a controlled passage | |||
335 | 7889050 | System and method for training a trainable transmitter | |||
336 | 7885639 | Method and apparatus for authenticating a wireless access point | |||
337 | 7885412 | Pre-generation of generic session keys for use in communicating within communications environments | |||
338 | 7882367 | Information recording and reproducing apparatus and method | |||
339 | 7880584 | Lockbox key with callback feature | |||
2010 | |||||
340 | 7840009 | Method and apparatus for storing and distributing encryption keys | |||
341 | 7836313 | Method and apparatus for constructing a storage system from which digital objects can be securely deleted from durable media | |||
342 | 7818572 | Security system and method | |||
343 | 7813508 | Communication system, wireless communication apparatus, and communication method | |||
344 | 7802109 | Trusted system for file distribution | |||
345 | 7802105 | Method and apparatus for generating cryptographic key using biometric data | |||
346 | 7801308 | Secure key encoding for content protection | |||
347 | 7797549 | Secure method and system for biometric verification | |||
348 | 7797539 | Resilient cryptographic scheme | |||
349 | 7793104 | Security authentication and key management within an infrastructure-based wireless multi-hop network | |||
350 | 7791451 | Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security | |||
351 | 7783899 | System and method for performing a conjunctive keyword search over encrypted data | |||
352 | 7778412 | Method and apparatus for performing elliptic curve arithmetic | |||
353 | 7773747 | Encryption apparatus, decryption apparatus, and method | |||
354 | 7770008 | Embedding data and information related to function with which data is associated into a payload | |||
355 | 7768378 | Field retrofittable refrigerator lock with audit trail | |||
356 | 7757082 | Efficient revocation of receivers | |||
357 | 7752463 | Automatically filling a drive table | |||
358 | 7747016 | Data transmitting/receiving method, data transmission apparatus, data reception apparatus, data transmission/reception system, AV contents transmitting method, AV contents receiving method, AV contents transmission apparatus, AV contents reception apparatus, and program recording medium | |||
359 | 7725721 | Method and system for transferring software and hardware feature licenses between devices | |||
360 | 7724126 | Movable barrier operator operating parameter transfer method and apparatus | |||
361 | 7702108 | Use of communication equipment and method for authenticating an item, unit and system for authenticating items, and authenticating device | |||
362 | 7697692 | Cryptographic communication system and method | |||
363 | 7697683 | Cryptography-processing method, cryptography-processing apparatus and computer program | |||
364 | 7694154 | Method and apparatus for securely executing a background process | |||
365 | 7688973 | Encryption apparatus, decryption apparatus, key generation apparatus, program, and method | |||
366 | 7681030 | Mobile communication terminal, information processing method, data processing program, and recording medium | |||
367 | 7647646 | Information input/output system, key management device, and user device | |||
2009 | |||||
368 | 7636032 | Active RFID tag with new use automatic updating | |||
369 | 7627125 | Key loading systems and methods | |||
370 | 7623655 | Computing modular polynomials modulo large primes | |||
371 | 7613303 | Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster | |||
372 | 7612651 | Communication system, communication method and program | |||
373 | 7590845 | Key cache management through multiple localities | |||
374 | 7584362 | Systems and methods for providing signatures | |||
375 | 7571488 | Rights management terminal, server apparatus and usage information collection system | |||
376 | 7565539 | Method and apparatus for secure communications | |||
377 | 7562224 | System and method for multi-session establishment for a single device | |||
378 | 7545931 | Protection of application secrets | |||
379 | 7545810 | Approaches for switching transport protocol connection keys | |||
380 | 7529926 | Public key certification providing apparatus | |||
381 | 7519183 | Communication system, wireless communication apparatus, and communication method | |||
382 | 7512813 | Method for system level protection of field programmable logic devices | |||
383 | 7512789 | Mailing list server and mail transmission method thereof | |||
384 | 7508942 | Multi-process descrambler | |||
385 | 7501946 | Electronic control system used in security system for cargo trailers | |||
386 | 7499547 | Security authentication and key management within an infrastructure based wireless multi-hop network | |||
387 | 7484107 | Method for selective encryption within documents | |||
2008 | |||||
388 | 7463739 | Method and system providing improved security for the transfer of root keys | |||
389 | 7463132 | Door lock and operation mechanism | |||
390 | 7461406 | Access control for digital content | |||
391 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
392 | 7460666 | Combinational circuit, encryption circuit, method for constructing the same and program | |||
393 | 7448086 | Recording apparatus and method, reproducing apparatus and method, and memory medium | |||
394 | 7441122 | Method for providing secure access to a digital resource | |||
395 | 7440574 | Content encryption using programmable hardware | |||
396 | 7440570 | Method and apparatus for remote digital key generation | |||
397 | 7437771 | Rendering protected digital content within a network of computing devices or the like | |||
398 | 7430761 | Command processing system by a management agent | |||
399 | 7428306 | Encryption apparatus and method for providing an encrypted file system | |||
400 | 7423515 | FPALM II fingerprint authentication lock mechanism II | |||
401 | 7418736 | Network security system | |||
402 | 7415110 | Method and apparatus for the generation of cryptographic keys | |||
403 | 7412063 | Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster | |||
404 | 7409550 | Method for binding networked devices | |||
405 | 7383442 | Nested strong loader apparatus and method | |||
406 | 7373523 | Preparing data for storage in a secure fashion | |||
407 | 7366912 | Method of identifying participants in secure web sessions | |||
408 | 7366906 | Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium | |||
409 | 7355506 | Systems and methods for deterring theft of electronic devices | |||
410 | 7353382 | Security framework and protocol for universal pervasive transactions | |||
411 | 7343621 | Method and apparatus for providing iSCSI target stealth operation | |||
412 | 7340603 | Efficient revocation of receivers | |||
413 | 7337322 | Hierarchical identity-based encryption and signature schemes | |||
414 | 7322047 | Data security system and method associated with data mining | |||
415 | 7319752 | Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith | |||
2007 | |||||
416 | 7308102 | System and method for securing access to memory modules | |||
417 | 7298847 | Secure key distribution protocol in AAA for mobile IP | |||
418 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
419 | 7287168 | Partial encryption and PID mapping | |||
420 | 7281068 | Wireless-boot diskless mobile computing | |||
421 | 7269854 | Transaction system for transporting media files from content provider sources to home entertainment devices | |||
422 | 7269260 | Communication system, wireless communication apparatus, and communication method | |||
423 | 7263611 | Key management for content protection | |||
424 | 7260716 | Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach | |||
425 | 7257843 | Command processing system by a management agent | |||
426 | 7239725 | Face image recognition apparatus | |||
427 | 7227444 | Method and apparatus for remote control | |||
428 | 7203838 | System and method for authenticating a web page | |||
429 | 7200235 | Error-checking and correcting decryption-key memory for programmable logic devices | |||
430 | 7194762 | Method of creating password list for remote authentication to services | |||
431 | 7191327 | Internet-enabled device provisioning, upgrade and recovery mechanism | |||
432 | 7188242 | Key management for content protection | |||
433 | 7178033 | Method and apparatus for securing digital assets | |||
434 | 7176782 | Electronic locking system, locking management device, method of managing a locking device, and program | |||
435 | 7174460 | Distributed digital signature generation method and digitally signed digital document generation method and apparatus | |||
436 | 7170998 | Door access control and key management system and the method thereof | |||
437 | 7167565 | Efficient techniques for sharing a secret | |||
2006 | |||||
438 | 7152158 | Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium | |||
439 | 7146644 | Data security system and method responsive to electronic attacks | |||
440 | 7140044 | Data security system and method for separation of user communities | |||
441 | 7139917 | Systems, methods and software for remote password authentication using multiple servers | |||
442 | 7136960 | Hardware hashing of an input of a content addressable memory (CAM) to emulate a wider CAM | |||
443 | 7127619 | Decoding and decryption of partially encrypted information | |||
444 | 7124303 | Elementary stream partial encryption | |||
445 | 7124302 | Systems and methods for secure transaction management and electronic rights protection | |||
446 | 7120604 | Method of controlling digital content distribution, a method of reproducing digital content, and an apparatus using the same | |||
447 | 7119709 | Electronic access security and keyless entry system | |||
448 | 7117372 | Programmable logic device with decryption and structure for preventing design relocation | |||
449 | 7113070 | Door lock and operation mechanism | |||
450 | 7103185 | Method and apparatus for distributing and updating private keys of multicast group managers using directory replication | |||
451 | 7103184 | System and method for sign mask encryption and decryption | |||
452 | 7096355 | Dynamic encoding algorithms and inline message decryption | |||
453 | 7089417 | Cryptographic information and flow control | |||
454 | 7088218 | Wireless appliance activation transceiver | |||
455 | 7079653 | Cryptographic key split binding process and apparatus | |||
456 | 7076657 | Use of short message service (SMS) for secure transactions | |||
457 | 7042332 | Electronic key system | |||
458 | 6993138 | Spatial key trees for key management in wireless environments | |||
2005 | |||||
459 | 6957340 | Encryption key for multi-key encryption in programmable logic device | |||
2004 | |||||
460 | 6690810 | Image coding without coding transparency regions | |||
461 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2002 | |||||
462 | 6483919 | Method and arrangement for establishing an encrypted mobile connection | |||
463 | 6408389 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
464 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
2000 | |||||
465 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
1994 | |||||
466 | 5321689 | Multipath transmission system | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |