СПИСОК патентов США - подгруппа МПК16 H04L9/30



Выделить слова в названиях патентов:


№ п/п Номер патента Название патента

2017

19608980Environment-aware security tokens
29608819Learning parity with noise-based relational encryption for proximity relations
39608818Cryptographic communication system and cryptographic communication method
49608817Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
59607256Augmenting and updating data using encrypted machine-readable identifiers
69607158Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium
79602485Network, network node with privacy preserving source attribution and admission control and device implemented method therfor
89602478Trust relationships in a computerized system
99602285Authentication device, authentication method, and program
109602282Secure software and hardware association technique
119602281Parallelizable cipher construction
129596598Reducing detectability of an encryption key
139596090Method for controlling data acquisition for a plurality of field devices
149596083Information processing technique for pattern matching
159596082Secure debug trace messages for production authenticated code modules
169596078Set of servers for "machine-to-machine" communications using public key infrastructure
179591483Authentication mechanisms for wireless networks
189590971Environment-aware security tokens
199590807Identity based public key cryptosystem
209589144System and method for cryptographic suite management
219589138Computing device boot software authentication
229588908Memory circuit using resistive random access memory arrays in a secure element
239584321Secure storage for shared documents
249582671Security and data privacy for lighting sensory networks
259578035System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content
269577828Batch verification method and apparatus thereof
279577827Information processing device, information processing method, and program
289577822Secure bitstream authentication
299576144Secured file system management
309571281CRT-RSA encryption method and apparatus
319571271Sending messages by oblivious transfer
329571268Method and system for homomorphicly randomizing an input
339571267Data processor and decryption method
349569773Invariant biohash security system and method
359565017Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks
369563762Method for generating an identifier
379559850Component management via secure communications
389559847Content access for duration of calendar events
399553723Multi-dimensional encryption
409552175System and method for providing a command buffer in a memory system
419548970Managing unlinkable identifiers for controlled privacy-friendly data exchange
429548864Device and method for encoding bits to symbols for a communication system
439548863Method for unambiguous marking of an object
449548861Encrypted statistical processing system, device, method, and program
459547778Secure public key acceleration
469544145Device, method, and medium for facility management verification
479544144Data encryption
489544133On-the-fly key generation for encryption and decryption
499542158T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring
509537660Method of establishing public key cryptographic protocols against quantum computational attack
519537656Systems and methods for managing cryptographic keys in a secure microcontroller

2016

529531540Secure token-based signature schemes using look-up tables
539531537System and method for performing secure communications
549530005Techniques for secure data management in a distributed environment
559520992Logical-to-physical address translation for a removable data storage device
569516013Communication apparatus, method of controlling the same and storage medium for transmitting image file to a network address
579516007Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier
589515997Inline data encryption
599515994Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario
609514454Wireless transaction medium having combined magnetic stripe and radio frequency communications
619509690Methods and systems for managing network activity using biometrics
629509670System and method for managing secure communications in an Ad-Hoc network
639509663Secure distribution of session credentials from client-side to server-side traffic management devices
649509511Identity based encryption
659509492Authentication device, output device, verification device and input device
669503448Authenticated session establishment
679503267Generating digital signatures
689503264Attribute based encryption using lattices
699503263Method and apparatus for storing encrypted data files across distributed storage media
709503262Transparent denial of service protection
719503261Public key encryption with digital signature scheme
729503259System and method for generating and protecting cryptographic keys
739503258System and method for communication using orbital angular momentum with multiple layer overlay modulation
749495545Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption
759490979System and method for providing credentials
769490978Information processing apparatus and information processing method
779490974Identity-based decryption
789490970Methods and system for secure communication between an RFID tag and a reader
799485230Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
809485101Provisioning digital certificates in a network environment
819485092Electronic authentication systems
829479340Controlling use of encryption keys
839473794Digital broadcasting receiver and method for controlling the same
849473603Memory system for portable telephone
859473492Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords
869473471Method, apparatus and system for performing proxy transformation
879473302Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device
889473297Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters
899471948System and method for administering licenses stored by a product unit, and administration of said unit in the field
909471774Secure access to a virtual machine
919467299Device for and method of controlled multilevel chain of trust/revision
929467298Device for and method of multilevel chain of trust/revision
939467283Securing method for lawful interception
949467281Information processing apparatus and program product
959461974System and method to merge encrypted signals in distributed communication system
969460315Order-preserving encryption system, device, method, and program
979455832Signatures with confidential message recovery
989455828Re-encryption system, re-encryption method and re-encryption program
999451453Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch
1009450933Systems and methods for device and data authentication
1019450755Transponder, reader and methods for operating the same
1029450754Data privacy
1039449198Prime field elliptic cryptography processor
1049445263Method for ensuring security and privacy in a wireless cognitive network
1059444623Modular exponentiation optimization for cryptographic systems
1069438600Apparatus and methods for distributing and storing electronic access clients
1079438427Method and system for providing a plurality of tamperproof digital certificates for a plurality of public keys of a device
1089432192Content aware hierarchical encryption for secure storage systems
1099432191Public key encryption system based on the quadratic residuosity assumption
1109425966Security mechanism evaluation service
1119425961Method for performing an encryption of an AES type, and corresponding system and computer program product
1129425960Searchable encryption for outsourcing data analytics
1139425955Power line communication (PLC) network nodes using cipher then segment security
1149425952Algebraic manipulation detection codes from algebraic curves
1159420458Method for the use of a mobile appliance using a motor vehicle
1169420454Method for ensuring security and privacy in a wireless cognitive network
1179419994Method for identifying potentially malicious network elements within a network using cross-domain collaborative data sharing
1189419798Public encryption method based on user ID
1199419789Method and apparatus for scalar multiplication secure against differential power attacks
1209418242Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database
1219418211Electronic device and method of transmitting content item
1229413531Cryptographic system, cryptographic method, cryptographic program, and decryption device
1239413528Method for attribute based broadcast encryption with permanent revocation
1249407618Systems and methods for device and data authentication
1259407439Authentication system and authentication code convertor
1269407438Cryptographic system, cryptographic method, and cryptographic program
1279407437Secure initialization vector generation
1289405729Cryptographic method comprising a modular exponentiation operation
1299402091Digital broadcasting receiver and method for controlling the same
1309401811Attribute-based digital signatures
1319401810Method and apparatus for applying recipient criteria in identity-based encryption
1329401809Composite system, method, and storage medium
1339401805Encrypting device, encrypting method, and recording medium
1349400636Apparatus and method for calculating a result in a scalar multiplication
1359397985System and method for providing a cryptographic platform for exchanging information
1369397793Method for securely transmitting packets for wireless telecommunications system
1379392525Establishing reliable routes without expensive mesh peering
1389392449Communication system, communication unit, and communication method
1399391965Data search device, data search method, data search program, data registration device, data registration method, data registration program, and information processing device
1409391777System and method for performing key resolution over a content centric network
1419391773Elliptic curve point multiplication procedure resistant to side-channel information leakage
1429385867Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program
1439383966Number squaring computer-implemented method and apparatus
1449379891Method and system for ID-based encryption and decryption
1459378380System and method for securely storing and sharing information
1469378220Bonding contents on separate storage media
1479374227Verification of signed digital documents
1489374226Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer
1499374220System and method for providing compressed encryption and decryption in homomorphic encryption based on integers
1509369151Apparatus and method for resource allocation
1519363087End-to-end security for hardware running verified software
1529363086Aggregate signing of data in content centric networking
1539363082Cryptographic communication system and cryptographic communication method
1549363080System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment
1559363073Cryptographic countermeasure method by deriving a secret data
1569356787Secure communication architecture including sniffer
1579356786Method for encrypting a plurality of data in a secure set
1589356783Method for ciphering and deciphering, corresponding electronic device and computer program product
1599356779Systems and methods for identity-based encryption and related cryptographic techniques
1609350550Power management and security for wireless modules in "machine-to-machine" communications
1619350543Method and system for homomorphicly randomizing an input
1629350539Secure distribution of content
1639344276Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program
1649342712Method and system for accelerating cryptographic processing
1659338142Method for verifying the security of a device that generates private and public cryptographic keys
1669338000Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm
1679332012Apparatus and methods for storing electronic access clients
1689331851Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes
1699326136Method and apparatus for managing group key for mobile device
1709325499Message encryption and decryption utilizing low-entropy keys
1719323560Interpreting I/O operation requests from pageable guests without host intervention
1729319946System for efficient recovery of Node-B buffered data following MAC layer reset
1739319395System and method for securing authentication information in a networked environment
1749319223Key derivation for a module using an embedded universal integrated circuit card
1759313181System and method to merge encrypted signals in distributed communication system
1769313027Protection of a calculation performed by an integrated circuit
1779313026Key negotiation method and apparatus according to SM2 key exchange protocol
1789306753Mobile system and method for improving safety of impromptu meetings
1799300681Method for prefix reachability in a communication system
1809300654Method of handling a certification request
1819300473Module for "machine-to-machine" communications using public key infrastructure
1829300469Secure computing system, secure computing method, secure computing apparatus, and program therefor
1839300466Transmitting device, receiving device, transmitting method, receiving method, and program
1849298904Method for accessing a plurality of services by a mobile terminal user, and related secure device
1859294278Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same
1869294273Method and system for conditional access to a digital content, associated terminal and subscriber device
1879288059Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys
1889288044Method for providing cryptographic key pairs
1899286243Logical-to-physical address translation for a removable data storage device
1909281944Attribute based encryption using lattices
1919280518Public key cryptography computing device
1929277406Methods and system for secure communication between an RFID tag and a reader
1939276746Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization
1949276743Probabilistic key distribution in vehicular networks with infrastructure support
1959276740Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI)
1969276735Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program
1979276734Confidential computation system, confidential computation method, and confidential computation program
1989270829Message routing
1999270447Demand based encryption and key generation and distribution systems and methods
2009268968Credential validation
2019264406Public key cryptography with reduced computational load
2029264222Precomputing internal AES states in counter mode to protect keys used in AES computations
2039264221Systems and methods for faster public key encryption using the associated private key portion
2049256763Method and system for providing a public key/secret key pair for encrypting and decrypting data
2059252960System for establishing a cryptographic key depending on a physical system
2069252954Efficient homomorphic encryption scheme for bilinear forms
2079252944Key wrapping for common cryptographic architecture (CCA) key token
2089252941Enhanced digital signatures algorithm method and system utilitzing a secret generator
2099246900Using a single certificate request to generate credentials with multiple ECQV certificates
2109246888Systems and methods for secure communication over an unsecured communication channel
2119246689Component management via secure communications
2129246683Re-encryption key generator, re-encryption apparatus, and program
2139246675Cryptographic systems using pairing with errors
2149241175Digital broadcasting receiver and method for controlling the same
2159240884Method and apparatus for verifiable generation of public keys
2169237137Key generation device, key generation program, secret search system, and key distribution method
2179237016System and method for wiping encrypted data on a device having file-level content protection
2189237015Compact and efficient communication security through combining anti-replay with encryption
2199237013Encrypted data management device, encrypted data management method, and encrypted data management program
2209237009Disrupting offline password attacks
2219231925Network authentication method for secure electronic transactions
2229231770Combined digital certificate
2239231762Method of secure communication, controlled device, and control program
2249230630Physically unclonable function based on the initial logical state of magnetoresistive random-access memory
2259229687Private two-party computation using partially homomorphic encryption

2015

2269219805Memory system for portable telephone
2279219730Securing a secret of a user
2289219714ID-based encryption and signature method and terminal
2299219612Method of mutually authenticating a reader and a radio tag
2309219606Method and device for digital data blocks encryption and decryption
2319219604Generating an encrypted message for storage
2329219602Method and system for securely computing a base point in direct anonymous attestation
2339215069Methods and apparatus for device authentication with one-time credentials
2349215068Search system, search method, and program
2359214214Physically unclonable function based on the random logical state of magnetoresistive random-access memory
2369213867Secure cloud database platform with encrypted database queries
2379210138Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC)
2389209980Provisioning a shared secret to a portable electronic device and to a service entity
2399209974Functional encryption key management
2409209972Mediator device monitoring and controlling access to electronic content
2419208330System for execution of security related functions
2429203622Cryptographic processing system, cryptographic processing method, cryptograhpic processing program, and key generation device
2439203621Policy-based data management
2449191214Procedure for a multiple digital signature
2459191208Schemes for signcryption
2469191199Method and apparatus for public-key cryptography based on error correcting codes
2479184914Information processing apparatus and information processing method
2489183411Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption
2499183158System and method for hardware based security
2509182943Methods and devices for prime number generation
2519178700Information processing apparatus, information processing method, program, and recording medium
2529178699Public key encryption algorithms for hard lock file encryption
2539176707Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program
2549172530Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method
2559172529Hybrid encryption schemes
2569171324Hybrid virtual account and token-based digital cash protocols
2579166953Method and apparatus for providing identity based encryption in distributed computations
2589166791Method and apparatus for user identity verification
2599166790Commission information generator for making processes on communication performed by another computer
2609166778Secure group messaging
2619164732Multiplication method and modular multiplier using redundant form recoding
2629160530Method and apparatus for verifiable generation of public keys
2639154494Self-signed implicit certificates
2649154306Privacy-preserving flexible anonymous-pseudonymous access
2659154302System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number
2669152779Protecting codes, keys and user credentials with identity and patterns
2679152383Method for encrypting a message through the computation of mathematical functions comprising modular multiplications
2689148282Method to calculate square roots for elliptic curve cryptography
2699143327Power line communication (PLC) network nodes using cipher then segment security
2709141802Computing device boot software authentication
2719141372Secure and interruptible transfer of a map update package to a navigation device
2729135834Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation
2739130753Authentication using security device with electronic interface
2749130745Encryption processing device and method
2759130744Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
2769130664Wireless communications using a sound signal
2779129122Signature verification apparatus, signature verification method, program, and recording medium
2789124571Network authentication method for secure user identity verification
2799124430Centralized policy management for security keys
2809118664Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords
2819118482Fault tolerant apparatus and method for elliptic curve cryptography
2829118464Set of servers for "machine-to-machine" communications using public key infrastructure
2839112700Personal assistance safety systems and methods
2849111122Asymmetric cryptographic device with local private key generation and method therefor
2859111115Oblivious transfer with hidden access control lists
2869106636Information authentication method and information authentication system
2879106635System and method for connecting client devices to a network
2889106410Identity based authenticated key agreement protocol
2899106408Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program
2909094206Method and system for secure session establishment using identity-based encryption (VDTLS)
2919094205Secure provisioning in an untrusted environment
2929094189Cryptographic method for communicating confidential information
2939092645Efficient multiplication, exponentiation and modular reduction implementations
2949088419Keyed PV signatures
2959087192Electronic circuit and method for monitoring a data processing
2969086905Interpreting I/O operation requests from pageable guests without host intervention
2979083726Automatic content publication and distribution
2989077540Method for verification of decryption processes
2999077537Generating secure private keys for use in a public key communications environment
3009077536Method and apparatus for solving discrete logarithm problem using pre-computation table
3019077525User-controlled data encryption with obfuscated policy
3029076000Authentication device, authentication method, and program
3039071445Method and system for generating implicit certificates and applications to identity-based encryption (IBE)
3049071442Signcryption method and device and corresponding signcryption verification method and device
3059071427Method and apparatus for establishing a key agreement protocol
3069065637System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
3079065636Data encryption system and method
3089064229Real-time asset tracking using discovery services
3099059852Validating a user's identity utilizing information embedded in a image file
3109054877Data expansion using an approximate method
3119025767Method and apparatus for querying content protected by identity-based encryption
3128997174Configuring browser policy settings on client computing devices
3138995665Role based encryption without key management system
3148988713Secure printing in a cloud-based print system
3158983064Strengthened public key protocol
3168972300Content distribution system
3178966287Systems and methods for secure third-party data storage
3188958552Data processing device
3198953787Strengthened public key protocol
3208949609Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor
3218948401Method for filtering of abnormal ONT with same serial number in a GPON system
3228942378Method and device for encrypting multicast service in passive optical network system
3238934631Decompressing apparatus and compressing apparatus

2014

3248909929Stored public key validity registers for cryptographic devices and systems
3258898474Support of multiple pre-shared keys in access point
3268880881Secure communications between devices
3278861733Method of personalizing a NFC chipset
3288856536Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system
3298856531Message bus key agreement scheme
3308855315Method and system for realizing secure forking call session in IP multimedia subsystem
3318842840Demand based encryption and key generation and distribution systems and methods
3328826026Systems and methods for tracking electronic files in computer networks using electronic signatures
3338826009Method of handling a certification request
3348817972Method of authentication using a decoding of an error correcting code on the basis of a public matrix
3358787566Strong encryption
3368781113Decryption apparatus and method of decrypting ciphertext of the same
3378781110Unified system architecture for elliptic-curve cryptography
3388767967Physical digital media delivery
3398761390Production of cryptographic keys for an embedded processing device
3408750500Multi-dimensional montgomery ladders for elliptic curves
3418745416Systems and methods for secure third-party data storage
3428745379Systems and methods for securing data in motion
3438744079Secure communication system
3448744078System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths
3458744075Quantum public key encryption system
3468744074Method and device for countering fault attacks
3478737617Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system
3488737614Document imaging system with identity-based encryption
3498737607Finding nearby users without revealing own location
3508726023Authentication using GAA functionality for unidirectional network connections
3518718276Cryptography on a elliptical curve
3528712042Implicit certificate scheme
3538712038Cryptography on a simplified elliptical curve
3548711843Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol
3558705746Data security in an off-premise environment
3568700899Forward-secure key unlocking for cryptographic devices
3578694771Method and system for a certificate-less authenticated encryption scheme using identity-based encryption
3588693684Method and apparatus for computing a shared secret key
3598688991Media player embodiments and secure playlist packaging
3608683189On-chip security method and apparatus
3618661260Methods and systems for indicating trustworthiness of secure communications
3628649508System and method for implementing elliptic curve scalar multiplication in cryptography
3638627107System and method of securing private health information
3648625797Releasing a service on an electronic appliance
3658625783Method and apparatus for providing privacy of user identity and characteristics in a communication system
3668625780Reduction of side-channel information by interacting crypto blocks

2013

3678621239Method for strengthening the implementation of ECDSA against power analysis
3688615798Optimizing a data deduplication system using client authentication information
3698612750Creating and using secure communications channels for virtual universes
3708601260Creation of user digital certificate for portable consumer payment device
3718594332Key generating apparatus, encrypting apparatus and decrypting appatatus
3728566601Systems and methods for functional encryption using a string of arbitrary length
3738559632Method for transferring messages comprising extensible markup language information
3748549299Accelerated key agreement with assisted computations
3758543822Device authentication
3768539606Data protection method and data protection system
3778538028System and method for secure electronic communication services
3788527766Reducing leakage of information from cryptographic systems
3798526614Method to manage members of at least one group of decoders having access to broadcast data
3808516271Securing non-volatile memory regions
3818509429Protection of a prime number generation against side-channel attacks
3828509428High-speed pipelined ARIA encryption apparatus
3838495373Method of generating a cryptographic key, network and computer program therefor
3848484461Method and apparatus for external organization path length validation within a public key infrastructure (PKI)
3858472621Protection of a prime number generation for an RSA algorithm
3868462944Method of public key generation
3878462940Public key cryptosystem and associated method utilizing a hard lattice with O(n log n) random bits for security
3888458776Low-latency peer session establishment
3898458494Systems and methods for secure third-party data storage
3908428252Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables
3918417967Storage device data encryption using a binary large object (BLOB)
3928417965Method and circuit for secure definition and integration of cores
3938417956Encryption and authentication systems and methods
3948396211System and method for dynamic modification of allowable electronic message properties
3958385541Method of performing elliptic polynomial cryptography with elliptic polynomial hopping
3968379849Method and apparatus for generating a public key in a manner that counters power analysis attacks
3978370631Trusted identities on a trusted computing platform
3988369519Scrambling of a calculation performed according to an RSA-CRT algorithm
3998369518Electronic data encryption and encrypted data decryption system, and its method
4008356182Electronic signature system and electronic signature verifying method
4018351601Elliptic polynomial cryptography with secret key embedding
4028347376Techniques for distributing a new communication key within a virtual private network
4038347349Configuring browser policy settings on client computing devices

2012

4048340284Key generation device, key derivation device, encryption device, decryption device, method and program
4058331568Efficient distribution of computation in key agreement
4068331558Method of cipher block chaining using elliptic curve cryptography
4078321674Information processing device, computer program, and information processing system
4088320742Method and apparatus for playing data between external device and TV set
4098320559Identity-based-encryption system
4108312276Method for sending and receiving an evaluation of reputation in a social network
4118311214Method for elliptic curve public key cryptographic validation
4128307208Confidential communication method
4138296563Method of handling a certification request
4148296381Method and computer program product for receiving an update to a previously received email message
4158295478Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure
4168291218Creating and using secure communications channels for virtual universes
4178290149Method of obscuring cryptographic computations
4188280048Method for strengthening the implementation of ECDSA against power analysis
4198270601Implicit certificate scheme
4208261089Method and system for authenticating a user by means of a mobile device
4218259948Virtual TPM key migration using hardware keys
4228255691Apparatus for batch verification and method using the same
4238250367Cryptographic applications of efficiently evaluating large degree isogenies
4248243920Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems
4258243338Providing privacy for electronic voting using encryption
4268239331Auction verification
4278233618Method and system for generating a pair of public key and secret key
4288219819Public key encryption with digital signature scheme
4298214638Using multiple certificates to distribute public keys
4308213608Roaming utilizing an asymmetric key pair
4318213605Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
4328213604Signcryption scheme based on elliptic curve cryptography
4338194854Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation
4348181035Methods, apparatus and systems to improve security in computer systems
4358156336Device authentication
4368145899Creation of user digital certificate for portable consumer payment device
4378144864Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems
4388136166Installation of black box for trusted component for digital rights management (DRM) on computing device
4398130964Systems and methods for identity-based encryption and related cryptographic techniques
4408117453Customization of an electronic circuit
4418116454Method and apparatus for providing security in a radio frequency identification system
4428116451Key validation scheme
4438108678Identity-based signcryption system
4448108675External signature device for a PC with wireless communication capacity
4458107623Method for verifying a first identity and a second identity of an entity
4468098820Conditional access system for broadcast digital television
4478091119Identity based network mapping
4488090947Key agreement and transport protocol with implicit signatures
4498090099Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field
4508089861Data verification using signature

2011

4518086854Content protection information using family of quadratic multivariate polynomial maps
4528074265Methods and systems for verifying a location factor associated with a token
4538074073Certificate-based encryption and public key infrastructure
4548073143Information processing device and method
4558045706System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources
4568041951Code-based communication connection management
4578028157On-chip security method and apparatus
4588024575System and method for creation and use of strong passwords
4598024567Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof
4608023647Password self encryption method and system and encryption by keys generated from personal secret information
4618023646Identity-based-encryption extensions formed using multiple instances of an identity based encryption scheme
4628005209Invariance based concurrent error detection for the advanced encryption standard
4638001384Authentication system, authentication method, attesting device, verification device, their programs, and recording medium
4648000470Method of public key generation
4657995752Method for accelerating cryptographic operations on elliptic curves
4667991162Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields
4677987366Key management for network elements
4687983415Method for performing iterative scalar multiplication which is protected against address bit attack
4697978846Scale-invariant barrett reduction for elliptic-curve cyrptography
4707974408Scrambling of a calculation performed according to an RSA-CRT algorithm
4717962765Methods and systems for tamper resistant files
4727962753Method and a circuit for SHA operation with power saved
4737961877Factoring based modular exponentiation
4747961876Method to produce new multivariate public key cryptosystems
4757957527Cryptographic processing apparatus
4767957525Encryption and signature schemes using message mappings to reduce the message size
4777945044Method and system for performing an untraceable secret matching
4787940936Public key generation method in elliptic curve cryptography and public key generation system executing the method
4797936882Method to trace traceable parts of original private keys in a public-key cryptosystem
4807936871Altering the size of windows in public key cryptographic computations
4817936870Rotation of keys during encryption/decryption
4827936869Verifying digital signature based on shared knowledge
4837929689Call signs
4847925010Message deciphering method, system and article
4857917757Method and system for authentication of electronic communications
4867912886Configurable exponent FIFO
4877907724Method and apparatus for protecting an RSA calculation on an output by means of the chinese remainder theorem
4887904721Digital certificates
4897895432Method and apparatus for using a third party authentication server
4907889866Information leakage prevention apparatus and information leakage prevention method
4917886364Encrypted key cache
4927885412Pre-generation of generic session keys for use in communicating within communications environments
4937882367Information recording and reproducing apparatus and method
4947869593Software for providing based on shared knowledge public keys having same private key

2010

4957860247Identity based encryption
4967856101Method for elliptic curve scalar multiplication
4977856100Privacy-preserving data aggregation using homomorphic encryption
4987853801System and method for providing authenticated encryption in GPON network
4997853793Trusted signature with key access permissions
5007844051Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption
5017832016Microprocessor system and method for detecting the exchange of modules of the system
5027814313System, terminal, network entity, method and computer program product for authorizing communication message
5037809132Implementations of AES algorithm for reducing hardware with improved efficiency
5047801299Techniques for merging tables
5057796751Certificate-based encryption and public key infrastructure
5067794323Gaming apparatus with encryption and method
5077792287Leak-resistant cryptographic payment smartcard
5087792286Signature generation device and signature verification device
5097783044System for on-line and off-line decryption
5107783040Encryption in a secure computerized gaming system
5117779481Systems and methods for electronic postmarking of data including location data
5127779259Key agreement and transport protocol with implicit signatures
5137778422Security associations for devices
5147778414Encryption method based on factorization
5157773747Encryption apparatus, decryption apparatus, and method
5167773746Encryption system, encryption device, decryption device, program, and integrated circuit
5177769167Weil and Tate pairing techniques using parabolas
5187760873Method and a system for a quick verification rabin signature scheme
5197758422Hard drive authentication
5207752447Information-processing system and method, information-transmission-processing apparatus, and information-reception-processing apparatus
5217751558Certificate-based encryption and public key infrastructure
5227739504Signature generation apparatus and signature verification apparatus
5237734932System and method for securing executable code
5247715563Rapid acquisition of state vectors in an encrypted data communication system
5257707420Public key encryption with digital signature scheme
5267698736Secure delegation using public key authentication
5277694329Secure delegation using public key authentication
5287693277Generating digital signatures using ephemeral cryptographic key
5297688973Encryption apparatus, decryption apparatus, key generation apparatus, program, and method
5307685414Subscription management service for secure messaging system
5317681031Method and apparatus to provide authentication code
5327680280Electronic device, control method thereof, security program and others
5337680272Inverse calculation circuit, inverse calculation method, and storage medium encoded with computer-readable computer program code
5347680271Zero-knowledge proof cryptography methods and devices
5357680270System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication
5367673142Efficient method for providing secure remote access
5377664269Encrypting message for secure transmission
5387664260Signature generation device, key generation device, and signature generation method
5397664259Encryption and verification using partial public key
5407664258Randomized sparse formats for efficient and secure computation on elliptic curves
5417660989System for, and method of, authenticating an electronic message to a recipient
5427657748Certificate-based encryption and public key infrastructure
5437657029Systems and methods for generating random addition chains
5447649991Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack
5457647498Device authentication

2009

5467640427System and method for secure electronic communication in a partially keyless environment
5477639806Fingerprinting digital devices using electromagnetic characteristics of their communications
5487639799Cryptographically processing data based on a Cassels-Tate pairing
5497636441Method for secure key exchange
5507634091System and method of hiding cryptographic private keys
5517634087Systems and methods for identity-based encryption and related cryptographic techniques
5527631183System and method for retrieving related certificates
5537623655Computing modular polynomials modulo large primes
5547609834Personal authenticating multi-function peripheral
5557596689Secure and reliable document delivery using routing lists
5567594261Cryptographic applications of the Cartier pairing
5577593527Providing digital signature and public key based on shared knowledge
5587593526Method and apparatus for compressing rabin signatures
5597590236Identity-based-encryption system
5607590235Reduction calculations in elliptic curve cryptography
5617587045System and method for securing document transmittal
5627571320Circuit and method for providing secure communications between devices
5637567669Strengthened public key protocol
5647562223Multifunction device with secure job release
5657551737Cryptographic keys using random numbers instead of random primes
5667539861Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip card
5677536011Tamper-proof elliptic encryption with private key
5687532720Utilizing SIMD instructions within montgomery multiplication
5697512800Key management technique for establishing a secure channel
5707512233Method and apparatus for computing a shared secret key
5717508936Hardware accelerator for elliptic curve cryptography
5727505585Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same
5737503060Reactive system safety verification device, method, program, and recording medium containing the program
5747499544Use of isogenies for design of cryptosystems
5757492897Conditional access system for broadcast digital television
5767486789Device and method for calculation on elliptic curve
5777480380Method for efficient generation of modulo inverse for public key cryptosystems
5787478239Electronic ticket vending system

2008

5797471792Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus
5807461406Access control for digital content
5817461261Method to generate, verify and deny an undeniable signature
5827457408Calculation unit for executing a cryptographic protocol
5837450719Gigabit Ethernet-based passive optical network and data encryption method
5847447311Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system
5857436957Audio cassette emulator with cryptographic media distribution control
5867434052Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream
5877434050Efficient method for providing secure remote access
5887428749Secure delegation using public key authorization
5897424114Method for enhancing security of public key encryption schemas
5907421074Security system using RSA algorithm and method thereof
5917412061Encrypting a digital object on a key ID selected therefor
5927409553Public key certificate generation method, validation method and apparatus thereof
5937409543Method and apparatus for using a third party authentication server
5947406089Data verification using signature
5957404078Methods and apparatus for private certificates in public key cryptography
5967397917Method and apparatus for generating a cryptographic key
5977395431Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method
5987386123Method of implementing in an electronic component a cryptographic algorithm for finding the public exponent
5997386122Method for proving the authenticity or integrity of a message by means of a public exponent equal to the power of two
6007382877RSA cryptographic method and system
6017379550Method for the computer-assisted production of public keys for encoding information and device for carrying out said method
6027373521Semiconductor IC, information processing method, information processing device, and program storage medium
6037359508Method of securely implementing a cryptography algorithm of the RSA type, and a corresponding component
6047356847System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software
6057356140Encrypting device, decrypting device, cryptosystem including the same devices, encrypting method, and decrypting method
6067350086Creation of image file
6077349538Hierarchical identity-based encryption and signature schemes
6087346159Generic modular multiplier using partial reduction
6097340606Digital certificates
6107340061Information processing apparatus, information processing method and providing medium
6117337315Efficient certificate revocation
6127336791Information processing apparatus
6137330549Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function
6147316028Method and system for transmitting information across a firewall

2007

6157308572Method of printing a document
6167302703Hardware token self enrollment process
6177298839Squared Weil and Tate pairing techniques for use with elliptic curves
6187295671Advanced encryption standard (AES) hardware cryptographic engine
6197287164Method and system for encoding signatures to authenticate files
6207286666Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm
6217286665System and method for transferring the right to decode messages
6227266197Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors
6237263185Key based decipher including its generation, distribution and usage
6247254718Tamper-resistant processing method
6257251728Secure and reliable document delivery using routing lists
6267236590Method and apparatus for protecting data
6277233662Numerical array output device, a numerical array output method, an encryption device, and a decryption device
6287228430Security system for preventing a personal computer from being used by an unauthorized people
6297213158Distributed autonomic backup
6307206936Revocation and updating of tokens in a public key infrastructure system
6317197637Authorization process using a certificate
6327184547Authenticating or signature method with reduced computations
6337178035Write once system and method for facilitating digital encrypted transmissions
6347174016Modular exponentiation algorithm in an electronic component using a public key encryption algorithm
6357171000Simplified addressing for private communications
6367167565Efficient techniques for sharing a secret
6377165180Monolithic semiconductor device for preventing external access to an encryption key
6387165174Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
6397162033Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm
6407159121Transmission of information to a reproduction device having user identification by organism information of a specified type

2006

6417152158Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium
6427146009Secure electronic messaging system requiring key retrieval for deriving decryption keys
6437139396Koblitz exponentiation with bucketing
6447136487System and method for automatically protecting private video content using embedded cryptographic security
6457130422Information security device, prime number generation device, and prime number generation method
6467127063Method and apparatus for computing a shared secret key
6477114070System and method for automatic digital certificate installation on a network device in a data-over-cable system
6487113595Generation of a random number that is non-divisible by a set of prime numbers
6497096352Security protocol structure in application layer
6507088822Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith
6517088821Absolute public key cryptographic system and method surviving private-key compromise with other advantages
6527085383Secured cellular telephone communications system, method, and computer program product
6537082538Electronically verified digital signature and document delivery system and method
6547080254Method, system, device for proving authenticity of an entity or integrity of a message
6557073057Method and apparatus for obtaining status of public key certificate updates
6567058808Method for making a blind RSA-signature and apparatus therefor
6577054445Authentication method and schemes for data integrity protection
6587039816Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content
6597035405Method for establishing a common key between a central station and a group of subscribers
6607016498Encrypting a digital object on a key ID selected therefor
6617010692Cryptographic methods for remote authentication
6626996711Certification validation system
6636993136Cryptographic key exchange method using efficient elliptic curve

2005

6646968060Method for verifying the use of public keys generated by an on-board system
6656959091Cryptography private key storage and recovery method and apparatus
6666957333System and method for encrypted communications between electronic devices
6676956950Computer readable medium having a private key encryption program
6686956947Extraction of multiple single keys from a compressed key
6696956946Method and device for cryptographic processing with the aid of an elliptic curve on a computer
6706952476Verification of the private components of a public-key cryptographic system
6716950948Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections
6726948065Platform and method for securely transmitting an authorization secret
6736948064Method and apparatus for providing public key security control for a cryptographic processor
6746944300Method for migrating a base chip key from one computer system to another
6756940980High security cryptosystem
6766940979Management of certificates for public key infrastructure
6776937728Verifiable anonymous channel
6786937726System and method for protecting data files by periodically refreshing a decryption key
6796934392Split-key key-agreement protocol
6806934389Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus
6816931126Non malleable encryption method and apparatus using key-encryption keys and digital signature
6826928546Identity verification method using a central biometric authority
6836925182Administration and utilization of private keys in a networked environment
6846922785Apparatus and a method for secure communications for network computers
6856912657Method and arrangement in a communication network
6866912656Method and apparatus for sending encrypted electronic mail through a distribution list exploder
6876912654Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system
6886912285Mechanism for efficient private bulk messaging
6896909786Cryptographic trap door with timed lock and controlled escrow
6906909702Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system
6916898288Method and system for secure key exchange
6926898287Cryptographic system using chaotic dynamics
6936886098Systems and methods for compression of key sets having multiple keys
6946886096Identity-based encryption system
6956876745Method and apparatus for elliptic curve cryptography and recording medium therefore
6966873977Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries
6976873706Processing apparatus, program, or system of secret information
6986868160System and method for providing secure sharing of electronic data
6996851049Method and apparatus for facilitating secure anonymous email recipients
7006839839Public key distribution using an approximate linear function
7016839838Data management system, information processing apparatus, authentification management apparatus, method and storage medium
7026839437Method and apparatus for managing keys for cryptographic operations

2004

7036834272Privacy preserving negotiation and computation
7046834112Secure distribution of private keys to multiple clients
7056816970Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
7066816966Techniques for securing data flow in internet multicasting
7076813358Method and system for timed-release cryptosystems
7086813357Exclusive key sharing method
7096804782Countermeasure to power attack and timing attack on cryptographic operations
7106801999Passive and active software objects containing bore resistant watermarking
7116798884Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium
7126789195Secure data processing method
7136788788Cryptographic communication method, encryption method, and cryptographic communication system
7146785388Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium
7156782100Accelerated finite field operations on an elliptic curve
7166779111Indirect public-key encryption
7176778666Cryptographic method using construction of elliptic curve cryptosystem
7186754820Multiple level access system
7196751318Method and apparatus for digital signature authentication
7206744894Data management system
7216741991Data management system
7226731755Split-key cryptographic system and method
7236724894Cryptographic device having reduced vulnerability to side-channel attack and method of operating same
7246721887Data copyright management system
7256721421Method for encrypting information represented as a numerical value
7266718468Method for associating a password with a secured public/private key pair
7276715073Secure server using public key registration and methods of operation
7286711263Secure distribution and protection of encryption key information
7296707801Method and apparatus for data transport in a wireless communication system
7306697488Practical non-malleable public-key cryptosystem
7316694025Method and apparatus for secure distribution of public/private key pairs
7326687822Method and system for providing translation certificates
7336683955Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels
7346683953Encoding method, encoding-decoding apparatus, and code communications system
7356678821Method and system for restricting access to the private key of a user in a public key infrastructure

2003

7366665405Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields
7376658569Secret key cryptographic process for protecting a computer system against attacks by physical analysis
7386618483Elliptic curve encryption systems
7396614909Methods, systems, and circuits for generating keys for public key cryptosystems using parallel processing for modular operations of IC cards
7406603445Method and apparatus for factoring large numbers with optoelectronic devices
7416598163Flash mixing apparatus and method
7426587946Method and system for quorum controlled asymmetric proxy encryption
7436587563Cryptographic system using chaotic dynamics
7446564322Method and apparatus for watermarking with no perceptible trace
7456560336Apparatus for operating double vector and encrypting system including the same
7466553493Secure mapping and aliasing of private keys used in public key cryptography
7476550009Encryption system for distributing a common crypt key
7486530020Group oriented public key encryption and key management system
7496523116Secure personal information card database system
7506507656Non malleable encryption apparatus and method

2002

7516496929Generating RSA moduli including a predetermined portion
7526490352Cryptographic elliptic curve apparatus and method
7536480831Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center
7546480606Elliptic curve encryption method and system
7556480605Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon
7566477254Network system using a threshold secret sharing method
7576463536Data copyright management system
7586459791Public key cryptography method
7596446205Cryptosystems with elliptic curves chosen by users
7606446051Document transfer systems
7616430292System and method for controlling disclosure time of information
7626412072Parasitically powered microprocessor capable of transmitting data over a single data line and ground
7636411715Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key
7646404890Generating RSA moduli including a predetermined portion
7656401204Process for cryptographic code management between a first computer unit and a second computer unit
7666396926Scheme for fast realization of encrytion, decryption and authentication
7676385318Encrypting method, deciphering method and certifying method
7686385317Method for providing a secure communication between two devices and application of this method
7696381699Leak-resistant cryptographic method and apparatus
7706381331Information sending system and method for sending encrypted information
7716378072Cryptographic system
7726377689Key transmission system
7736377688Cryptographic communication method and system
7746373946Communication security
7756370250Method of authentication and storage of private keys in a public key cryptography system (PKCS)
7766366673Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks
7776363480Ephemeral decryptability
7786351536Encryption network system and method
7796345098Method, system and apparatus for improved reliability in generating secret cryptographic variables
7806339828System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
7816339824Method and apparatus for providing public key security control for a cryptographic processor
7826337909Generation of session keys for El Gamal-like protocols from low hamming weight integers

2001

7836330674Use of biometrics as a methodology for defining components for ECC encryption
7846330332Prime number generation apparatus B-smoothness judgement apparatus and computer memory product
7856317833Practical mix-based election scheme
7866311270Method and apparatus for securing communication utilizing a security processor
7876307938Method, system and apparatus for generating self-validating prime numbers
7886307935Method and apparatus for fast elliptic encryption with direct embedding
7896304658Leak-resistant cryptographic method and apparatus
7906298137Ring-based public key cryptosystem method
7916292895Public key cryptosystem with roaming user capability
7926292892Apparatus and method for providing secured communications
7936289454Memory configuration which support multiple cryptographical algorithms
7946285760Method and apparatus for digital signature authentication
7956275936Decryption method and device, and access right authentication method and apparatus
7966272635Data copyright management system
7976263446Method and apparatus for secure distribution of authentication credentials to roaming users
7986259790Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion
7996240187Key replacement in a public key cryptosystem
8006237097Robust efficient distributed RSA-key generation
8016230269Distributed authentication system and method
8026219789Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities
8036215877Key management server, chat system terminal unit, chat system and recording medium
8046212277Elliptic curve transformation device, utilization device and utilization system
8056195433Private key validity and validation
8066192472Method and apparatus for the secure distributed storage and retrieval of information
8076185685Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same
8086185546Apparatus and method for providing secured communications
8096170058Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use

2000

8106154543Public key cryptosystem with roaming user capability
8116154541Method and apparatus for a robust high-speed cryptosystem
8126151676Administration and utilization of secret fresh random numbers in a networked environment
8136144740Method for designing public key cryptosystems against fault-based attacks with an implementation
8146141422Secure cryptographic multi-exponentiation method and coprocessor subsystem
8156141420Elliptic curve encryption systems
8166134431Personal station authentication system and authentication method
8176134325Key transmission system
8186125185System and method for encryption key generation
8196111956Method for secure key distribution over a nonsecure communications network
8206111952Asymmetrical cryptographic communication method and portable object therefore
8216108419Differential fault analysis hardening apparatus and evaluation method
8226098056System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet
8236091819Accelerating public-key cryptography by precomputing randomly generated pairs
8246081893System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record
8256081793Method and system for secure computer moderated voting
8266081598Cryptographic system and method with fast decryption
8276081597Public key cryptosystem method and apparatus
8286078667Generating unique and unpredictable values
8296075864Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem
8306073125Token key distribution system controlled acceptance mail payment and evidencing system
8316072876Method and system for depositing private key used in RSA cryptosystem
8326049610Method and apparatus for digital signature authentication
8336047072Method for secure key distribution over a nonsecure communications network
8346038317Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l
8356035041Optimal-resilience, proactive, public-key cryptographic system and method
8366026163Distributed split-key cryptosystem and applications

1999

8376005943Electronic identifiers for network terminal devices
8385999629Data encryption security module
8395991415Method and apparatus for protecting public key schemes from timing and fault attacks
8405991414Method and apparatus for the secure distributed storage and retrieval of information
8415987133Electronic authentication system
8425987124Method and apparatus for encrypting long blocks using a short-block encryption procedure
8435974151Public key cryptographic system having differential security levels
8445974141Data management system
8455960087Distributed garbage collection system and method
8465956408Apparatus and method for secure distribution of data
8475956407Public key cryptographic system having nested security levels
8485956406Method of setting up secure communications and associated encryption/decryption system
8495933503Controlled modular cryptography apparatus and method
8505915018Key management system for DVD copyright management
8515909491Method for sending a secure message in a telecommunications system
8525905799Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
8535870470Method and apparatus for encrypting long blocks using a short-block encryption procedure
8545864667Method for safe communications

1998

8555850450Method and apparatus for encryption key creation
8565850444Method and apparatus for encrypting radio traffic in a telecommunications network
8575850443Key management system for mixed-trust environments
8585848159Public key cryptographic apparatus and method
8595838792Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
8605835598Public key method of encoding data
8615832207Secure module with microprocessor and co-processor
8625832091Fingerprint controlled public key cryptographic system
8635825300Method of protected distribution of keying and certificate material
8645805712Apparatus and method for providing secured communications
8655805703Method and apparatus for digital signature authentication
8665799088Non-deterministic public key encrypton system
8675796840Apparatus and method for providing secured communications
8685796833Public key sterilization
8695790675Cryptographic communication process
8705768389Method and system for generation and management of secret key of public key cryptosystem
8715764768Blind encryption
8725761311Blind encryption
8735761310Communication system for messages enciphered according to an RSA-type procedure
8745761307Method for securing data in a telecommunications system
8755761306Key replacement in a public key cryptosystem
8765751813Use of an encryption server for encrypting messages
8775751808Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
8785748735Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography
8795745571Cryptographic communications method and system
8805740250Tame automorphism public key system
8815737425Cryptosystem employing worst-case difficult-to solve lattice problem
8825737424Method and system for secure distribution of protected data using elliptic curve systems
8835737420Method for secure data transmission between remote stations
8845737419Computer system for securing communications using split private key asymmetric cryptography
8855712800Broadcast key distribution apparatus and method using chinese remainder

1997

8865680460Biometric controlled key generation
8875680458Root key compromise recovery
8885666419Encryption device and communication apparatus using same
8895663896Broadcast key distribution apparatus and method using Chinese Remainder
8905651066Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information
8915638445Blind encryption
8925625692Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
8935604801Public key data communications system under control of a portable security device

1996

8945588061System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem
8955586186Method and system for controlling unauthorized access to information distributed to users
8965581616Method and apparatus for digital signature authentication
8975577124Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
8985577123Public-key cryptographic apparatus handling ciphertext by public-key
8995563950System and methods for data encryption using public key cryptography
9005559889System and methods for data encryption using public key cryptography
9015557678System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
9025552897Secure communication apparatus and method
9035541994Fingerprint controlled public key cryptographic system
9045539828Apparatus and method for providing secured communications
9055535276Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
9065499299Modular arithmetic operation system
9075497423Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication

1995

9085463690Method and apparatus for public key exchange in a cryptographic system
9095442706Secure mobile storage

1994

9105373560Partial modular reduction method
9115371794Method and apparatus for privacy and authentication in wireless networks
9125369708Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device
9135351298Cryptographic communication method and apparatus
9145351297Method of privacy communication using elliptic curves
9155297206Cryptographic method for communication and electronic signatures
9165295188Public key encryption and decryption circuitry and method
9175289542Caller identification system with encryption

1993

9185274707Modular exponentiation and reduction device and method
9195272755Public key cryptosystem with an elliptic curve
9205271061Method and apparatus for public key exchange in a cryptographic system
9215241599Cryptographic protocol for secure communications
9225220604Method for performing group exclusion in hierarchical group structures
9235202921Method and apparatus for authenticating users of a communication system to each other
9245201000Method for generating public and private key pairs without using a passphrase
9255199070Method for generating a public key

1992

9265159632Method and apparatus for public key exchange in a cryptographic system
9275146500Public key cryptographic system using elliptic curves over rings
9285144665Cryptographic communication method and system
9295142579Public key cryptographic system and method
9305142577Method and apparatus for authenticating messages
9315136642Cryptographic communication method and cryptographic communication device
9325124117Cryptographic key distribution method and system
9335121429Digital signal processing

1991

9345073935Method for secure communication
9355073934Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
9365068895Encryption and decryption methods using bit-length preservation decryptor
9375054066Error correcting public key cryptographic method and program
9385046094Server-aided computation method and distributed information processing unit

1990

9394969190Encrypting system of data
9404964164RSA computation method for efficient batch processing
9414949379Process for encrypted information transmission
9424944007Public key diversification method
9434926480Card-computer moderated systems

1989

9444888801Hierarchical key management system
9454870681Cryptographic method and cryptographic processor for carrying out the method
9464841570One-way transformation of information
9474807288Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system

1988

9484736423Technique for reducing RSA Crypto variable storage

1987

9494703503Cryptographic system using pseudocomplements of vector Boolean algebra
9504658094Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer

1986

9514633036Method and apparatus for use in public-key data encryption system
9524567600Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission

1985

9534532638Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encoding and decoding digitally-represented messages
9544514592Cryptosystem

1984

9554471164Stream cipher operation using public key cryptosystem
9564424414Exponentiation cryptographic apparatus and method

1983

9574405829Cryptographic communications system and method
9584399323Fast real-time public key cryptography

1982

9594351982RSA Public-key data encryption system having large random prime number generating microprocessor or the like

1981

9604306111Simple and effective public-key cryptosystem

1980

9614218582Public key cryptographic apparatus and method
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017