СПИСОК патентов США - подгруппа МПК16 H04L9/30
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9608980 | Environment-aware security tokens | |||
2 | 9608819 | Learning parity with noise-based relational encryption for proximity relations | |||
3 | 9608818 | Cryptographic communication system and cryptographic communication method | |||
4 | 9608817 | Homomorphic evaluation including key switching, modulus switching, and dynamic noise management | |||
5 | 9607256 | Augmenting and updating data using encrypted machine-readable identifiers | |||
6 | 9607158 | Proxy computing system, computing apparatus, capability providing apparatus, proxy computing method, capability providing method, program, and recording medium | |||
7 | 9602485 | Network, network node with privacy preserving source attribution and admission control and device implemented method therfor | |||
8 | 9602478 | Trust relationships in a computerized system | |||
9 | 9602285 | Authentication device, authentication method, and program | |||
10 | 9602282 | Secure software and hardware association technique | |||
11 | 9602281 | Parallelizable cipher construction | |||
12 | 9596598 | Reducing detectability of an encryption key | |||
13 | 9596090 | Method for controlling data acquisition for a plurality of field devices | |||
14 | 9596083 | Information processing technique for pattern matching | |||
15 | 9596082 | Secure debug trace messages for production authenticated code modules | |||
16 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
17 | 9591483 | Authentication mechanisms for wireless networks | |||
18 | 9590971 | Environment-aware security tokens | |||
19 | 9590807 | Identity based public key cryptosystem | |||
20 | 9589144 | System and method for cryptographic suite management | |||
21 | 9589138 | Computing device boot software authentication | |||
22 | 9588908 | Memory circuit using resistive random access memory arrays in a secure element | |||
23 | 9584321 | Secure storage for shared documents | |||
24 | 9582671 | Security and data privacy for lighting sensory networks | |||
25 | 9578035 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
26 | 9577828 | Batch verification method and apparatus thereof | |||
27 | 9577827 | Information processing device, information processing method, and program | |||
28 | 9577822 | Secure bitstream authentication | |||
29 | 9576144 | Secured file system management | |||
30 | 9571281 | CRT-RSA encryption method and apparatus | |||
31 | 9571271 | Sending messages by oblivious transfer | |||
32 | 9571268 | Method and system for homomorphicly randomizing an input | |||
33 | 9571267 | Data processor and decryption method | |||
34 | 9569773 | Invariant biohash security system and method | |||
35 | 9565017 | Method for efficiently protecting elliptic curve cryptography against simple power analysis attacks | |||
36 | 9563762 | Method for generating an identifier | |||
37 | 9559850 | Component management via secure communications | |||
38 | 9559847 | Content access for duration of calendar events | |||
39 | 9553723 | Multi-dimensional encryption | |||
40 | 9552175 | System and method for providing a command buffer in a memory system | |||
41 | 9548970 | Managing unlinkable identifiers for controlled privacy-friendly data exchange | |||
42 | 9548864 | Device and method for encoding bits to symbols for a communication system | |||
43 | 9548863 | Method for unambiguous marking of an object | |||
44 | 9548861 | Encrypted statistical processing system, device, method, and program | |||
45 | 9547778 | Secure public key acceleration | |||
46 | 9544145 | Device, method, and medium for facility management verification | |||
47 | 9544144 | Data encryption | |||
48 | 9544133 | On-the-fly key generation for encryption and decryption | |||
49 | 9542158 | T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring | |||
50 | 9537660 | Method of establishing public key cryptographic protocols against quantum computational attack | |||
51 | 9537656 | Systems and methods for managing cryptographic keys in a secure microcontroller | |||
2016 | |||||
52 | 9531540 | Secure token-based signature schemes using look-up tables | |||
53 | 9531537 | System and method for performing secure communications | |||
54 | 9530005 | Techniques for secure data management in a distributed environment | |||
55 | 9520992 | Logical-to-physical address translation for a removable data storage device | |||
56 | 9516013 | Communication apparatus, method of controlling the same and storage medium for transmitting image file to a network address | |||
57 | 9516007 | Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier | |||
58 | 9515997 | Inline data encryption | |||
59 | 9515994 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | |||
60 | 9514454 | Wireless transaction medium having combined magnetic stripe and radio frequency communications | |||
61 | 9509690 | Methods and systems for managing network activity using biometrics | |||
62 | 9509670 | System and method for managing secure communications in an Ad-Hoc network | |||
63 | 9509663 | Secure distribution of session credentials from client-side to server-side traffic management devices | |||
64 | 9509511 | Identity based encryption | |||
65 | 9509492 | Authentication device, output device, verification device and input device | |||
66 | 9503448 | Authenticated session establishment | |||
67 | 9503267 | Generating digital signatures | |||
68 | 9503264 | Attribute based encryption using lattices | |||
69 | 9503263 | Method and apparatus for storing encrypted data files across distributed storage media | |||
70 | 9503262 | Transparent denial of service protection | |||
71 | 9503261 | Public key encryption with digital signature scheme | |||
72 | 9503259 | System and method for generating and protecting cryptographic keys | |||
73 | 9503258 | System and method for communication using orbital angular momentum with multiple layer overlay modulation | |||
74 | 9495545 | Automatically generate attributes and access policies for securely processing outsourced audit data using attribute-based encryption | |||
75 | 9490979 | System and method for providing credentials | |||
76 | 9490978 | Information processing apparatus and information processing method | |||
77 | 9490974 | Identity-based decryption | |||
78 | 9490970 | Methods and system for secure communication between an RFID tag and a reader | |||
79 | 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
80 | 9485101 | Provisioning digital certificates in a network environment | |||
81 | 9485092 | Electronic authentication systems | |||
82 | 9479340 | Controlling use of encryption keys | |||
83 | 9473794 | Digital broadcasting receiver and method for controlling the same | |||
84 | 9473603 | Memory system for portable telephone | |||
85 | 9473492 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
86 | 9473471 | Method, apparatus and system for performing proxy transformation | |||
87 | 9473302 | Ciphertext processing device, ciphertext processing method, computer-readable recording medium, and information processing device | |||
88 | 9473297 | Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters | |||
89 | 9471948 | System and method for administering licenses stored by a product unit, and administration of said unit in the field | |||
90 | 9471774 | Secure access to a virtual machine | |||
91 | 9467299 | Device for and method of controlled multilevel chain of trust/revision | |||
92 | 9467298 | Device for and method of multilevel chain of trust/revision | |||
93 | 9467283 | Securing method for lawful interception | |||
94 | 9467281 | Information processing apparatus and program product | |||
95 | 9461974 | System and method to merge encrypted signals in distributed communication system | |||
96 | 9460315 | Order-preserving encryption system, device, method, and program | |||
97 | 9455832 | Signatures with confidential message recovery | |||
98 | 9455828 | Re-encryption system, re-encryption method and re-encryption program | |||
99 | 9451453 | Architecture for reconfigurable quantum key distribution networks based on entangled photons directed by a wavelength selective switch | |||
100 | 9450933 | Systems and methods for device and data authentication | |||
101 | 9450755 | Transponder, reader and methods for operating the same | |||
102 | 9450754 | Data privacy | |||
103 | 9449198 | Prime field elliptic cryptography processor | |||
104 | 9445263 | Method for ensuring security and privacy in a wireless cognitive network | |||
105 | 9444623 | Modular exponentiation optimization for cryptographic systems | |||
106 | 9438600 | Apparatus and methods for distributing and storing electronic access clients | |||
107 | 9438427 | Method and system for providing a plurality of tamperproof digital certificates for a plurality of public keys of a device | |||
108 | 9432192 | Content aware hierarchical encryption for secure storage systems | |||
109 | 9432191 | Public key encryption system based on the quadratic residuosity assumption | |||
110 | 9425966 | Security mechanism evaluation service | |||
111 | 9425961 | Method for performing an encryption of an AES type, and corresponding system and computer program product | |||
112 | 9425960 | Searchable encryption for outsourcing data analytics | |||
113 | 9425955 | Power line communication (PLC) network nodes using cipher then segment security | |||
114 | 9425952 | Algebraic manipulation detection codes from algebraic curves | |||
115 | 9420458 | Method for the use of a mobile appliance using a motor vehicle | |||
116 | 9420454 | Method for ensuring security and privacy in a wireless cognitive network | |||
117 | 9419994 | Method for identifying potentially malicious network elements within a network using cross-domain collaborative data sharing | |||
118 | 9419798 | Public encryption method based on user ID | |||
119 | 9419789 | Method and apparatus for scalar multiplication secure against differential power attacks | |||
120 | 9418242 | Computer implemented method for analyzing data of a user with the data being stored pseudonymously in a database | |||
121 | 9418211 | Electronic device and method of transmitting content item | |||
122 | 9413531 | Cryptographic system, cryptographic method, cryptographic program, and decryption device | |||
123 | 9413528 | Method for attribute based broadcast encryption with permanent revocation | |||
124 | 9407618 | Systems and methods for device and data authentication | |||
125 | 9407439 | Authentication system and authentication code convertor | |||
126 | 9407438 | Cryptographic system, cryptographic method, and cryptographic program | |||
127 | 9407437 | Secure initialization vector generation | |||
128 | 9405729 | Cryptographic method comprising a modular exponentiation operation | |||
129 | 9402091 | Digital broadcasting receiver and method for controlling the same | |||
130 | 9401811 | Attribute-based digital signatures | |||
131 | 9401810 | Method and apparatus for applying recipient criteria in identity-based encryption | |||
132 | 9401809 | Composite system, method, and storage medium | |||
133 | 9401805 | Encrypting device, encrypting method, and recording medium | |||
134 | 9400636 | Apparatus and method for calculating a result in a scalar multiplication | |||
135 | 9397985 | System and method for providing a cryptographic platform for exchanging information | |||
136 | 9397793 | Method for securely transmitting packets for wireless telecommunications system | |||
137 | 9392525 | Establishing reliable routes without expensive mesh peering | |||
138 | 9392449 | Communication system, communication unit, and communication method | |||
139 | 9391965 | Data search device, data search method, data search program, data registration device, data registration method, data registration program, and information processing device | |||
140 | 9391777 | System and method for performing key resolution over a content centric network | |||
141 | 9391773 | Elliptic curve point multiplication procedure resistant to side-channel information leakage | |||
142 | 9385867 | Cryptographic processing system, key generation device, encryption device, decryption device, key delegation device, cryptographic processing method, and cryptographic processing program | |||
143 | 9383966 | Number squaring computer-implemented method and apparatus | |||
144 | 9379891 | Method and system for ID-based encryption and decryption | |||
145 | 9378380 | System and method for securely storing and sharing information | |||
146 | 9378220 | Bonding contents on separate storage media | |||
147 | 9374227 | Verification of signed digital documents | |||
148 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
149 | 9374220 | System and method for providing compressed encryption and decryption in homomorphic encryption based on integers | |||
150 | 9369151 | Apparatus and method for resource allocation | |||
151 | 9363087 | End-to-end security for hardware running verified software | |||
152 | 9363086 | Aggregate signing of data in content centric networking | |||
153 | 9363082 | Cryptographic communication system and cryptographic communication method | |||
154 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
155 | 9363073 | Cryptographic countermeasure method by deriving a secret data | |||
156 | 9356787 | Secure communication architecture including sniffer | |||
157 | 9356786 | Method for encrypting a plurality of data in a secure set | |||
158 | 9356783 | Method for ciphering and deciphering, corresponding electronic device and computer program product | |||
159 | 9356779 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
160 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
161 | 9350543 | Method and system for homomorphicly randomizing an input | |||
162 | 9350539 | Secure distribution of content | |||
163 | 9344276 | Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program | |||
164 | 9342712 | Method and system for accelerating cryptographic processing | |||
165 | 9338142 | Method for verifying the security of a device that generates private and public cryptographic keys | |||
166 | 9338000 | Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm | |||
167 | 9332012 | Apparatus and methods for storing electronic access clients | |||
168 | 9331851 | Apparatus and method for giving the compressed encryption functionality to integer-based homomorphic encryption schemes | |||
169 | 9326136 | Method and apparatus for managing group key for mobile device | |||
170 | 9325499 | Message encryption and decryption utilizing low-entropy keys | |||
171 | 9323560 | Interpreting I/O operation requests from pageable guests without host intervention | |||
172 | 9319946 | System for efficient recovery of Node-B buffered data following MAC layer reset | |||
173 | 9319395 | System and method for securing authentication information in a networked environment | |||
174 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
175 | 9313181 | System and method to merge encrypted signals in distributed communication system | |||
176 | 9313027 | Protection of a calculation performed by an integrated circuit | |||
177 | 9313026 | Key negotiation method and apparatus according to SM2 key exchange protocol | |||
178 | 9306753 | Mobile system and method for improving safety of impromptu meetings | |||
179 | 9300681 | Method for prefix reachability in a communication system | |||
180 | 9300654 | Method of handling a certification request | |||
181 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
182 | 9300469 | Secure computing system, secure computing method, secure computing apparatus, and program therefor | |||
183 | 9300466 | Transmitting device, receiving device, transmitting method, receiving method, and program | |||
184 | 9298904 | Method for accessing a plurality of services by a mobile terminal user, and related secure device | |||
185 | 9294278 | Method for wireless local area network (WLAN)-based peer to peer (P2P) communication and apparatus for same | |||
186 | 9294273 | Method and system for conditional access to a digital content, associated terminal and subscriber device | |||
187 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
188 | 9288044 | Method for providing cryptographic key pairs | |||
189 | 9286243 | Logical-to-physical address translation for a removable data storage device | |||
190 | 9281944 | Attribute based encryption using lattices | |||
191 | 9280518 | Public key cryptography computing device | |||
192 | 9277406 | Methods and system for secure communication between an RFID tag and a reader | |||
193 | 9276746 | Encryption system, encryption processing method of encryption system, encryption device, decryption device, setup device, key generation device, and key delegation device using a user identifier for a user who belongs to a k-th hierarchy in an organization | |||
194 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
195 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
196 | 9276735 | Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program | |||
197 | 9276734 | Confidential computation system, confidential computation method, and confidential computation program | |||
198 | 9270829 | Message routing | |||
199 | 9270447 | Demand based encryption and key generation and distribution systems and methods | |||
200 | 9268968 | Credential validation | |||
201 | 9264406 | Public key cryptography with reduced computational load | |||
202 | 9264222 | Precomputing internal AES states in counter mode to protect keys used in AES computations | |||
203 | 9264221 | Systems and methods for faster public key encryption using the associated private key portion | |||
204 | 9256763 | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |||
205 | 9252960 | System for establishing a cryptographic key depending on a physical system | |||
206 | 9252954 | Efficient homomorphic encryption scheme for bilinear forms | |||
207 | 9252944 | Key wrapping for common cryptographic architecture (CCA) key token | |||
208 | 9252941 | Enhanced digital signatures algorithm method and system utilitzing a secret generator | |||
209 | 9246900 | Using a single certificate request to generate credentials with multiple ECQV certificates | |||
210 | 9246888 | Systems and methods for secure communication over an unsecured communication channel | |||
211 | 9246689 | Component management via secure communications | |||
212 | 9246683 | Re-encryption key generator, re-encryption apparatus, and program | |||
213 | 9246675 | Cryptographic systems using pairing with errors | |||
214 | 9241175 | Digital broadcasting receiver and method for controlling the same | |||
215 | 9240884 | Method and apparatus for verifiable generation of public keys | |||
216 | 9237137 | Key generation device, key generation program, secret search system, and key distribution method | |||
217 | 9237016 | System and method for wiping encrypted data on a device having file-level content protection | |||
218 | 9237015 | Compact and efficient communication security through combining anti-replay with encryption | |||
219 | 9237013 | Encrypted data management device, encrypted data management method, and encrypted data management program | |||
220 | 9237009 | Disrupting offline password attacks | |||
221 | 9231925 | Network authentication method for secure electronic transactions | |||
222 | 9231770 | Combined digital certificate | |||
223 | 9231762 | Method of secure communication, controlled device, and control program | |||
224 | 9230630 | Physically unclonable function based on the initial logical state of magnetoresistive random-access memory | |||
225 | 9229687 | Private two-party computation using partially homomorphic encryption | |||
2015 | |||||
226 | 9219805 | Memory system for portable telephone | |||
227 | 9219730 | Securing a secret of a user | |||
228 | 9219714 | ID-based encryption and signature method and terminal | |||
229 | 9219612 | Method of mutually authenticating a reader and a radio tag | |||
230 | 9219606 | Method and device for digital data blocks encryption and decryption | |||
231 | 9219604 | Generating an encrypted message for storage | |||
232 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
233 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
234 | 9215068 | Search system, search method, and program | |||
235 | 9214214 | Physically unclonable function based on the random logical state of magnetoresistive random-access memory | |||
236 | 9213867 | Secure cloud database platform with encrypted database queries | |||
237 | 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
238 | 9209980 | Provisioning a shared secret to a portable electronic device and to a service entity | |||
239 | 9209974 | Functional encryption key management | |||
240 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
241 | 9208330 | System for execution of security related functions | |||
242 | 9203622 | Cryptographic processing system, cryptographic processing method, cryptograhpic processing program, and key generation device | |||
243 | 9203621 | Policy-based data management | |||
244 | 9191214 | Procedure for a multiple digital signature | |||
245 | 9191208 | Schemes for signcryption | |||
246 | 9191199 | Method and apparatus for public-key cryptography based on error correcting codes | |||
247 | 9184914 | Information processing apparatus and information processing method | |||
248 | 9183411 | Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption | |||
249 | 9183158 | System and method for hardware based security | |||
250 | 9182943 | Methods and devices for prime number generation | |||
251 | 9178700 | Information processing apparatus, information processing method, program, and recording medium | |||
252 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
253 | 9176707 | Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program | |||
254 | 9172530 | Apparatus and method for generating secret key for ID-based encryption system and recording medium having program recorded thereon for causing computer to execute the method | |||
255 | 9172529 | Hybrid encryption schemes | |||
256 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
257 | 9166953 | Method and apparatus for providing identity based encryption in distributed computations | |||
258 | 9166791 | Method and apparatus for user identity verification | |||
259 | 9166790 | Commission information generator for making processes on communication performed by another computer | |||
260 | 9166778 | Secure group messaging | |||
261 | 9164732 | Multiplication method and modular multiplier using redundant form recoding | |||
262 | 9160530 | Method and apparatus for verifiable generation of public keys | |||
263 | 9154494 | Self-signed implicit certificates | |||
264 | 9154306 | Privacy-preserving flexible anonymous-pseudonymous access | |||
265 | 9154302 | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number | |||
266 | 9152779 | Protecting codes, keys and user credentials with identity and patterns | |||
267 | 9152383 | Method for encrypting a message through the computation of mathematical functions comprising modular multiplications | |||
268 | 9148282 | Method to calculate square roots for elliptic curve cryptography | |||
269 | 9143327 | Power line communication (PLC) network nodes using cipher then segment security | |||
270 | 9141802 | Computing device boot software authentication | |||
271 | 9141372 | Secure and interruptible transfer of a map update package to a navigation device | |||
272 | 9135834 | Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation | |||
273 | 9130753 | Authentication using security device with electronic interface | |||
274 | 9130745 | Encryption processing device and method | |||
275 | 9130744 | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |||
276 | 9130664 | Wireless communications using a sound signal | |||
277 | 9129122 | Signature verification apparatus, signature verification method, program, and recording medium | |||
278 | 9124571 | Network authentication method for secure user identity verification | |||
279 | 9124430 | Centralized policy management for security keys | |||
280 | 9118664 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
281 | 9118482 | Fault tolerant apparatus and method for elliptic curve cryptography | |||
282 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
283 | 9112700 | Personal assistance safety systems and methods | |||
284 | 9111122 | Asymmetric cryptographic device with local private key generation and method therefor | |||
285 | 9111115 | Oblivious transfer with hidden access control lists | |||
286 | 9106636 | Information authentication method and information authentication system | |||
287 | 9106635 | System and method for connecting client devices to a network | |||
288 | 9106410 | Identity based authenticated key agreement protocol | |||
289 | 9106408 | Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program | |||
290 | 9094206 | Method and system for secure session establishment using identity-based encryption (VDTLS) | |||
291 | 9094205 | Secure provisioning in an untrusted environment | |||
292 | 9094189 | Cryptographic method for communicating confidential information | |||
293 | 9092645 | Efficient multiplication, exponentiation and modular reduction implementations | |||
294 | 9088419 | Keyed PV signatures | |||
295 | 9087192 | Electronic circuit and method for monitoring a data processing | |||
296 | 9086905 | Interpreting I/O operation requests from pageable guests without host intervention | |||
297 | 9083726 | Automatic content publication and distribution | |||
298 | 9077540 | Method for verification of decryption processes | |||
299 | 9077537 | Generating secure private keys for use in a public key communications environment | |||
300 | 9077536 | Method and apparatus for solving discrete logarithm problem using pre-computation table | |||
301 | 9077525 | User-controlled data encryption with obfuscated policy | |||
302 | 9076000 | Authentication device, authentication method, and program | |||
303 | 9071445 | Method and system for generating implicit certificates and applications to identity-based encryption (IBE) | |||
304 | 9071442 | Signcryption method and device and corresponding signcryption verification method and device | |||
305 | 9071427 | Method and apparatus for establishing a key agreement protocol | |||
306 | 9065637 | System and method for securing private keys issued from distributed private key generator (D-PKG) nodes | |||
307 | 9065636 | Data encryption system and method | |||
308 | 9064229 | Real-time asset tracking using discovery services | |||
309 | 9059852 | Validating a user's identity utilizing information embedded in a image file | |||
310 | 9054877 | Data expansion using an approximate method | |||
311 | 9025767 | Method and apparatus for querying content protected by identity-based encryption | |||
312 | 8997174 | Configuring browser policy settings on client computing devices | |||
313 | 8995665 | Role based encryption without key management system | |||
314 | 8988713 | Secure printing in a cloud-based print system | |||
315 | 8983064 | Strengthened public key protocol | |||
316 | 8972300 | Content distribution system | |||
317 | 8966287 | Systems and methods for secure third-party data storage | |||
318 | 8958552 | Data processing device | |||
319 | 8953787 | Strengthened public key protocol | |||
320 | 8949609 | Anonymous authentication signature system, user device, verification device, signature method, verification method, and program therefor | |||
321 | 8948401 | Method for filtering of abnormal ONT with same serial number in a GPON system | |||
322 | 8942378 | Method and device for encrypting multicast service in passive optical network system | |||
323 | 8934631 | Decompressing apparatus and compressing apparatus | |||
2014 | |||||
324 | 8909929 | Stored public key validity registers for cryptographic devices and systems | |||
325 | 8898474 | Support of multiple pre-shared keys in access point | |||
326 | 8880881 | Secure communications between devices | |||
327 | 8861733 | Method of personalizing a NFC chipset | |||
328 | 8856536 | Method and apparatus for secure firmware download using diagnostic link connector (DLC) and OnStar system | |||
329 | 8856531 | Message bus key agreement scheme | |||
330 | 8855315 | Method and system for realizing secure forking call session in IP multimedia subsystem | |||
331 | 8842840 | Demand based encryption and key generation and distribution systems and methods | |||
332 | 8826026 | Systems and methods for tracking electronic files in computer networks using electronic signatures | |||
333 | 8826009 | Method of handling a certification request | |||
334 | 8817972 | Method of authentication using a decoding of an error correcting code on the basis of a public matrix | |||
335 | 8787566 | Strong encryption | |||
336 | 8781113 | Decryption apparatus and method of decrypting ciphertext of the same | |||
337 | 8781110 | Unified system architecture for elliptic-curve cryptography | |||
338 | 8767967 | Physical digital media delivery | |||
339 | 8761390 | Production of cryptographic keys for an embedded processing device | |||
340 | 8750500 | Multi-dimensional montgomery ladders for elliptic curves | |||
341 | 8745416 | Systems and methods for secure third-party data storage | |||
342 | 8745379 | Systems and methods for securing data in motion | |||
343 | 8744079 | Secure communication system | |||
344 | 8744078 | System and method for securing multiple data segments having different lengths using pattern keys having multiple different strengths | |||
345 | 8744075 | Quantum public key encryption system | |||
346 | 8744074 | Method and device for countering fault attacks | |||
347 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
348 | 8737614 | Document imaging system with identity-based encryption | |||
349 | 8737607 | Finding nearby users without revealing own location | |||
350 | 8726023 | Authentication using GAA functionality for unidirectional network connections | |||
351 | 8718276 | Cryptography on a elliptical curve | |||
352 | 8712042 | Implicit certificate scheme | |||
353 | 8712038 | Cryptography on a simplified elliptical curve | |||
354 | 8711843 | Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol | |||
355 | 8705746 | Data security in an off-premise environment | |||
356 | 8700899 | Forward-secure key unlocking for cryptographic devices | |||
357 | 8694771 | Method and system for a certificate-less authenticated encryption scheme using identity-based encryption | |||
358 | 8693684 | Method and apparatus for computing a shared secret key | |||
359 | 8688991 | Media player embodiments and secure playlist packaging | |||
360 | 8683189 | On-chip security method and apparatus | |||
361 | 8661260 | Methods and systems for indicating trustworthiness of secure communications | |||
362 | 8649508 | System and method for implementing elliptic curve scalar multiplication in cryptography | |||
363 | 8627107 | System and method of securing private health information | |||
364 | 8625797 | Releasing a service on an electronic appliance | |||
365 | 8625783 | Method and apparatus for providing privacy of user identity and characteristics in a communication system | |||
366 | 8625780 | Reduction of side-channel information by interacting crypto blocks | |||
2013 | |||||
367 | 8621239 | Method for strengthening the implementation of ECDSA against power analysis | |||
368 | 8615798 | Optimizing a data deduplication system using client authentication information | |||
369 | 8612750 | Creating and using secure communications channels for virtual universes | |||
370 | 8601260 | Creation of user digital certificate for portable consumer payment device | |||
371 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
372 | 8566601 | Systems and methods for functional encryption using a string of arbitrary length | |||
373 | 8559632 | Method for transferring messages comprising extensible markup language information | |||
374 | 8549299 | Accelerated key agreement with assisted computations | |||
375 | 8543822 | Device authentication | |||
376 | 8539606 | Data protection method and data protection system | |||
377 | 8538028 | System and method for secure electronic communication services | |||
378 | 8527766 | Reducing leakage of information from cryptographic systems | |||
379 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
380 | 8516271 | Securing non-volatile memory regions | |||
381 | 8509429 | Protection of a prime number generation against side-channel attacks | |||
382 | 8509428 | High-speed pipelined ARIA encryption apparatus | |||
383 | 8495373 | Method of generating a cryptographic key, network and computer program therefor | |||
384 | 8484461 | Method and apparatus for external organization path length validation within a public key infrastructure (PKI) | |||
385 | 8472621 | Protection of a prime number generation for an RSA algorithm | |||
386 | 8462944 | Method of public key generation | |||
387 | 8462940 | Public key cryptosystem and associated method utilizing a hard lattice with O(n log n) random bits for security | |||
388 | 8458776 | Low-latency peer session establishment | |||
389 | 8458494 | Systems and methods for secure third-party data storage | |||
390 | 8428252 | Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables | |||
391 | 8417967 | Storage device data encryption using a binary large object (BLOB) | |||
392 | 8417965 | Method and circuit for secure definition and integration of cores | |||
393 | 8417956 | Encryption and authentication systems and methods | |||
394 | 8396211 | System and method for dynamic modification of allowable electronic message properties | |||
395 | 8385541 | Method of performing elliptic polynomial cryptography with elliptic polynomial hopping | |||
396 | 8379849 | Method and apparatus for generating a public key in a manner that counters power analysis attacks | |||
397 | 8370631 | Trusted identities on a trusted computing platform | |||
398 | 8369519 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
399 | 8369518 | Electronic data encryption and encrypted data decryption system, and its method | |||
400 | 8356182 | Electronic signature system and electronic signature verifying method | |||
401 | 8351601 | Elliptic polynomial cryptography with secret key embedding | |||
402 | 8347376 | Techniques for distributing a new communication key within a virtual private network | |||
403 | 8347349 | Configuring browser policy settings on client computing devices | |||
2012 | |||||
404 | 8340284 | Key generation device, key derivation device, encryption device, decryption device, method and program | |||
405 | 8331568 | Efficient distribution of computation in key agreement | |||
406 | 8331558 | Method of cipher block chaining using elliptic curve cryptography | |||
407 | 8321674 | Information processing device, computer program, and information processing system | |||
408 | 8320742 | Method and apparatus for playing data between external device and TV set | |||
409 | 8320559 | Identity-based-encryption system | |||
410 | 8312276 | Method for sending and receiving an evaluation of reputation in a social network | |||
411 | 8311214 | Method for elliptic curve public key cryptographic validation | |||
412 | 8307208 | Confidential communication method | |||
413 | 8296563 | Method of handling a certification request | |||
414 | 8296381 | Method and computer program product for receiving an update to a previously received email message | |||
415 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
416 | 8291218 | Creating and using secure communications channels for virtual universes | |||
417 | 8290149 | Method of obscuring cryptographic computations | |||
418 | 8280048 | Method for strengthening the implementation of ECDSA against power analysis | |||
419 | 8270601 | Implicit certificate scheme | |||
420 | 8261089 | Method and system for authenticating a user by means of a mobile device | |||
421 | 8259948 | Virtual TPM key migration using hardware keys | |||
422 | 8255691 | Apparatus for batch verification and method using the same | |||
423 | 8250367 | Cryptographic applications of efficiently evaluating large degree isogenies | |||
424 | 8243920 | Method for scalar multiplication in elliptic curve groups over binary polynomial fields for side-channel attack-resistant cryptosystems | |||
425 | 8243338 | Providing privacy for electronic voting using encryption | |||
426 | 8239331 | Auction verification | |||
427 | 8233618 | Method and system for generating a pair of public key and secret key | |||
428 | 8219819 | Public key encryption with digital signature scheme | |||
429 | 8214638 | Using multiple certificates to distribute public keys | |||
430 | 8213608 | Roaming utilizing an asymmetric key pair | |||
431 | 8213605 | Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption | |||
432 | 8213604 | Signcryption scheme based on elliptic curve cryptography | |||
433 | 8194854 | Method and apparatus for optimizing advanced encryption standard (AES) encryption and decryption in parallel modes of operation | |||
434 | 8181035 | Methods, apparatus and systems to improve security in computer systems | |||
435 | 8156336 | Device authentication | |||
436 | 8145899 | Creation of user digital certificate for portable consumer payment device | |||
437 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
438 | 8136166 | Installation of black box for trusted component for digital rights management (DRM) on computing device | |||
439 | 8130964 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
440 | 8117453 | Customization of an electronic circuit | |||
441 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
442 | 8116451 | Key validation scheme | |||
443 | 8108678 | Identity-based signcryption system | |||
444 | 8108675 | External signature device for a PC with wireless communication capacity | |||
445 | 8107623 | Method for verifying a first identity and a second identity of an entity | |||
446 | 8098820 | Conditional access system for broadcast digital television | |||
447 | 8091119 | Identity based network mapping | |||
448 | 8090947 | Key agreement and transport protocol with implicit signatures | |||
449 | 8090099 | Computer-readable recording medium recording program and apparatus for encryption/decryption, apparatus for multiplication in extension field | |||
450 | 8089861 | Data verification using signature | |||
2011 | |||||
451 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
452 | 8074265 | Methods and systems for verifying a location factor associated with a token | |||
453 | 8074073 | Certificate-based encryption and public key infrastructure | |||
454 | 8073143 | Information processing device and method | |||
455 | 8045706 | System of efficiently implementing secure hash algorithm (SHA-1) in digital hardware that accomplishes optimal computation speed using minimal hardware resources | |||
456 | 8041951 | Code-based communication connection management | |||
457 | 8028157 | On-chip security method and apparatus | |||
458 | 8024575 | System and method for creation and use of strong passwords | |||
459 | 8024567 | Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof | |||
460 | 8023647 | Password self encryption method and system and encryption by keys generated from personal secret information | |||
461 | 8023646 | Identity-based-encryption extensions formed using multiple instances of an identity based encryption scheme | |||
462 | 8005209 | Invariance based concurrent error detection for the advanced encryption standard | |||
463 | 8001384 | Authentication system, authentication method, attesting device, verification device, their programs, and recording medium | |||
464 | 8000470 | Method of public key generation | |||
465 | 7995752 | Method for accelerating cryptographic operations on elliptic curves | |||
466 | 7991162 | Accelerating scalar multiplication on elliptic curve cryptosystems over prime fields | |||
467 | 7987366 | Key management for network elements | |||
468 | 7983415 | Method for performing iterative scalar multiplication which is protected against address bit attack | |||
469 | 7978846 | Scale-invariant barrett reduction for elliptic-curve cyrptography | |||
470 | 7974408 | Scrambling of a calculation performed according to an RSA-CRT algorithm | |||
471 | 7962765 | Methods and systems for tamper resistant files | |||
472 | 7962753 | Method and a circuit for SHA operation with power saved | |||
473 | 7961877 | Factoring based modular exponentiation | |||
474 | 7961876 | Method to produce new multivariate public key cryptosystems | |||
475 | 7957527 | Cryptographic processing apparatus | |||
476 | 7957525 | Encryption and signature schemes using message mappings to reduce the message size | |||
477 | 7945044 | Method and system for performing an untraceable secret matching | |||
478 | 7940936 | Public key generation method in elliptic curve cryptography and public key generation system executing the method | |||
479 | 7936882 | Method to trace traceable parts of original private keys in a public-key cryptosystem | |||
480 | 7936871 | Altering the size of windows in public key cryptographic computations | |||
481 | 7936870 | Rotation of keys during encryption/decryption | |||
482 | 7936869 | Verifying digital signature based on shared knowledge | |||
483 | 7929689 | Call signs | |||
484 | 7925010 | Message deciphering method, system and article | |||
485 | 7917757 | Method and system for authentication of electronic communications | |||
486 | 7912886 | Configurable exponent FIFO | |||
487 | 7907724 | Method and apparatus for protecting an RSA calculation on an output by means of the chinese remainder theorem | |||
488 | 7904721 | Digital certificates | |||
489 | 7895432 | Method and apparatus for using a third party authentication server | |||
490 | 7889866 | Information leakage prevention apparatus and information leakage prevention method | |||
491 | 7886364 | Encrypted key cache | |||
492 | 7885412 | Pre-generation of generic session keys for use in communicating within communications environments | |||
493 | 7882367 | Information recording and reproducing apparatus and method | |||
494 | 7869593 | Software for providing based on shared knowledge public keys having same private key | |||
2010 | |||||
495 | 7860247 | Identity based encryption | |||
496 | 7856101 | Method for elliptic curve scalar multiplication | |||
497 | 7856100 | Privacy-preserving data aggregation using homomorphic encryption | |||
498 | 7853801 | System and method for providing authenticated encryption in GPON network | |||
499 | 7853793 | Trusted signature with key access permissions | |||
500 | 7844051 | Trapdoor one-way functions on elliptic curves and their application to shorter signatures and asymmetric encryption | |||
501 | 7832016 | Microprocessor system and method for detecting the exchange of modules of the system | |||
502 | 7814313 | System, terminal, network entity, method and computer program product for authorizing communication message | |||
503 | 7809132 | Implementations of AES algorithm for reducing hardware with improved efficiency | |||
504 | 7801299 | Techniques for merging tables | |||
505 | 7796751 | Certificate-based encryption and public key infrastructure | |||
506 | 7794323 | Gaming apparatus with encryption and method | |||
507 | 7792287 | Leak-resistant cryptographic payment smartcard | |||
508 | 7792286 | Signature generation device and signature verification device | |||
509 | 7783044 | System for on-line and off-line decryption | |||
510 | 7783040 | Encryption in a secure computerized gaming system | |||
511 | 7779481 | Systems and methods for electronic postmarking of data including location data | |||
512 | 7779259 | Key agreement and transport protocol with implicit signatures | |||
513 | 7778422 | Security associations for devices | |||
514 | 7778414 | Encryption method based on factorization | |||
515 | 7773747 | Encryption apparatus, decryption apparatus, and method | |||
516 | 7773746 | Encryption system, encryption device, decryption device, program, and integrated circuit | |||
517 | 7769167 | Weil and Tate pairing techniques using parabolas | |||
518 | 7760873 | Method and a system for a quick verification rabin signature scheme | |||
519 | 7758422 | Hard drive authentication | |||
520 | 7752447 | Information-processing system and method, information-transmission-processing apparatus, and information-reception-processing apparatus | |||
521 | 7751558 | Certificate-based encryption and public key infrastructure | |||
522 | 7739504 | Signature generation apparatus and signature verification apparatus | |||
523 | 7734932 | System and method for securing executable code | |||
524 | 7715563 | Rapid acquisition of state vectors in an encrypted data communication system | |||
525 | 7707420 | Public key encryption with digital signature scheme | |||
526 | 7698736 | Secure delegation using public key authentication | |||
527 | 7694329 | Secure delegation using public key authentication | |||
528 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
529 | 7688973 | Encryption apparatus, decryption apparatus, key generation apparatus, program, and method | |||
530 | 7685414 | Subscription management service for secure messaging system | |||
531 | 7681031 | Method and apparatus to provide authentication code | |||
532 | 7680280 | Electronic device, control method thereof, security program and others | |||
533 | 7680272 | Inverse calculation circuit, inverse calculation method, and storage medium encoded with computer-readable computer program code | |||
534 | 7680271 | Zero-knowledge proof cryptography methods and devices | |||
535 | 7680270 | System for elliptic curve encryption using multiple points on an elliptic curve derived from scalar multiplication | |||
536 | 7673142 | Efficient method for providing secure remote access | |||
537 | 7664269 | Encrypting message for secure transmission | |||
538 | 7664260 | Signature generation device, key generation device, and signature generation method | |||
539 | 7664259 | Encryption and verification using partial public key | |||
540 | 7664258 | Randomized sparse formats for efficient and secure computation on elliptic curves | |||
541 | 7660989 | System for, and method of, authenticating an electronic message to a recipient | |||
542 | 7657748 | Certificate-based encryption and public key infrastructure | |||
543 | 7657029 | Systems and methods for generating random addition chains | |||
544 | 7649991 | Method of a public key encryption and a cypher communication both secure against a chosen-ciphertext attack | |||
545 | 7647498 | Device authentication | |||
2009 | |||||
546 | 7640427 | System and method for secure electronic communication in a partially keyless environment | |||
547 | 7639806 | Fingerprinting digital devices using electromagnetic characteristics of their communications | |||
548 | 7639799 | Cryptographically processing data based on a Cassels-Tate pairing | |||
549 | 7636441 | Method for secure key exchange | |||
550 | 7634091 | System and method of hiding cryptographic private keys | |||
551 | 7634087 | Systems and methods for identity-based encryption and related cryptographic techniques | |||
552 | 7631183 | System and method for retrieving related certificates | |||
553 | 7623655 | Computing modular polynomials modulo large primes | |||
554 | 7609834 | Personal authenticating multi-function peripheral | |||
555 | 7596689 | Secure and reliable document delivery using routing lists | |||
556 | 7594261 | Cryptographic applications of the Cartier pairing | |||
557 | 7593527 | Providing digital signature and public key based on shared knowledge | |||
558 | 7593526 | Method and apparatus for compressing rabin signatures | |||
559 | 7590236 | Identity-based-encryption system | |||
560 | 7590235 | Reduction calculations in elliptic curve cryptography | |||
561 | 7587045 | System and method for securing document transmittal | |||
562 | 7571320 | Circuit and method for providing secure communications between devices | |||
563 | 7567669 | Strengthened public key protocol | |||
564 | 7562223 | Multifunction device with secure job release | |||
565 | 7551737 | Cryptographic keys using random numbers instead of random primes | |||
566 | 7539861 | Creating and storing one or more digital certificates assigned to subscriber for efficient access using a chip card | |||
567 | 7536011 | Tamper-proof elliptic encryption with private key | |||
568 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
569 | 7512800 | Key management technique for establishing a secure channel | |||
570 | 7512233 | Method and apparatus for computing a shared secret key | |||
571 | 7508936 | Hardware accelerator for elliptic curve cryptography | |||
572 | 7505585 | Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same | |||
573 | 7503060 | Reactive system safety verification device, method, program, and recording medium containing the program | |||
574 | 7499544 | Use of isogenies for design of cryptosystems | |||
575 | 7492897 | Conditional access system for broadcast digital television | |||
576 | 7486789 | Device and method for calculation on elliptic curve | |||
577 | 7480380 | Method for efficient generation of modulo inverse for public key cryptosystems | |||
578 | 7478239 | Electronic ticket vending system | |||
2008 | |||||
579 | 7471792 | Key agreement system, shared-key generation apparatus, and shared-key recovery apparatus | |||
580 | 7461406 | Access control for digital content | |||
581 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
582 | 7457408 | Calculation unit for executing a cryptographic protocol | |||
583 | 7450719 | Gigabit Ethernet-based passive optical network and data encryption method | |||
584 | 7447311 | Method of designing optimum encryption function and optimized encryption apparatus in a mobile communication system | |||
585 | 7436957 | Audio cassette emulator with cryptographic media distribution control | |||
586 | 7434052 | Method and device for producing an encrypted payload data stream and method and device for decrypting an encrypted payload data stream | |||
587 | 7434050 | Efficient method for providing secure remote access | |||
588 | 7428749 | Secure delegation using public key authorization | |||
589 | 7424114 | Method for enhancing security of public key encryption schemas | |||
590 | 7421074 | Security system using RSA algorithm and method thereof | |||
591 | 7412061 | Encrypting a digital object on a key ID selected therefor | |||
592 | 7409553 | Public key certificate generation method, validation method and apparatus thereof | |||
593 | 7409543 | Method and apparatus for using a third party authentication server | |||
594 | 7406089 | Data verification using signature | |||
595 | 7404078 | Methods and apparatus for private certificates in public key cryptography | |||
596 | 7397917 | Method and apparatus for generating a cryptographic key | |||
597 | 7395431 | Data encryption method, recording medium, data transfer apparatus, and encrypted data decryption method | |||
598 | 7386123 | Method of implementing in an electronic component a cryptographic algorithm for finding the public exponent | |||
599 | 7386122 | Method for proving the authenticity or integrity of a message by means of a public exponent equal to the power of two | |||
600 | 7382877 | RSA cryptographic method and system | |||
601 | 7379550 | Method for the computer-assisted production of public keys for encoding information and device for carrying out said method | |||
602 | 7373521 | Semiconductor IC, information processing method, information processing device, and program storage medium | |||
603 | 7359508 | Method of securely implementing a cryptography algorithm of the RSA type, and a corresponding component | |||
604 | 7356847 | System for dynamically encrypting content for secure internet commerce and providing embedded fulfillment software | |||
605 | 7356140 | Encrypting device, decrypting device, cryptosystem including the same devices, encrypting method, and decrypting method | |||
606 | 7350086 | Creation of image file | |||
607 | 7349538 | Hierarchical identity-based encryption and signature schemes | |||
608 | 7346159 | Generic modular multiplier using partial reduction | |||
609 | 7340606 | Digital certificates | |||
610 | 7340061 | Information processing apparatus, information processing method and providing medium | |||
611 | 7337315 | Efficient certificate revocation | |||
612 | 7336791 | Information processing apparatus | |||
613 | 7330549 | Method of producing a cryptographic unit for an asymmetric cryptography system using a discrete logarithm function | |||
614 | 7316028 | Method and system for transmitting information across a firewall | |||
2007 | |||||
615 | 7308572 | Method of printing a document | |||
616 | 7302703 | Hardware token self enrollment process | |||
617 | 7298839 | Squared Weil and Tate pairing techniques for use with elliptic curves | |||
618 | 7295671 | Advanced encryption standard (AES) hardware cryptographic engine | |||
619 | 7287164 | Method and system for encoding signatures to authenticate files | |||
620 | 7286666 | Countermeasure method in an electric component implementing an elliptical curve type public key cryptography algorithm | |||
621 | 7286665 | System and method for transferring the right to decode messages | |||
622 | 7266197 | Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors | |||
623 | 7263185 | Key based decipher including its generation, distribution and usage | |||
624 | 7254718 | Tamper-resistant processing method | |||
625 | 7251728 | Secure and reliable document delivery using routing lists | |||
626 | 7236590 | Method and apparatus for protecting data | |||
627 | 7233662 | Numerical array output device, a numerical array output method, an encryption device, and a decryption device | |||
628 | 7228430 | Security system for preventing a personal computer from being used by an unauthorized people | |||
629 | 7213158 | Distributed autonomic backup | |||
630 | 7206936 | Revocation and updating of tokens in a public key infrastructure system | |||
631 | 7197637 | Authorization process using a certificate | |||
632 | 7184547 | Authenticating or signature method with reduced computations | |||
633 | 7178035 | Write once system and method for facilitating digital encrypted transmissions | |||
634 | 7174016 | Modular exponentiation algorithm in an electronic component using a public key encryption algorithm | |||
635 | 7171000 | Simplified addressing for private communications | |||
636 | 7167565 | Efficient techniques for sharing a secret | |||
637 | 7165180 | Monolithic semiconductor device for preventing external access to an encryption key | |||
638 | 7165174 | Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management | |||
639 | 7162033 | Countermeasure procedures in an electronic component implementing an elliptical curve type public key encryption algorithm | |||
640 | 7159121 | Transmission of information to a reproduction device having user identification by organism information of a specified type | |||
2006 | |||||
641 | 7152158 | Public key certificate issuing system, public key certificate issuing method, information processing apparatus, information recording medium, and program storage medium | |||
642 | 7146009 | Secure electronic messaging system requiring key retrieval for deriving decryption keys | |||
643 | 7139396 | Koblitz exponentiation with bucketing | |||
644 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
645 | 7130422 | Information security device, prime number generation device, and prime number generation method | |||
646 | 7127063 | Method and apparatus for computing a shared secret key | |||
647 | 7114070 | System and method for automatic digital certificate installation on a network device in a data-over-cable system | |||
648 | 7113595 | Generation of a random number that is non-divisible by a set of prime numbers | |||
649 | 7096352 | Security protocol structure in application layer | |||
650 | 7088822 | Information playback device, information recording device, information playback method, information recording method, and information recording medium and program storage medium used therewith | |||
651 | 7088821 | Absolute public key cryptographic system and method surviving private-key compromise with other advantages | |||
652 | 7085383 | Secured cellular telephone communications system, method, and computer program product | |||
653 | 7082538 | Electronically verified digital signature and document delivery system and method | |||
654 | 7080254 | Method, system, device for proving authenticity of an entity or integrity of a message | |||
655 | 7073057 | Method and apparatus for obtaining status of public key certificate updates | |||
656 | 7058808 | Method for making a blind RSA-signature and apparatus therefor | |||
657 | 7054445 | Authentication method and schemes for data integrity protection | |||
658 | 7039816 | Using smartcards or other cryptographic modules for enabling connected devices to access encrypted audio and visual content | |||
659 | 7035405 | Method for establishing a common key between a central station and a group of subscribers | |||
660 | 7016498 | Encrypting a digital object on a key ID selected therefor | |||
661 | 7010692 | Cryptographic methods for remote authentication | |||
662 | 6996711 | Certification validation system | |||
663 | 6993136 | Cryptographic key exchange method using efficient elliptic curve | |||
2005 | |||||
664 | 6968060 | Method for verifying the use of public keys generated by an on-board system | |||
665 | 6959091 | Cryptography private key storage and recovery method and apparatus | |||
666 | 6957333 | System and method for encrypted communications between electronic devices | |||
667 | 6956950 | Computer readable medium having a private key encryption program | |||
668 | 6956947 | Extraction of multiple single keys from a compressed key | |||
669 | 6956946 | Method and device for cryptographic processing with the aid of an elliptic curve on a computer | |||
670 | 6952476 | Verification of the private components of a public-key cryptographic system | |||
671 | 6950948 | Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections | |||
672 | 6948065 | Platform and method for securely transmitting an authorization secret | |||
673 | 6948064 | Method and apparatus for providing public key security control for a cryptographic processor | |||
674 | 6944300 | Method for migrating a base chip key from one computer system to another | |||
675 | 6940980 | High security cryptosystem | |||
676 | 6940979 | Management of certificates for public key infrastructure | |||
677 | 6937728 | Verifiable anonymous channel | |||
678 | 6937726 | System and method for protecting data files by periodically refreshing a decryption key | |||
679 | 6934392 | Split-key key-agreement protocol | |||
680 | 6934389 | Method and apparatus for providing bus-encrypted copy protection key to an unsecured bus | |||
681 | 6931126 | Non malleable encryption method and apparatus using key-encryption keys and digital signature | |||
682 | 6928546 | Identity verification method using a central biometric authority | |||
683 | 6925182 | Administration and utilization of private keys in a networked environment | |||
684 | 6922785 | Apparatus and a method for secure communications for network computers | |||
685 | 6912657 | Method and arrangement in a communication network | |||
686 | 6912656 | Method and apparatus for sending encrypted electronic mail through a distribution list exploder | |||
687 | 6912654 | Secret key generating method, encryption method, cryptographic communication method and cryptographic communication system | |||
688 | 6912285 | Mechanism for efficient private bulk messaging | |||
689 | 6909786 | Cryptographic trap door with timed lock and controlled escrow | |||
690 | 6909702 | Method and apparatus for out-of-band transmission of broadcast service option in a wireless communication system | |||
691 | 6898288 | Method and system for secure key exchange | |||
692 | 6898287 | Cryptographic system using chaotic dynamics | |||
693 | 6886098 | Systems and methods for compression of key sets having multiple keys | |||
694 | 6886096 | Identity-based encryption system | |||
695 | 6876745 | Method and apparatus for elliptic curve cryptography and recording medium therefore | |||
696 | 6873977 | Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries | |||
697 | 6873706 | Processing apparatus, program, or system of secret information | |||
698 | 6868160 | System and method for providing secure sharing of electronic data | |||
699 | 6851049 | Method and apparatus for facilitating secure anonymous email recipients | |||
700 | 6839839 | Public key distribution using an approximate linear function | |||
701 | 6839838 | Data management system, information processing apparatus, authentification management apparatus, method and storage medium | |||
702 | 6839437 | Method and apparatus for managing keys for cryptographic operations | |||
2004 | |||||
703 | 6834272 | Privacy preserving negotiation and computation | |||
704 | 6834112 | Secure distribution of private keys to multiple clients | |||
705 | 6816970 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
706 | 6816966 | Techniques for securing data flow in internet multicasting | |||
707 | 6813358 | Method and system for timed-release cryptosystems | |||
708 | 6813357 | Exclusive key sharing method | |||
709 | 6804782 | Countermeasure to power attack and timing attack on cryptographic operations | |||
710 | 6801999 | Passive and active software objects containing bore resistant watermarking | |||
711 | 6798884 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
712 | 6789195 | Secure data processing method | |||
713 | 6788788 | Cryptographic communication method, encryption method, and cryptographic communication system | |||
714 | 6785388 | Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium | |||
715 | 6782100 | Accelerated finite field operations on an elliptic curve | |||
716 | 6779111 | Indirect public-key encryption | |||
717 | 6778666 | Cryptographic method using construction of elliptic curve cryptosystem | |||
718 | 6754820 | Multiple level access system | |||
719 | 6751318 | Method and apparatus for digital signature authentication | |||
720 | 6744894 | Data management system | |||
721 | 6741991 | Data management system | |||
722 | 6731755 | Split-key cryptographic system and method | |||
723 | 6724894 | Cryptographic device having reduced vulnerability to side-channel attack and method of operating same | |||
724 | 6721887 | Data copyright management system | |||
725 | 6721421 | Method for encrypting information represented as a numerical value | |||
726 | 6718468 | Method for associating a password with a secured public/private key pair | |||
727 | 6715073 | Secure server using public key registration and methods of operation | |||
728 | 6711263 | Secure distribution and protection of encryption key information | |||
729 | 6707801 | Method and apparatus for data transport in a wireless communication system | |||
730 | 6697488 | Practical non-malleable public-key cryptosystem | |||
731 | 6694025 | Method and apparatus for secure distribution of public/private key pairs | |||
732 | 6687822 | Method and system for providing translation certificates | |||
733 | 6683955 | Method for receiving a secured transmission of information through a plurality of frequency orthogonal subchannels | |||
734 | 6683953 | Encoding method, encoding-decoding apparatus, and code communications system | |||
735 | 6678821 | Method and system for restricting access to the private key of a user in a public key infrastructure | |||
2003 | |||||
736 | 6665405 | Cyclotomic polynomial construction of discrete logarithm cryptosystems over finite fields | |||
737 | 6658569 | Secret key cryptographic process for protecting a computer system against attacks by physical analysis | |||
738 | 6618483 | Elliptic curve encryption systems | |||
739 | 6614909 | Methods, systems, and circuits for generating keys for public key cryptosystems using parallel processing for modular operations of IC cards | |||
740 | 6603445 | Method and apparatus for factoring large numbers with optoelectronic devices | |||
741 | 6598163 | Flash mixing apparatus and method | |||
742 | 6587946 | Method and system for quorum controlled asymmetric proxy encryption | |||
743 | 6587563 | Cryptographic system using chaotic dynamics | |||
744 | 6564322 | Method and apparatus for watermarking with no perceptible trace | |||
745 | 6560336 | Apparatus for operating double vector and encrypting system including the same | |||
746 | 6553493 | Secure mapping and aliasing of private keys used in public key cryptography | |||
747 | 6550009 | Encryption system for distributing a common crypt key | |||
748 | 6530020 | Group oriented public key encryption and key management system | |||
749 | 6523116 | Secure personal information card database system | |||
750 | 6507656 | Non malleable encryption apparatus and method | |||
2002 | |||||
751 | 6496929 | Generating RSA moduli including a predetermined portion | |||
752 | 6490352 | Cryptographic elliptic curve apparatus and method | |||
753 | 6480831 | Method and apparatus for securely transmitting keys from a postage metering apparatus to a remote data center | |||
754 | 6480606 | Elliptic curve encryption method and system | |||
755 | 6480605 | Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon | |||
756 | 6477254 | Network system using a threshold secret sharing method | |||
757 | 6463536 | Data copyright management system | |||
758 | 6459791 | Public key cryptography method | |||
759 | 6446205 | Cryptosystems with elliptic curves chosen by users | |||
760 | 6446051 | Document transfer systems | |||
761 | 6430292 | System and method for controlling disclosure time of information | |||
762 | 6412072 | Parasitically powered microprocessor capable of transmitting data over a single data line and ground | |||
763 | 6411715 | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key | |||
764 | 6404890 | Generating RSA moduli including a predetermined portion | |||
765 | 6401204 | Process for cryptographic code management between a first computer unit and a second computer unit | |||
766 | 6396926 | Scheme for fast realization of encrytion, decryption and authentication | |||
767 | 6385318 | Encrypting method, deciphering method and certifying method | |||
768 | 6385317 | Method for providing a secure communication between two devices and application of this method | |||
769 | 6381699 | Leak-resistant cryptographic method and apparatus | |||
770 | 6381331 | Information sending system and method for sending encrypted information | |||
771 | 6378072 | Cryptographic system | |||
772 | 6377689 | Key transmission system | |||
773 | 6377688 | Cryptographic communication method and system | |||
774 | 6373946 | Communication security | |||
775 | 6370250 | Method of authentication and storage of private keys in a public key cryptography system (PKCS) | |||
776 | 6366673 | Method and device for executing a decrypting mechanism through calculating a standardized modular exponentiation for thwarting timing attacks | |||
777 | 6363480 | Ephemeral decryptability | |||
778 | 6351536 | Encryption network system and method | |||
779 | 6345098 | Method, system and apparatus for improved reliability in generating secret cryptographic variables | |||
780 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
781 | 6339824 | Method and apparatus for providing public key security control for a cryptographic processor | |||
782 | 6337909 | Generation of session keys for El Gamal-like protocols from low hamming weight integers | |||
2001 | |||||
783 | 6330674 | Use of biometrics as a methodology for defining components for ECC encryption | |||
784 | 6330332 | Prime number generation apparatus B-smoothness judgement apparatus and computer memory product | |||
785 | 6317833 | Practical mix-based election scheme | |||
786 | 6311270 | Method and apparatus for securing communication utilizing a security processor | |||
787 | 6307938 | Method, system and apparatus for generating self-validating prime numbers | |||
788 | 6307935 | Method and apparatus for fast elliptic encryption with direct embedding | |||
789 | 6304658 | Leak-resistant cryptographic method and apparatus | |||
790 | 6298137 | Ring-based public key cryptosystem method | |||
791 | 6292895 | Public key cryptosystem with roaming user capability | |||
792 | 6292892 | Apparatus and method for providing secured communications | |||
793 | 6289454 | Memory configuration which support multiple cryptographical algorithms | |||
794 | 6285760 | Method and apparatus for digital signature authentication | |||
795 | 6275936 | Decryption method and device, and access right authentication method and apparatus | |||
796 | 6272635 | Data copyright management system | |||
797 | 6263446 | Method and apparatus for secure distribution of authentication credentials to roaming users | |||
798 | 6259790 | Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion | |||
799 | 6240187 | Key replacement in a public key cryptosystem | |||
800 | 6237097 | Robust efficient distributed RSA-key generation | |||
801 | 6230269 | Distributed authentication system and method | |||
802 | 6219789 | Microprocessor with coprocessing capabilities for secure transactions and quick clearing capabilities | |||
803 | 6215877 | Key management server, chat system terminal unit, chat system and recording medium | |||
804 | 6212277 | Elliptic curve transformation device, utilization device and utilization system | |||
805 | 6195433 | Private key validity and validation | |||
806 | 6192472 | Method and apparatus for the secure distributed storage and retrieval of information | |||
807 | 6185685 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
808 | 6185546 | Apparatus and method for providing secured communications | |||
809 | 6170058 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use | |||
2000 | |||||
810 | 6154543 | Public key cryptosystem with roaming user capability | |||
811 | 6154541 | Method and apparatus for a robust high-speed cryptosystem | |||
812 | 6151676 | Administration and utilization of secret fresh random numbers in a networked environment | |||
813 | 6144740 | Method for designing public key cryptosystems against fault-based attacks with an implementation | |||
814 | 6141422 | Secure cryptographic multi-exponentiation method and coprocessor subsystem | |||
815 | 6141420 | Elliptic curve encryption systems | |||
816 | 6134431 | Personal station authentication system and authentication method | |||
817 | 6134325 | Key transmission system | |||
818 | 6125185 | System and method for encryption key generation | |||
819 | 6111956 | Method for secure key distribution over a nonsecure communications network | |||
820 | 6111952 | Asymmetrical cryptographic communication method and portable object therefore | |||
821 | 6108419 | Differential fault analysis hardening apparatus and evaluation method | |||
822 | 6098056 | System and method for controlling access rights to and security of digital content in a distributed information system, e.g., Internet | |||
823 | 6091819 | Accelerating public-key cryptography by precomputing randomly generated pairs | |||
824 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
825 | 6081793 | Method and system for secure computer moderated voting | |||
826 | 6081598 | Cryptographic system and method with fast decryption | |||
827 | 6081597 | Public key cryptosystem method and apparatus | |||
828 | 6078667 | Generating unique and unpredictable values | |||
829 | 6075864 | Method of establishing secure, digitally signed communications using an encryption key based on a blocking set cryptosystem | |||
830 | 6073125 | Token key distribution system controlled acceptance mail payment and evidencing system | |||
831 | 6072876 | Method and system for depositing private key used in RSA cryptosystem | |||
832 | 6049610 | Method and apparatus for digital signature authentication | |||
833 | 6047072 | Method for secure key distribution over a nonsecure communications network | |||
834 | 6038317 | Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l | |||
835 | 6035041 | Optimal-resilience, proactive, public-key cryptographic system and method | |||
836 | 6026163 | Distributed split-key cryptosystem and applications | |||
1999 | |||||
837 | 6005943 | Electronic identifiers for network terminal devices | |||
838 | 5999629 | Data encryption security module | |||
839 | 5991415 | Method and apparatus for protecting public key schemes from timing and fault attacks | |||
840 | 5991414 | Method and apparatus for the secure distributed storage and retrieval of information | |||
841 | 5987133 | Electronic authentication system | |||
842 | 5987124 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
843 | 5974151 | Public key cryptographic system having differential security levels | |||
844 | 5974141 | Data management system | |||
845 | 5960087 | Distributed garbage collection system and method | |||
846 | 5956408 | Apparatus and method for secure distribution of data | |||
847 | 5956407 | Public key cryptographic system having nested security levels | |||
848 | 5956406 | Method of setting up secure communications and associated encryption/decryption system | |||
849 | 5933503 | Controlled modular cryptography apparatus and method | |||
850 | 5915018 | Key management system for DVD copyright management | |||
851 | 5909491 | Method for sending a secure message in a telecommunications system | |||
852 | 5905799 | Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
853 | 5870470 | Method and apparatus for encrypting long blocks using a short-block encryption procedure | |||
854 | 5864667 | Method for safe communications | |||
1998 | |||||
855 | 5850450 | Method and apparatus for encryption key creation | |||
856 | 5850444 | Method and apparatus for encrypting radio traffic in a telecommunications network | |||
857 | 5850443 | Key management system for mixed-trust environments | |||
858 | 5848159 | Public key cryptographic apparatus and method | |||
859 | 5838792 | Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
860 | 5835598 | Public key method of encoding data | |||
861 | 5832207 | Secure module with microprocessor and co-processor | |||
862 | 5832091 | Fingerprint controlled public key cryptographic system | |||
863 | 5825300 | Method of protected distribution of keying and certificate material | |||
864 | 5805712 | Apparatus and method for providing secured communications | |||
865 | 5805703 | Method and apparatus for digital signature authentication | |||
866 | 5799088 | Non-deterministic public key encrypton system | |||
867 | 5796840 | Apparatus and method for providing secured communications | |||
868 | 5796833 | Public key sterilization | |||
869 | 5790675 | Cryptographic communication process | |||
870 | 5768389 | Method and system for generation and management of secret key of public key cryptosystem | |||
871 | 5764768 | Blind encryption | |||
872 | 5761311 | Blind encryption | |||
873 | 5761310 | Communication system for messages enciphered according to an RSA-type procedure | |||
874 | 5761307 | Method for securing data in a telecommunications system | |||
875 | 5761306 | Key replacement in a public key cryptosystem | |||
876 | 5751813 | Use of an encryption server for encrypting messages | |||
877 | 5751808 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
878 | 5748735 | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | |||
879 | 5745571 | Cryptographic communications method and system | |||
880 | 5740250 | Tame automorphism public key system | |||
881 | 5737425 | Cryptosystem employing worst-case difficult-to solve lattice problem | |||
882 | 5737424 | Method and system for secure distribution of protected data using elliptic curve systems | |||
883 | 5737420 | Method for secure data transmission between remote stations | |||
884 | 5737419 | Computer system for securing communications using split private key asymmetric cryptography | |||
885 | 5712800 | Broadcast key distribution apparatus and method using chinese remainder | |||
1997 | |||||
886 | 5680460 | Biometric controlled key generation | |||
887 | 5680458 | Root key compromise recovery | |||
888 | 5666419 | Encryption device and communication apparatus using same | |||
889 | 5663896 | Broadcast key distribution apparatus and method using Chinese Remainder | |||
890 | 5651066 | Cipher key distribution system effectively preventing illegitimate use and charging of enciphered information | |||
891 | 5638445 | Blind encryption | |||
892 | 5625692 | Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing | |||
893 | 5604801 | Public key data communications system under control of a portable security device | |||
1996 | |||||
894 | 5588061 | System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | |||
895 | 5586186 | Method and system for controlling unauthorized access to information distributed to users | |||
896 | 5581616 | Method and apparatus for digital signature authentication | |||
897 | 5577124 | Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions | |||
898 | 5577123 | Public-key cryptographic apparatus handling ciphertext by public-key | |||
899 | 5563950 | System and methods for data encryption using public key cryptography | |||
900 | 5559889 | System and methods for data encryption using public key cryptography | |||
901 | 5557678 | System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | |||
902 | 5552897 | Secure communication apparatus and method | |||
903 | 5541994 | Fingerprint controlled public key cryptographic system | |||
904 | 5539828 | Apparatus and method for providing secured communications | |||
905 | 5535276 | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | |||
906 | 5499299 | Modular arithmetic operation system | |||
907 | 5497423 | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication | |||
1995 | |||||
908 | 5463690 | Method and apparatus for public key exchange in a cryptographic system | |||
909 | 5442706 | Secure mobile storage | |||
1994 | |||||
910 | 5373560 | Partial modular reduction method | |||
911 | 5371794 | Method and apparatus for privacy and authentication in wireless networks | |||
912 | 5369708 | Fast server-aided computation system and method for modular exponentiation without revealing client's secret to auxiliary device | |||
913 | 5351298 | Cryptographic communication method and apparatus | |||
914 | 5351297 | Method of privacy communication using elliptic curves | |||
915 | 5297206 | Cryptographic method for communication and electronic signatures | |||
916 | 5295188 | Public key encryption and decryption circuitry and method | |||
917 | 5289542 | Caller identification system with encryption | |||
1993 | |||||
918 | 5274707 | Modular exponentiation and reduction device and method | |||
919 | 5272755 | Public key cryptosystem with an elliptic curve | |||
920 | 5271061 | Method and apparatus for public key exchange in a cryptographic system | |||
921 | 5241599 | Cryptographic protocol for secure communications | |||
922 | 5220604 | Method for performing group exclusion in hierarchical group structures | |||
923 | 5202921 | Method and apparatus for authenticating users of a communication system to each other | |||
924 | 5201000 | Method for generating public and private key pairs without using a passphrase | |||
925 | 5199070 | Method for generating a public key | |||
1992 | |||||
926 | 5159632 | Method and apparatus for public key exchange in a cryptographic system | |||
927 | 5146500 | Public key cryptographic system using elliptic curves over rings | |||
928 | 5144665 | Cryptographic communication method and system | |||
929 | 5142579 | Public key cryptographic system and method | |||
930 | 5142577 | Method and apparatus for authenticating messages | |||
931 | 5136642 | Cryptographic communication method and cryptographic communication device | |||
932 | 5124117 | Cryptographic key distribution method and system | |||
933 | 5121429 | Digital signal processing | |||
1991 | |||||
934 | 5073935 | Method for secure communication | |||
935 | 5073934 | Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key | |||
936 | 5068895 | Encryption and decryption methods using bit-length preservation decryptor | |||
937 | 5054066 | Error correcting public key cryptographic method and program | |||
938 | 5046094 | Server-aided computation method and distributed information processing unit | |||
1990 | |||||
939 | 4969190 | Encrypting system of data | |||
940 | 4964164 | RSA computation method for efficient batch processing | |||
941 | 4949379 | Process for encrypted information transmission | |||
942 | 4944007 | Public key diversification method | |||
943 | 4926480 | Card-computer moderated systems | |||
1989 | |||||
944 | 4888801 | Hierarchical key management system | |||
945 | 4870681 | Cryptographic method and cryptographic processor for carrying out the method | |||
946 | 4841570 | One-way transformation of information | |||
947 | 4807288 | Microprocessor intended particularly for executing the calculation algorithms of a public code encoding system | |||
1988 | |||||
948 | 4736423 | Technique for reducing RSA Crypto variable storage | |||
1987 | |||||
949 | 4703503 | Cryptographic system using pseudocomplements of vector Boolean algebra | |||
950 | 4658094 | Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer | |||
1986 | |||||
951 | 4633036 | Method and apparatus for use in public-key data encryption system | |||
952 | 4567600 | Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission | |||
1985 | |||||
953 | 4532638 | Method and apparatus for the exponentiation of large binary numbers in a residue class modulo N, particularly for encoding and decoding digitally-represented messages | |||
954 | 4514592 | Cryptosystem | |||
1984 | |||||
955 | 4471164 | Stream cipher operation using public key cryptosystem | |||
956 | 4424414 | Exponentiation cryptographic apparatus and method | |||
1983 | |||||
957 | 4405829 | Cryptographic communications system and method | |||
958 | 4399323 | Fast real-time public key cryptography | |||
1982 | |||||
959 | 4351982 | RSA Public-key data encryption system having large random prime number generating microprocessor or the like | |||
1981 | |||||
960 | 4306111 | Simple and effective public-key cryptosystem | |||
1980 | |||||
961 | 4218582 | Public key cryptographic apparatus and method | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |