СПИСОК патентов США - подгруппа МПК16 H04L9/14



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19608980Environment-aware security tokens
29608968Connection architecture for a mobile network
39608825Trusted platform module certification and attestation utilizing an anonymous key system
49608816Shared data encryption and confidentiality
59608808Mobile terminal, control method thereof, onboard unit, control method thereof, backend server, and control method thereof
69608806Extending data confidentiality into a player application
79608805Encryption key generation
89607159Intelligent key selection and generation
99602457Mobile device having power save feature for establishing communications
109602279Configuring devices for use on a network using a fast packet exchange with authentication
119602274Secure password generation
129602273Implementing key scheduling for white-box DES implementation
139600656System and method for domain password reset in a secured distributed network environment
149600640Multimedia network system with content importation, content exportation, and integrated content management
159596436Level-one encryption associated with individual privacy and public safety protection via double encrypted lock box
169596078Set of servers for "machine-to-machine" communications using public key infrastructure
179590971Environment-aware security tokens
189589268Integration of payment capability into secure elements of computers
199588908Memory circuit using resistive random access memory arrays in a secure element
209584310Protecting a white-box implementation against attacks
219578496Method and user equipment for negotiating security during handover between different radio access technologies
229577993System and method for authenticating users
239577827Information processing device, information processing method, and program
249577824Delivering a content item from a server to a device
259572023Method and system for providing services to mobile communication subscribers
269571472Establishing an initial root of trust for individual components of a distributed security infrastructure
279571289Methods and systems for glitch-resistant cryptographic signing
289571280Application integrity protection via secure interaction and processing
299571271Sending messages by oblivious transfer
309569774System and method for processing feedback entries received from software
319565022RFID tags with dynamic key replacement
329565020System and method for generating a server-assisted strong password from a weak secret
339563753Method for booting and dumping a confidential image on a trusted computer system
349560474Device for transfering data between an unconscious capture device and another device
359559846Method of processing a data packet before transmission over a radio communications network, a method of processing a received data packet, and associated devices and systems
369559845Systems, methods and apparatuses for the secure transmission of media content
379559837Methods for cryptographic delegation and enforcement of dynamic access to stored data
3895583733D graphics system using encrypted texture tiles
399558362Data encryption using an external arguments encryption algorithm
409554270Enhanced security for direct link communications
419548866Deletion of content in digital storage systems
429548863Method for unambiguous marking of an object
439548861Encrypted statistical processing system, device, method, and program
449547860System for processing feedback entries received from software
459544151Controlling access to clinical data analyzed by remote computing resources
469544142Data authentication using plural electronic keys
479536047Privacy-enhancing technologies for medical tests using genomic data
489535852System and method for secured host-slave communication

2016

499532213Lawful interception for device-to-device (D2D) communication
509531687Techniques for secure message offloading
519531537System and method for performing secure communications
529526007Location brokering for providing security, privacy and services
539526001Device-to-device discovery with direct radio signals
549525668Face based secure messaging
559525538Apparatus, system and method of communicating non-cellular access network information over a cellular network
569524594Mobile access control system and method
579521370Level-two decryption associated with individual privacy and public safety protection via double encrypted lock box
589520995Efficient prime-number check
599516500ID-based control unit-key fob pairing
609515828Sharing a secret via linear interpolation
619510216Node device and communication control method
629509501Storage encryption
639509498System and method for transmitting data
649509493Information processing technique for secure pattern matching
659503892Mapping special subframes in a wireless communication network
669503256SMS4 acceleration hardware
679503255Cryptographic sequencing system and method
689497174Systems, methods, and computer-readable media for secure digital communications and networks
699495588Biometric template security and key generation
709495240Encrypting data for storage in a dispersed storage network
719491040Determination and display of LUN encryption paths
729489519Method and apparatus for encrypting data messages after detecting infected VM
739485101Provisioning digital certificates in a network environment
749485096Encryption / decryption of data with non-persistent, non-shared passkey
759485090Managed authentication on a distributed network
769483655File backup with selective encryption
779479932ID-based control unit-key fob pairing
789479334Method, system, and terminal for communication between cluster system encryption terminal and encryption module
799479329Motor vehicle control unit having a cryptographic device
809473302Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device
819473298Simplifying IKE process in a gateway to enable datapath scaling using a two tier cache configuration
829471796Intelligent key selection and generation
839467281Information processing apparatus and program product
849465952Systems and methods for secure multi-tenant data storage
859461823System and method for limiting exploitable or potentially exploitable sub-components in software components
869461822Image forming apparatus, control method, and storage medium
879455834Securely providing secret data from a sender to a receiver
889454673Searchable encryption for cloud storage
899450752Method and apparatus for providing service provider-controlled communication security
909449183Secure file drawer and safe
919449178System, method and computer product for fast and secure data searching
929443107Method for protecting the integrity of a group of memory elements using an aggregate authentication code
939442865Processor extensions for execution of secure embedded containers
949438569Secured embedded data encryption systems
959438550Mobile device power management in data synchronization over a mobile network with or without a trigger notification
969438423Encryption device, encryption method, and information processing device
979438418Systems and methods for generating a key difficult to clone
989438416Customizable encryption algorithm based on a sponge construction with authenticated and non-authenticated modes of operation
999438413Generating and merging keys for grouping and differentiating volumes of files
1009436815Block management unification system and method
1019432182Techniques for sharing data
1029426131Server apparatus and program to re-encrypt ciphertext data
1039425964Display device with mobile high-definition link port and signal processing method thereof
1049425961Method for performing an encryption of an AES type, and corresponding system and computer program product
1059425959Security variable scrambling
1069425957System and method for remote reset of password and encryption key
1079418246Decryption systems and related methods for on-the-fly decryption within integrated circuits
1089413529Distributed storage network and method for storing and retrieving encryption keys
1099412209Prevention device for operating vehicle running record
1109407440Multiple authority data security and access
1119407437Secure initialization vector generation
1129407432System and method for efficient and secure distribution of digital content
1139407431Systems and methods for distributing and securing data
1149402270Secure device bootstrap identity
1159402108Receiver software protection
1169401919Web form protection
1179401804Leakage resilient garbled circuit generation using reduced memory hardware token
1189398321Multimedia network system with content importation, content exportation, and integrated content management
1199397833Receipt, data reduction, and storage of encrypted data
1209397832Shared data encryption and confidentiality
1219397826Encryption device and method for defending a physical attack
1229397793Method for securely transmitting packets for wireless telecommunications system
1239392443Shared secret for wireless devices
1249392077Coordinating a computing activity across applications and devices having multiple operation modes in an orchestration framework for connected devices
1259391963Differential client-side encryption of information originating from a client
1269391770Method of cryption
1279386120Single sign-on access in an orchestration framework for connected devices
1289385997Protection of control words employed by conditional access systems
1299385866System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised
1309385865Correcting deciphering mis-synchronization in a mobile communication terminal
1319374222Secure communication of data between devices
1329373113Payment terminal sharing
1339369490Method for the secure exchange of data over an ad-hoc network implementing an Xcast broadcasting service and associated node
1349369441End-to-end secure communication system
1359369281Method and system for secure use of services by untrusted storage providers
1369367702Automatic file encryption
1379363668Sensor network, sensor management server, key updating method and key updating program
1389363247Method of securing files under the semi-trusted user threat model using symmetric keys and per-block key encryption
1399363080System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
1409363075Polymorphic encryption key matrices
1419357463Techniques and systems for extended discontinuous reception
1429357389Security identity discovery and communication method
1439356783Method for ciphering and deciphering, corresponding electronic device and computer program product
1449356782Block encryption
1459351157Methods, systems, and devices to reduce audio truncation during transcoding
1469350544Apparatus for encrypting data
1479349023Database encryption system, method, and program
1489344393Secure end-to-end transport through intermediary nodes
1499338004Method and system for smart card chip personalization
1509336363Method and system for secure deployment of information technology (IT) solutions in untrusted environments
1519331851Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
1529326142Cryptographic key generation
1539325673Communication system and communication method
1549325642Randomness for encryption operations
1559325506Cryptographically enforcing strict separation of environments
1569323603Storage of sensitive data in a dispersed storage network
1579313170Identity protection and management for electronic communication
1589313026Key negotiation method and apparatus according to SM2 key exchange protocol
1599313023Format-preserving cipher
1609313022Homomorphic cryptography modeling in support of privacy policies
1619311487Tampering monitoring system, management device, protection control module, and detection module
1629311256Storage device
1639306753Mobile system and method for improving safety of impromptu meetings
1649306746Randomizing current injection circuit to obscure gate noise for added security
1659305172Multi-ring encryption approach to securing a payload using hardware modules
1669301147Method, apparatus, and system for data protection on interface in communications system
1679301134Security key generation for dual connectivity
1689294276Countering server-based attacks on encrypted content
1699286602Secure financial transactions
1709282074Multi-version message condition based delivery
1719276913Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program
1729276754Key rotation with external workflows
1739276743Probabilistic key distribution in vehicular networks with infrastructure support
1749270460Instructions to perform JH cryptographic hashing in a 256 bit data path
1759270452Encryption using real-world objects
1769270446Privacy-enhancing technologies for medical tests using genomic data
1779268911Field optimized assay devices, methods, and systems
1789258281Secured method for controlling the opening of lock devices from messages implementing a symmetrical encryption
1799258122Systems and methods for securing data at third-party storage services
1809247429Key derivation
1819246683Re-encryption key generator, re-encryption apparatus, and program
1829246675Cryptographic systems using pairing with errors
1839240885Cryptographic processing apparatus, cryptographic processing method, and computer program therefor
1849240883Multi-key cryptography for encrypting file system acceleration
1859240880Distributed data storage device
1869232268Unified video delivery system for supporting IP video streaming service

2015

1879226211Centralized partitioning of user devices in a heterogeneous wireless network
1889225514Method for image encryption and decryption incorporating physiological features and image capture device thereof
1899219730Securing a secret of a user
1909219715Mediator utilizing electronic content to enforce policies to a resource
1919219606Method and device for digital data blocks encryption and decryption
1929215066Method and system for making information in a data set of a copy-on-write file system inaccessible
1939210571Secure wireless communication
1949209974Functional encryption key management
1959209972Mediator device monitoring and controlling access to electronic content
1969209971Method and system for shielding data in untrusted environments
1979208357FPGA configuration bitstream protection using multiple keys
1989203980Unit using operating system and image forming apparatus using the same
1999203614Method, apparatus, and system for protecting cloud data security
2009197410Key management system
2019195848Computational systems and methods for anonymized storage of double-encrypted data
2029191812Apparatus and method for transitioning from a serving network node that supports an enhanced security context to a legacy serving network node
2039191374Routing device data caching
2049191206Multiple transform utilization and application for secure digital watermarking
2059191205Multiple transform utilization and application for secure digital watermarking
2069189900Methods and systems for assigning e-keys to users to access and drive vehicles
2079189645Sharing content across applications and devices having multiple operation modes in an orchestration framework for connected devices
2089185080Data transmitting devices, data receiving devices, methods for controlling a data transmitting device, and methods for controlling a data receiving device
2099184913Authenticating a telecommunication terminal in a telecommunication network
2109183357Recording/reproducing system, recording medium device, and recording/reproducing device
2119172537Array encryption core
2129171324Hybrid virtual account and token-based digital cash protocols
2139166788Method and device for obtaining a security key
2149166787Securing encrypted virtual hard disks
2159166713System for providing access to operation information
2169160527Systems, methods, and computer-readable media for secure digital communications and networks
2179148419User administering a trustworthy workspace
2189147195Data custodian and curation system
2199141769Secure transfer and use of secret material in a shared environment
2209137015Protection scheme for AACS keys
2219125050Secure near field communication server information handling system lock
2229124564Context awareness during first negotiation of secure key exchange
2239124417Computation of garbled tables in garbled circuit
2249118467Generating keys using secure hardware
2259111122Asymmetric cryptographic device with local private key generation and method therefor
2269106413Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications
2279104610Method, system and medium for analog encryption in a flash memory
2289094379Transparent client-side cryptography for network applications
2299092780User-mediator monitoring and controlling access to electronic content
2309088410Accessing local applications when roaming using a NFC mobile device
2319088409Accessing local applications when roaming using a NFC mobile device
2329084112Secure group key agreement for wireless networks
2339069940Secure host authentication using symmetric key cryptography
2349065639Device for generating encryption key, method thereof and computer readable medium
2359064135Hardware implemented key management system and method
2369064127Systems and methods for securing data in the cloud
2379059840Recipient blind cryptographic access control for publicly hosted message and data streams
2389058507Signal processor with an encrypting or decrypting device in a memory system
2399054865Cryptographic system and methodology for securing software cryptography
2409053340Enterprise application store for an orchestration framework for connected devices
2419053130Binary data store
2429042552Managing encryption keys in a computer system
2439015479Host device and method for super-distribution of content protected with a localized content encryption key
2449008317Key encryption and decryption
2458984298Managing access to a secure content-part of a PPCD using a key reset point
2468984294System of authenticating an individual memory device via reading data including prohibited data and readable data
2478966287Systems and methods for secure third-party data storage
2488943316Document security system that permits external users to gain access to secured files
2498928454Computer room security

2014

2508924709Print release with end to end encryption and print tracking
2518918651Cryptographic erasure of selected encrypted data
2528904171Secure search and retrieval
2538848922Distributed encryption key management
2548848906Encrypting data for storage in a dispersed storage network
2558842836System for and method of cryptographic provisioning
2568837718User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
2578832445System and method for handling secure messages
2588804962Method and system for establishing enhanced air interface key
2598782392Privacy-protective data transfer and storage
2608745416Systems and methods for secure third-party data storage
2618731191Data encryption method and system and data decryption method
2628718280Securing keys of a cipher using properties of the cipher process
2638712057Apparatus and method for an iterative cryptographic block
2648687814Securing encrypted virtual hard disks
2658683189On-chip security method and apparatus
2668677152Method and apparatus for encrypting media programs for later purchase and viewing
2678659388Variable strength wireless communication system
2688645712Electronic circuit design copy protection
2698638943Communication device, communication method, communication system and service issuing method
2708638935System and method for key space division and sub-key derivation for mixed media digital rights management content

2013

2718611542Peer to peer key synchronization
2728584228Packet authentication and encryption in virtual networks
2738583936Key generation using biometric data and secret extraction codes
2748582777Method and system for lightweight key distribution in a wireless network
2758550339Utilization of digit sequences for biometric authentication
2768516271Securing non-volatile memory regions
2778487740Vehicle function restriction system
2788487739Television theft deterrence
2798464069Secure data access methods and apparatus
2808464049Method and system of accessing copy-prevented encrypted data resources over a network
2818458494Systems and methods for secure third-party data storage
2828456275Electric wiring system of a motor vehicle with replaceable cryptographic key and/or certificate
2838453258Protecting an electronic document by embedding an executable script
2848451086Remote control signaling using audio watermarks
2858379853Descrambler
2868364964Registering client devices with a registration server
2878358197Mesh network door lock
2888342400Systems controlled by data bearing records for maintaining inventory data

2012

2898321677Pre-binding and tight binding of an on-line identity to a digital signature
2908300824System and method for encrypting data using a cipher text in a communications environment
2918299891Antitheft system for vehicle
2928284938Techniques for data encryption and decryption
2938264320Aftermarket keyless starter
2948259948Virtual TPM key migration using hardware keys
2958259946Communication apparatus, reader/writer, communication system, and communication method
2968250380Implementing secure erase for solid state drives
2978233617Resilient cryptographic scheme
2988232861Remote controller capable of selectively controlling a plurality of electric appliances, remote control system and method thereof
2998230218Mobile station authentication in tetra networks
3008218771Information processing apparatus and computer readable medium
3018189772Method and apparatus for performing elliptic curve arithmetic
3028188837Method of finding a key to a mobile vehicle
3038180049Signature schemes using bilinear mappings
3048171564Systems and methods for one-to-many secure video encryption
3058169297Electronic assembly having means to prevent non-permitted disassembling of its components
3068144866Method and system for securing data utilizing redundant secure key storage
3078135135Secure data protection during disasters
3088127148Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith
3098125311Medical diagnostic imaging system, information processing method for medical diagnostic imaging system, ultrasonic imaging diagnostic apparatus, and operation device
3108116455System and method for securely initializing and booting a security appliance
3118116454Method and apparatus for providing security in a radio frequency identification system
3128107621Encrypted file system mechanisms
3138106745Remote control signaling using audio watermarks
3148106744Remote control signaling using audio watermarks
3158099771Method for issuing IC card storing encryption key information

2011

3168085126Identification with RFID asset locator for entry authorization
3178078877Fast batch verification method and apparatus there-of
3188064606Method and apparatus for securely registering hardware and/or software components in a computer system
3198059816Secret sharing technique with low overhead information content
3208050401High speed configurable cryptographic architecture
3218037301Setting an encryption key
3228028157On-chip security method and apparatus
3238006280Security system for generating keys from access rules in a decentralized manner and methods therefor
3248005213Method, apparatus, and computer program for generating session keys for encryption of image data
3257986158Methods, apparatuses, and products for a secure circuit
3267982624System and method for accident prevention
3277975140Key negotiation and management for third party access to a secure communication session
3287969285Management of badge access to different zones
3297965844System and method for processing user data in an encryption pipeline
3307929694Variable length private key generator and method thereof
3317921283Method for real-time data authentication
3327920703Descrambler
3337917771Method for selective encryption within documents
3347898384System for checking the single crossing of a controlled passage
3357889050System and method for training a trainable transmitter
3367885639Method and apparatus for authenticating a wireless access point
3377885412Pre-generation of generic session keys for use in communicating within communications environments
3387882367Information recording and reproducing apparatus and method
3397880584Lockbox key with callback feature

2010

3407840009Method and apparatus for storing and distributing encryption keys
3417836313Method and apparatus for constructing a storage system from which digital objects can be securely deleted from durable media
3427818572Security system and method
3437813508Communication system, wireless communication apparatus, and communication method
3447802109Trusted system for file distribution
3457802105Method and apparatus for generating cryptographic key using biometric data
3467801308Secure key encoding for content protection
3477797549Secure method and system for biometric verification
3487797539Resilient cryptographic scheme
3497793104Security authentication and key management within an infrastructure-based wireless multi-hop network
3507791451Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security
3517783899System and method for performing a conjunctive keyword search over encrypted data
3527778412Method and apparatus for performing elliptic curve arithmetic
3537773747Encryption apparatus, decryption apparatus, and method
3547770008Embedding data and information related to function with which data is associated into a payload
3557768378Field retrofittable refrigerator lock with audit trail
3567757082Efficient revocation of receivers
3577752463Automatically filling a drive table
3587747016Data transmitting/receiving method, data transmission apparatus, data reception apparatus, data transmission/reception system, AV contents transmitting method, AV contents receiving method, AV contents transmission apparatus, AV contents reception apparatus, and program recording medium
3597725721Method and system for transferring software and hardware feature licenses between devices
3607724126Movable barrier operator operating parameter transfer method and apparatus
3617702108Use of communication equipment and method for authenticating an item, unit and system for authenticating items, and authenticating device
3627697692Cryptographic communication system and method
3637697683Cryptography-processing method, cryptography-processing apparatus and computer program
3647694154Method and apparatus for securely executing a background process
3657688973Encryption apparatus, decryption apparatus, key generation apparatus, program, and method
3667681030Mobile communication terminal, information processing method, data processing program, and recording medium
3677647646Information input/output system, key management device, and user device

2009

3687636032Active RFID tag with new use automatic updating
3697627125Key loading systems and methods
3707623655Computing modular polynomials modulo large primes
3717613303Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster
3727612651Communication system, communication method and program
3737590845Key cache management through multiple localities
3747584362Systems and methods for providing signatures
3757571488Rights management terminal, server apparatus and usage information collection system
3767565539Method and apparatus for secure communications
3777562224System and method for multi-session establishment for a single device
3787545931Protection of application secrets
3797545810Approaches for switching transport protocol connection keys
3807529926Public key certification providing apparatus
3817519183Communication system, wireless communication apparatus, and communication method
3827512813Method for system level protection of field programmable logic devices
3837512789Mailing list server and mail transmission method thereof
3847508942Multi-process descrambler
3857501946Electronic control system used in security system for cargo trailers
3867499547Security authentication and key management within an infrastructure based wireless multi-hop network
3877484107Method for selective encryption within documents

2008

3887463739Method and system providing improved security for the transfer of root keys
3897463132Door lock and operation mechanism
3907461406Access control for digital content
3917461261Method to generate, verify and deny an undeniable signature
3927460666Combinational circuit, encryption circuit, method for constructing the same and program
3937448086Recording apparatus and method, reproducing apparatus and method, and memory medium
3947441122Method for providing secure access to a digital resource
3957440574Content encryption using programmable hardware
3967440570Method and apparatus for remote digital key generation
3977437771Rendering protected digital content within a network of computing devices or the like
3987430761Command processing system by a management agent
3997428306Encryption apparatus and method for providing an encrypted file system
4007423515FPALM II fingerprint authentication lock mechanism II
4017418736Network security system
4027415110Method and apparatus for the generation of cryptographic keys
4037412063Controlling delivery of broadcast encryption content for a network cluster from a content server outside the cluster
4047409550Method for binding networked devices
4057383442Nested strong loader apparatus and method
4067373523Preparing data for storage in a secure fashion
4077366912Method of identifying participants in secure web sessions
4087366906Digital certificate management system, digital certificate management apparatus, digital certificate management method, program and computer readable information recording medium
4097355506Systems and methods for deterring theft of electronic devices
4107353382Security framework and protocol for universal pervasive transactions
4117343621Method and apparatus for providing iSCSI target stealth operation
4127340603Efficient revocation of receivers
4137337322Hierarchical identity-based encryption and signature schemes
4147322047Data security system and method associated with data mining
4157319752Information recording device, information playback device, information recording method, information playback method, and information recording medium and program providing medium used therewith

2007

4167308102System and method for securing access to memory modules
4177298847Secure key distribution protocol in AAA for mobile IP
4187295671Advanced encryption standard (AES) hardware cryptographic engine
4197287168Partial encryption and PID mapping
4207281068Wireless-boot diskless mobile computing
4217269854Transaction system for transporting media files from content provider sources to home entertainment devices
4227269260Communication system, wireless communication apparatus, and communication method
4237263611Key management for content protection
4247260716Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach
4257257843Command processing system by a management agent
4267239725Face image recognition apparatus
4277227444Method and apparatus for remote control
4287203838System and method for authenticating a web page
4297200235Error-checking and correcting decryption-key memory for programmable logic devices
4307194762Method of creating password list for remote authentication to services
4317191327Internet-enabled device provisioning, upgrade and recovery mechanism
4327188242Key management for content protection
4337178033Method and apparatus for securing digital assets
4347176782Electronic locking system, locking management device, method of managing a locking device, and program
4357174460Distributed digital signature generation method and digitally signed digital document generation method and apparatus
4367170998Door access control and key management system and the method thereof
4377167565Efficient techniques for sharing a secret

2006

4387152158Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium
4397146644Data security system and method responsive to electronic attacks
4407140044Data security system and method for separation of user communities
4417139917Systems, methods and software for remote password authentication using multiple servers
4427136960Hardware hashing of an input of a content addressable memory (CAM) to emulate a wider CAM
4437127619Decoding and decryption of partially encrypted information
4447124303Elementary stream partial encryption
4457124302Systems and methods for secure transaction management and electronic rights protection
4467120604Method of controlling digital content distribution, a method of reproducing digital content, and an apparatus using the same
4477119709Electronic access security and keyless entry system
4487117372Programmable logic device with decryption and structure for preventing design relocation
4497113070Door lock and operation mechanism
4507103185Method and apparatus for distributing and updating private keys of multicast group managers using directory replication
4517103184System and method for sign mask encryption and decryption
4527096355Dynamic encoding algorithms and inline message decryption
4537089417Cryptographic information and flow control
4547088218Wireless appliance activation transceiver
4557079653Cryptographic key split binding process and apparatus
4567076657Use of short message service (SMS) for secure transactions
4577042332Electronic key system
4586993138Spatial key trees for key management in wireless environments

2005

4596957340Encryption key for multi-key encryption in programmable logic device

2004

4606690810Image coding without coding transparency regions
4616678821Method and system for restricting access to the private key of a user in a public key infrastructure

2002

4626483919Method and arrangement for establishing an encrypted mobile connection
4636408389System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
4646339828System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

2000

4656081893System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record

1994

4665321689Multipath transmission system
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017