СПИСОК патентов США - подгруппа МПК16 H04L9/32
|
№ п/п | Номер патента | Название патента | |||
2017 | |||||
1 | 9609459 | Network tools for analysis, design, testing, and production of services | |||
2 | 9609279 | Method and system for providing secure CODECS | |||
3 | 9609024 | Method and system for policy based authentication | |||
4 | 9608982 | Identity validation system and associated methods | |||
5 | 9608978 | Relationship-based authorization | |||
6 | 9608967 | Method and system for establishing a session key | |||
7 | 9608849 | Method, system and apparatus for audio communication modulation mode self-adaptation and electronic signature token | |||
8 | 9608829 | System and method for creating a multi-branched blockchain with configurable protocol rules | |||
9 | 9608828 | Elongated physical unclonable function | |||
10 | 9608827 | Memory cell with de-initialization circuitry | |||
11 | 9608826 | System and method for partner key management | |||
12 | 9608825 | Trusted platform module certification and attestation utilizing an anonymous key system | |||
13 | 9608824 | Using digital fingerprints to associate data with a work | |||
14 | 9608823 | Secure remote kernel module signing | |||
15 | 9608822 | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |||
16 | 9608821 | System and method for high performance secure access to a trusted platform module on a hardware virtualization platform | |||
17 | 9608820 | Mobile terminal, restricting system and method of accessing an information using the mobile terminal | |||
18 | 9608819 | Learning parity with noise-based relational encryption for proximity relations | |||
19 | 9608818 | Cryptographic communication system and cryptographic communication method | |||
20 | 9608805 | Encryption key generation | |||
21 | 9608804 | Secure key authentication and ladder system | |||
22 | 9608803 | Method for defense against primary user emulation attacks in cognitive radio networks using advanced encryption | |||
23 | 9608634 | Toothed-rack physical unclonable function | |||
24 | 9607300 | Multi-layer transaction tracking | |||
25 | 9607180 | Information processing apparatus, control method for controlling the information processing apparatus in a maintenance mode, and storage medium | |||
26 | 9607143 | Provisioning account credentials via a trusted channel | |||
27 | 9607139 | Map-based authentication | |||
28 | 9607135 | Asset protection based on redundantly associated trusted entitlement verification | |||
29 | 9607131 | Secure and efficient content screening in a networked environment | |||
30 | 9606967 | Tracing a document in an electronic publication | |||
31 | 9606810 | Method and apparatus for replacing the operating system of a limited-resource portable data carrier | |||
32 | 9604406 | Three-dimensional design and manufacturing systems | |||
33 | 9603016 | Uniquely identifying a mobile electronic device | |||
34 | 9602612 | Overlay networks for application groups | |||
35 | 9602515 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
36 | 9602509 | Methods and systems for securely uploading files onto aircraft | |||
37 | 9602507 | Virtual smart card to perform security-critical operations | |||
38 | 9602506 | Method and apparatus for supporting login through user terminal | |||
39 | 9602500 | Secure import and export of keying material | |||
40 | 9602499 | Authenticating a node in a communication network | |||
41 | 9602497 | Trusted and unsupervised digital certificate generation using a security token | |||
42 | 9602487 | Method for the protected transmission of data | |||
43 | 9602485 | Network, network node with privacy preserving source attribution and admission control and device implemented method therfor | |||
44 | 9602483 | Adaptive method for biometrically certified communication | |||
45 | 9602481 | Generation of short key for communications | |||
46 | 9602478 | Trust relationships in a computerized system | |||
47 | 9602473 | Secure message forwarding with sender controlled decryption | |||
48 | 9602470 | Network device, IPsec system and method for establishing IPsec tunnel using the same | |||
49 | 9602292 | Device-level authentication with unique device identifiers | |||
50 | 9602291 | Secure connection certificate verification | |||
51 | 9602290 | System and method for vehicle messaging using a public key infrastructure | |||
52 | 9602289 | Steganographic embedding of executable code | |||
53 | 9602288 | Enhanced data security through uniqueness checking | |||
54 | 9602287 | Method and system for signed stateless data transfer | |||
55 | 9602286 | Electronic device and method for extracting encrypted message | |||
56 | 9602285 | Authentication device, authentication method, and program | |||
57 | 9602284 | Secure offline authentication | |||
58 | 9602283 | Data encryption in a de-duplicating storage in a multi-tenant environment | |||
59 | 9602282 | Secure software and hardware association technique | |||
60 | 9602281 | Parallelizable cipher construction | |||
61 | 9602279 | Configuring devices for use on a network using a fast packet exchange with authentication | |||
62 | 9602276 | Method and apparatus for virtual pairing with a group of semi-connected devices | |||
63 | 9602275 | Server pool kerberos authentication scheme | |||
64 | 9601120 | Working method of sound transmission-based dynamic token | |||
65 | 9601016 | Communication system, vehicle-mounted terminal, roadside device | |||
66 | 9600690 | Secure access for sensitive digital information | |||
67 | 9600686 | Augmented reality based privacy and decryption | |||
68 | 9600683 | Protecting data in insecure cloud storage | |||
69 | 9600676 | Application-level wireless security for wearable devices | |||
70 | 9600653 | Providing time ratio-based password/challenge authentication | |||
71 | 9600651 | System and method for determining use of non-human users in a distributed computer network environment | |||
72 | 9600508 | Data layer service availability | |||
73 | 9600304 | Device configuration for multiple users using remote user biometrics | |||
74 | 9600302 | Using a public key infrastructure for automatic device configuration | |||
75 | 9596604 | Method and system for enhanced wireless network security | |||
76 | 9596599 | Authentication for secure wireless communication | |||
77 | 9596236 | Method for veryifying authorized signer for mobile device based document escrow service | |||
78 | 9596227 | Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment | |||
79 | 9596221 | Encryption of user data for storage in a cloud server | |||
80 | 9596220 | Secure protocol for peer-to-peer network | |||
81 | 9596097 | Apparatus and method for transferring network access information of smart household appliances | |||
82 | 9596090 | Method for controlling data acquisition for a plurality of field devices | |||
83 | 9596089 | Method for generating a certificate | |||
84 | 9596088 | Systems and methods for biometric e-signature | |||
85 | 9596087 | Token authentication for touch sensitive display devices | |||
86 | 9596086 | Password-based authentication | |||
87 | 9596085 | Secure battery authentication | |||
88 | 9596084 | Initializing camera subsystem for face detection based on sensor inputs | |||
89 | 9596082 | Secure debug trace messages for production authenticated code modules | |||
90 | 9596078 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
91 | 9595057 | Identity verification and authentication | |||
92 | 9594923 | Data protection systems and methods | |||
93 | 9594922 | Non-persistent shared authentication tokens in a cluster of nodes | |||
94 | 9594893 | Multi-touch local device authentication | |||
95 | 9594892 | User authentication method and apparatus based on electrocardiogram (ECG) signal | |||
96 | 9594883 | Recording medium device, terminal device, distribution device, control method, and program recording medium | |||
97 | 9594769 | Computing device configured with a table network | |||
98 | 9591682 | Automatic password handling | |||
99 | 9591483 | Authentication mechanisms for wireless networks | |||
100 | 9591480 | Method and device for secure communication of a component of a vehicle with an external communication partner via a wireless communication link | |||
101 | 9591097 | System and method for enabling pseudonymous lifelike social media interactions without using or linking to any uniquely identifiable user data and fully protecting users' privacy | |||
102 | 9591068 | Updating error recovery information in a dispersed storage network | |||
103 | 9591013 | Radio frequency fingerprint detection | |||
104 | 9590989 | Data access and anonymity management | |||
105 | 9590988 | Service location based authentication | |||
106 | 9590982 | Proximity based dual authentication for a wireless network | |||
107 | 9590975 | Efficient network layer for IPv6 protocol | |||
108 | 9590963 | System and method for key management for issuer security domain using global platform specifications | |||
109 | 9590962 | Using cookies to identify security contexts for connectionless service | |||
110 | 9590959 | Data security service | |||
111 | 9590955 | Methods and systems for providing information relating to an event | |||
112 | 9590949 | Confidential message exchange using benign, context-aware cover message generation | |||
113 | 9590810 | Device security | |||
114 | 9590809 | Method for operating a mobile device by means of a motor vehicle | |||
115 | 9590808 | Obfuscated passwords | |||
116 | 9590805 | Ladder-based cryptographic techniques using pre-computed points | |||
117 | 9590804 | Identification information generation device and identification information generation method | |||
118 | 9589406 | Key device and associated method, computer program and computer program product | |||
119 | 9589397 | Securing internet of things (IoT) based entrance/exit with multi-factor authentication | |||
120 | 9589309 | Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval | |||
121 | 9589268 | Integration of payment capability into secure elements of computers | |||
122 | 9589154 | Programming on-chip non-volatile memory in a secure processor using a sequence number | |||
123 | 9589153 | Securing integrity and consistency of a cloud storage service with efficient client operations | |||
124 | 9589144 | System and method for cryptographic suite management | |||
125 | 9589143 | Semi-trusted Data-as-a-Service platform | |||
126 | 9589138 | Computing device boot software authentication | |||
127 | 9589111 | System for controlling the distribution and use of rendered digital works through watermarking | |||
128 | 9584587 | Managing transmission and storage of sensitive data | |||
129 | 9584582 | Method and system for publishing an electronic file attached to an electronic message | |||
130 | 9584547 | Statistical security for anonymous mesh-up oriented online services | |||
131 | 9584542 | Relay attack countermeasure system | |||
132 | 9584527 | User authentication based on FOB/indicia scan | |||
133 | 9584520 | Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers | |||
134 | 9584514 | Binding mobile device secure software components to the SIM | |||
135 | 9584509 | Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure | |||
136 | 9584507 | Distributed password verification | |||
137 | 9584484 | Systems and methods to secure a virtual appliance | |||
138 | 9584398 | Methods and apparatus to utilize route parameter sets for exchanging routes in a communication network | |||
139 | 9584329 | Physically unclonable function and helper data indicating unstable bits | |||
140 | 9584328 | Embedding information or information identifier in an IPv6 address | |||
141 | 9584327 | System and method for authentication for transceivers | |||
142 | 9584326 | Creating a new file for a dispersed storage network | |||
143 | 9584325 | User-configurable cryptographic interface controller | |||
144 | 9584324 | Centralized datastore password management | |||
145 | 9584323 | Compressing encrypted data without the encryption key | |||
146 | 9584322 | System and method for hypervisor-based remediation and provisioning of a computer | |||
147 | 9584318 | Perfect forward secrecy distributed denial of service attack defense | |||
148 | 9584317 | Identifying security boundaries on computing devices | |||
149 | 9582843 | Authentication and validation of smartphone imagery | |||
150 | 9582714 | Digital fingerprinting track and trace system | |||
151 | 9582671 | Security and data privacy for lighting sensory networks | |||
152 | 9582652 | Federation among services for supporting virtual-network overlays | |||
153 | 9582648 | Method for using a multi-function computer for testing | |||
154 | 9582106 | Method and system of providing a picture password for relatively smaller displays | |||
155 | 9578035 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
156 | 9578019 | Method and system for managing an embedded secure element eSE | |||
157 | 9578017 | Secure management of operations on protected virtual machines | |||
158 | 9578016 | Optimizing secure communications between a client authenticating server and a mobile client | |||
159 | 9578015 | Step-up authentication for single sign-on | |||
160 | 9577999 | Enhanced security for registration of authentication devices | |||
161 | 9577998 | Dynamic file access to files of unmapped remote computers | |||
162 | 9577997 | Authentication system and authentication method | |||
163 | 9577993 | System and method for authenticating users | |||
164 | 9577992 | Data encryption/decryption using neuro and neuro-mechanical fingerprints | |||
165 | 9577990 | Control of access to a secondary system | |||
166 | 9577834 | Generalized certificate use in policy-based secure messaging environments | |||
167 | 9577833 | Generalized certificate use in policy-based secure messaging environments | |||
168 | 9577832 | Generating a hash using S-box nonlinearizing of a remainder input | |||
169 | 9577831 | Relational encryption | |||
170 | 9577830 | Multi-tenant discovery and claiming of distributed storage nodes over an insecure network | |||
171 | 9577829 | Multi-party computation services | |||
172 | 9577828 | Batch verification method and apparatus thereof | |||
173 | 9577824 | Delivering a content item from a server to a device | |||
174 | 9577822 | Secure bitstream authentication | |||
175 | 9576410 | System and method for implementing a threat condition protocol in pass control | |||
176 | 9576285 | One gesture, one blink, and one-touch payment and buying using haptic control via messaging and calling multimedia system on mobile and wearable device, currency token interface, point of sale device, and electronic payment card | |||
177 | 9576133 | Detection of data tampering of encrypted data | |||
178 | 9576125 | Configuring identity federation configuration | |||
179 | 9576118 | Image processing apparatus, method for controlling the same, and storage medium for carrying out login processing | |||
180 | 9576005 | Search system | |||
181 | 9575727 | Methods for generating random data using phase change materials and related devices and systems | |||
182 | 9573060 | System and method for providing user with services | |||
183 | 9572033 | Systems and methods for encrypted mobile voice communications | |||
184 | 9572016 | Methods and apparatus for use in transferring an assignment of a secure chip between subscription managers | |||
185 | 9571634 | Digital signature-over-voice for caller ID verification | |||
186 | 9571494 | Authorization server and client apparatus, server cooperative system, and token management method | |||
187 | 9571485 | Spatial and temporal verification of users and/or user devices | |||
188 | 9571484 | Device certificate based appliance configuration | |||
189 | 9571483 | Multi user device management system | |||
190 | 9571475 | Call encryption systems and methods | |||
191 | 9571468 | Encoding data using a variable number of pixels and bits based on entropy | |||
192 | 9571289 | Methods and systems for glitch-resistant cryptographic signing | |||
193 | 9571288 | Peer to peer enterprise file sharing | |||
194 | 9571287 | Secure proofs of storage for deduplication | |||
195 | 9571286 | Authenticating the identity of initiators of TCP connections | |||
196 | 9571285 | Identity assertion framework | |||
197 | 9571284 | Controlling access to personal information stored in a vehicle using a cryptographic key | |||
198 | 9571283 | Enabling packet handling information in the clear for MACSEC protected frames | |||
199 | 9571282 | Authentication on a computing device | |||
200 | 9571278 | Encryption key recovery in the event of storage management failure | |||
201 | 9571276 | Derivation of a device-specific value | |||
202 | 9571213 | Tag generation method in broadcast encryption system | |||
203 | 9570403 | Secure chip with physically unclonable function | |||
204 | 9570103 | Optional data encryption by partition for a partitionable data storage library | |||
205 | 9569774 | System and method for processing feedback entries received from software | |||
206 | 9569631 | Method and apparatus for configuring an electronics device | |||
207 | 9569630 | Method and system for providing an encryption proxy | |||
208 | 9569629 | Communication between key manager and storage subsystem kernel via management console | |||
209 | 9569623 | Secure boot with resistance to differential power analysis and other external monitoring attacks | |||
210 | 9569622 | Self-measuring nonvolatile memory device systems and methods | |||
211 | 9569606 | Verification of a pattern based passcode | |||
212 | 9569605 | Systems and methods for enabling biometric authentication options | |||
213 | 9569599 | Systems, methods, software, and components using tamper-proof real-time clock | |||
214 | 9569587 | Multi-services application gateway and system employing the same | |||
215 | 9569371 | Memory device, memory system, and operating method of memory system | |||
216 | 9569124 | Deduplication of virtual machine content | |||
217 | 9565558 | Securing communications of a wireless access point and a mobile device | |||
218 | 9565205 | Detecting fraudulent activity from compromised devices | |||
219 | 9565197 | Secure verification of website claims | |||
220 | 9565195 | User authentication based on FOB/indicia scan | |||
221 | 9565188 | System and method for digitally signing documents from a mobile device | |||
222 | 9565187 | Systems and methods for mutual authentication of electronic devices | |||
223 | 9565184 | Digital certification analyzer temporary external secured storage | |||
224 | 9565180 | Exchange of digital certificates in a client-proxy-server network configuration | |||
225 | 9565172 | Method for enabling a secure provisioning of a credential, and related wireless devices and servers | |||
226 | 9565023 | Signature generation and verification system and signature verification apparatus | |||
227 | 9565022 | RFID tags with dynamic key replacement | |||
228 | 9565020 | System and method for generating a server-assisted strong password from a weak secret | |||
229 | 9565019 | Secure and anonymous distributed authentication | |||
230 | 9563774 | Apparatus and method for securely logging boot-tampering actions | |||
231 | 9563773 | Systems and methods for securing BIOS variables | |||
232 | 9563769 | System and method for secure loading data in a cache memory | |||
233 | 9563767 | System and methods for weak authentication data reinforcement | |||
234 | 9563757 | Secure digital credential sharing arrangement | |||
235 | 9563011 | Optical transmission using few-mode fibers | |||
236 | 9561662 | Supply authentication via timing challenge response | |||
237 | 9561330 | Pen-type drug injection device with optical dose encoding and decoding system | |||
238 | 9560524 | Wireless network application access by a wireless communication device via an untrusted access node | |||
239 | 9560138 | Methods and systems for secure communication between wireless electronic devices and vehicles | |||
240 | 9560110 | Synchronizing shared content served to a third-party service | |||
241 | 9560047 | Multi-device authorization to access wireless network communications based on shared event times | |||
242 | 9560036 | Cross-protocol federated single sign-on (F-SSO) for cloud enablement | |||
243 | 9560024 | Pairwise temporal key creation for secure networks | |||
244 | 9560022 | Avoiding collection of biometric data without consent | |||
245 | 9560008 | Method and arrangement for providing a wireless mesh network | |||
246 | 9559852 | Cryptographic security functions based on anticipated changes in dynamic minutiae | |||
247 | 9559851 | Secure pairing for secure communication across devices | |||
248 | 9559850 | Component management via secure communications | |||
249 | 9559849 | Service-to-service digital path tracing | |||
250 | 9559848 | Method, apparatus, and instructions for safely storing secrets in system memory | |||
251 | 9559842 | Trusted key management for virtualized platforms | |||
252 | 9559837 | Methods for cryptographic delegation and enforcement of dynamic access to stored data | |||
253 | 9558636 | Automatic teller machine inventory and distribution system | |||
254 | 9558416 | Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously | |||
255 | 9558370 | Cloud key directory for federating data exchanges | |||
256 | 9558366 | Computer system for storing and retrieval of encrypted data items, client computer, computer program product and computer-implemented method | |||
257 | 9558358 | Random number generator in a virtualized environment | |||
258 | 9558343 | Methods and systems for controlling access to resources and privileges per process | |||
259 | 9558228 | Client computer for querying a database stored on a server via a network | |||
260 | 9557824 | Computer keyboard with ultrasonic user proximity sensor | |||
261 | 9554271 | Generating keys for protection in next generation mobile networks | |||
262 | 9554270 | Enhanced security for direct link communications | |||
263 | 9553982 | System and methods for tamper proof interaction recording and timestamping | |||
264 | 9553896 | System and method for controlling electronic communications | |||
265 | 9553871 | Clock synchronized dynamic password security label validity real-time authentication system and method thereof | |||
266 | 9553869 | Method for initializing a memory area that is associated with a smart meter | |||
267 | 9553863 | Computer implemented method and system for an anonymous communication and computer program thereof | |||
268 | 9553859 | Adaptive method for biometrically certified communication | |||
269 | 9553858 | Hardware-based credential distribution | |||
270 | 9553857 | Communication system, communication apparatus, communication method, and computer program | |||
271 | 9553847 | Virtual desktop accelerator with support for multiple cryptographic contexts | |||
272 | 9553732 | Certificate evaluation for certificate authority reputation advising | |||
273 | 9553731 | Transmission method and system for terminal unique information | |||
274 | 9553730 | Certificating authority trust evaluation | |||
275 | 9553729 | Authentication method between a reader and a radio tag | |||
276 | 9553728 | Method and apparatus for providing end-to-end security for distributed computations | |||
277 | 9553727 | Secure and mobile biometric authentication for electronic health record management | |||
278 | 9553726 | Method for distributed identification of a station in a network | |||
279 | 9553725 | System and method for authenticating data | |||
280 | 9553724 | Car-charging system | |||
281 | 9553721 | Secure execution environment communication | |||
282 | 9552485 | Cryptographic material renewal | |||
283 | 9552482 | Method for determining debug authorization for motherboard control module and associated motherboard control module | |||
284 | 9549062 | Digital signature-over-voice for caller ID verification | |||
285 | 9548983 | Cross access login controller | |||
286 | 9548867 | Method and apparatus for secure distribution of embedded firmware | |||
287 | 9548866 | Deletion of content in digital storage systems | |||
288 | 9548865 | Token authentication for touch sensitive display devices | |||
289 | 9548863 | Method for unambiguous marking of an object | |||
290 | 9548859 | Ticket-based implementation of content leasing | |||
291 | 9548814 | System and method for communication over color encoded light patterns | |||
292 | 9547860 | System for processing feedback entries received from software | |||
293 | 9547858 | Real-time multi master transaction | |||
294 | 9547774 | System and method for distributed deduplication of encrypted chunks | |||
295 | 9544769 | Method for providing application service | |||
296 | 9544766 | System and method for authentication and key exchange for a mobile device via spectrally confined wireless communications | |||
297 | 9544759 | Systems, methods, and computer program products for managing states | |||
298 | 9544424 | Trust enabled communication system | |||
299 | 9544311 | Secure identity propagation in a cloud-based computing environment | |||
300 | 9544307 | Providing a security mechanism on a mobile device | |||
301 | 9544306 | Attempted security breach remediation | |||
302 | 9544300 | Method and system for providing device-specific operator data for an automation device in an automation installation | |||
303 | 9544299 | Information processing apparatus, server, method for controlling the same and storage medium | |||
304 | 9544298 | Method for certificate-based authentication | |||
305 | 9544297 | Method for secured data processing | |||
306 | 9544281 | Selective password synchronization | |||
307 | 9544280 | Utilization of a protected module to prevent offline dictionary attacks | |||
308 | 9544272 | Detecting image spam | |||
309 | 9544266 | NSEC3 performance in DNSSEC | |||
310 | 9544154 | Method of authenticating a device | |||
311 | 9544153 | Compression of cryptographic chaining certificates | |||
312 | 9544152 | Dual layer transport security configuration | |||
313 | 9544151 | Controlling access to clinical data analyzed by remote computing resources | |||
314 | 9544150 | Using multiple digital identification documents to control information disclosure | |||
315 | 9544149 | Automatic E-signatures in response to conditions and/or events | |||
316 | 9544148 | Method of sending a self-signed certificate from a communication device | |||
317 | 9544147 | Model based multi-tier authentication | |||
318 | 9544146 | Image processing apparatus, biometric authentication apparatus, image processing method and recording medium | |||
319 | 9544145 | Device, method, and medium for facility management verification | |||
320 | 9544144 | Data encryption | |||
321 | 9544143 | System and method of notifying mobile devices to complete transactions | |||
322 | 9544142 | Data authentication using plural electronic keys | |||
323 | 9544138 | Authenticator, authenticatee and authentication method | |||
324 | 9544135 | Methods of and systems for facilitating decryption of encrypted electronic information | |||
325 | 9544047 | System and method to prevent misuse of aircraft messages | |||
326 | 9542713 | Systems and methods for securing the manufacturing supply chain | |||
327 | 9542589 | Signal strength enhancement in a biometric sensor array | |||
328 | 9542568 | Systems and methods for enforcing third party oversight of data anonymization | |||
329 | 9542550 | Method of mutual authentication between a radio tag and a reader | |||
330 | 9542543 | Biometric authentication device, biometric authentication method and computer readable, non-transitory medium | |||
331 | 9542540 | System and method for managing application program access to a protected resource residing on a mobile device | |||
332 | 9542537 | Method and system for confidentially providing software components | |||
333 | 9542157 | Random number generator and method for generating random numbers | |||
334 | 9542114 | Methods and apparatus to protect memory regions during low-power states | |||
335 | 9538311 | Auto-provisioning for internet-of-things devices | |||
336 | 9537951 | Management of network devices within a dispersed data storage network | |||
337 | 9537918 | File sharing with client side encryption | |||
338 | 9537910 | Communication and action approval system and method | |||
339 | 9537864 | Encryption system using web browsers and untrusted web servers | |||
340 | 9537861 | Method of mutual verification between a client and a server | |||
341 | 9537857 | Distributed password verification | |||
342 | 9537854 | Transmitting encoded digital certificate data to certificate authority using mobile device | |||
343 | 9537813 | Communication system for providing the delivery of an e-mail message | |||
344 | 9537762 | Producing routing messages for voice over IP communications | |||
345 | 9537663 | Manipulation and restoration of authentication challenge parameters in network authentication procedures | |||
346 | 9537662 | Certificates for low-power or low-memory devices | |||
347 | 9537661 | Password-less authentication service | |||
348 | 9537660 | Method of establishing public key cryptographic protocols against quantum computational attack | |||
349 | 9537659 | Authenticating a user device to access services based on a device ID | |||
350 | 9537658 | Password-based authentication | |||
351 | 9537657 | Multipart authenticated encryption | |||
352 | 9536581 | Tamper-resistant non-volatile memory device | |||
353 | 9536112 | Delaying or deterring counterfeiting and/or cloning of a component | |||
354 | 9536092 | Method, system, and program product for remotely attesting to a state of a computer system | |||
355 | 9535967 | Method and system for providing efficient and complex database functionality to a mobile device | |||
356 | 9535725 | System and method for disabling and/or enabling a device | |||
357 | 9535675 | Rule based device enrollment | |||
358 | 9535406 | Method and apparatus for generating a real time attribute mark of a picture | |||
2016 | |||||
359 | 9532215 | Secure deployment of terminals in a wireless network | |||
360 | 9532161 | Wireless device with application data flow tagging and network stack-implemented network access policy | |||
361 | 9532089 | Session-based encryption for delivering content on-demand | |||
362 | 9531775 | Mobile application migration to cloud computing platform | |||
363 | 9531772 | Dynamic profile sharing using expiring tokens | |||
364 | 9531732 | Computer implemented system and method for authenticating a sender of electronic data to a recipient | |||
365 | 9531715 | Method and system for protecting credentials | |||
366 | 9531714 | Enterprise authentication via third party authentication support | |||
367 | 9531704 | Efficient network layer for IPv6 protocol | |||
368 | 9531691 | Providing forward secrecy in a terminating TLS connection proxy | |||
369 | 9531687 | Techniques for secure message offloading | |||
370 | 9531682 | Splicing into an active TLS session without a certificate or private key | |||
371 | 9531679 | Content-based transport security for distributed producers | |||
372 | 9531549 | Image verification by an electronic device | |||
373 | 9531548 | Security system for handheld wireless devices using time-variable encryption keys | |||
374 | 9531547 | Host-based digital signature verification for guest components | |||
375 | 9531546 | Methods and apparatus to certify digital signatures | |||
376 | 9531545 | Tracking and notification of fulfillment events | |||
377 | 9531544 | Two-dimensional bar code for ID card | |||
378 | 9531543 | Authentication for relay deployment | |||
379 | 9531542 | Secure remote password | |||
380 | 9531541 | Cryptographic storage device controller | |||
381 | 9531540 | Secure token-based signature schemes using look-up tables | |||
382 | 9531539 | Information processing apparatus, and information processing method | |||
383 | 9531538 | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | |||
384 | 9531537 | System and method for performing secure communications | |||
385 | 9531532 | Method for establishing a secure communication channel | |||
386 | 9530263 | System and method of verification of access using a wearable security device | |||
387 | 9530137 | Method and apparatus for secure access payment and identification | |||
388 | 9530127 | Method and system for handling sensitive data in a content delivery network | |||
389 | 9530027 | Device lock for transit | |||
390 | 9530026 | Privacy protection for participatory sensing system | |||
391 | 9530011 | Method and system for provision of cryptographic services | |||
392 | 9530010 | Energy usage data management | |||
393 | 9530009 | Secure execution and update of application module code | |||
394 | 9530008 | System and method for a processing device with a priority interrupt | |||
395 | 9530005 | Techniques for secure data management in a distributed environment | |||
396 | 9529996 | Controlling mobile device access to enterprise resources | |||
397 | 9529734 | Smart storage device | |||
398 | 9529626 | Facilitating equitable distribution of thread resources for job types associated with tenants in a multi-tenant on-demand services environment | |||
399 | 9526009 | Protecting data stored on a mobile communication device utilizing a personal identification number code of a universal integrated circuit card | |||
400 | 9525999 | Method of securely transferring services between mobile devices | |||
401 | 9525683 | Secret supplemental username | |||
402 | 9525679 | Sending session tokens through passive clients | |||
403 | 9525676 | Message content adjudication based on security token | |||
404 | 9525673 | Content protection for extract, transform, load (ETL) scripts | |||
405 | 9525669 | Method and opportunistic sensing | |||
406 | 9525640 | System and method for controlling lifespan of interaction requests | |||
407 | 9525557 | Certificate issuing system, client terminal, server device, certificate acquisition method, and certificate issuing method | |||
408 | 9525556 | Method and system for issuing CSR certificate for vehicle-to-anything communication | |||
409 | 9525555 | Partitioning access to system resources | |||
410 | 9525554 | Device and method for identifying a certificate for multiple identities of a user | |||
411 | 9525553 | System and method for providing digital signature based on mobile trusted module | |||
412 | 9525552 | Audio device and method for adding watermark data to audio signals | |||
413 | 9525551 | Randomly skewing secret values as a countermeasure to compromise | |||
414 | 9525550 | Method and apparatus for securing a mobile application | |||
415 | 9525549 | Method and apparatus for securing a mobile application | |||
416 | 9524497 | Registration of a mobile computing device for a data service on a wireless network | |||
417 | 9524477 | Utilizing a secondary application to render invitational content in a separate window above an allocated space of primary content | |||
418 | 9524404 | Program execution device | |||
419 | 9521546 | Secure RF communication method, terminal and system | |||
420 | 9521215 | Micro cloud image uploading | |||
421 | 9521141 | Caller validation | |||
422 | 9521140 | Secure execution environment services | |||
423 | 9521124 | Secure computation using a server module | |||
424 | 9521123 | Method for file encryption | |||
425 | 9521097 | System and method for management of persistent and irrefutable instant messages | |||
426 | 9521002 | Method for copy-protected storage of information on a data carrier | |||
427 | 9521001 | Privacy preserving electronic document signature service | |||
428 | 9521000 | Complete forward access sessions | |||
429 | 9520999 | Systems and methods for identifying an individual | |||
430 | 9520998 | System and method for recovery key management | |||
431 | 9520990 | System and method for software protection and secure software distribution | |||
432 | 9519800 | Device and method for online storage, transmission device and method, and receiving device and method | |||
433 | 9519798 | Zero-knowledge databases | |||
434 | 9519796 | Systems and methods for electronic ticket management | |||
435 | 9519770 | Transaction card for providing electronic message authentication | |||
436 | 9519767 | Apparatus and method for authenticating a combination code using a quick response code | |||
437 | 9519757 | AES-GCM based enhanced security setup for media encryption | |||
438 | 9519433 | Secure virtual sector erasure method and system | |||
439 | 9519296 | Randomized input device heating | |||
440 | 9516499 | Protection for a means of transportation against unauthorised usage or theft | |||
441 | 9516335 | Wireless display encoder architecture | |||
442 | 9516059 | Using mock tokens to protect against malicious activity | |||
443 | 9516011 | MRCP resource access control mechanism for mobile devices | |||
444 | 9516010 | Authenticating a user while the user operates a client apparatus and possesses an electronic card | |||
445 | 9516007 | Verifier and prover have an authentication protocol with challenge-response with the challenge from prover having identification of the verifier | |||
446 | 9516002 | Systems and methods for securing data in motion | |||
447 | 9515999 | Automated access, key, certificate, and credential management | |||
448 | 9515996 | Distributed password-based authentication in a public key cryptography authentication system | |||
449 | 9515994 | Keyword ordered storage, search and retrieval on encrypted data for multiuser scenario | |||
450 | 9515836 | System and method for location assurance using passive computational tags | |||
451 | 9515835 | Stable probing-resilient physically unclonable function (PUF) circuit | |||
452 | 9515834 | Content protection continuity through authorized chains of components | |||
453 | 9515833 | Electronic personal signature generation and distribution for personal communication | |||
454 | 9515832 | Process authentication and resource permissions | |||
455 | 9515831 | Reducing the effectiveness of smudge and thermal imaging attacks | |||
456 | 9515830 | Universal hash function computing device, method and program | |||
457 | 9515829 | Information distribution method, information distribution system and in-vehicle terminal | |||
458 | 9515827 | Key management device, communication device, communication system, and computer program product | |||
459 | 9515826 | Network topology aided by smart agent download | |||
460 | 9515824 | Provisioning devices for secure wireless local area networks | |||
461 | 9515822 | System and method of secure encryption for electronic data transfer | |||
462 | 9514584 | Access management and reporting technology | |||
463 | 9514500 | Watermark generator, watermark decoder, method for providing a watermarked signal based on discrete valued data and method for providing discrete valued data in dependence on a watermarked signal | |||
464 | 9514440 | Methods and apparatus for providing data warehousing with respect to, inter alia, interactive hierarchical entitlements | |||
465 | 9514330 | Meta-complete data storage | |||
466 | 9514321 | Electro device for protecting user's privacy and method for controlling thereof | |||
467 | 9514314 | Method and apparatus for efficient computation of one-way chains in cryptographic applications | |||
468 | 9514300 | Systems and methods for enhanced security in wireless communication | |||
469 | 9514294 | Accessing a computing resource | |||
470 | 9514063 | Secure compact flash | |||
471 | 9513790 | Electronic device and method for unlocking screen of electronic device | |||
472 | 9510216 | Node device and communication control method | |||
473 | 9510194 | Open and encrypted wireless network access | |||
474 | 9509737 | Client side encryption with recovery method | |||
475 | 9509686 | Secure element authentication | |||
476 | 9509681 | Secure instant messaging system | |||
477 | 9509677 | Method, apparatus, and system for sending credentials securely | |||
478 | 9509669 | Efficient routing of streams encrypted using point-to-point authentication protocol | |||
479 | 9509667 | Method and system for digital rights management of documents | |||
480 | 9509665 | Protecting against malicious modification in cryptographic operations | |||
481 | 9509663 | Secure distribution of session credentials from client-side to server-side traffic management devices | |||
482 | 9509516 | Apparatus and method for providing digital signature | |||
483 | 9509515 | Method and apparatus for registering devices capable of device-to-device communication in server | |||
484 | 9509514 | Deleting encoded data slices in a dispersed storage network | |||
485 | 9509513 | Provisioning using a generic configuration | |||
486 | 9509512 | Message digest generator | |||
487 | 9509510 | Communication device, communication method, and computer program product | |||
488 | 9509508 | Generating a session key for authentication and secure data transfer | |||
489 | 9509506 | Quantum key management | |||
490 | 9509505 | Group management of authenticated entities | |||
491 | 9509504 | Cryptographic key manager for application servers | |||
492 | 9509502 | Symmetric keying and chain of trust | |||
493 | 9509499 | Electronic key registration method and electronic key registration system | |||
494 | 9509498 | System and method for transmitting data | |||
495 | 9509492 | Authentication device, output device, verification device and input device | |||
496 | 9508209 | Ultraviolet anti-counterfeiting check verification method | |||
497 | 9507964 | Regulating access using information regarding a host machine of a portable storage drive | |||
498 | 9507926 | Mobile wireless hand-held identification system and method for identification | |||
499 | 9507920 | Controlling access by code | |||
500 | 9503939 | Neighbor list broadcasting techniques | |||
501 | 9503890 | Method and apparatus for delivering keying information | |||
502 | 9503462 | Authenticating security parameters | |||
503 | 9503453 | OTP-based authentication system and method | |||
504 | 9503448 | Authenticated session establishment | |||
505 | 9503446 | Authentication within openflow network | |||
506 | 9503307 | Split channel authenticity queries in multi-party dialog | |||
507 | 9503269 | Utilizing a stapling technique with a server-based certificate validation protocol to reduce overhead for mobile communication devices | |||
508 | 9503268 | Securing results of privileged computing operations | |||
509 | 9503267 | Generating digital signatures | |||
510 | 9503266 | Relational encryption | |||
511 | 9503265 | Scheduler and context cache controller and storage for security context | |||
512 | 9503263 | Method and apparatus for storing encrypted data files across distributed storage media | |||
513 | 9503261 | Public key encryption with digital signature scheme | |||
514 | 9503260 | Security token and service access system | |||
515 | 9501664 | Method, apparatus and system to compensate for drift by physically unclonable function circuitry | |||
516 | 9501634 | Efficient browser-based identity management providing personal control and anonymity | |||
517 | 9501576 | Identification of content by metadata | |||
518 | 9501429 | Dynamic key and rule storage protection | |||
519 | 9497632 | System and method for pairing a UICC card with a particular mobile communications device | |||
520 | 9497626 | Certificate validation and channel binding | |||
521 | 9497573 | Security protocols for unified near field communication infrastructures | |||
522 | 9497191 | Multiple user authentications on a communications device | |||
523 | 9497190 | Information processing apparatus, method of controlling the same, storage medium and information processing system | |||
524 | 9497186 | Methods and systems for securing proofs of knowledge for privacy | |||
525 | 9497184 | User impersonation/delegation in a token-based authentication system | |||
526 | 9497158 | Secure electronic mail system | |||
527 | 9497157 | Secure electronic mail system | |||
528 | 9497029 | Hardening of direct anonymous attestation from side-channel attack | |||
529 | 9497028 | System and method for remote storage auditing | |||
530 | 9497027 | Encryption engine with twin cell memory array | |||
531 | 9497026 | Authorizing removable medium access | |||
532 | 9497025 | Ethernet interface module | |||
533 | 9497024 | Electronic file sending method | |||
534 | 9495555 | Client computer for querying a database stored on a server via a network | |||
535 | 9495546 | Electronic signing methods, systems, and apparatus | |||
536 | 9495544 | Secure data transmission and verification with untrusted computing devices | |||
537 | 9495240 | Encrypting data for storage in a dispersed storage network | |||
538 | 9494648 | Comparator with load signal output connected to timestamp value register | |||
539 | 9491201 | Highly scalable architecture for application network appliances | |||
540 | 9491176 | Monitoring content consumption by restricted account | |||
541 | 9491175 | System and method for proxying federated authentication protocols | |||
542 | 9491172 | Method for communication of energy consumption-specific measurement data elements between a smart meter device and a computer system of a utility company and/or operator of a measuring system | |||
543 | 9491169 | Generation and authentication of biometric information using watermark | |||
544 | 9491163 | Object delivery authentication | |||
545 | 9491159 | Secure challenge system for verifying access rights to media content | |||
546 | 9491148 | Establishing a direct connection between two devices | |||
547 | 9491146 | Computational systems and methods for encrypting data for anonymous storage | |||
548 | 9490987 | Accurately classifying a computer program interacting with a computer system using questioning and fingerprinting | |||
549 | 9490986 | Authenticating a node in a communication network | |||
550 | 9490985 | Systems and methods to secure user identification | |||
551 | 9490984 | Method and apparatus for trusted authentication and logon | |||
552 | 9490983 | Encryption and decryption of visible codes for real time augmented reality views | |||
553 | 9490982 | Method and storage device for protecting content | |||
554 | 9490981 | Antialiasing for picture passwords and other touch displays | |||
555 | 9490980 | Authentication and secured information exchange system, and method therefor | |||
556 | 9490979 | System and method for providing credentials | |||
557 | 9490978 | Information processing apparatus and information processing method | |||
558 | 9490974 | Identity-based decryption | |||
559 | 9490970 | Methods and system for secure communication between an RFID tag and a reader | |||
560 | 9489999 | Magnetic tunnel junction resistance comparison based physical unclonable function | |||
561 | 9489662 | Apparatus and method for storing electronic receipts on a unified card or smartphone | |||
562 | 9489533 | Efficient memory utilization in a dispersed storage system | |||
563 | 9489522 | Method for secure and resilient distributed generation of elliptic curve digital signature algorithm (ECDSA) based digital signatures with proactive security | |||
564 | 9489509 | Electronic device and method for unlocking objects of electronic device | |||
565 | 9489504 | Physically unclonable function pattern matching for device identification | |||
566 | 9489499 | Security context passing for stateless system management | |||
567 | 9489498 | Digital rights management using trusted processing techniques | |||
568 | 9489354 | Masking content while preserving layout of a webpage | |||
569 | 9489023 | Secure wake on LAN with white list | |||
570 | 9485609 | Pulse frequency control for wireless communications and ranging | |||
571 | 9485291 | Imparting real-time priority-based network communications in an encrypted communication session | |||
572 | 9485280 | Proposal system access policy enforcement | |||
573 | 9485254 | Method and system for authenticating a security device | |||
574 | 9485251 | Methods and systems for authenticating users | |||
575 | 9485246 | Distributed authentication with data cloud | |||
576 | 9485239 | Implementing single sign-on across a heterogeneous collection of client/server and web-based applications | |||
577 | 9485232 | User equipment credential system | |||
578 | 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
579 | 9485229 | Object level encryption system including encryption key management system | |||
580 | 9485224 | Information delivery system with advertising mechanism and method of operation thereof | |||
581 | 9485220 | Virtual desktop accelerator with support for dynamic proxy thread management | |||
582 | 9485145 | System, method, apparatus, and computer program product for determining a configuration of a converged infrastructure | |||
583 | 9485102 | Techniques for user-validated close-range mutual authentication | |||
584 | 9485101 | Provisioning digital certificates in a network environment | |||
585 | 9485100 | Trust management systems and methods | |||
586 | 9485099 | Apparatus, systems and methods for agile enablement of secure communications for cloud based applications | |||
587 | 9485098 | System and method of user authentication using digital signatures | |||
588 | 9485097 | Device, system, and method for registering and authenticating handwritten signatures and archiving handwritten information | |||
589 | 9485093 | Push button configuration pairing | |||
590 | 9483889 | Method for controlling an electronically secured device and transponder for it | |||
591 | 9483650 | Systems and methods for managing data incidents | |||
592 | 9483647 | Firmware verified boot | |||
593 | 9483629 | Document authentication based on expected wear | |||
594 | 9483422 | Access to memory region including confidential information | |||
595 | 9483328 | System and method for delivering application content | |||
596 | 9483249 | On-board applet migration | |||
597 | 9479928 | Cross-component message encryption | |||
598 | 9479605 | User presence data for web-based document collaboration | |||
599 | 9479509 | Unified system for authentication and authorization | |||
600 | 9479503 | Authenticating cloud computing enabling secure services | |||
601 | 9479497 | One time password authentication of websites | |||
602 | 9479496 | Communication terminal and secure log-in method acquiring password from server using user ID and sensor data | |||
603 | 9479375 | Joint physical layer security and PAPR mitigation in OFDM systems | |||
604 | 9479340 | Controlling use of encryption keys | |||
605 | 9479339 | Methods and apparatus for use in obtaining a digital certificate for a mobile communication device | |||
606 | 9479338 | Method and system for certificate discovery and ranking certificate authorities | |||
607 | 9479337 | Method and apparatus for deriving a certificate for a primary device | |||
608 | 9479336 | Generalized method for authenticating subscribers of a service via a graphical user interface or telephone using the same user name and password | |||
609 | 9479335 | Encrypted mass-storage device with self running application | |||
610 | 9479327 | Apparatus and method for generating key | |||
611 | 9477832 | Digital identity management | |||
612 | 9477830 | Controlled and client-side authentication module | |||
613 | 9477517 | Service broker systems, methods, and apparatus | |||
614 | 9473915 | Call verification system and method thereof and mobile terminal | |||
615 | 9473799 | Resource data query processing | |||
616 | 9473576 | Service discovery using collection synchronization with exact names | |||
617 | 9473498 | Method for using java servlets as a stack based state machine | |||
618 | 9473492 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
619 | 9473475 | Low-cost authenticated signing delegation in content centric networking | |||
620 | 9473474 | Communicating an identity of a group shared secret to a server | |||
621 | 9473470 | Method and system for the supply of data, transactions and electronic voting | |||
622 | 9473469 | Method and system for establishing a communications pipe between a personal security device and a remote computer system | |||
623 | 9473468 | Methods and systems of data security in browser storage | |||
624 | 9473467 | Customer controlled data privacy protection in public cloud | |||
625 | 9473311 | Method and device for managing certificates | |||
626 | 9473310 | Identity-based certificate management | |||
627 | 9473309 | System and method for providing a trust framework using a secondary network | |||
628 | 9473308 | Method and system for implementing digital signature in mobile operating system | |||
629 | 9473307 | Method and apparatus of data authentication | |||
630 | 9473306 | Document verification with ID augmentation | |||
631 | 9473305 | Computer program and method for biometrically secured, transparent encryption and decryption | |||
632 | 9473304 | Generation and distribution of named, definable, serialized tokens | |||
633 | 9473303 | Method and system for product authentication | |||
634 | 9471948 | System and method for administering licenses stored by a product unit, and administration of said unit in the field | |||
635 | 9471916 | Wireless establishment of identity via bi-directional RFID | |||
636 | 9471811 | Learning a new peripheral using a security provisioning manifest | |||
637 | 9471786 | Method for booting and dumping a confidential image on a trusted computer system | |||
638 | 9471775 | Security protocols for low latency execution of program code | |||
639 | 9471771 | Method of enhanced account authentication management integrated with real time script shifting | |||
640 | 9471770 | Method and control unit for recognizing manipulations on a vehicle network | |||
641 | 9471760 | Authentication of an end user | |||
642 | 9471119 | Detection of deleted records in a secure record management environment | |||
643 | 9467798 | Systems, methods and apparatuses for ensuring proximity of wifi communication devices | |||
644 | 9467492 | System and method for reconstructable all-in-one content stream | |||
645 | 9467450 | Data driven schema for patient data exchange system | |||
646 | 9467442 | Automated step-up digital certificate installation process | |||
647 | 9467440 | Method and apparatus for providing an authentication context-based session | |||
648 | 9467431 | Application specific master key selection in evolved networks | |||
649 | 9467430 | Device, method, and system for secure trust anchor provisioning and protection using tamper-resistant hardware | |||
650 | 9467405 | Routing messages between applications | |||
651 | 9467323 | Communication device and a control method therefor that perform authentication using digital certificates | |||
652 | 9467299 | Device for and method of controlled multilevel chain of trust/revision | |||
653 | 9467298 | Device for and method of multilevel chain of trust/revision | |||
654 | 9467297 | Industrial control system redundant communications/control modules authentication | |||
655 | 9467296 | Virally distributable trusted messaging | |||
656 | 9467295 | HNB or HeNB security access method and system, and core network element | |||
657 | 9467294 | Methods and systems for storing and retrieving data | |||
658 | 9467293 | Generating authentication codes associated with devices | |||
659 | 9467292 | Hardware-based zero-knowledge strong authentication (H0KSA) | |||
660 | 9467291 | Information processing system, information processing method, and non-transitory computer readable medium for processing requests using an authority object | |||
661 | 9467290 | Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols | |||
662 | 9467287 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
663 | 9467283 | Securing method for lawful interception | |||
664 | 9467280 | Methods and systems for personal authentication | |||
665 | 9466054 | Interoperable systems and methods for peer-to-peer service orchestration | |||
666 | 9465952 | Systems and methods for secure multi-tenant data storage | |||
667 | 9465947 | System and method for encryption and key management in cloud storage | |||
668 | 9465755 | Security parameter zeroization | |||
669 | 9465746 | Diagnostics for transactional execution errors in reliable transactions | |||
670 | 9464905 | Over-the-air vehicle systems updating and associate security protocols | |||
671 | 9462624 | Authenticated session establishment | |||
672 | 9462473 | Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI) | |||
673 | 9462470 | Dual interface device for access control and a method therefor | |||
674 | 9462464 | Secure and simplified procedure for joining a social Wi-Fi mesh network | |||
675 | 9462022 | Mobile application migration to cloud computing platform | |||
676 | 9462014 | System and method for tracking and auditing data access in a network environment | |||
677 | 9462005 | Systems and methods for broadcast WLAN messages with message authentication | |||
678 | 9462003 | Bidirectional authorization system, client and method | |||
679 | 9461995 | Terminal, network locking and network unlocking method for same, and storage medium | |||
680 | 9461994 | Trusted computing base evidence binding for a migratable virtual machine | |||
681 | 9461991 | Virtual smartcard authentication | |||
682 | 9461990 | Method for reading attributes from an ID token | |||
683 | 9461986 | Single sign-on for disparate servers | |||
684 | 9461983 | Multi-dimensional framework for defining criteria that indicate when authentication should be revoked | |||
685 | 9461975 | Method and system for traffic engineering in secured networks | |||
686 | 9461972 | Intelligently designed user interface based on user behavior | |||
687 | 9461828 | Signature-efficient real time credentials for OCSP and distributed OCSP | |||
688 | 9461827 | Method for distributing a list of certificate revocations in a vanet | |||
689 | 9461826 | Tamper-protected hardware and method for using same | |||
690 | 9461825 | Method and system for preventing revocation denial of service attacks | |||
691 | 9461824 | Transmitting a document | |||
692 | 9461822 | Image forming apparatus, control method, and storage medium | |||
693 | 9461821 | System and method for key material protection on devices using a secret sharing scheme | |||
694 | 9461819 | Information sharing system, computer, project managing server, and information sharing method used in them | |||
695 | 9461817 | Method and system for encrypting JavaScript object notation (JSON) messages | |||
696 | 9461759 | Identification of changed broadcast media items | |||
697 | 9460575 | Vehicle control apparatus and method thereof | |||
698 | 9460435 | Advancing a committed transaction time | |||
699 | 9460312 | Data integrity protection from rollback attacks for use with systems employing message authentication code tags | |||
700 | 9460020 | Diagnostics for transactional execution errors in reliable transactions | |||
701 | 9457740 | Vehicle control system | |||
702 | 9455992 | Trusted hardware component for distributed systems | |||
703 | 9455988 | System and method for verifying status of an authentication device | |||
704 | 9455984 | Secret data matching device, secret data matching method, and recording medium | |||
705 | 9455978 | System and method to enable PKI- and PMI- based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added | |||
706 | 9455975 | Techniques for managing credentials in a distributed computing environment | |||
707 | 9455972 | Provisioning a mobile device with a security application on the fly | |||
708 | 9455967 | Load balancing hash computation for network switches | |||
709 | 9455963 | Long term encrypted storage and key management | |||
710 | 9455962 | Protecting memory interface | |||
711 | 9455886 | Providing mobile device management functionalities | |||
712 | 9455839 | Wireless key management for authentication | |||
713 | 9455838 | Creating a digital certificate for a service using a local certificate authority having temporary signing authority | |||
714 | 9455837 | Method and system for exchange multifunction job security using IPV6 neighbor discovery options | |||
715 | 9455836 | Verification of authenticity and responsiveness of biometric evidence and/or other evidence | |||
716 | 9455835 | System and method for circular link resolution with hash-based names in content-centric networks | |||
717 | 9455834 | Securely providing secret data from a sender to a receiver | |||
718 | 9455833 | Behavioral fingerprint in a white-box implementation | |||
719 | 9455832 | Signatures with confidential message recovery | |||
720 | 9455830 | Method for securing credentials in a remote repository | |||
721 | 9454677 | Secure communication architecture including video sniffer | |||
722 | 9454666 | Method for protecting data | |||
723 | 9454660 | Security verification device and a security verification method | |||
724 | 9454657 | Security access device and method | |||
725 | 9454605 | Transferring data between devices using bar codes | |||
726 | 9454494 | Encrypting a communication from a device | |||
727 | 9452733 | Vehicle-mounted control system and vehicle-mounted control device | |||
728 | 9451452 | Method of triggering a key delivery from a mesh key distributor | |||
729 | 9450966 | Method and apparatus for lifecycle integrity verification of virtual machines | |||
730 | 9450947 | Apparatus and method for securing a debugging session | |||
731 | 9450937 | Vehicle network authentication system, and vehicle network authentication method | |||
732 | 9450933 | Systems and methods for device and data authentication | |||
733 | 9450928 | Secure registration of group of clients using single registration procedure | |||
734 | 9450765 | System and method capable of verifying contactless sensor tag | |||
735 | 9450764 | Systems and methods for validating self-signed certificates | |||
736 | 9450763 | Server-side key generation | |||
737 | 9450761 | Memory system and method of generating management information | |||
738 | 9450760 | System and method for authenticating a client to a device | |||
739 | 9450759 | Apparatus and methods for controlling distribution of electronic access clients | |||
740 | 9450758 | Virtual requests | |||
741 | 9450757 | Method and device for communication security | |||
742 | 9450756 | Method and system for authenticating entity based on symmetric encryption algorithm | |||
743 | 9449195 | Method and apparatus to perform online credential reporting | |||
744 | 9449191 | Device, system and method for securing and comparing genomic data | |||
745 | 9449183 | Secure file drawer and safe | |||
746 | 9449180 | Secure data parser method and system | |||
747 | 9449178 | System, method and computer product for fast and secure data searching | |||
748 | 9449166 | Performing authentication based on user shape manipulation | |||
749 | 9449165 | System and method for wireless proximity-based access to a computing device | |||
750 | 9449164 | Method of securing a computing device | |||
751 | 9449153 | Unique and unclonable platform identifiers using data-dependent circuit path responses | |||
752 | 9448950 | Using authenticated manifests to enable external certification of multi-processor platforms | |||
753 | 9448949 | Mobile data vault | |||
754 | 9448405 | Head mounted display, motion detector, motion detection method, image presentation system and program | |||
755 | 9445269 | Terminal identity verification and service authentication method, system and terminal | |||
756 | 9445263 | Method for ensuring security and privacy in a wireless cognitive network | |||
757 | 9444849 | Enforcing policy compliance on a device | |||
758 | 9444822 | Storage array access control from cloud-based user authorization and authentication | |||
759 | 9444809 | Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones.TM. | |||
760 | 9444805 | Context-aware validation | |||
761 | 9444803 | Authentication method and system oriented to heterogeneous network | |||
762 | 9444801 | Method, device and system for verifying communication sessions | |||
763 | 9444789 | System and method for secure cloud service delivery with prioritized services in a network environment | |||
764 | 9444645 | Method and device for assessing a probative value of electronic document management systems | |||
765 | 9444632 | Quantum secure device, system and method for verifying challenge-response pairs using a physically unclonable function (PUF) | |||
766 | 9444631 | Certificates for low-power or low-memory devices | |||
767 | 9444630 | Visualization of trust in an address bar | |||
768 | 9444629 | Dual layer transport security configuration | |||
769 | 9444628 | Providing differential access to a digital document | |||
770 | 9444627 | System and method for providing global platform compliant trusted execution environment | |||
771 | 9444626 | Password processing device | |||
772 | 9444625 | Systems and methods for authenticating an electronic message | |||
773 | 9444624 | Providing user authentication | |||
774 | 9444621 | Electronic key system | |||
775 | 9444517 | Coupled inductor power transfer system | |||
776 | 9443298 | Digital fingerprinting object authentication and anti-counterfeiting system | |||
777 | 9443240 | Transaction verification on RFID enabled payment and transaction instruments | |||
778 | 9443238 | Distributed payment system and method | |||
779 | 9443229 | Supply chain message management and shipment constraint optimization | |||
780 | 9443108 | Secure timestamping | |||
781 | 9443107 | Method for protecting the integrity of a group of memory elements using an aggregate authentication code | |||
782 | 9443071 | Proximity based device security | |||
783 | 9443068 | System and method for preventing unauthorized access to information | |||
784 | 9442808 | Session tickets for a backup and recovery system | |||
785 | 9442695 | Random bit generator based on nanomaterials | |||
786 | 9439068 | Dynamic configuration for a wireless peripheral device | |||
787 | 9439067 | Systems and methods of performing link setup and authentication | |||
788 | 9438964 | Capturing video of an image with embedded code to access content | |||
789 | 9438667 | Method and system for fast access to advanced visualization of medical scans using a dedicated web portal | |||
790 | 9438629 | Sensitive information leakage prevention system, sensitive information leakage prevention method, and computer-readable recording medium | |||
791 | 9438608 | Method and device for verifying the integrity of platform software of an electronic device | |||
792 | 9438604 | Managing user authentication in association with application access | |||
793 | 9438590 | Privacy preserving biometric authentication based on error correcting codes | |||
794 | 9438589 | Binding a digital file to a person's identity using biometrics | |||
795 | 9438588 | Passporting credentials between a mobile app and a web browser | |||
796 | 9438586 | Method and system for processing operation request | |||
797 | 9438583 | Certificate generation method, certificate generation apparatus, information processing apparatus, and communication device | |||
798 | 9438571 | Securely connecting control device to target device | |||
799 | 9438569 | Secured embedded data encryption systems | |||
800 | 9438568 | System and method for email and file decryption without direct access to required decryption key | |||
801 | 9438506 | Identity and access management-based access control in virtual networks | |||
802 | 9438429 | Method for authentication and electronic device for performing the authentication | |||
803 | 9438428 | Method and system for email identity validation | |||
804 | 9438427 | Method and system for providing a plurality of tamperproof digital certificates for a plurality of public keys of a device | |||
805 | 9438426 | Key-value data storage device with hybrid architecture | |||
806 | 9438425 | Robust MAC aggregation with short MAC tags | |||
807 | 9438424 | Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices | |||
808 | 9438423 | Encryption device, encryption method, and information processing device | |||
809 | 9438417 | System and method for shared key agreement over untrusted communication channels | |||
810 | 9437201 | Advanced watermarking system and method | |||
811 | 9437196 | Working method of sound transmission-based dynamic token | |||
812 | 9436930 | Method and apparatus for recognizing image content | |||
813 | 9436923 | Tracking unitization occurring in a supply chain | |||
814 | 9436845 | Physically unclonable fuse using a NOR type memory array | |||
815 | 9436841 | Enhanced system security | |||
816 | 9436817 | Information-processing device, service-providing system, service-providing method, and computer program | |||
817 | 9436812 | Platform-hardened digital rights management key provisioning | |||
818 | 9436773 | Method and computer program for discovering a dynamic network address | |||
819 | 9436557 | Method and computation node for processing application data | |||
820 | 9432384 | Methods and nodes for verification of data | |||
821 | 9432368 | Document distribution and interaction | |||
822 | 9432364 | System and method for providing a service to end terminal that uses authentication information of another mobile communication terminal, service server, mobile communication terminal, end terminal, and storage medium | |||
823 | 9432359 | Registration and network access control | |||
824 | 9432350 | System and method for intelligent workload management | |||
825 | 9432345 | Authentication engine and stream cipher engine sharing in digital content protection architectures | |||
826 | 9432340 | System and method for secure end-to-end chat system | |||
827 | 9432199 | System access determination based on classification of stimuli | |||
828 | 9432198 | Method for certificate-based authentication | |||
829 | 9432197 | Wireless communications device and authentication processing method | |||
830 | 9432196 | Methods, apparatus, and systems for secure demand paging and other paging operations for processor devices | |||
831 | 9432195 | Method of operating data security and electronic device supporting the same | |||
832 | 9432194 | Recording medium with authentication and encryption/decryption functions | |||
833 | 9432193 | Face-based authentication with situational adaptivity | |||
834 | 9432190 | Computational systems and methods for double-encrypting data for subsequent anonymous storage | |||
835 | 9430672 | Stack fusion architecture including distributed software clusters to enable software communication services | |||
836 | 9430671 | Method and apparatus for privacy protected clustering of user interest profiles | |||
837 | 9430650 | Method for managing memory space in a secure non-volatile memory of a secure element | |||
838 | 9430648 | Method and apparatus for near field communication | |||
839 | 9430628 | Access authorization based on synthetic biometric data and non-biometric data | |||
840 | 9430620 | System and method for securing the life-cycle of user domain rights objects | |||
841 | 9430619 | Media decoding control with hardware-protected digital rights management | |||
842 | 9430406 | System for generating a cryptographic key from a memory used as a physically unclonable function | |||
843 | 9426660 | EHF secure communication device | |||
844 | 9426659 | Service activation using algorithmically defined key | |||
845 | 9426648 | Systems and methods of performing link setup and authentication | |||
846 | 9426647 | Method and device for protecting privacy data of mobile terminal user | |||
847 | 9426164 | Network device and network system | |||
848 | 9426147 | Protected device management | |||
849 | 9426146 | Digital certificate issuer-correlated digital signature verification | |||
850 | 9426145 | Designation of classes for certificates and keys | |||
851 | 9426138 | Identity-independent authentication tokens | |||
852 | 9426136 | Increased communication security | |||
853 | 9426135 | Increased communication security | |||
854 | 9426134 | Method and systems for the authentication of a user | |||
855 | 9426128 | System for generating a security document | |||
856 | 9426116 | Multiple-master DNS system | |||
857 | 9425968 | System and method for updating an encryption key across a network | |||
858 | 9425967 | Method for certificate generation and revocation with privacy preservation | |||
859 | 9425966 | Security mechanism evaluation service | |||
860 | 9425965 | Cryptographic certification of secure hosted execution environments | |||
861 | 9425964 | Display device with mobile high-definition link port and signal processing method thereof | |||
862 | 9425963 | Securing electronic control units using message authentication codes | |||
863 | 9425962 | Low energy Bluetooth system with authentication during connectionless advertising and broadcasting | |||
864 | 9425960 | Searchable encryption for outsourcing data analytics | |||
865 | 9425958 | System, method and apparatus for cryptography key management for mobile devices | |||
866 | 9425955 | Power line communication (PLC) network nodes using cipher then segment security | |||
867 | 9424576 | Methods and systems of creating a payment record with a cryptographically secure audit trail | |||
868 | 9424573 | Batch settlement transactions system and method | |||
869 | 9424564 | Interoperable systems and methods for peer-to-peer service orchestration | |||
870 | 9424478 | Multimodal biometric profiling | |||
871 | 9424413 | Integration of payment capability into secure elements of computers | |||
872 | 9424410 | Methods and systems for leveraging transaction data to dynamically authenticate a user | |||
873 | 9424407 | Weak password support in a multi-user environment | |||
874 | 9424406 | Asset protection based on redundantly associated trusted entitlement verification | |||
875 | 9424400 | Digital rights management system transfer of content and distribution | |||
876 | 9420457 | Multiple-persona on mobile devices | |||
877 | 9420454 | Method for ensuring security and privacy in a wireless cognitive network | |||
878 | 9420007 | Access control using impersonization | |||
879 | 9419978 | Personal video channels | |||
880 | 9419969 | Method and system for granting access to a secured website | |||
881 | 9419966 | Method for producing dynamic data structures for authentication and/or password identification | |||
882 | 9419965 | Digital certification analyzer | |||
883 | 9419964 | Sharing between CPE and companion device | |||
884 | 9419961 | Apparatus and method for managing use of secure tokens | |||
885 | 9419956 | Systems and methods for authenticating a user for accessing account information using a web-enabled device | |||
886 | 9419949 | Increased communication security | |||
887 | 9419948 | Method and apparatus for avoiding license storming during an unplanned regional blackout | |||
888 | 9419806 | Trusted certificate authority to create certificates based on capabilities of processes | |||
889 | 9419805 | Generating a CRL using a sub-system having resources separate from a main certificate authority sub-system | |||
890 | 9419804 | Data authenticity assurance method, management computer, and storage medium | |||
891 | 9419803 | Flexible data authentication | |||
892 | 9419802 | Secure message filtering to vehicle electronic control units with secure provisioning of message filtering rules | |||
893 | 9419801 | System and method for transmitting needed portions of a data file between networked computers | |||
894 | 9419800 | Secure network systems and methods | |||
895 | 9419799 | System and method to provide secure credential | |||
896 | 9418027 | Secure boot information with validation control data specifying a validation technique | |||
897 | 9418026 | Transition between states in a processor | |||
898 | 9414230 | Certificate management with consequence indication | |||
899 | 9413752 | One-time password operating method | |||
900 | 9413738 | Securing communications with enhanced media platforms | |||
901 | 9413732 | Vehicle network system | |||
902 | 9413693 | Network relay apparatus and program | |||
903 | 9413538 | Cryptographic certification of secure hosted execution environments | |||
904 | 9413537 | Information update system and method, vehicle, charger and server apparatus | |||
905 | 9413536 | Remote secure device management in smart grid ami networks | |||
906 | 9413535 | Critical security parameter generation and exchange system and method for smart-card memory modules | |||
907 | 9413534 | Mobile device-based keypad for enhanced security | |||
908 | 9413533 | System and method for authorizing a new authenticator | |||
909 | 9413532 | Information recording device | |||
910 | 9412284 | Contour encryption and decryption | |||
911 | 9412283 | System, design and process for easy to use credentials management for online accounts using out-of-band authentication | |||
912 | 9412148 | Transmission terminal, transmission method, and computer-readable recording medium storing transmission program | |||
913 | 9411981 | Method and system for activating a portable data carrier | |||
914 | 9411972 | System and method for creating and protecting secrets for a plurality of groups | |||
915 | 9411952 | Method for authentication | |||
916 | 9411950 | Methods and systems for user authentication in a computer system using image-based log-ins | |||
917 | 9411949 | Encrypted image with matryoshka structure and mutual agreement authentication system and method using the same | |||
918 | 9411946 | Fingerprint password | |||
919 | 9411748 | Secure replay protected storage | |||
920 | 9407852 | Method and system for providing program guide data from a content provider to a user device through a partner service provider based upon user attributes | |||
921 | 9407637 | Method for managing and checking data from different identity domains organized into a structured set | |||
922 | 9407634 | Cryptographic protocol for portable devices | |||
923 | 9407633 | System and method for cross-channel authentication | |||
924 | 9407629 | Method for assembling authorization certificate chains | |||
925 | 9407622 | Methods and apparatus for delegated authentication token retrieval | |||
926 | 9407620 | System and method for identity management | |||
927 | 9407619 | Un-password.TM.: risk aware end-to-end multi-factor authentication via dynamic pairing | |||
928 | 9407618 | Systems and methods for device and data authentication | |||
929 | 9407617 | Pass-thru for client authentication | |||
930 | 9407615 | Single set of credentials for accessing multiple computing resource services | |||
931 | 9407610 | Method and system for securing communication | |||
932 | 9407609 | Lighting system, a light source, a device and a method of authorizing the device by the light source | |||
933 | 9407446 | Communication device, communication method, reader/writer, and communication system | |||
934 | 9407445 | Security system and method | |||
935 | 9407444 | Method for validating messages | |||
936 | 9407443 | Component analysis of software applications on computing devices | |||
937 | 9407442 | Tamper-evident network messaging method and system, and device configured therefor | |||
938 | 9407441 | Adding entropy to key generation on a mobile device | |||
939 | 9407440 | Multiple authority data security and access | |||
940 | 9407439 | Authentication system and authentication code convertor | |||
941 | 9407436 | Portable device registration system and portable device registration method | |||
942 | 9407431 | Systems and methods for distributing and securing data | |||
943 | 9406054 | Virtual account based new digital cash protocols | |||
944 | 9405912 | Hardware rooted attestation | |||
945 | 9405898 | Secure element as a digital pocket | |||
946 | 9405897 | Authenticating an entity | |||
947 | 9405891 | User authentication | |||
948 | 9401928 | Data stream security processing method and apparatus | |||
949 | 9401921 | Insuring integrity of remote procedure calls used in a client and server storage system | |||
950 | 9401919 | Web form protection | |||
951 | 9401918 | User to user delegation service in a federated identity management environment | |||
952 | 9401913 | Updating stored passwords | |||
953 | 9401907 | Information processing apparatus and method, recording medium and program | |||
954 | 9401896 | Systems and methods for authenticating and protecting the integrity of data streams and other data | |||
955 | 9401895 | Device configuration for secure communication | |||
956 | 9401888 | Internet protocol mapping resolution in fixed mobile convergence networks | |||
957 | 9401811 | Attribute-based digital signatures | |||
958 | 9401809 | Composite system, method, and storage medium | |||
959 | 9401804 | Leakage resilient garbled circuit generation using reduced memory hardware token | |||
960 | 9401059 | System and method for secure voting | |||
961 | 9400979 | Transactional security over a network | |||
962 | 9400879 | Method and system for providing authentication through aggregate analysis of behavioral and time patterns | |||
963 | 9400846 | Method and system for managing information in an on-line community | |||
964 | 9398622 | System and method for connecting a communication to a client | |||
965 | 9398455 | System and method for generating an identification based on a public key of an asymmetric key pair | |||
966 | 9398397 | Secure manipulation of embedded modem connection settings through short messaging service communication | |||
967 | 9398063 | Customizing distribution of an operating system based on detected network carrier by retrieving differences between the distributed operating system and an operating system currently installed on a computing device | |||
968 | 9398038 | Collaborative phishing attack detection | |||
969 | 9398025 | Method for generating and check-controlling network identity indentification code in network electronic identification card | |||
970 | 9398024 | System and method for reliably authenticating an appliance | |||
971 | 9398023 | Server verification of secure electronic messages | |||
972 | 9398018 | Virtual currency system | |||
973 | 9398008 | Cloud-based system for reading of decodable indicia | |||
974 | 9398005 | Managing seed provisioning | |||
975 | 9398004 | Method for reading attributes from an ID token | |||
976 | 9398003 | Token device re-synchronization through a network solution | |||
977 | 9397997 | Systems and methods for secure operation of an industrial controller | |||
978 | 9397996 | Establishing historical usage-based hardware trust | |||
979 | 9397994 | Packet forwarding device, packet forwarding system, and packet forwarding method | |||
980 | 9397991 | Digital content distribution and subscription system | |||
981 | 9397986 | Authenticating acceptance of a string using an automaton | |||
982 | 9397982 | Secure key storage systems, methods and apparatuses | |||
983 | 9397841 | Motion-based human verification system and method | |||
984 | 9397840 | Digital certificate automatic application method, device and system | |||
985 | 9397839 | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (IGCP/PKI) | |||
986 | 9397838 | Credential management | |||
987 | 9397837 | Secure access to information associated with a value item | |||
988 | 9397836 | Securing devices to process control systems | |||
989 | 9397835 | Web of trust management in a distributed system | |||
990 | 9397829 | Electronic key registration method and electronic key registration system | |||
991 | 9397827 | Systems and methods for managing cryptographic keys | |||
992 | 9396506 | System providing an improved skimming resistance for an electronic identity document | |||
993 | 9396372 | Method for monitoring a system comprising a number of readers and a plurality of portable communication units | |||
994 | 9396348 | System and method for electronic stamping | |||
995 | 9396339 | Protecting computers using an identity-based router | |||
996 | 9396338 | Method and system for providing a secure secrets proxy | |||
997 | 9396320 | System and method for non-intrusive, privacy-preserving authentication | |||
998 | 9392454 | System and method for computer authentication using image analysis of a shared secret | |||
999 | 9392453 | Authentication | |||
1000 | 9392448 | Wireless communications system | |||
1001 | 9391993 | Sharing content by indicating activity from users in a social network | |||
1002 | 9391988 | Community biometric authentication on a smartphone | |||
1003 | 9391986 | Method and apparatus for providing multi-sensor multi-factor identity verification | |||
1004 | 9391984 | Mobile virtual communication and entertainment service | |||
1005 | 9391980 | Enterprise platform verification | |||
1006 | 9391967 | Authentication for network access related applications | |||
1007 | 9391961 | Information operating device, information output device, and information processing method | |||
1008 | 9391783 | Method and system for state machine security device | |||
1009 | 9391782 | Validation of user credentials | |||
1010 | 9391781 | Systems and methods for intermediate message authentication in a switched-path network | |||
1011 | 9391780 | Method and device for storing secured sent message data | |||
1012 | 9391779 | Reactive biometric single sign-on utility | |||
1013 | 9391778 | Secure password management systems, methods and apparatuses | |||
1014 | 9391777 | System and method for performing key resolution over a content centric network | |||
1015 | 9391776 | Method and system for authenticating peer devices using EAP | |||
1016 | 9391775 | Signature method and device | |||
1017 | 9391774 | Strauss greenmail system and method | |||
1018 | 9391772 | Key information generation device and key information generation method | |||
1019 | 9391014 | Physical unclonable interconnect function array | |||
1020 | 9390296 | Computer recovery or return | |||
1021 | 9390295 | Device with capacitive security shield | |||
1022 | 9390290 | Applying group policies | |||
1023 | 9390254 | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method | |||
1024 | 9390240 | System and method for querying data | |||
1025 | 9390030 | Information processing device, information storage device, information processing system, information processing method, and program | |||
1026 | 9386254 | Broadcast method and broadcast apparatus | |||
1027 | 9386037 | Using hash signatures of DOM objects to identify website similarity | |||
1028 | 9386033 | Security recommendation engine | |||
1029 | 9386026 | System and method for scheduling and executing secure electronic correspondence operations | |||
1030 | 9386023 | Method, apparatus and system for managing packet delivery | |||
1031 | 9386017 | Authentication device, system and method | |||
1032 | 9386015 | Security model for industrial devices | |||
1033 | 9386013 | Dynamic password authentication method and system thereof | |||
1034 | 9386011 | Systems and methods for managing resetting of user online identities or accounts | |||
1035 | 9386009 | Secure identification string | |||
1036 | 9386005 | Method and system for data communication over network | |||
1037 | 9385996 | Method of operating a computing device, computing device and computer program | |||
1038 | 9385995 | Anonymous authentication | |||
1039 | 9385954 | Hashing techniques for use in a network environment | |||
1040 | 9385872 | Reissue of cryptographic credentials | |||
1041 | 9385871 | Method and apparatus for authenticating a non-volatile memory device | |||
1042 | 9385870 | Secure method for remote grant of operating rights | |||
1043 | 9385869 | Systems and methods for trusting digitally signed files in the absence of verifiable signature conditions | |||
1044 | 9385868 | Methods and systems for testing performance of biometric authentication systems | |||
1045 | 9385864 | Secure session capability using public-key cryptography without access to the private key | |||
1046 | 9385863 | System and method for authenticating a communication device | |||
1047 | 9385862 | Method and apparatus for binding subscriber authentication and device authentication in communication systems | |||
1048 | 9384484 | Secure content distribution system | |||
1049 | 9384390 | Sensing data from physical objects | |||
1050 | 9384344 | Authorizing local application activity using remotely defined security data | |||
1051 | 9384341 | System and method for controlling access to secure resources | |||
1052 | 9384338 | Architectures for privacy protection of biometric templates | |||
1053 | 9380093 | Mobile device application streaming | |||
1054 | 9380062 | Techniques for sharing virtual machine (VM) resources | |||
1055 | 9380058 | Systems and methods for anonymous authentication using multiple devices | |||
1056 | 9380050 | Scan image authentication | |||
1057 | 9380043 | System and method for providing a one-time key for identification | |||
1058 | 9380038 | Bootstrap authentication framework | |||
1059 | 9380026 | Authenticating to a network via a device-specific one time password | |||
1060 | 9380024 | Method and apparatus for providing security to devices | |||
1061 | 9379897 | Method and apparatus for providing an interactive hierarchical entitlement map | |||
1062 | 9379896 | Compromised password mitigation | |||
1063 | 9379895 | HTTP authentication and authorization management | |||
1064 | 9379894 | Authentication using cryptographic value derived from a shared secret of a near field communication tag | |||
1065 | 9379892 | Trusted manager bridge | |||
1066 | 9378499 | Software PIN entry | |||
1067 | 9378359 | Gateway for controlling mobile device access to enterprise resources | |||
1068 | 9378358 | Password management system | |||
1069 | 9378356 | Two factor authentication using a one-time password | |||
1070 | 9378351 | System and method for enrolling in a biometric system | |||
1071 | 9378348 | Adding biometric identification to the server security infrastructure for an enterprise service bus system | |||
1072 | 9378347 | Computer terminals biometrically enabled for network functions and voice communication | |||
1073 | 9378343 | Automatic detection of required network key type | |||
1074 | 9374837 | Preventing misuse of random access procedure in wireless communication system | |||
1075 | 9374707 | Secure connection for wireless devices via network records | |||
1076 | 9374619 | System and method for enabling pairing of a companion device with a mate device for performing a companion device | |||
1077 | 9374407 | Mobile device application streaming | |||
1078 | 9374373 | Encryption techniques for improved sharing and distribution of encrypted content | |||
1079 | 9374358 | Methods, systems, and media for providing access control for a computing device | |||
1080 | 9374355 | Programming vehicle modules from remote devices and related methods and systems | |||
1081 | 9374350 | Authenticating method of communicating connection, gateway apparatus using authenticating method, and communication system using authenticating method | |||
1082 | 9374347 | Method and system for authentication over a public network using multiple out-of-band communications channels to send keys | |||
1083 | 9374344 | Secure end-to-end communication system | |||
1084 | 9374229 | Graphical user interface for digital certificate profile configuration | |||
1085 | 9374228 | Verifying a geographic location of a virtual disk image executing at a data center server within a data center | |||
1086 | 9374227 | Verification of signed digital documents | |||
1087 | 9374226 | Protection method and system for distributing digital files whether new, second-hand, for rental, exchange or transfer | |||
1088 | 9374225 | Document de-registration | |||
1089 | 9374224 | System and methods for encrypting data | |||
1090 | 9374223 | Methods and apparatus for including a confidential structural component in a third party remote product simulation | |||
1091 | 9374222 | Secure communication of data between devices | |||
1092 | 9374221 | Distributed protection of credential stores utilizing multiple keys derived from a master key | |||
1093 | 9374218 | Method for conducting data encryption and decryption using symmetric cryptography algorithm and table look-up device | |||
1094 | 9373205 | Access control system and method for use by an access device | |||
1095 | 9373122 | Methods, apparatus and computer program products for securely accessing account data | |||
1096 | 9373002 | Electronic document management and delivery | |||
1097 | 9372986 | Selective password synchronization | |||
1098 | 9372982 | ID usage tracker | |||
1099 | 9372981 | Electronic device and method for unlocking screen of electronic device | |||
1100 | 9372972 | System and method for establishing and monetizing trusted identities in cyberspace with personal data service and user console | |||
1101 | 9369873 | Network application function authorisation in a generic bootstrapping architecture | |||
1102 | 9369495 | Sensor aware security policies with embedded controller hardened enforcement | |||
1103 | 9369479 | Detection of malware beaconing activities | |||
1104 | 9369463 | Information processing method and system | |||
1105 | 9369461 | Passcode verification using hardware secrets | |||
1106 | 9369459 | Method of establishing secure groups of trusted contacts with access rights in a secure communication system | |||
1107 | 9369455 | Computerized method and system for managing an email input facility in a networked secure collaborative exchange environment | |||
1108 | 9369454 | Computerized method and system for managing a community facility in a networked secure collaborative exchange environment | |||
1109 | 9369448 | Network security parameter generation and distribution | |||
1110 | 9369442 | System and method for the safe spontaneous transmission of confidential data over unsecure connections and switching computers | |||
1111 | 9369441 | End-to-end secure communication system | |||
1112 | 9369290 | Challenge-response authentication using a masked response value | |||
1113 | 9369289 | Methods and systems for performing secure authenticated updates of authentication credentials | |||
1114 | 9369288 | Video data delivery protection | |||
1115 | 9369287 | System and method for applying a digital signature and authenticating physical documents | |||
1116 | 9369286 | System and methods for facilitating authentication of an electronic device accessing plurality of mobile applications | |||
1117 | 9369285 | Social network based PKI authentication | |||
1118 | 9369284 | Browser based identity with multiple login | |||
1119 | 9369283 | Method for entering password and portable electronic device and unlocking method and data authenticating method | |||
1120 | 9369282 | Mobile device user authentication for accessing protected network resources | |||
1121 | 9369281 | Method and system for secure use of services by untrusted storage providers | |||
1122 | 9369280 | Secure processing systems and methods | |||
1123 | 9367842 | Software pin entry | |||
1124 | 9367833 | Data services outsourcing verification | |||
1125 | 9367708 | Method for producing a hardware device and hardware device | |||
1126 | 9367699 | Automating the creation and maintenance of policy compliant environments | |||
1127 | 9367693 | Bitstream confirmation for configuration of a programmable logic device | |||
1128 | 9367678 | Password authentication | |||
1129 | 9367676 | System and method for confirming location using supplemental sensor and/or location data | |||
1130 | 9367675 | Method for verifying and calibrating time | |||
1131 | 9367669 | Content source identification using matrix barcode | |||
1132 | 9367339 | Cryptographically attested resources for hosting virtual machines | |||
1133 | 9367328 | Out-of-band host OS boot sequence verification | |||
1134 | 9363672 | Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogenous wireless network and heterogeneous or homogenous wireless network | |||
1135 | 9363670 | Systems and methods for restricting access to network resources via in-location access point protocol | |||
1136 | 9363578 | Communication system, communication device, communication method, and computer program | |||
1137 | 9363411 | Data certification system, server device, client device, publishing server, and data certification method | |||
1138 | 9363273 | Secure clock synchronization | |||
1139 | 9363266 | Secured electronic device | |||
1140 | 9363262 | Authentication tokens managed for use with multiple sites | |||
1141 | 9363259 | Performing client authentication using onetime values recovered from barcode graphics | |||
1142 | 9363258 | Secure digital signature system | |||
1143 | 9363256 | User authentication in separate authentication channels | |||
1144 | 9363249 | Secure simple enrollment | |||
1145 | 9363246 | Certificate distribution device and method for same, and computer program | |||
1146 | 9363245 | Secure network access | |||
1147 | 9363090 | Authorization of communication links between end user devices using intermediary nodes | |||
1148 | 9363089 | Information processing apparatus, information storage apparatus, information processing system, and information processing method and program for controlling content use | |||
1149 | 9363088 | Automated provisioning of a network appliance | |||
1150 | 9363087 | End-to-end security for hardware running verified software | |||
1151 | 9363086 | Aggregate signing of data in content centric networking | |||
1152 | 9363085 | Attestation of data sanitization | |||
1153 | 9363084 | Methods and apparatus for controlling the transmission and receipt of email message | |||
1154 | 9363083 | Authentication method and system | |||
1155 | 9363082 | Cryptographic communication system and cryptographic communication method | |||
1156 | 9363080 | System for managing cryptographic keys and trust relationships in a secure shell (SSH) environment | |||
1157 | 9363079 | Method of generating message authentication code and authentication device and authentication request device using the method | |||
1158 | 9363077 | Time-based authentication | |||
1159 | 9361740 | Systems and methods for access control | |||
1160 | 9361482 | Device specific information generation device and device specific generation method | |||
1161 | 9361471 | Secure vault service for software components within an execution environment | |||
1162 | 9361467 | Owner-controlled access control to released data | |||
1163 | 9361452 | Mobile credential revocation | |||
1164 | 9361447 | Authentication based on user-selected image overlay effects | |||
1165 | 9361440 | Secure off-chip processing such as for biometric data | |||
1166 | 9361436 | Multiple profile authentication | |||
1167 | 9361435 | Multi-tier digital supply chain management | |||
1168 | 9361265 | Method and device for integrating a device into a network | |||
1169 | 9357389 | Security identity discovery and communication method | |||
1170 | 9357247 | Apparatus and methods for content delivery and message exchange across multiple content delivery networks | |||
1171 | 9357083 | System and method for providing user lifecycle management and service orchestration of multiple media services across multiple display screens | |||
1172 | 9356968 | Managing authentication using common authentication framework circuitry | |||
1173 | 9356946 | Detecting malware in mobile sites | |||
1174 | 9356927 | Enabling digital signatures in mobile apps | |||
1175 | 9356916 | System and method to use a cloud-based platform supported by an API to authenticate remote users and to provide PKI- and PMI-based distributed locking of content and distributed unlocking of protected content | |||
1176 | 9356826 | Connecting network management systems | |||
1177 | 9356787 | Secure communication architecture including sniffer | |||
1178 | 9356786 | Method for encrypting a plurality of data in a secure set | |||
1179 | 9356778 | Secured communication for local area network | |||
1180 | 9356718 | Method and system for protecting broadcast service/content in a mobile broadcast system, and method for generating short term key message therefor | |||
1181 | 9356622 | Apparatus and method for reconstructing a bit sequence with preliminary correction | |||
1182 | 9355389 | Purchase transaction system with encrypted payment card data | |||
1183 | 9355274 | Method and device for archiving a document | |||
1184 | 9351165 | Identity verifying method, account acquiring method, and mobile terminal | |||
1185 | 9350900 | Information processing apparatus, and user authentication method for information processing apparatus | |||
1186 | 9350819 | Centralized service for distributed service deployments | |||
1187 | 9350746 | Transmission network system, transmission method, and authentication information device | |||
1188 | 9350739 | Recovery from rolling security token loss | |||
1189 | 9350732 | Integrity protection for data storage | |||
1190 | 9350731 | Secure method of processing data | |||
1191 | 9350728 | Method and system for generating and authorizing dynamic password | |||
1192 | 9350726 | Recovery from rolling security token loss | |||
1193 | 9350722 | Authentication of an end user | |||
1194 | 9350721 | Air interface security method and device | |||
1195 | 9350720 | Delegating authorizations | |||
1196 | 9350715 | Methods and apparatus for network communications via a transparent security proxy | |||
1197 | 9350700 | Watermark generator, watermark decoder, method for providing a watermark signal in dependence on binary message data, method for providing binary message data in dependence on a watermarked signal and computer program using a differential encoding | |||
1198 | 9350556 | Security model for identification and authentication in encrypted communications using delegate certificate chain bound to third party key | |||
1199 | 9350555 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
1200 | 9350554 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
1201 | 9350553 | One-to-many electronic signature process | |||
1202 | 9350552 | Document fingerprinting | |||
1203 | 9350551 | Validity determination method and validity determination apparatus | |||
1204 | 9350550 | Power management and security for wireless modules in "machine-to-machine" communications | |||
1205 | 9350549 | Selective shredding in a deduplication system | |||
1206 | 9350548 | Two factor authentication using a protected pin-like passcode | |||
1207 | 9350547 | Systems and methods for watermarking software and other media | |||
1208 | 9350546 | Method and system to decrypt private contents | |||
1209 | 9350545 | Recovery mechanism for fault-tolerant split-server passcode verification of one-time authentication tokens | |||
1210 | 9350541 | Communication apparatus, communication method, communication system, and computer program | |||
1211 | 9350540 | System and method of secure encryption for electronic data transfer | |||
1212 | 9350538 | Revocation status using other credentials | |||
1213 | 9348996 | Method and device for the authentication of at least two agricultural devices coupled via a data bus | |||
1214 | 9348986 | Authentication server apparatus, authentication server apparatus-use program and authentication method | |||
1215 | 9348981 | System and method for generating user authentication challenges | |||
1216 | 9348437 | Mobile data collection and validation systems and methods | |||
1217 | 9345058 | Efficient communication for devices of a home network | |||
1218 | 9344895 | Method and system for securely accessing portable hotspot for intelligent mobile phones | |||
1219 | 9344891 | Secure reception reporting | |||
1220 | 9344884 | Module for authenticity verification of authentication messages | |||
1221 | 9344688 | Recall device | |||
1222 | 9344489 | Electronic data sharing device and method of use | |||
1223 | 9344455 | Apparatus and method for sharing a hardware security module interface in a collaborative network | |||
1224 | 9344453 | Secure protocol execution in a network | |||
1225 | 9344439 | Executing unprotected mode services in a protected mode environment | |||
1226 | 9344434 | GET VPN group member registration | |||
1227 | 9344428 | Method and system for digitally certifying the association between an entity and a place | |||
1228 | 9344426 | Accessing enterprise resources while providing denial-of-service attack protection | |||
1229 | 9344425 | Dynamic object creation and certificate management | |||
1230 | 9344419 | Methods of authenticating users to a site | |||
1231 | 9344417 | Authentication method and system | |||
1232 | 9344416 | File vault and cloud based document notary service | |||
1233 | 9344285 | Method and system for preserving privacy and accountability | |||
1234 | 9344284 | Method of anonymous entity authentication using group-based anonymous signatures | |||
1235 | 9344283 | Captcha image scramble | |||
1236 | 9344282 | Central and implicit certificate management | |||
1237 | 9344281 | Detecting fraud using operational parameters for a peripheral | |||
1238 | 9344280 | Systems and methods for authenticating and providing anti-counterfeiting features for important documents | |||
1239 | 9344279 | Mobile device-based keypad for enhanced security | |||
1240 | 9344278 | Secure data transfer using random ordering and random block sizing | |||
1241 | 9344276 | Cryptographic system, re-encryption key generation device, re-encryption device, cryptographic method, and cryptographic program | |||
1242 | 9344275 | System, device, and method of secure entry and handling of passwords | |||
1243 | 9343135 | Physically unclonable function based on programming voltage of magnetoresistive random-access memory | |||
1244 | 9342701 | Digital rights management system and methods for provisioning content to an intelligent storage | |||
1245 | 9342674 | Man-machine interface for controlling access to electronic devices | |||
1246 | 9342661 | Apparatus and methods for rights-managed content and data delivery | |||
1247 | 9338810 | Efficient communication for devices of a home network | |||
1248 | 9338656 | Conditional limited service grant based on device verification | |||
1249 | 9338653 | Secure reception reporting | |||
1250 | 9338587 | System and method for radio-tagging radio transmitters | |||
1251 | 9338220 | System and method to anonymize data transmitted to a destination computing device | |||
1252 | 9338185 | Service provision | |||
1253 | 9338165 | Common internet file system proxy authentication of multiple servers | |||
1254 | 9338159 | Method and apparatus for sharing wireless network subscription services | |||
1255 | 9338155 | Security device provisioning | |||
1256 | 9338150 | Content-centric networking | |||
1257 | 9338144 | System and method for operating on streaming encrypted data | |||
1258 | 9338142 | Method for verifying the security of a device that generates private and public cryptographic keys | |||
1259 | 9338141 | Embedded module system with encrypted token authentication system | |||
1260 | 9338140 | Secure data parser method and system | |||
1261 | 9338014 | Network system, certificate management method, and certificate management program | |||
1262 | 9338013 | Verifiable redactable audit log | |||
1263 | 9338012 | Systems and methods for identifying code signing certificate misuse | |||
1264 | 9338011 | Document modification detection and prevention | |||
1265 | 9338010 | Systems, methods and apparatuses for secure time management | |||
1266 | 9338008 | System and method for secure release of secret information over a network | |||
1267 | 9338007 | Secure delegated authentication for applications | |||
1268 | 9338006 | Multi-channel multi-factor authentication | |||
1269 | 9338001 | Privacy enhanced spatial analytics | |||
1270 | 9336696 | Enhanced security setup for media decryption | |||
1271 | 9336634 | Hand geometry biometrics on a payment device | |||
1272 | 9336394 | Securely recovering a computing device | |||
1273 | 9336359 | Device certificate individualization | |||
1274 | 9336189 | Systems and methods for providing fused images to remote recipients for descrambling and interpretation | |||
1275 | 9336092 | Secure data deduplication | |||
1276 | 9332431 | Method of and system for authenticating and operating personal communication devices over public safety networks | |||
1277 | 9332422 | Method of file transmission based upon distributed storage in wireless communication system | |||
1278 | 9332377 | Device and method for control of data transfer in local area network | |||
1279 | 9332018 | Method and system for secure authentication | |||
1280 | 9332011 | Secure authentication system with automatic cancellation of fraudulent operations | |||
1281 | 9332007 | Method for secure, entryless login using internet connected device | |||
1282 | 9332006 | Service account access | |||
1283 | 9332004 | Digital content acquisition system and techniques | |||
1284 | 9332000 | One-pass authentication mechanism and system for heterogeneous networks | |||
1285 | 9331998 | Dynamic secured network in a cloud environment | |||
1286 | 9331997 | Systems and methods for managing disclosure of protectable information | |||
1287 | 9331996 | Systems and methods for identifying devices by a trusted service manager | |||
1288 | 9331991 | Authenticating a client using linked authentication credentials | |||
1289 | 9331990 | Trusted and unsupervised digital certificate generation using a security token | |||
1290 | 9331989 | Secure shared key sharing systems and methods | |||
1291 | 9331988 | System and method for provisioning secrets to an application (TA) on a device | |||
1292 | 9331985 | Portable device, a stationary device, a digital device and a method for performing secure communication using thereof | |||
1293 | 9331856 | Systems and methods for validating digital signatures | |||
1294 | 9331855 | Apparatus, system, and method for providing attribute identity control associated with a processor | |||
1295 | 9331854 | Message authentication method in communication system and communication system | |||
1296 | 9331849 | Information setting method and wireless communication system | |||
1297 | 9331012 | Method for fabricating a physical unclonable interconnect function array | |||
1298 | 9330270 | Encryption processing device and authentication method | |||
1299 | 9330268 | Storage devices with secure debugging capability and methods of operating the same | |||
1300 | 9330261 | Proving age and integrity of website pages | |||
1301 | 9330258 | Systems and methods for identifying uniform resource locators that link to potentially malicious resources | |||
1302 | 9327510 | Verification record for a replaceable supply | |||
1303 | 9326307 | Efficient communication for devices of a home network | |||
1304 | 9326142 | Cryptographic key generation | |||
1305 | 9325839 | Call authentification methods and systems | |||
1306 | 9325721 | Restricting access to objects created by privileged commands | |||
1307 | 9325702 | Method for secure user and transaction authentication and risk management | |||
1308 | 9325700 | Service account access | |||
1309 | 9325698 | Method and apparatus for on-site authorisation | |||
1310 | 9325694 | Anonymous entity authentication method and system | |||
1311 | 9325693 | Method and apparatus for identity federation gateway | |||
1312 | 9325683 | Mobile application management framework | |||
1313 | 9325680 | Digital rights management retrieval system | |||
1314 | 9325677 | Method of registering devices | |||
1315 | 9325509 | Determination method for cryptographic algorithm used for signature, validation server and program | |||
1316 | 9325508 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
1317 | 9325507 | System and method for managing mobile device using device-to-device communication | |||
1318 | 9325506 | Cryptographically enforcing strict separation of environments | |||
1319 | 9325505 | Apparatus and method for content encryption and decryption based on storage device ID | |||
1320 | 9325504 | Method for secure transfer of an application from a server into a reading device unit | |||
1321 | 9325503 | Methods and systems for user authentication | |||
1322 | 9325502 | Identity management for transactional content | |||
1323 | 9325501 | Method to implement two fiber shared protection ring with extra traffic on STM-1/OC-3 interface | |||
1324 | 9325500 | Providing support for multiple authentication chains | |||
1325 | 9325496 | Encryption key providing method, semiconductor integrated circuit, and encryption key management device | |||
1326 | 9325495 | Encrypted server-less communication between devices | |||
1327 | 9324436 | Method and apparatus for controlling operation of flash memory | |||
1328 | 9324122 | Voting scheme for time alignment | |||
1329 | 9323951 | Encrypted warranty verification and diagnostic tool | |||
1330 | 9323950 | Generating signatures using a secure device | |||
1331 | 9323945 | Systems, methods, and computer program products for managing secure elements | |||
1332 | 9323937 | Methods and systems for establishing and enforcing document visibility rights with an electronic signature service | |||
1333 | 9323918 | Methods, systems, and computer program products for recovering a password using user-selected third party authorization | |||
1334 | 9323915 | Extended security for wireless device handset authentication | |||
1335 | 9323914 | Virtual smart card to perform security-critical operations | |||
1336 | 9323902 | Conditional access using embedded watermarks | |||
1337 | 9323435 | Method and system of providing a picture password for relatively smaller displays | |||
1338 | 9319469 | Host agnostic integration and interoperation system | |||
1339 | 9319467 | Apparatus and method for efficiently and securely exchanging connection data | |||
1340 | 9319407 | Authentication extension to untrusted devices on an untrusted network | |||
1341 | 9319405 | System and methods for assignation and use of media content subscription service privileges | |||
1342 | 9319404 | Security for the internet of things | |||
1343 | 9319401 | System and method for cross-channel authentication | |||
1344 | 9319398 | Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems | |||
1345 | 9319394 | System and method for pool-based identity authentication for service access without use of stored credentials | |||
1346 | 9319389 | Data recording device, and method of processing data recording device | |||
1347 | 9319386 | Security for mobility between MBMS servers | |||
1348 | 9319385 | System and method for accessing host computer via remote computer | |||
1349 | 9319371 | Management of commercial messages in a social network | |||
1350 | 9319224 | Public key infrastructure for system-on-chip | |||
1351 | 9319223 | Key derivation for a module using an embedded universal integrated circuit card | |||
1352 | 9319222 | Two factor authentication of ICR transport and payload for interchassis redundancy | |||
1353 | 9319221 | Controlling access based on recognition of a user | |||
1354 | 9319220 | Method and apparatus for secure network enclaves | |||
1355 | 9317848 | Integration of verification tokens with mobile communication devices | |||
1356 | 9317843 | Interoperable systems and methods for peer-to-peer service orchestration | |||
1357 | 9317705 | Secure data parser method and system | |||
1358 | 9317670 | Security based on usage activity associated with user device | |||
1359 | 9317668 | Dynamic tardos traitor tracing schemes | |||
1360 | 9317449 | Secure key access with one-time programmable memory and applications thereof | |||
1361 | 9313605 | Wireless communication system and information providing method | |||
1362 | 9313530 | Technique for securely communicating programming content | |||
1363 | 9313297 | Virtual desktop accelerator with support for dynamic proxy thread management | |||
1364 | 9313248 | Method and apparatus for delivering encoded content | |||
1365 | 9313214 | Enhanced security using service provider authentication | |||
1366 | 9313192 | Communications hub for use in life critical network | |||
1367 | 9313188 | Providing domain-joined remote applications in a cloud environment | |||
1368 | 9313185 | Systems and methods for authenticating devices | |||
1369 | 9313178 | Method and system for secure over-the-top live video delivery | |||
1370 | 9313105 | Network management using secure mesh command and control framework | |||
1371 | 9313033 | Derived certificate based on changing identity | |||
1372 | 9313032 | Method and system for signing and authenticating electronic documents via a signature authority which may act in concert with software controlled by the signer | |||
1373 | 9313031 | Telephone caller authentication | |||
1374 | 9313030 | Method and apparatus for secure ad hoc group device-to-device communication in information-centric network | |||
1375 | 9313029 | Virtualized network interface for remote direct memory access over converged ethernet | |||
1376 | 9313025 | Generating and processing an authentication certificate | |||
1377 | 9311956 | Information processing device, information processing method, and program | |||
1378 | 9311504 | Anti-identity-theft method and hardware database device | |||
1379 | 9311500 | Data security using request-supplied keys | |||
1380 | 9311494 | Secure search method and secure search device | |||
1381 | 9311465 | Secure information storage and retrieval apparatus and method | |||
1382 | 9311461 | Security system based on questions that do not publicly identify the speaker | |||
1383 | 9311456 | Auto-negotiation of content formats using a secure component model | |||
1384 | 9307374 | Transferring information on a first mobile computing device to a peer mobile computing device | |||
1385 | 9307091 | Method and apparatus for the secure storage of audio signals | |||
1386 | 9307028 | Device for archiving handwritten information | |||
1387 | 9306945 | Client authentication during network boot | |||
1388 | 9306943 | Access point--authentication server combination | |||
1389 | 9306938 | Secure authentication systems and methods | |||
1390 | 9306936 | Techniques to classify virtual private network traffic based on identity | |||
1391 | 9306926 | User authentication using unique hidden identifiers | |||
1392 | 9306925 | Image processing apparatus and image processing system | |||
1393 | 9306915 | Systems and methods for secure file transfers | |||
1394 | 9306905 | Secure access to application servers using out-of-band communication | |||
1395 | 9306754 | System and method for implementing transaction signing within an authentication framework | |||
1396 | 9306753 | Mobile system and method for improving safety of impromptu meetings | |||
1397 | 9306752 | Generation of a digital signature | |||
1398 | 9306751 | Secure time and crypto system | |||
1399 | 9306750 | Techniques for securing supply chain electronic transactions | |||
1400 | 9306749 | Method of biometric authentication, corresponding authentication system and program | |||
1401 | 9306748 | Authentication method and apparatus in a communication system | |||
1402 | 9306743 | One-way key fob and vehicle pairing verification, retention, and revocation | |||
1403 | 9305298 | System and method for location-based authentication | |||
1404 | 9305282 | Contact-less tag with signature, and applications thereof | |||
1405 | 9305188 | Image-display method, projector, image-display system, projector-control method, image-display program, and projector-control program | |||
1406 | 9305177 | Source identification for unauthorized copies of content | |||
1407 | 9305173 | Portable authorization device for authorizing use of protected information and associated method | |||
1408 | 9305172 | Multi-ring encryption approach to securing a payload using hardware modules | |||
1409 | 9305160 | Method and system for automatic updating of randomly generated user passwords | |||
1410 | 9305159 | Secure system for allowing the execution of authorized computer program code | |||
1411 | 9304941 | Self-encrypting flash drive | |||
1412 | 9304782 | Network switch, systems, and servers implementing boot image delivery | |||
1413 | 9300762 | Virtual desktop accelerator with support for multiple cryptographic contexts | |||
1414 | 9300665 | Credential authentication methods and systems | |||
1415 | 9300662 | System and method for providing digital content | |||
1416 | 9300660 | Providing authorization and authentication in a cloud for a user of a storage array | |||
1417 | 9300659 | Method and system of providing a picture password for relatively smaller displays | |||
1418 | 9300656 | Secure connection certificate verification | |||
1419 | 9300654 | Method of handling a certification request | |||
1420 | 9300649 | Context sensitive dynamic authentication in a cryptographic system | |||
1421 | 9300479 | Method and apparatus for protecting digital content in a storage device | |||
1422 | 9300478 | Splitting certificate status responses evenly across multiple distributed certificate status responders | |||
1423 | 9300477 | Identifying and correcting an undesired condition of a dispersed storage network access request | |||
1424 | 9300476 | Management of certificates for mobile devices | |||
1425 | 9300475 | Signature generation by calculating a remainder modulo public information | |||
1426 | 9300474 | Enhanced authentication and/or enhanced identification of a secure element of a communication device | |||
1427 | 9300473 | Module for "machine-to-machine" communications using public key infrastructure | |||
1428 | 9300472 | Method and apparatus for improving digital signatures | |||
1429 | 9300471 | Information processing apparatus, information processing method, and program | |||
1430 | 9300470 | Semiconductor device and method of writing data to semiconductor device | |||
1431 | 9300469 | Secure computing system, secure computing method, secure computing apparatus, and program therefor | |||
1432 | 9300468 | Secure node admission in a communication network | |||
1433 | 9300466 | Transmitting device, receiving device, transmitting method, receiving method, and program | |||
1434 | 9299094 | State-based compliance verification in a disconnected system | |||
1435 | 9299006 | Authentication device and method | |||
1436 | 9298950 | Undiscoverable physical chip identification | |||
1437 | 9298947 | Method for protecting the integrity of a fixed-length data structure | |||
1438 | 9298946 | Physically unclonable function based on breakdown voltage of metal-insulator-metal device | |||
1439 | 9298937 | Secure data parser method and system | |||
1440 | 9298923 | Software revocation infrastructure | |||
1441 | 9298922 | Method, system, and program product for remotely attesting to a state of a computer system | |||
1442 | 9298897 | Method of and systems for privacy preserving mobile demographic measurement of individuals, groups and locations over time and space | |||
1443 | 9298891 | Enhanced content management based on watermark extraction records | |||
1444 | 9294918 | Method and system for secure remote login of a mobile device | |||
1445 | 9294915 | Localized network authentication and security using tamper-resistant keys | |||
1446 | 9294478 | Hardware-based device authentication | |||
1447 | 9294468 | Application-level certificates for identity and authorization | |||
1448 | 9294465 | Identity verification and authentication | |||
1449 | 9294457 | Federated realm discovery | |||
1450 | 9294453 | Direct mode communication system and discovery interactive method thereof | |||
1451 | 9294450 | Selectively performing man in the middle decryption | |||
1452 | 9294448 | Cryptographic security functions based on anticipated changes in dynamic minutiae | |||
1453 | 9294447 | Access control | |||
1454 | 9294445 | Secure data parser method and system | |||
1455 | 9294444 | Systems and methods for cryptographically splitting and storing data | |||
1456 | 9294438 | Cloud computing method and system | |||
1457 | 9294433 | Multiple-master DNS system | |||
1458 | 9294429 | Method and system for providing service for searching friends | |||
1459 | 9294288 | Facilitating secure online transactions | |||
1460 | 9294287 | Interrogating an authentication device | |||
1461 | 9294286 | Computerized system and method for deployment of management tunnels | |||
1462 | 9294285 | Information recording device | |||
1463 | 9294284 | Systems and methods for validating application signatures | |||
1464 | 9294283 | Methods and devices for monitoring the integrity of an article during transporting said article | |||
1465 | 9294282 | Cryptographically verified repeatable virtualized computing | |||
1466 | 9294281 | Utilization of a protected module to prevent offline dictionary attacks | |||
1467 | 9294280 | Location verification in quantum communications | |||
1468 | 9294279 | User authentication system | |||
1469 | 9294269 | Communication apparatus and communication method | |||
1470 | 9294268 | System and method for variable length encryption | |||
1471 | 9294267 | Method, system and program product for secure storage of content | |||
1472 | 9292987 | System and method for fully encrypted remote web-based voting | |||
1473 | 9292876 | Systems and methods for employing document snapshots in transaction rooms for digital transactions | |||
1474 | 9292851 | System and method for biometric signature authorization | |||
1475 | 9292713 | Tiered access to on chip features | |||
1476 | 9292706 | Customer data management for data analytics outsourcing | |||
1477 | 9292692 | System and device for verifying the integrity of a system from its subcomponents | |||
1478 | 9292681 | Password audit system | |||
1479 | 9292674 | Password encryption key | |||
1480 | 9292671 | Multi-server authentication using personalized proactivization | |||
1481 | 9292670 | Systems and methods for generating and authenticating one time dynamic password based on context information | |||
1482 | 9292665 | Secure serial number | |||
1483 | 9292513 | Methods for identifying audio or video content | |||
1484 | 9292248 | Span out load balancing model | |||
1485 | 9288672 | Method for configuring a remote station with a certificate from a local root certificate authority for securing a wireless network | |||
1486 | 9288208 | Cryptographic key escrow | |||
1487 | 9288206 | Shared secret techniques for ubiquitous computing devices | |||
1488 | 9288203 | Multiple input based passwords | |||
1489 | 9288201 | Disconnected credential validation using pre-fetched service tickets | |||
1490 | 9288196 | Identity verification via selection of sensible output from recorded digital data | |||
1491 | 9288195 | Single sign on with multiple authentication factors | |||
1492 | 9288192 | System and method for securing data from a remote input device | |||
1493 | 9288064 | Trust information delivery scheme for certificate validation | |||
1494 | 9288063 | Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method | |||
1495 | 9288062 | Telephone caller authentication | |||
1496 | 9288061 | Safe communication method with card | |||
1497 | 9288060 | System and method for decentralized authentication of supplicant devices | |||
1498 | 9288059 | Secure PKI communications for "machine-to-machine" modules, including key derivation by modules and authenticating public keys | |||
1499 | 9288058 | Executing compliance verification or remediation scripts | |||
1500 | 9288057 | Content segmentation of watermarking | |||
1501 | 9288056 | Data access and anonymity management | |||
1502 | 9288055 | Method for verifying correct encryption key utilization | |||
1503 | 9288054 | Method and apparatus for authenticating and managing application using trusted platform module | |||
1504 | 9288053 | Schema signing | |||
1505 | 9288052 | Method and apparatus to provide an authoring tool to create content for a secure content service | |||
1506 | 9288050 | Unified storage and management of cryptographic keys and certificates | |||
1507 | 9288049 | Cryptographically linking data and authentication identifiers without explicit storage of linkage | |||
1508 | 9288048 | Real-time frame authentication using ID anonymization in automotive networks | |||
1509 | 9286596 | Signing ceremony system and method | |||
1510 | 9286490 | Systems and methods for providing conditional access to transmitted information | |||
1511 | 9286476 | Method and system for configuring constraints for a resource in an electronic device | |||
1512 | 9286459 | Authorized remote access to an operating system hosted by a virtual machine | |||
1513 | 9286458 | Systems and methods for online identity verification | |||
1514 | 9286457 | Method and system for providing password-free, hardware-rooted, ASIC-based authentication of a human to a mobile device using biometrics with a protected, local template to release trusted credentials to relying parties | |||
1515 | 9286455 | Real identity authentication | |||
1516 | 9286454 | Method of identifying a user by means of modified biometric characteristics, and a database for implementing the method | |||
1517 | 9286447 | Portable digital vault and lending of same | |||
1518 | 9286446 | Domain spanning applications | |||
1519 | 9286301 | Approach for managing access to electronic documents on network devices using document analysis, document retention policies and document security policies | |||
1520 | 9282108 | Generalized certificate use in policy-based secure messaging environments | |||
1521 | 9282107 | Secure verification of website claims | |||
1522 | 9282106 | Authenticated communication between security devices | |||
1523 | 9282097 | Systems and methods for providing single sign on access to enterprise SAAS and cloud hosted applications | |||
1524 | 9282095 | Security and privacy enhancements for security devices | |||
1525 | 9282093 | Synchronizing credential hashes between directory services | |||
1526 | 9282090 | Methods and systems for identity verification in a social network using ratings | |||
1527 | 9282083 | Encryption system and method | |||
1528 | 9281949 | Device using secure processing zone to establish trust for digital rights management | |||
1529 | 9281948 | Revocation information for revocable items | |||
1530 | 9281947 | Security mechanism within a local area network | |||
1531 | 9281946 | Authentication system for gaming machines | |||
1532 | 9281945 | Offline methods for authentication in a client/server authentication system | |||
1533 | 9280765 | Multiple tokenization for authentication | |||
1534 | 9280657 | Apparatus and method for managing passwords | |||
1535 | 9280651 | Securely handling server certificate errors in synchronization communication | |||
1536 | 9280337 | Secured distribution of software updates | |||
1537 | 9277463 | Method and system for managing security in mobile communication system | |||
1538 | 9277407 | Methods for authentication using near-field | |||
1539 | 9277406 | Methods and system for secure communication between an RFID tag and a reader | |||
1540 | 9276980 | Data synchronization based on file system activities | |||
1541 | 9276957 | Systems and methods for handling SSL session not reusable across multiple cores | |||
1542 | 9276944 | Generalized certificate use in policy-based secure messaging environments | |||
1543 | 9276933 | Security token caching in centralized authentication systems | |||
1544 | 9276930 | Device for controlling network user data | |||
1545 | 9276928 | Sending session tokens through passive clients | |||
1546 | 9276921 | System and method for establishing a communication session | |||
1547 | 9276918 | Computer-readable medium, information processing device, information processing method and information processing system | |||
1548 | 9276912 | Dispersed storage network with slice refresh and methods for use therewith | |||
1549 | 9276911 | Secure and scalable mapping of human sequencing reads on hybrid clouds | |||
1550 | 9276887 | Systems and methods for managing security certificates through email | |||
1551 | 9276754 | Key rotation with external workflows | |||
1552 | 9276753 | System and method for data authentication among processors | |||
1553 | 9276752 | System and method for secure software update | |||
1554 | 9276751 | System and method for circular link resolution with computable hash-based names in content-centric networks | |||
1555 | 9276750 | Secure processing environment measurement and attestation | |||
1556 | 9276749 | Distributed validation of digitally signed electronic documents | |||
1557 | 9276748 | Data-encrypting method and decrypting method for a mobile phone | |||
1558 | 9276747 | Remote profile security system | |||
1559 | 9276743 | Probabilistic key distribution in vehicular networks with infrastructure support | |||
1560 | 9276742 | Unified storage and management of cryptographic keys and certificates | |||
1561 | 9276740 | Systems and methods for "machine-to-machine" (M2M) communications between modules, servers, and an application using public key infrastructure (PKI) | |||
1562 | 9276738 | Digital tachograph | |||
1563 | 9276737 | Securing a command path between a vehicle and personal wireless device | |||
1564 | 9276735 | Information processing apparatus, signature generation apparatus, information processing method, signature generation method, and program | |||
1565 | 9275379 | Method for mutual authentication of a user and service provider | |||
1566 | 9275257 | Secure communication architecture | |||
1567 | 9275243 | Communication between key manager and storage subsystem kernel via management console | |||
1568 | 9275241 | Cryptographic method | |||
1569 | 9275219 | Unauthorized account access lockout reduction | |||
1570 | 9275217 | ID usage tracker | |||
1571 | 9274976 | Code tampering protection for insecure environments | |||
1572 | 9274864 | Accessing large amounts of data in a dispersed storage network | |||
1573 | 9274754 | Program generating apparatus, program generation method and computer readable medium | |||
1574 | 9271256 | Verifying generic broadcast of location assistance data | |||
1575 | 9270719 | Device connection proxy through cloud to optimize network messages | |||
1576 | 9270683 | Storage device authentication | |||
1577 | 9270673 | Terminal device, verification device, key distribution device, content playback method, key distribution method, and computer program | |||
1578 | 9270667 | Utilizing X.509 authentication for single sign-on between disparate servers | |||
1579 | 9270666 | Verification of user communication addresses | |||
1580 | 9270663 | System and method to enable PKI- and PMI-based distributed locking of content and distributed unlocking of protected content and/or scoring of users and/or scoring of end-entity access means--added | |||
1581 | 9270650 | System and method for providing secure subnet management agent (SMA) in an infiniband (IB) network | |||
1582 | 9270646 | Systems and methods for generating a DNS query to improve resistance against a DNS attack | |||
1583 | 9270471 | Client-client-server authentication | |||
1584 | 9270470 | Unauthorized contents detection system | |||
1585 | 9270469 | Authentication using public keys and session keys | |||
1586 | 9270468 | Methods to improve secure flash programming | |||
1587 | 9270467 | Systems and methods for trust propagation of signed files across devices | |||
1588 | 9270466 | System and method for temporary secure boot of an electronic device | |||
1589 | 9270465 | Control word protection | |||
1590 | 9270464 | Methods for secure enrollment and backup of personal identity credentials into electronic devices | |||
1591 | 9270463 | Unauthorized connection detecting device, unauthorized connection detecting system, and unauthorized connection detecting method | |||
1592 | 9270460 | Instructions to perform JH cryptographic hashing in a 256 bit data path | |||
1593 | 9270454 | Public key generation utilizing media access control address | |||
1594 | 9270450 | Method and device for mutual authentication | |||
1595 | 9269094 | System and method for creating and implementing scalable and effective surveys and testing methods with human interaction proof (HIP) capabilities | |||
1596 | 9268968 | Credential validation | |||
1597 | 9268594 | Processor extensions for execution of secure embedded containers | |||
1598 | 9268555 | Multiple system images for over-the-air updates | |||
1599 | 9265960 | Use case-based services | |||
1600 | 9264902 | Systems and methods for remote authorization of financial transactions using public key infrastructure (PKI) | |||
1601 | 9264899 | Binding mobile device secure software components to the SIM | |||
1602 | 9264534 | Methods, systems, and computer-readable media for self-maintaining interactive communications privileges governing interactive communications with entities outside a domain | |||
1603 | 9264497 | System and method for hosting mobile devices for testing in a cloud computing environment | |||
1604 | 9264439 | Systems and methods to generate, preserve, collect, search, and certify authentic original documents | |||
1605 | 9264426 | System and method for authentication via a proximate device | |||
1606 | 9264419 | Two factor authentication with authentication objects | |||
1607 | 9264404 | Encrypting data using time stamps | |||
1608 | 9264237 | Verifying requests for access to a service provider using an authentication component | |||
1609 | 9264236 | Embedded extrinsic source for digital certificate validation | |||
1610 | 9264235 | Apparatus, system and method for verifying server certificates | |||
1611 | 9264234 | Secure authentication of identification for computing devices | |||
1612 | 9264233 | System and method for a log-in procedure for non-readers | |||
1613 | 9264232 | Cryptographic device that binds an additional authentication factor to multiple identities | |||
1614 | 9264231 | System and method of using RFID tag proximity to grant security access to a computer | |||
1615 | 9264228 | System and method for a secure display module | |||
1616 | 9264224 | Systems and methods for secure data sharing | |||
1617 | 9264223 | System and method for distributed security | |||
1618 | 9264220 | Secure virtual machine provisioning | |||
1619 | 9262877 | Access authorization servers, methods and computer program products employing wireless terminal location | |||
1620 | 9262876 | Method for controlling fraud and enhancing security and privacy by using personal hybrid card | |||
1621 | 9262655 | System and method for enhanced RFID instrument security | |||
1622 | 9262631 | Embedded device and control method thereof | |||
1623 | 9262620 | Secure communications kit and client device for securely communicating using the same | |||
1624 | 9262617 | Method for providing software to be used by a control unit of a vehicle | |||
1625 | 9262616 | Simplified multi-factor authentication | |||
1626 | 9262592 | Wireless storage device | |||
1627 | 9262247 | Updating data stored in a dispersed storage network | |||
1628 | 9258713 | Rogue wireless beacon device detection | |||
1629 | 9258297 | Methods, devices, and mediums for securely sharing restricted content | |||
1630 | 9258296 | System and method for generating a strong multi factor personalized server key from a simple user password | |||
1631 | 9258130 | Apparatus and method for anonymity-based authentication and key agreement capable of providing communication message binding property | |||
1632 | 9258129 | Resilient device authentication system | |||
1633 | 9258128 | Systems and methods for creating customer-specific tools for generating certificate signing requests | |||
1634 | 9258127 | System and method for providing cryptographic video verification | |||
1635 | 9258126 | Method for non-repudiation of ad-hoc workflows | |||
1636 | 9258125 | Generating evidence of web services transactions | |||
1637 | 9258124 | Time and event based one time password | |||
1638 | 9258123 | Multi-layered color-sensitive passwords | |||
1639 | 9258121 | Method to manage modification of encryption credentials | |||
1640 | 9258117 | Mutual authentication with symmetric secrets and signatures | |||
1641 | 9258113 | Username based key exchange | |||
1642 | 9258111 | Memory device which protects secure data, method of operating the memory device, and method of generating authentication information | |||
1643 | 9256763 | Method and system for providing a public key/secret key pair for encrypting and decrypting data | |||
1644 | 9256750 | Secure credential unlock using trusted execution environments | |||
1645 | 9256728 | Method, apparatus, and computer program product for managing software versions | |||
1646 | 9256721 | Mobile wireless hand-held biometric capture, processing and communication system and method for biometric identification | |||
1647 | 9256613 | Systems, methods, and computer program products for secure multi-enterprise storage | |||
1648 | 9256210 | Safe method for card issuing, card issuing device and system | |||
1649 | 9253633 | Method and mobile device for generating a data authentication key | |||
1650 | 9253530 | Stream data management program, method and system | |||
1651 | 9253200 | Programming vehicle modules from remote devices and related methods and systems | |||
1652 | 9253199 | Verifying authenticity of a sender of an electronic message sent to a recipient using message salt | |||
1653 | 9253179 | Managing security restrictions on a resource in a defined environment | |||
1654 | 9253178 | Method and apparatus for authenticating a communication device | |||
1655 | 9253177 | Authentication system, information registration system, server, program, and authentication method | |||
1656 | 9253169 | Memory and storage devices to be authenicated using a host device, authenication system and host device | |||
1657 | 9253162 | Intelligent card secure communication method | |||
1658 | 9253087 | Principal-identity-domain based naming scheme for information centric networks | |||
1659 | 9252960 | System for establishing a cryptographic key depending on a physical system | |||
1660 | 9252959 | Challenging a first terminal intending to communicate with a second terminal | |||
1661 | 9252958 | Systems and methods for providing a self-maintaining PKI infrastructure among loosely connected entities | |||
1662 | 9252957 | Method for preventing laundering and repackaging of multimedia content in content distribution systems | |||
1663 | 9252956 | Method and system for transmitting control data in a manner that is secured against manipulation | |||
1664 | 9252955 | Apparatus and methods for the secure transfer of electronic data | |||
1665 | 9252952 | Gesture-based encryption methods and systems | |||
1666 | 9252949 | Broadcast encryption based media key block security class-based signing | |||
1667 | 9252948 | Broadcast encryption based media key block security class-based signing | |||
1668 | 9252946 | Method and system to securely migrate and provision virtual machine images and content | |||
1669 | 9252945 | Method for recognizing a manipulation of a sensor and/or sensor data of the sensor | |||
1670 | 9252941 | Enhanced digital signatures algorithm method and system utilitzing a secret generator | |||
1671 | 9251385 | Computer system for accessing confidential data by means of at least one remote unit and remote unit | |||
1672 | 9251383 | Device for preventing logging of computer on-screen keyboard | |||
1673 | 9251372 | Secure service for receiving sensitive information through nested iFrames | |||
1674 | 9251366 | Augmented reality based privacy and decryption | |||
1675 | 9251365 | Trusted storage systems and methods | |||
1676 | 9251332 | Security system and method for controlling access to computing resources | |||
1677 | 9251326 | Personal digital key initialization and registration for secure transactions | |||
1678 | 9251325 | Verifying passwords on a mobile device | |||
1679 | 9251319 | Method and apparatus for using non-volatile storage device | |||
1680 | 9250870 | Automated creation of shim programs and interfaces | |||
1681 | 9247432 | Systems and methods for controlling network access | |||
1682 | 9247429 | Key derivation | |||
1683 | 9247311 | Systems and methods for playing back alternative streams of protected content protected using common cryptographic information | |||
1684 | 9247024 | Controlled activation of function | |||
1685 | 9246929 | Providing a fast, remote security service using hashlists of approved web objects | |||
1686 | 9246925 | Method and system for third-party service platform login | |||
1687 | 9246909 | Image authentication and retrieval processing device and method | |||
1688 | 9246907 | Confidence-based authentication discovery for an outbound proxy | |||
1689 | 9246905 | Authentication within openflow network | |||
1690 | 9246901 | Secure network computing | |||
1691 | 9246900 | Using a single certificate request to generate credentials with multiple ECQV certificates | |||
1692 | 9246897 | Method and system of login authentication | |||
1693 | 9246889 | Layered protection and validation of identity data delivered online via multiple intermediate clients | |||
1694 | 9246888 | Systems and methods for secure communication over an unsecured communication channel | |||
1695 | 9246882 | Method and apparatus for providing a structured and partially regenerable identifier | |||
1696 | 9246881 | Method and system for securing the exchange of data between a client module and a server module | |||
1697 | 9246691 | System, method and apparata for secure communications using an electrical grid network | |||
1698 | 9246690 | Secure execution environment services | |||
1699 | 9246689 | Component management via secure communications | |||
1700 | 9246688 | Dataset licensing | |||
1701 | 9246687 | Method for authorizing and authenticating data | |||
1702 | 9246686 | Salt value service | |||
1703 | 9246685 | Automated password authentication | |||
1704 | 9246684 | Data protection system and method | |||
1705 | 9246682 | Communication apparatus, method for controlling communication apparatus, and program | |||
1706 | 9246679 | Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks | |||
1707 | 9246677 | Method and system for secure data communication between a user device and a server | |||
1708 | 9246673 | Taste-based authentication to securely share data | |||
1709 | 9245266 | Auditable privacy policies in a distributed hierarchical identity management system | |||
1710 | 9245154 | System and method for securing input signals when using touch-screens and other input interfaces | |||
1711 | 9245152 | Method for authenticating a storage device, machine-readable storage medium, and host device | |||
1712 | 9245139 | Non-retained message system | |||
1713 | 9245133 | Authentication method and system | |||
1714 | 9245107 | Systems and methods for determining a strength of a created credential | |||
1715 | 9241264 | Network access authentication for user equipment communicating in multiple networks | |||
1716 | 9241003 | Methods, systems, and computer program products for authenticating an entity through use of a global identity of the entity that serves as a proxy for one or more local identities of the entity | |||
1717 | 9241001 | Method and apparatus for providing service using personal network | |||
1718 | 9240999 | Managed virtual point to point communication service having verified directory, secure transmission and controlled delivery | |||
1719 | 9240981 | System and method for authenticating identity of discovered component in an infiniband (IB) network | |||
1720 | 9240980 | Management of group secrets by group members | |||
1721 | 9240979 | Distributing keypairs between network appliances, servers, and other network assets | |||
1722 | 9240891 | Hybrid authentication | |||
1723 | 9240890 | Computerized system and method for deployment of management tunnels | |||
1724 | 9240889 | Method and system for secure data access among two devices | |||
1725 | 9240888 | Authentication system for gaming machines | |||
1726 | 9240887 | Off-host authentication system | |||
1727 | 9240886 | Authentication adaptation | |||
1728 | 9240884 | Method and apparatus for verifiable generation of public keys | |||
1729 | 9240880 | Distributed data storage device | |||
1730 | 9240089 | Systems and methods for time variable financial authentication | |||
1731 | 9239920 | Generation of working security key based on security parameters | |||
1732 | 9239912 | Method, manufacture, and apparatus for content protection using authentication data | |||
1733 | 9239748 | Comparator circuitry coupled to first, second time stamp overlap bits | |||
1734 | 9237149 | Certificate based distributed policy enforcement | |||
1735 | 9237148 | System and method for displaying a security encoding indicator associated with a message attachment | |||
1736 | 9237135 | Trusted and confidential remote TPM initialization | |||
1737 | 9237134 | Communicating in a peer-to-peer computer environment | |||
1738 | 9237133 | Detecting matched cloud infrastructure connections for secure off-channel secret generation | |||
1739 | 9237022 | Use of multiple digital signatures and quorum rules to verify aircraft information | |||
1740 | 9237021 | Certificate grant list at network device | |||
1741 | 9237020 | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | |||
1742 | 9237019 | Resource locators with keys | |||
1743 | 9237018 | Multisystem biometric token | |||
1744 | 9237017 | Lightweight authentication for on-premise rich clients | |||
1745 | 9237016 | System and method for wiping encrypted data on a device having file-level content protection | |||
1746 | 9237015 | Compact and efficient communication security through combining anti-replay with encryption | |||
1747 | 9237010 | Secure transmission of a message | |||
1748 | 9237009 | Disrupting offline password attacks | |||
1749 | 9235838 | System and method for secure downhole intelligent completions | |||
1750 | 9235834 | Interoperable systems and methods for peer-to-peer service orchestration | |||
1751 | 9235833 | Interoperable systems and methods for peer-to-peer service orchestration | |||
1752 | 9235732 | Secure communication methods | |||
1753 | 9235731 | Trusted data relay | |||
1754 | 9235725 | Client computer for querying a database stored on a server via a network | |||
1755 | 9235708 | System and method for supporting full volume encryption devices in a client hosted virtualization system | |||
1756 | 9235699 | Computer system and method of controlling computer | |||
1757 | 9235697 | One-time passcodes with asymmetric keys | |||
1758 | 9235204 | Method for establishing a secure connection from a service technician to a component of an automation environment that can be remotely diagnosed and/or maintained and is experiencing failure | |||
1759 | 9232403 | Mobile device with common secure wireless message service serving multiple applications | |||
1760 | 9232400 | Restricted certificate enrollment for unknown devices in hotspot networks | |||
1761 | 9232398 | Method and apparatus for link setup | |||
1762 | 9232024 | Communicating an identity to a server | |||
1763 | 9231959 | Multiple transaction interface framework | |||
1764 | 9231947 | RFID authentication architecture and methods for RFID authentication | |||
1765 | 9231933 | Providing application programs with access to secured resources | |||
1766 | 9231928 | Validation method and system for use in securing nomadic electronic transactions | |||
1767 | 9231924 | Gesture-initiated encryption using error correction coding | |||
1768 | 9231770 | Combined digital certificate | |||
1769 | 9231769 | Systems and methods for providing interfaces for creating transport layer security certificates | |||
1770 | 9231768 | Utilizing a deterministic all or nothing transformation in a dispersed storage network | |||
1771 | 9231767 | Identification of content by metadata | |||
1772 | 9231766 | Information processing device and information processing program | |||
1773 | 9231765 | Trusted device | |||
1774 | 9231764 | Methods and systems of data security in browser storage | |||
1775 | 9231763 | System and method for providing a multi-credential authentication protocol | |||
1776 | 9231762 | Method of secure communication, controlled device, and control program | |||
1777 | 9231759 | Internet key exchange protocol using security associations | |||
1778 | 9231757 | Proxy signature scheme | |||
1779 | 9230630 | Physically unclonable function based on the initial logical state of magnetoresistive random-access memory | |||
1780 | 9230455 | Steganographic embedding of executable code | |||
1781 | 9230374 | Access management and reporting technology | |||
1782 | 9230135 | Secure access for sensitive digital information | |||
1783 | 9230133 | Secure access for sensitive digital information | |||
1784 | 9230097 | Method and system for detecting data modification within computing device | |||
1785 | 9230090 | Storage device, and authentication method and authentication device of storage device | |||
1786 | 9230084 | Method and system for enabling secure one-time password authentication | |||
1787 | 9230039 | Adaptive data transformation engine | |||
1788 | 9229823 | Storage and retrieval of dispersed storage network access information | |||
1789 | 9229489 | Adjusting mobile device state based on user intentions and/or identity | |||
2015 | |||||
1790 | 9226153 | Integrated IP tunnel and authentication protocol based on expanded proxy mobile IP | |||
1791 | 9226144 | Systems and methods of performing link setup and authentication | |||
1792 | 9226143 | Controlling application access to mobile device functions | |||
1793 | 9226043 | Displaying content associated with code embedded in an image | |||
1794 | 9225754 | Ad-hoc network communications | |||
1795 | 9225746 | Timestamp systems and methods | |||
1796 | 9225745 | Proposal system access policy enforcement | |||
1797 | 9225743 | Automatic generation of policy from a group of SSL server certificates | |||
1798 | 9225729 | Blind hash compression | |||
1799 | 9225728 | Method and device for anonymous entity identification | |||
1800 | 9225722 | Image forming system, image forming apparatus, and recording medium | |||
1801 | 9225716 | Multiple authentication mechanisms for accessing service center supporting a variety of products | |||
1802 | 9225714 | Spatial and temporal verification of users and/or user devices | |||
1803 | 9225706 | Multiple access point zero sign-on | |||
1804 | 9225699 | Security key generation in link aggregation group topologies | |||
1805 | 9225693 | Major management apparatus, authorized management apparatus, electronic apparatus for delegation management, and delegation management methods thereof | |||
1806 | 9225691 | Deduplication of encrypted dataset on datadomain backup appliance | |||
1807 | 9225533 | System and method for interapplication communications | |||
1808 | 9225532 | Method and system for providing registration of an application instance | |||
1809 | 9225531 | Automated test to tell computers and humans apart | |||
1810 | 9225530 | Secure crypto-processor certification | |||
1811 | 9225529 | Encrypted virtual machines in a cloud | |||
1812 | 9225528 | Broadband certified mail | |||
1813 | 9225527 | Hidden plug-in storage drive for data integrity | |||
1814 | 9225526 | Multifactor username based authentication | |||
1815 | 9225525 | Identity management certificate operations | |||
1816 | 9225524 | Forwarding e-mail from a wireless device | |||
1817 | 9225523 | Authentication system and authentication method | |||
1818 | 9225519 | Method, system, and apparatus for enabling secure functionalities | |||
1819 | 9225518 | Method of providing fresh keys for message authentication | |||
1820 | 9225517 | Secure device association | |||
1821 | 9225516 | Combined authentication and encryption | |||
1822 | 9225513 | Authenticator, authenticatee and authentication method | |||
1823 | 9224182 | Medical and personal data retrieval system | |||
1824 | 9224135 | Method and apparatus for adaptive configuration for translation of business messages | |||
1825 | 9224011 | Embedded system, information processing unit, and image forming apparatus | |||
1826 | 9224005 | Cloud key directory for federating data exchanges | |||
1827 | 9224003 | Method for secure storing and sharing of a data file via a computer communication network and open cloud services | |||
1828 | 9223949 | Secure transformable password generation | |||
1829 | 9223617 | Methods and systems for migrating networked systems across administrative domains | |||
1830 | 9219778 | Resource upload | |||
1831 | 9219762 | Techniques for desktop migration | |||
1832 | 9219730 | Securing a secret of a user | |||
1833 | 9219725 | Method, apparatus, and system for sending credentials securely | |||
1834 | 9219718 | System and method for supporting sub-subnet in an infiniband (IB) network | |||
1835 | 9219715 | Mediator utilizing electronic content to enforce policies to a resource | |||
1836 | 9219714 | ID-based encryption and signature method and terminal | |||
1837 | 9219713 | Electronic electricity meter with integrated digital-certification mechanism for secure communication | |||
1838 | 9219612 | Method of mutually authenticating a reader and a radio tag | |||
1839 | 9219611 | Systems and methods for automating cloud-based code-signing services | |||
1840 | 9219610 | Method for securing messages | |||
1841 | 9219609 | Method and system for multiple passcode generation | |||
1842 | 9219608 | Apparatus and method for sharing contents of Social Network Service in communication system | |||
1843 | 9219607 | Provisioning sensitive data into third party | |||
1844 | 9219602 | Method and system for securely computing a base point in direct anonymous attestation | |||
1845 | 9218813 | Voice and/or facial recognition based service provision | |||
1846 | 9218500 | System and method for automatic data protection in a computer network | |||
1847 | 9218498 | Method of verifying the validity of an electronic parking ticket | |||
1848 | 9218493 | Key camouflaging using a machine identifier | |||
1849 | 9218475 | Scalable groups of authenticated entities | |||
1850 | 9215700 | Counter check and reconfiguration method, apparatus, and system | |||
1851 | 9215273 | Apparatus for enabling delivery and access of applications and interactive services | |||
1852 | 9215268 | System and method for selection and switching of content sources for a streaming content session | |||
1853 | 9215244 | Context aware network security monitoring for threat detection | |||
1854 | 9215238 | System and method for transmitting and utilizing attachments | |||
1855 | 9215230 | Method for authentication, RF chip document, RF chip reader and computer program products | |||
1856 | 9215220 | Remote verification of attributes in a communication network | |||
1857 | 9215076 | Key generation for hierarchical data access | |||
1858 | 9215075 | System and method for secure relayed communications from an implantable medical device | |||
1859 | 9215074 | Expressing intent to control behavior of application components | |||
1860 | 9215073 | Key insulation method and device | |||
1861 | 9215072 | Back-end matching method supporting front-end knowledge-based probabilistic authentication systems for enhanced credential security | |||
1862 | 9215071 | Validating a system with multiple subsystems using trusted platform modules and virtual platform modules | |||
1863 | 9215070 | Method for the cryptographic protection of an application | |||
1864 | 9215069 | Methods and apparatus for device authentication with one-time credentials | |||
1865 | 9215065 | Media player security for full length episodes | |||
1866 | 9214214 | Physically unclonable function based on the random logical state of magnetoresistive random-access memory | |||
1867 | 9214183 | Secure storage | |||
1868 | 9213975 | Adaptive policies and protections for securing financial transaction data at rest | |||
1869 | 9213971 | Method and system for providing information on pre-purchase and post-purchase items using RFID and computer-readable storage media storing programs for executing the method | |||
1870 | 9213867 | Secure cloud database platform with encrypted database queries | |||
1871 | 9213855 | Trusted user circles | |||
1872 | 9213846 | Using flash storage device to prevent unauthorized use of software | |||
1873 | 9213818 | Anonymous authentication using backup biometric information | |||
1874 | 9213696 | Methods and systems for securely accessing translation resource manager | |||
1875 | 9213380 | Mapping computers and ports of power distribution units in a data center | |||
1876 | 9210483 | Method and apparatus for watermarking an AC-3 encoded bit stream | |||
1877 | 9210172 | Method and system for establishing a communications pipe between a personal security device and a remote computer system | |||
1878 | 9210166 | Applying a partial password in a multi-factor authentication scheme | |||
1879 | 9210163 | Method and system for providing persistence in a secure network access | |||
1880 | 9210162 | Certificate based connection to cloud virtual machine | |||
1881 | 9210145 | Method and system for hypertext transfer protocol digest authentication | |||
1882 | 9210141 | System and method for providing scorecards to visualize services in an intelligent workload management system | |||
1883 | 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | |||
1884 | 9210137 | Local digital network, methods for installing new devices and data broadcast and reception methods in such a network | |||
1885 | 9210133 | Method and system of providing authentication of user access to a computer resource via a mobile device using multiple separate security factors | |||
1886 | 9209980 | Provisioning a shared secret to a portable electronic device and to a service entity | |||
1887 | 9209979 | Secure network cloud architecture | |||
1888 | 9209978 | Methods and apparatus to measure exposure to streaming media | |||
1889 | 9209977 | Processing messages received at a vehicle | |||
1890 | 9209976 | Method and system for restricting execution of virtual applications to a managed process environment | |||
1891 | 9209975 | Secure access of electronic documents and data from client terminal | |||
1892 | 9209972 | Mediator device monitoring and controlling access to electronic content | |||
1893 | 9208491 | Format-preserving cryptographic systems | |||
1894 | 9208355 | Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry | |||
1895 | 9208350 | Certificate information verification system | |||
1896 | 9208346 | Persona-notitia intellection codifier | |||
1897 | 9208335 | Space-time separated and jointly evolving relationship-based network access and data protection system | |||
1898 | 9208302 | Multi-factor authentication using biometric data | |||
1899 | 9204374 | Multicarrier over-the-air cellular network activation server | |||
1900 | 9204298 | Multilevel authentication | |||
1901 | 9204296 | Apparatus and methods for key generation | |||
1902 | 9203980 | Unit using operating system and image forming apparatus using the same | |||
1903 | 9203905 | Sessionization of visitor activity | |||
1904 | 9203842 | Establishing connections for secure element communications | |||
1905 | 9203839 | User authentication method and apparatus | |||
1906 | 9203836 | Token for securing communication | |||
1907 | 9203835 | Systems and methods for authenticating a user based on a biometric model associated with the user | |||
1908 | 9203833 | User authorization using an automated Turing Test | |||
1909 | 9203829 | Unified user login | |||
1910 | 9203827 | Methods for determining authentication requirements of information centric network based services and devices thereof | |||
1911 | 9203813 | Content distribution method, content distribution system, source device, and sink device | |||
1912 | 9203812 | Dispersed storage network with encrypted portion withholding and methods for use therewith | |||
1913 | 9203811 | Authenticated encryption support in ISO/IEC 23009-4 | |||
1914 | 9203789 | Method and system for publishing an electronic file attached to an electronic message | |||
1915 | 9203627 | Systems and methods for flash crowd control and batching OCSP requests via online certificate status protocol | |||
1916 | 9203626 | User authentication system and method for encryption and decryption | |||
1917 | 9203625 | Transferring encoded data slices in a distributed storage network | |||
1918 | 9203624 | Authentication and notification heuristics | |||
1919 | 9203623 | Apparatus and methods for keyword proximity matching | |||
1920 | 9203621 | Policy-based data management | |||
1921 | 9203620 | System, method and apparatus for secure use of cryptographic credentials in mobile devices | |||
1922 | 9203617 | Secure provisioning of integrated circuits at various states of deployment, methods thereof | |||
1923 | 9203616 | Multi-server fault tolerant data store update | |||
1924 | 9203613 | Techniques for client constructed sessions | |||
1925 | 9203607 | Keyless challenge and response system | |||
1926 | 9203260 | Secure wireless charging | |||
1927 | 9202328 | Authentication verifying method, authentication verifying member and authentication verifying member producing method | |||
1928 | 9202256 | Methods and apparatus for embedding watermarks | |||
1929 | 9202218 | Processing electronic mail replies | |||
1930 | 9202215 | Method and system for handling sensitive data in a content delivery network | |||
1931 | 9202179 | Device to document processes | |||
1932 | 9202083 | Systems and methods for verifying uniqueness in anonymous authentication | |||
1933 | 9202042 | Automatic device pairing | |||
1934 | 9202040 | Chip authentication using multi-domain intrinsic identifiers | |||
1935 | 9202032 | Methods and systems for authenticating users | |||
1936 | 9202028 | Methods and systems for authenticating users | |||
1937 | 9202023 | Digital rights management method | |||
1938 | 9201811 | Device and authentication method therefor | |||
1939 | 9201131 | Secure routing based on degree of trust | |||
1940 | 9198117 | Network system with common secure wireless message service serving multiple applications on multiple wireless devices | |||
1941 | 9198044 | Front end filter control for shared access system | |||
1942 | 9198036 | Method for providing application service | |||
1943 | 9198033 | Method and apparatus for authenticating nodes in a wireless network | |||
1944 | 9197746 | System, method and apparatus for authenticating calls | |||
1945 | 9197700 | Keychain syncing | |||
1946 | 9197668 | Access control to files based on source information | |||
1947 | 9197655 | Steganography detection | |||
1948 | 9197637 | Method of comparing private data without revealing the data | |||
1949 | 9197636 | Devices, systems and methods for security using magnetic field based identification | |||
1950 | 9197635 | Remote verification of user presence and identity | |||
1951 | 9197634 | Server and/or client device authentication | |||
1952 | 9197631 | Digital certificate issuer-correlated digital signature verification | |||
1953 | 9197618 | Method and apparatus for location-based authorization to access online user groups | |||
1954 | 9197611 | Topic protection policy for publish-subscribe messaging system | |||
1955 | 9197606 | Monitoring network performance of encrypted communications | |||
1956 | 9197491 | Primitive functions for use in remote computer management | |||
1957 | 9197422 | System and method for differential encryption | |||
1958 | 9197421 | Methods and apparatus to measure exposure to streaming media | |||
1959 | 9197420 | Using information in a digital certificate to authenticate a network of a wireless access point | |||
1960 | 9197419 | Security system for data stored in the cloud | |||
1961 | 9197418 | Communication system for authenticating messages with uniquely specified genuine information | |||
1962 | 9197417 | Hosted application sandbox model | |||
1963 | 9197416 | Verification apparatus, verification program, and verification method | |||
1964 | 9197415 | Method and apparatus of cipher communication for management frame using quality of service mechanism in wireless local area network system | |||
1965 | 9197414 | Cryptographic protocol for portable devices | |||
1966 | 9197413 | Hybrid secure communication system and method | |||
1967 | 9197411 | Protocol and method for client-server mutual authentication using event-based OTP | |||
1968 | 9197409 | Key derivation techniques | |||
1969 | 9197406 | Key management using quasi out of band authentication architecture | |||
1970 | 9195845 | Trusted and secure techniques for item delivery and execution | |||
1971 | 9195836 | Techniques for secure data management in a distributed environment | |||
1972 | 9195830 | System and method for unattended computer system access | |||
1973 | 9195813 | Secure gesture | |||
1974 | 9191818 | Methods and devices for OTA management of subscriber identity modules | |||
1975 | 9191772 | Bluetooth connection method and system | |||
1976 | 9191380 | System and method for managing information technology models in an intelligent workload management system | |||
1977 | 9191379 | Method and apparatus for authenticating multicast messages | |||
1978 | 9191376 | Securing digital content system and method | |||
1979 | 9191371 | Network coding-based anonymous communication | |||
1980 | 9191324 | MAC aggregation with message multiplicity for use in a multi-node data network | |||
1981 | 9191291 | Detection and handling of aggregated online content using decision criteria to compare similar or identical content items | |||
1982 | 9191215 | Method and apparatus for providing authentication using policy-controlled authentication articles and techniques | |||
1983 | 9191214 | Procedure for a multiple digital signature | |||
1984 | 9191213 | Methods and systems for messaging with physical presence and temporal verifications | |||
1985 | 9191212 | Controlling application access to mobile device functions | |||
1986 | 9191211 | Data security system | |||
1987 | 9191210 | Authenticator, authenticatee and authentication method | |||
1988 | 9191209 | Efficient communication for devices of a home network | |||
1989 | 9191208 | Schemes for signcryption | |||
1990 | 9191203 | Secure industrial control system | |||
1991 | 9191202 | Information processing device and computer program product | |||
1992 | 9191198 | Method and device using one-time pad data | |||
1993 | 9189820 | Methods and systems for creating monetary accounts for members in a social network | |||
1994 | 9189642 | Safe processing of on-demand delete requests | |||
1995 | 9189638 | Systems and methods for multi-function and multi-purpose cryptography | |||
1996 | 9189617 | Apparatus and method for implementing zero-knowledge proof security techniques on a computing platform | |||
1997 | 9189616 | Authentication method between client and server, machine-readable storage medium, client and server | |||
1998 | 9189605 | Protected computing environment | |||
1999 | 9189603 | Kill switch security method and system | |||
2000 | 9185555 | Method for authentication of a wireless backup system for an optical network unit | |||
2001 | 9185206 | Secured communication via location awareness | |||
2002 | 9185169 | Methods, systems, and computer-readable media for self-learning interactive communications privileges for governing interactive communications with entities outside a domain | |||
2003 | 9185115 | Secure access using location-based encrypted authorization | |||
2004 | 9185108 | Token sharing system and method | |||
2005 | 9185107 | Securing passwords with hash value | |||
2006 | 9185106 | Access control method and mobile terminal which employs an access control method | |||
2007 | 9185105 | System and method for single sign-on session management without central server | |||
2008 | 9185104 | Method and apparatus for communication, and method and apparatus for controlling communication | |||
2009 | 9185097 | Method and system for traffic engineering in secured networks | |||
2010 | 9185094 | Systems, methods and apparatuses for the secure transmission and restricted use of media content | |||
2011 | 9185089 | System and method for key management for issuer security domain using global platform specifications | |||
2012 | 9185087 | Medical device communication using encryption based on correlated motion | |||
2013 | 9184921 | Input challenge based authentication | |||
2014 | 9184920 | Federated digital rights management scheme including trusted systems | |||
2015 | 9184919 | Systems and methods for generating and using multiple pre-signed cryptographic responses | |||
2016 | 9184918 | Trusted hardware for attesting to authenticity in a cloud environment | |||
2017 | 9184917 | Method and system for registering a DRM client | |||
2018 | 9184916 | System and method for using a streaming protocol | |||
2019 | 9184915 | Strong authentication token with acoustic data input over multiple carrier frequencies | |||
2020 | 9184914 | Information processing apparatus and information processing method | |||
2021 | 9184913 | Authenticating a telecommunication terminal in a telecommunication network | |||
2022 | 9184910 | Distributed single sign on technologies including privacy protection and proactive updating | |||
2023 | 9183717 | RFID loss-prevention using synthesized-beam readers | |||
2024 | 9183411 | Cryptographic processing system, key generation device, encryption device, decryption device, cryptographic processing method, and cryptographic processing program utilizing attribute information for generation of a key for decryption or encryption | |||
2025 | 9183374 | Techniques for identity-enabled interface deployment | |||
2026 | 9183369 | Thumb drive guest user | |||
2027 | 9183357 | Recording/reproducing system, recording medium device, and recording/reproducing device | |||
2028 | 9183159 | Authentication method | |||
2029 | 9183158 | System and method for hardware based security | |||
2030 | 9179316 | Mobile device with user controls and policy agent to control application access to device location data | |||
2031 | 9179315 | Mobile device with data service monitoring, categorization, and display for different applications and networks | |||
2032 | 9179311 | Securing vehicle service tool data communications | |||
2033 | 9179308 | Network tools for analysis, design, testing, and production of services | |||
2034 | 9179303 | Methods and apparatus for transmitting and receiving secure and non-secure data | |||
2035 | 9179005 | Producing routing messages for voice over IP communications | |||
2036 | 9178894 | Secure routing based on the physical locations of routers | |||
2037 | 9178890 | Passwordless strong authentication using trusted devices | |||
2038 | 9178881 | Proof of device genuineness | |||
2039 | 9178875 | Method for authenticating an OTP and an instrument therefor | |||
2040 | 9178871 | Authentication and authorization method and system | |||
2041 | 9178870 | User authentication method using self-signed certificate of web server, client device and electronic device including web server performing the same | |||
2042 | 9178858 | Method and system for message delivery security validation | |||
2043 | 9178855 | Systems and methods for multi-function and multi-purpose cryptography | |||
2044 | 9178708 | Non-deterministic time systems and methods | |||
2045 | 9178707 | Policy based signature authentication system and method | |||
2046 | 9178706 | Proxy SSL authentication in split SSL for client-side proxy agent resources with content insertion | |||
2047 | 9178705 | Method and system for stateless validation | |||
2048 | 9178704 | Input consistency verification for server assisted secure function evaluation | |||
2049 | 9178702 | Revocation list generation device, revocation list generation method, and content management system | |||
2050 | 9178701 | Parameter based key derivation | |||
2051 | 9178700 | Information processing apparatus, information processing method, program, and recording medium | |||
2052 | 9178699 | Public key encryption algorithms for hard lock file encryption | |||
2053 | 9177489 | Digital rights convergence place chaser | |||
2054 | 9177488 | Method, system and program product for securing data written to a storage device coupled to a computer system | |||
2055 | 9177345 | One-to-many electronic signature process | |||
2056 | 9177316 | Mobile monetary transactions and banking for rural populations | |||
2057 | 9177159 | Secure data parser method and system | |||
2058 | 9177126 | System and method for human identity validation via a mobile device | |||
2059 | 9176707 | Arithmetic apparatus, elliptic scalar multiplication method of arithmetic apparatus, elliptic scalar multiplication program, residue operation method of arithmetic apparatus, and residue operation program | |||
2060 | 9173097 | Techniques for auto-authentication | |||
2061 | 9172835 | Information processing apparatus, information processing system, image forming apparatus, image forming system, and computer readable medium | |||
2062 | 9172713 | Secure domain name system | |||
2063 | 9172711 | Originator publishing an attestation of a statement | |||
2064 | 9172705 | System and method for remote, interactive network and browsing supervision, monitoring, and approval | |||
2065 | 9172688 | Secure shell authentication | |||
2066 | 9172682 | Local authentication in proxy SSL tunnels using a client-side proxy agent | |||
2067 | 9172547 | Apparatus and method for signature verification | |||
2068 | 9172546 | Network mediated multi-device shared authentication | |||
2069 | 9172545 | Systems and methods for evaluating and prioritizing responses from multiple OCSP responders | |||
2070 | 9172544 | Systems and methods for authentication between networked devices | |||
2071 | 9172543 | Determining CRL size in view of system capability | |||
2072 | 9172542 | System and method to pass a private encryption key | |||
2073 | 9172541 | System and method for pool-based identity generation and use for service access | |||
2074 | 9172540 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
2075 | 9172539 | In-market personalization of payment devices | |||
2076 | 9172536 | Audio communication based electronic signature system and method thereof | |||
2077 | 9172535 | Key implementation system | |||
2078 | 9172531 | Information processing apparatus and method | |||
2079 | 9172480 | Radio-frequency communication controlled by a microcircuit | |||
2080 | 9171810 | Electronic device incorporating a randomized interconnection layer having a randomized conduction pattern | |||
2081 | 9171324 | Hybrid virtual account and token-based digital cash protocols | |||
2082 | 9171191 | Method for dynamic authentication between reader and tag, and device therefor | |||
2083 | 9171142 | Arrangements for identifying users in a multi-touch surface environment | |||
2084 | 9171136 | Data protection method and device | |||
2085 | 9168604 | Device and method for thermally treating workpieces in particular by convective heat transfer | |||
2086 | 9167429 | Visible light communication system, communication terminal and server | |||
2087 | 9167314 | Embedding information in an image | |||
2088 | 9167099 | Computational systems and methods for identifying a communications partner | |||
2089 | 9166977 | Secure text-to-speech synthesis in portable electronic devices | |||
2090 | 9166971 | Authentication using an external device | |||
2091 | 9166969 | Session certificates | |||
2092 | 9166957 | Digital file authentication using biometrics | |||
2093 | 9166893 | Methods, apparatus and systems for monitoring locations of data within a network service | |||
2094 | 9166800 | Authentication method, authentication system, and authentication chip using common key cryptography | |||
2095 | 9166799 | IMS security for femtocells | |||
2096 | 9166798 | System and method for secure provisioning of an information handling system | |||
2097 | 9166797 | Secured compartment for transactions | |||
2098 | 9166796 | Secure biometric cloud storage system | |||
2099 | 9166795 | Device and method for forming a signature | |||
2100 | 9166794 | Securing private key access for cross-component message processing | |||
2101 | 9166793 | Efficient authentication for mobile and pervasive computing | |||
2102 | 9166792 | Data management device, power usage calculation system, data management method, and computer program product | |||
2103 | 9166790 | Commission information generator for making processes on communication performed by another computer | |||
2104 | 9166786 | Personal portable secured network access system | |||
2105 | 9166782 | Dynamic distributed key system and method for identity management, authentication servers, data security and preventing man-in-the-middle attacks | |||
2106 | 9166781 | Key change management apparatus and key change management method | |||
2107 | 9166780 | Information processing apparatus and method | |||
2108 | 9166779 | System and method of secure encryption for electronic data transfer | |||
2109 | 9166777 | Method and system for user authentication for computing devices utilizing PKI and other user credentials | |||
2110 | 9165297 | Virtual account and token-based digital cash protocols | |||
2111 | 9165154 | Trusted cloud computing and services framework | |||
2112 | 9165153 | System and method for protecting secrets file | |||
2113 | 9165135 | Systems and methods using cryptography to protect secure computing environments | |||
2114 | 9165122 | Content reproducing device, content reproducing method, and content reproducing system | |||
2115 | 9164927 | Integrated circuit and memory data protection apparatus and methods thereof | |||
2116 | 9164926 | Security control method of network storage | |||
2117 | 9164725 | Apparatus and method for calculating an SHA-2 hash function in a general purpose processor | |||
2118 | 9164719 | Method and apparatus for obtaining status information from a device | |||
2119 | 9160972 | Digital signature system and digital signing method | |||
2120 | 9160754 | Location based authentication of users to a virtual machine in a computer system | |||
2121 | 9160740 | Establishing secure, mutually authenticated communication credentials | |||
2122 | 9160737 | Statistical security for anonymous mesh-up oriented online services | |||
2123 | 9160734 | Service activation using algorithmically defined key | |||
2124 | 9160732 | System and methods for online authentication | |||
2125 | 9160731 | Establishing a trust relationship between two product systems | |||
2126 | 9160728 | Message sending/receiving method | |||
2127 | 9160722 | System and method for securing user information on social networks | |||
2128 | 9160720 | Digital rights management of streaming contents and services | |||
2129 | 9160546 | Authenticating users based upon an identity footprint | |||
2130 | 9160545 | Systems and methods for A2A and A2DB security using program authentication factors | |||
2131 | 9160544 | Providing secure access to computing resources in a cloud computing environment | |||
2132 | 9160543 | Verification of aircraft information in response to compromised digital certificate | |||
2133 | 9160542 | Authorizing use of a test key signed build | |||
2134 | 9160541 | Method and system for authenticating an accessory | |||
2135 | 9160540 | Preventing playback of streaming video if ads are removed | |||
2136 | 9160539 | Methods and apparatus for secure, stealthy and reliable transmission of alert messages from a security alerting system | |||
2137 | 9160538 | Detection method for fraudulent mail, detection program therefor, and detection device therefor | |||
2138 | 9160537 | Methods for secure restoration of personal identity credentials into electronic devices | |||
2139 | 9160536 | Verification of authenticity and responsiveness of biometric evidence and/or other evidence | |||
2140 | 9160535 | Truly anonymous cloud key broker | |||
2141 | 9160534 | Authenticator, authenticatee and authentication method | |||
2142 | 9160532 | Dynamic seed and key generation from biometric indicia | |||
2143 | 9160531 | Host device, semiconductor memory device, and authentication method | |||
2144 | 9160530 | Method and apparatus for verifiable generation of public keys | |||
2145 | 9160528 | Distributed single sign on technologies including privacy protection and proactive updating | |||
2146 | 9160522 | System and method for verifying the identity of an individual by employing biometric data features associated with the individual | |||
2147 | 9159179 | Common access card security and document security enhancement | |||
2148 | 9159113 | Apparatus and method for embedding searchable information, encryption, transmission, storage and retrieval | |||
2149 | 9158939 | Security chip, program, information processing apparatus, and information processing system | |||
2150 | 9158937 | Information processing device and information processing program | |||
2151 | 9158912 | Method and apparatus for a virtual machine hosting network with user devices | |||
2152 | 9158906 | Authenticating a device and a user | |||
2153 | 9158549 | Method, apparatus and system for binding MTC device and UICC | |||
2154 | 9158467 | Optional data encryption by partition for a partitionable data storage library | |||
2155 | 9154948 | Method and system for user authentication | |||
2156 | 9154947 | Secure home-to-vehicle wireless connectivity | |||
2157 | 9154946 | Secure coupling of hardware components | |||
2158 | 9154815 | Method and system for securing multimedia data streamed over a network | |||
2159 | 9154505 | Simplified login for mobile devices | |||
2160 | 9154494 | Self-signed implicit certificates | |||
2161 | 9154479 | Secure proxy | |||
2162 | 9154477 | Systems and methods for encrypting mobile device communications | |||
2163 | 9154475 | User authentication and authorization in distributed security system | |||
2164 | 9154472 | Method and apparatus for improving security during web-browsing | |||
2165 | 9154465 | Protecting privacy when communicating with a web server | |||
2166 | 9154310 | Resilient device authentication system | |||
2167 | 9154309 | Method and system for running encrypted files | |||
2168 | 9154308 | Revocable platform identifiers | |||
2169 | 9154307 | System, apparatus, application and method for bridging certificate deployment | |||
2170 | 9154306 | Privacy-preserving flexible anonymous-pseudonymous access | |||
2171 | 9154305 | State-based compliance verification in a connected system | |||
2172 | 9154304 | Using a token code to control access to data and applications in a mobile platform | |||
2173 | 9154303 | Third-party authorization of user credentials | |||
2174 | 9154302 | System and method for secure two-factor authenticated ID-based key exchange and remote login using an insecure token and simple second-factor such as a PIN number | |||
2175 | 9154301 | Location information verification | |||
2176 | 9154296 | Secure and anonymous distributed authentication | |||
2177 | 9152868 | Personal identification combining proximity sensing with biometrics | |||
2178 | 9152805 | Security device | |||
2179 | 9152794 | Secure key handling for authentication of software for a system-on-chip | |||
2180 | 9152779 | Protecting codes, keys and user credentials with identity and patterns | |||
2181 | 9152772 | Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object | |||
2182 | 9152579 | Meta-complete data storage | |||
2183 | 9152505 | Verified hardware-based erasure of data on distributed systems | |||
2184 | 9148700 | Remotely defining security data for authorization of local application activity | |||
2185 | 9148446 | Selective modification of encrypted application layer data in a transparent security gateway | |||
2186 | 9148429 | Controlling access by web applications to resources on servers | |||
2187 | 9148423 | Personal identification number (PIN) generation between two devices in a network | |||
2188 | 9148422 | Method and system for enhanced wireless network security | |||
2189 | 9148421 | Method and system for encryption of messages in land mobile radio systems | |||
2190 | 9148419 | User administering a trustworthy workspace | |||
2191 | 9148417 | Computerized method and system for managing amendment voting in a networked secure collaborative exchange environment | |||
2192 | 9148414 | Credential management in a multi-tenant environment | |||
2193 | 9148407 | Selectively performing man in the middle decryption | |||
2194 | 9148404 | System for accessing data of cloud database using transparent technology | |||
2195 | 9148335 | Third party validation of internet protocol addresses | |||
2196 | 9148308 | Apparatus for reducing network traffic in a communication system | |||
2197 | 9148286 | Protecting against counterfeit electronic devices | |||
2198 | 9148285 | Controlling exposure of sensitive data and operation using process bound security tokens in cloud computing environment | |||
2199 | 9148284 | Identification and/or authentication method | |||
2200 | 9148283 | Storing encrypted objects | |||
2201 | 9147315 | Secure game download | |||
2202 | 9147064 | Method for carrying out an application with the aid of a portable data storage medium | |||
2203 | 9147061 | Multi-level authentication | |||
2204 | 9146881 | Mobile data vault | |||
2205 | 9143933 | Communication device that receives external device information from an external device using near field communication | |||
2206 | 9143508 | Service location based authentication | |||
2207 | 9143505 | Image collection based information security method and system | |||
2208 | 9143496 | Device authentication using device environment information | |||
2209 | 9143494 | Method and apparatus for accessing a network | |||
2210 | 9143487 | System and method for massive controlled and secured update of devices firmware | |||
2211 | 9143331 | Methods and devices for authentication and key exchange | |||
2212 | 9143330 | Efficient and secure data currentness systems | |||
2213 | 9143329 | Content integrity and incremental security | |||
2214 | 9143328 | System and method for providing a system management command | |||
2215 | 9143322 | Communication apparatus, data communication method, and network system | |||
2216 | 9143319 | Mechanism for managing authentication device lifecycles | |||
2217 | 9143318 | Secure recoverable offline storage of a shared secret | |||
2218 | 9142250 | System and method for preventing illegal copy | |||
2219 | 9142096 | Methods and devices for authentication and licensing in a gaming network | |||
2220 | 9142069 | Systems and methods for access control | |||
2221 | 9141959 | Method and system for replaying a voice message and displaying a signed digital photograph contemporaneously | |||
2222 | 9141953 | Personal token read system and method | |||
2223 | 9141952 | EGM authentication mechanism using multiple key pairs at the bios with PKI | |||
2224 | 9141945 | Secure distributed single action payment system | |||
2225 | 9141824 | Dynamic database update in multi-server private information retrieval scheme | |||
2226 | 9141823 | Abstraction layer for default encryption with orthogonal encryption logic session object; and automated authentication, with a method for online litigation | |||
2227 | 9141816 | Authenticating a replaceable printer component | |||
2228 | 9141815 | System and method for intelligence based security | |||
2229 | 9141802 | Computing device boot software authentication | |||
2230 | 9141788 | Software self-checking systems and methods | |||
2231 | 9141782 | Authentication using a wireless mobile communication device | |||
2232 | 9141779 | Usable security of online password management with sensor-based authentication | |||
2233 | 9141372 | Secure and interruptible transfer of a map update package to a navigation device | |||
2234 | 9141309 | Versioning-capable data storage devices | |||
2235 | 9141090 | Access code management systems | |||
2236 | 9137739 | Network based service policy implementation with network neutrality and user privacy | |||
2237 | 9137690 | Multiple protocol session record mapper | |||
2238 | 9137658 | Electronic key registration system | |||
2239 | 9137623 | Method and system for realizing concurrent access of multi-kinds of bearer protocols on machine-to-machine (M2M) platform | |||
2240 | 9137385 | Determining a time to permit a communications session to be conducted | |||
2241 | 9137303 | Pre-fetching data segments stored in a dispersed storage network | |||
2242 | 9137244 | System and method for generating one-time password for information handling resource | |||
2243 | 9137243 | Authentication system and authentication method | |||
2244 | 9137238 | Pass-sequences | |||
2245 | 9137237 | Automatically generating certification documents | |||
2246 | 9137226 | Authentication method and authentication device for performing group authentication using a group key | |||
2247 | 9137221 | Method of exchanging data such as cryptographic keys between a data processing system and an electronic entity such as a microcircuit card | |||
2248 | 9137218 | Splicing into an active TLS session without a certificate or private key | |||
2249 | 9137208 | Directory server for automatic network information access systems | |||
2250 | 9137025 | Managing data for authentication devices | |||
2251 | 9137024 | System and method for incorporating an originating site into a security protocol for a downloaded program object | |||
2252 | 9137023 | Self-signed certificates for computer application signatures | |||
2253 | 9137022 | Identifying a slice name information error in a dispersed storage network | |||
2254 | 9137021 | Image forming apparatus, secure network system, method for controlling image forming apparatus, and method for updating certificate information | |||
2255 | 9137020 | Authentication method and system | |||
2256 | 9137019 | Secure wireless charging | |||
2257 | 9137018 | Method and system for providing a generic program guide data from a primary content provider to a user network device through a partner service provider | |||
2258 | 9137017 | Key recovery mechanism | |||
2259 | 9137016 | Key pair updates based on digital signature states | |||
2260 | 9137012 | Wireless authentication methods and apparatus | |||
2261 | 9135833 | Process for selecting compressed key bits for collision resolution in hash lookup table | |||
2262 | 9135820 | Communication system, vehicle-mounted terminal, roadside device | |||
2263 | 9135763 | System and method for wireless state identification | |||
2264 | 9135761 | Method of migrating RFID transponders in situ | |||
2265 | 9135608 | Systems and methods for constructing a local electronic medical record data store using a remote personal health record server | |||
2266 | 9135459 | Security management unit, host controller interface including same, method operating host controller interface, and devices including host controller interface | |||
2267 | 9135456 | Secure data parser method and system | |||
2268 | 9135430 | Digital rights management system and method | |||
2269 | 9135425 | Method and system of providing authentication of user access to a computer resource on a mobile device | |||
2270 | 9135424 | Secure identity binding (SIB) | |||
2271 | 9134998 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
2272 | 9134413 | Method of measuring distance bound using radio frequency identification (RFID) and system thereof | |||
2273 | 9132790 | In-vehicle network system | |||
2274 | 9131374 | Knowledge-based authentication for restricting access to mobile devices | |||
2275 | 9131008 | Discovery profile based unified credential processing for disparate security domains | |||
2276 | 9130991 | Processing data packets in performance enhancing proxy (PEP) environment | |||
2277 | 9130974 | System and method for limiting spyware activity | |||
2278 | 9130973 | Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program | |||
2279 | 9130935 | System and method for providing access credentials | |||
2280 | 9130931 | Method for reading an attribute from an ID token | |||
2281 | 9130925 | Personalized security management | |||
2282 | 9130758 | Renewal of expired certificates | |||
2283 | 9130757 | Method for authenticated communication in dynamic federated environments | |||
2284 | 9130756 | Managing secure content in a content delivery network | |||
2285 | 9130755 | Cross enterprise communication | |||
2286 | 9130754 | Systems and methods for securely transmitting and receiving discovery and paging messages | |||
2287 | 9130753 | Authentication using security device with electronic interface | |||
2288 | 9129536 | Circuit for secure provisioning in an untrusted environment | |||
2289 | 9129122 | Signature verification apparatus, signature verification method, program, and recording medium | |||
2290 | 9129104 | System and method of security management for a virtual environment | |||
2291 | 9129097 | Systems and methods for auditing software usage using a covert key | |||
2292 | 9129089 | Digital rights management with persistently-unencrypted content | |||
2293 | 9129086 | Providing security services within a cloud computing environment | |||
2294 | 9128782 | Consolidated data services apparatus and method | |||
2295 | 9124930 | In-circuit security system and methods for controlling access to and use of sensitive data | |||
2296 | 9124637 | Data protection for keychain syncing | |||
2297 | 9124577 | Method for assembling authorization certificate chains | |||
2298 | 9124576 | Configuring a valid duration period for a digital certificate | |||
2299 | 9124561 | Method of transferring the control of a security module from a first entity to a second entity | |||
2300 | 9124434 | Securing a computing device accessory | |||
2301 | 9124433 | Remote authentication and transaction signatures | |||
2302 | 9124432 | Host device and authentication method for host device | |||
2303 | 9124431 | Evidence-based dynamic scoring to limit guesses in knowledge-based authentication | |||
2304 | 9124422 | System and method for digital rights management with secure application-content binding | |||
2305 | 9124419 | Method, device, and system of secure entry and handling of passwords | |||
2306 | 9123194 | Print medium, card creation method, and program | |||
2307 | 9122894 | Method and apparatus for encryption | |||
2308 | 9122882 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
2309 | 9122876 | Methods for firmware signature | |||
2310 | 9122870 | Methods and apparatus for validating communications in an open architecture system | |||
2311 | 9122862 | Password input method using visual object | |||
2312 | 9122860 | Device and method for identification and authentication | |||
2313 | 9122846 | Document verification with distributed calendar infrastructure | |||
2314 | 9122504 | Apparatus and method for encryption in virtualized environment using auxiliary medium | |||
2315 | 9119167 | Generic broadcast of location assistance data | |||
2316 | 9119070 | Method and system for detecting unauthorized wireless devices | |||
2317 | 9118718 | Techniques to monitor connection paths on networked devices | |||
2318 | 9118699 | Communications methods and apparatus for use in communicating with communications peers | |||
2319 | 9118691 | Content distribution with mutual anonymity | |||
2320 | 9118673 | Methods and systems for secure key entry via communication networks | |||
2321 | 9118672 | Back-end constrained delegation model | |||
2322 | 9118668 | Authenticated remote pin unblock | |||
2323 | 9118667 | System and method for accessing private networks | |||
2324 | 9118666 | Computing device integrity verification | |||
2325 | 9118664 | Password scheme that can be used for security of modems in an independently operated cable system that is scalable with dynamically changeable passwords | |||
2326 | 9118662 | Method and system for distributed off-line logon using one-time passwords | |||
2327 | 9118648 | Method for authorizing access to protected content | |||
2328 | 9118645 | Distributed authentication using persistent stateless credentials | |||
2329 | 9118643 | Authentication and data integrity protection of token | |||
2330 | 9118641 | De-identifying medical history information for medical underwriting | |||
2331 | 9118634 | Dynamic encryption of a universal resource locator | |||
2332 | 9118633 | Topic protection policy for publish-subscribe messaging system | |||
2333 | 9118632 | Anonymizing emails between sender and recipient | |||
2334 | 9118488 | System and method for controlling access to network services using biometric authentication | |||
2335 | 9118487 | Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period | |||
2336 | 9118486 | Revocation of public key infrastructure signatures | |||
2337 | 9118485 | Using an OCSP responder as a CRL distribution point | |||
2338 | 9118484 | Automatic configuration and provisioning of SSL server certificates | |||
2339 | 9118483 | Communication system, relay device, and non-transitory computer readable medium | |||
2340 | 9118467 | Generating keys using secure hardware | |||
2341 | 9118464 | Set of servers for "machine-to-machine" communications using public key infrastructure | |||
2342 | 9118463 | Distributed single sign on technologies including privacy protection and proactive updating | |||
2343 | 9118462 | Content sharing systems and methods | |||
2344 | 9117247 | Systems methods and computer program products for encoding and decoding tax return data | |||
2345 | 9117095 | Data security for digital data storage | |||
2346 | 9117065 | Dynamic interactive identity authentication method and system | |||
2347 | 9117062 | Stateless and secure authentication | |||
2348 | 9113376 | Multi-interface mobility | |||
2349 | 9113333 | Authenticating a user of a system using near field communication | |||
2350 | 9113330 | Wireless authentication using beacon messages | |||
2351 | 9112861 | Registration and network access control | |||
2352 | 9112860 | Method and apparatus for mutual authentication | |||
2353 | 9112855 | Method for identifying pulse optical signal and device thereof | |||
2354 | 9112852 | Method and apparatus for managing identity for mobile terminal | |||
2355 | 9112847 | Authentication method | |||
2356 | 9112844 | Device credentialing for network access | |||
2357 | 9112842 | Secure authentication and transaction system and method | |||
2358 | 9112732 | Security measures for countering unauthorized decryption | |||
2359 | 9112705 | ID system and program, and ID method | |||
2360 | 9112704 | Systems, methods and apparatuses for securing root certificates | |||
2361 | 9112703 | Use of certificate authority to control a device's access to services | |||
2362 | 9112702 | Alternate authentication | |||
2363 | 9112701 | Wearable device, authentication method, and recording medium | |||
2364 | 9112700 | Personal assistance safety systems and methods | |||
2365 | 9112682 | Generating modular security delegates for applications | |||
2366 | 9112681 | Method and apparatus for secure information transfer to support migration | |||
2367 | 9112680 | Distribution of credentials | |||
2368 | 9112678 | Information processing apparatus and method | |||
2369 | 9111292 | Dynamic messaging in a personal data protection suite | |||
2370 | 9111283 | RFID tag authentication with public-key cryptography | |||
2371 | 9111120 | Method for creating a secure dataset and method for evaluating the same | |||
2372 | 9111115 | Oblivious transfer with hidden access control lists | |||
2373 | 9111103 | Remote access control of storage devices | |||
2374 | 9111099 | Centralized kernel module loading | |||
2375 | 9111084 | Authentication platform and related method of operation | |||
2376 | 9111082 | Secure electronic identification device | |||
2377 | 9111081 | Remote direct memory access authentication of a device | |||
2378 | 9110976 | Supporting compliance in a cloud environment | |||
2379 | 9107067 | Secured communication | |||
2380 | 9106882 | Terminal device, content recording system, title key recording method, and computer program | |||
2381 | 9106721 | Application state synchronization across multiple devices | |||
2382 | 9106679 | Object delivery authentication | |||
2383 | 9106648 | Method and apparatus for data transmission | |||
2384 | 9106640 | Exploiting application characteristics for multiple-authenticator broadcast authentication schemes | |||
2385 | 9106638 | Triggers for session persistence | |||
2386 | 9106636 | Information authentication method and information authentication system | |||
2387 | 9106633 | Systems and methods for authenticating mobile device communications | |||
2388 | 9106632 | Provisioning by delivered items | |||
2389 | 9106620 | Trusted communication session and content delivery | |||
2390 | 9106617 | Methods, systems and computer program products for authenticating computer processing devices and transferring both encrypted and unencrypted data therebetween | |||
2391 | 9106426 | Username based authentication and key generation | |||
2392 | 9106425 | Method and system for restricting execution of virtual applications to a managed process environment | |||
2393 | 9106424 | Method and system for providing users login access to multiple devices via a communication system | |||
2394 | 9106423 | Using positional analysis to identify login credentials on a web page | |||
2395 | 9106422 | System and method for personalized security signature | |||
2396 | 9106413 | Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications | |||
2397 | 9106410 | Identity based authenticated key agreement protocol | |||
2398 | 9106408 | Signature processing system, key generation device, signature device, verification device, signature processing method, and signature processing program | |||
2399 | 9106213 | Bit generation apparatus and bit generation method | |||
2400 | 9105432 | Apparatus and method for generating digital value | |||
2401 | 9105031 | Authentication mechanisms for wireless networks | |||
2402 | 9105027 | Verification of portable consumer device for secure services | |||
2403 | 9104926 | Systems and methods for performing secure financial transactions | |||
2404 | 9104887 | Systems, methods, and computer program products for interfacing multiple service provider trusted service managers and secure elements | |||
2405 | 9104874 | Method for detecting the hijacking of computer resources | |||
2406 | 9104853 | Supporting proximity based security code transfer from mobile/tablet application to access device | |||
2407 | 9104851 | Methods and systems for enabling, tracking, and correlating anonymous user activity | |||
2408 | 9104842 | Data protection method and device | |||
2409 | 9104691 | Securing data in a dispersed storage network using an encoding equation | |||
2410 | 9104541 | Obtaining a signed certificate for a dispersed storage network | |||
2411 | 9104511 | Method and computation node for processing application data | |||
2412 | 9104400 | Cryptographic support instructions | |||
2413 | 9104243 | Vehicle operation device | |||
2414 | 9103805 | Environmental measurement display system and method | |||
2415 | 9100827 | Method for cryptographically verifiable identification of a physical unit in a public, wireless telecommunications network | |||
2416 | 9100826 | Method and apparatus for secure access payment and identification | |||
2417 | 9100777 | Method and apparatus for controlling device | |||
2418 | 9100419 | Long-term signature terminal, long-term signature server, long-term signature terminal program, and long-term signature server program | |||
2419 | 9100403 | Apparatus and methods for providing authorized device access | |||
2420 | 9100374 | Method for managing remote upgrading keys in an information security apparatus | |||
2421 | 9100365 | Web application process | |||
2422 | 9100244 | Registration method and registration apparatus | |||
2423 | 9100242 | System and method for maintaining captive portal user authentication | |||
2424 | 9100194 | Method and apparatus for providing authentication between a sending unit and a recipient based on challenge usage data | |||
2425 | 9100193 | Method for protecting sensor data from manipulation and sensor to that end | |||
2426 | 9100192 | Apparatus and method for provisioning an endorsement key certificate for a firmware trusted platform module | |||
2427 | 9100191 | Combining multiple digital certificates | |||
2428 | 9100190 | Previewing a digital certificate in a graphical user interface | |||
2429 | 9100189 | Secure provisioning in an untrusted environment | |||
2430 | 9100188 | Hardware-based root of trust for cloud environments | |||
2431 | 9100187 | Authenticator | |||
2432 | 9100186 | Secure file sharing method and system | |||
2433 | 9100174 | Secure provisioning in an untrusted environment | |||
2434 | 9098882 | Methods, systems, and products for anonymous loan documents | |||
2435 | 9098718 | Systems and methods for securing data using multi-factor or keyed dispersal | |||
2436 | 9098706 | Installer trust chain validation | |||
2437 | 9098684 | Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object | |||
2438 | 9098682 | Data protection systems and methods | |||
2439 | 9098678 | Streaming video authentication | |||
2440 | 9098675 | Authorized delegation of permissions | |||
2441 | 9098440 | Secure compact flash | |||
2442 | 9098301 | Electronic device and booting method | |||
2443 | 9098266 | Data layer service availability | |||
2444 | 9094826 | Wireless communication system and terminal-device authentication method in wireless communication system | |||
2445 | 9094823 | Data processing for securing local resources in a mobile device | |||
2446 | 9094821 | Method and system for activation of performance enhancements for mobile devices | |||
2447 | 9094818 | Method for cryptographically transmitting data between network nodes using a nonce value | |||
2448 | 9094429 | Server verification of secure electronic messages | |||
2449 | 9094413 | Configuration profile validation on iOS Using SSL and redirect | |||
2450 | 9094402 | Retrieving access information in a dispersed storage network | |||
2451 | 9094383 | Personal security manager for ubiquitous patient monitoring | |||
2452 | 9094382 | Electronic key registration system | |||
2453 | 9094376 | System and method for facilitating communications based on trusted relationships | |||
2454 | 9094373 | Method and apparatus to scale authenticated firewall traversal using trusted routing point | |||
2455 | 9094217 | Secure credential store | |||
2456 | 9094216 | System and method for adjusting the frequency of updating certificate revocation list | |||
2457 | 9094215 | Method and system for digital rights management of documents | |||
2458 | 9094214 | Electronic certificate issue system and method | |||
2459 | 9094213 | Method and system for effecting secure communication over a network | |||
2460 | 9094212 | Multi-server authentication token data exchange | |||
2461 | 9094211 | Systems and methods for identifying an individual | |||
2462 | 9094210 | Systems and methods to secure a virtual appliance | |||
2463 | 9094209 | Electronic transaction security system | |||
2464 | 9094208 | User identity management and authentication in network environments | |||
2465 | 9094207 | Terminal for strong authentication of a user | |||
2466 | 9094206 | Method and system for secure session establishment using identity-based encryption (VDTLS) | |||
2467 | 9094205 | Secure provisioning in an untrusted environment | |||
2468 | 9094193 | Information recording device | |||
2469 | 9093128 | Electronic device with a plurality of memory cells and with physically unclonable function | |||
2470 | 9092885 | Method of processing a text, gesture, facial expression, and/or behavior description comprising a test of the authorization for using corresponding profiles for synthesis | |||
2471 | 9092872 | System and method for creating an animation from a plurality of latent images encoded into a visible image | |||
2472 | 9092780 | User-mediator monitoring and controlling access to electronic content | |||
2473 | 9092640 | Access control for server applications | |||
2474 | 9092609 | Authenticating a rich client from within an existing browser session | |||
2475 | 9092385 | Facilitating access of a dispersed storage network | |||
2476 | 9088893 | Control system, controlled apparatus, and operation control method | |||
2477 | 9088891 | Wireless multi-factor authentication with captive portals | |||
2478 | 9088580 | Access control based on user and service | |||
2479 | 9088565 | Use of a public key key pair in the terminal for authentication and authorization of the telecommunication user with the network operator and business partners | |||
2480 | 9088563 | Using service request ticket for multi-factor authentication | |||
2481 | 9088562 | Using service request ticket for multi-factor authentication | |||
2482 | 9088561 | Method and system for authentication in a computer network | |||
2483 | 9088553 | Transmitting message prior to transmitting encapsulated packets to assist link partner in decapsulating packets | |||
2484 | 9088421 | Data transmitting device, data receiving device, and computer-readable storage medium | |||
2485 | 9088420 | System and method for improved geothentication based on a hash function | |||
2486 | 9088419 | Keyed PV signatures | |||
2487 | 9088418 | System and method for updating read-only memory in smart card memory modules | |||
2488 | 9088416 | Method for securely associating data with HTTP and HTTPS sessions | |||
2489 | 9088415 | Authentication of cache DNS server responses | |||
2490 | 9088414 | Asynchronous identity establishment through a web-based application | |||
2491 | 9088408 | Key agreement using a key derivation key | |||
2492 | 9087208 | Persistent key access to album | |||
2493 | 9087203 | Information protection device and information protection method | |||
2494 | 9087192 | Electronic circuit and method for monitoring a data processing | |||
2495 | 9087187 | Unique credentials verification | |||
2496 | 9087180 | Control of access to a secondary system | |||
2497 | 9087178 | System and method for posting content to network sites | |||
2498 | 9087016 | Detecting intentional corruption of data in a dispersed storage network | |||
2499 | 9086994 | Verification of dispersed storage network access control information | |||
2500 | 9084233 | Mobile network having IP multimedia subsystem (IMS) entities and solutions for providing simplification of operations and compatibility between different IMS entities | |||
2501 | 9084218 | Location-based service provider method and system having a user controlled location privacy mechanism | |||
2502 | 9083867 | Device for assigning a geographical position to a picture | |||
2503 | 9083754 | Secure digital communications | |||
2504 | 9083753 | Secure network access control | |||
2505 | 9083746 | Method of providing assured transactions using secure transaction appliance and watermark verification | |||
2506 | 9083727 | Securing client connections | |||
2507 | 9083726 | Automatic content publication and distribution | |||
2508 | 9083702 | System and method for providing internal services to external enterprises | |||
2509 | 9083701 | Method for providing active security authentication, and terminal and system supporting same | |||
2510 | 9083697 | Deriving a username based on a digital certificate | |||
2511 | 9083696 | Trusted peer-based information verification system | |||
2512 | 9083686 | Protocol for program during startup sequence | |||
2513 | 9083601 | Method, system, and computer program product for managing interchange of enterprise data messages | |||
2514 | 9083599 | Method, system and computer program product for providing access policies for services | |||
2515 | 9083535 | Method and apparatus for providing efficient management of certificate revocation | |||
2516 | 9083534 | Method and system for propagating a client identity | |||
2517 | 9083533 | System and methods for online authentication | |||
2518 | 9083532 | Physiological response PIN entry | |||
2519 | 9083531 | Performing client authentication using certificate store on mobile device | |||
2520 | 9083530 | Authentication apparatus, authentication system, authentication method and storage medium | |||
2521 | 9083514 | Distributed single sign on technologies including privacy protection and proactive updating | |||
2522 | 9083513 | Technique for securely communicating and storing programming material in a trusted domain | |||
2523 | 9083506 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
2524 | 9083323 | Integrated circuit identification and dependability verification using ring oscillator based physical unclonable function and age detection circuitry | |||
2525 | 9083184 | Battery pack for electric power tool, and battery connection device | |||
2526 | 9082514 | Method and apparatus for physically unclonable function burn-in | |||
2527 | 9082279 | Method for securely dematerializing the transfer of evidence in data-stream production systems, in particular video-surveillance systems | |||
2528 | 9082172 | Device for generating watermark metadata, associated device for embedding watermark | |||
2529 | 9082091 | Unified user login for co-location facilities | |||
2530 | 9081989 | System and method for secure cloud computing | |||
2531 | 9081969 | Apparatus and method for remotely deleting critical information | |||
2532 | 9081949 | Information processor, authentication control method, and storage medium | |||
2533 | 9081948 | Configurable smartcard | |||
2534 | 9081635 | Provision to an application of a random number not generated by an operating system | |||
2535 | 9078136 | Wireless device for group access and management | |||
2536 | 9078130 | Secure reception reporting | |||
2537 | 9078129 | Knowledge-based authentication for restricting access to mobile devices | |||
2538 | 9078127 | Secure Communication Method | |||
2539 | 9077854 | Preventing the use of modified receiver firmware in receivers of a conditional access system | |||
2540 | 9077730 | Restricting network access while connected to an untrusted network | |||
2541 | 9077725 | Configuration profile validation on iOS based on root certificate validation | |||
2542 | 9077719 | Method and system for automatic distribution and installation of a client certificate in a secure manner | |||
2543 | 9077714 | Secure authentication in a multi-party system | |||
2544 | 9077713 | Typeless secure login to web-based services | |||
2545 | 9077711 | Selective complex data entry from one time passwords for authentication | |||
2546 | 9077702 | Flow ownership assignment in a distributed processor system | |||
2547 | 9077546 | Two factor validation and security response of SSL certificates | |||
2548 | 9077545 | Trust management systems and methods | |||
2549 | 9077544 | Automatic provisioning of authentication credentials | |||
2550 | 9077543 | Methods and apparatus for digital attestation | |||
2551 | 9077542 | System and method for confirming that a user of an electronic device is an authorized user of a vehicle | |||
2552 | 9077541 | Methods and systems for storage of large data objects | |||
2553 | 9077540 | Method for verification of decryption processes | |||
2554 | 9077539 | Server-aided multi-party protocols | |||
2555 | 9077538 | Systems and methods for verifying user identities | |||
2556 | 9077523 | Communication system and authentication card | |||
2557 | 9077521 | Method and system for secure communication | |||
2558 | 9077509 | Secure threshold decryption protocol computation | |||
2559 | 9076484 | Methods for estimating playback time and handling a cumulative playback time permission | |||
2560 | 9076290 | Application monetization platform | |||
2561 | 9076000 | Authentication device, authentication method, and program | |||
2562 | 9075984 | Secure system for allowing the execution of authorized computer program code | |||
2563 | 9075983 | More secure image-based "CAPTCHA" technique | |||
2564 | 9075962 | Secure video delivery | |||
2565 | 9075653 | Embedding supplemental consumer data | |||
2566 | 9071871 | Granular tagging of content | |||
2567 | 9071637 | Automated security analytics platform | |||
2568 | 9071636 | Predictive scoring management system for application behavior | |||
2569 | 9071602 | Biometric authentication system and biometric authentication method | |||
2570 | 9071601 | Authority delegate system, server system in authority delegate system, and control method for controlling authority delegate system | |||
2571 | 9071599 | Method and device for securely configuring a terminal | |||
2572 | 9071597 | Secure instant messaging system | |||
2573 | 9071595 | Certificate validity checking | |||
2574 | 9071591 | Authentication method for network connection and network device and network authentication system using the same method | |||
2575 | 9071565 | Optimizing offline message (network history) delivery for users accessing an application from a single device | |||
2576 | 9071447 | Security system and method | |||
2577 | 9071446 | Tamper-protected hardware and method for using same | |||
2578 | 9071445 | Method and system for generating implicit certificates and applications to identity-based encryption (IBE) | |||
2579 | 9071444 | Trusted message storage and transfer protocol and system | |||
2580 | 9071443 | Automated service platform prospecting | |||
2581 | 9071442 | Signcryption method and device and corresponding signcryption verification method and device | |||
2582 | 9071441 | Identification and authorization of communication devices | |||
2583 | 9071440 | Method and system of authenticating the identity of a user of a public computer terminal | |||
2584 | 9071439 | Method and apparatus for remote administration of cryptographic devices | |||
2585 | 9071438 | System for efficiently handling cryptographic messages containing nonce values in a wireless connectionless environment | |||
2586 | 9071437 | Methods for identifying the guarantor of an application | |||
2587 | 9071436 | Security-activated robotic system | |||
2588 | 9071429 | Revocable shredding of security credentials | |||
2589 | 9071426 | Generating a symmetric key to secure a communication link | |||
2590 | 9071422 | Access authentication method for multiple devices and platforms | |||
2591 | 9071416 | Galois/counter mode encryption in a wireless network | |||
2592 | 9070279 | Electronic key registration system | |||
2593 | 9070251 | Multi-tiered static chain of trust | |||
2594 | 9070193 | Apparatus and method to embed searchable information into a file, encryption, transmission, storage and retrieval | |||
2595 | 9070151 | Systems, methods and devices for trusted transactions | |||
2596 | 9069984 | On-demand authorization management | |||
2597 | 9069979 | LDAP-based multi-tenant in-cloud identity management system | |||
2598 | 9069948 | Methods, systems, and media for measuring quality of gesture-based passwords | |||
2599 | 9069943 | Method and apparatus for token-based tamper detection | |||
2600 | 9069940 | Secure host authentication using symmetric key cryptography | |||
2601 | 9069932 | User-rotatable three-dimensionally rendered object for unlocking a computing device | |||
2602 | 9069706 | Confidential information protection system and method | |||
2603 | 9069458 | Kid mode user interface with application-specific configurability | |||
2604 | 9065845 | Detecting misuse of trusted seals | |||
2605 | 9065842 | Methods and systems for authenticating electronic messages using client-generated encryption keys | |||
2606 | 9065823 | System and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying party to a digital signature service | |||
2607 | 9065656 | System and methods for managing trust in access control based on a user identity | |||
2608 | 9065655 | Secure password management systems, methods and apparatuses | |||
2609 | 9065643 | System and method for account identifier obfuscation | |||
2610 | 9065642 | Intercepting key sessions | |||
2611 | 9065639 | Device for generating encryption key, method thereof and computer readable medium | |||
2612 | 9065636 | Data encryption system and method | |||
2613 | 9065632 | Message authentication using a universal hash function computed with carryless multiplication | |||
2614 | 9064127 | Systems and methods for securing data in the cloud | |||
2615 | 9064102 | Method, system and device for secured access to protected digital material | |||
2616 | 9064101 | Methods and systems for authenticating one or more users of a vehicle communications and information system | |||
2617 | 9064035 | Medical and personal data retrieval system | |||
2618 | 9060277 | Mobile communication devices, wireless access points, and wireless local area network (WLAN) authentication methods thereof | |||
2619 | 9060274 | Smart card accessible over a personal area network | |||
2620 | 9060245 | Methods and apparatus for collecting and using information regarding location object-based actions | |||
2621 | 9059981 | System, method, and computer program product for security verification of communications to tenants of an on-demand database service | |||
2622 | 9059980 | Systems and methods for authenticating mobile devices | |||
2623 | 9059978 | System and methods for remote maintenance in an electronic network with multiple clients | |||
2624 | 9059969 | Apparatus, method and system for a tunneling client access point | |||
2625 | 9059858 | User characteristic based digital signature of documents | |||
2626 | 9059857 | Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message | |||
2627 | 9059856 | Providing security services on the cloud | |||
2628 | 9059855 | System and method for implementing a trusted dynamic launch and trusted platform module (TPM) using secure enclaves | |||
2629 | 9059854 | Protocol for authenticating functionality in a peripheral device | |||
2630 | 9059853 | System and method for preventing a computing device from obtaining unauthorized access to a secure network or trusted computing environment | |||
2631 | 9059852 | Validating a user's identity utilizing information embedded in a image file | |||
2632 | 9059843 | Information protection apparatus, information protection method, and storage medium | |||
2633 | 9059842 | System and method for grid based cyber security | |||
2634 | 9059840 | Recipient blind cryptographic access control for publicly hosted message and data streams | |||
2635 | 9058584 | Method and apparatus for storage of data for manufactured items | |||
2636 | 9058499 | Systems and methods for managing disclosure of protectable information | |||
2637 | 9058482 | Controlling user access to electronic resources without password | |||
2638 | 9058467 | Distributed computer systems with time-dependent credentials | |||
2639 | 9055437 | Communication system, femtocell base station, authentication apparatus, communication method, and recording medium | |||
2640 | 9055349 | Displaying video retrieved from embedded code in a still image | |||
2641 | 9055314 | Secure transfer of credit card information | |||
2642 | 9055107 | Authentication delegation based on re-verification of cryptographic evidence | |||
2643 | 9055073 | Cross access login controller | |||
2644 | 9055061 | Process of authentication for an access to a web site | |||
2645 | 9055059 | Combining multiple digital certificates | |||
2646 | 9055058 | Method and apparatus for serial device registration | |||
2647 | 9055055 | Provisioning account credentials via a trusted channel | |||
2648 | 9055052 | Method and system for improving storage security in a cloud computing environment | |||
2649 | 9055041 | Device certificate based appliance configuration | |||
2650 | 9054881 | Radio frequency identification (RFID) tag and interrogator for supporting normal mode and secure mode, and operation method thereof | |||
2651 | 9054880 | Information processing device, controller, key issuing authority, method for judging revocation list validity, and key issuing method | |||
2652 | 9054879 | Method and apparatus for delivering certificate revocation lists | |||
2653 | 9054878 | System and method for security authentication of power system | |||
2654 | 9054877 | Data expansion using an approximate method | |||
2655 | 9054875 | Biometric authentication apparatus, biometric authentication method, and biometric authentication computer program | |||
2656 | 9054874 | System and method for data authentication among processors | |||
2657 | 9054873 | Compact security device with transaction risk level approval capability | |||
2658 | 9054865 | Cryptographic system and methodology for securing software cryptography | |||
2659 | 9054863 | Industrial protocol system authentication and firewall | |||
2660 | 9054860 | Digital verified identification system and method | |||
2661 | 9054848 | Electronic apparatus and encryption method thereof | |||
2662 | 9053347 | Memory device, host device, and memory system | |||
2663 | 9053332 | Policy for secure packet transmission using required node paths and cryptographic signatures | |||
2664 | 9053310 | System and method for verifying status of an authentication device through a biometric profile | |||
2665 | 9053307 | Behavior based identity system | |||
2666 | 9053306 | Authentication system, authentication server, service providing server, authentication method, and computer-readable recording medium | |||
2667 | 9052931 | Method and system for machine identification | |||
2668 | 9049593 | Method and apparatus for restricting access to a wireless system | |||
2669 | 9049200 | System and method for improving hardware utilization for a bidirectional access controls list in a low latency high-throughput network | |||
2670 | 9049182 | Techniques for virtual representational state transfer (REST) interfaces | |||
2671 | 9049026 | Authenticator, authenticatee and authentication method | |||
2672 | 9049025 | Method of decrypting encrypted information for unsecure phone | |||
2673 | 9049022 | Hashing prefix-free values in a certificate scheme | |||
2674 | 9049006 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
2675 | 9047494 | System and method for disabling and/or enabling a device | |||
2676 | 9047458 | Network access protection | |||
2677 | 9047449 | Method and system for entity authentication in resource-limited network | |||
2678 | 9047448 | Branch auditing in a computer program | |||
2679 | 9044855 | Processing context information | |||
2680 | 9043938 | Secured wireless access system and related method | |||
2681 | 9043604 | Method and apparatus for key provisioning of hardware devices | |||
2682 | 9043601 | Digital watermark key generation | |||
2683 | 9043600 | Security model for industrial devices | |||
2684 | 9043599 | Method and server for providing a mobility key | |||
2685 | 9043597 | Systems and methods for verifying the authenticity of a remote device | |||
2686 | 9043596 | Method and apparatus for authenticating public key without authentication server | |||
2687 | 9043592 | Communicating trust models to relying parties | |||
2688 | 9042549 | Apparatus and method for address privacy protection in receiver oriented channels | |||
2689 | 9042543 | Method for arbitrary-precision division or modular reduction | |||
2690 | 9041510 | Capacitive data transfer in an electronic lock and key assembly | |||
2691 | 9038178 | Detection of malware beaconing activities | |||
2692 | 9038170 | Logging access system events | |||
2693 | 9038134 | Managing predictions in data security systems | |||
2694 | 9038130 | Sensor aware security policies with embedded controller hardened enforcement | |||
2695 | 9038064 | Trace assisted prefetching of virtual machines in a distributed system | |||
2696 | 9037862 | Instant messaging private tags | |||
2697 | 9037861 | Enhancing data security using re-encryption | |||
2698 | 9037859 | Processing of communication device signatures for use in securing nomadic electronic transactions | |||
2699 | 9037857 | System and method for downloading application | |||
2700 | 9037851 | User authentication system, user authentication apparatus, smart card, and user authentication method for ubiquitous authentication management | |||
2701 | 9037759 | Storage medium, information processing apparatus, information processing method and information processing system | |||
2702 | 9037453 | Embedder for embedding a watermark into an information representation, detector for detecting a watermark in an information representation, method and computer program | |||
2703 | 9032492 | Distributed computer systems with time-dependent credentials | |||
2704 | 9032486 | Breathalyzer system for social media | |||
2705 | 9032478 | Managing security in a network | |||
2706 | 9032205 | Robust authentication and key agreement protocol for net-generation wireless networks | |||
2707 | 9031235 | Method and apparatus for use in a downloadable conditional access system | |||
2708 | 9027121 | Method and system for creating a record for one or more computer security incidents | |||
2709 | 9027119 | Authentication frequency and challenge type based on application usage | |||
2710 | 9027105 | Social network interaction using validated representations of user credentials | |||
2711 | 9027102 | Web server bypass of backend process on near field communications and secure element chips | |||
2712 | 9027101 | Providing subscriber consent in an operator exchange | |||
2713 | 9027100 | Client-side ad caching for lower ad serving latency | |||
2714 | 9027083 | Management of access identifiers | |||
2715 | 9027079 | Method and system for dynamic security using authentication servers | |||
2716 | 9026795 | Apparatus and method for signing application | |||
2717 | 9026791 | Linear feedback shift register (LFSR) | |||
2718 | 9026785 | Method and apparatus for smart-key management | |||
2719 | 9026784 | System and method for innovative management of transport layer security session tickets in a network environment | |||
2720 | 9021610 | Computer recovery or return | |||
2721 | 9021603 | Non-volatile memory for anti-cloning and authentication method for the same | |||
2722 | 9021572 | Anonymous access to a service by means of aggregated certificates | |||
2723 | 9021267 | System and method for using digital signatures to assign permissions | |||
2724 | 9021266 | Validation system and verification method including signature device and verification device to verify contents | |||
2725 | 9021265 | Anonymity authentication method for global mobility networks | |||
2726 | 9021248 | Secure access of mobile devices using passwords | |||
2727 | 9021246 | Method to replace bootloader public key | |||
2728 | 9019073 | System and method for user authentication in in-home display | |||
2729 | 9015860 | Behavioral fingerprinting via derived personal relation | |||
2730 | 9015820 | Cross site request forgery mitigation in multi-domain integrations | |||
2731 | 9015819 | Method and system for single sign-on | |||
2732 | 9015817 | Resilient and restorable dynamic device identification | |||
2733 | 9015808 | Restricting mobile device services between an occurrence of an account change and acquisition of a security code | |||
2734 | 9015801 | Methods and systems for handling recovery messages | |||
2735 | 9015491 | Method and apparatus for managing private data in multifunction peripheral | |||
2736 | 9015485 | Risk-based authentication duration | |||
2737 | 9015469 | Supporting secure sessions in a cloud-based proxy service | |||
2738 | 9015225 | Systems and methods for delivering messages over a network | |||
2739 | 9014144 | Employing physical location geo-spatial co-ordinate of communication device as part of internet protocol | |||
2740 | 9013735 | Image forming system and image forming method providing controls of settings of image position and restriction | |||
2741 | 9009839 | Method and device for protecting the integrity of data transmitted over a network | |||
2742 | 9009817 | Virtual smart card to perform security-critical operations | |||
2743 | 9009814 | Systems and methods for generating secure passwords | |||
2744 | 9009804 | Method and system for hybrid software as a service user interfaces | |||
2745 | 9009802 | Automatic PIN creation using password | |||
2746 | 9009799 | Secure access | |||
2747 | 9009796 | Spot beam based authentication | |||
2748 | 9009793 | Dynamic pin dual factor authentication using mobile device | |||
2749 | 9009492 | Prevention of playback attacks using OTP memory | |||
2750 | 9009484 | Method and system for securing communication | |||
2751 | 9009483 | Replacing blinded authentication authority | |||
2752 | 9009480 | Techniques for handshake-free encrypted communication using public key bootstrapping | |||
2753 | 9009477 | Archiving electronic content having digital signatures | |||
2754 | 9009464 | Anonymous register system and method thereof | |||
2755 | 9003551 | System and method for obscuring displayed information | |||
2756 | 9003517 | Isolation and presentation of untrusted data | |||
2757 | 9003489 | System and method for providing virtual user groups in a network environment | |||
2758 | 9003361 | Generating a restful web service software development kit client | |||
2759 | 9003194 | Systems and methods for data compression and decompression | |||
2760 | 9003193 | Electronic apparatus for delegation management and delegation management methods thereof | |||
2761 | 9003191 | Token-based authentication using middle tier | |||
2762 | 9003190 | Method and apparatus for providing a key certificate in a tamperproof manner | |||
2763 | 9003189 | Trusted third party client authentication | |||
2764 | 9003186 | HTTP authentication and authorization management | |||
2765 | 9002017 | Method and apparatus for key distribution for secure digital cinema presentations | |||
2766 | 9001179 | Transmission terminal, transmission method, and computer-readable recording medium storing transmission program | |||
2767 | 8997193 | Single sign-on for disparate servers | |||
2768 | 8997187 | Delegating authorization to applications on a client device in a networked environment | |||
2769 | 8997182 | Legacy device registering method, data transferring method and legacy device authenticating method | |||
2770 | 8997174 | Configuring browser policy settings on client computing devices | |||
2771 | 8996884 | High privacy of file synchronization with sharing functionality | |||
2772 | 8996877 | Cryptographically secure authentication device, system and method | |||
2773 | 8996876 | Method and system for using a smart phone for electrical vehicle charging | |||
2774 | 8996872 | Contactless seed programming method and system thereof | |||
2775 | 8996869 | Secure mission module | |||
2776 | 8996868 | Method of authenticating vehicle communication | |||
2777 | 8996867 | Method and device for end-user verification of an electronic transaction | |||
2778 | 8995654 | Method for verifying correct encryption key utilization | |||
2779 | 8995274 | Methods and systems for controlling traffic on a communication network | |||
2780 | 8992631 | Theft prevention of media peripherals in a media exchange network | |||
2781 | 8990953 | Software distribution service federation | |||
2782 | 8990901 | Systems and methods for network filtering in VPN | |||
2783 | 8990896 | Extensible mechanism for securing objects using claims | |||
2784 | 8990889 | System and method for physical access control | |||
2785 | 8990888 | Method and apparatus for providing a one-time password | |||
2786 | 8990887 | Secure mechanisms to enable mobile device communication with a security panel | |||
2787 | 8990697 | Associating file types with web-based applications for automatically launching the associated application | |||
2788 | 8990576 | Methods and apparatus for efficient computation of one-way chains in cryptographic applications | |||
2789 | 8990573 | System and method for using variable security tag location in network communications | |||
2790 | 8990571 | Host device, semiconductor memory device, and authentication method | |||
2791 | 8990570 | Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer | |||
2792 | 8990569 | Secure communication session setup | |||
2793 | 8990567 | Message originator token verification | |||
2794 | 8990565 | Method and system for automatically logging in a client | |||
2795 | 8990564 | System and method for performing device authentication using key agreement | |||
2796 | 8990563 | Sending protected data in a communication network | |||
2797 | 8990562 | Secure deployment of provable identity for dynamic application environments | |||
2798 | 8990555 | Centralized key management | |||
2799 | 8989883 | Systems and methods for providing access to resources through enhanced audio signals | |||
2800 | 8989383 | Data authentication using plural electronic keys | |||
2801 | 8989380 | Controlling communication of a wireless communication device | |||
2802 | 8989374 | Cryptographic device for secure authentication | |||
2803 | 8988187 | Proximity based biometric identification systems and methods | |||
2804 | 8988186 | Self-service device user asset condition alert | |||
2805 | 8984652 | Transfer of digital rights management information | |||
2806 | 8984635 | Authenticating the identity of initiators of TCP connections | |||
2807 | 8984595 | Method and system for hub-and-spoke website browsing and navigation on a multipaned platform for the communication, distribution, and collaboration of information and data | |||
2808 | 8984298 | Managing access to a secure content-part of a PPCD using a key reset point | |||
2809 | 8984288 | Electronic signing of content | |||
2810 | 8984287 | Wireless personal area network access method based on primitive | |||
2811 | 8984286 | Message originator token verification | |||
2812 | 8984283 | Private certificate validation method and apparatus | |||
2813 | 8983075 | Custodian securing a secret of a user | |||
2814 | 8983061 | Method and apparatus for cryptographically processing data | |||
2815 | 8982423 | Providing voter secrecy through manually created markings | |||
2816 | 8982411 | Image processing apparatus and method | |||
2817 | 8978124 | Service oriented secure collaborative system for compartmented networks | |||
2818 | 8978118 | Pseudonymized authentication | |||
2819 | 8978108 | Method, device, and system for service presentation | |||
2820 | 8978099 | Methods and devices for detecting an IP address | |||
2821 | 8977864 | Programmable logic device with resistance to external monitoring attacks | |||
2822 | 8977855 | Secure function evaluation between semi-honest parties | |||
2823 | 8977854 | Automatic user authentication and identification for mobile instant messaging application | |||
2824 | 8977850 | Content data, transmitting apparatus, receiving apparatus and decoding method | |||
2825 | 8977845 | Methods and apparatus for access control in service-oriented computing environments | |||
2826 | 8977843 | Geolocating network nodes in attenuated environments for cyber and network security applications | |||
2827 | 8976967 | Mediator monitoring and controlling access to electronic content | |||
2828 | 8976383 | Method and system for document printing management and control, and document source tracking | |||
2829 | 8973151 | Portable security device and methods for secure communication | |||
2830 | 8973106 | Computer implemented methods and apparatus for providing permissions to users in an on-demand service environment | |||
2831 | 8973096 | Fraud detection in adaptive authentication systems | |||
2832 | 8973094 | Execution of a secured environment initialization instruction on a point-to-point interconnect system | |||
2833 | 8972738 | Incorporating data into an ECDSA signature component | |||
2834 | 8972737 | Unauthorized contents detection system | |||
2835 | 8972735 | Methods and apparatus to certify digital signatures | |||
2836 | 8972733 | Techniques to prime a stateful request-and-response communication channel | |||
2837 | 8972732 | Offline data access using trusted hardware | |||
2838 | 8972727 | Method of identification or authorization, and associated system and secure module | |||
2839 | 8972726 | System and method for digital rights management using a secure end-to-end protocol with embedded encryption keys | |||
2840 | 8972591 | Method for downloading software | |||
2841 | 8970345 | Channel-switching remote controlled barrier opening system | |||
2842 | 8970343 | Reteachable switching circuit with ability for locking | |||
2843 | 8966594 | Proxy authentication | |||
2844 | 8966589 | Methods, systems, and computer-readable media for exception handling of interactive communications privileges governing interactive communications with entities outside a domain | |||
2845 | 8966588 | Systems and methods of establishing a secure connection between a remote platform and a base station device | |||
2846 | 8966586 | Authentication within OpenFlow network | |||
2847 | 8966273 | Lightweight group signature system and method with short signature | |||
2848 | 8966271 | Data card verification system | |||
2849 | 8966270 | Methods and systems for providing controlled access to the internet | |||
2850 | 8966266 | Method for obtaining encryption keys corresponding terminals, server and computer program products | |||
2851 | 8966265 | Pairwise temporal key creation for secure networks | |||
2852 | 8966261 | Method for secure remote backup | |||
2853 | 8966258 | Method for securely downloading from distributed download sources | |||
2854 | 8966257 | Method and system for secret communication between nodes | |||
2855 | 8966254 | Keyless challenge and response system | |||
2856 | 8966243 | Method and system for data encryption and decryption in data transmission through the web | |||
2857 | 8965039 | Client-side watermarking using hybrid I-frames | |||
2858 | 8964976 | Secure storage and retrieval of confidential information | |||
2859 | 8964744 | Management apparatus, management method, and computer-readable medium | |||
2860 | 8963687 | System and method for DSRC communication | |||
2861 | 8963683 | Enabling of functions in a door drive | |||
2862 | 8959610 | Security bridging | |||
2863 | 8959607 | Group key management and authentication schemes for mesh networks | |||
2864 | 8959583 | Access to vaulted credentials using login computer and mobile computing device | |||
2865 | 8959357 | Biometric encryption and key generation | |||
2866 | 8959351 | Securely filtering trust services records | |||
2867 | 8959350 | Token for securing communication | |||
2868 | 8959349 | Method and apparatus for key sharing over remote desktop protocol | |||
2869 | 8959343 | Authentication system, method and device | |||
2870 | 8959342 | Communication apparatus | |||
2871 | 8959340 | Method for accessing and transferring data linked to an application installed on a security module associated with a mobile terminal, and associated security module, management server and system | |||
2872 | 8959273 | Composite data transmission interface and a judgment method thereof | |||
2873 | 8959025 | System and method for automatic identification of speech coding scheme | |||
2874 | 8958562 | Format-preserving cryptographic systems | |||
2875 | 8958550 | Encryption operation with real data rounds, dummy data rounds, and delay periods | |||
2876 | 8957757 | Access management and reporting technology | |||
2877 | 8955077 | Server-token lockstep systems and methods | |||
2878 | 8955072 | Single sign on for a remote user session | |||
2879 | 8955071 | Controlled password modification method | |||
2880 | 8955070 | Controlled password modification method and apparatus | |||
2881 | 8955053 | Method for using rights to contents | |||
2882 | 8954744 | Verification methods and apparatus for use in providing application services to mobile communication devices | |||
2883 | 8954743 | System and method for watermarking content for tracking media consumption | |||
2884 | 8954741 | Apparatus and method for supporting family cloud in cloud computing system | |||
2885 | 8954739 | Efficient terminal authentication in telecommunication networks | |||
2886 | 8954733 | Embedded extrinsic source for digital certificate validation | |||
2887 | 8954730 | Establishing historical usage-based hardware trust | |||
2888 | 8954604 | Replication server selection method | |||
2889 | 8954261 | Autonomous vehicle positioning system for misbehavior detection | |||
2890 | 8953795 | Forensic decryption tools | |||
2891 | 8949973 | Image processing apparatus | |||
2892 | 8949955 | Method and apparatus for mobile time-based UI for VIP | |||
2893 | 8949935 | Secure account creation | |||
2894 | 8949934 | Communication device, communication method, and program | |||
2895 | 8949621 | Memory device authentication | |||
2896 | 8949613 | Self-signed certificates for computer application signatures | |||
2897 | 8949612 | One-to-many electronic signature process | |||
2898 | 8949611 | Methods, apparatus and computer program products for authenticating and determining integrity of a software part of an air vehicle | |||
2899 | 8949610 | Method for embedding secret message into PNG image | |||
2900 | 8949608 | Field programmable smart card terminal and token device | |||
2901 | 8949607 | Digital data authentication | |||
2902 | 8949606 | Prevention of masquerade by using identification sequences | |||
2903 | 8949605 | Communication system, communication apparatus, communication method, and computer program | |||
2904 | 8949603 | Database management system and encryption method performed in database | |||
2905 | 8949602 | Method and apparatus for authenticating per M2M device between service provider and mobile network operator | |||
2906 | 8949601 | Communication system for providing the delivery of e-mail message | |||
2907 | 8949597 | Managing certificates on a mobile device | |||
2908 | 8948394 | Method and apparatus for distribution and synchronization of cryptographic context information | |||
2909 | 8943324 | Green energy generation apparatus, mobile device, electric storage apparatus, and management method of green energy information | |||
2910 | 8943323 | System and method for provisioning device certificates | |||
2911 | 8943322 | Systems and methods for authenticating an electronic transaction | |||
2912 | 8943319 | Managing security for computer services | |||
2913 | 8943311 | System and methods for online authentication | |||
2914 | 8941469 | RFID tag authentication with public-key cryptography | |||
2915 | 8939834 | Software verification and authentication | |||
2916 | 8938785 | Wireless session configuration persistence | |||
2917 | 8938781 | Systems and methods for managing user permissions | |||
2918 | 8938616 | Authentication method | |||
2919 | 8938615 | System and method for authenticating radio frequency identification (RFID) tags | |||
2920 | 8938614 | Motor vehicle electronics device, motor vehicle, method for displaying data on a motor vehicle display apparatus, and computer program product | |||
2921 | 8938613 | Techniques for secure message offloading | |||
2922 | 8938095 | Verification method, verification device, and computer product | |||
2923 | 8938074 | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier | |||
2924 | 8937537 | Method and system for utilizing spread spectrum techniques for in car applications | |||
2925 | 8935768 | Controlling client access to email responsive to email class levels | |||
2926 | 8935765 | Method to enable mobile devices to rendezvous in a communication network | |||
2927 | 8935681 | Source code protection | |||
2928 | 8935532 | Content distribution and aggregation | |||
2929 | 8935530 | Control device and computer readable medium | |||
2930 | 8935528 | Techniques for ensuring authentication and integrity of communications | |||
2931 | 8935527 | Secure transmission with error correcting code | |||
2932 | 8934629 | Communication apparatus, image input apparatus, image output apparatus, wireless communication circuit, method for controlling apparatus, and program | |||
2933 | 8933786 | RFID tag device and method of recognizing the same | |||
2934 | 8931102 | Testing web applications for file upload vulnerabilities | |||
2935 | 8931085 | Download optimization in the presence of multicast data | |||
2936 | 8930707 | Near field communication (NFC) device and method for selectively securing records in a near field communication data exchange format (NDEF) message | |||
2937 | 8930705 | System and method for authenticating remote execution | |||
2938 | 8930704 | Digital signature method and system | |||
2939 | 8930698 | Encrypting globally unique identifiers at communication boundaries | |||
2940 | 8930697 | Securing digital content system and method | |||
2941 | 8930696 | System and method for exchanging secure information between secure removable media (SRM) devices | |||
2942 | 8930692 | Mechanism for internal processing of content through partial authentication on secondary channel | |||
2943 | 8930688 | Apparatus and method for providing security service of user interface | |||
2944 | 8928454 | Computer room security | |||
2014 | |||||
2945 | 8925098 | Data security and access tracking in memory | |||
2946 | 8925070 | Method and apparatus for providing user authentication based on user actions | |||
2947 | 8925053 | Internet-accessible service for dynamic authentication and continuous assertion of trust level in identities | |||
2948 | 8925035 | System and method for document isolation | |||
2949 | 8924735 | Managed biometric identity | |||
2950 | 8924730 | Digital watermarking for secure transmission between a source component and a node device | |||
2951 | 8924729 | Systems and methods for biometric E-signature | |||
2952 | 8924727 | Technologies labeling diverse content | |||
2953 | 8924726 | Robust message encryption | |||
2954 | 8924725 | Authenticated file handles for network file systems | |||
2955 | 8924723 | Managing security for computer services | |||
2956 | 8924722 | Apparatus, method, system and program for secure communication | |||
2957 | 8924713 | Method and system for state machine security device | |||
2958 | 8924041 | Vehicle central lock antitheft method and system | |||
2959 | 8923811 | Methods and apparatuses for dynamic management of security associations in a wireless network | |||
2960 | 8923519 | Method of efficient secure function evaluation using resettable tamper-resistant hardware tokens | |||
2961 | 8923511 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
2962 | 8918897 | Dispersed storage network data slice integrity verification | |||
2963 | 8918842 | Utility grid command filter system | |||
2964 | 8918648 | Digital signature and key agreement schemes | |||
2965 | 8918643 | Authentication method, authentication system, in-vehicle device, and authentication apparatus | |||
2966 | 8917870 | Methods and devices for computing a shared encryption key | |||
2967 | 8917410 | Image forming system, image forming apparatus and print server | |||
2968 | 8914905 | Access control system, communication terminal, server, and access control method | |||
2969 | 8914867 | Method and apparatus for redirecting data traffic | |||
2970 | 8914851 | Method and system for improved security | |||
2971 | 8914647 | Method and system for protecting data | |||
2972 | 8914646 | Information processing apparatus and information processing method for determining access permission | |||
2973 | 8914643 | Anonymous authentication system and anonymous authentication method | |||
2974 | 8914641 | Method for signing and verifying data using multiple hash algorithms and digests in PKCS | |||
2975 | 8914640 | System for exchanging data between at least one sender and one receiver | |||
2976 | 8914638 | Electronic watermark generating apparatus, electronic watermark verifying apparatus, method of generating electronic watermark, and method of verifying electronic watermark | |||
2977 | 8914634 | Digital rights management system transfer of content and distribution | |||
2978 | 8910244 | Method for establishing identity management trust, identification provider and service provider | |||
2979 | 8909937 | Access control system and access control method thereof | |||
2980 | 8909934 | Assisted certificate enrollment | |||
2981 | 8909932 | Method and apparatus for security over multiple interfaces | |||
2982 | 8909931 | Server authentication system, server authentication method, and program for server authentication | |||
2983 | 8909929 | Stored public key validity registers for cryptographic devices and systems | |||
2984 | 8909928 | Securing customer virtual machines in a multi-tenant cloud | |||
2985 | 8909927 | Method for processing messages and message processing device | |||
2986 | 8909918 | Techniques to classify virtual private network traffic based on identity | |||
2987 | 8908909 | Watermark decoding with selective accumulation of components | |||
2988 | 8908907 | Method and system for video transmission and processing with customized watermarking delivery | |||
2989 | 8908871 | Mobile internet protocol system and method for updating home agent root key | |||
2990 | 8904558 | Detecting web browser based attacks using browser digest compute tests using digest code provided by a remote source | |||
2991 | 8904537 | Malware detection | |||
2992 | 8904526 | Enhanced network security | |||
2993 | 8904515 | System and method for controlling devices at a location | |||
2994 | 8904510 | Authenticating a user for testing purposes | |||
2995 | 8904501 | Method and system for automated emergency access to medical records | |||
2996 | 8904488 | Managing online shop using instant messaging system | |||
2997 | 8904482 | Techniques for securing a one-time passcode with an alteration code | |||
2998 | 8904188 | Trusted storage systems and methods | |||
2999 | 8904183 | Efficient technique to achieve non-repudiation and resilience to DoS attacks in wireless networks | |||
3000 | 8904182 | Method and system to provide fine granular integrity to digital data | |||
3001 | 8904177 | Authentication for a multi-tier wireless home mesh network | |||
3002 | 8904176 | Protecting the information encoded in a bloom filter using encoded bits of data | |||
3003 | 8904012 | Client-server input method editor architecture | |||
3004 | 8903094 | Cryptographic key distribution system | |||
3005 | 8898798 | Systems and methods for medical information analysis with deidentification and reidentification | |||
3006 | 8898757 | Authentication server with link state monitor and credential cache | |||
3007 | 8898665 | System, method and computer program product for inviting other virtual machine to access a memory space allocated to a virtual machine | |||
3008 | 8898479 | Integrated genomic and proteomic security protocol | |||
3009 | 8898475 | Method, controller and system for detecting infringements of the authenticity of system components | |||
3010 | 8898472 | Mechanism and method for managing credentials on IOS based operating system | |||
3011 | 8898469 | Software feature authorization through delegated agents | |||
3012 | 8898468 | Method for ensuring security and privacy in a wireless cognitive network | |||
3013 | 8898466 | Secure block acknowledgement mechanism for use in communication networks | |||
3014 | 8898465 | System and method for fuse enablement of a secure client hosted virtualization in an information handling system | |||
3015 | 8898463 | Device | |||
3016 | 8898462 | Method and device for authenticating components within an automatic teller machine | |||
3017 | 8898461 | Battery authentication method and apparatus | |||
3018 | 8898458 | Method for communicating certificates to computers | |||
3019 | 8898023 | Biological information management system and biological information management method | |||
3020 | 8896857 | Content receipt via email addresses | |||
3021 | 8893266 | System and method for secure control of resources of wireless mobile communication devices | |||
3022 | 8893248 | Methods, systems, and computer readable media for media session policy compliance auditing and enforcement using a media relay and session initiation protocol (SIP) signaling | |||
3023 | 8893230 | System and method for proxying federated authentication protocols | |||
3024 | 8893227 | System and method for providing privacy in smart meter deployment | |||
3025 | 8892899 | System and method for enrolling in a biometric system | |||
3026 | 8892895 | Integrated system for electronic tracking and control of documents | |||
3027 | 8892894 | Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content | |||
3028 | 8892893 | Systems and methods for watermarking software and other media | |||
3029 | 8892891 | Method and system for establishing a communications pipe between a personal security device and a remote computer system | |||
3030 | 8892887 | Method and apparatus for mutual authentication | |||
3031 | 8892883 | Render service for remote access to applications | |||
3032 | 8892880 | System and method for obtaining an authorization key to use a product | |||
3033 | 8892873 | Verification of user communication addresses | |||
3034 | 8892865 | Multiple authority key derivation | |||
3035 | 8892697 | System and digital token for personal identity verification | |||
3036 | 8891772 | Cloud key escrow system | |||
3037 | 8891764 | Quarantine method for sellable virtual goods | |||
3038 | 8890653 | Plant operation apparatus and plant operation training simulator apparatus | |||
3039 | 8890650 | Fluid human-machine interface | |||
3040 | 8887305 | Methods and devices for presenting email addresses | |||
3041 | 8887258 | Apparatus and method of binding a removable module to an access terminal | |||
3042 | 8887246 | Privacy preserving authorisation in pervasive environments | |||
3043 | 8887153 | Digital signature server and user terminal | |||
3044 | 8886950 | Apparatus, methods, and computer program products for facilitating secure password creation and management | |||
3045 | 8886949 | Information processing apparatus and method therefor | |||
3046 | 8886947 | Optimized integrity verification procedures | |||
3047 | 8886945 | System and method for conveying session information for use in forensic watermarking | |||
3048 | 8886944 | Watermark to identify leak source | |||
3049 | 8886942 | Augmented reality based privacy and decryption | |||
3050 | 8886939 | Secure authenticated distance measurement | |||
3051 | 8886937 | PCI DSS compliant proxy service | |||
3052 | 8886935 | Key management device, system and method having a rekey mechanism | |||
3053 | 8886930 | DNS flood protection platform for a network | |||
3054 | 8886718 | Providing personalized platform application content | |||
3055 | 8886711 | File system adapted for use with a dispersed data storage network | |||
3056 | 8885820 | Key expansion using seed values | |||
3057 | 8885818 | Authentication of data streams | |||
3058 | 8881271 | System and method for forensic identification of elements within a computer system | |||
3059 | 8881254 | Method and system for managing virtual objects in a network | |||
3060 | 8881239 | Method and apparatus for securing transactions using verified resource locations | |||
3061 | 8881224 | Method and system for providing masking services | |||
3062 | 8880906 | Storing encrypted contents in digital archives | |||
3063 | 8880895 | Methods, systems, and computer program products for recovering a password using user-selected third party authorization | |||
3064 | 8880894 | Public key infrastructure-based first inserted subscriber identity module subsidy lock | |||
3065 | 8880891 | Method, system and apparatus for establishing communication | |||
3066 | 8880888 | Privacy-enhanced E-passport authentication protocol | |||
3067 | 8880885 | Mutual authentication schemes | |||
3068 | 8880883 | Secure end-to-end permitting system for device operations | |||
3069 | 8880882 | Securely performing programmatic cloud-based data analysis | |||
3070 | 8880877 | Method for assembling authorization certificate chains | |||
3071 | 8880875 | System, apparatus and method for decentralizing attribute-based encryption information | |||
3072 | 8880869 | Secure wireless local area network (WLAN) for data and control traffic | |||
3073 | 8880734 | Block floating point compression with exponent token codes | |||
3074 | 8879725 | Combining instructions including an instruction that performs a sequence of transformations to isolate one transformation | |||
3075 | 8875310 | System and method of protecting digital media contents | |||
3076 | 8875259 | On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service | |||
3077 | 8875257 | Restricting mature content | |||
3078 | 8875245 | Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium | |||
3079 | 8875237 | Private network access using IPv6 tunneling | |||
3080 | 8875235 | Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems | |||
3081 | 8875234 | Operator provisioning of a trustworthy workspace to a subscriber | |||
3082 | 8875219 | Apparatus and method for controlled sharing of personal information | |||
3083 | 8874924 | Methods and apparatus to identify media | |||
3084 | 8874923 | Policy-based signature authentication system and method | |||
3085 | 8874922 | Systems and methods for multi-layered authentication/verification of trusted platform updates | |||
3086 | 8874921 | System and method for generating keyless digital multi-signatures | |||
3087 | 8874920 | Verifying cryptographic signature from stored primitives of previously received signature | |||
3088 | 8874919 | Apparatus and method of a portable terminal authenticating another portable terminal | |||
3089 | 8874917 | Storage system in which fictitious information is prevented | |||
3090 | 8874914 | Secure and automated credential information transfer mechanism | |||
3091 | 8874913 | Secure communications between devices using a trusted server | |||
3092 | 8874912 | Systems and methods for securely transferring personal identifiers | |||
3093 | 8874911 | Terminal device, system, connection management server, and computer readable medium | |||
3094 | 8874910 | Method for implementing encryption and device thereof | |||
3095 | 8874900 | Direct anonymous attestation scheme with outsourcing capability | |||
3096 | 8874794 | Block floating point compression with exponent difference and mantissa coding | |||
3097 | 8874769 | Facilitating group access control to data objects in peer-to-peer overlay networks | |||
3098 | 8874768 | Methods for providing security over untrusted networks | |||
3099 | 8873754 | Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system | |||
3100 | 8870067 | Identification device having electronic key stored in a memory | |||
3101 | 8869307 | Mobile posture-based policy, remediation and access control for enterprise resources | |||
3102 | 8869276 | Method and apparatus for whole-network anomaly diagnosis and method to detect and classify network anomalies using traffic feature distributions | |||
3103 | 8869252 | Methods, apparatuses, and computer program products for bootstrapping device and user authentication | |||
3104 | 8869251 | Remote provision of consistent one-time password functionality for disparate on-line resources | |||
3105 | 8868933 | Persistent servicing agent | |||
3106 | 8868924 | System and method for modifying a software distribution package | |||
3107 | 8868920 | Method, system and device for securing a digital storage device | |||
3108 | 8868915 | Secure authentication for client application access to protected resources | |||
3109 | 8868914 | System and methods for distributing trusted time | |||
3110 | 8868911 | Method for key generation, member authentication, and communication security in dynamic group | |||
3111 | 8868904 | Information processing device, disc, information processing method, and program | |||
3112 | 8868903 | Digital arbitration | |||
3113 | 8867064 | Image forming apparatus having human-body communication function and method for authentication in image forming apparatus | |||
3114 | 8863306 | Device and method for digital rights management | |||
3115 | 8863265 | Remote sign-out of web based service sessions | |||
3116 | 8863262 | Systems and methods to provide information and services to authorized users | |||
3117 | 8863258 | Security for future log-on location | |||
3118 | 8863249 | Push button configuration of multimedia over coax alliance (MoCA) devices | |||
3119 | 8863248 | Method and apparatus to auto-login to a browser application launched from an authenticated client application | |||
3120 | 8863244 | Communication abuse prevention | |||
3121 | 8863237 | Remote-session-to-go method and apparatus | |||
3122 | 8862888 | Systems and methods for three-factor authentication | |||
3123 | 8862886 | Methods, apparatus and computer programs for generating and/or using conditional electronic signatures for reporting status changes | |||
3124 | 8862884 | Method of generation of a secret key for a wireless communication system | |||
3125 | 8862883 | System and method for secure cloud service delivery with prioritized services in a network environment | |||
3126 | 8862882 | Systems and methods for authenticating devices by adding secure features to Wi-Fi tags | |||
3127 | 8862880 | Two-stage anonymization of mobile network subscriber personal information | |||
3128 | 8862879 | Method and apparatus for efficient and secure creating, transferring, and revealing of messages over a network | |||
3129 | 8862878 | Authentication and authorization of a device by a service using broadcast encryption | |||
3130 | 8862877 | Data anonymity system | |||
3131 | 8862870 | Systems and methods for multi-level tagging of encrypted items for additional security and efficient encrypted item determination | |||
3132 | 8862753 | Distributing overlay network ingress information | |||
3133 | 8862745 | Automatic network domain diagnostic repair and mapping | |||
3134 | 8862718 | System, method and apparatus for troubleshooting an IP network | |||
3135 | 8861737 | Trust establishment from forward link only to non-forward link only devices | |||
3136 | 8856900 | Method for authorising a connection between a computer terminal and a source server | |||
3137 | 8856894 | Always on authentication | |||
3138 | 8856873 | Method, apparatus, and system for sending credentials securely | |||
3139 | 8856539 | Universal secure registry | |||
3140 | 8856538 | Secured flash programming of secondary processor | |||
3141 | 8856537 | Method for protecting a telecommunication network and secure router implementing such a method | |||
3142 | 8856534 | Method and apparatus for secure scan of data storage device from remote server | |||
3143 | 8856533 | Device, system and method for determining authenticity of an item | |||
3144 | 8856532 | Digital signatures of composite resource documents | |||
3145 | 8856530 | Data storage incorporating cryptographically enhanced data protection | |||
3146 | 8856529 | Systems and methods for providing security to different functions | |||
3147 | 8856527 | Graphical user interface for digital certificate profile configuration | |||
3148 | 8856525 | Authentication of email servers and personal computers | |||
3149 | 8856517 | Access management system using trusted partner tokens | |||
3150 | 8856515 | Implementation of robust and secure content protection in a system-on-a-chip apparatus | |||
3151 | 8856513 | Programming on-chip non-volatile memory in a secure processor using a sequence number | |||
3152 | 8856510 | Method for joining user domain and method for exchanging information in user domain | |||
3153 | 8855604 | Roaming authentication method for a GSM system | |||
3154 | 8855310 | System and method for exchanging encryption keys between a mobile device and a peripheral device | |||
3155 | 8855305 | Methods and apparatus for protecting digital content | |||
3156 | 8850561 | Associating operating system native authorizations with console roles | |||
3157 | 8850553 | Service binding | |||
3158 | 8850528 | Organizing permission associated with a cloud customer in a virtual computing infrastructure | |||
3159 | 8850527 | Method of performing a secure application in an NFC device | |||
3160 | 8850525 | Access control center auto configuration | |||
3161 | 8850520 | Dual cookie security system with interlocking validation requirements and remedial actions to protect personal data | |||
3162 | 8850218 | OTP generation using a camouflaged key | |||
3163 | 8850214 | Methods and systems for encoding and protecting data using digital signature and watermarking techniques | |||
3164 | 8850210 | Authentication system, authentication device, terminal, and verifying device | |||
3165 | 8850208 | Certificate crosschecking by multiple certificate authorities | |||
3166 | 8850205 | Key distribution method and authentication server | |||
3167 | 8850204 | Multi-band/multi-link secure key generation and delivery protocol | |||
3168 | 8850203 | Secure key management in multimedia communication system | |||
3169 | 8850202 | Method and system for authenticating peer devices using EAP | |||
3170 | 8850201 | System, apparatus, and method for digital distribution | |||
3171 | 8850199 | Hashing prefix-free values in a signature scheme | |||
3172 | 8850198 | Method for validating a road traffic control transaction | |||
3173 | 8850197 | Optical network terminal management control interface-based passive optical network security enhancement | |||
3174 | 8850196 | Methods for authentication using near-field | |||
3175 | 8850186 | Change in identification information causing request for new certificate issuance | |||
3176 | 8848907 | Computer program product and method for processing information to obtain an HMAC | |||
3177 | 8844007 | Systems and methods for processing and transmitting sensor data | |||
3178 | 8844005 | Authentication based on user behavior | |||
3179 | 8843995 | Generic access network (GAN) controller selection in PLMN environment | |||
3180 | 8843915 | Signature-based update management | |||
3181 | 8843769 | Microcontroller with embedded secure feature | |||
3182 | 8843755 | User authentication | |||
3183 | 8843752 | Multi-factor device authentication | |||
3184 | 8843750 | Monitoring content transmitted through secured communication channels | |||
3185 | 8843746 | Method and arrangement for sending and receiving confidential electronic messages in a legally binding manner | |||
3186 | 8843745 | Methods of authorizing a computer license | |||
3187 | 8843744 | Method and devices for distributing media contents and related computer program product | |||
3188 | 8843741 | System and method for providing a certificate for network access | |||
3189 | 8843740 | Derived certificate based on changing identity | |||
3190 | 8843534 | Virtual session on a removable memory | |||
3191 | 8842838 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
3192 | 8839457 | Image storage in electronic documents | |||
3193 | 8839408 | Integration of cloud management systems with on-premise systems | |||
3194 | 8839385 | Systems and methods for implementing device-specific passwords | |||
3195 | 8839363 | Trusted hardware for attesting to authenticity in a cloud environment | |||
3196 | 8839361 | Access control system and method with GPS location validation | |||
3197 | 8839360 | Scope-limited action-specific authorization token | |||
3198 | 8839356 | Methods and apparatuses for processing wake events of communication networks | |||
3199 | 8839354 | Mobile enterprise server and client device interaction | |||
3200 | 8839346 | Systems and methods for providing a smart group | |||
3201 | 8838984 | Optimized hierarchical integrity protection for stored data | |||
3202 | 8838982 | Systems and methods to secure user identification | |||
3203 | 8838981 | Communication channel access based on channel identifier and use policy | |||
3204 | 8838978 | Content access management using extracted watermark information | |||
3205 | 8838977 | Watermark extraction and content screening in a networked environment | |||
3206 | 8838976 | Web content access using a client device identifier | |||
3207 | 8838972 | Exchange of key material | |||
3208 | 8838971 | Management of public keys for verification of public warning messages | |||
3209 | 8838970 | Identity verification for online education | |||
3210 | 8838968 | System and method for virtual machine data protection in a public cloud | |||
3211 | 8838967 | Uniquely identifying a mobile electronic device | |||
3212 | 8838964 | Package audit tool | |||
3213 | 8838954 | Media processing devices for adaptive delivery of on-demand media, and methods thereof | |||
3214 | 8837725 | Communication system and communication method | |||
3215 | 8837723 | Method and apparatus for use in a downloadable conditional access system | |||
3216 | 8836817 | Data processing apparatus, imaging apparatus, and medium storing data processing program | |||
3217 | 8832820 | Isolation and security hardening among workloads in a multi-tenant networked environment | |||
3218 | 8832811 | Network access control for trusted platforms | |||
3219 | 8832794 | Single-point-of-access cyber system | |||
3220 | 8832791 | User authentication apparatus and method thereof | |||
3221 | 8832790 | Fraud detection in adaptive authentication systems | |||
3222 | 8832464 | Processor and method for implementing instruction support for hash algorithms | |||
3223 | 8832451 | Packet source authentication method using single-buffered hash in multicast environment and apparatus for the same | |||
3224 | 8832450 | Methods and apparatus for data hashing based on non-linear operations | |||
3225 | 8832447 | System and method for using digital signatures to assign permissions | |||
3226 | 8832446 | Secure data transfer in an automation network | |||
3227 | 8832443 | Methods and systems for increasing the security of private keys | |||
3228 | 8832442 | Method and device for securely distributing data in group communication | |||
3229 | 8832440 | Data security system | |||
3230 | 8832435 | Providing a real-time indication of platform trust | |||
3231 | 8832430 | Remote certificate management | |||
3232 | 8832180 | Function module dispatcher | |||
3233 | 8831224 | Method and apparatus for secure pairing of mobile devices with vehicles using telematics system | |||
3234 | 8827163 | Anti-fake identification system and method capable of automatically connecting to web address | |||
3235 | 8826419 | Computer device with anti-tamper resource security | |||
3236 | 8826410 | Device API for securely monitoring and managing mobile broadband devices | |||
3237 | 8826397 | Secure remote authentication through an untrusted network | |||
3238 | 8826392 | Device and method for authenticating biological information | |||
3239 | 8826389 | Multi-media identity management system | |||
3240 | 8826373 | Methods and systems for sharing digital assets | |||
3241 | 8826368 | Platform authentication method suitable for trusted network connect architecture based on tri-element peer authentication | |||
3242 | 8826269 | Annotating virtual application processes | |||
3243 | 8826027 | Method for producing acknowledged transaction data and corresponding device | |||
3244 | 8826026 | Systems and methods for tracking electronic files in computer networks using electronic signatures | |||
3245 | 8826022 | Methods and systems for creating monetary accounts for members in a social network | |||
3246 | 8826019 | Centralized authentication system with safe private data storage and method | |||
3247 | 8826017 | Optimizing web landing page link access times through preliminary functions during page deployment | |||
3248 | 8826016 | Apparatuses and a method for protecting a bootstrap message in a network | |||
3249 | 8826015 | Portable system and method for remotely accessing data | |||
3250 | 8826014 | Authentication of remote host via closed ports | |||
3251 | 8826009 | Method of handling a certification request | |||
3252 | 8826008 | Method and device for secure notification of identity | |||
3253 | 8825996 | Platform that facilitates preservation of user privacy | |||
3254 | 8825928 | Facilitating and authenticating transactions through the use of a dongle interfacing a security card and a data processing apparatus | |||
3255 | 8825688 | Method for searching for an entity using a verifier device, and related devices | |||
3256 | 8824859 | Adding watermarks to video content | |||
3257 | 8819819 | Method and system for automatically obtaining webpage content in the presence of javascript | |||
3258 | 8819802 | User authentication | |||
3259 | 8819790 | Cooperation method and system between send mechanism and IPSec protocol in IPV6 environment | |||
3260 | 8819780 | Information processing system, information processing apparatus, and information processing method | |||
3261 | 8819775 | Secure method of accessing an information system of an aircraft | |||
3262 | 8819441 | Long-term signature server, long-term signature terminal, and long-term signature verification server | |||
3263 | 8819440 | Directed signature workflow | |||
3264 | 8819438 | Method and device for issuing a digital residence certificate | |||
3265 | 8819434 | Method and processing unit for secure processing of access controlled audio/video data | |||
3266 | 8819433 | Message storage and retrieval | |||
3267 | 8819432 | Method for authentication and signature of a user in an application service, using a mobile telephone as a second factor in addition to and independently of a first factor | |||
3268 | 8819431 | Methods and device for electronic entities for the exchange and use of rights | |||
3269 | 8819430 | Communication device, communicaton system, communication method, and program | |||
3270 | 8819429 | Near field registration of home system audio-video device | |||
3271 | 8819427 | Device specific secure licensing | |||
3272 | 8819426 | Methods and apparatus for protecting digital content | |||
3273 | 8819424 | Token-based authentication using middle tier | |||
3274 | 8819423 | Optical transceiver with vendor authentication | |||
3275 | 8819422 | System and methods for access control based on a user identity | |||
3276 | 8819418 | Communication system, vehicle-mounted terminal, roadside device | |||
3277 | 8819415 | Method and device for authenticating personal network entity | |||
3278 | 8819414 | Threat mitigation in a vehicle-to-vehicle communication network | |||
3279 | 8819410 | Private electronic information exchange | |||
3280 | 8817990 | Kerberized handover keying improvements | |||
3281 | 8817988 | Variable epoch scheduler for proactive cryptography systems | |||
3282 | 8813202 | Mechanism to determine source device service tier based on the version of the HDCP key | |||
3283 | 8813197 | Techniques for network process identity enablement | |||
3284 | 8813187 | Affluent social networking website | |||
3285 | 8812858 | Broadcast stenography of data communications | |||
3286 | 8812856 | Methods and systems for state synchronization over a non-reliable network using signature processing | |||
3287 | 8812854 | Firmware verified boot | |||
3288 | 8812852 | Method and system for marking digital content | |||
3289 | 8812849 | System and method for controlling the upload of data already accessible to a server | |||
3290 | 8812843 | Device and authentication method therefor | |||
3291 | 8812841 | Communications hub for use in life critical network | |||
3292 | 8812829 | Information processing apparatus and start-up method | |||
3293 | 8811655 | Circumvention of watermark analysis in a host content | |||
3294 | 8806661 | Method and device for distributing electronic documents | |||
3295 | 8806647 | Behavioral scanning of mobile applications | |||
3296 | 8806646 | Detecting malware in mobile sites | |||
3297 | 8806621 | Computer network security platform | |||
3298 | 8806609 | Security for remote access VPN | |||
3299 | 8806607 | Unauthorized data transfer detection and prevention | |||
3300 | 8806602 | Apparatus and method for performing end-to-end encryption | |||
3301 | 8806599 | Systems and methods for implementing multi-factor authentication | |||
3302 | 8806592 | Method for secure user and transaction authentication and risk management | |||
3303 | 8806591 | Authentication risk evaluation | |||
3304 | 8806573 | Authentication control in low-power lossy networks | |||
3305 | 8806558 | Unique watermarking of content objects according to end user identity | |||
3306 | 8806473 | Managing software distribution for regulatory compliance | |||
3307 | 8806215 | Method and system for robust watermark insertion and extraction for digital set-top boxes | |||
3308 | 8806214 | Communication with non-repudiation and blind signatures | |||
3309 | 8806195 | User interface generation in view of constraints of a certificate profile | |||
3310 | 8806194 | Method for authenticating low performance device | |||
3311 | 8806190 | Method of transmission of encrypted documents from an email application | |||
3312 | 8804729 | IPv4, IPv6, and ARP spoofing protection method | |||
3313 | 8804153 | Method for printing on an imaging device | |||
3314 | 8800055 | Node controller for an endpoint in a cloud computing environment | |||
3315 | 8800019 | Secure streaming container | |||
3316 | 8800017 | Method and apparatus for copy protecting a digital electronic device | |||
3317 | 8800015 | Apparatus and methods for selecting services of mobile network operators | |||
3318 | 8800007 | VPN session migration across clients | |||
3319 | 8799998 | Methods for controlling a traffic of an authentication server | |||
3320 | 8799996 | Logical unit number management device, logical unit number management method, and program therefor | |||
3321 | 8799887 | Information processing apparatus, method for controlling the same, and storage medium | |||
3322 | 8799666 | Secure user authentication using biometric information | |||
3323 | 8799662 | Method and apparatus for validating the integrity of installer files prior to installation | |||
3324 | 8799659 | Advanced multi-channel watermarking system and method | |||
3325 | 8799656 | Methods for anonymous authentication and key agreement | |||
3326 | 8799655 | Mobile offline authentication using one-time passcodes | |||
3327 | 8799654 | Methods and apparatus for authenticating data as originating from a storage and processing device and for securing software and data stored on the storage and processing device | |||
3328 | 8799653 | Storage device and method for storage device state recovery | |||
3329 | 8799652 | Method for activating a network node | |||
3330 | 8799649 | One time passwords with IPsec and IKE version 1 authentication | |||
3331 | 8799641 | Secure proxying using network intermediaries | |||
3332 | 8799634 | Method and system for temporarily reconfiguring system settings of a computing device during execution of a software application | |||
3333 | 8793807 | Controlling access to and manipulation of a data object by different data object users | |||
3334 | 8793780 | Mitigation of application-level distributed denial-of-service attacks | |||
3335 | 8793777 | Verification and authentication systems and methods | |||
3336 | 8793771 | Image-display method, projector, image-display system, projector-control method, image-display program, and projector-control program | |||
3337 | 8793768 | Relationship-based authorization | |||
3338 | 8793495 | Method for authenticating a portable data carrier | |||
3339 | 8793390 | Systems and methods for protocol detection in a proxy | |||
3340 | 8792637 | Downloading of data to secure devices | |||
3341 | 8792416 | Mobile communication system, mobile communication method, distribution server, radio network controller and mobile station | |||
3342 | 8789204 | Method and apparatus for secure cross-site scripting | |||
3343 | 8789200 | Agent apparatus and method for sharing anonymous identifier-based security information among security management domains | |||
3344 | 8789162 | Method and apparatus for making token-based access decisions | |||
3345 | 8789153 | Method for secure user and transaction authentication and risk management | |||
3346 | 8789152 | Method for managing authentication procedures for a user | |||
3347 | 8789151 | Remote device communication platform | |||
3348 | 8789037 | Compatible trust in a computing device | |||
3349 | 8788832 | Virtual subscriber identity module | |||
3350 | 8788830 | Method and apparatus for logging based identification | |||
3351 | 8788829 | System and method for interapplication communications | |||
3352 | 8788828 | Non-transferable anonymous digital receipts | |||
3353 | 8788823 | System and method for filtering network traffic | |||
3354 | 8788820 | Secure network access | |||
3355 | 8788819 | System and method for a cloud-based electronic communication vault | |||
3356 | 8788818 | Information processing apparatus and method, recording medium and program | |||
3357 | 8788809 | Method and apparatus to create a secure web-browsing environment with privilege signing | |||
3358 | 8788806 | General purpose distributed encrypted file system | |||
3359 | 8788427 | Limiting data exposure in authenticated multi-system transactions | |||
3360 | 8787615 | Methods and apparatus for embedding watermarks | |||
3361 | 8787574 | Multicast key negotiation method suitable for group calling system and a system thereof | |||
3362 | 8782768 | Systems and methods for accessing a virtual desktop | |||
3363 | 8782762 | Building data security in a networked computing environment | |||
3364 | 8782757 | Session sharing in secure web service conversations | |||
3365 | 8782745 | Detection of unauthorized wireless access points | |||
3366 | 8782435 | System and method for validating program execution at run-time using control flow signatures | |||
3367 | 8782423 | Network based management of protected data sets | |||
3368 | 8782421 | System and method for verification of personal identity | |||
3369 | 8782420 | System and method for obfuscation initiation values of a cryptography protocol | |||
3370 | 8782419 | Device and method for a backup of rights objects | |||
3371 | 8782409 | Confidential message exchange using benign, context-aware cover message generation | |||
3372 | 8782408 | Method and system for securing communication | |||
3373 | 8782406 | Secure digital communications | |||
3374 | 8782405 | Providing transaction-level security | |||
3375 | 8782402 | System and method for secure communications | |||
3376 | 8782397 | Compact attribute for cryptographically protected messages | |||
3377 | 8782391 | Service activation using algorithmically defined key | |||
3378 | 8781128 | Method and device for automatically distributing updated key material | |||
3379 | 8781126 | Method, apparatus and computer program product for providing security during handover between a packet-switched network and a circuit-switched network | |||
3380 | 8776199 | Authentication of a server by a client to prevent fraudulent user interfaces | |||
3381 | 8776186 | Obtaining a signed certificate for a dispersed storage network | |||
3382 | 8776103 | Interactive service device metering systems | |||
3383 | 8776043 | Service image notifications | |||
3384 | 8776031 | Manipulating resources embedded in a dynamic-link library | |||
3385 | 8775814 | Personalized biometric identification and non-repudiation system | |||
3386 | 8775813 | ElGamal signature schemes | |||
3387 | 8775811 | Simple non-autonomous peering environment, watermarking and authentication | |||
3388 | 8775810 | Self-validating authentication token | |||
3389 | 8775808 | System and method for performing a management operation | |||
3390 | 8775805 | System and method for variable length encryption | |||
3391 | 8775801 | Radio communication apparatus and radio communication method | |||
3392 | 8775796 | Certificate authenticating method, certificate issuing device, and authentication device | |||
3393 | 8775794 | System and method for end to end encryption | |||
3394 | 8775316 | Wagering game with encryption and authentication | |||
3395 | 8774409 | Method of handover | |||
3396 | 8769704 | Method and system for managing and monitoring of a multi-tenant system | |||
3397 | 8769686 | System and method for securing wireless transmissions | |||
3398 | 8769655 | Shared registration multi-factor authentication tokens | |||
3399 | 8769654 | Counterfeit prevention strategy for pluggable modules | |||
3400 | 8769646 | System and method for associating a universal user identification and a domain specific user identification | |||
3401 | 8769618 | Method and apparatus for secure authorization | |||
3402 | 8769610 | Distance-modified security and content sharing | |||
3403 | 8769308 | Home (e)Node-B with new functionality | |||
3404 | 8769294 | Digital signatures | |||
3405 | 8769289 | Authentication of a user accessing a protected resource using multi-channel protocol | |||
3406 | 8769288 | Discovery of security associations | |||
3407 | 8769287 | Method, system, and device for obtaining keys | |||
3408 | 8769286 | Methods and systems for increasing the security of electronic messages | |||
3409 | 8769284 | Securing communication | |||
3410 | 8769282 | Localized network authentication and security using tamper-resistant keys | |||
3411 | 8769280 | Authentication apparatus and method for non-real-time IPTV system | |||
3412 | 8769279 | System and method for variable length encryption | |||
3413 | 8769278 | Apparatus and method for efficiently and securely exchanging connection data | |||
3414 | 8769276 | Method and system for transmitting and receiving user's personal information using agent | |||
3415 | 8769275 | Batch settlement transactions system and method | |||
3416 | 8769267 | Geothentication based on new network packet structure | |||
3417 | 8769266 | Method for assembling authorization certificate chains | |||
3418 | 8769262 | VPN connection system and VPN connection method | |||
3419 | 8769261 | Subscriber-specific enforcement of proxy-mobile-IP (PMIP) instead of client-mobile-IP (CMIP) | |||
3420 | 8766800 | Authenticity verification methods, products, and apparatuses | |||
3421 | 8763139 | Origin and custody of copies from a stored electronic record verified page by page | |||
3422 | 8763101 | Multi-factor authentication using a unique identification header (UIDH) | |||
3423 | 8763088 | Distributed authentication, authorization and accounting | |||
3424 | 8763079 | Accessory authentication for electronic devices | |||
3425 | 8763026 | Flexible interface for secure input of pin code | |||
3426 | 8762985 | User terminal device and service providing method thereof | |||
3427 | 8762730 | System and method to establish and/or manage a trusted relationship between a host to storage array controller and/or a storage array to storage array controller | |||
3428 | 8762729 | Group signature system and method providing controllable linkability | |||
3429 | 8762726 | System and method for secure access | |||
3430 | 8762720 | Method of mutual authentication between a communication interface and a host processor of an NFC chipset | |||
3431 | 8762719 | Method and system for command authentication to achieve a secure interface | |||
3432 | 8762717 | Authentication device | |||
3433 | 8762716 | Image forming apparatus | |||
3434 | 8762715 | Event triggered pairing of wireless communication devices based on time measurements | |||
3435 | 8762714 | Protecting against counterfeit electronics devices | |||
3436 | 8762709 | Cloud computing method and system | |||
3437 | 8761744 | Mobile virtual communication invitations | |||
3438 | 8761401 | System and method for secure key distribution to manufactured products | |||
3439 | 8756700 | Custom data image building | |||
3440 | 8756667 | Management of hardware passwords | |||
3441 | 8756665 | Authenticating a rich client from within an existing browser session | |||
3442 | 8756655 | Integrated physical access control and information technology (IT) security | |||
3443 | 8756430 | Exploiting application characteristics for multiple-authenticator broadcast authentication schemes | |||
3444 | 8756428 | Authentication method for an electronic document and verification method of a document thus authenticated | |||
3445 | 8756424 | Load balancing hash computation for network switches | |||
3446 | 8756423 | System and method for establishing a secure group of entities in a computer network | |||
3447 | 8756422 | System and method for secure and/or interactive dissemination of information | |||
3448 | 8756418 | System and method for automatically detecting and then self-repairing corrupt, modified or non-existent files via a communication medium | |||
3449 | 8756416 | Checking revocation status of a biometric reference template | |||
3450 | 8756413 | Method and device for ensuring information integrity and non-repudiation over time | |||
3451 | 8755525 | Quantum key distribution involving moveable key device | |||
3452 | 8754744 | Integrated real estate showing scheduling and key dispensing system | |||
3453 | 8752208 | Detecting web browser based attacks using browser digest compute tests launched from a remote source | |||
3454 | 8752200 | Devices, systems and methods for security using magnetic field based identification | |||
3455 | 8752170 | Verification and validation of externally maintained profile attributes | |||
3456 | 8752153 | Accessing data based on authenticated user, provider and system | |||
3457 | 8752148 | Processorless token for producing a one-time password | |||
3458 | 8751815 | Creating and verifying globally unique device-specific identifiers | |||
3459 | 8751813 | Cross validation of data using multiple subsystems | |||
3460 | 8751812 | Electronic signature authentication | |||
3461 | 8751810 | Establishing shared information in a network | |||
3462 | 8751809 | Method and device for securely sharing images across untrusted channels | |||
3463 | 8751807 | Method and system for secure over-the-top live video delivery | |||
3464 | 8751805 | Service providing client, wireless terminal and method for implementing binding | |||
3465 | 8751803 | Auto provisioning method in wireless communication network | |||
3466 | 8751802 | Storage device and method and for storage device state recovery | |||
3467 | 8751801 | System and method for authenticating users using two or more factors | |||
3468 | 8751794 | System and method for secure nework login | |||
3469 | 8751791 | Method and device for confirming authenticity of a public key infrastructure (PKI) transaction event | |||
3470 | 8751781 | System and method for supporting secure subsystems in a client hosted virtualization system | |||
3471 | 8750630 | Hierarchical and index based watermarks represented as trees | |||
3472 | 8749386 | System and method for article authentication using signatures | |||
3473 | 8746553 | Payment device updates using an authentication process | |||
3474 | 8746363 | System for conducting remote biometric operations | |||
3475 | 8745715 | Password-based authentication system and method in group network | |||
3476 | 8745704 | Powerline communication device supporting secure data exchange | |||
3477 | 8745694 | Adjusting the position of an endpoint reference for increasing security during device log-on | |||
3478 | 8745585 | Meta-data for single development test environment | |||
3479 | 8745415 | Multi-drive cooperation to generate an encryption key | |||
3480 | 8745405 | Dynamic seed and key generation from biometric indicia | |||
3481 | 8745404 | Pre-processed information embedding system | |||
3482 | 8745403 | Enhanced content management based on watermark extraction records | |||
3483 | 8745401 | Authorizing actions performed by an online service provider | |||
3484 | 8745400 | Method for authenticating key information between terminals of a communication link | |||
3485 | 8745396 | Method for implementing the real time data service and real time data service system | |||
3486 | 8745395 | Enabling use of a certificate stored in a smart card | |||
3487 | 8745394 | Methods and systems for secure electronic communication | |||
3488 | 8745393 | Transmitting apparatus, communicating system | |||
3489 | 8745392 | Two-way authentication between two communication endpoints using a one-way out-of band (OOB) channel | |||
3490 | 8745390 | Mutual authentication and key exchange for inter-application communication | |||
3491 | 8745389 | Avoiding padding oracle attacks | |||
3492 | 8745388 | Systems and methods for securely streaming media content | |||
3493 | 8745277 | Command portal for securely communicating and executing non-standard storage subsystem commands | |||
3494 | 8745146 | Control and management of electronic messaging | |||
3495 | 8744079 | Secure communication system | |||
3496 | 8744074 | Method and device for countering fault attacks | |||
3497 | 8743903 | Hybrid networking simple-connect setup using forwarding device | |||
3498 | 8739294 | Reporting information about users who obtain copyrighted media using a network in an unauthorized manner | |||
3499 | 8739271 | Network information collection and access control system | |||
3500 | 8738933 | Archive system, management apparatus, and control method | |||
3501 | 8738924 | Electronic system and digital right management methods thereof | |||
3502 | 8738923 | Framework for notifying a directory service of authentication events processed outside the directory service | |||
3503 | 8738921 | System and method for authenticating a person's identity using a trusted entity | |||
3504 | 8738919 | Control of the integrity of a memory external to a microprocessor | |||
3505 | 8738918 | Document evidence and article retrieval and identification system | |||
3506 | 8738917 | Image data verification | |||
3507 | 8738911 | Secure socket layer keystore and truststore generation | |||
3508 | 8738910 | Method and arrangement for enabling play-out of media | |||
3509 | 8738909 | Forwarding E-mail from a wireless device | |||
3510 | 8738908 | System and method for web-based security authentication | |||
3511 | 8738159 | System and method for accessing PLC data on demand | |||
3512 | 8737964 | Facilitating and authenticating transactions | |||
3513 | 8737623 | Systems and methods for remotely loading encryption keys in a card reader systems | |||
3514 | 8737621 | Enabling users to select between secure service providers using a central trusted service manager | |||
3515 | 8737617 | Encryption apparatus, decryption apparatus, encryption method, decryption method, and encryption/decryption system | |||
3516 | 8732859 | Apparatus and method for monitoring network equipment | |||
3517 | 8732848 | File-distribution apparatus and recording medium having file-distribution authorization program recorded therein | |||
3518 | 8732808 | Data plan activation and modification | |||
3519 | 8732805 | Re-authentication in secure web service conversations | |||
3520 | 8732803 | Automated entity verification | |||
3521 | 8732796 | Addressing security in asymmetrical networks | |||
3522 | 8732473 | Claim based content reputation service | |||
3523 | 8732470 | Storage system in which fictitious information is prevented | |||
3524 | 8732469 | Communication cutoff device, server device and method | |||
3525 | 8732466 | Semiconductor memory device | |||
3526 | 8732465 | Method and apparatus for source identification for key handling following a handover failure | |||
3527 | 8732464 | Bidirectional entity authentication method with introduction of online third party | |||
3528 | 8732462 | Methods and apparatus for secure data sharing | |||
3529 | 8732461 | Client apparatus, server apparatus, and program using entity authentication and biometric authentication | |||
3530 | 8732460 | System and method for providing a one-time key for identification | |||
3531 | 8732292 | Network system | |||
3532 | 8731236 | System and method for content protection in a content delivery network | |||
3533 | 8731203 | Securing a secret of a user | |||
3534 | 8731194 | Method of establishing security association in inter-rat handover | |||
3535 | 8730004 | Method and system for permitting remote check-in and coordinating access control | |||
3536 | 8726407 | Authentication of computing and communications hardware | |||
3537 | 8726382 | Methods and systems for automated detection and tracking of network attacks | |||
3538 | 8726369 | Trusted path, authentication and data security | |||
3539 | 8726360 | Telecommunication method, computer program product and computer system | |||
3540 | 8726356 | Authentication apparatus, authentication method, and authentication program implementing the method | |||
3541 | 8726355 | Identity verification via selection of sensible output from recorded digital data | |||
3542 | 8726351 | Systems and methods for controlling access to electronic records in an archives system | |||
3543 | 8726033 | Context sensitive dynamic authentication in a cryptographic system | |||
3544 | 8726032 | System and method for protecting secrets file | |||
3545 | 8726024 | Authentication method | |||
3546 | 8726023 | Authentication using GAA functionality for unidirectional network connections | |||
3547 | 8726021 | Scalable RFID systems: a privacy-preserving protocol with constant-time identification | |||
3548 | 8726020 | Updating configuration information to a perimeter network | |||
3549 | 8726014 | System and method for securely updating license files in an automated licensing system | |||
3550 | 8725995 | Systems and methods for updating system-level services within read-only system images | |||
3551 | 8725536 | Establishing a patient-provider consent relationship for data sharing | |||
3552 | 8724806 | Partial multiple encryption | |||
3553 | 8724803 | Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system | |||
3554 | 8724135 | Printing device and method of controlling the same | |||
3555 | 8719950 | Access control apparatus and storage medium | |||
3556 | 8719920 | Arrangements for identifying users in a multi-touch surface environment | |||
3557 | 8719912 | Enabling private data feed | |||
3558 | 8719580 | Data verification method | |||
3559 | 8719579 | Handling receipts in cross component message processing | |||
3560 | 8719575 | Method of secure broadcasting of digital data to an authorized third party | |||
3561 | 8719574 | Certificate generation using virtual attributes | |||
3562 | 8719568 | Secure delivery of sensitive information from a non-communicative actor | |||
3563 | 8713704 | Behavioral fingerprint based authentication | |||
3564 | 8713700 | Access control method, information display device using the same, and information display system | |||
3565 | 8713681 | System and method for detecting executable machine instructions in a data stream | |||
3566 | 8713648 | Information processing apparatus capable of authentication processing with improved user convenience, control program for information processing apparatus, and recording medium having control program for information processing apparatus recorded thereon | |||
3567 | 8713644 | System and method for providing security in browser-based access to smart cards | |||
3568 | 8713633 | Security access protection for user data stored in a cloud computing facility | |||
3569 | 8713329 | Authenticated secret sharing | |||
3570 | 8713328 | Code conversion apparatus, code conversion method, and computer product | |||
3571 | 8713326 | Software self-checking systems and methods | |||
3572 | 8713323 | Codeword-enhanced peer-to-peer authentication | |||
3573 | 8713321 | Method and apparatus for verifiable generation of public keys | |||
3574 | 8713320 | Security authentication method, apparatus, and system | |||
3575 | 8713315 | Content distribution system, mobile communication terminal device, and computer readable medium | |||
3576 | 8713314 | Reoccuring keying system | |||
3577 | 8713313 | Terminal device, system and computer readable medium | |||
3578 | 8713303 | Method and system for establishing security connection between switch equipments | |||
3579 | 8712036 | System for encrypting and decrypting a plaintext message with authentication | |||
3580 | 8707446 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
3581 | 8707423 | Programmable display device, and control system | |||
3582 | 8707418 | System and methods for web-application communication | |||
3583 | 8707415 | Method for storing data, computer program product, ID token and computer system | |||
3584 | 8707404 | System and method for transparently authenticating a user to a digital rights management entity | |||
3585 | 8707054 | Establishing a secure memory path in a unitary memory architecture | |||
3586 | 8707052 | Cryptographic device with resistance to differential power analysis and other external monitoring attacks | |||
3587 | 8707043 | Split termination of secure communication sessions with mutual certificate-based authentication | |||
3588 | 8707041 | Protecting a BSF entity from attack | |||
3589 | 8707038 | Method for the encrypted data exchange and communication system | |||
3590 | 8707037 | Cryptographic authentication apparatus, systems and methods | |||
3591 | 8707035 | High privacy of file synchronization with sharing functionality | |||
3592 | 8707032 | System and method for securing controllers | |||
3593 | 8707025 | Communication apparatus mediating communication between instruments | |||
3594 | 8701174 | Controlling access to a protected resource using a virtual desktop and ongoing authentication | |||
3595 | 8701173 | System and method for providing silent sign on across distributed applications | |||
3596 | 8700904 | Method for authentication in an automation system | |||
3597 | 8700903 | Streamlined CSR generation, certificate enrollment, and certificate delivery | |||
3598 | 8700902 | Methods and apparatus to certify digital signatures | |||
3599 | 8700900 | Communicating admission decisions and status information to a client | |||
3600 | 8700898 | System and method for multi-layered sensitive data protection in a virtual computing environment | |||
3601 | 8700893 | Key certification in one round trip | |||
3602 | 8700889 | System and method of sharing web page that represents health information | |||
3603 | 8698605 | Determining the validity of a connection between a reader and a transponder | |||
3604 | 8698597 | System and method for associating an electronic device with a remote device having a voice interface | |||
3605 | 8698596 | Apparatus and method for accessing a secured storage space | |||
3606 | 8695080 | Information terminal apparatus, information processing apparatus and information communication system | |||
3607 | 8695074 | Pre-authenticated calling for voice applications | |||
3608 | 8694789 | System and method for generating a non-repudiatable record of a data stream | |||
3609 | 8694788 | Security system | |||
3610 | 8694785 | Broadband certified mail | |||
3611 | 8694784 | Secure client-side key storage for web applications | |||
3612 | 8694783 | Lightweight secure authentication channel | |||
3613 | 8694782 | Wireless authentication using beacon messages | |||
3614 | 8694781 | Techniques for providing hardware security module operability | |||
3615 | 8694779 | Monitoring based on client perspective | |||
3616 | 8694778 | Enrollment of physically unclonable functions | |||
3617 | 8694773 | Method of preventing unauthenticated viewing using unique information of secure micro | |||
3618 | 8694577 | Providing personalized platform application content | |||
3619 | 8689321 | Restricting access to the resources of a terminal | |||
3620 | 8689290 | System and method for securing a credential via user and server verification | |||
3621 | 8689286 | System and method for determining a security encoding to be applied to outgoing messages | |||
3622 | 8689000 | Use of certified secrets in communication | |||
3623 | 8688999 | Methods for identifying audio or video content | |||
3624 | 8688997 | Using digital certificates in document distribution | |||
3625 | 8688996 | Multipad encryption | |||
3626 | 8688994 | Federation among services for supporting virtual-network overlays | |||
3627 | 8688991 | Media player embodiments and secure playlist packaging | |||
3628 | 8688990 | Method for personalizing an authentication token | |||
3629 | 8688989 | Receiver non-repudiation via a secure device | |||
3630 | 8688985 | Data security method and apparatus using a characteristic preserving encryption | |||
3631 | 8688984 | Providing content to a user across multiple devices | |||
3632 | 8688982 | Monitoring based on client perspective | |||
3633 | 8687843 | Method and system for restricting access to sensitive contents of digital images | |||
3634 | 8683606 | Navigation system | |||
3635 | 8683561 | Fixed client identification system for positive identification of client to server | |||
3636 | 8683560 | Techniques for credential generation | |||
3637 | 8683492 | Verifying information stored on a managed network device | |||
3638 | 8683228 | System and method for WORM data storage | |||
3639 | 8683209 | Method and apparatus for pseudonym generation and authentication | |||
3640 | 8683207 | Updating signature algorithms for strong name binding | |||
3641 | 8683205 | Accessing data utilizing entity registration in multiple dispersed storage networks | |||
3642 | 8681994 | Systems and methods for document control using public key encryption | |||
3643 | 8681992 | Monitoring and controlling access to electronic content | |||
3644 | 8681780 | Establishing electronically authenticated internet voice connections | |||
3645 | 8681358 | Process coordinating system, information processing apparatus, and a computer-readable recording medium storing an information processing program | |||
3646 | 8680965 | Electronics antitheft authorizing unit | |||
3647 | 8677476 | Providing remotely defined security data to a local application extension | |||
3648 | 8677470 | System, method, and computer program product for security verification of communications to tenants of an on-demand database service | |||
3649 | 8677465 | Preventing inadvertent lock-out during password entry dialog | |||
3650 | 8677450 | Systems and methods of controlling network access | |||
3651 | 8677141 | Enhanced security and performance of web applications | |||
3652 | 8677139 | Method to provide authentication using a universal identifier | |||
3653 | 8677134 | HTTP signing | |||
3654 | 8677133 | Systems and methods for verifying an electronic documents provenance date | |||
3655 | 8677132 | Document security | |||
3656 | 8677128 | Method and apparatus for efficient and secure creating, transferring, and revealing of messages over a network | |||
3657 | 8677127 | Method and apparatus for secure setup of an encrypted connection between two communication devices | |||
3658 | 8677126 | Method and system for digital rights management of documents | |||
3659 | 8677120 | Communication between key manager and storage subsystem kernal via management console | |||
3660 | 8676995 | System and method for enabling pairing of a companion device with a mate device for performing a companion service | |||
3661 | 8676251 | Dual modem device | |||
3662 | 8675878 | Interoperable keychest for use by service providers | |||
3663 | 8675261 | Security elements and methods of manufacture | |||
3664 | 8671456 | Accessing restricted resources in computer programming | |||
3665 | 8671448 | Method and system for implementing mandatory file access control in native discretionary access control environments | |||
3666 | 8671279 | Incremental secure backup and restore of user settings and data | |||
3667 | 8671277 | Method for secure communication over heterogeneous networks | |||
3668 | 8671273 | Method of performance-aware security of unicast communication in hybrid satellite networks | |||
3669 | 8671030 | Electronic vouchers and a system and method for issuing the same | |||
3670 | 8670563 | System and method for designing secure client-server communication protocols based on certificateless public key infrastructure | |||
3671 | 8667573 | Validating the origin of web content | |||
3672 | 8667562 | Input to locked computing device | |||
3673 | 8667291 | Unauthorized contents detection system | |||
3674 | 8667286 | Host device, semiconductor memory device, and authentication method | |||
3675 | 8667285 | Remote authentication and transaction signatures | |||
3676 | 8667280 | Method and apparatus for applying a partial password in a multi-factor authentication scheme | |||
3677 | 8667278 | Information processing apparatus and data transmission method of information processing apparatus | |||
3678 | 8667275 | Economically secure digital mass media systems | |||
3679 | 8667274 | System and method for WORM data storage | |||
3680 | 8667270 | Securely upgrading or downgrading platform components | |||
3681 | 8666072 | Method and a system for receiving a multimedia signal, a cryptograophic entity for said reception method and system, and a method and a black box for producing said cryptographic entity | |||
3682 | 8666069 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
3683 | 8666065 | Real-time data encryption | |||
3684 | 8666064 | Endecryptor capable of performing parallel processing and encryption/decryption method thereof | |||
3685 | 8661559 | Software control flow watermarking | |||
3686 | 8661539 | Intrusion threat detection | |||
3687 | 8661531 | System and method for secure control of resources of wireless mobile communication devices | |||
3688 | 8661509 | Solicited authentication of a specific user | |||
3689 | 8661258 | Compact security device with transaction risk level approval capability | |||
3690 | 8661257 | Generic bootstrapping architecture usage with Web applications and Web pages | |||
3691 | 8661255 | Digital rights management of streaming contents and services | |||
3692 | 8661252 | Secure network address provisioning | |||
3693 | 8661251 | Method and device for creating a group signature and related method and device for verifying a group signature | |||
3694 | 8661250 | Remote activation of covert service channels | |||
3695 | 8661246 | System and method for protecting certificate applications using a hardened proxy | |||
3696 | 8660295 | Watermarking of digital images using watermark-indicators | |||
3697 | 8660270 | Method and arrangement in a telecommunication system | |||
3698 | 8656485 | Projection display device and method for controlling projection display device | |||
3699 | 8656182 | Security mechanism for developmental operating systems | |||
3700 | 8656178 | Method, system and program product for modifying content usage conditions during content distribution | |||
3701 | 8656176 | Simple visual authentication of documents exchanged in commerce | |||
3702 | 8656168 | Information processing apparatus, recovery apparatus, and disk recovery method | |||
3703 | 8656166 | Storage and authentication of data transactions | |||
3704 | 8656164 | Authentication system | |||
3705 | 8656163 | Method for establishing a secured communication without preliminary information share | |||
3706 | 8656162 | Aeronautical security management over broadband air/ground network | |||
3707 | 8656156 | Method and terminal for authenticating between DRM agents for moving RO | |||
3708 | 8655312 | Wireless access point detection | |||
3709 | 8654974 | Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices | |||
3710 | 8650653 | Trusted graphics rendering for safer browsing on mobile devices | |||
3711 | 8650617 | Method and system for real-time insertion of services during a call session over a communication network | |||
3712 | 8650610 | Systems and methods of controlling network access | |||
3713 | 8650588 | End-to end proof of display | |||
3714 | 8650403 | Crytographic method for anonymous authentication and separate identification of a user | |||
3715 | 8650402 | General data hiding framework using parity for minimal switching | |||
3716 | 8650401 | Network having quantum key distribution | |||
3717 | 8650400 | Data processor, relay transmitter, and data transmission system | |||
3718 | 8650397 | Key distribution to a set of routers | |||
3719 | 8650391 | Systems and methods for securely providing and/or accessing information | |||
3720 | 8650389 | Secure sockets layer protocol handshake mirroring | |||
3721 | 8650221 | Systems and methods to associate invoice data with a corresponding original invoice copy in a stack of invoices | |||
3722 | 8649509 | Systems and computer program products for generating and verifying randomized hash values | |||
3723 | 8646105 | System, method and security device for authorizing use of a software tool | |||
3724 | 8646103 | Method and system for securing online identities | |||
3725 | 8646063 | Methods, apparatus, and computer program products for subscriber authentication and temporary code generation | |||
3726 | 8646037 | Portable identity rating | |||
3727 | 8646022 | Methods and apparatus to configure broadband-enabled entertainment systems | |||
3728 | 8646011 | Certification program for devices operating with an entertainment access system | |||
3729 | 8645703 | Power analysis countermeasure for the ECMQV key agreement algorithm | |||
3730 | 8645702 | Method and apparatus to use identity information for digital signing and encrypting content integrity and authenticity in content oriented networks | |||
3731 | 8645701 | System and method for zone signing and key management in a DNS system | |||
3732 | 8645700 | DNSSEC inline signing | |||
3733 | 8645699 | Use of certificate authority to control a device's access to services | |||
3734 | 8645698 | Method and node for generating distributed Rivest Shamir Adleman signature in ad-hoc network | |||
3735 | 8645697 | Message authorization | |||
3736 | 8645696 | Notifying users of server changes via SSL | |||
3737 | 8645692 | Source-of-leakage detectable E-mail address forming, sending and detection | |||
3738 | 8645689 | Stateless agent | |||
3739 | 8645482 | Network coding with last modified dates for P2P web caching | |||
3740 | 8644503 | Content server systems and methods | |||
3741 | 8640260 | Methods, systems and products for distributing digital content | |||
3742 | 8640256 | File system operation and digital rights management (DRM) | |||
3743 | 8640254 | Process execution apparatus and phone number registration apparatus | |||
3744 | 8640211 | System and methods for universal password control | |||
3745 | 8640210 | Distributed computer systems with time-dependent credentials | |||
3746 | 8640208 | Authentication enforcement at resource level | |||
3747 | 8639940 | Methods and systems for assigning roles on a token | |||
3748 | 8639934 | Radio channel metrics for secure wireless network pairing | |||
3749 | 8639933 | Image reading apparatus, electronic document generation method, and storing medium storing electronic document generation program | |||
3750 | 8639932 | Quantum key distribution | |||
3751 | 8639931 | Acceleration of key agreement protocols | |||
3752 | 8639930 | Automated entity verification | |||
3753 | 8639929 | Method, device and system for authenticating gateway, node and server | |||
3754 | 8639928 | System and method for mounting encrypted data based on availability of a key on a network | |||
3755 | 8639927 | Method of user-authenticated quantum key distribution | |||
3756 | 8639925 | Method for protecting a sensor and data of the sensor from manipulation and a sensor to that end | |||
3757 | 8639062 | Ensuring image integrity using document characteristics | |||
3758 | 8638943 | Communication device, communication method, communication system and service issuing method | |||
3759 | 8638221 | Modular patient communicator for use in life critical network | |||
3760 | 8635688 | Image processing apparatus, image processing method, and recording medium | |||
3761 | 8635681 | Method and system to authorize and assign digital certificates without loss of privacy, and/or to enhance privacy key selection | |||
3762 | 8635677 | Information processing apparatus, screen transmitting method, and non-transitory computer-readable recording medium encoded with screen transmitting program | |||
3763 | 8635660 | Dynamic constraints for query operations | |||
3764 | 8635456 | Remote secure authorization | |||
3765 | 8635455 | Encrypted communication device with restricted rate of encryption key retrievals from memory | |||
3766 | 8635452 | Method for generating a cipher-based message authentication code | |||
3767 | 8635444 | System and method for distributing keys in a wireless network | |||
3768 | 8635443 | Method, device and mobile terminal for challenge handshake authentication protocol authentication | |||
3769 | 8631501 | Reporting function in gaming system environment | |||
3770 | 8631480 | Systems and methods for implementing security services | |||
3771 | 8631238 | Preventing race conditions in secure token exchange | |||
3772 | 8631237 | Simplified login for mobile devices | |||
3773 | 8631227 | Processing encrypted electronic documents | |||
3774 | 8630620 | Method and apparatus for securing location information and access control using the location information | |||
3775 | 8630450 | Client-side watermarking using hybrid I-frames | |||
3776 | 8627507 | System and method for multimedia data validation | |||
3777 | 8627492 | Image processing apparatus, image processing method, and recording medium | |||
3778 | 8627431 | Distributed network name | |||
3779 | 8627421 | Methods and apparatus for authenticating a user based on implicit user memory | |||
3780 | 8627414 | Methods and apparatuses for user-verifiable execution of security-sensitive code | |||
3781 | 8627407 | Systems and methods for preventing unauthorized modification of network resources | |||
3782 | 8627108 | System and method for protecting data on a mobile device | |||
3783 | 8627099 | System, method and computer program product for removing null values during scanning | |||
3784 | 8627092 | Asymmetric cryptography for wireless systems | |||
3785 | 8627091 | Generating a secure signature utilizing a plurality of key shares | |||
3786 | 8627085 | Customizable public key infrastructure and development tool for same | |||
3787 | 8627084 | Secure messaging systems | |||
3788 | 8627083 | Online secure device provisioning with online device binding using whitelists | |||
3789 | 8627080 | Systems and methods for mutual authentication using one time codes | |||
3790 | 8627077 | Transparent authentication process integration | |||
3791 | 8627076 | System and method for facilitating communications based on trusted relationships | |||
3792 | 8627075 | Communication device that receives external device information from an external device using near field communication | |||
3793 | 8627074 | Secure block acknowledgement mechanism for use in communication networks | |||
3794 | 8627071 | Insuring integrity of remote procedure calls used in a client and server storage system | |||
3795 | 8626122 | Un-ciphered network operation solution | |||
3796 | 8625805 | Digital security bubble | |||
3797 | 8625801 | Authentication associated suite discovery and negotiation method | |||
3798 | 8625800 | Portable secure element | |||
3799 | 8625793 | Resynchronization for push message security using secret keys | |||
2013 | |||||
3800 | 8621650 | Verification of content possession by an announcing peer in a peer-to-peer content distribution system | |||
3801 | 8621600 | Non-intrusive background synchronization when authentication is required | |||
3802 | 8621563 | Method and apparatus for providing recommendation channels | |||
3803 | 8621560 | User authentication using personal objects | |||
3804 | 8621553 | Model based security for cloud services | |||
3805 | 8621227 | System and method for cryptographic key exchange using matrices | |||
3806 | 8621226 | Self-signed certificates for computer application signatures | |||
3807 | 8621223 | Data security method and system | |||
3808 | 8621222 | Archiving electronic content having digital signatures | |||
3809 | 8621221 | Method and system for event notification for wireless PDA devices | |||
3810 | 8621218 | Method and apparatus for mutual authentication in downloadable conditional access system | |||
3811 | 8621215 | Methods and systems for creating monetary accounts for members in a social network | |||
3812 | 8621211 | NETCONF/DMI-based secure network device discovery | |||
3813 | 8621209 | Confidence-based authentication | |||
3814 | 8621203 | Method and apparatus for authenticating a mobile device | |||
3815 | 8620269 | Defining a boundary for wireless network using physical access control systems | |||
3816 | 8620020 | Methods and systems for preventing unauthorized disclosure of secure information using image fingerprinting | |||
3817 | 8619986 | Systems and methods for secure communication using a communication encryption bios based upon a message specific identifier | |||
3818 | 8619980 | Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key | |||
3819 | 8615788 | Method and apparatus for scalable integrity attestation in virtualization environments | |||
3820 | 8615658 | Dynamic foreign agent--home agent security association allocation for IP mobility systems | |||
3821 | 8615657 | Source-of-leakage detectable e-mail address forming, sending and detection | |||
3822 | 8615656 | Secure remote peripheral encryption tunnel | |||
3823 | 8615651 | Offline shared security key calculation | |||
3824 | 8615085 | Encrypted communication system with limited number of stored encryption key retrievals | |||
3825 | 8613101 | Software distribution service federation | |||
3826 | 8613098 | Method and system for providing a dynamic image verification system to confirm human input | |||
3827 | 8613097 | Methods and systems for detecting an access attack | |||
3828 | 8613026 | Methods and systems for viewer interactivity and social networking in a mobile TV broadcast network | |||
3829 | 8612772 | Security core using soft key | |||
3830 | 8612765 | Security based on subliminal and supraliminal channels for data objects | |||
3831 | 8612764 | Method for secure transmission using a fax server, system and computer program for implementing this method | |||
3832 | 8612762 | Communications apparatus, communications system, and method of setting certificate | |||
3833 | 8612761 | Method of executing a cryptographic protocol between two electronic entities | |||
3834 | 8612759 | Communication system for communicating data utilizing challenge data | |||
3835 | 8612757 | Method and apparatus for securely providing identification information using translucent identification member | |||
3836 | 8612755 | Security policy in trusted computing systems | |||
3837 | 8612751 | Method and apparatus for entitled data transfer over the public internet | |||
3838 | 8612750 | Creating and using secure communications channels for virtual universes | |||
3839 | 8612747 | System and method for establishing historical usage-based hardware trust | |||
3840 | 8611689 | Three-dimensional wavelet based video fingerprinting | |||
3841 | 8607360 | Data delivery apparatus and data delivery method | |||
3842 | 8607343 | Ticket-based personalization | |||
3843 | 8607331 | Captcha image authentication method and system | |||
3844 | 8607317 | Automatic user authentication and identification for mobile instant messaging application | |||
3845 | 8607065 | Trusted and confidential remote TPM initialization | |||
3846 | 8607057 | Secure outsourced aggregation with one-way chains | |||
3847 | 8607056 | Data processing apparatus and method | |||
3848 | 8607053 | Smart card security feature profile in home subscriber server | |||
3849 | 8607051 | Method and apparatus for binding multiple authentications | |||
3850 | 8607050 | Method and system for activation | |||
3851 | 8607049 | Network access device for a cargo container security network | |||
3852 | 8607047 | Mobile system, service system, and service providing method to securely transmit private information for use in service | |||
3853 | 8607046 | System and method for signing a message to provide one-time approval to a plurality of parties | |||
3854 | 8605906 | Bluetooth.RTM. device and method of connecting Bluetooth.RTM. devices using a Bluetooth.RTM. channel | |||
3855 | 8601606 | Computer recovery or return | |||
3856 | 8601592 | Data management utilizing access and content information | |||
3857 | 8601562 | Policy enforcement using ESSO | |||
3858 | 8601554 | Home realm discovery in mixed-mode federated realms | |||
3859 | 8601541 | Method and apparatus for session validation to access mainframe resources | |||
3860 | 8601540 | Software license management | |||
3861 | 8601539 | Systems and methods for managing user permissions | |||
3862 | 8601283 | Method for versatile content control with partitioning | |||
3863 | 8601276 | Managing access to a secure content-part of a PPCD following introduction of the PPCD into a workflow | |||
3864 | 8601275 | Inter-vehicle communication system | |||
3865 | 8601274 | Inter-vehicle communication system | |||
3866 | 8601273 | Signed manifest for run-time verification of software program identity and integrity | |||
3867 | 8601270 | Method for the preparation of a chip card for electronic signature services | |||
3868 | 8601268 | Methods for securing transactions by applying crytographic methods to assure mutual identity | |||
3869 | 8601267 | Establishing a secured communication session | |||
3870 | 8601265 | Method and system for improving storage security in a cloud computing environment | |||
3871 | 8600103 | Message encoding | |||
3872 | 8600058 | Generation of self-certified identity for efficient access control list management | |||
3873 | 8600054 | Method, apparatus, and system for preventing abuse of authentication vector | |||
3874 | 8595832 | Masking mechanism that facilitates safely executing untrusted native code | |||
3875 | 8595816 | User authentication system and method for the same | |||
3876 | 8595811 | Systems and methods for providing a virtual world commodity device | |||
3877 | 8595799 | Access authorization | |||
3878 | 8595509 | Systems and methods for online identity verification | |||
3879 | 8595505 | Apparatus and method for direct anonymous attestation from bilinear maps | |||
3880 | 8595502 | Data management system | |||
3881 | 8595499 | Method for identifying a patient for later access to an electronic patient record for the patient using a communication device belonging to an inquiring person | |||
3882 | 8595498 | Method for authenticating access to a secured chip by test device | |||
3883 | 8595497 | Electronic file sending method | |||
3884 | 8595495 | System and method for secure communications | |||
3885 | 8595494 | Method for managing access to protected resources in a computer network, physical entities and computer programs therefor | |||
3886 | 8595493 | Multi-phase storage volume transformation | |||
3887 | 8595491 | Combining a mobile device and computer to create a secure personalized environment | |||
3888 | 8595490 | System and method for secure transaction | |||
3889 | 8594332 | Key generating apparatus, encrypting apparatus and decrypting appatatus | |||
3890 | 8594325 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
3891 | 8593252 | Electronic lock box proximity access control | |||
3892 | 8590057 | Encryption and authentication of communications and content payload over existing networks | |||
3893 | 8590035 | Network firewall host application identification and authentication | |||
3894 | 8590026 | Method and system for generating a touch CAPTCHA | |||
3895 | 8590004 | Method and system for dynamic security using authentication server | |||
3896 | 8589693 | Method for two step digital signature | |||
3897 | 8589692 | Method and apparatus for verifying CGA signature | |||
3898 | 8589691 | Self-signed certificates for computer application signatures | |||
3899 | 8589689 | Apparatus and method for over-the-air (OTA) provisioning of authentication and key agreement (AKA) credentials between two access systems | |||
3900 | 8589687 | Architecture for supporting secure communication network setup in a wireless local area network (WLAN) | |||
3901 | 8589684 | Communication devices and methods | |||
3902 | 8589682 | System and method for secure provisioning of an information handling system | |||
3903 | 8589675 | WLAN authentication method by a subscriber identifier sent by a WLAN terminal | |||
3904 | 8589590 | Selecting an address provider using a dynamic indicator | |||
3905 | 8588946 | Portable devices for providing acoustic source information, apparatuses for providing acoustic source information, and methods of providing acoustic source information | |||
3906 | 8588462 | Video watermarking with fast detection | |||
3907 | 8588425 | Encryption key recovery in the event of storage management failure | |||
3908 | 8587837 | Image processing apparatus embedding additional information in document data | |||
3909 | 8587405 | Electronic access control device | |||
3910 | 8584254 | Data access reporting platform for secure active monitoring | |||
3911 | 8584224 | Ticket based strong authentication with web service | |||
3912 | 8584222 | Secure pin reset process | |||
3913 | 8584202 | Apparatus and method for determining environment integrity levels | |||
3914 | 8584201 | Method and apparatus for session validation to access from uncontrolled devices | |||
3915 | 8584118 | Terminal, method and computer program product for validating a software application | |||
3916 | 8583932 | Signature device, signature verification device, anonymous authetication system, signing method, signature authentication method, and programs therefor | |||
3917 | 8583931 | Electronic signing apparatus and methods | |||
3918 | 8583929 | Encryption method for secure packet transmission | |||
3919 | 8583928 | Portable security transaction protocol | |||
3920 | 8583926 | System and method for anti-phishing authentication | |||
3921 | 8583924 | Location-based feature enablement for mobile terminals | |||
3922 | 8583921 | Method and system for identity authentication | |||
3923 | 8583909 | Digital broadcast receiver and booting method of digital broadcast receiver | |||
3924 | 8583317 | In-vehicle device, vehicle authentication system and data communication method | |||
3925 | 8582767 | Cryptographic device sharing among a plurality of communication links | |||
3926 | 8582762 | Method for producing key material for use in communication with network | |||
3927 | 8582761 | Cryptographic method with elliptical curves | |||
3928 | 8582471 | Wireless ad-hoc network configuration method and apparatus | |||
3929 | 8581695 | Channel-switching remote controlled barrier opening system | |||
3930 | 8579705 | Software verification and authentication | |||
3931 | 8578464 | Secure streaming container | |||
3932 | 8578463 | Method of collaborative computing | |||
3933 | 8578461 | Authenticating an auxiliary device from a portable electronic device | |||
3934 | 8578456 | Authentication in an IP multimedia subsystem network where an in-use line identifier (LID) does not match a registered LID | |||
3935 | 8578448 | Identifying guests in web meetings | |||
3936 | 8578444 | Systems and methods of controlling network access | |||
3937 | 8578172 | Information processing device for obtaining an HMAC | |||
3938 | 8578170 | Bundle verification | |||
3939 | 8578168 | Method and apparatus for preparing and verifying documents | |||
3940 | 8578167 | System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information | |||
3941 | 8578165 | Key agreement and transport protocol | |||
3942 | 8578163 | Communication method, mesh network system and communication terminal | |||
3943 | 8578155 | Address generating method and broadcast receiving apparatus | |||
3944 | 8577037 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
3945 | 8577033 | Method for partially encrypting program data | |||
3946 | 8577028 | System and method for performing exponentiation in a cryptographic system | |||
3947 | 8576049 | Document authentication and identification | |||
3948 | 8572707 | Multiple authentication mechanisms for accessing service center supporting a variety of products | |||
3949 | 8572701 | Authenticating via mobile device | |||
3950 | 8572692 | Method and system for a platform-based trust verifying service for multi-party verification | |||
3951 | 8572690 | Apparatus and method for performing session validation to access confidential resources | |||
3952 | 8572689 | Apparatus and method for making access decision using exceptions | |||
3953 | 8572686 | Method and apparatus for object transaction session validation | |||
3954 | 8572685 | Consolidated data services apparatus and method | |||
3955 | 8572684 | Authentication using one-time passwords and associated indicia for plural sequences | |||
3956 | 8572681 | Methods and systems for identity verification | |||
3957 | 8572402 | Method and device for detecting an attempt to substitute an original casing portion of an electronic system with a replacement casing portion | |||
3958 | 8572395 | Information processing apparatus, authentication method, and computer program | |||
3959 | 8572390 | Method for transmitting and receiving data, in particular for secure exchanges between an aircraft and a ground base, related devices and aircraft equipped with such devices | |||
3960 | 8572389 | System and method for protecting master encryption keys | |||
3961 | 8572388 | Electronic document management system | |||
3962 | 8572386 | Secure device, information processing terminal, integrated circuit, terminal application generation apparatus, application authentication method | |||
3963 | 8572385 | System and method for optimal verification of operations on dynamic sets | |||
3964 | 8572382 | Out-of band authentication method and system for communication over a data network | |||
3965 | 8572379 | Private access to hash tables | |||
3966 | 8572376 | Decryption of electronic communication in an electronic discovery enterprise system | |||
3967 | 8572375 | Device pairing based on graphically encoded data | |||
3968 | 8572121 | Blocking of unlicensed audio content in video files on a video hosting website | |||
3969 | 8571257 | Method and system for image registration | |||
3970 | 8570281 | Method and apparatus for multi-touch surface interaction for a financial application within a bank branch | |||
3971 | 8566907 | Multiple user login detection and response system | |||
3972 | 8566598 | Method for article authentication using an article's authentication code and a second code provided by the party requesting authentication | |||
3973 | 8566597 | Digital signature program, digital signature apparatus, and digital signature method | |||
3974 | 8566596 | Pre-association mechanism to provide detailed description of wireless services | |||
3975 | 8566593 | Method and apparatus of deriving security key(s) | |||
3976 | 8566591 | Source-of-leakage detectable E-mail address forming, sending and detection | |||
3977 | 8566588 | Method of authentication and secure exchange of data between a personalised chip and a dedicated server, and assembly for implementing the same | |||
3978 | 8566581 | Secure inter-process communications | |||
3979 | 8566578 | Method and system for ensuring compliance in public clouds using fine-grained data ownership based encryption | |||
3980 | 8565185 | Framework of media-independent pre-authentication support for PANA | |||
3981 | 8561161 | Method and system for authentication in a heterogeneous federated environment | |||
3982 | 8561158 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
3983 | 8561137 | Techniques for identity authentication of virtualized machines | |||
3984 | 8561087 | Methods for enabling software in storage-capable devices | |||
3985 | 8560858 | Secure session identifiers | |||
3986 | 8560856 | Lightweight secure neighbor discovery protocol for low-power and lossy networks | |||
3987 | 8560855 | Verification of dispersed storage network access control information | |||
3988 | 8560854 | Device enabled verifiable stroke and image based workflows | |||
3989 | 8560851 | Managing digital certificates | |||
3990 | 8560850 | Establishment method and device for link between access point and repeater in wireless distribution system | |||
3991 | 8560849 | Method and system for secure communication using hash-based message authentication codes | |||
3992 | 8560848 | Galois/counter mode encryption in a wireless network | |||
3993 | 8560841 | Request authentication token | |||
3994 | 8560840 | Method and system for authenticating a widget | |||
3995 | 8560655 | Methods and apparatus for controlling the transmission and receipt of email messages | |||
3996 | 8555401 | Content provision system | |||
3997 | 8555400 | Privacy-preserving aggregation of Time-series data | |||
3998 | 8555375 | Configuration method for control units | |||
3999 | 8555356 | Network-agnostic content management | |||
4000 | 8555351 | Trusted database authentication through an untrusted intermediary | |||
4001 | 8555344 | Methods and systems for fallback modes of operation within wireless computer networks | |||
4002 | 8555340 | Method and apparatus for determining authentication capabilities | |||
4003 | 8555339 | Identifying guests in web meetings | |||
4004 | 8555077 | Determining device identity using a behavioral fingerprint | |||
4005 | 8555074 | Method and apparatus for processing information, and computer program product | |||
4006 | 8555072 | Attestation of computing platforms | |||
4007 | 8555071 | Method of managing metadata | |||
4008 | 8555070 | External interface access control for medical systems | |||
4009 | 8555066 | Systems and methods for controlling access to encrypted data stored on a mobile device | |||
4010 | 8555064 | Security system and method for wireless communication system | |||
4011 | 8555063 | Method for establishing a wireless link key between a remote device and a group device | |||
4012 | 8555062 | Protocol to prevent replay attacks on secured wireless transactions | |||
4013 | 8555053 | System and method for adjusting to drive specific criteria | |||
4014 | 8555052 | Data hiding based messages and advertisements | |||
4015 | 8553888 | Generation of communication device signatures for use in securing nomadic electronic transactions | |||
4016 | 8553887 | Method for generating dynamic group key | |||
4017 | 8553672 | MAC multiplexing and TFC selection for enhanced uplink | |||
4018 | 8552833 | Security system for managing information on mobile wireless devices | |||
4019 | 8550339 | Utilization of digit sequences for biometric authentication | |||
4020 | 8549659 | Non-volatile memory for anti-cloning and authentication method for the same | |||
4021 | 8549605 | System and method for automatically establishing new session with interactive service after previous session expiration | |||
4022 | 8549602 | System and method for handling permits for user authentication tokens | |||
4023 | 8549600 | Systems, methods and analyzers for establishing a secure wireless network in point of care testing | |||
4024 | 8549599 | Fingerprint authentication server, client computer and fingerprint authentication method | |||
4025 | 8549588 | Systems and methods for obtaining network access | |||
4026 | 8549310 | Method and apparatus for secure measurement certification | |||
4027 | 8549309 | Asymmetric content fingerprinting with adaptive window sizing | |||
4028 | 8549305 | Steganographic method and device | |||
4029 | 8549304 | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state | |||
4030 | 8549302 | Downloadable conditional access system, channel setting method and message structure for 2-way communication between terminal and authentication server in the downloadable conditional access system | |||
4031 | 8549300 | Virtual single sign-on for certificate-protected resources | |||
4032 | 8549298 | Secure online service provider communication | |||
4033 | 8549296 | Simple authentication of messages | |||
4034 | 8549291 | Wireless network apparatus storing authentication information in multiple formats and areas and authentication method of the same | |||
4035 | 8549283 | System and method of transmitting/receiving security data | |||
4036 | 8549198 | Communication protocol | |||
4037 | 8549101 | Portable embedded local server for write-through cache | |||
4038 | 8548172 | Secure dissemination of events in a publish/subscribe network | |||
4039 | 8548166 | Method for partially encrypting program data | |||
4040 | 8548165 | Method of compressing a cryptographic value | |||
4041 | 8548163 | Simultaneous scalar multiplication method | |||
4042 | 8547848 | Traffic control within a network architecture providing many-to-one transmission with denial-of-service protection | |||
4043 | 8547202 | RFID tag and operating method thereof | |||
4044 | 8547201 | Protective-control measuring system and device and data transmission method | |||
4045 | 8544084 | System and method for secure control of resources of wireless mobile communication devices | |||
4046 | 8544066 | Access right management system, access right management method, and access right management program | |||
4047 | 8544061 | Object model for domain-based content mobility | |||
4048 | 8543841 | Secure hosted execution architecture | |||
4049 | 8543828 | Authenticating a user with hash-based PIN generation | |||
4050 | 8543825 | Method and apparatus for input of coded image data | |||
4051 | 8543823 | Digital watermarking for identification documents | |||
4052 | 8543821 | Scalably displaying sensitive data to users with varying authorization levels | |||
4053 | 8543820 | Tag generation apparatus, tag verification apparatus, communication system, tag generation method, tag verification method, and recording medium | |||
4054 | 8543819 | Secure authenticated distance measurement | |||
4055 | 8543816 | Secure, auditable file exchange system and method | |||
4056 | 8543811 | Efficient identity-based ring signature scheme with anonymity and system thereof | |||
4057 | 8542871 | Brand protection and product authentication using portable devices | |||
4058 | 8542836 | System, apparatus and methods for highly scalable continuous roaming within a wireless network | |||
4059 | 8542833 | Systems and methods to secure laptops or portable computing devices | |||
4060 | 8542832 | System and method for the calculation of a polynomial-based hash function and the erindale-plus hashing algorithm | |||
4061 | 8542830 | Method for partially encrypting program data | |||
4062 | 8539603 | System and method for secure communication | |||
4063 | 8539544 | Method of optimizing policy conformance check for a device with a large set of posture attribute combinations | |||
4064 | 8539497 | Method for organizing software so the set of extensions for an extendable application can be run securely | |||
4065 | 8539252 | Method and system for protecting data | |||
4066 | 8539244 | Server, authentication server, content delivery system, and program | |||
4067 | 8539241 | Method and system for securing communication | |||
4068 | 8539240 | Rights object authentication in anchor point-based digital rights management | |||
4069 | 8539237 | Methods and systems for playing media | |||
4070 | 8539235 | Method for operating a network, a system management device, a network and a computer program therefor | |||
4071 | 8539233 | Binding content licenses to portable storage devices | |||
4072 | 8539228 | Managing access to a resource | |||
4073 | 8539226 | Certificate management and transfer system and method | |||
4074 | 8538026 | Key distribution | |||
4075 | 8537385 | Access control apparatus, method, and printing system in a multi-domain environment | |||
4076 | 8533841 | Deriving remediations from security compliance rules | |||
4077 | 8533815 | False reject mitigation using non-biometric authentication | |||
4078 | 8533777 | Mechanism to determine trust of out-of-band management agents | |||
4079 | 8533491 | Data security for digital data storage | |||
4080 | 8533482 | Method for generating a key pair and transmitting a public key or request file of a certificate in security | |||
4081 | 8533479 | Translating information between computing devices having different security management | |||
4082 | 8533476 | System, method and computer readable medium for message authentication to subscribers of an internet service provider | |||
4083 | 8533475 | Method for pairing and authenticating one or more medical devices and one or more remote electronic devices | |||
4084 | 8533474 | Generating session keys | |||
4085 | 8533473 | Method and apparatus for reducing bandwidth usage in secure transactions | |||
4086 | 8533472 | Terminal identification method, authentication method, authentication system, server, terminal, wireless base station, program, and recording medium | |||
4087 | 8533471 | Method and server for providing mobility key | |||
4088 | 8533463 | Reduced computation for generation of certificate revocation information | |||
4089 | 8533455 | Method and apparatus for combining internet protocol authentication and mobility signaling | |||
4090 | 8531414 | Bump suppression | |||
4091 | 8528103 | System for managing display and retrieval of image content on a network with image identification and linking to network content | |||
4092 | 8528095 | Injection context based static analysis of computer software applications | |||
4093 | 8528091 | Methods, systems, and media for detecting covert malware | |||
4094 | 8528067 | Anytime validation for verification tokens | |||
4095 | 8528055 | Processing performance of repeated device compliance update messages | |||
4096 | 8528044 | Information processing apparatus and control method | |||
4097 | 8527771 | Wireless video communication | |||
4098 | 8527770 | System and method for provisioning device certificates | |||
4099 | 8527769 | Secure messaging with read-undeniability and deletion-verifiability | |||
4100 | 8527768 | Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework | |||
4101 | 8527767 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
4102 | 8527765 | Shared secret verification method and system | |||
4103 | 8527764 | Method and system for secure communication | |||
4104 | 8527762 | Method for realizing an authentication center and an authentication system thereof | |||
4105 | 8527761 | System and method for fuse enablement of a secure client hosted virtualization in an information handling system | |||
4106 | 8527760 | Determining trust data for devices in a network | |||
4107 | 8527759 | IMS user equipment, control method thereof, host device, and control method thereof | |||
4108 | 8527756 | Security device and building block functions | |||
4109 | 8527751 | Systems and methods for secure and certified electronic messaging | |||
4110 | 8527599 | System and method for regulating electronic messages | |||
4111 | 8526614 | Method to manage members of at least one group of decoders having access to broadcast data | |||
4112 | 8526608 | Printing system and printer with electronic signature capability and method thereof | |||
4113 | 8522324 | Control of access to a secondary system | |||
4114 | 8522316 | Connector and method for providing access to a data-processing network for a data-processing device | |||
4115 | 8522311 | Authentication techniques | |||
4116 | 8522310 | Psychometric keycard for online applications | |||
4117 | 8522307 | Flexibly assigning security configurations to applications | |||
4118 | 8522201 | Methods and apparatus for sub-asset modification | |||
4119 | 8522046 | Method, apparatus and system for acquiring service by portable device | |||
4120 | 8522039 | Method and apparatus for establishing a federated identity using a personal wireless device | |||
4121 | 8522036 | Method for providing access control to media services | |||
4122 | 8522035 | Assisted certificate enrollment | |||
4123 | 8522034 | Systems and methods for transparent configuration authentication of networked devices | |||
4124 | 8522032 | System and method to prevent audio watermark detection | |||
4125 | 8522031 | Method and apparatus for establishing a trusted and secure relationship between two parties connected to a network | |||
4126 | 8522030 | Verification and protection of genuine software installation using hardware super key | |||
4127 | 8522029 | Secret-key exchange for wireless and sensor networks | |||
4128 | 8522028 | Method for secure data exchange between two devices | |||
4129 | 8522025 | Authenticating an application | |||
4130 | 8522023 | Rural services platform | |||
4131 | 8522021 | Communication channel of a device | |||
4132 | 8522019 | Method and apparatus to create trust domains based on proximity | |||
4133 | 8522018 | Method and system for implementing a mobile trusted platform module | |||
4134 | 8522017 | Systems and methods for signal reduction in wireless communication | |||
4135 | 8522015 | Authentication of binaries in memory with proxy code execution | |||
4136 | 8522014 | Method and system for storing a key in a remote security module | |||
4137 | 8516566 | Systems and methods for using external authentication service for Kerberos pre-authentication | |||
4138 | 8516562 | Multi-channel multi-factor authentication | |||
4139 | 8516561 | Methods and apparatus for determining user authorization from motion of a gesture-based control unit | |||
4140 | 8516560 | Secure remote authentication through an untrusted network | |||
4141 | 8516559 | Content processing system, content processing method, computer program, recording medium, and portable terminal | |||
4142 | 8516555 | Method and system for authenticating pay-per-use service using EAP | |||
4143 | 8516262 | Methods and apparatus for efficient computation of one-way chains in cryptographic applications | |||
4144 | 8516257 | Secure media peripheral association in a media exchange network | |||
4145 | 8516256 | Route optimization in mobile IP networks | |||
4146 | 8516255 | Methods and apparatus for peer-to-peer transfer of secure data using near field communications | |||
4147 | 8516254 | Method and apparatus for communicating information between a security panel and a security server | |||
4148 | 8516253 | Self-keyed protection of anticipatory content | |||
4149 | 8516250 | Lock administration system | |||
4150 | 8516244 | System, apparatus and method for decentralizing attribute-based encryption information | |||
4151 | 8516243 | Host identity protocol method and apparatus | |||
4152 | 8515066 | Method, apparatus and program for establishing encrypted communication channel between apparatuses | |||
4153 | 8510849 | Data protection systems and methods | |||
4154 | 8510818 | Selective cross-realm authentication | |||
4155 | 8510816 | Security device provisioning | |||
4156 | 8510797 | Online user authentication | |||
4157 | 8510795 | Video-based CAPTCHA | |||
4158 | 8510565 | Bidirectional entity authentication method based on the credible third party | |||
4159 | 8510564 | Automatic configuration and continuation of federation relationships | |||
4160 | 8510561 | Methods and devices for computing a shared encryption key | |||
4161 | 8510558 | Identity based authenticated key agreement protocol | |||
4162 | 8510557 | Secure message and file delivery | |||
4163 | 8510556 | Authentication method, system, server, and user node | |||
4164 | 8510550 | Method for managing data in a wireless sensor network | |||
4165 | 8510437 | Method and system for tracking screen activities | |||
4166 | 8509443 | Rekey index generation method and rekey index generation apparatus | |||
4167 | 8509427 | Hybrid mode cryptographic method and system with message authentication | |||
4168 | 8505810 | Systems and methods for adding authenticating features to process molded parts and the resultant molded parts | |||
4169 | 8505106 | Cross site request forgery mitigation in multi-domain integrations | |||
4170 | 8505090 | Archive of text captures from rendered documents | |||
4171 | 8505076 | Proactive authentication | |||
4172 | 8505071 | Preventing automated programs and unauthorized users in a network | |||
4173 | 8505070 | Separate script context to isolate malicious script | |||
4174 | 8504836 | Secure and efficient domain key distribution for device registration | |||
4175 | 8504835 | Method for secure remote backup | |||
4176 | 8504834 | Method and system for activation of local content with legacy streaming systems | |||
4177 | 8504833 | Relay device, wireless communications device, network system, program storage medium, and method | |||
4178 | 8504832 | Mobile terminal for sharing resources, method of sharing resources within mobile terminal and method of sharing resources between web server and terminal | |||
4179 | 8504831 | Systems, methods, and computer program products for user authentication | |||
4180 | 8504587 | Content access and annotation system and method | |||
4181 | 8503679 | Short message encryption | |||
4182 | 8503657 | System, method and apparatus for authenticating and protecting an IP user-end device | |||
4183 | 8502668 | System and method for article authentication using blanket illumination | |||
4184 | 8499172 | Hardware-based key generation and recovery | |||
4185 | 8499166 | Controlling access to a protected network | |||
4186 | 8499162 | Non-transitory computer readable medium storing program, information processing apparatus, and information processing method | |||
4187 | 8499158 | Anonymous authentication service method for providing local linkability | |||
4188 | 8499155 | Adaptive certificate distribution mechanism in vehicular networks using variable inter-certificate refresh period | |||
4189 | 8499154 | System and method for establishing a secure connection with a mobile device | |||
4190 | 8499153 | System and method of authenticating a user to a service provider | |||
4191 | 8499150 | Selectively trusting signed files | |||
4192 | 8499053 | Segmenting access to electronic message boards | |||
4193 | 8499045 | Systems and methods for protecting header fields in a message | |||
4194 | 8498006 | Data processing apparatus including external memory storage of designation information | |||
4195 | 8495752 | AV server device, TV receiver incorporating AV server and personal computer incorporating AV server | |||
4196 | 8495381 | Authenticated remote PIN unblock | |||
4197 | 8495377 | Enabling secure access to sensor network infrastructure using multiple interfaces and application-based group key selection | |||
4198 | 8495376 | Apparatus and method for controlling use of broadcasting program using signature in program information | |||
4199 | 8495372 | Authentication methods and apparatus using pairing protocols and other techniques | |||
4200 | 8495370 | Information processing apparatus and authentication bypassing method | |||
4201 | 8490204 | Selective protection of files on portable memory devices | |||
4202 | 8490198 | Techniques for local personalization of content | |||
4203 | 8490169 | Server-token lockstep systems and methods | |||
4204 | 8490167 | Preventing password presentation by a computer system | |||
4205 | 8490157 | Authentication--circles of trust | |||
4206 | 8490151 | Method and apparatus for performing a multi-role communication using a memory tag | |||
4207 | 8489883 | Virtual world embedded security watermarking | |||
4208 | 8489880 | Remote execution of commands transmitted through an open network with decoupled feedback | |||
4209 | 8489879 | Apparatus, method, program, and system for information processing | |||
4210 | 8489878 | Communication across domains | |||
4211 | 8489071 | System and method for assuring identity on a mobile device | |||
4212 | 8488838 | Combined watermarking and fingerprinting | |||
4213 | 8488785 | Secure storage and retrieval of confidential information | |||
4214 | 8487739 | Television theft deterrence | |||
4215 | 8484721 | Locked-down computing environment | |||
4216 | 8484479 | Systems and methods for authenticating an electronic message | |||
4217 | 8484478 | Instant messaging private tags | |||
4218 | 8484477 | Document management system and method | |||
4219 | 8484476 | Computer-implemented method and system for embedding and authenticating ancillary information in digitally signed content | |||
4220 | 8484474 | Methods for firmware signature | |||
4221 | 8484472 | System and method of filtering unsolicited messages | |||
4222 | 8484471 | Multi-party distributed multiplication device, multi-party distributed multiplication system and method | |||
4223 | 8484467 | Authentication in communications networks | |||
4224 | 8479270 | Method for allocating authorization key identifier for wireless portable internet system | |||
4225 | 8479261 | Implementing electronic chip identification (ECID) exchange for network security | |||
4226 | 8479009 | Wearable time-bracketed video authentication | |||
4227 | 8479008 | Providing security services on the cloud | |||
4228 | 8479006 | Digitally signing documents using identity context information | |||
4229 | 8479005 | Applet, archive file generation method, archive file generation program, and archive file generation device | |||
4230 | 8479003 | Electronic signature validation systems and methods for asynchronous environments | |||
4231 | 8479002 | Electronic certificate issuance system, electronic certificate issuing device, communication device, and program therefor | |||
4232 | 8479000 | Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit | |||
4233 | 8478998 | Authenticated communication using a shared unpredictable secret | |||
4234 | 8478995 | Method of encrypting and transferring data between a sender and a receiver using a network | |||
4235 | 8478830 | Method and apparatus for processing digitally signed messages to determine address mismatches | |||
4236 | 8474052 | User-administered license state verification | |||
4237 | 8474027 | Remote management of resource license | |||
4238 | 8474025 | Methods and apparatus for credential validation | |||
4239 | 8474015 | System and method for managing feature enablement in an information handling system | |||
4240 | 8474014 | Methods for the secure use of one-time passwords | |||
4241 | 8474013 | Securely managing password access to a computer system | |||
4242 | 8474011 | On-line centralized and local authorization of executable files | |||
4243 | 8473754 | Hardware-facilitated secure software execution environment | |||
4244 | 8473746 | Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | |||
4245 | 8473744 | Methods and systems for unilateral authentication of messages | |||
4246 | 8473743 | Mobile device management | |||
4247 | 8473742 | Method of distributing a decryption key in fixed-content data | |||
4248 | 8473740 | Method and system for secured management of online XML document services through structure-preserving asymmetric encryption | |||
4249 | 8473737 | Authentication device and method using electronic certificate files having hierarchical relationship | |||
4250 | 8471677 | Barrier movement system including a combined keypad and voice responsive transmitter | |||
4251 | 8468587 | Binding activation of network-enabled devices to web-based services | |||
4252 | 8468360 | Client terminal, server, server-client system, cooperation processing method, program and recording medium | |||
4253 | 8468359 | Credentials for blinded intended audiences | |||
4254 | 8468355 | Multi-dimensional credentialing using veiled certificates | |||
4255 | 8468354 | Broker-based interworking using hierarchical certificates | |||
4256 | 8468352 | Retrieving and using cloud based storage credentials | |||
4257 | 8468343 | System and method for securing wireless transmissions | |||
4258 | 8467525 | Steganographic method and device | |||
4259 | 8466775 | Electronic label authenticating method and system | |||
4260 | 8464352 | Techniques for detecting and preventing unintentional disclosures of sensitive data | |||
4261 | 8464348 | Isolated computing environment anchored into CPU and motherboard | |||
4262 | 8464324 | System and method for identity verification on a computer | |||
4263 | 8464249 | Software installation package with digital signatures | |||
4264 | 8464077 | Systems and methods for secure transaction management and electronic rights protection | |||
4265 | 8464071 | Trusted storage systems and methods | |||
4266 | 8464066 | Method and system for sharing segments of multimedia data | |||
4267 | 8464063 | Trusted group of a plurality of devices with single sign on, secure authentication | |||
4268 | 8464062 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
4269 | 8464061 | Secure wireless link between two devices using probes | |||
4270 | 8464056 | Method for secure dynamic bandwidth allocation in a TT ethernet | |||
4271 | 8464055 | Method and apparatus of ensuring security of communication in home network | |||
4272 | 8464054 | Measurement probe systems for co-ordinate positioning apparatus | |||
4273 | 8463938 | Address couplet communication filtering | |||
4274 | 8462953 | Communication system and method thereof | |||
4275 | 8462939 | RNS-based cryptographic system and method | |||
4276 | 8458795 | Event detection/anomaly correlation heuristics | |||
4277 | 8458769 | Cloud based firewall system and service | |||
4278 | 8458490 | System and method for supporting full volume encryption devices in a client hosted virtualization system | |||
4279 | 8458481 | Using watermarking to reduce communication overhead | |||
4280 | 8458480 | Method and apparatus for binding TPM keys to execution entities | |||
4281 | 8458479 | Verification apparatus | |||
4282 | 8458478 | Signature generating apparatus, signature verifying apparatus, and methods and programs therefor | |||
4283 | 8458477 | Communication with non-repudiation | |||
4284 | 8458469 | Secure communication between an electronic label and a reader | |||
4285 | 8458462 | Verifying integrity of network devices for secure multicast communications | |||
4286 | 8458458 | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method | |||
4287 | 8458456 | Method and system for verifying the identity of a communication partner | |||
4288 | 8458254 | Peer-to-peer network system, proxy service peer, and method for peer interworking between overlay networks | |||
4289 | 8457314 | Wireless video surveillance system and method for self-configuring network | |||
4290 | 8457305 | Generating genus 2 curves from invariants | |||
4291 | 8456670 | Printing device and printing system for controlling authentication print jobs | |||
4292 | 8453224 | Single sign-on authentication | |||
4293 | 8453050 | Method and apparatus for creating and editing electronic documents | |||
4294 | 8452979 | Portable telecommunications apparatus | |||
4295 | 8452974 | Image processing apparatus, electronic signature generation system, electronic signature key generation method, image processing method, and program | |||
4296 | 8452973 | Digital signature method, program, and apparatus | |||
4297 | 8452971 | Embedding and detection of watermark in a motion image signal | |||
4298 | 8452969 | Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads | |||
4299 | 8452967 | Using flash storage device to prevent unauthorized use of software | |||
4300 | 8452964 | Method for providing confidentiality protection of control signaling using certificate | |||
4301 | 8452963 | Generating protected access credentials | |||
4302 | 8452962 | Method and apparatus for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture | |||
4303 | 8452961 | Method and system for authentication between electronic devices with minimal user intervention | |||
4304 | 8452960 | System and method for content delivery | |||
4305 | 8452016 | Interoperable keychest for use by service providers | |||
4306 | 8452014 | Group key management for mobile ad-hoc networks | |||
4307 | 8452013 | Secure message handling on a mobile device | |||
4308 | 8452012 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
4309 | 8452007 | Security key generating method, device and system | |||
4310 | 8448719 | Key exchange device | |||
4311 | 8448222 | Method and apparatus for registering agents onto a virtual machine monitor | |||
4312 | 8447986 | Accessing restricted content based on proximity | |||
4313 | 8447985 | Watermarking apparatus, software enabling an implementation of an electronic circuit comprising a watermark, method for detecting a watermark and apparatus for detecting a watermark | |||
4314 | 8447984 | Authentication system and method for operating the same | |||
4315 | 8447980 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
4316 | 8447977 | Authenticating a device with a server over a network | |||
4317 | 8447976 | Business to business secure mail | |||
4318 | 8447158 | Repeater device | |||
4319 | 8443432 | Method for calibrating a temperature float of a one time password token and a one time password token thereof | |||
4320 | 8443430 | Remote registration for enterprise applications | |||
4321 | 8443419 | Method, device, and system for pre-authentication | |||
4322 | 8443418 | Method and apparatus for managing remote access authority in UpnP remote access service | |||
4323 | 8443417 | Node authentication and node operation methods within service and access networks in NGN environment | |||
4324 | 8443194 | Method of authentication and session key agreement for secure data transmission, a method for securely transmitting data, and an electronic data transmission system | |||
4325 | 8443193 | State-maintained multi-party signatures | |||
4326 | 8443192 | Network security method | |||
4327 | 8443191 | System and method for accessing information resources using cryptographic authorization permits | |||
4328 | 8443115 | Method and system for managing access to presence attribute information | |||
4329 | 8443101 | Method for identifying and blocking embedded communications | |||
4330 | 8438656 | Method and system for preventing unauthorized recording of media content on a macintosh operating system | |||
4331 | 8438642 | Method of detecting potential phishing by analyzing universal resource locators | |||
4332 | 8438397 | Watermarking for compressed scalable coded bitstreams | |||
4333 | 8438391 | Credential generation management servers and method for communications devices and device management servers | |||
4334 | 8438390 | Method and system for using neighbor discovery unspecified solicitation to obtain link local address | |||
4335 | 8438388 | Method and apparatus for distributing certificate revocation lists (CRLs) to nodes in an ad hoc network | |||
4336 | 8437474 | Public key encryption for groups | |||
4337 | 8434156 | Method, access node, and system for obtaining data | |||
4338 | 8434135 | Creating and launching a web application with credentials | |||
4339 | 8433914 | Multi-channel transaction signing | |||
4340 | 8433913 | Apparatus, method, and program for digital signature | |||
4341 | 8433910 | Electronic signature method, apparatus, and recording medium having electronic signature program recorded thereon | |||
4342 | 8433909 | One-to-many electronic signature process | |||
4343 | 8433907 | Application server, control method thereof, program, and computer-readable storage medium | |||
4344 | 8433906 | Method and system for microlocking web content | |||
4345 | 8433903 | Asynchronous enhanced shared secret provisioning protocol | |||
4346 | 8433899 | System and method for authenticating data using incompatible digest functions | |||
4347 | 8433897 | Group signature system, apparatus and storage medium | |||
4348 | 8433757 | Centralized management of applications and desktop preferences without requiring configuration of clientside operating systems | |||
4349 | 8430301 | Document authentication using hierarchical barcode stamps to detect alterations of barcode | |||
4350 | 8429755 | System and method for receiving digital content | |||
4351 | 8429730 | Authenticating users and on-line sites | |||
4352 | 8429719 | Interworking between first and second authentication domains | |||
4353 | 8429419 | Method for securing authorized data entry and the device to perform this method | |||
4354 | 8429414 | Apparatus and method of generating and detecting prevention and control data for verifying validity of data | |||
4355 | 8429413 | Systems and methods for server aided processing of a signed receipt | |||
4356 | 8429409 | Secure reset of personal and service provider information on mobile devices | |||
4357 | 8429407 | Digital handshake between devices | |||
4358 | 8429405 | System and method for human assisted secure information exchange | |||
4359 | 8429404 | Method and system for secure communications on a managed network | |||
4360 | 8429403 | Systems and methods for provisioning network devices | |||
4361 | 8429235 | Apparatus and method for precluding e-mail distribution | |||
4362 | 8428265 | Method and apparatus of securely processing data for file backup, de-duplication, and restoration | |||
4363 | 8428262 | Method to connect wireless communication device, wireless communication device, and computer usable medium therefor | |||
4364 | 8428261 | System and method for establishing authenticated wireless connection between mobile unit and host | |||
4365 | 8424103 | Authenticated printing system and authenticated printing method | |||
4366 | 8423782 | Method for authenticating a user accessing a remote server from a computer | |||
4367 | 8423778 | Apparatus and method for transmitting secure and/or copyrighted digital video broadcasting data over internet protocol network | |||
4368 | 8423775 | Circumvention of dynamic, robust, embedded-signal detection | |||
4369 | 8423774 | Integrity protected smart card transaction | |||
4370 | 8423773 | Method for receiving/sending multimedia messages | |||
4371 | 8423760 | Method and system for reducing packet overhead for an LTE architecture while securing traffic in an unsecured environment | |||
4372 | 8423471 | Protected document elements | |||
4373 | 8417957 | Content distribution system, content distribution method, and client terminal | |||
4374 | 8417954 | Installation image including digital signature | |||
4375 | 8417952 | Method for Digital Rights Management in a mobile communications network | |||
4376 | 8417941 | Apparatus and method to prevent man in the middle attack | |||
4377 | 8417937 | System and method for securely transfering content from set-top box to personal media player | |||
4378 | 8416949 | Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system | |||
4379 | 8416463 | Printing of a position-coding pattern | |||
4380 | 8416058 | Secure method for biometric verification of a person | |||
4381 | 8413233 | Authorizing local application activity using remotely defined security data | |||
4382 | 8413221 | Methods and apparatus for delegated authentication | |||
4383 | 8412948 | Method and apparatus for digital signature generation and validation | |||
4384 | 8412947 | System and method of secure encryption for electronic data transfer | |||
4385 | 8412945 | Systems and methods for implementing security in a cloud computing environment | |||
4386 | 8412942 | Method and system for seamless SSID creation, authentication and encryption | |||
4387 | 8412937 | Method and system for authentication of a low-resource prover | |||
4388 | 8411866 | Distribution of group cryptography material in a mobile IP environment | |||
4389 | 8411858 | Dynamic foreign agent-home agent security association allocation for IP mobility systems | |||
4390 | 8411857 | Partial multiple encryption | |||
4391 | 8411328 | Print control apparatus, print control method, and program therefor | |||
4392 | 8407770 | System and method for managing user token in client device on network | |||
4393 | 8407762 | System for three level authentication of a user | |||
4394 | 8407484 | Flash memory distribution of digital content | |||
4395 | 8407479 | Data authentication and tamper detection | |||
4396 | 8407478 | Control message signature for device control | |||
4397 | 8407473 | Information processing apparatus and method, recording medium and program | |||
4398 | 8407472 | Mobile content delivery optimization | |||
4399 | 8407471 | Selecting a network service for communicating with a server | |||
4400 | 8407469 | Protection against unintentional file changing | |||
4401 | 8407466 | Controlling download and playback of media content | |||
4402 | 8406735 | Method for pairing electronic equipment in a wireless network system | |||
4403 | 8406733 | Automated device provisioning and activation | |||
4404 | 8406459 | Method and apparatus to mark a document using a combination between guilloches and watermarking, method and apparatus to read previous combination | |||
4405 | 8406456 | Methods and systems for image fingerprinting | |||
4406 | 8406223 | Mechanism for protecting H.323 networks for call set-up functions | |||
4407 | 8405862 | Printing managing apparatus, image forming apparatus, and printing managing method | |||
4408 | 8402513 | Network access method of wireless local area network (WLAN) terminals and network system thereof | |||
4409 | 8402509 | User authentication apparatus and method thereof | |||
4410 | 8402285 | Method of encrypting and storing digital content using firmware regional code and apparatus therefor | |||
4411 | 8402275 | Method and system for establishing a communications pipe between a personal security device and a remote computer system | |||
4412 | 8402274 | System and method of sharing contents data in network | |||
4413 | 8402272 | Master unit and slave unit | |||
4414 | 8401196 | Method and apparatus for performing JRNSO in FDD, TDD and MIMO communications | |||
4415 | 8401195 | Method of automatically populating a list of managed secure communications group members | |||
4416 | 8400260 | System and method for securing authorized access by a mobile data device of a document processing device | |||
4417 | 8397280 | Static packet address assignment for a wireless communication device by an authorization system | |||
4418 | 8397082 | System and method for thwarting buffer overflow attacks using encrypted process pointers | |||
4419 | 8397075 | Method and apparatus for access control to installation control systems of wind energy installations | |||
4420 | 8397071 | Generation method and update method of authorization key for mobile communication | |||
4421 | 8397069 | Methods and systems for protecting media content | |||
4422 | 8397062 | Method and system for source authentication in group communications | |||
4423 | 8397059 | Methods and apparatus for implementing authentication | |||
4424 | 8397058 | System and method for communication between smart cards | |||
4425 | 8396288 | Information processing apparatus and information processing method for image verification | |||
4426 | 8396216 | Partial dual-encryption using program map tables | |||
4427 | 8396211 | System and method for dynamic modification of allowable electronic message properties | |||
4428 | 8393001 | Secure signature server system and associated method | |||
4429 | 8392967 | Image forming system, image forming apparatus, and method for creating, maintaining, and applying authorization information | |||
4430 | 8392717 | Authentication method, system, server, and client | |||
4431 | 8392716 | Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method | |||
4432 | 8392715 | Method and device for identifying objects or documents | |||
4433 | 8392714 | Secure overlay manager protection | |||
4434 | 8392711 | Staged establishment of secure strings of symbols | |||
4435 | 8392710 | Entity bidirectional-identification method for supporting fast handoff | |||
4436 | 8392708 | Auditing data integrity | |||
4437 | 8392707 | Gaming network | |||
4438 | 8392506 | Networked gaming system including a location monitor and dispatcher using personal data keys | |||
4439 | 8391837 | Method, system and trusted service manager for securely transmitting an application to a mobile phone | |||
4440 | 8391543 | Method and apparatus for preventing data leakage faciliated by steganography | |||
4441 | 8391488 | Method and apparatus for using navigation signal information for geoencryption to enhance security | |||
4442 | 8387152 | Attested content protection | |||
4443 | 8387130 | Authenticated service virtualization | |||
4444 | 8387129 | Method and apparatus for verifying data packet integrity in a streaming data channel | |||
4445 | 8386800 | Verifiable, leak-resistant encryption and decryption | |||
4446 | 8386793 | Method and apparatus for implementing electronic seal | |||
4447 | 8386792 | Asymmetric content fingerprinting with adaptive window sizing | |||
4448 | 8386791 | Secure data processing method based particularly on a cryptographic algorithm | |||
4449 | 8386790 | Method of using ECDSA with winternitz one time signature | |||
4450 | 8386787 | Hash function using a heap modeling process | |||
4451 | 8386786 | File system authentication | |||
4452 | 8386785 | Gaming machine certificate creation and management | |||
4453 | 8386784 | Apparatus and method for securely submitting and processing a request | |||
4454 | 8386781 | Unit using OS and image forming apparatus using the same | |||
4455 | 8386779 | Role navigation designer and verifier | |||
4456 | 8386774 | Logging system and method based on one-way hash function | |||
4457 | 8386773 | Verification methods and apparatus for use in providing application services to mobile communication devices | |||
4458 | 8386771 | Process and streaming server for encrypting a data stream with bandwidth based variation | |||
4459 | 8386766 | Method and arrangement for deciding a security setting | |||
4460 | 8386589 | System that provides embedded software to an embedded system | |||
4461 | 8385553 | Portable secure element | |||
4462 | 8385551 | Highly available cryptographic key storage (HACKS) | |||
4463 | 8385207 | Method and apparatus for end-to-end network congestion management | |||
4464 | 8384513 | Transmitter and method for transmitting an RF control signal | |||
4465 | 8381191 | Intention based application customization | |||
4466 | 8380993 | Method and system for robust watermark insertion and extraction for digital set-top boxes | |||
4467 | 8380990 | Secure peer-to-peer messaging invitation architecture | |||
4468 | 8380989 | System and method for second factor authentication | |||
4469 | 8380979 | Methods, systems, and computer program products for invoking trust-controlled services via application programming interfaces (APIs) respectively associated therewith | |||
4470 | 8380167 | LAN-based UMA network controller with proxy connection | |||
4471 | 8379911 | Method and system for efficient watermarking of video content | |||
4472 | 8379863 | Enabling users to select between secure service providers using a central trusted service manager | |||
4473 | 8379862 | Method and device for automatically distributing updated key material | |||
4474 | 8379852 | Processing video content | |||
4475 | 8379847 | Data and control encryption | |||
4476 | 8375432 | Methods, apparatus, and computer program products for subscriber authentication and temporary code generation | |||
4477 | 8375428 | Password input system using alphanumeric matrices and password input method using the same | |||
4478 | 8375425 | Password expiration based on vulnerability detection | |||
4479 | 8375420 | Challenge-response system and method | |||
4480 | 8375419 | Information processing apparatus, method for controlling information processing apparatus, and storage medium | |||
4481 | 8375217 | Process and device for the packet-oriented transmission of security-relevant data | |||
4482 | 8375216 | Document verification apparatus and method | |||
4483 | 8375214 | Information processing apparatus, information processing method, and program therefor | |||
4484 | 8375213 | Systems and methods for enabling trust in a federated collaboration | |||
4485 | 8375212 | Method for personalizing an authentication token | |||
4486 | 8375210 | Automatic configuration of devices upon introduction into a networked environment | |||
4487 | 8375209 | Near field registration of home system audio-video device | |||
4488 | 8375207 | Method and apparatus for authenticating a network device | |||
4489 | 8375204 | Method and system to combine multiple digital certificates using the subject alternative name extension | |||
4490 | 8375202 | Communications methods and appliances | |||
4491 | 8370917 | Security bridging | |||
4492 | 8370907 | Internet enabled monitoring and control device | |||
4493 | 8370899 | Disposable browser for commercial banking | |||
4494 | 8370896 | System and method for determining a security encoding to be applied to outgoing messages | |||
4495 | 8370638 | Derivative seeds | |||
4496 | 8370635 | Synchronization of digital watermarks | |||
4497 | 8370634 | Systems and methods for watermarking software and other media | |||
4498 | 8370633 | Apparatus, method, and computer instructions for generating a substitute signature key pair | |||
4499 | 8370631 | Trusted identities on a trusted computing platform | |||
4500 | 8370629 | Trusted hybrid location system | |||
4501 | 8369526 | Device, system, and method of securely executing applications | |||
4502 | 8369523 | Surrogate key generation using cryptographic hashing | |||
4503 | 8365305 | E-mail with secure message parts | |||
4504 | 8365281 | Determining whether method of computer program is a validator | |||
4505 | 8365261 | Implementing organization-specific policy during establishment of an autonomous connection between computer resources | |||
4506 | 8365248 | Data providing device, operation device, and data processing device | |||
4507 | 8364985 | Buffer-caches for caching encrypted data via copy-on-encrypt | |||
4508 | 8364978 | System for and method of auto-registration with cryptographic modules | |||
4509 | 8364958 | Sharing a secret via linear interpolation | |||
4510 | 8364957 | System and method of providing credentials in a network | |||
4511 | 8364954 | Method and system for provisioning multiple digital certificates | |||
4512 | 8364945 | Provisioning an unknown computer system | |||
4513 | 8364138 | Remote locking arrangements for electronic devices | |||
4514 | 8359642 | Restricting mature content | |||
4515 | 8359641 | Multi-level secure information retrieval system | |||
4516 | 8359631 | Portable identity rating | |||
4517 | 8359480 | Scalable RFID systems: a privacy preserving protocol with constant-time identification | |||
4518 | 8359476 | User authentication system and method for encryption and decryption | |||
4519 | 8359472 | Document fingerprinting with asymmetric selection of anchor points | |||
4520 | 8359465 | Enterprise security system | |||
4521 | 8359394 | Tearing and conformal transformation human interactive proof | |||
4522 | 8359273 | Secured authentication method for providing services on a data transmisson Network | |||
4523 | 8358197 | Mesh network door lock | |||
4524 | 8356351 | Method and device for verification of code module in virtual machine | |||
4525 | 8356337 | Electronic permission slips for controlling access to multimedia content | |||
4526 | 8356182 | Electronic signature system and electronic signature verifying method | |||
4527 | 8356181 | Apparatus and method for a direct anonymous attestation scheme from short-group signatures | |||
4528 | 8356180 | Multidimensional identification, authentication, authorization and key distribution system for patient monitoring | |||
4529 | 8356179 | Entity bi-directional identificator method and system based on trustable third party | |||
4530 | 8356176 | Method and system for authenticating peer devices using EAP | |||
4531 | 8355805 | Systems and methods for activation and deactivation of appliances | |||
4532 | 8353448 | Method and system for using machine-readable codes to perform automated teller machine transactions through a mobile communications device | |||
4533 | 8353053 | Computer program product and method for permanently storing data based on whether a device is protected with an encryption mechanism and whether data in a data structure requires encryption | |||
4534 | 8353035 | Systems and methods for creating text signatures for identifying spam messages | |||
4535 | 8353027 | System and method for enhanced protection and control over the use of identity | |||
4536 | 8353018 | Automatic local listing owner authentication system | |||
4537 | 8353007 | Systems and methods for identifying a network | |||
4538 | 8352747 | Software self-checking systems and methods | |||
4539 | 8352744 | Product authentication method | |||
4540 | 8352743 | Client device, key device, service providing apparatus, user authentication system, user authentication method, program, and recording medium | |||
4541 | 8352741 | Discovery of secure network enclaves | |||
4542 | 8352738 | Method and apparatus for secure online transactions | |||
4543 | 8351914 | Method and system for registration of licensed modules in mobile devices | |||
4544 | 8351645 | Methods and apparatus for embedding watermarks | |||
4545 | 8351603 | Random number generating device, random number generating method, and security chip | |||
4546 | 8347406 | Image processing apparatus, image processing method, and storage medium | |||
4547 | 8347400 | Document access management method and system | |||
4548 | 8347393 | Method and system for detecting a state of a web application using a signature | |||
4549 | 8347389 | System for protecting devices against virus attacks | |||
4550 | 8347370 | Multi-channel multi-factor authentication | |||
4551 | 8347367 | Techniques for entry of less than perfect passwords | |||
4552 | 8347360 | Shared device identity manager | |||
4553 | 8347353 | Addressing security in asymmetrical networks | |||
4554 | 8347351 | Systems and methods of controlling network access | |||
4555 | 8347350 | Systems and methods of controlling network access | |||
4556 | 8347349 | Configuring browser policy settings on client computing devices | |||
4557 | 8347100 | Methods for DNSSEC proxying and deployment amelioration and systems thereof | |||
4558 | 8347099 | Playback apparatus and playback method | |||
4559 | 8347095 | System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison | |||
4560 | 8347093 | Privacy preserving name verification | |||
4561 | 8347090 | Encryption of identifiers in a communication system | |||
4562 | 8347087 | Support for multiple digital rights management systems for same content | |||
4563 | 8347086 | System and method for automatically detecting and then self-repairing corrupt, modified of non-existent files via a communication medium | |||
4564 | 8347076 | System and method for building home domain using smart card which contains information of home network member device | |||
4565 | 8347072 | Method and apparatus for secure execution using a secure memory partition | |||
4566 | 8346667 | Distributed secure anonymous conferencing | |||
4567 | 8346567 | Efficient and secure forensic marking in compressed domain | |||
4568 | 8345994 | Image data transmission | |||
4569 | 8345875 | System and method of creating and sending broadcast and multicast data | |||
4570 | 8345869 | Method and apparatus for file sharing of missing content between a group of user devices in a peer-to-peer network | |||
4571 | 8345862 | Method of sharing a strong secret between two parties, one of whom has little processing power | |||
4572 | 8345313 | Image forming apparatus, method and control program, for enabling image formation of a valid print object while disabling image formation of an invalid print object on a page including a plurality of print objects | |||
4573 | 8343235 | Theft prevention of media peripherals in a media exchange network | |||
4574 | 8342400 | Systems controlled by data bearing records for maintaining inventory data | |||
2012 | |||||
4575 | 8341716 | Information processing device, information processing method, and storage media storing user certification program | |||
4576 | 8341705 | Method, apparatus, and computer product for managing operation | |||
4577 | 8341699 | Method and system to detect human interaction with a computer | |||
4578 | 8341698 | Transforming static password systems to become 2-factor authentication | |||
4579 | 8341421 | System and method for enrolling in a biometric system | |||
4580 | 8341416 | Assertion message signatures | |||
4581 | 8341415 | Phrase matching | |||
4582 | 8341414 | License managing method and device | |||
4583 | 8341409 | Content server apparatus, on-vehicle player apparatus, system, method, and program | |||
4584 | 8341088 | Multipurpose electronic payment method and system | |||
4585 | 8340344 | Method and system for video transmission and processing with customized watermarking delivery | |||
4586 | 8340300 | Non-disruptive authentication administration | |||
4587 | 8340299 | Key management system and method | |||
4588 | 8336104 | Generation and use of digital contents | |||
4589 | 8336091 | Multi-level authentication | |||
4590 | 8336087 | Robust digest authentication method | |||
4591 | 8336081 | Trusted network connect system for enhancing the security | |||
4592 | 8335928 | Information providing system and method and storage medium | |||
4593 | 8335925 | Method and arrangement for secure authentication | |||
4594 | 8335924 | Systems and methods for watermarking software and other media | |||
4595 | 8334757 | Controlling data access to and from an RFID device | |||
4596 | 8332952 | Time window based canary solutions for browser security | |||
4597 | 8332936 | Computer application pre-permissioning | |||
4598 | 8332649 | Authentication system, signature creating device, and signature verifying device | |||
4599 | 8332647 | System and method for dynamic multi-attribute authentication | |||
4600 | 8332646 | On-demand watermarking of content | |||
4601 | 8332640 | Storage apparatus, method for validating encrypted content and terminal apparatus | |||
4602 | 8332635 | Updateable secure kernel extensions | |||
4603 | 8332520 | Web server for managing session and method thereof | |||
4604 | 8331568 | Efficient distribution of computation in key agreement | |||
4605 | 8331560 | Distributed scalable cryptographic access control | |||
4606 | 8331556 | Asymmetrical method of encryption or signature verification | |||
4607 | 8330996 | Image forming apparatus | |||
4608 | 8327157 | Secure encrypted email server | |||
4609 | 8327149 | Efficient and secure data currentness systems | |||
4610 | 8327148 | Mobile system, service system, and key authentication method to manage key in local wireless communication | |||
4611 | 8327147 | Non-transferable anonymous digital receipts | |||
4612 | 8327146 | Wireless communication using compact certificates | |||
4613 | 8327144 | Authentication method, system, and apparatus thereof for inter-domain information communication | |||
4614 | 8327143 | Techniques to provide access point authentication for wireless network | |||
4615 | 8327141 | Centralized authentication system with safe private data storage and method | |||
4616 | 8327139 | System and method for securely exchanging sensitive information with an implantable medical device | |||
4617 | 8327134 | System, method and program product for checking revocation status of a biometric reference template | |||
4618 | 8327131 | Method and system to issue trust score certificates for networked devices using a trust scoring service | |||
4619 | 8327125 | Content securing system | |||
4620 | 8325913 | System and method of authentication | |||
4621 | 8321955 | Systems and methods for protecting against denial of service attacks | |||
4622 | 8321949 | Managing software run in a computing system | |||
4623 | 8321924 | Method for protecting software accessible over a network using a key device | |||
4624 | 8321923 | Secure sharing of resources between applications in independent execution environments in a retrievable token (e.g. smart card) | |||
4625 | 8321922 | Authenticating a user of a system using near field communication | |||
4626 | 8321912 | Centralized identity authentication for electronic communication networks | |||
4627 | 8321680 | Multisigning--a protocol for robust multiple party digital signatures | |||
4628 | 8321678 | System and method to send a message using multiple authentication mechanisms | |||
4629 | 8321673 | Method and terminal for authenticating between DRM agents for moving RO | |||
4630 | 8321672 | Authentication system, information processing apparatus and method, program, and recording medium | |||
4631 | 8321670 | Securing dynamic authorization messages | |||
4632 | 8321669 | Electronic data communication system | |||
4633 | 8320610 | Client-side watermarking using hybrid I-frames | |||
4634 | 8320606 | Video watermarking with fast detection | |||
4635 | 8319984 | Image forming system, apparatus, and method executing a process designated by a service request after token validation | |||
4636 | 8319631 | Modular patient portable communicator for use in life critical network | |||
4637 | 8316461 | Method for sharing rights objects between users | |||
4638 | 8316429 | Methods and systems for obtaining URL filtering information | |||
4639 | 8316416 | Securely using a display to exchange information | |||
4640 | 8316238 | Method and system for providing image processing to track digital information | |||
4641 | 8316236 | Determining security states using binary output sequences | |||
4642 | 8316235 | Method and device for manipulation-proof transmission of data | |||
4643 | 8316234 | Encoded attribute matching on communication devices | |||
4644 | 8316233 | Systems and methods for accessing secure and certified electronic messages | |||
4645 | 8316229 | Secure certificate installation on IP clients | |||
4646 | 8315617 | Controlling mobile device functions | |||
4647 | 8315592 | Voice messaging prioritization | |||
4648 | 8312540 | System for slowing password attacks | |||
4649 | 8312524 | Card management device and card management system | |||
4650 | 8312512 | Secure file transfer method | |||
4651 | 8312510 | Authentication terminal and network terminal | |||
4652 | 8312285 | Global profile management method and system | |||
4653 | 8312284 | Verifiable timestamping of data objects, and applications thereof | |||
4654 | 8312282 | Information processing apparatus and method | |||
4655 | 8312279 | Secure modem gateway concentrator | |||
4656 | 8312278 | Access authentication method applying to IBSS network | |||
4657 | 8312277 | Method and system for secure communication between computers | |||
4658 | 8312276 | Method for sending and receiving an evaluation of reputation in a social network | |||
4659 | 8312274 | Image processing apparatus and method for controlling the same | |||
4660 | 8312273 | Privacy vault for maintaining the privacy of user profiles | |||
4661 | 8312272 | Secure authentication token management | |||
4662 | 8312270 | DHCP-based security policy enforcement system | |||
4663 | 8312269 | Challenge and response access control providing data security in data storage devices | |||
4664 | 8312263 | System and method for installing trust anchors in an endpoint | |||
4665 | 8312261 | Method and system for verification of an endpoint security scan | |||
4666 | 8312122 | Device management system, device, and computer readable medium | |||
4667 | 8312097 | Segmenting access to electronic message boards | |||
4668 | 8311218 | Rounding for security | |||
4669 | 8310694 | Information processing apparatus and control method thereof | |||
4670 | 8307436 | Transformative rendering of internet resources | |||
4671 | 8307234 | Maintaining connectivity during low power operation | |||
4672 | 8307211 | Data card verification system | |||
4673 | 8307208 | Confidential communication method | |||
4674 | 8307206 | Cryptographic policy enforcement | |||
4675 | 8306393 | Information recording apparatus, information copying system, method for copying information, program and computer readable recording medium | |||
4676 | 8306217 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
4677 | 8305646 | Electronic document printing system, printing controller, printing control method, and computer-readable medium | |||
4678 | 8302194 | Using file prevalence to inform aggressiveness of behavioral heuristics | |||
4679 | 8302185 | System and method of owner control of electronic devices | |||
4680 | 8301906 | Apparatus for writing information on a data content on a storage medium | |||
4681 | 8301895 | Identity based network policy enablement | |||
4682 | 8301892 | Secure instant messaging system | |||
4683 | 8301891 | Localized network authentication and security using tamper-resistant keys | |||
4684 | 8301889 | Secure messaging systems | |||
4685 | 8301887 | Method and system for automated authentication of a device to a management node of a computer network | |||
4686 | 8301885 | Time-controlled secure communication | |||
4687 | 8301884 | Method of managing metadata | |||
4688 | 8301803 | Block floating point compression of signal data | |||
4689 | 8301658 | Site directed management of audio components of uploaded video files | |||
4690 | 8300884 | Combined watermarking and fingerprinting | |||
4691 | 8300878 | Blind wavelet-based watermarking method | |||
4692 | 8299891 | Antitheft system for vehicle | |||
4693 | 8296850 | Detecting global anomalies | |||
4694 | 8296834 | Secure single-sign-on portal system | |||
4695 | 8296830 | Management apparatus and control method of management apparatus | |||
4696 | 8296829 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
4697 | 8296584 | Storage and retrieval of encrypted data blocks with in-line message authentication codes | |||
4698 | 8296582 | Method and system for providing copy-protection on a storage medium and storage medium for use in such a system | |||
4699 | 8296580 | System and method for protecting data on a mobile device | |||
4700 | 8296566 | Method for session key derivation in an IC card | |||
4701 | 8296564 | Communication channel access based on channel identifier and use policy | |||
4702 | 8296563 | Method of handling a certification request | |||
4703 | 8296559 | Peer-to-peer SMIME mechanism | |||
4704 | 8295488 | Exchange of key material | |||
4705 | 8295478 | Cryptographic processing apparatus, algorithm constructing method, processing method, and computer program applying an extended feistel structure | |||
4706 | 8291482 | System for restricting content access and storage | |||
4707 | 8291472 | Real-time adjustments to authentication conditions | |||
4708 | 8291235 | Method and system for controlling access of clients and users to a print server | |||
4709 | 8291231 | Common key setting method, relay apparatus, and program | |||
4710 | 8291230 | Method and system for signing JavaScript object notation (JSON) messages | |||
4711 | 8291226 | Method and apparatus for securely booting from an external storage device | |||
4712 | 8291225 | Communications apparatus, communications system, and method of setting certificate | |||
4713 | 8291224 | Distributed cryptographic management for computer systems | |||
4714 | 8291218 | Creating and using secure communications channels for virtual universes | |||
4715 | 8291023 | System and method for regulating electronic messages | |||
4716 | 8290871 | Systems and methods for a secure recording environment | |||
4717 | 8290660 | Data access to electronic control units | |||
4718 | 8290152 | Management system for web service developer keys | |||
4719 | 8290146 | Ciphertext generating apparatus, cryptographic communication system, and group parameter generating apparatus | |||
4720 | 8289936 | Seamless public wireless local area network user authentication | |||
4721 | 8286256 | Method and system for restricted biometric access to content of packaged media | |||
4722 | 8286236 | Manufacturing control system | |||
4723 | 8286228 | Secure streaming container | |||
4724 | 8286226 | Password protection system | |||
4725 | 8286224 | Authentication device and network authentication system, method for authenticating terminal device and program storage medium | |||
4726 | 8285999 | System and method for authenticating remote execution | |||
4727 | 8285998 | Dynamic image content tamper detecting device and system | |||
4728 | 8285995 | System and method for digitally marking a file with a removable mark | |||
4729 | 8285994 | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |||
4730 | 8285989 | Establishing a secured communication session | |||
4731 | 8285988 | Method and system for command authentication to achieve a secure interface | |||
4732 | 8284984 | Method and system for image registration | |||
4733 | 8284944 | Unified and persistent system and method for automatic configuration of encryption | |||
4734 | 8284942 | Persisting private/public key pairs in password-encrypted files for transportation to local cryptographic store | |||
4735 | 8284930 | Simultaneous scalar multiplication method | |||
4736 | 8284431 | Printing management system, printing management method, and program | |||
4737 | 8281390 | Remotely defining security data for authorization of local application activity | |||
4738 | 8281379 | Method and system for providing a federated authentication service with gradual expiration of credentials | |||
4739 | 8281366 | Systems and methods for using guardian proximity to control computing activities of children | |||
4740 | 8281364 | Method and system for performing secure logon input on network | |||
4741 | 8281149 | Privacy-preserving flexible anonymous-pseudonymous access | |||
4742 | 8281145 | Doing business without SSN, EIN, and charge card numbers | |||
4743 | 8281143 | Protecting against chosen plaintext attacks in untrusted storage environments that support data deduplication | |||
4744 | 8281141 | Method and apparatus for monitoring and analyzing degree of trust and information assurance attributes information in a data providence architecture workflow | |||
4745 | 8281139 | System and method for monitoring unauthorized transport of digital content | |||
4746 | 8281138 | Steganalysis of suspect media | |||
4747 | 8281137 | Method and apparatus for determining whether or not a reference pattern is present in a received and possibly watermarked signal | |||
4748 | 8281135 | Enforcing use of chipset key management services for encrypted storage devices | |||
4749 | 8281134 | Methods and apparatus for layer 2 and layer 3 security between wireless termination points | |||
4750 | 8281133 | Predictive real-time pairwise master key identification (PMKID) generation | |||
4751 | 8281132 | Method and apparatus for security over multiple interfaces | |||
4752 | 8281120 | Sending signed e-mail messages from a device | |||
4753 | 8280745 | Systems and methods for applying secondary information to business addresses | |||
4754 | 8280374 | Policy management in a roaming or handover scenario in an IP network | |||
4755 | 8280349 | Communication system, storage medium having communication program stored thereon, and communication terminal | |||
4756 | 8280103 | System reactions to the detection of embedded watermarks in a digital host content | |||
4757 | 8280098 | Digital watermarking CMOS sensor | |||
4758 | 8280059 | Method, system and device for generating group key | |||
4759 | 8276204 | Relay device and relay method | |||
4760 | 8276202 | Cloud-based gateway security scanning | |||
4761 | 8276200 | Systems and methods for securely processing sensitive streams in a mixed infrastructure | |||
4762 | 8276196 | Systems and methods for implementing device-specific passwords | |||
4763 | 8276195 | Management of split audio/video streams | |||
4764 | 8276194 | Methods and systems for user authentication | |||
4765 | 8275998 | Encryption device, key distribution device and key distribution system | |||
4766 | 8275991 | On-line membership verification | |||
4767 | 8275990 | Method for receiving/sending multimedia messages | |||
4768 | 8272052 | Method and system for filing and monitoring electronic claim submissions in multi-claimant lawsuits | |||
4769 | 8272045 | System and method for secure remote desktop access | |||
4770 | 8272038 | Method and apparatus for secure authorization | |||
4771 | 8272032 | Multiple user login detection and response system | |||
4772 | 8272031 | Policy-based virtualization method involving adaptive enforcement | |||
4773 | 8271795 | Security based on subliminal and supraliminal channels for data objects | |||
4774 | 8271793 | Dynamic multimedia fingerprinting system | |||
4775 | 8271792 | Image processing apparatus, authentication package installation method, and computer-readable recording medium | |||
4776 | 8271790 | Method and system for securely identifying computer storage devices | |||
4777 | 8271789 | System and method for managing usage authorizations based on the use of smart cards | |||
4778 | 8271788 | Software registration system | |||
4779 | 8271784 | Communication between key manager and storage subsystem kernel via management console | |||
4780 | 8271781 | System and method for authentication of a hardware token | |||
4781 | 8271642 | System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input | |||
4782 | 8270948 | Solving PANA bootstrapping timing problem | |||
4783 | 8270605 | Location authentication | |||
4784 | 8270598 | Highly secured method and device for distributing audio-visual streams | |||
4785 | 8266687 | Discovery of the use of anonymizing proxies by analysis of HTTP cookies | |||
4786 | 8266439 | Integrity verification of pseudonymized documents | |||
4787 | 8266437 | Electronic vouchers and a system and method for issuing the same | |||
4788 | 8266436 | Service providing system, service providing server and information terminal device | |||
4789 | 8266435 | Method for generating an asymmetric cryptographic key pair and its application | |||
4790 | 8266434 | System and method for providing an user's security when setting-up a connection over insecure networks | |||
4791 | 8266421 | Private electronic information exchange | |||
4792 | 8266327 | Identity brokering in a network element | |||
4793 | 8264320 | Aftermarket keyless starter | |||
4794 | 8261351 | DNS flood protection platform for a network | |||
4795 | 8261336 | System and method for making accessible a set of services to users | |||
4796 | 8261334 | System for performing web authentication of a user by proxy | |||
4797 | 8261331 | Security management for an integrated console for applications associated with multiple user registries | |||
4798 | 8261329 | Trust and identity in secure calendar sharing collaboration | |||
4799 | 8261326 | Network intrusion blocking security overlay | |||
4800 | 8261084 | Unauthorized contents detection system | |||
4801 | 8261082 | Self-signing electronic documents | |||
4802 | 8261078 | Access to services in a telecommunications network | |||
4803 | 8261077 | System and method for performing authentication in a wireless mobile communication system | |||
4804 | 8261076 | Method and device for agreeing shared key between first communication device and second communication device | |||
4805 | 8261075 | Method for secure remote backup | |||
4806 | 8261070 | Authentication of untrusted gateway without disclosure of private information | |||
4807 | 8259950 | Method for secure key management using multi-threshold secret sharing | |||
4808 | 8256011 | Media package, system comprising a media package and method of executing program code | |||
4809 | 8256004 | Control transparency framework | |||
4810 | 8255984 | Single sign-on system for shared resource environments | |||
4811 | 8255703 | Atomic hash instruction | |||
4812 | 8255695 | User-defined passwords having associated unique version data to assist user recall of the password | |||
4813 | 8255694 | System and method using information based indicia for securing and authenticating transactions | |||
4814 | 8255691 | Apparatus for batch verification and method using the same | |||
4815 | 8255690 | Apparatus and method for group session key and establishment using a certified migration key | |||
4816 | 8255688 | Systems and methods for mutual authentication using one time codes | |||
4817 | 8255684 | Method and system for encryption of messages in land mobile radio systems | |||
4818 | 8254578 | Process of manufacturing a handheld device, involving keys | |||
4819 | 8253983 | Stamping system and method using a portable communication device | |||
4820 | 8253957 | Printing data generating apparatus, method, and program for reissuing restriction ticket according to term of validity and term of reissue | |||
4821 | 8253528 | Trainable transceiver system | |||
4822 | 8251283 | Token authentication using spatial characteristics | |||
4823 | 8250665 | Digital Broadcasting system and method of processing data in digital broadcasting system | |||
4824 | 8250646 | Method, system, and device for filtering packets | |||
4825 | 8250633 | Techniques for flexible resource authentication | |||
4826 | 8250627 | Transaction authorization | |||
4827 | 8250361 | Server certificate issuing system and person authentication method | |||
4828 | 8250288 | Flash memory storage system and controller and data protection method thereof | |||
4829 | 8249350 | Brand protection and product autentication using portable devices | |||
4830 | 8245307 | Providing secure access to a secret | |||
4831 | 8245295 | Apparatus and method for detection of malicious program using program behavior | |||
4832 | 8245283 | Region access authorization in a virtual environment | |||
4833 | 8245277 | Universally usable human-interaction proof | |||
4834 | 8245048 | Authentication method, system, server, and client | |||
4835 | 8245046 | Interconnect device to enable compliance with rights management restrictions | |||
4836 | 8245044 | Payment transaction processing using out of band authentication | |||
4837 | 8245042 | Shielding a sensitive file | |||
4838 | 8245040 | Secret authentication system | |||
4839 | 8245039 | Extensible authentication protocol authentication and key agreement (EAP-AKA) optimization | |||
4840 | 8245033 | Imparting real-time priority-based network communications in an encrypted communication session | |||
4841 | 8245032 | Method to authenticate packet payloads | |||
4842 | 8245031 | Content control method using certificate revocation lists | |||
4843 | 8245029 | System and method for enhanced network entrance into a wireless network | |||
4844 | 8244920 | Smart card set protocol optimization | |||
4845 | 8244798 | Techniques for sharing content between portals | |||
4846 | 8244404 | Modular and expandable irrigation controller | |||
4847 | 8243985 | Bit pattern design for visible watermarking | |||
4848 | 8243981 | Identifying embedded data in an image | |||
4849 | 8243933 | Method for sharing secret information among cooperating parties | |||
4850 | 8243927 | Digital video receiver, ECM extract equipment, EMM extract equipment, scramble key extract equipment, CCI extract equipment, digital video receiving system, ECM extract method, EMM extract method, scramble key extract method, CCI extract method, digital video receiving method, and recording medium | |||
4851 | 8243703 | Communication system, management apparatus, control method therefor, storage medium, registration apparatus and base station | |||
4852 | 8243338 | Providing privacy for electronic voting using encryption | |||
4853 | 8239958 | Confirmation method of software and apparatus for executing software | |||
4854 | 8239929 | Multiple tiered network security system, method and apparatus using dynamic user policy assignment | |||
4855 | 8239920 | Authentication system and method | |||
4856 | 8239683 | Method for producing acknowledged transaction data and corresponding device | |||
4857 | 8239682 | Method and system for digital rights management of documents | |||
4858 | 8239680 | Secret communication method and secret communication device thereof | |||
4859 | 8239677 | Verification and authentication systems and methods | |||
4860 | 8239556 | Policy-based cross-domain access control for SSL VPN | |||
4861 | 8239331 | Auction verification | |||
4862 | 8238944 | Disaster and emergency mode for mobile radio phones | |||
4863 | 8238551 | Generation of perfectly secret keys in wireless communication networks | |||
4864 | 8237542 | Key system | |||
4865 | 8234715 | Activating streaming video in a blu-ray disc player | |||
4866 | 8234713 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
4867 | 8234703 | Network firewall host application identification and authentication | |||
4868 | 8234700 | System and method for authentication | |||
4869 | 8234690 | Solicited authentication of a specific user | |||
4870 | 8234503 | Method and systems for computer security | |||
4871 | 8234502 | Automated password authentication | |||
4872 | 8234492 | Method, client and system for reversed access to management server using one-time password | |||
4873 | 8233197 | Pantograph methods, apparatus and systems based on UCR/GCR | |||
4874 | 8230487 | Method and system for controlling access to a secondary system | |||
4875 | 8230478 | Flexibly assigning security configurations to applications | |||
4876 | 8230223 | Approach for managing access to messages using encryption key management policies | |||
4877 | 8230218 | Mobile station authentication in tetra networks | |||
4878 | 8230215 | Method for allocating multiple authentication certificates to vehicles in a vehicle-to-vehicle communication network | |||
4879 | 8229857 | Secure pre-recorded digital medium | |||
4880 | 8229742 | Transcription data security | |||
4881 | 8229088 | Time authentication system, terminal device, time authentication method for conversation voice data for use therein, and program thereof | |||
4882 | 8225401 | Methods and systems for detecting man-in-the-browser attacks | |||
4883 | 8225391 | System and method for improving restrictiveness on accessing software applications | |||
4884 | 8225384 | Authentication system for enhancing network security | |||
4885 | 8225379 | System and method for securing networks | |||
4886 | 8225103 | Controlling access to a protected network | |||
4887 | 8225098 | Direct anonymous attestation using bilinear maps | |||
4888 | 8225096 | System, apparatus, method, and program product for authenticating communication partner using electronic certificate containing personal information | |||
4889 | 8225095 | Password-authenticated asymmetric key exchange | |||
4890 | 8225093 | Providing secure inter-application communication for a mobile operating environment | |||
4891 | 8225090 | Method and apparatus for inserting authentication code, and method and apparatus for using data through authentication | |||
4892 | 8225089 | Electronic transaction systems utilizing a PEAD and a private key | |||
4893 | 8224887 | System, method and computer program product for authenticating a client | |||
4894 | 8224758 | Systems and methods for managing the transportation of dangerous materials | |||
4895 | 8224017 | Method for identifying marked content | |||
4896 | 8223968 | Image data verification program recorded on a recording medium, image data verification method, and image data verification system | |||
4897 | 8223354 | Printing apparatus capable of performing confidential printing and printing method for use therein | |||
4898 | 8222994 | Techniques to provide automatic reminders | |||
4899 | 8220039 | Mass storage device with automated credentials loading | |||
4900 | 8220030 | System and method for security in global computer transactions that enable reverse-authentication of a server by a client | |||
4901 | 8219830 | Apparatus and method for management for file aggregates and file directories | |||
4902 | 8219820 | Power analysis countermeasure for the ECMQV key agreement algorithm | |||
4903 | 8219816 | IVR call routing using encrypted data | |||
4904 | 8219815 | Information management system | |||
4905 | 8219814 | System and method of user credential management | |||
4906 | 8219812 | Methods and a device for associating a first device with a second device | |||
4907 | 8219810 | Method and system for facilitating throttling of interpolation-based authentication | |||
4908 | 8219809 | Method of optimizing data communication | |||
4909 | 8219808 | Session-based public key infrastructure | |||
4910 | 8218771 | Information processing apparatus and computer readable medium | |||
4911 | 8218762 | Encrypting apparatus for common key cipher | |||
4912 | 8218761 | Method and apparatus for generating random data-encryption keys | |||
4913 | 8217753 | Electronics antitheft authorizing unit | |||
4914 | 8214902 | Determination by circuitry of presence of authorized and/or malicious data | |||
4915 | 8214876 | System and method for statistical analysis of border gateway protocol (BGP) configurations | |||
4916 | 8214652 | Biometric identification network security | |||
4917 | 8214651 | Radio frequency identification (RFID) based authentication system and methodology | |||
4918 | 8214650 | Context sensitive dynamic authentication in a cryptographic system | |||
4919 | 8214648 | Secure configuration of a computing device | |||
4920 | 8214646 | Bundle verification | |||
4921 | 8214644 | Method for installing rights object for content in memory card | |||
4922 | 8214643 | Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method | |||
4923 | 8214642 | System and method for distribution of credentials | |||
4924 | 8214637 | Public key certificate issuing system, public key certificate issuing method, digital certification apparatus, and program storage medium | |||
4925 | 8214630 | Method and apparatus for controlling enablement of JTAG interface | |||
4926 | 8214446 | Segmenting access to electronic message boards | |||
4927 | 8213673 | Watermarking of motion pictures | |||
4928 | 8213618 | Protecting content on client platforms | |||
4929 | 8213614 | Distribution and printing of travel documents | |||
4930 | 8209743 | CAPTCHA image scramble | |||
4931 | 8209546 | Data-securing method of program tool | |||
4932 | 8209544 | Trusted storage systems and methods | |||
4933 | 8209543 | Watermarking of a processing module | |||
4934 | 8209540 | Incremental secure backup and restore of user settings and data | |||
4935 | 8209539 | Method for time-stamped watermarking, method and device for time stamp decoding use | |||
4936 | 8209538 | Email policy manager | |||
4937 | 8209537 | Secure information distribution between nodes (network devices) | |||
4938 | 8208632 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
4939 | 8208471 | Apparatus and method for releasing local data contents for IP-based data access, associated communication system, digital storage medium, computer program product and computer program | |||
4940 | 8205263 | Systems and methods for identifying an executable file obfuscated by an unknown obfuscator program | |||
4941 | 8205248 | Local verification of trusted display based on remote server verification | |||
4942 | 8205244 | Systems and methods for generating, managing, and displaying alarms for wireless network monitoring | |||
4943 | 8205089 | System for controlling the distribution and use of rendered digital works through watermarking | |||
4944 | 8205088 | Method for the authenticated transmission of a personalized data set or program to a hardware security module in particular of a franking machine | |||
4945 | 8205085 | Key update system, key management device, communication terminal, and key information construction method for multihop network | |||
4946 | 8205084 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
4947 | 8205082 | Domain upgrade method in digital rights management | |||
4948 | 8205081 | Systems and methods for verifying the authenticity of a remote device | |||
4949 | 8205079 | Encryption/decryption system and method thereof | |||
4950 | 8204992 | Presence detection using distributed indexes in peer-to-peer networks | |||
4951 | 8203426 | Feed protocol used to report status and event information in physical access control system | |||
4952 | 8201217 | Systems and methods for single sign-in for multiple accounts | |||
4953 | 8201214 | Ad-hoc user account creation | |||
4954 | 8200985 | Method and system for protecting data | |||
4955 | 8200975 | Digital signatures for network forms | |||
4956 | 8200972 | Encryption of security-sensitive data by re-using a connection | |||
4957 | 8200969 | Data verification by challenge | |||
4958 | 8200968 | Method and apparatus for communicating between a requestor and a user receiving device using a user device locating module | |||
4959 | 8196205 | Detection of spyware threats within virtual machine | |||
4960 | 8196194 | Method and network for securely delivering streaming data | |||
4961 | 8195946 | Protection of data of a memory associated with a microprocessor | |||
4962 | 8195944 | Automated method for securely establishing simple network management protocol version 3 (SNMPv3) authentication and privacy keys | |||
4963 | 8195943 | Signaling with opaque UE identities | |||
4964 | 8195941 | Authentication method for IC cards | |||
4965 | 8195940 | Key updates in a mobile wireless system | |||
4966 | 8195939 | Systems and methods for protecting sensitive data | |||
4967 | 8195570 | Generation of receipts for check point of sale device | |||
4968 | 8194858 | Chaotic cipher system and method for secure communication | |||
4969 | 8191165 | Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity | |||
4970 | 8191161 | Wireless authentication | |||
4971 | 8191128 | Systems and methods for controlling access to a public data network from a visited access provider | |||
4972 | 8190903 | Method and apparatus for verifying authenticity of digital data using trusted computing | |||
4973 | 8190901 | Layered security in digital watermarking | |||
4974 | 8190900 | Secure telemetric link | |||
4975 | 8190898 | Portable electronic entity and communication method | |||
4976 | 8190897 | Method and system for secure exchange of data in a network | |||
4977 | 8190893 | Portable security transaction protocol | |||
4978 | 8190892 | Message authentication code with blind factorization and randomization | |||
4979 | 8189859 | Apparatus for inserting watermark and method therefor | |||
4980 | 8189853 | Watermarked image generation apparatus, watermarked image analysis apparatus, watermarked image generation method, medium and computer readable medium | |||
4981 | 8189790 | Developing initial and subsequent keyID information from a unique mediaID value | |||
4982 | 8188837 | Method of finding a key to a mobile vehicle | |||
4983 | 8185947 | System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network | |||
4984 | 8185937 | Systems and methods for universal password control | |||
4985 | 8185934 | Programmable data protection device, secure programming manager system and process for controlling access to an interconnect network for an integrated circuit | |||
4986 | 8185749 | System and method for revising boolean and arithmetic operations | |||
4987 | 8185746 | Method for generating data for detection of tampering, and method and apparatus for detection of tampering | |||
4988 | 8185745 | Detection of frequent and dispersed invariants | |||
4989 | 8185744 | Aggregate signature schemes | |||
4990 | 8185743 | Systems and methods for application locking using an internal and external checksum | |||
4991 | 8185741 | Converting transport level transactional security into a persistent document signature | |||
4992 | 8185740 | Consumer computer health validation | |||
4993 | 8185739 | Method and system for detecting successful authentication of multiple ports in a time-based roving architecture | |||
4994 | 8185737 | Communication across domains | |||
4995 | 8185733 | Method and apparatus for automatically publishing content based identifiers | |||
4996 | 8185642 | Communication policy enforcement in a data network | |||
4997 | 8185592 | Method and program product for preventing distribution of an e-mail message | |||
4998 | 8184326 | Information dissemination multifunction device | |||
4999 | 8181264 | Method and apparatus for deferred security analysis | |||
5000 | 8181254 | Setting default security features for use with web applications and extensions | |||
5001 | 8181248 | System and method of detecting anomaly malicious code by using process behavior prediction technique | |||
5002 | 8181245 | Proxy-based malware scan | |||
5003 | 8181238 | Systems and/or methods for streaming reverse HTTP gateway, and network including the same | |||
5004 | 8181234 | Authentication system in client/server system and authentication method thereof | |||
5005 | 8181034 | Secure data utilization | |||
5006 | 8181027 | Compressed data scrambled distribution device and playback device thereof | |||
5007 | 8181026 | Method and apparatus for input of coded image data | |||
5008 | 8181025 | Method and apparatus for registering agents onto a virtual machine monitor | |||
5009 | 8181024 | Data processing apparatus | |||
5010 | 8181023 | Information processing device and information processing system | |||
5011 | 8181019 | Systems and methods for managing CRLS for a multi-core system | |||
5012 | 8181015 | System and method for establishing historical usage-based hardware trust | |||
5013 | 8181006 | Method and device for securely configuring a terminal by means of a startup external data storage device | |||
5014 | 8180060 | Telemedical system | |||
5015 | 8180049 | Signature schemes using bilinear mappings | |||
5016 | 8179227 | Employing external storage devices as media for access control panel control information | |||
5017 | 8176544 | Network security system having a device profiler communicatively coupled to a traffic monitor | |||
5018 | 8176542 | Validating the origin of web content | |||
5019 | 8176540 | Resource based non-interactive entity application proxy method and system | |||
5020 | 8176538 | Information processing system, recording medium storing control program, and computer data signal embodied in a carrier wave | |||
5021 | 8176330 | Method, apparatus and article for off-line certification in mobile applications | |||
5022 | 8176328 | Authentication of access points in wireless local area networks | |||
5023 | 8176327 | Authentication protocol | |||
5024 | 8176326 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |||
5025 | 8176324 | Method and system for a secure virtual keyboard | |||
5026 | 8176106 | On-chip estimation of key-extraction parameters for physical tokens | |||
5027 | 8175330 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
5028 | 8175322 | Method of digital watermark and the corresponding device, and digital camera which can append watermark | |||
5029 | 8175037 | Method for updating a routing entry | |||
5030 | 8171562 | System and methods for protecting against denial of service attacks | |||
5031 | 8171549 | Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data, files and their transfer | |||
5032 | 8171533 | Managing web single sign-on applications | |||
5033 | 8171525 | Enabling users to select between secure service providers using a central trusted service manager | |||
5034 | 8171456 | Method for auditing compliance of an electronic platform and/or a computer program present on said platform, and device and computer program corresponding thereto | |||
5035 | 8171304 | Method, system and computer program product for multiple biometric template screening | |||
5036 | 8171297 | System and method using information based indicia for securing and authenticating transactions | |||
5037 | 8171293 | Receiver non-repudiation via a secure device | |||
5038 | 8171292 | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |||
5039 | 8171288 | System and method for authenticating users in a computer network | |||
5040 | 8171287 | Access control system for information services based on a hardware and software signature of a requesting device | |||
5041 | 8171085 | Methods and apparatuses for authenticating electronic messages | |||
5042 | 8170275 | Determining document authenticity in a closed-loop process | |||
5043 | 8170206 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
5044 | 8169298 | Electric hand tool device and battery pack therefor | |||
5045 | 8166565 | Encryption and access method and system for peer-to-peer distributed file storage | |||
5046 | 8166532 | Decentralized access control framework | |||
5047 | 8166308 | System and method for authenticating a gaming device | |||
5048 | 8166306 | Semantic digital signatures | |||
5049 | 8166305 | Set of metadata for association with a composite media item and tool for creating such set of metadata | |||
5050 | 8166302 | Storage device with traceable watermarked content | |||
5051 | 8166297 | Systems and methods for controlling access to encrypted data stored on a mobile device | |||
5052 | 8166296 | User authentication system | |||
5053 | 8165300 | System and method for generalized authentication | |||
5054 | 8165294 | Rollback attack prevention system and method | |||
5055 | 8164419 | Electronic lock box with time-related data encryption based on user-selected pin | |||
5056 | 8161545 | Keyboard with programmable username and password keys and system | |||
5057 | 8161531 | System and method for managing electronic communications | |||
5058 | 8161284 | System, method and computer readable medium for message authentication to subscribers of an internet service provider | |||
5059 | 8161283 | Method and device for establishing a secure route in a wireless network | |||
5060 | 8161282 | System and method for requesting and issuing an authorization document | |||
5061 | 8161278 | System and method for distributing keys in a wireless network | |||
5062 | 8156548 | Identification and authentication system and method | |||
5063 | 8156547 | Methods and systems for device-independent portable session synchronization | |||
5064 | 8156545 | Method and apparatus for authorizing a communication interface | |||
5065 | 8156540 | System and method for managing feature enablement in an information handling system | |||
5066 | 8156537 | Method and system for access control using resource filters | |||
5067 | 8156341 | Pattern recognition method and apparatus for data protection | |||
5068 | 8156337 | Systems and methods for authenticating communications in a network medium | |||
5069 | 8156332 | Peer-to-peer security authentication protocol | |||
5070 | 8156330 | Terminal for exchanging electronic business cards | |||
5071 | 8156329 | Network device management apparatus and control method thereof | |||
5072 | 8156322 | Critical security parameter generation and exchange system and method for smart-card memory modules | |||
5073 | 8155623 | System and method for obtaining information from a wireless modem | |||
5074 | 8151349 | Masking mechanism that facilitates safely executing untrusted native code | |||
5075 | 8151344 | Method and apparatus to authenticate a user | |||
5076 | 8151332 | Digital identity management | |||
5077 | 8151330 | System and method of using personal data | |||
5078 | 8151317 | Method and system for policy-based initiation of federation management | |||
5079 | 8151119 | Method and apparatus for secure data mirroring a storage system | |||
5080 | 8151114 | Dynamic enabling of functionality in electronic document readers | |||
5081 | 8150096 | Video fingerprinting to identify video content | |||
5082 | 8150041 | Secure computation of private values | |||
5083 | 8146156 | Archive of text captures from rendered documents | |||
5084 | 8146139 | System and method of user authentication using handwritten signatures for an MFP | |||
5085 | 8146134 | Scalable firewall policy management platform | |||
5086 | 8145911 | System and method for the electronic management and execution of transaction documents | |||
5087 | 8145910 | System and method to enforce collaboration rules for timestamps of a collaboration event | |||
5088 | 8145909 | Digitally signing an electronic document using seed data | |||
5089 | 8145908 | Web content defacement protection system | |||
5090 | 8145897 | Direct anonymous attestation scheme with outsourcing capability | |||
5091 | 8145707 | Sending digitally signed emails via a web-based email system | |||
5092 | 8144870 | Encoding and detecting apparatus | |||
5093 | 8144864 | Method for speeding up the computations for characteristic 2 elliptic curve cryptographic systems | |||
5094 | 8141140 | Methods and systems for single sign on with dynamic authentication levels | |||
5095 | 8141139 | Federated single sign-on (F-SSO) request processing using a trust chain having a custom module | |||
5096 | 8141136 | Method and system of replacing smart card | |||
5097 | 8140852 | Authenticating serialized commodities | |||
5098 | 8140850 | Systems and methods for watermarking software and other media | |||
5099 | 8140847 | Digital safe | |||
5100 | 8140846 | System for managing program applications storable in a mobile terminal | |||
5101 | 8140012 | Bluetooth security profile | |||
5102 | 8136091 | Architectural support for software-based protection | |||
5103 | 8135961 | Method and computing device for interfacing with a memory device in operations | |||
5104 | 8135955 | Device and method for detecting a manipulation of an information signal | |||
5105 | 8135953 | System and method for providing variable security level in a wireless communication system | |||
5106 | 8135949 | Digital content distribution | |||
5107 | 8135166 | Embedding geo-location information in media | |||
5108 | 8135129 | Protection of a modular exponentiation calculation performed by an integrated circuit | |||
5109 | 8134972 | Communication system and gateway apparatus | |||
5110 | 8134729 | Image transfer system and image forming apparatus | |||
5111 | 8132240 | Electric field unit and method for executing a protected function of an electric field unit | |||
5112 | 8132235 | Method, system, and computer program product for providing e-token based access control for virtual world spaces | |||
5113 | 8132228 | Electronic document conversion device and electronic document conversion method | |||
5114 | 8132023 | Apparatus and method for performing transparent hash functions | |||
5115 | 8132022 | Apparatus and method for employing configurable hash algorithms | |||
5116 | 8132015 | Method and system for loading a secure firmware update on an adapter device of a computer system | |||
5117 | 8132011 | System and method for authenticating at least a portion of an e-mail message | |||
5118 | 8132009 | Authentication system | |||
5119 | 8132008 | Method and apparatus for communicating information between a security panel and a security server | |||
5120 | 8132007 | PANA authentication method and system | |||
5121 | 8132006 | Cryptographic authentication and/or establishment of shared cryptographic keys, including, but not limited to, password authenticated key exchange (PAKE) | |||
5122 | 8131997 | Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel | |||
5123 | 8131996 | Distributed management of a certificate revocation list | |||
5124 | 8131644 | Formular update | |||
5125 | 8130962 | Content protection method and apparatus | |||
5126 | 8130771 | Packet-forwarding for proxy mobile IP | |||
5127 | 8127340 | Communication apparatus | |||
5128 | 8127151 | Hardware-based key generation and recovery | |||
5129 | 8127150 | Data security | |||
5130 | 8127140 | Group signature scheme | |||
5131 | 8127139 | Handheld devices and methods for extracting data | |||
5132 | 8127138 | Method for embedding information in sonar | |||
5133 | 8127137 | Watermark payload encryption for media including multiple watermarks | |||
5134 | 8127136 | Method for security association negotiation with extensible authentication protocol in wireless portable internet system | |||
5135 | 8127124 | Remote configuration of computing platforms | |||
5136 | 8125311 | Medical diagnostic imaging system, information processing method for medical diagnostic imaging system, ultrasonic imaging diagnostic apparatus, and operation device | |||
5137 | 8122511 | Attribute information providing method | |||
5138 | 8122487 | Method and apparatus for checking proximity between devices using hash chain | |||
5139 | 8122485 | Authentication techniques | |||
5140 | 8122255 | Methods and systems for digital authentication using digitally signed images | |||
5141 | 8122252 | Cascaded digital signatures | |||
5142 | 8122172 | Portable information security device | |||
5143 | 8121343 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
5144 | 8121288 | Encrypting and decrypting a data stream | |||
5145 | 8117666 | File system operation and digital rights management (DRM) | |||
5146 | 8117645 | Systems and methods of controlling network access | |||
5147 | 8117462 | Delivery point validation system | |||
5148 | 8117457 | Trusted hardcopy document | |||
5149 | 8117454 | Fast update message authentication with key derivation in mobile IP systems | |||
5150 | 8117451 | Device controller, method for controlling a device, and program therefor | |||
5151 | 8117450 | System and method for secure data transmission | |||
5152 | 8117449 | Method to detect man-in-the-middle (MITM) or relay attacks | |||
5153 | 8117448 | Information processing apparatus, information processing method, and program | |||
5154 | 8117446 | Method and system for secured real time protocol in scalable distributed conference applications | |||
5155 | 8117445 | Near field communication, security and non-volatile memory integrated sub-system for embedded portable applications | |||
5156 | 8117444 | Host computer, mobile communication device, program, and recording medium | |||
5157 | 8117442 | Data processor | |||
5158 | 8117440 | Methods and apparatus for enabling unified (internet protocol version) IPV6/IPV4 routing services over IPv4-only interfaces | |||
5159 | 8117325 | Policy-based cross-domain access control for SSL VPN | |||
5160 | 8116514 | Water mark embedding and extraction | |||
5161 | 8116457 | Methods, apparatuses, and products for a secure circuit | |||
5162 | 8116454 | Method and apparatus for providing security in a radio frequency identification system | |||
5163 | 8112801 | Method and apparatus for detecting malware | |||
5164 | 8112790 | Methods and apparatus for authenticating a remote service to another service on behalf of a user | |||
5165 | 8112788 | Systems and methods of controlling network access | |||
5166 | 8112787 | System and method for securing a credential via user and server verification | |||
5167 | 8112786 | Security policy generation | |||
5168 | 8112632 | Security devices, systems and computer program products | |||
5169 | 8112630 | Device, system, and method for reporting execution flow of program | |||
5170 | 8112627 | System for self-service recharging and method for the same | |||
5171 | 8112624 | Method and system for certificate revocation list compression | |||
5172 | 8111413 | Approach for securely printing policy-enabled electronic documents based on print driver and printing device support | |||
5173 | 8108939 | Method and apparatus to facilitate security-enabled content caching | |||
5174 | 8108909 | Systems and methods of controlling network access | |||
5175 | 8108907 | Authentication of user database access | |||
5176 | 8108688 | Information processing apparatus, method, and program | |||
5177 | 8108685 | Apparatus and method for indicating password quality and variety | |||
5178 | 8108682 | Hash value generator | |||
5179 | 8108681 | Selecting bit positions for storing a digital watermark | |||
5180 | 8108680 | Preventing unauthorized poaching of set top box assets | |||
5181 | 8108679 | Firewall system | |||
5182 | 8108678 | Identity-based signcryption system | |||
5183 | 8108677 | Method and apparatus for authentication of session packets for resource and admission control functions (RACF) | |||
5184 | 8108676 | Link key injection mechanism for personal area networks | |||
5185 | 8108675 | External signature device for a PC with wireless communication capacity | |||
5186 | 8108674 | Transmitting/receiving system and method, transmitting apparatus and method, receiving apparatus and method, and program used therewith | |||
5187 | 8108673 | Configuring interfaces of a switch using templates | |||
5188 | 8108672 | Transparent authentication process integration | |||
5189 | 8108671 | Method and system for controlling presentation of computer readable media on a media storage device | |||
5190 | 8108669 | Image forming apparatus for generating electronic signature | |||
5191 | 8107627 | Temporal proximity to verify physical proximity | |||
5192 | 8107626 | Method and system for enabling transfer of content between a storage device and a portable media player device | |||
5193 | 8107622 | System and method to preclude message modification in data authentication systems through efficent use of feedback in cryptographic functions | |||
5194 | 8104088 | Trusted operating environment for malware detection | |||
5195 | 8104084 | Authorizing a user to a device | |||
5196 | 8104073 | Exchange of network access control information using tightly-constrained network access control protocols | |||
5197 | 8103883 | Method and apparatus for enforcing use of danbury key management services for software applied full volume encryption | |||
5198 | 8103880 | Method for communication between computing devices using coded values | |||
5199 | 8103879 | Processing audio or video content with multiple watermark layers | |||
5200 | 8103878 | Control device, update method and control software | |||
5201 | 8103877 | Content identification and electronic tickets, coupons and credits | |||
5202 | 8103876 | System and method for checking digital certificate status | |||
5203 | 8103875 | Detecting email fraud through fingerprinting | |||
5204 | 8103874 | Object delivery authentication | |||
5205 | 8103873 | Method and system for processing auditory communications | |||
5206 | 8103872 | Contact-less tag with signature, and applications thereof | |||
5207 | 8103501 | System and method for generation and authentication of a signed document using voice analysis | |||
5208 | 8103069 | Registration apparatus, verification apparatus, registration method, verification method and program | |||
5209 | 8103052 | Method of embedding informaton into image | |||
5210 | 8099772 | Information terminal apparatus, information processing apparatus and information communication system | |||
5211 | 8099767 | Secure agent-less enterprise infrastructure discovery | |||
5212 | 8099764 | Secure push and status communication between client and server | |||
5213 | 8099761 | Protocol for device to station association | |||
5214 | 8099759 | System and method for determining a security encoding to be applied to outgoing messages | |||
5215 | 8099604 | Communication system, method for transferring information, and information-communication device | |||
5216 | 8099602 | Methods for integrating security in network communications and systems thereof | |||
5217 | 8099599 | Controlling access to data streams | |||
5218 | 8099598 | Secure messaging system with automatic recipient enrollment | |||
5219 | 8099594 | Certificate processing | |||
5220 | 8099593 | System and method for retrieving related certificates | |||
5221 | 8098828 | Key distribution | |||
5222 | 8098131 | Mobile terminal with a short-range communication unit | |||
5223 | 8095987 | Software anti-piracy protection | |||
5224 | 8095804 | Storing deleted data in a file system snapshot | |||
5225 | 8095799 | Ticket authorized secure installation and boot | |||
5226 | 8095798 | Systems and methods for media authentication | |||
5227 | 8095797 | Systems and methods for authenticating an electronic message | |||
5228 | 8095795 | Methods and apparatus for robust embedded data | |||
5229 | 8095794 | System and method of watermarking a signal | |||
5230 | 8095793 | Digital rights management apparatus and method | |||
5231 | 8095792 | One way authentication | |||
5232 | 8095660 | Method to enhance principal referencing in identity-based scenarios | |||
5233 | 8095107 | Voice messaging prioritization | |||
5234 | 8094872 | Three-dimensional wavelet based video fingerprinting | |||
5235 | 8094869 | Fragile and emerging digital watermarks | |||
5236 | 8094820 | Information recording/reproducing device | |||
5237 | 8091138 | Method and apparatus for controlling the presentation of confidential content | |||
5238 | 8091120 | Adaptive authentication methods, systems, devices, and computer program products | |||
5239 | 8091116 | Communication system and method | |||
5240 | 8090954 | Prevention of unauthorized forwarding and authentication of signatures | |||
5241 | 8090953 | Information storage system | |||
5242 | 8090952 | Counterfeit prevention system based on random positioning on a pattern | |||
5243 | 8090951 | Systems and methods for transparent configuration authentication of networked devices | |||
5244 | 8090950 | System and method for authenticating documents | |||
5245 | 8090949 | Certificate assignment strategies for efficient operation of the PKI-based security architecture in a vehicular network | |||
5246 | 8090948 | Image formation system having authentication function | |||
5247 | 8090946 | Inter-system binding method and application based on hardware security unit | |||
5248 | 8090945 | Systems and methods for multi-factor remote user authentication | |||
5249 | 8090944 | Method and apparatus for authenticating users of an emergency communication network | |||
5250 | 8090787 | Aggregation system for email and non-email messages | |||
5251 | 8090663 | Automated banking machine system and method | |||
5252 | 8090146 | Image watermarking | |||
2011 | |||||
5253 | 8087075 | Disconnected credential validation using pre-fetched service tickets | |||
5254 | 8087074 | One time password | |||
5255 | 8087072 | Provisioning of digital identity representations | |||
5256 | 8087070 | Predictive method for multi-party strengthening of authentication credentials with non-real time synchronization | |||
5257 | 8087065 | Method and system for implementing mandatory file access control in native discretionary access control environments | |||
5258 | 8087064 | Security extensions using at least a portion of layer 2 information or bits in the place of layer 2 information | |||
5259 | 8087062 | Method for restricting the use of an application program, system for authenticating the user of a measuring apparatus, authentication server, client apparatus and storage medium | |||
5260 | 8086867 | Secure identity and privilege system | |||
5261 | 8086864 | Low power HMAC encryption apparatus | |||
5262 | 8086863 | Method and a system for protecting path and data of a mobile agent within a network system | |||
5263 | 8086862 | Program data file storage method in broadcast receiver and broadcast receiver | |||
5264 | 8086861 | Information processing terminal and status notification method | |||
5265 | 8086860 | Method for preventing and detecting hash collisions of data during the data transmission | |||
5266 | 8086859 | Generation of electronic signatures | |||
5267 | 8086858 | Secure method of termination of service notification | |||
5268 | 8086857 | Identity-based-encryption messaging system | |||
5269 | 8086855 | Access to PLMN networks for non-PLMN devices, and to issues arising in interfaces in general between PLMN and non-PLMN networks | |||
5270 | 8086854 | Content protection information using family of quadratic multivariate polynomial maps | |||
5271 | 8086853 | Automatic centralized authentication challenge response generation | |||
5272 | 8086839 | Authentication for resume boot path | |||
5273 | 8085975 | Methods and apparatus for embedding watermarks | |||
5274 | 8082591 | Authentication gateway apparatus for accessing ubiquitous service and method thereof | |||
5275 | 8082580 | Session layer pinhole management within a network security device | |||
5276 | 8082576 | Network-agnostic content management | |||
5277 | 8082448 | System and method for user authentication using non-language words | |||
5278 | 8082447 | Systems and methods for end-to-end resource reservation authentication | |||
5279 | 8082446 | System and method for non-repudiation within a public key infrastructure | |||
5280 | 8082445 | Secure NFC apparatus and method for supporting various security modules | |||
5281 | 8082444 | System and method for adding new network devices to an existing network | |||
5282 | 8082443 | Pedigrees for quantum cryptography | |||
5283 | 8081754 | Key update method and apparatus thereof | |||
5284 | 8079118 | Method for vehicle internetworks | |||
5285 | 8079091 | Compliance processing of rights managed data | |||
5286 | 8079086 | Malicious mobile code runtime monitoring system and methods | |||
5287 | 8078891 | Method, device, and system for guaranteed minimum processor power state dwell time | |||
5288 | 8078879 | Data certification method and apparatus | |||
5289 | 8078878 | Securing documents with electronic signatures | |||
5290 | 8078876 | Apparatus and method for direct anonymous attestation from bilinear maps | |||
5291 | 8078875 | Verification of authenticity | |||
5292 | 8078873 | Two-way authentication between two communication endpoints using a one-way out-of-band (OOB) channel | |||
5293 | 8078871 | Apparatus and system for remotely verifying integrity of memory for mobile platform, and method therefor | |||
5294 | 8078870 | HTTP-based authentication | |||
5295 | 8078689 | Methods and apparatus for providing access to persistent application sessions | |||
5296 | 8077910 | Digital watermark embedding and detection | |||
5297 | 8077907 | System and method for the generation of correlation-based digital watermarks | |||
5298 | 8077866 | Protecting against security attack | |||
5299 | 8074284 | Device provided with rewritable circuit, updating system, updating method, updating program and integrated circuit | |||
5300 | 8074269 | System and method for controlling devices at a location | |||
5301 | 8074264 | Secure key distribution to internet clients | |||
5302 | 8074258 | Obtaining digital identities or tokens through independent endpoint resolution | |||
5303 | 8074080 | System and method for generating and utilizing organically grown content in a directory assistance environment | |||
5304 | 8074074 | Compressed data scrambled distribution device and playback device thereof | |||
5305 | 8074072 | Challenge response-based device authentication system and method | |||
5306 | 8074070 | Method for fast, secure 802.11 re-association without additional authentication, accounting, and authorization infrastructure | |||
5307 | 8073139 | Method of compressing a cryptographic value | |||
5308 | 8069469 | Addressing security in asymmetrical networks | |||
5309 | 8069467 | Privacy protection through restrictions on usernames and other online identifiers | |||
5310 | 8069353 | Low-latency data decryption interface | |||
5311 | 8069352 | Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session | |||
5312 | 8069351 | Remote control device | |||
5313 | 8069350 | Communication protocol and electronic communication system, in particular authentication control system, as well as corresponding method | |||
5314 | 8068812 | Method and mobile communication system with a security function for short messaging | |||
5315 | 8068811 | Mobile communication terminal device | |||
5316 | 8068614 | Methods and apparatus for batch bound authentication | |||
5317 | 8065731 | System and method for malware containment in communication networks | |||
5318 | 8065729 | Method and apparatus for generating network attack signature | |||
5319 | 8065724 | Computer method and apparatus for authenticating unattended machines | |||
5320 | 8065715 | Authenticating a user of a wireless data processing device | |||
5321 | 8065533 | Reliable storage medium access control method and device | |||
5322 | 8065527 | System and method for embedding a written signature into a secure electronic document | |||
5323 | 8065525 | Device with built-in user authentication and method for user authentication and identity theft protection | |||
5324 | 8065524 | Authentication processing apparatus and authentication processing method | |||
5325 | 8064602 | Method and application for authentication of a wireless communication using an expiration marker | |||
5326 | 8064468 | Method for providing function of registering in session initiation protocol and SIP load balancer of enabling the method | |||
5327 | 8061589 | Electronic voting system | |||
5328 | 8060941 | Method and system to authenticate an application in a computing platform operating in trusted computing group (TCG) domain | |||
5329 | 8060939 | Method and system for securing wireless local area networks | |||
5330 | 8060938 | Proprietary portable audio player system for protecting digital content copyrights | |||
5331 | 8060924 | On-line centralized and local authorization of executable files | |||
5332 | 8060918 | Method and system for verifying identity | |||
5333 | 8060917 | System and method for hosting multiple kerberos service principal names | |||
5334 | 8060914 | Anonymous selectable credential system and method therefor | |||
5335 | 8060755 | Apparatus and method for providing user-generated key schedule in a microprocessor cryptographic engine | |||
5336 | 8060754 | Cryptographic processing device and method for adapting to shared-cache attacks | |||
5337 | 8060749 | Authenticated program execution method | |||
5338 | 8060748 | Secure end-of-life handling of electronic devices | |||
5339 | 8060747 | Digital signatures for embedded code | |||
5340 | 8060746 | E-mail transfer method and device | |||
5341 | 8060745 | Security for wireless transmission | |||
5342 | 8060735 | Portable device and method for externally generalized starting up of a computer system | |||
5343 | 8060596 | Methods and systems for normalizing data loss prevention categorization information | |||
5344 | 8059860 | Steganographic encoding | |||
5345 | 8059817 | Method and apparatus for encrypted communications using IPsec keys | |||
5346 | 8059816 | Secret sharing technique with low overhead information content | |||
5347 | 8056132 | Client-side technique for detecting software robots | |||
5348 | 8056131 | Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data and files and their transfer | |||
5349 | 8056129 | Validating active computer terminal sessions | |||
5350 | 8056121 | Virtual universe account protection | |||
5351 | 8056117 | Network and domain-creating method thereof | |||
5352 | 8055913 | Systems and methods for secure transaction management and electronic rights protection | |||
5353 | 8055911 | Method for backing up and restoring an encryption key | |||
5354 | 8055901 | Optical signature to enable image correction | |||
5355 | 8055898 | Tag authentication system | |||
5356 | 8055894 | Process and streaming server for encrypting a data stream with bandwidth based variation | |||
5357 | 8055708 | Multimedia spaces | |||
5358 | 8055587 | Man in the middle computer technique | |||
5359 | 8054971 | Free-hand mobile messaging-method and device | |||
5360 | 8054968 | Method and apparatus for providing prepaid music card for deciphering recorded broadcast audio signals | |||
5361 | 8051488 | Trial usage for encrypted subscription-based data | |||
5362 | 8051461 | System and method for establishing secured connection between home network devices | |||
5363 | 8051460 | Systems and methods of controlling network access | |||
5364 | 8051300 | System and method for reducing latency on remotely-booted information handling systems | |||
5365 | 8051295 | Benchmarks for digital watermarking | |||
5366 | 8051293 | Data processing systems and methods | |||
5367 | 8051291 | Unique block header patterns for media verification | |||
5368 | 8051290 | Increasing integrity of watermarks using robust features | |||
5369 | 8051289 | Electronic document management and delivery | |||
5370 | 8051285 | Battery processor circuitry with separate public and private bus | |||
5371 | 8051283 | Message security processing system and method for web services | |||
5372 | 8050566 | System and methods for quantum key distribution over WDM links | |||
5373 | 8050410 | Distributed encryption methods and systems | |||
5374 | 8046834 | Method of polymorphic detection | |||
5375 | 8046827 | Access control of interaction context of application | |||
5376 | 8046589 | Renewable and private biometrics | |||
5377 | 8046586 | Method and system for determining the compliance of encrypted and non-encrypted display outputs | |||
5378 | 8046585 | Verifying authenticity of an attribute value signature | |||
5379 | 8046584 | Message authentication device | |||
5380 | 8046583 | Wireless terminal | |||
5381 | 8046580 | Data processing apparatus and method for generation of protection compression encoded data | |||
5382 | 8046571 | System-on-a-chip (SoC) security using one-time programmable memories | |||
5383 | 8045709 | Digital broadcasting conditional access terminal and method | |||
5384 | 8045705 | Simultaneous scalar multiplication method | |||
5385 | 8045530 | Method and apparatus for authentication in a wireless telecommunications system | |||
5386 | 8042190 | Pre-boot protected memory channel | |||
5387 | 8042162 | Method and system for native authentication protocols in a heterogeneous federated environment | |||
5388 | 8042159 | Website log in system with user friendly combination lock | |||
5389 | 8041960 | Secure creation and management of device ownership keys | |||
5390 | 8041953 | Identity-based-encryption message management system | |||
5391 | 8041952 | Systems and methods for printing documents containing electronic signatures | |||
5392 | 8041951 | Code-based communication connection management | |||
5393 | 8041949 | Information processing scheme for realizing contents transfer and copyright protection | |||
5394 | 8041939 | Addressing and routing mechanism for web server clusters | |||
5395 | 8041073 | Decoding watermark information items of a watermarked audio or video signal using correlation | |||
5396 | 8037542 | Team based row level security system and method | |||
5397 | 8037514 | Method and apparatus for securely disseminating security server contact information in a network | |||
5398 | 8037513 | Image processing system including plurality of image processing apparatuses used by plurality of users, image processing apparatus included in the image processing system | |||
5399 | 8037491 | Data transmitting method, data transmitting system, data receiving method and receiving terminal | |||
5400 | 8037314 | Replacing blinded authentication authority | |||
5401 | 8037312 | Method and apparatus for digital signature authentication, and computer product | |||
5402 | 8037311 | Digital watermark systems and methods | |||
5403 | 8037310 | Document authentication combining digital signature verification and visual comparison | |||
5404 | 8037309 | Portable data storage device with encryption system | |||
5405 | 8037308 | Electronic certificate issuance system, electronic certificate issuing device, communication device, and program therefor | |||
5406 | 8037307 | System and method for securing on-line documents using authentication codes | |||
5407 | 8037305 | Securing multiple links and paths in a wireless mesh network including rapid roaming | |||
5408 | 8037300 | Information processing apparatus with certificate invalidity determination | |||
5409 | 8037193 | Virtual token | |||
5410 | 8036387 | Method for the transmission of management data | |||
5411 | 8036381 | Partial multiple encryption | |||
5412 | 8036380 | Efficient data integrity protection | |||
5413 | 8036133 | Efficient techniques for error detection and authentication in wireless networks | |||
5414 | 8032942 | Configuration of virtual trusted platform module | |||
5415 | 8032756 | Information processing system | |||
5416 | 8032755 | Request linked digital watermarking | |||
5417 | 8032754 | Systems and methods for embedding media forensic identification markings | |||
5418 | 8032753 | Server and system for transmitting certificate stored in fixed terminal to mobile terminal and method using the same | |||
5419 | 8032752 | Data transmission apparatus, data reception apparatus, and data transfer system | |||
5420 | 8032751 | E-mail certification service | |||
5421 | 8032746 | Tamper-resistant communication layer for attack mitigation and reliable intrusion detection | |||
5422 | 8031866 | Cryptographic processing apparatus and cryptographic processing method, and computer program | |||
5423 | 8031055 | Tag authentication method using rotation, and tag and reader performing the method | |||
5424 | 8028333 | Method and system for the authentication of a public key certificate | |||
5425 | 8028330 | System, apparatus, and program for biometric authentication | |||
5426 | 8028172 | Systems and methods for updating a secure boot process on a computer with a hardware security module | |||
5427 | 8028171 | Signature apparatus, verifying apparatus, proving apparatus, encrypting apparatus, and decrypting apparatus | |||
5428 | 8028170 | Method of authenticating print media using a mobile telephone | |||
5429 | 8028169 | Electronic document management program, electronic document management system and electronic document management method | |||
5430 | 8028167 | Method and apparatus for certificate roll-over | |||
5431 | 8028166 | Versatile secure and non-secure messaging | |||
5432 | 8028161 | System for negotiating security association on application layer | |||
5433 | 8027506 | Geographical encoding imagery and video | |||
5434 | 8027472 | Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel | |||
5435 | 8027468 | Method and system for camera sensor fingerprinting | |||
5436 | 8024783 | Modular agent architecture | |||
5437 | 8024782 | Cumulative login credit | |||
5438 | 8024776 | Relay device, authentication server, and authentication method | |||
5439 | 8024770 | Techniques for managing security contexts | |||
5440 | 8024724 | Firmware download | |||
5441 | 8024578 | Systems and methods for online identity verification | |||
5442 | 8024575 | System and method for creation and use of strong passwords | |||
5443 | 8024574 | Unidirectional message masking and validation system and method | |||
5444 | 8024572 | Data storage and removal | |||
5445 | 8024570 | Method and system for communication via a computer network | |||
5446 | 8024569 | Method for secure remote backup | |||
5447 | 8024568 | Method and system for verification of an endpoint security scan | |||
5448 | 8024567 | Instant log-in method for authentificating a user and settling bills by using two different communication channels and a system thereof | |||
5449 | 8024559 | Security authentication system and method | |||
5450 | 8024558 | Method and system for providing synchronous running encoding and encryption | |||
5451 | 8024484 | Caching signatures | |||
5452 | 8023693 | System and method for solving the "birthday problem" with watermarking | |||
5453 | 8023652 | Apparatus and method for implementing digital rights management systems in low-efficiency storage device | |||
5454 | 8023478 | System and method for securing mesh access points in a wireless mesh network, including rapid roaming | |||
5455 | 8020211 | Network security system having a device profiler communicatively coupled to a traffic monitor | |||
5456 | 8020204 | Method and apparatus for migrating a virtual TPM instance and preserving uniqueness and completeness of the instance | |||
5457 | 8020197 | Explicit delegation with strong authentication | |||
5458 | 8020196 | Secure transmission and exchange of standardized data | |||
5459 | 8020008 | Microprocessor identity device | |||
5460 | 8020004 | Forensic marking using a common customization function | |||
5461 | 8020003 | Creation of electronically processable signature files | |||
5462 | 8020002 | Method of authenticating print medium using printing mobile device | |||
5463 | 8019999 | Wireless receiver device revocation management | |||
5464 | 8019997 | Information processing apparatus and method, recording medium, and program | |||
5465 | 8019996 | Method for encrypted communication with a computer system and system therefor | |||
5466 | 8019995 | Method and apparatus for preventing internet phishing attacks | |||
5467 | 8019994 | Authentication of a request to alter at least one of a BIOS and a setting associated with the BIOS | |||
5468 | 8019333 | Apparatus and methods for product acceptance testing on a wireless device | |||
5469 | 8015615 | Determining advertising activity | |||
5470 | 8015600 | Employing electronic certificate workflows | |||
5471 | 8015597 | Disseminating additional data used for controlling access | |||
5472 | 8015417 | Remote access system, gateway, client device, program, and storage medium | |||
5473 | 8015412 | Authentication of an object | |||
5474 | 8015411 | Active watermarks and watermark agents | |||
5475 | 8015409 | Authentication for licensing in an embedded system | |||
5476 | 8015408 | Trust evaluation for a mobile software agent on a trusted computing platform | |||
5477 | 8015407 | Pre-control of a program in an additional chip card of a terminal | |||
5478 | 8015405 | Proving apparatus and verification apparatus applied to deniable zero-knowledge interactive proof | |||
5479 | 8015404 | System and method for collecting traffic data using probe vehicles | |||
5480 | 8015400 | Certificate management and transfer system and method | |||
5481 | 8014527 | Apparatus and method for reusing pair of public and private keys | |||
5482 | 8014524 | Scaling independent technique for watermarking images with recorder shut-off | |||
5483 | 8012015 | Verifying whether a gaming device is communicating with a gaming server | |||
5484 | 8011002 | Forcing a mobile browser to access web content through a proxy | |||
5485 | 8011001 | Method for managing security in a mobile communication system using proxy mobile internet protocol and system thereof | |||
5486 | 8010999 | Cable installation support and management system | |||
5487 | 8010998 | Techniques for limiting remote control of a computer system | |||
5488 | 8010805 | Secure porting of information from one device to another | |||
5489 | 8010804 | Method to protect secrets against encrypted section attack | |||
5490 | 8010800 | Search engine and digital rights management | |||
5491 | 8010796 | System and method for digitally signing an electronic document | |||
5492 | 8010795 | Secure information transfer using dedicated public key pairs | |||
5493 | 8010792 | Content transmission apparatus, content reception apparatus and content transmission method | |||
5494 | 8010782 | Method and system for mediated secure computation | |||
5495 | 8010688 | Content use management system, content use management method, and client device | |||
5496 | 8009831 | Method and system for hiding the decryption key in a dispersive way | |||
5497 | 8009829 | Method and system for deploying advanced cryptographic algorithms | |||
5498 | 8006314 | System for identifying content of digital data | |||
5499 | 8006309 | Information processing device and communication method | |||
5500 | 8006307 | Method and apparatus for distributing secure digital content that can be indexed by third party search engines | |||
5501 | 8006301 | Method and systems for computer security | |||
5502 | 8006291 | Multi-channel multi-factor authentication | |||
5503 | 8006283 | Method and system for triggering internet applications using messages | |||
5504 | 8006103 | TPM device for multi-processor systems | |||
5505 | 8006101 | Radio transceiver or other encryption device having secure tamper-detection module | |||
5506 | 8006100 | Enhancing trusted platform module performance | |||
5507 | 8006095 | Configurable signature for authenticating data or program code | |||
5508 | 8006094 | Trustworthy timestamps and certifiable clocks using logs linked by cryptographic hashes | |||
5509 | 8006093 | Instant messaging private tags | |||
5510 | 8006092 | Digital watermarks for checking authenticity of printed objects | |||
5511 | 8006089 | Multiple PANA sessions | |||
5512 | 8005904 | Electronic business card exchange system and method | |||
5513 | 8005258 | Methods and apparatus for enhancing the robustness of watermark extraction from digital host content | |||
5514 | 8001593 | Authentication method and unit, and electronic apparatus having authentication unit | |||
5515 | 8001588 | Secure single sign-on authentication between WSRP consumers and producers | |||
5516 | 8001584 | Method for secure device discovery and introduction | |||
5517 | 8001388 | Software self-checking systems and methods | |||
5518 | 8001383 | Secure serial number | |||
5519 | 8001382 | System for and method of monitoring an item | |||
5520 | 8001380 | System and method for providing unique encryption key | |||
5521 | 8001379 | Credential generation system and method for communications devices and device management servers | |||
5522 | 8001378 | Method and system for protecting data of a mobile agent within a network system | |||
5523 | 8001376 | Fixed client identification system for positive identification of client to server | |||
5524 | 8000704 | Fast network attachment | |||
5525 | 8000680 | Security management method and apparatus in multimedia middleware, and storage medium therefor | |||
5526 | 8000478 | Key handshaking method and system for wireless local area networks | |||
5527 | 7999685 | Deterministic key pre-distribution and operational key management for moblie body sensor networks | |||
5528 | 7996910 | Techniques for detecting and preventing unintentional disclosures of sensitive data | |||
5529 | 7996885 | Password application | |||
5530 | 7996861 | Flexible interface for secure input of pin code | |||
5531 | 7996686 | Branch trace methodology | |||
5532 | 7996681 | Methods for implementing color change frequency as image signature | |||
5533 | 7996680 | Secure data log management | |||
5534 | 7996677 | Digitally certified stationery | |||
5535 | 7996674 | LDAP user authentication | |||
5536 | 7996672 | Support for multiple digital rights management systems for same content | |||
5537 | 7996569 | Method and system for zero copy in a virtualized network environment | |||
5538 | 7995760 | Method for ensuring data transmission security, communication system and communication device | |||
5539 | 7992216 | Message service indication system and method | |||
5540 | 7992215 | Annotation system for creating and retrieving media and methods relating to same | |||
5541 | 7992202 | Apparatus and method for inputting graphical password using wheel interface in embedded system | |||
5542 | 7992198 | Unified authentication for web method platforms | |||
5543 | 7992196 | Apparatus and method for performing hosted and secure identity authentication using biometric voice verification over a digital network medium | |||
5544 | 7992195 | Efficient browser-based identity management providing personal control and anonymity | |||
5545 | 7992193 | Method and apparatus to secure AAA protocol messages | |||
5546 | 7992191 | System and method for controlling a websphere portal without the requirement of having the administrator credential ID and password | |||
5547 | 7992177 | Point-to-multipoint high definition multimedia transmitter and receiver | |||
5548 | 7992004 | Digital watermarked imagery, video, maps and signs | |||
5549 | 7992000 | Session initial protocol identification method | |||
5550 | 7991995 | Method and apparatus for protecting information and privacy | |||
5551 | 7991188 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
5552 | 7987502 | Secure streaming container | |||
5553 | 7987494 | Method and apparatus providing end to end protection for a document | |||
5554 | 7987375 | Communication apparatus, control method thereof and computer readable medium | |||
5555 | 7987370 | Digital watermark systems and methods | |||
5556 | 7987369 | Using watermarking to reduce communication overhead | |||
5557 | 7987368 | Peer-to-peer networks with protections | |||
5558 | 7987367 | Method and apparatus for key agreement between devices using polynomial ring | |||
5559 | 7987366 | Key management for network elements | |||
5560 | 7987364 | Method of detecting and authenticating connection target for wireless communication apparatus | |||
5561 | 7987363 | Secure wireless communications system and related method | |||
5562 | 7987362 | Method and apparatus for using imperfections in computing devices for device authentication | |||
5563 | 7987359 | Information communication system, information communication apparatus and method, and computer program | |||
5564 | 7987351 | Method and system for enhanced boot protection | |||
5565 | 7984510 | Terminal device and computer readable medium | |||
5566 | 7984507 | Document access management method and system | |||
5567 | 7984486 | Using GAA to derive and distribute proxy mobile node home agent keys | |||
5568 | 7984483 | System and method for working in a virtualized computing environment through secure access | |||
5569 | 7984479 | Policy-based security certificate filtering | |||
5570 | 7984303 | Flash memory devices with security features | |||
5571 | 7984301 | Bi-processor architecture for secure systems | |||
5572 | 7984300 | System and method of authenicating a digitally captured image | |||
5573 | 7984298 | Method, system and authentication centre for authenticating in end-to-end communications based on a mobile network | |||
5574 | 7984297 | System and method of spam proof e-mail bounce tracking | |||
5575 | 7984295 | Method and apparatus for transmitting message to wireless devices that are classified into groups | |||
5576 | 7984286 | Apparatus and method for secure boot environment | |||
5577 | 7983444 | Client-side watermarking using hybrid I-Frames | |||
5578 | 7983440 | Selection of I-frames for client-side watermarking | |||
5579 | 7979910 | Data reproducing apparatus and transmitter authenticating data reproducing apparatus | |||
5580 | 7979897 | System and article of manufacture for bidirectional data transfer | |||
5581 | 7979894 | Electronic verification service systems and methods | |||
5582 | 7979731 | Time authentication device, time authentication method, computer program, recording medium, integrated circuit, and time authentication system | |||
5583 | 7979722 | Flash memory distribution of digital content | |||
5584 | 7979720 | Data security for digital data storage | |||
5585 | 7979711 | System and method for privacy preserving query verification | |||
5586 | 7979710 | Film fingerprinting | |||
5587 | 7979708 | Digital rights management | |||
5588 | 7979707 | Secure seed generation protocol | |||
5589 | 7979706 | Systems and methods for queuing an action in industrial automation systems | |||
5590 | 7979705 | Conditional suppression of card holder verification | |||
5591 | 7979704 | Authentication system | |||
5592 | 7979703 | Determining the reputation of a sender of communications | |||
5593 | 7979693 | Relay apparatus for encrypting and relaying a frame | |||
5594 | 7978875 | Signal processing utilizing host carrier information | |||
5595 | 7978856 | Methods of managing a key cache | |||
5596 | 7975293 | Authentication system, authentication method and terminal device | |||
5597 | 7975290 | Verifying authenticity of instant messaging messages | |||
5598 | 7975287 | System and method for validating a user of an account using a wireless device | |||
5599 | 7975144 | Systems and methods for server aided processing of a signed receipt | |||
5600 | 7975143 | Method, system, and program product for generating and validating digital signatures | |||
5601 | 7975142 | Ring authentication method for concurrency environment | |||
5602 | 7975141 | Method of sharing bus key and apparatus therefor | |||
5603 | 7975139 | Use and generation of a session key in a secure socket layer connection | |||
5604 | 7975138 | Systems and methods for mutually authenticated transaction coordination messages over insecure connections | |||
5605 | 7975137 | Method and system for securely extending a path of a mobile agent within a network system | |||
5606 | 7974603 | Authentication vector generating device, subscriber authentication module, mobile communication system, and authentication vector generation method | |||
5607 | 7974412 | Communication system, transmission device, reception device, and communication scheme | |||
5608 | 7971247 | Methods and apparatus for prevention of excessive control message traffic in a digital networking system | |||
5609 | 7971242 | Printing system | |||
5610 | 7971240 | Session key security protocol | |||
5611 | 7971228 | System and method for providing application-specific on-line charging in a communications environment | |||
5612 | 7971072 | Secure exchange of IP cores | |||
5613 | 7971069 | Security system for replicated storage devices on computer networks | |||
5614 | 7971063 | Method and device for safeguarding of a document with inserted signature image and biometric data in a computer system | |||
5615 | 7971062 | Token-based encryption key secure conveyance | |||
5616 | 7971061 | E-mail system and method having certified opt-in capabilities | |||
5617 | 7971060 | System and method for add-on services, secondary authentication, authorization and/or secure communication for dialog based protocols and systems | |||
5618 | 7970165 | System and method for watermarking data | |||
5619 | 7969285 | Management of badge access to different zones | |||
5620 | 7966662 | Method and system for managing authentication and payment for use of broadcast material | |||
5621 | 7966653 | Method and data processing system for determining user specific usage of a network | |||
5622 | 7966652 | Mashauth: using mashssl for efficient delegated authentication | |||
5623 | 7966649 | System and method for login resistant to compromise | |||
5624 | 7966644 | Method, apparatus, and computer program for managing access to documents | |||
5625 | 7966637 | Hardware module for adding functionality to television | |||
5626 | 7966495 | Conserving file system with backup and validation | |||
5627 | 7966493 | Method of and system for determining if an electronic signature is necessary in order to commit a transaction to a database | |||
5628 | 7966492 | System and method for allowing an e-mail message recipient to authenticate the message | |||
5629 | 7966491 | Protection of the distribution of digital documents in a peer to peer network | |||
5630 | 7966487 | Communication-efficient real time credentials for OCSP and distributed OCSP | |||
5631 | 7965864 | Data transmission by extracted or calculated identifying data | |||
5632 | 7962964 | Watermarking and transferring material | |||
5633 | 7962963 | Multimodal resource management system | |||
5634 | 7962760 | Method and apparatus for selectively enabling a microprocessor-based system | |||
5635 | 7962753 | Method and a circuit for SHA operation with power saved | |||
5636 | 7962751 | Method for portability of information between multiple servers | |||
5637 | 7962750 | System for tracking end-user electronic content usage | |||
5638 | 7962749 | Method and system for creating a non-repudiable chat log | |||
5639 | 7962748 | Methods and systems for securing a computer network | |||
5640 | 7962747 | Information processing, apparatus and method, recording medium, and program | |||
5641 | 7962742 | Internet secure terminal for personal computers | |||
5642 | 7962737 | Methods, media and apparatus for booting diskless systems | |||
5643 | 7962417 | System and method for distributing protected information | |||
5644 | 7958553 | Information storage device, security system, access permission method, network access method and security process execution permission method | |||
5645 | 7958548 | Method for provision of access | |||
5646 | 7958542 | Methods and devices for counting user equipment units in a mobile radio telecommunication network | |||
5647 | 7958541 | Method, system and apparatus for preventing media access control address counterfeiting | |||
5648 | 7958540 | Method for conducting real-time execution of transactions in a network | |||
5649 | 7958367 | Authentication system and apparatus | |||
5650 | 7958364 | System and method for digitally signing electronic documents | |||
5651 | 7958363 | Toolbar signature | |||
5652 | 7958362 | User authentication based on asymmetric cryptography utilizing RSA with personalized secret | |||
5653 | 7958361 | Information processing apparatus and method | |||
5654 | 7958359 | Access control systems | |||
5655 | 7958358 | Scanned image disclosure apparatus, method and storage medium; electronic mail transmission apparatus, method and storage medium; and internet facsimile transmission apparatus | |||
5656 | 7958356 | System and method for establishing a shared secret among nodes of a security appliance | |||
5657 | 7958355 | Keytote component | |||
5658 | 7958347 | Methods and apparatus for implementing authentication | |||
5659 | 7957552 | Optimized digital watermarking functions for streaming data | |||
5660 | 7954163 | Method and apparatus for providing network security using role-based access control | |||
5661 | 7954146 | Implicit population of access control lists | |||
5662 | 7954136 | Self-management network access using localized access management | |||
5663 | 7953982 | Method of authenticating digital signature | |||
5664 | 7953980 | Signed manifest for run-time verification of software program identity and integrity | |||
5665 | 7953979 | Systems and methods for enabling trust in a federated collaboration | |||
5666 | 7953978 | Key generation and retrieval using key servers | |||
5667 | 7953977 | Security and ticketing system control and management | |||
5668 | 7953975 | Method of generating anti-collusion fingerprint codes using (n.sup.a,n.sup.2a-2,n.sup.a-1,n,0,1) GD-PBIBD | |||
5669 | 7953974 | Authentication method, authentication system, and tag device thereof, data reference client, authentication server, and data server | |||
5670 | 7953973 | Systems, methods, and computer program products for passively routing secure socket layer (SSL) encoded network traffic | |||
5671 | 7953972 | System and method for managing files | |||
5672 | 7953969 | Reduction of false positive reputations through collection of overrides from customer deployments | |||
5673 | 7953391 | Method for inclusive authentication and management of service provider, terminal and user identity module, and system and terminal device using the method | |||
5674 | 7953221 | Method for processing multiple operations | |||
5675 | 7950044 | Centrally managed proxy-based security for legacy automation systems | |||
5676 | 7949881 | Mobil terminal device, personal identification number verification program, and method of verifying personal identification number | |||
5677 | 7949877 | Rights enforcement and usage reporting on a client device | |||
5678 | 7949876 | Method and nodes for optimized and secure communication between routers and hosts | |||
5679 | 7949873 | Secure instant messaging | |||
5680 | 7949870 | Method and apparatus for downloading information content to a wireless terminal | |||
5681 | 7948360 | Write-protection module and method for storage device | |||
5682 | 7945960 | Dynamic conditional security policy extensions | |||
5683 | 7945945 | System and method for address block enhanced dynamic network policy management | |||
5684 | 7945943 | Retrieving an access token via a coded surface | |||
5685 | 7945792 | Tamper reactive memory device to secure data from tamper attacks | |||
5686 | 7945790 | Low-cost pseudo-random nonce value generation system and method | |||
5687 | 7945784 | Method and system to perform secret sharing | |||
5688 | 7945783 | Customizable instant messaging private tags | |||
5689 | 7945780 | Apparatus for dynamically configurable interleaver scheme using at least one dynamically changeable interleaving parameter | |||
5690 | 7945779 | Securing a communications exchange between computers | |||
5691 | 7945778 | Information processing apparatus, information processing method, information processing system and recording medium | |||
5692 | 7945777 | Identification information protection method in WLAN inter-working | |||
5693 | 7945704 | Smart card set protocol optimization | |||
5694 | 7945044 | Method and system for performing an untraceable secret matching | |||
5695 | 7944354 | System and method for shopping cart security | |||
5696 | 7942742 | Accessing identification information to verify a gaming device is in communications with a server | |||
5697 | 7942740 | Verifying a first device is in communications with a server by storing a value from the first device and accessing the value from a second device | |||
5698 | 7942739 | Storing information from a verification device and accessing the information from a gaming device to verify that the gaming device is communicating with a server | |||
5699 | 7942738 | Verifying a gaming device is in communications with a gaming server | |||
5700 | 7941831 | Dynamic update of authentication information | |||
5701 | 7941826 | Enforcing access control on multicast transmissions | |||
5702 | 7941668 | Method and system for securely managing application transactions using cryptographic techniques | |||
5703 | 7941667 | Electronic document authenticity guarantee method, and electronic document disclosure system | |||
5704 | 7941665 | Device pairing | |||
5705 | 7941664 | Account-based digital signature (ABDS) system using biometrics | |||
5706 | 7941663 | Authentication of 6LoWPAN nodes using EAP-GPSK | |||
5707 | 7941662 | Data transfer efficiency in a cryptography accelerator system | |||
5708 | 7941579 | Communication system for authenticating authority of host device for accessing storage medium set to periphery device | |||
5709 | 7941376 | System and method for customer authentication of an item | |||
5710 | 7940932 | Methods, apparatus, and systems for securing SIM (subscriber identity module) personalization and other data on a first processor and secure communication of the SIM data to a second processor | |||
5711 | 7940184 | Integrated circuit and method to secure a RFID tag | |||
5712 | 7937749 | Method and system for managing network | |||
5713 | 7937745 | Voice-capable system and method for user-directed network interaction monitoring for authentication and confidentiality designation | |||
5714 | 7937594 | Apparatus and method for a programmable security processor | |||
5715 | 7937593 | Storage device content authentication | |||
5716 | 7937584 | Method and system for key certification | |||
5717 | 7937436 | Validating routing of client requests to appropriate servers hosting specific stateful web service instances | |||
5718 | 7937089 | Method, apparatus, and program product for provisioning secure wireless sensors | |||
5719 | 7936869 | Verifying digital signature based on shared knowledge | |||
5720 | 7934197 | Maintaining code integrity in a central software development system | |||
5721 | 7934104 | Systems and methods for verifying a licensed installation at time of update | |||
5722 | 7934099 | Device and method for generating digital signatures | |||
5723 | 7934098 | System and method for capturing and applying a legal signature to documents over a network | |||
5724 | 7934097 | Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network | |||
5725 | 7934096 | Integrity protected smart card transaction | |||
5726 | 7934095 | Method for exchanging messages and verifying the authenticity of the messages in an ad hoc network | |||
5727 | 7934094 | Method, system and apparatus to support mobile IP version 6 services | |||
5728 | 7934088 | Method of secure communication between endpoints | |||
5729 | 7934087 | Techniques for secure event recording and processing | |||
5730 | 7933950 | Secure control of features of a digital device | |||
5731 | 7933611 | Disabling operation of features on a handheld mobile communication device based upon location | |||
5732 | 7933413 | Key exchange verification | |||
5733 | 7930734 | Method and system for creating and tracking network sessions | |||
5734 | 7930729 | Performing presence service in a wireless communication system | |||
5735 | 7930703 | System and method for providing access to multimedia content via a serial connection | |||
5736 | 7930562 | Method of and apparatus for reproducing information, and security module | |||
5737 | 7930558 | Data recorder restoring original data allowed to exist only uniquely | |||
5738 | 7930557 | Framework for embedding graphical processing unit programs in computer software | |||
5739 | 7930556 | Fingerprint system and method for access control | |||
5740 | 7930551 | Method and system for reusing an MMH function to perform a fast MMH-MAC calculation | |||
5741 | 7930548 | Image verification system, image verification apparatus, and image verification method | |||
5742 | 7930547 | High accuracy bloom filter using partitioned hashing | |||
5743 | 7930544 | Data processing apparatus and its method | |||
5744 | 7930543 | Secure telemetric link | |||
5745 | 7930541 | E-mail communication apparatus | |||
5746 | 7930540 | Cryptographic policy enforcement | |||
5747 | 7930428 | Verification of DNS accuracy in cache poisoning | |||
5748 | 7926102 | Confidential content search engine method | |||
5749 | 7926100 | Method for preventing unauthorized connection in network system | |||
5750 | 7926087 | Centralizing access request authorizations for storage systems | |||
5751 | 7925886 | Encryption output data generation method and system | |||
5752 | 7925882 | Data application method | |||
5753 | 7925878 | System and method for creating a trusted network capable of facilitating secure open network transactions using batch credentials | |||
5754 | 7925045 | Determining document authenticity in a closed-loop process | |||
5755 | 7925027 | Secure address proxying using multi-key cryptographically generated addresses | |||
5756 | 7925016 | Method and apparatus for descrambling content | |||
5757 | 7924470 | Document processing method, document processing apparatus and program | |||
5758 | 7924156 | Electronically switchable RFID tags | |||
5759 | 7921455 | Token device that generates and displays one-time passwords and that couples to a computer for inputting or receiving data for generating and outputting one-time passwords and other functions | |||
5760 | 7921300 | Apparatus and method for secure hash algorithm | |||
5761 | 7921295 | Service mobility management system using XML security and the method thereof | |||
5762 | 7921292 | Secure messaging systems | |||
5763 | 7921291 | Method and communication system for releasing a data processing unit | |||
5764 | 7920702 | Digital rights management system and method | |||
5765 | 7917949 | Voice controlled portable memory storage device | |||
5766 | 7917946 | Method and network for securely delivering streaming data | |||
5767 | 7917940 | Inheritance of controls within a hierarchy of data processing system resources | |||
5768 | 7917771 | Method for selective encryption within documents | |||
5769 | 7917770 | Configurable data masking for software testing | |||
5770 | 7917767 | Method and apparatus for adding signature information to electronic documents | |||
5771 | 7917765 | Modular signature verification architecture | |||
5772 | 7917763 | Device and method for detecting a manipulation of an information signal | |||
5773 | 7917762 | Secure execution environment by preventing execution of unauthorized boot loaders | |||
5774 | 7917761 | Digitally signing an electronic document with a user-entered signature image | |||
5775 | 7917759 | Identifying an application user as a source of database activity | |||
5776 | 7917758 | TLS tunneling | |||
5777 | 7917757 | Method and system for authentication of electronic communications | |||
5778 | 7917756 | E-mail stamping with from-header validation | |||
5779 | 7917755 | Identification of localized web page element | |||
5780 | 7917754 | Method and apparatus for linking businesses to potential customers through a trusted source network | |||
5781 | 7917749 | Systems and methods for secure transaction management and electronic rights protection | |||
5782 | 7917638 | Transparent reconnection | |||
5783 | 7916870 | Systems and methods for document control using public key encryption | |||
5784 | 7916861 | System and method for establishing secondary channels | |||
5785 | 7913301 | Remote feature activation authentication file system | |||
5786 | 7913298 | Method and apparatus for end-to-end identity propagation | |||
5787 | 7913295 | Method and apparatus to enable a securely provisioned computing environment | |||
5788 | 7913293 | Method and communication unit for communicating between communication apparatuses | |||
5789 | 7913093 | Method and system for providing access to information on an article to which a tag is coupled | |||
5790 | 7913091 | Authentication system, consolidation apparatus and program | |||
5791 | 7913090 | Authentication systems and authentication method | |||
5792 | 7913087 | Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | |||
5793 | 7913085 | System and method of per-packet keying | |||
5794 | 7913084 | Policy driven, credential delegation for single sign on and secure access to network resources | |||
5795 | 7913083 | Secret-key-controlled reversible circuit and corresponding method of data processing | |||
5796 | 7913080 | Setting information distribution apparatus, method, program, and medium, authentication setting transfer apparatus, method, program, and medium, and setting information reception program | |||
5797 | 7912906 | Generating PKI email accounts on a web-based email system | |||
5798 | 7912762 | Customizable sign-on service | |||
5799 | 7911322 | Information processing apparatus and method, and non-contact IC card device | |||
5800 | 7908664 | Data delivery apparatus and data delivery method | |||
5801 | 7908663 | Abstractions and automation for enhanced sharing and collaboration | |||
5802 | 7908662 | System and method for auditing software usage | |||
5803 | 7908648 | Method and system for enabling remote access to a computer system | |||
5804 | 7908647 | Aggregation system | |||
5805 | 7908644 | Adaptive multi-tier authentication system | |||
5806 | 7908642 | Policy store | |||
5807 | 7908489 | Method for managing external storage devices | |||
5808 | 7908487 | Systems and methods for public-key encryption for transmission of medical information | |||
5809 | 7908484 | Method of protecting digest authentication and key agreement (AKA) against man-in-the-middle (MITM) attack | |||
5810 | 7908483 | Method and apparatus for binding TPM keys to execution entities | |||
5811 | 7908482 | Key confirmed authenticated key exchange with derived ephemeral keys | |||
5812 | 7908480 | Authenticating an endpoint using a STUN server | |||
5813 | 7908479 | Information processing device and method, recording medium and program | |||
5814 | 7908478 | Data processing method and data reading method | |||
5815 | 7908472 | Secure sockets layer cut through architecture | |||
5816 | 7907747 | Device, method, and recording medium for embedding/detecting a digital watermark | |||
5817 | 7907729 | Rollback attack prevention system and method | |||
5818 | 7904959 | Systems and methods for detecting and inhibiting attacks using honeypots | |||
5819 | 7904949 | Apparatus, systems and methods to provide authentication services to a legacy application | |||
5820 | 7904944 | Image forming apparatus, control method, and computer-readable storage medium therefor | |||
5821 | 7904731 | Integrated circuit that uses a dynamic characteristic of the circuit | |||
5822 | 7904726 | Systems and methods for securing event information within an event management system | |||
5823 | 7904725 | Verification of electronic signatures | |||
5824 | 7904723 | Method and apparatus for enhancing security of wireless communications | |||
5825 | 7904720 | System and method for providing secure resource management | |||
5826 | 7904717 | Method, apparatus, and manufacture for decryption of network traffic in a secure session | |||
5827 | 7904716 | Processing device and processing method | |||
5828 | 7904715 | Method for authenticating dual-mode access terminals | |||
5829 | 7904568 | Systems and methods for managing the distribution of electronic content | |||
5830 | 7903623 | Server based technique for optimizing call setup latency for geographically dense groups | |||
5831 | 7900263 | Content recording/reproducing apparatus and content recording/reproducing method | |||
5832 | 7900253 | Systems and methods for authorization credential emulation | |||
5833 | 7900249 | Method, system and software for maintaining network access and security | |||
5834 | 7900247 | Trusted third party authentication for web services | |||
5835 | 7900245 | Method and system for non-repeating user identification in a communication system | |||
5836 | 7900062 | Unauthorized contents detection system | |||
5837 | 7900058 | Methods and arrangements for remote communications with a trusted platform module | |||
5838 | 7900053 | User-defined passwords having associated unique version data to assist user recall of the password | |||
5839 | 7900051 | Secure multimedia data transmission method | |||
5840 | 7900050 | Digital document management system, digital document management method, and digital document management program | |||
5841 | 7900049 | Method for recognizing audio-visual data in transmission networks, in particular internet | |||
5842 | 7900047 | Method and apparatus for encrypting data transmitted over a serial link | |||
5843 | 7900032 | Method and system for NAND flash support in autonomously loaded secure reprogrammable system | |||
5844 | 7899183 | Random number generating and sharing system, encrypted communication apparatus, and random number generating and sharing method for use therein | |||
5845 | 7898384 | System for checking the single crossing of a controlled passage | |||
5846 | 7895666 | Data structure representation using hash-based directed acyclic graphs and related method | |||
5847 | 7895638 | Protocol for entering, disabling and/or erasing scrambled data access rights and the corresponding access control module | |||
5848 | 7895445 | Token-based remote data access | |||
5849 | 7895443 | Secure authentication using hardware token and computer fingerprint | |||
5850 | 7895442 | Interconnect device to enable compliance with rights management restrictions | |||
5851 | 7895441 | LDAP grouping for digital signature creation | |||
5852 | 7895440 | Method of encrypting digital data, a method of masking a biometric print, and application to making a security document secure | |||
5853 | 7895439 | Watermarked material processing | |||
5854 | 7895438 | Method and apparatus for generating and verifying digital signature | |||
5855 | 7895436 | Authentication system and remotely-distributed storage system | |||
5856 | 7895432 | Method and apparatus for using a third party authentication server | |||
5857 | 7891012 | Method and computer-usable medium for determining the authorization status of software | |||
5858 | 7891004 | Method for vehicle internetworks | |||
5859 | 7890997 | Remote feature activation authentication file system | |||
5860 | 7890995 | System and method for remote management of communications networks | |||
5861 | 7890993 | Secret file access authorization system with fingerprint limitation | |||
5862 | 7890767 | Virtual smart card system and method | |||
5863 | 7890765 | Generating and verifying trusted digital time stamp | |||
5864 | 7890764 | System, apparatus, program and method for obtaining time stamp | |||
5865 | 7890763 | Method of identifying invalid digital signatures involving batch verification | |||
5866 | 7890760 | Secure method of termination of service notification | |||
5867 | 7890759 | Connection assistance apparatus and gateway apparatus | |||
5868 | 7890758 | Apparatus and method for generating keys in a network computing environment | |||
5869 | 7890757 | Receiver non-repudiation | |||
5870 | 7889050 | System and method for training a trainable transmitter | |||
5871 | 7886342 | Distributed environment controlled access facility | |||
5872 | 7886338 | System and method for controlling access to local services without losing failover capibilty | |||
5873 | 7886334 | System and method for social network trust assessment | |||
5874 | 7886163 | Authentication protocol with memory integrity verification | |||
5875 | 7886159 | Data providing system and apparatus and methods of same | |||
5876 | 7886157 | Hand geometry recognition biometrics on a fob | |||
5877 | 7886152 | Method and device for embedding watermark information and method and device for extracting embedded watermark information | |||
5878 | 7886151 | Temporal synchronization of video and audio signals | |||
5879 | 7886150 | System debug and trace system and method, and applications thereof | |||
5880 | 7886149 | Method and apparatus for assigning network addresses based on connection authentication | |||
5881 | 7885639 | Method and apparatus for authenticating a wireless access point | |||
5882 | 7885427 | System and method for solving the "birthday" problem with watermarking | |||
5883 | 7882551 | Techniques for entry of less than perfect passwords | |||
5884 | 7882549 | Systems for authenticating a user's credentials against multiple sets of credentials | |||
5885 | 7882541 | Authentication system in information processing terminal using mobile information processing device | |||
5886 | 7882359 | Method and system for user attestation-signatures with attributes | |||
5887 | 7882358 | Reversible hashing for E-signature verification | |||
5888 | 7882356 | UPnP authentication and authorization | |||
5889 | 7882349 | Insider attack defense for network client validation of network management frames | |||
5890 | 7882347 | Image printing device, verifying device, and printed material | |||
5891 | 7882346 | Method and apparatus for providing authentication, authorization and accounting to roaming nodes | |||
5892 | 7882255 | Method and apparatus for maintaining local area network ("LAN") and wireless LAN ("WLAN") security associations | |||
5893 | 7882227 | Mechanism for implementing file access control across a network using labeled containers | |||
5894 | 7881478 | Method for controlling access to an encrypted programme | |||
5895 | 7881473 | Quantum key distribution system and method | |||
5896 | 7881470 | Network mobility security management | |||
5897 | 7880584 | Lockbox key with callback feature | |||
5898 | 7877801 | Method and system to detect malicious software | |||
5899 | 7877797 | Non-intrusive background synchronization when authentication is required | |||
5900 | 7877791 | System, method and program for authentication and access control | |||
5901 | 7877790 | System and method of using personal data | |||
5902 | 7877788 | Method and apparatus for securing a peripheral data interface | |||
5903 | 7877784 | Verifying authenticity of webpages | |||
5904 | 7877782 | Method and apparatus for configuration management of computer system | |||
5905 | 7877608 | Secure inter-process communications | |||
5906 | 7877607 | Tamper-evident data management | |||
5907 | 7877606 | Method of authorizing network publishing | |||
5908 | 7877604 | Proof of execution using random function | |||
5909 | 7877600 | Method and apparatus for distributing root certification | |||
5910 | 7877482 | Efficient application hosting in a distributed application execution system | |||
5911 | 7874015 | Methods, systems, and computer program products for controlling distribution of digital content in a file sharing system using license-based verification, encoded tagging, and time-limited fragment validity | |||
5912 | 7874012 | Privileged access to encrypted data | |||
5913 | 7873986 | Communication apparatus, and display terminal | |||
5914 | 7873853 | Data storage apparatus, power control, method, and communication apparatus | |||
5915 | 7873834 | Image forming apparatus, storage medium storing program for acquiring time stamp, digital data management system, and method for acquiring time stamp | |||
5916 | 7873833 | Detection of frequent and dispersed invariants | |||
5917 | 7873832 | Mechanism for secure participation in a transaction by a third party | |||
5918 | 7873831 | Digests to identify elements in a signature process | |||
5919 | 7873830 | Methods for coordinating access to memory from at least two cryptography secure processing units | |||
5920 | 7870615 | Information terminal with function of playing back contents | |||
5921 | 7870598 | Policy specification framework for insider intrusions | |||
5922 | 7870597 | Method and apparatus for managing digital identities through a single interface | |||
5923 | 7870393 | Steganographic method and device | |||
5924 | 7870392 | Digital fingerprinting for management and recovery of data objects | |||
5925 | 7870391 | Method of managing multimedia data and mobile communication terminal equipped with function of managing multimedia data | |||
5926 | 7870385 | Method and system for controlling presentation of computer readable media on a media storage device | |||
5927 | 7869604 | System for an encryption key path diagnostic | |||
5928 | 7869603 | Encryption key path diagnostic | |||
5929 | 7869593 | Software for providing based on shared knowledge public keys having same private key | |||
5930 | 7868739 | Method and system for improving function of reading information from RFID tag | |||
5931 | 7865957 | Apparatus and methods for updating mobile device virus pattern data | |||
5932 | 7865952 | Pre-emptive application blocking for updates | |||
5933 | 7865943 | Credential vault encryption | |||
5934 | 7865937 | Methods and systems for authenticating users | |||
5935 | 7865933 | Authentication agent apparatus, authentication method, and program product therefor | |||
5936 | 7865876 | Multiple trusted computing environments | |||
5937 | 7865734 | Write accessibility for electronic paper | |||
5938 | 7865733 | Secure processor and a program for a secure processor | |||
5939 | 7865732 | Method and communications and communication network intrusion protection methods and intrusion attempt detection system | |||
5940 | 7865729 | Bidirectional authentication for HTML form processing | |||
5941 | 7861918 | Voting system and method | |||
2010 | |||||
5942 | 7861314 | Interactive key control system and method of managing access to secured locations | |||
5943 | 7861313 | Information managing apparatus and method, recording medium, and program | |||
5944 | 7861312 | MP3 player with digital rights management | |||
5945 | 7861306 | Method and system for limiting the use of user-specific software features | |||
5946 | 7861293 | Mobile terminal and authentication method | |||
5947 | 7861287 | System and method for utilizing audit information for challenge/response during a password reset process | |||
5948 | 7861283 | User position utilization system | |||
5949 | 7861282 | Information processing apparatus, printing apparatus and printing system including thereof apparatuses | |||
5950 | 7861090 | Electric conference system and control method thereof | |||
5951 | 7861088 | Method and system for verifiably recording voice communications | |||
5952 | 7861086 | Digital signing method, digital signing apparatus, portable information processing apparatus, digital signing system, and recording medium | |||
5953 | 7861085 | Systems and methods providing distributed management of electronic signatures in industrial automation systems | |||
5954 | 7861083 | Hybrid encoding of data transmissions in a security system | |||
5955 | 7861082 | Validating client-receivers | |||
5956 | 7861078 | Password-authenticated asymmetric key exchange | |||
5957 | 7861077 | Secure authentication and transaction system and method | |||
5958 | 7860797 | Method for documenting property or possession and transfer of property or possession of a merchandise | |||
5959 | 7860268 | Object authentication using encoded images digitally stored on the object | |||
5960 | 7860248 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
5961 | 7860247 | Identity based encryption | |||
5962 | 7859401 | Addressing scheme for smart wireless medical sensor networks | |||
5963 | 7856658 | Method and system for incorporating trusted metadata in a computing environment | |||
5964 | 7856657 | Secure access of resources at shared appliances | |||
5965 | 7856655 | System and method for improved network security | |||
5966 | 7856560 | Digital information recording apparatus and recording/reproducing apparatus | |||
5967 | 7856557 | Authentication of data in a digital transmission system | |||
5968 | 7856556 | Codeword-enhanced peer-to-peer authentication | |||
5969 | 7856555 | Write accessibility for electronic paper | |||
5970 | 7856554 | Method of authenticating an object | |||
5971 | 7856553 | System and method for platform activation | |||
5972 | 7856103 | Microcontroller and authentication method between the controllers | |||
5973 | 7855956 | Method and system for controlling the multicast source | |||
5974 | 7853999 | Trusted operating environment for malware detection | |||
5975 | 7853994 | Computer system and method of updating authentication information of computer system | |||
5976 | 7853986 | Document distribution system and method | |||
5977 | 7853803 | System and method for thwarting buffer overflow attacks using encrypted process pointers | |||
5978 | 7853802 | Information processing system, method, and apparatus, and program | |||
5979 | 7853801 | System and method for providing authenticated encryption in GPON network | |||
5980 | 7853800 | Systems and methods for a secure recording environment | |||
5981 | 7853796 | Method, system and computer program for polynomial based hashing and message authentication coding with separate generation of spectrums | |||
5982 | 7853795 | System, method and computer program product for guaranteeing electronic transactions | |||
5983 | 7853794 | Efficient method for providing secure remote access | |||
5984 | 7853792 | Authenticity verification methods, products and apparatuses | |||
5985 | 7853791 | System and method for certificate based redirection | |||
5986 | 7853790 | Enhancement to volume license keys | |||
5987 | 7853789 | Method and system for establishing a communications pipe between a personal security device and a remote computer system | |||
5988 | 7853788 | Localized network authentication and security using tamper-resistant keys | |||
5989 | 7853787 | Peripheral device for programmable logic controller | |||
5990 | 7853781 | Load balancing secure sockets layer accelerator | |||
5991 | 7853016 | Signature schemes using bilinear mappings | |||
5992 | 7849511 | Determining authorized use of a software application | |||
5993 | 7849319 | Method and device for incorporating additional information into main information through electronic watermarking technique | |||
5994 | 7849318 | Method for session security | |||
5995 | 7849315 | Method for managing operability of on-chip debug capability | |||
5996 | 7849313 | Secure peer-to-peer messaging invitation architecture | |||
5997 | 7849312 | Method and system for secure external TPM password generation and use | |||
5998 | 7849307 | System and method for establishing historical usage-based hardware trust | |||
5999 | 7849101 | Method and system for enabling an electronic signature approval process | |||
6000 | 7848513 | Method for transmitting security context for handover in portable internet system | |||
6001 | 7845016 | Methods and apparatus for verifying modules from approved vendors | |||
6002 | 7845014 | Method and apparatus for implementing digital rights management | |||
6003 | 7845007 | Method and system for intrusion detection in a computer network | |||
6004 | 7844998 | Apparatus and method for autonomic email access control | |||
6005 | 7844835 | Systems and methods for secure transaction management and electronic rights protection | |||
6006 | 7844832 | System and method for data source authentication and protection system using biometrics for openly exchanged computer files | |||
6007 | 7844831 | Secure memory device for smart cards | |||
6008 | 7844821 | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage state | |||
6009 | 7844820 | Set of metadata for association with a composite media item and tool for creating such set of metadata | |||
6010 | 7844819 | Application authentication system | |||
6011 | 7844817 | Ensuring quality of service in a communications network | |||
6012 | 7844816 | Relying party trust anchor based public key technology framework | |||
6013 | 7844674 | Architecture for general purpose trusted personal access system and methods therefor | |||
6014 | 7844369 | Modular and expandable irrigation controller | |||
6015 | 7844074 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
6016 | 7843848 | Methods and apparatus for round trip time measurements | |||
6017 | 7841940 | Human test based on human conceptual capabilities | |||
6018 | 7840816 | Identifying material stored using a signature as a retrieval index | |||
6019 | 7840815 | Digital signature computer, system, method, and storage medium storing program for collectively affixing signature to plurality of messages | |||
6020 | 7840814 | Method for managing an executable code downloaded in a reprogrammable on-board system | |||
6021 | 7840813 | Method and system with authentication, revocable anonymity and non-repudiation | |||
6022 | 7840812 | Authentication of digital certificates used by portable computing devices | |||
6023 | 7840811 | Network system and communication methods for securely bootstraping mobile IPv6 mobile node using pre-shared key | |||
6024 | 7840810 | Systems and methods for rejoining a second group of nodes with a first group of nodes using a shared group key | |||
6025 | 7840808 | Authentication system, device, and program | |||
6026 | 7840806 | System and method of non-centralized zero knowledge authentication for a computer network | |||
6027 | 7840804 | Attribute certificate validation method and device | |||
6028 | 7836509 | Recording medium, apparatus for reproducing data and method thereof | |||
6029 | 7836507 | Contents transmitter apparatus, contents receiver apparatus and contents transmitting method | |||
6030 | 7836502 | Scheduled gateway scanning arrangement and methods thereof | |||
6031 | 7836488 | Authentic device admission scheme for a secure communication network, especially a secure IP telephony network | |||
6032 | 7836487 | Apparatus and method for authenticating a user when accessing to multimedia services | |||
6033 | 7836485 | System and method for enrolling in a biometric system | |||
6034 | 7836482 | Information management system | |||
6035 | 7836310 | Security system that uses indirect password-based encryption | |||
6036 | 7836308 | Apparatus and method for multiple function authentication device | |||
6037 | 7836307 | Communication relay device, information processing system, control method and program | |||
6038 | 7836306 | Establishing secure mutual trust using an insecure password | |||
6039 | 7836305 | Method of and system for storage of I-WLAN temporary identities | |||
6040 | 7836179 | Content validation for digital network | |||
6041 | 7835526 | Method and system for restricting mobility using unique encrypted chargers | |||
6042 | 7834743 | RFID tag and RFID tag communication distance modification method | |||
6043 | 7831996 | Authentication techniques | |||
6044 | 7831839 | Methods and apparatus for providing a secure booting sequence in a processor | |||
6045 | 7831833 | System and method for key recovery | |||
6046 | 7831831 | Authentication communication system, authentication communication apparatus, and authentication communication method | |||
6047 | 7831829 | Identity-based encryption system | |||
6048 | 7831828 | System and method for securely authenticating a data exchange session with an implantable medical device | |||
6049 | 7831822 | Real-time stateful packet inspection method and apparatus | |||
6050 | 7831517 | Single binary software license distribution | |||
6051 | 7831060 | Method for protecting content of vector graphics formats | |||
6052 | 7831045 | Security module revocation method used for securing broadcasted messages | |||
6053 | 7831039 | AES encryption circuitry with CCM | |||
6054 | 7830923 | Interval centroid based watermark decoder | |||
6055 | 7828654 | Location based gaming system | |||
6056 | 7827602 | Network firewall host application identification and authentication | |||
6057 | 7827601 | Method and apparatus for firewall traversal | |||
6058 | 7827598 | Grouped access control list actions | |||
6059 | 7827596 | Authenticating computed results in a public distributed computing environment | |||
6060 | 7827592 | Implicit authentication to computer resources and error recovery | |||
6061 | 7827551 | Real-time threading service for partitioned multiprocessor systems | |||
6062 | 7827409 | Remote secure authorization | |||
6063 | 7827408 | Device for and method of authenticated cryptography | |||
6064 | 7827406 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
6065 | 7827405 | Mechanism for utilizing kerberos features by an NTLM compliant entity | |||
6066 | 7827401 | Efficient certificate revocation | |||
6067 | 7827400 | Security certificate management | |||
6068 | 7827398 | Method for offloading encryption and decryption of a message received at a message server to remote end devices | |||
6069 | 7827397 | Gaming machine having a secure boot chain and method of use | |||
6070 | 7827313 | Addressing method and method and apparatus for establishing host identity protocol (HIP) connections between legacy and HIP nodes | |||
6071 | 7826749 | Method and system for quantum key distribution over multi-user WDM network with wavelength routing | |||
6072 | 7826637 | Digital watermark embedding apparatus, digital watermark detecting apparatus, digital watermark embedding method, digital watermark detecting method and computer program product | |||
6073 | 7823207 | Privacy preserving data-mining protocol | |||
6074 | 7823193 | Method and system for ordering, loading and using admission tickets | |||
6075 | 7823192 | Application-to-application security in enterprise security services | |||
6076 | 7823188 | Network access system which is adapted for the use of a simplified signature method, and server used to implement same | |||
6077 | 7823187 | Communication processing method and system relating to authentication information | |||
6078 | 7822989 | Controlling access to an area | |||
6079 | 7822988 | Method and system for identity recognition | |||
6080 | 7822987 | Data card verification system | |||
6081 | 7822985 | Real-time electronic signature validation systems and methods | |||
6082 | 7822983 | Physical device bonding | |||
6083 | 7822982 | Method and apparatus for automatic and secure distribution of a symmetric key security credential in a utility computing environment | |||
6084 | 7822981 | Communication apparatus and authenticating method | |||
6085 | 7822973 | Authentication key device having media content storage and rendering capabilities | |||
6086 | 7822205 | Multiple matching control method | |||
6087 | 7818812 | Article and system for decentralized creation, distribution, verification and transfer of valuable documents | |||
6088 | 7818811 | Off-line economies for digital media | |||
6089 | 7818798 | Software system with controlled access to objects | |||
6090 | 7818785 | System and method for secure information handling system memory | |||
6091 | 7818784 | Communication control apparatus and communication control system | |||
6092 | 7818783 | System and method for global access control | |||
6093 | 7818782 | Authentication medium, authenticable substrate, authentication medium label, authentication medium transfer sheet, authenticable sheet, and authenticable information recording medium | |||
6094 | 7818780 | Method and compiler for routing policy | |||
6095 | 7818583 | Personal authentication apparatus | |||
6096 | 7818578 | Method and apparatus for uniquely and authoritatively identifying tangible objects | |||
6097 | 7818577 | Identifying material using a watermark and a signature | |||
6098 | 7818575 | Efficient retrieval of cryptographic evidence | |||
6099 | 7818574 | System and method for providing dynamically authorized access to functionality present on an integrated circuit chip | |||
6100 | 7818573 | Remote control of a security system using e-mail | |||
6101 | 7818571 | Securing wireless communications between devices | |||
6102 | 7818570 | Exclusive set system constructions including, but not limited to, applications to broadcast encryption and certificate revocation | |||
6103 | 7818562 | Method and apparatus for time synchronization in a network data processing system | |||
6104 | 7817986 | Method and system for providing cellular assisted secure communications of a plurality of ad hoc devices | |||
6105 | 7817802 | Cryptographic key management in a communication network | |||
6106 | 7814334 | Method and apparatus for changing and adding activation keys for functions of digital content without having to change and recompile the digital content | |||
6107 | 7814329 | MACSec implementation | |||
6108 | 7814328 | Digital signatures for embedded code | |||
6109 | 7814327 | Document registration | |||
6110 | 7814326 | Signature schemes using bilinear mappings | |||
6111 | 7814324 | Method of making a patient monitor | |||
6112 | 7814323 | Program, classification method and system | |||
6113 | 7814322 | Discovery and authentication scheme for wireless mesh networks | |||
6114 | 7814321 | System and method for protecting disk drive password when BIOS causes computer to leave suspend state | |||
6115 | 7814320 | Cryptographic authentication, and/or establishment of shared cryptographic keys, using a signing key encrypted with a non-one-time-pad encryption, including (but not limited to) techniques with improved security against malleability attacks | |||
6116 | 7814318 | Scalable file system configured to make files permanently unreadable | |||
6117 | 7814315 | Propagation of certificate revocation information | |||
6118 | 7810163 | Secure media path methods, systems, and architectures | |||
6119 | 7810139 | Remote authorization for operations | |||
6120 | 7810091 | Mechanism to check the malicious alteration of malware scanner | |||
6121 | 7809959 | Countermeasure method in a microcircuit, microcircuit therefore and smart card comprising said microcircuit | |||
6122 | 7809951 | System and method for automated border-crossing checks | |||
6123 | 7809949 | Configuration of a computing device in a secure manner | |||
6124 | 7809948 | Cellular telephone device having authenticating capability | |||
6125 | 7809947 | User certificate system and method for data broadcasting | |||
6126 | 7809944 | Method and apparatus for providing information for decrypting content, and program executed on information processor | |||
6127 | 7805757 | Control of communication session attributes in network employing firewall protection | |||
6128 | 7805616 | Generating and interpreting secure and system dependent software license keys | |||
6129 | 7805614 | Secure local or remote biometric(s) identity and privilege (BIOTOKEN) | |||
6130 | 7805612 | Use of global clock to secure and synchronize messages in XM and SMS messages to a vehicle | |||
6131 | 7805611 | Method for secure communication from chip card and system for performing the same | |||
6132 | 7805610 | System for registration of sensing device with printer | |||
6133 | 7805607 | Method for the anonymous authentication of a data transmitter | |||
6134 | 7805606 | Computer system for authenticating a computing device | |||
6135 | 7804978 | Method and device for reading digital watermark, computer software package and corresponding storage means | |||
6136 | 7804774 | Scalable filtering and policing mechanism for protecting user traffic in a network | |||
6137 | 7802306 | Multiple watermarks for digital rights management (DRM) and content tracking | |||
6138 | 7802104 | Context sensitive dynamic authentication in a cryptographic system | |||
6139 | 7802102 | Method for efficient and secure data migration between data processing systems | |||
6140 | 7802099 | Method and apparatus for establishing a secure connection | |||
6141 | 7802098 | Cryptography method and smart cards microcircuit | |||
6142 | 7802097 | Secure method of termination of service notification | |||
6143 | 7802095 | Method and system for preventing unauthorized recording of media content on a Macintosh operating system | |||
6144 | 7801325 | Watermarking a chip design based on frequency of geometric structures | |||
6145 | 7801302 | Cryptographic method and apparatus | |||
6146 | 7797754 | Dynamic control of authorization to access internet services | |||
6147 | 7797736 | System and method for authentication | |||
6148 | 7797734 | Systems and methods for user interface control | |||
6149 | 7797731 | Centralized identity authentication for electronic communication networks | |||
6150 | 7797730 | Downline transcription system using automatic tracking and revenue collection | |||
6151 | 7797728 | Mechanism to generate restricted and unrestricted execution environments | |||
6152 | 7797726 | Method and system for implementing privacy policy enforcement with a privacy proxy | |||
6153 | 7797549 | Secure method and system for biometric verification | |||
6154 | 7797544 | Attesting to establish trust between computer entities | |||
6155 | 7797543 | Systems and methods for authenticating an electronic message | |||
6156 | 7797542 | Watermark signal generating apparatus | |||
6157 | 7797541 | Method and apparatus for providing cellular telephone service using an authenticating cellular telephone device | |||
6158 | 7797540 | Predictive support system for software | |||
6159 | 7797538 | Broadband certified mail | |||
6160 | 7797537 | Mobile terminal, data communication method, and computer program | |||
6161 | 7797535 | Authentication method and system, and information processing method and apparatus | |||
6162 | 7796762 | Communication system, common key control apparatus, and general communication apparatus | |||
6163 | 7796011 | Water treatment apparatus | |||
6164 | 7794325 | Dynamic in-game soundtrack for a console game machine | |||
6165 | 7793355 | System and method of owner control of electronic devices | |||
6166 | 7793352 | Sharing network access capacities across internet service providers | |||
6167 | 7793340 | Cryptographic binding of authentication schemes | |||
6168 | 7793336 | Method and apparatus for communicating credential information within a network device authentication conversation | |||
6169 | 7793107 | Document verification apparatus and control method thereof | |||
6170 | 7793105 | Method and apparatus for local domain management using device with local authority module | |||
6171 | 7793103 | Ad-hoc network key management | |||
6172 | 7793101 | Verifiable virtualized storage port assignments for virtual machines | |||
6173 | 7792336 | Signature capture aesthetic/temporal qualification failure detection | |||
6174 | 7792303 | Method of delivering direct proof private keys to devices using a distribution CD | |||
6175 | 7792290 | Gathering randomness in a wireless smart card reader | |||
6176 | 7792286 | Signature generation device and signature verification device | |||
6177 | 7792285 | Method and system for securely exchanging encryption key determination information | |||
6178 | 7791452 | Wireless access control and event controller system | |||
6179 | 7791451 | Methods, systems, and computer program products for providing mutual authentication for radio frequency identification (RFID) security | |||
6180 | 7788801 | Method for manufacturing a tamper-proof cap for an electronic module | |||
6181 | 7788730 | Secure bytecode instrumentation facility | |||
6182 | 7788715 | Authentication for transmission control protocol | |||
6183 | 7788709 | Mobile host using a virtual single account client and server system for network access and management | |||
6184 | 7788708 | Systems and methods for delegating information technology authorization to at least one other person | |||
6185 | 7788700 | Enterprise security system | |||
6186 | 7788698 | Pre-negotiation and pre-caching media policy | |||
6187 | 7788494 | Link key injection mechanism for personal area networks | |||
6188 | 7788493 | Authenticating users | |||
6189 | 7788492 | Facilitating 802.11 roaming by pre-establishing session keys | |||
6190 | 7788491 | Use of encryption for secure communication exchanges | |||
6191 | 7788271 | Content distribution server, content distribution method, and program | |||
6192 | 7787661 | Method, system, personal security device and computer program product for cryptographically secured biometric authentication | |||
6193 | 7787652 | Lossless embedding of data in digital objects | |||
6194 | 7784091 | Data processing system | |||
6195 | 7784089 | System and method for providing a multi-credential authentication protocol | |||
6196 | 7784086 | Method for secure packet identification | |||
6197 | 7783894 | Monolithic semiconductor integrated circuit and method for selective memory encryption and decryption | |||
6198 | 7783891 | System and method facilitating secure credential management | |||
6199 | 7783890 | Multimedia recording apparatus, object-specifying information providing apparatus, server apparatus, verification apparatus, multimedia recording method, object-specifying information providing method, server method, verification method, and multimedia recording system | |||
6200 | 7783887 | Method and apparatus for providing television services using an authenticating television receiver device | |||
6201 | 7783886 | Multi-level boot hierarchy for software development on an integrated circuit | |||
6202 | 7783885 | Hybrid digital signature workflow | |||
6203 | 7783884 | Content providing system, information processing device and memory card | |||
6204 | 7783881 | Gaming device verification system and method using a file allocation structure | |||
6205 | 7783040 | Encryption in a secure computerized gaming system | |||
6206 | 7779476 | Active defense against wireless intruders | |||
6207 | 7779456 | System and method for enhanced protection and control over the use of identity | |||
6208 | 7779452 | Computer access security | |||
6209 | 7779422 | System, method, and computer program product for compatibility among hooking applications | |||
6210 | 7779420 | Verifying information stored on a managed network device | |||
6211 | 7779271 | Watermark embedding | |||
6212 | 7779267 | Method and apparatus for using a secret in a distributed computing system | |||
6213 | 7779262 | Security method using electronic signature | |||
6214 | 7779261 | Method and system for digital watermarking | |||
6215 | 7779260 | Information processing apparatus and method | |||
6216 | 7779258 | Method for controlling security function execution with a flexible, extendable, and non-forgable block | |||
6217 | 7779257 | System and method for constraint resolution | |||
6218 | 7779251 | Information communication apparatus and method, information communication system, and memory medium | |||
6219 | 7778931 | Method and a system for securing processing of an order by a mobile agent within a network system | |||
6220 | 7778414 | Encryption method based on factorization | |||
6221 | 7774832 | Systems and methods for implementing protocol enforcement rules | |||
6222 | 7774830 | Access control policy engine controlling access to resource based on any of multiple received types of security tokens | |||
6223 | 7774829 | Computer access control using password reset | |||
6224 | 7774823 | System and method for managing electronic communications | |||
6225 | 7774610 | Method and apparatus for verifiably migrating WORM data | |||
6226 | 7774606 | Write accessibility for electronic paper | |||
6227 | 7774604 | Verifying captured objects before presentation | |||
6228 | 7774602 | Secure modem gateway concentrator | |||
6229 | 7773972 | Functionality and policies based on wireless device dynamic associations | |||
6230 | 7773770 | Substituting or replacing components in media objects based on steganographic encoding | |||
6231 | 7770225 | Method and apparatus for auditing network security | |||
6232 | 7770220 | System and method for securing documents using an attached electronic data storage device | |||
6233 | 7770214 | Apparatus, system, and method for establishing a reusable and reconfigurable model for fast and persistent connections in database drivers | |||
6234 | 7770209 | Method and system to detect human interaction with a computer | |||
6235 | 7770174 | Client-based resource manager with network-based rights acquisition | |||
6236 | 7770031 | Data protection systems and methods | |||
6237 | 7770024 | Security message authentication instruction | |||
6238 | 7770023 | Exclusive encryption | |||
6239 | 7770020 | Face image obtaining method and apparatus | |||
6240 | 7770017 | Method and system for digital watermarking | |||
6241 | 7770016 | Systems and methods for watermarking software and other media | |||
6242 | 7770014 | Randomized signal transforms and their applications | |||
6243 | 7770012 | System and computer program product for secure authentication using digital certificates | |||
6244 | 7770011 | Secure authentication using digital certificates with individual authentication data | |||
6245 | 7770010 | Dynamically configurable interleaver scheme using at least one dynamically changeable interleaving parameter | |||
6246 | 7770009 | Digital signing method | |||
6247 | 7770007 | Method and system for integrating security mechanisms into session initiation protocol request messages for client-proxy authentication | |||
6248 | 7770006 | Method and apparatus for authorizing a database operation | |||
6249 | 7770002 | Multi-factor authentication | |||
6250 | 7769873 | Dynamically inserting filters into forwarding paths of a network device | |||
6251 | 7769166 | Dual mode AES implementation to support single and multiple AES operations | |||
6252 | 7765602 | Storage on-demand system, and method for processing data in the same | |||
6253 | 7765593 | Rule set-based system and method for advanced virus protection | |||
6254 | 7765588 | System and method for identity verification | |||
6255 | 7765585 | Credential delegation using identity assertion | |||
6256 | 7765582 | Identity-based-encryption messaging system with public parameter host servers | |||
6257 | 7765409 | Modular BIOS update mechanism | |||
6258 | 7765408 | Systems and methods for online identity verification | |||
6259 | 7765405 | Receive side scaling with cryptographically secure hashing | |||
6260 | 7765404 | Providing content in a communication system | |||
6261 | 7765403 | System for controlling the distribution and use of rendered digital works through watermarking | |||
6262 | 7765402 | System and methods for the wireless delivery of a message | |||
6263 | 7765398 | Method of promulgating a transaction tool to a recipient | |||
6264 | 7764949 | Method of preventing replay attack in mobile IPv6 | |||
6265 | 7764790 | Scaling independent technique for watermarking images | |||
6266 | 7764785 | Method for communicating securely over an insecure communication channel | |||
6267 | 7761919 | Intrusion detection with automatic signature generation | |||
6268 | 7761910 | System and method for assigning an identity to an intelligent electronic device | |||
6269 | 7761712 | Steganographic method and device | |||
6270 | 7761709 | Media receiving apparatus, media system having the same, and control methods thereof | |||
6271 | 7761703 | System and method for checking digital certificate status | |||
6272 | 7760877 | Protection of data on media recording disks | |||
6273 | 7757299 | Conditional access to digital rights management conversion | |||
6274 | 7757296 | Method of managing software components that are integrated into an embedded system | |||
6275 | 7757272 | Method and apparatus for dynamic mapping | |||
6276 | 7757269 | Enforcing alignment of approved changes and deployed changes in the software change life-cycle | |||
6277 | 7757101 | Data processing apparatus, data processing system, and data processing method therefor | |||
6278 | 7757100 | Protected volume on a data storage device with dual operating systems and configurable access and encryption controls | |||
6279 | 7757091 | Method and apparatus for the creation of a self-authenticating document | |||
6280 | 7757089 | Apparatus, method and computer program for distributing and rendering content | |||
6281 | 7757087 | Information processing apparatus and information processing method | |||
6282 | 7757086 | Key transportation | |||
6283 | 7757085 | Method and apparatus for encrypting data transmitted over a serial link | |||
6284 | 7757083 | Integrated circuit that uses a dynamic characteristic of the circuit | |||
6285 | 7756955 | Information processing apparatus, information processing method, and program thereof | |||
6286 | 7756510 | Authentication method for wireless distributed system | |||
6287 | 7756073 | Method for updating a routing entry | |||
6288 | 7752676 | Encryption of data in storage systems | |||
6289 | 7752661 | Method and system for server support of pluggable authorization systems | |||
6290 | 7752660 | Transmission error resistant reader station | |||
6291 | 7752466 | Systems and methods for secure transaction management and electronic rights protection | |||
6292 | 7752457 | Method and apparatus for secure data mirroring a storage system | |||
6293 | 7752455 | Trusted storage systems and methods | |||
6294 | 7752452 | Dynamic cache lookup based on dynamic data | |||
6295 | 7752451 | System and method for virtual entity access | |||
6296 | 7752449 | System and method for generating a non-repudiatable record of a data stream | |||
6297 | 7752446 | System and method for digital watermarking of data repository | |||
6298 | 7752445 | System and method for authentication of a hardware token | |||
6299 | 7752442 | Virtual distributed security system | |||
6300 | 7752441 | Method of cryptographic synchronization | |||
6301 | 7751608 | Model-based synthesis of band moire images for authenticating security documents and valuable products | |||
6302 | 7751587 | Data production method and apparatus | |||
6303 | 7751584 | Method to provide transparent information in binary drivers via steganographic techniques | |||
6304 | 7751570 | Method and apparatus for managing cryptographic keys | |||
6305 | 7751567 | Local authentication of mobile subscribers outside their home systems | |||
6306 | 7751561 | Partial encryption | |||
6307 | 7748043 | Method for authenticating, in particular, software components that can be loaded into a control unit of a motor vehicle | |||
6308 | 7748034 | Strong anti-replay protection for IP traffic sent point to point or multi-cast to large groups | |||
6309 | 7748031 | Mass storage device with automated credentials loading | |||
6310 | 7748029 | Authentication query strategizer and results compiler | |||
6311 | 7748028 | Authentication method, terminal device, relay device and authentication server | |||
6312 | 7748027 | System and method for dynamic data redaction | |||
6313 | 7747873 | Method and apparatus for protecting information and privacy | |||
6314 | 7747869 | Process for detecting defective component exchanges | |||
6315 | 7747866 | System and method providing improved error detection related to transmission of data over a communication link | |||
6316 | 7747865 | Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols | |||
6317 | 7747864 | DVD identification and managed copy authorization | |||
6318 | 7747863 | Image processing apparatus and its method | |||
6319 | 7747862 | Method and apparatus to authenticate base and subscriber stations and secure sessions for broadband wireless networks | |||
6320 | 7747861 | Method and system for redundant secure storage of sensitive data by using multiple keys | |||
6321 | 7747860 | System and method for preventing delivery of unsolicited and undesired electronic messages by key generation and comparison | |||
6322 | 7747857 | Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates | |||
6323 | 7747856 | Session ticket authentication scheme | |||
6324 | 7747540 | Account linking with privacy keys | |||
6325 | 7747024 | System and method for generalized authentication | |||
6326 | 7747012 | Process of security of an electronic unit with cryptoprocessor | |||
6327 | 7743425 | Security restrictions on binary behaviors | |||
6328 | 7743424 | Method for protecting data in a hard disk | |||
6329 | 7743409 | Methods used in a mass storage device with automated credentials loading | |||
6330 | 7743407 | Using permissions to allocate device resources to an application | |||
6331 | 7743406 | System and method of preventing alteration of data on a wireless device | |||
6332 | 7743404 | Method and system for single signon for multiple remote sites of a computer network | |||
6333 | 7743261 | Unauthorized contents detection system | |||
6334 | 7743258 | Method for interacting with a memory device in cryptographic operations | |||
6335 | 7743255 | Trust model for a database management system supporting multiple authorization domains | |||
6336 | 7743253 | Digital signature for network coding | |||
6337 | 7743252 | Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates | |||
6338 | 7743248 | System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components | |||
6339 | 7743088 | Synchronization identifier generating method and apparatus for synchronizing digital contents | |||
6340 | 7742619 | Image watermarking based on sequency and wavelet transforms | |||
6341 | 7742605 | Method and system for authentification of a mobile user via a gateway | |||
6342 | 7742597 | Exclusive encryption system | |||
6343 | 7741951 | Method and apparatus for a rolling code learning transmitter | |||
6344 | 7739747 | Dynamic control of authorization to access internet services | |||
6345 | 7739722 | System for supporting security administration and method of doing the same | |||
6346 | 7739519 | Secure device | |||
6347 | 7739514 | Software application integrity verification method and device | |||
6348 | 7739511 | Systems and methods for watermarking software and other media | |||
6349 | 7739510 | Alert options for electronic-paper verification | |||
6350 | 7739509 | Authentication of an object using a signature part | |||
6351 | 7739508 | Secure instant messaging system | |||
6352 | 7739507 | Hardware multimedia endpoint and personal computer | |||
6353 | 7739503 | Authenticating method for short-distance radio devices and a short-distance radio device | |||
6354 | 7739499 | Check anti-fraud security system | |||
6355 | 7739498 | Method and apparatus for multi-table accessing of input/output devices using target security | |||
6356 | 7739495 | Data transmitting system and method, drive unit, access method, data recording medium, recording medium producing apparatus and method | |||
6357 | 7739402 | Locating devices in a data network | |||
6358 | 7738676 | Client-side watermarking using hybrid I-frames | |||
6359 | 7738675 | Decoding apparatus for controlling sequence of operations for a plurality of copyright information detection sections | |||
6360 | 7738660 | Cryptographic key split binding process and apparatus | |||
6361 | 7735143 | System and method for secure document processing | |||
6362 | 7735132 | System and method for encrypted smart card PIN entry | |||
6363 | 7735131 | Endoscope device for measuring an object using an image, by setting login qualifiers according to examination environment | |||
6364 | 7735130 | Image data transmission system, process and program, image data output device and image display device | |||
6365 | 7735126 | Certificate based authentication authorization accounting scheme for loose coupling interworking | |||
6366 | 7735116 | System and method for unified threat management with a relational rules methodology | |||
6367 | 7734926 | System and method for applying security to memory reads and writes | |||
6368 | 7734925 | System and method for the electronic management and execution of transaction documents | |||
6369 | 7734924 | System and method for transparently providing certificate validation and other services within an electronic transaction | |||
6370 | 7734922 | Method, system and terminal apparatus for enabling content to be reproduced in multiple terminals | |||
6371 | 7734921 | System and method for guaranteeing software integrity via combined hardware and software authentication | |||
6372 | 7734910 | Managed device, management system, method for controlling a managed device and medium | |||
6373 | 7734280 | Method and apparatus for authentication of mobile devices | |||
6374 | 7734051 | Key distribution | |||
6375 | 7734046 | Method for communicating and checking authentication data between a portable transponder device and a vehicle reader unit | |||
6376 | 7730490 | System with user access-control information having signature and flow setting information for controlling order of performance of functions | |||
6377 | 7730325 | Verification system and method | |||
6378 | 7730323 | Controlling database copyrights | |||
6379 | 7730318 | Integration of high-assurance features into an application through application factoring | |||
6380 | 7730317 | Linear predictive coding implementation of digital watermarks | |||
6381 | 7730313 | Tracing content usage | |||
6382 | 7730309 | Method and system for key management in voice over internet protocol | |||
6383 | 7730308 | System and method for providing an user's security when setting-up a connection over insecure networks | |||
6384 | 7730306 | Information processing apparatus with use-restricted functions, and system and method for canceling use restriction | |||
6385 | 7730304 | Device authentication information installation system | |||
6386 | 7730296 | Method and system for providing synchronous running encoding and encryption | |||
6387 | 7729496 | Efficient key updates in encrypted database systems | |||
6388 | 7727070 | Method and apparatus for authenticating and verifying communication on a network of gaming devices | |||
6389 | 7725947 | Methods and systems for providing benchmark information under controlled access | |||
6390 | 7725946 | Program, system and method for authenticating permission to use a computer system and inhibiting access to an unauthorized user | |||
6391 | 7725945 | Discouraging unauthorized redistribution of protected content by cryptographically binding the content to individual authorized recipients | |||
6392 | 7725935 | Detecting worms | |||
6393 | 7725930 | Validating the origin of web content | |||
6394 | 7725925 | Enforcing access control on multicast transmissions | |||
6395 | 7725924 | Network system, use permission determining method, network device, and recording medium | |||
6396 | 7725731 | System and method for managing access to functions supported by a multi-function port | |||
6397 | 7725730 | Cryptographic methods and apparatus for secure authentication | |||
6398 | 7725728 | Apparatus and method for dynamically auditing data migration to produce metadata | |||
6399 | 7725725 | User-selectable signatures | |||
6400 | 7725724 | Digital signature method based on braid groups conjugacy and verify method thereof | |||
6401 | 7725723 | Data certification method and apparatus | |||
6402 | 7725722 | Apparatus and method for triggering session re-negotiation between access network and access terminal in a high rate packet data system | |||
6403 | 7725720 | Method for generating and managing a local area network | |||
6404 | 7725718 | Authenticating images identified by a software application | |||
6405 | 7725717 | Method and apparatus for user authentication | |||
6406 | 7725715 | System and method for three-phase data encryption | |||
6407 | 7725710 | Authentication system for networked computer applications | |||
6408 | 7725567 | Peer-to-peer name resolution protocol (PNRP) security infrastructure and method | |||
6409 | 7724782 | Interval centroid based watermark | |||
6410 | 7724126 | Movable barrier operator operating parameter transfer method and apparatus | |||
6411 | 7721330 | Utility computing firewall | |||
6412 | 7721326 | Automatic authentication selection server | |||
6413 | 7721113 | Data alteration detecting method, data alteration detecting device and data alteration detecting program | |||
6414 | 7721106 | Transitive authentication authorization accounting in the interworking between access networks | |||
6415 | 7721103 | System and method for providing global media content delivery | |||
6416 | 7721102 | System and method for detecting exposure of OCSP responder's session private key | |||
6417 | 7721101 | Communication apparatus and authentication apparatus | |||
6418 | 7721099 | Securing access to documents within multi-function devices | |||
6419 | 7721098 | System and method for guaranteeing software integrity via combined hardware and software authentication | |||
6420 | 7721097 | Information recording medium, and information recording apparatus and method | |||
6421 | 7721096 | Self-authenticating blade server in a secure environment | |||
6422 | 7721095 | Apparatus, system, and method for authenticating personal identity, computer readable medium having personal identity authenticating program recorded thereon, method of registering personal identity authenticating information, method of verifying personal identity authenticating information, and recording medium having personal identity authenticating information recorded thereon | |||
6423 | 7721094 | Systems and methods for determining if applications executing on a computer system are trusted | |||
6424 | 7721093 | Authenticated exchange of public information using electronic mail | |||
6425 | 7721092 | Authenticating device, authenticated device and key updating method | |||
6426 | 7721088 | Terminal device, server device, and content distribution system | |||
6427 | 7720253 | Visual perception model for hi-fidelity image watermarking | |||
6428 | 7720250 | Method and apparatus for watermarking stream data | |||
6429 | 7720227 | Encryption method for SIP message and encrypted SIP communication system | |||
6430 | 7719996 | Encoding timestamps | |||
6431 | 7717349 | Semiconductor device for IC tag, IC tag and control method for IC tag for detecting and executing command from radio wave | |||
6432 | 7716720 | System for providing secure and trusted computing environments | |||
6433 | 7716718 | Electronic device network system and data receiver search method using electronic device network system | |||
6434 | 7716496 | Encryption/decryption management method in computer system having storage hierarchy | |||
6435 | 7716492 | Method and apparatus to obtain service capability credentials | |||
6436 | 7716489 | Access control method for disconnected automation systems | |||
6437 | 7716487 | License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer | |||
6438 | 7716486 | Controlling group access to doors | |||
6439 | 7716485 | Systems and methods for media authentication | |||
6440 | 7716483 | Method for establishing a communication between two devices | |||
6441 | 7716482 | Conference session key distribution method in an ID-based cryptographic system | |||
6442 | 7716480 | Property-based data authentication mechanism | |||
6443 | 7716477 | Data processing method, program of the same, and device of the same | |||
6444 | 7716470 | Active verification of boot firmware | |||
6445 | 7716469 | Method and system for providing a circle of trust on a network | |||
6446 | 7716352 | Method and system for retrieving information using an authentication web page | |||
6447 | 7716331 | Method of gaining secure access to intranet resources | |||
6448 | 7716140 | Methods and systems for controlling access to relationship information in a social network | |||
6449 | 7715565 | Information-centric security | |||
6450 | 7715563 | Rapid acquisition of state vectors in an encrypted data communication system | |||
6451 | 7712675 | Physical items for holding data securely, and methods and apparatus for publishing and reading them | |||
6452 | 7712141 | Determining advertising activity | |||
6453 | 7712139 | Data transmission method | |||
6454 | 7711959 | Method for transmitting encrypted user data objects | |||
6455 | 7711958 | Method and system for encoding signatures to authenticate files | |||
6456 | 7711956 | Information processing apparatus, information system, proxy processing method, and program and recording medium therefor | |||
6457 | 7711955 | Apparatus and method for cryptographic key expansion | |||
6458 | 7711952 | Method and system for license management | |||
6459 | 7711122 | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys | |||
6460 | 7710289 | Portable communication apparatus with an anti-theft mode and implementing method thereof | |||
6461 | 7707625 | Credential processing device event management | |||
6462 | 7707622 | API for a system having a passcode authenticator | |||
6463 | 7707430 | Digital content protection system | |||
6464 | 7707422 | Method for embedding watermark into an image and digital video recorder using said method | |||
6465 | 7707421 | Method of accessing or sharing a digital document in a peer-to-peer communication network | |||
6466 | 7707418 | Communication system, communication method, base station apparatus, controller, device, and recording medium storing control program | |||
6467 | 7707417 | Secure transmission of data between clients over communications network | |||
6468 | 7707416 | Authentication cache and authentication on demand in a distributed network environment | |||
6469 | 7707415 | Tunneling security association messages through a mesh network | |||
6470 | 7707413 | Systems and methods for protecting private information in a mobile environment | |||
6471 | 7707412 | Linked authentication protocols | |||
6472 | 7707405 | Secure installation activation | |||
6473 | 7707403 | Authentication method, communication apparatus, and relay apparatus | |||
6474 | 7707402 | Quantum cipher communication system | |||
6475 | 7707241 | Determining type of signal encoder | |||
6476 | 7703145 | Data update authorization | |||
6477 | 7703142 | Software license authorization system | |||
6478 | 7702921 | Loading media data into a portable data carrier | |||
6479 | 7702912 | Secure systems management | |||
6480 | 7702911 | Interfacing with a system that includes a passcode authenticator | |||
6481 | 7702910 | Message authentication | |||
6482 | 7702909 | Method and system for validating timestamps | |||
6483 | 7702903 | License re-allocation system and method | |||
6484 | 7702898 | Method for authenticating and verifying SMS communications | |||
6485 | 7702221 | Unified control and memory for a combined DVD/HDD system | |||
6486 | 7702108 | Use of communication equipment and method for authenticating an item, unit and system for authenticating items, and authenticating device | |||
6487 | 7702107 | Server-based encrypted messaging method and apparatus | |||
6488 | 7702102 | Method for encoded data transmission via a communication network | |||
6489 | 7701956 | Method and system for using a transfer agent for translating a configuration file | |||
6490 | 7698747 | Applet download in a communication system | |||
6491 | 7698743 | Authentication server, method and system for detecting unauthorized terminal | |||
6492 | 7698736 | Secure delegation using public key authentication | |||
6493 | 7698735 | Method and system of integrating third party authentication into internet browser code | |||
6494 | 7698732 | Method and apparatus for exchanging information between computer systems from different computer networks | |||
6495 | 7698570 | Digital content distribution system and method | |||
6496 | 7698568 | System and method for using DRM to control conditional access to broadband digital content | |||
6497 | 7698565 | Crypto-proxy server and method of using the same | |||
6498 | 7698562 | Authenticated program execution method | |||
6499 | 7698561 | Method and system for detection of aliases in a network | |||
6500 | 7698560 | Information storage system | |||
6501 | 7698559 | Dynamic enabling of functionality in electronic document readers | |||
6502 | 7698558 | System for, and method of, providing the transmission, receipt and content of an e-mail message | |||
6503 | 7698557 | System and method for generating a digital certificate | |||
6504 | 7698556 | Secure spontaneous associations between networkable devices | |||
6505 | 7698554 | Controlling transmission of broadcast content | |||
6506 | 7698372 | System for publishing messages from identified, authorized senders to subscribers | |||
6507 | 7698324 | Distributed confidential contextual querying | |||
6508 | 7697716 | Watermarking different areas of digital images with different intensities | |||
6509 | 7697690 | Windowed backward key rotation | |||
6510 | 7697688 | Pipelined packet encapsulation and decapsulation for temporal key integrity protocol employing arcfour algorithm | |||
6511 | 7697685 | Data dependent scrambler with reduced overhead | |||
6512 | 7694341 | Run-time code injection to perform checks | |||
6513 | 7694336 | Aggregated authenticated identity apparatus for and method therefor | |||
6514 | 7694333 | Communication apparatus, communication system, certificate transmission method, anomaly detection method and a program therefor | |||
6515 | 7694329 | Secure delegation using public key authentication | |||
6516 | 7694328 | Systems and methods for secure client applications | |||
6517 | 7694143 | Method of and system for collecting an electronic signature for an electronic record stored in a database | |||
6518 | 7694142 | Digital content distribution systems | |||
6519 | 7694140 | Web service client extensions | |||
6520 | 7694139 | Securing executable content using a trusted computing platform | |||
6521 | 7694138 | Secure authentication with voiced responses from a telecommunications terminal | |||
6522 | 7694137 | Image processing system and authentication method of the same | |||
6523 | 7694136 | Method for distributing and authenticating public keys using hashed password protection | |||
6524 | 7694132 | Secure intermediary communications system | |||
6525 | 7694126 | Method and system for recovering the validity of cryptographically signed digital data | |||
6526 | 7693286 | Method of delivering direct proof private keys in signed groups to devices using a distribution CD | |||
6527 | 7693277 | Generating digital signatures using ephemeral cryptographic key | |||
6528 | 7689836 | Encryption device | |||
6529 | 7689835 | Computer program product and computer system for controlling performance of operations within a data processing system or networks | |||
6530 | 7689833 | Method and apparatus for electro-biometric identity recognition | |||
6531 | 7689829 | Method for the encryption and decryption of data by various users | |||
6532 | 7689825 | Systems and methods for device registration using optical transmission | |||
6533 | 7689824 | Data management apparatus, data management system, and method of data management | |||
6534 | 7689658 | Method for publishing messages from identified, authorized senders to subscribers | |||
6535 | 7689654 | Email address verification | |||
6536 | 7688996 | Adaptive prediction filtering for digital watermarking | |||
6537 | 7687750 | Multi-party missile firing control system | |||
6538 | 7685642 | System and method for controlling rights expressions by stakeholders of an item | |||
6539 | 7685639 | Using inserted e-mail headers to enforce a security policy | |||
6540 | 7685637 | System security approaches using sub-expression automata | |||
6541 | 7685631 | Authentication of a server by a client to prevent fraudulent user interfaces | |||
6542 | 7685629 | Methods and systems for authenticating users | |||
6543 | 7685626 | Information management system | |||
6544 | 7685433 | Recognition of live object in motion | |||
6545 | 7685429 | Signature-generation method, signature-verification method, public-key distribution method, and information-processing apparatus | |||
6546 | 7685428 | Transmission of event markers to data stream recorder | |||
6547 | 7685427 | System and method for loading digital watermarks automatically | |||
6548 | 7685426 | Managing and indexing content on a network with image bookmarks and digital watermarks | |||
6549 | 7685425 | Server computer for guaranteeing files integrity | |||
6550 | 7685424 | Validating untrusted objects and entities | |||
6551 | 7685423 | Validation protocol and system | |||
6552 | 7685421 | System and method for initializing operation for an information security operation | |||
6553 | 7685420 | Cookie-based mechanism providing lightweight authentication of layer-2 frames | |||
6554 | 7685247 | System for publishing and converting messages from identified, authorized senders | |||
6555 | 7685246 | Control of an instant message system that allows multiple clients with identical credentials | |||
6556 | 7684569 | Electronic device control system and method and electronic device, and control apparatus | |||
6557 | 7681242 | Allocation of network resources | |||
6558 | 7681240 | Trusted storage systems and methods | |||
6559 | 7681228 | Method of one time authentication response to a session-specific challenge indicating a random subset of password or PIN character positions | |||
6560 | 7681044 | Secure processor and system | |||
6561 | 7681040 | Method for embedding security codes into film during printing | |||
6562 | 7681039 | Collusion-resistant watermarking and fingerprinting | |||
6563 | 7681038 | Method and system for facilitating packet-based communications | |||
6564 | 7681037 | Network connection system | |||
6565 | 7681035 | Digital rights management handler and related methods | |||
6566 | 7681032 | System and method for monitoring unauthorized transport of digital content | |||
6567 | 7680269 | Method for ciphering a compressed audio or video stream with error tolerance | |||
6568 | 7676846 | Binding content to an entity | |||
6569 | 7676843 | Executing applications at appropriate trust levels | |||
6570 | 7676833 | Login screen with identifying data | |||
6571 | 7676831 | Role-based access control management for multiple heterogeneous application components | |||
6572 | 7676680 | Systems and methods for distributing private placement documents | |||
6573 | 7676679 | Method for self-synchronizing time between communicating networked systems using timestamps | |||
6574 | 7676677 | Digital signature method and apparatus | |||
6575 | 7676676 | Method and apparatus for performing mutual authentication within a network | |||
6576 | 7676675 | Architecture for connecting a remote client to a local client desktop | |||
6577 | 7676037 | Cryptographic method capable of protecting elliptic curve code from side channel attacks | |||
6578 | 7674298 | Method and apparatus for implementing a handheld security system | |||
6579 | 7673333 | Flexible method of security data backup | |||
6580 | 7673332 | Method and system for access authentication | |||
6581 | 7673329 | Method and apparatus for encrypted communications to a secure server | |||
6582 | 7673328 | Network authentication system using individual services providers and an authentication server | |||
6583 | 7673327 | Aggregation system | |||
6584 | 7673288 | Bypassing execution of a software test using a file cache | |||
6585 | 7673155 | Microprocessor with improved task management and table management mechanism | |||
6586 | 7673143 | JXTA rendezvous as certificate of authority | |||
6587 | 7673141 | Client authentication using a challenge provider | |||
6588 | 7673139 | Protecting administrative privileges | |||
6589 | 7673135 | Request authentication token | |||
6590 | 7672474 | Electronic watermark embedding device, electronic watermark detection device, method thereof, and program | |||
6591 | 7672457 | Computer-readable recording medium recording a wireless communication authentication program | |||
6592 | 7669243 | Method and system for detection and neutralization of buffer overflow attacks | |||
6593 | 7669233 | Methods and systems for secure transmission of identification information over public networks | |||
6594 | 7669230 | Secure switching system for networks and method for securing switching | |||
6595 | 7669229 | Network protecting authentication proxy | |||
6596 | 7669227 | Information management system | |||
6597 | 7669226 | Generic declarative authorization scheme for Java | |||
6598 | 7669059 | Method and apparatus for detection of hostile software | |||
6599 | 7669056 | Method and apparatus for measuring presentation data exposure | |||
6600 | 7669053 | System and method for using acoustic digital signature generator as oracle | |||
6601 | 7668945 | Network booting using a platform management coprocessor | |||
6602 | 7668920 | Electronic message and data tracking system | |||
6603 | 7668335 | Communication device, digital signature verification method and digital signature generation method | |||
6604 | 7665141 | Origin and custody of copies from a stored electronic record verified page by page | |||
6605 | 7665125 | System and method for distribution of security policies for mobile devices | |||
6606 | 7665124 | Authentication device | |||
6607 | 7664964 | Electronic media communication apparatus | |||
6608 | 7664960 | Password enhancing device | |||
6609 | 7664959 | Method, apparatus and article for off-line certification in mobile applications | |||
6610 | 7664957 | Digital signatures including identity-based aggregate signatures | |||
6611 | 7664954 | Providing apparatus, providing method, communication device, communication method, and program | |||
6612 | 7664953 | Data processing device, method of same, and program of same | |||
6613 | 7664952 | Service verifying system, authentication requesting terminal, service utilizing terminal, and service providing method | |||
6614 | 7664951 | Transmitting apparatus for providing information by effective use of bands | |||
6615 | 7664947 | Systems and methods for automated exchange of electronic mail encryption certificates | |||
6616 | 7664264 | Utilizing data reduction in steganographic and cryptographic systems | |||
6617 | 7664262 | Playback apparatus and playback control method | |||
6618 | 7664261 | Encryption processor | |||
6619 | 7664021 | Recording and reproducing apparatus and file transfer method | |||
6620 | 7661589 | Security management software, print control device, and security management method of print control device | |||
6621 | 7661132 | Tag privacy protection method, tag device, backend apparatus, updater, update solicitor and record medium carrying such programs in storage | |||
6622 | 7661129 | Secure traversal of network components | |||
6623 | 7661128 | Secure login credentials for substantially anonymous users | |||
6624 | 7661126 | Systems and methods for authenticating a user interface to a computer user | |||
6625 | 7660992 | Electronic data storage system and method thereof | |||
6626 | 7660991 | Embedding, processing and detection of digital content, information and data | |||
6627 | 7660989 | System for, and method of, authenticating an electronic message to a recipient | |||
6628 | 7660988 | Electronic notary | |||
6629 | 7660986 | Secure control of security mode | |||
6630 | 7660981 | Verifiable chain of transfer for digital documents | |||
6631 | 7660429 | Error diffusion halftone watermarking | |||
6632 | 7660418 | Cryptographic system and method for geolocking and securing digital information | |||
6633 | 7657945 | Systems and arrangements to adjust resource accessibility based upon usage modes | |||
6634 | 7657932 | Extendible security token management architecture and secure message handling methods | |||
6635 | 7657926 | Enabling network communication from role based authentication | |||
6636 | 7657756 | Secure memory caching structures for data, integrity and version values | |||
6637 | 7657755 | Modular cryptographic device providing status determining features and related methods | |||
6638 | 7657751 | Efficient and secure data currentness systems | |||
6639 | 7657749 | Communication scheme using outside DTCP bridge for realizing copyright protection | |||
6640 | 7657746 | Supporting statements for credential based access control | |||
6641 | 7657745 | Secure electronic transfer without requiring knowledge of secret data | |||
6642 | 7657743 | Information viewing/listening system | |||
6643 | 7657742 | Content reproducing apparatus authenticating detachable recording medium and authentication control method | |||
6644 | 7657738 | List signature method and application to electronic voting | |||
6645 | 7656794 | Method and apparatus for authenticated quality of service reservation | |||
6646 | 7653945 | Interactive key control system and method of managing access to secured locations | |||
6647 | 7653931 | System and method for user login and tracking | |||
6648 | 7653818 | System and method for user authentication with enhanced passwords | |||
6649 | 7653816 | E-mail certification service | |||
6650 | 7653815 | System and method for processing encoded messages for exchange with a mobile data communication device | |||
6651 | 7653814 | System and method for securely hyperlinking graphic objects | |||
6652 | 7653813 | Method and apparatus for address creation and validation | |||
6653 | 7653812 | Method and system for evaluating confidence in a sending domain to accurately assign a trust that a communication is not unwanted | |||
6654 | 7650643 | Method, apparatus, and system for managing, reviewing, comparing and detecting data on a wide area network | |||
6655 | 7650638 | Network security monitoring system employing bi-directional communication | |||
6656 | 7650632 | Password management | |||
6657 | 7650631 | Method for verifying authorization with extensibility in AAA server | |||
6658 | 7650629 | Enhanced trust relationship in an IEEE 802.1.times.network | |||
6659 | 7650628 | Transcription data security | |||
6660 | 7650511 | Information processing method, falsification verification method and device, storage medium, and program | |||
6661 | 7650509 | Encoding data in a password | |||
6662 | 7650508 | Time stamping system | |||
6663 | 7650507 | Small memory footprint fast elliptic encryption | |||
6664 | 7650505 | Methods and apparatus for persistence of authentication and authorization for a multi-tenant internet hosted site using cookies | |||
6665 | 7650504 | System and method of verifying the authenticity of dynamically connectable executable images | |||
6666 | 7650503 | Memory card | |||
6667 | 7650502 | Method of communications and communication network intrusion protection methods and intrusion attempt detection system | |||
6668 | 7649990 | Apparatus to implement dual hash algorithm | |||
6669 | 7649641 | Printing medium, image forming apparatus, and printing method | |||
6670 | 7647644 | Entitlement designation in web services for remote portlets environment | |||
6671 | 7647643 | Template access control lists | |||
6672 | 7647642 | System and method for managing copyrighted electronic media | |||
6673 | 7647639 | Methods for detecting executable code which has been altered | |||
6674 | 7647504 | Method and system for efficiently retrieving secured data by securely pre-processing provided access information | |||
6675 | 7647501 | Communications apparatus, communications system, and method of setting certificate | |||
6676 | 7647499 | Apparatus and method for ownership verification | |||
6677 | 7647496 | Process-mode independent driver model | |||
6678 | 7647494 | Name transformation for a public key infrastructure (PKI) | |||
6679 | 7646883 | Digital watermark detection method and apparatus | |||
6680 | 7646882 | Digital watermark embedding apparatus, method and program, and digital watermark detection apparatus, method and program | |||
6681 | 7646874 | Establishing mutual authentication and secure channels in devices without previous credentials | |||
6682 | 7646873 | Key manager for QKD networks | |||
6683 | 7644444 | Communication device, program and recording media | |||
6684 | 7644433 | Authentication system and method based upon random partial pattern recognition | |||
6685 | 7644422 | Interactive service device metering systems | |||
6686 | 7644290 | System and method for seal tamper detection for intelligent electronic devices | |||
6687 | 7644285 | Recovery access to secure data | |||
6688 | 7644281 | Character and vector graphics watermark for structured electronic documents security | |||
6689 | 7644280 | Method and system for linking certificates to signed files | |||
6690 | 7644279 | Consumer product distribution in the embedded system market | |||
6691 | 7644278 | Method for securely creating an endorsement certificate in an insecure environment | |||
6692 | 7644274 | Methods of protecting against spam electronic mail | |||
6693 | 7644269 | Method of controlling access | |||
6694 | 7644163 | Plug and play mobile services | |||
6695 | 7644042 | Managing transaction accounts | |||
6696 | 7643652 | Method and apparatus for embedding watermarks | |||
6697 | 7643636 | Managing multiple cryptographic periods in a single cryptographic group | |||
2009 | |||||
6698 | 7640594 | Secure storage in a file system | |||
6699 | 7640579 | Securely roaming digital identities | |||
6700 | 7640575 | System and method for determining a security encoding to be applied to outgoing messages | |||
6701 | 7640573 | Generic security claim processing model | |||
6702 | 7640435 | System, method, and apparatus for securely providing content viewable on a secure device | |||
6703 | 7640434 | Identification of undesirable content in responses sent in reply to a user request for content | |||
6704 | 7640433 | MILS network using COTS switches | |||
6705 | 7640432 | Electronic cash controlled by non-homomorphic signatures | |||
6706 | 7640431 | Method and apparatus for digital watermarking | |||
6707 | 7640430 | System and method for achieving machine authentication without maintaining additional credentials | |||
6708 | 7640004 | Wireless LAN system, wireless terminal, wireless base station, communication configuration method for wireless terminal, and program thereof | |||
6709 | 7639947 | System and methods for quantum key distribution over WDM links | |||
6710 | 7639835 | Information processing apparatus and its control method, computer program and storage medium | |||
6711 | 7639808 | Elliptic curve cryptosystem apparatus, elliptic curve cryptosystem method, elliptic curve cryptosystem program and computer readable recording medium storing the elliptic curve cryptosystem program | |||
6712 | 7639806 | Fingerprinting digital devices using electromagnetic characteristics of their communications | |||
6713 | 7639799 | Cryptographically processing data based on a Cassels-Tate pairing | |||
6714 | 7636939 | Endpoint identification and security | |||
6715 | 7636937 | Method and apparatus for comparing access control lists for configuring a security policy on a network | |||
6716 | 7636935 | Method of enforcing a policy on a computer network | |||
6717 | 7636854 | Security device for online transaction | |||
6718 | 7636848 | Method, system, network and computer program product for securing administrative transactions over a network | |||
6719 | 7636846 | Global conditional access system for broadcast services | |||
6720 | 7636843 | Information transmission system and method, drive device and access method, information recording medium, device and method for producing recording medium | |||
6721 | 7636840 | Secure communications and control in a fueling environment | |||
6722 | 7636451 | Digital watermark embedding apparatus and method, and digital watermark detection apparatus and method | |||
6723 | 7636440 | Digital watermark with variable location | |||
6724 | 7636439 | Encryption method, encryption apparatus, data storage distribution apparatus and data delivery system | |||
6725 | 7636438 | Data medium authentication method | |||
6726 | 7636032 | Active RFID tag with new use automatic updating | |||
6727 | 7636030 | Security layers for wireless industrial control user interface | |||
6728 | 7634804 | Information providing system and method thereof | |||
6729 | 7634802 | Secure method and system for creating a plug and play network | |||
6730 | 7634661 | Manifest-based trusted agent management in a trusted operating system environment | |||
6731 | 7634659 | Roaming hardware paired encryption key generation | |||
6732 | 7634658 | Method for logically binding and verifying a subassembly in equipment | |||
6733 | 7634657 | Reducing the probability of undetected collisions in hash-based data block processing | |||
6734 | 7634656 | Method and apparatus for identifying a voice caller | |||
6735 | 7634655 | Efficient hash table protection for data transport protocols | |||
6736 | 7634653 | Event-ordering certification method | |||
6737 | 7634579 | Method and system for interpreting and displaying time data received from a server management device | |||
6738 | 7633375 | Information security system, its server and its storage medium | |||
6739 | 7631346 | Method and system for a runtime user account creation operation within a single-sign-on process in a federated computing environment | |||
6740 | 7631345 | Relay device, authentication server, and authentication method | |||
6741 | 7631344 | Distributed authentication framework stack | |||
6742 | 7631343 | Down-line transcription system using automatic tracking and revenue collection | |||
6743 | 7631193 | Tokenless identification system for authorization of electronic transactions and electronic transmissions | |||
6744 | 7631192 | Network apparatus for accessing services over a network | |||
6745 | 7631191 | System and method for authenticating a web page | |||
6746 | 7631190 | Use of variant and base keys with two entities | |||
6747 | 7631189 | Information recording device, information reproducing device, information recording medium, method, and computer program | |||
6748 | 7631188 | Hierarchical open security information delegation and acquisition | |||
6749 | 7631186 | Mobile terminal authentication method capable of reducing authentication processing time and preventing fraudulent transmission/reception of data through spoofing | |||
6750 | 7631185 | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing | |||
6751 | 7631184 | System and method for imposing security on copies of secured items | |||
6752 | 7631183 | System and method for retrieving related certificates | |||
6753 | 7630512 | Method for performing recoverable video and image watermarking which survives block-based video and image compression | |||
6754 | 7630386 | Method for providing broadband communication service | |||
6755 | 7627901 | Systems and methods for improved media access control | |||
6756 | 7627895 | Trust tokens | |||
6757 | 7627892 | Multiple methods for transacting, publishing and purchasing copyrighted digital content | |||
6758 | 7627765 | Document management apparatus and document management method, and storage medium storing program | |||
6759 | 7627761 | System for authentication of JPEG image data | |||
6760 | 7627760 | Extended authenticated key exchange | |||
6761 | 7627758 | Method and system for performing a security check | |||
6762 | 7627757 | Message service indication system and method | |||
6763 | 7627753 | Secure digital data format and code enforced policy | |||
6764 | 7627126 | Systems and methods for implementing path length control for quantum cryptographic systems | |||
6765 | 7626940 | System and method for integrated header, state, rate and content anomaly prevention for domain name service | |||
6766 | 7624441 | CA in a card | |||
6767 | 7624439 | Authenticating resource requests in a computer system | |||
6768 | 7624435 | Method and apparatus for managing digital assets | |||
6769 | 7624431 | 802.1X authentication technique for shared media | |||
6770 | 7624428 | Apparatus and method for platform-independent identity manageability | |||
6771 | 7624425 | Method and apparatus for generating a security document for a farm in a utility computing environment | |||
6772 | 7624424 | Access control system, access control method, and access control program | |||
6773 | 7624275 | Disk drive, control method thereof and disk-falsification detection method | |||
6774 | 7624274 | Decreasing the fragility of duplicate document detecting algorithms | |||
6775 | 7624271 | Communications security | |||
6776 | 7624267 | SIM-based authentication method capable of supporting inter-AP fast handover | |||
6777 | 7624265 | Methods and apparatus for establishing communications with a data storage system | |||
6778 | 7624264 | Using time to determine a hash extension | |||
6779 | 7623022 | Securing electronic annotations | |||
6780 | 7620977 | System and method for improved managing of profiles in a web portal environment | |||
6781 | 7620824 | Data communicating apparatus, data communicating method, and program | |||
6782 | 7620823 | Smart cards having protection circuits therein that inhibit power analysis attacks and methods of operating same | |||
6783 | 7620815 | Credential production using a secured consumable supply | |||
6784 | 7620814 | System and method for distributing data | |||
6785 | 7620813 | Method to authenticate a data processing apparatus having a recording device and apparatuses therefor | |||
6786 | 7620198 | Watermark coding method and recording medium thereof | |||
6787 | 7617538 | Configuration information protection using cost based analysis | |||
6788 | 7617521 | Charging via policy enforcement | |||
6789 | 7617402 | Copyright protection system, encryption device, decryption device and recording medium | |||
6790 | 7617397 | Systems and methods for generation and validation of isogeny-based signatures | |||
6791 | 7617396 | Method and apparatus for watermarking binary computer code with modified compiler optimizations | |||
6792 | 7617394 | Authentication system | |||
6793 | 7614558 | Document correction detection system and document tampering prevention system | |||
6794 | 7614078 | Threshold access based upon stored credentials | |||
6795 | 7614047 | Change indication for a service offering | |||
6796 | 7613924 | Encrypted and other keys in public and private battery memories | |||
6797 | 7613919 | Single-use password authentication | |||
6798 | 7613448 | Web access providing system | |||
6799 | 7613299 | Cryptographic techniques for a communications network | |||
6800 | 7612680 | First aid information for cellular telephones and electronic devices | |||
6801 | 7612651 | Communication system, communication method and program | |||
6802 | 7610629 | Access control apparatus, access control method, and access control program | |||
6803 | 7610617 | Authentication system for networked computer applications | |||
6804 | 7610612 | Data transmission method, a data transmission program and a data transmission server | |||
6805 | 7610611 | Prioritized address decoder | |||
6806 | 7610493 | System and methods for adapting to attacks on cryptographic processes on multiprocessor systems with shared cache | |||
6807 | 7610488 | Data processing device and method and program of same | |||
6808 | 7610487 | Human input security codes | |||
6809 | 7609848 | Multi-stage watermarking process and system | |||
6810 | 7607147 | Interactive service device metering systems | |||
6811 | 7607139 | Quiescence mode for a portal | |||
6812 | 7607026 | Standalone memory device and system and method using such device | |||
6813 | 7607019 | Small memory footprint fast elliptic encryption | |||
6814 | 7607017 | Embedding data in material | |||
6815 | 7607016 | Including a metric in a digital watermark for media authentication | |||
6816 | 7607014 | Authenticating maintenance access to an electronics unit via wireless communication | |||
6817 | 7607012 | Method for securing a communication | |||
6818 | 7606389 | Digital watermarking apparatus and computer-readable medium | |||
6819 | 7606361 | Sending a message securely over an insecure channel | |||
6820 | 7603702 | Method and device for identifying user-selected equipment | |||
6821 | 7603701 | Tools for access to databases via internet protocol networks | |||
6822 | 7603700 | Authenticating a client using linked authentication credentials | |||
6823 | 7603698 | Image forming apparatus and image forming method | |||
6824 | 7603697 | Method and system for securely delivering authentication-related data | |||
6825 | 7603567 | Information processing system and information processing method | |||
6826 | 7603566 | Authenticated process switching on a microprocessor | |||
6827 | 7603565 | Apparatus and method for authenticating access to a network resource | |||
6828 | 7603562 | System and method for reducing memory requirements of firmware | |||
6829 | 7603561 | Methods and apparatus for input of coded image data | |||
6830 | 7603560 | Method and apparatus for digital signature authentication | |||
6831 | 7603559 | Real-time signature embedding in video | |||
6832 | 7603558 | Montgomery transform device, arithmetic device, IC card, encryption device, decryption device and program | |||
6833 | 7603557 | Communication device, communication system and authentication method | |||
6834 | 7603556 | Challenge response-based device authentication system and method | |||
6835 | 7603554 | Encryption communication system | |||
6836 | 7603550 | Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path | |||
6837 | 7602817 | Low deviation field modulation for transfer of information | |||
6838 | 7602731 | System and method for integrated header, state, rate and content anomaly prevention with policy enforcement | |||
6839 | 7600263 | Access controlled search results | |||
6840 | 7600258 | Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies | |||
6841 | 7600255 | Preventing network denial of service attacks using an accumulated proof-of-work approach | |||
6842 | 7600253 | Entity correlation service | |||
6843 | 7600251 | Universal peer-to-peer game download | |||
6844 | 7600134 | Theft deterrence using trusted platform module authorization | |||
6845 | 7600130 | Method and apparatus of storage anti-piracy key encryption (sake) device to control data access for networks | |||
6846 | 7600129 | Controlling access using additional data | |||
6847 | 7600128 | Two-factor computer password client device, system, and method | |||
6848 | 7600127 | System and method for ISO image update and ISO image deconstruction into modular components | |||
6849 | 7600126 | Efficient processing of time-bounded messages | |||
6850 | 7600125 | Hash-based data block processing with intermittently-connected systems | |||
6851 | 7600124 | Method of and system for associating an electronic signature with an electronic record | |||
6852 | 7600123 | Certificate registration after issuance for secure communication | |||
6853 | 7600121 | Message security | |||
6854 | 7600119 | Data update system, data update method, data update program, and robot system | |||
6855 | 7600113 | Secure network channel | |||
6856 | 7599515 | Wireless communication method and apparatus for generating, watermarking and securely transmitting content | |||
6857 | 7599495 | Content delivery service providing apparatus and content delivery service terminal unit | |||
6858 | 7599289 | Electronic communication control | |||
6859 | 7597265 | Method and system for vascular scan recognition with a smartcard | |||
6860 | 7596703 | Hidden data backup and retrieval for a secure device | |||
6861 | 7596700 | Method and system for establishing trusting environment for sharing data between mutually mistrusting entities | |||
6862 | 7596699 | Battery authentication system | |||
6863 | 7596698 | Semiconductor memory card, playback apparatus, recording apparatus, playback method, recording method, and computer-readable recording medium | |||
6864 | 7596697 | Technique for providing multiple levels of security | |||
6865 | 7596222 | Encrypting data for access by multiple users | |||
6866 | 7594273 | Network security system having a device profiler communicatively coupled to a traffic monitor | |||
6867 | 7594265 | System for preventing unauthorized access to sensitive data and a method thereof | |||
6868 | 7594263 | Operating a communication network through use of blocking measures for responding to communication traffic anomalies | |||
6869 | 7594261 | Cryptographic applications of the Cartier pairing | |||
6870 | 7594236 | Thread to thread communication | |||
6871 | 7594124 | Cross validation of data using multiple subsystems | |||
6872 | 7594122 | Method of determining whether a test subject is a specific individual | |||
6873 | 7594120 | User-defined passwords having associated unique version data to assist user recall of the password | |||
6874 | 7594116 | Mediated key exchange between source and target of communication | |||
6875 | 7594115 | Contents information output system and contents information output method | |||
6876 | 7594113 | Identification information protection method in WLAN inter-working | |||
6877 | 7594108 | Operator root certificates | |||
6878 | 7593717 | Authenticating access to a wireless local area network based on security value(s) associated with a cellular system | |||
6879 | 7593529 | Scramble methods and apparatus for packetized digital video signal in conditional access system | |||
6880 | 7593527 | Providing digital signature and public key based on shared knowledge | |||
6881 | 7593343 | Method and apparatus for monitoring and the prevention of call storms in a communications network | |||
6882 | 7591013 | System and method for client initiated authentication in a session initiation protocol environment | |||
6883 | 7591008 | Client authentication using multiple user certificates | |||
6884 | 7591006 | Security for external system management | |||
6885 | 7591005 | Method and apparatus for user log-in name mapping | |||
6886 | 7591004 | Using trusted communication channel to combat user name/password theft | |||
6887 | 7591001 | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection | |||
6888 | 7590865 | Method and apparatus for restriction use of storage medium using user key | |||
6889 | 7590859 | System and method for accomplishing two-factor user authentication using the internet | |||
6890 | 7590858 | Authentication apparatus, user authentication method, user authentication card and storage medium | |||
6891 | 7590855 | Steganographically authenticated packet traffic | |||
6892 | 7590854 | Hierarchical identity-based encryption and signature schemes | |||
6893 | 7590850 | Digital signature method based on identification information of group members, and method of acquiring identification information of signed-group member, and digital signature system for performing digital signature based on identification information of group members | |||
6894 | 7590849 | Method and control program for operating a communication terminal for packet-oriented data transmission | |||
6895 | 7590846 | Public key cryptographic method of protecting an electronic chip against fraud | |||
6896 | 7590844 | Decryption system and method for network analyzers and security programs | |||
6897 | 7590842 | Service providing system and authentication system, as well as signature generating apparatus, service utilizing apparatus and verification apparatus | |||
6898 | 7590247 | System and method for reusable efficient key distribution | |||
6899 | 7590241 | Receiver and receiving method | |||
6900 | 7590236 | Identity-based-encryption system | |||
6901 | 7587750 | Method and system to support network port authentication from out-of-band firmware | |||
6902 | 7587617 | Data repository and method for promoting network storage of data | |||
6903 | 7587614 | Encryption algorithm optimized for FPGAs | |||
6904 | 7587613 | Method and apparatus for selectively enabling a microprocessor-based system | |||
6905 | 7587603 | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections | |||
6906 | 7587600 | Loading data onto an electronic device | |||
6907 | 7587599 | System and method for providing services | |||
6908 | 7587598 | Interlayer fast authentication or re-authentication for network communication | |||
6909 | 7587596 | Method and apparatus for updating information stored in multiple information handling systems | |||
6910 | 7587062 | Watermarking | |||
6911 | 7587045 | System and method for securing document transmittal | |||
6912 | 7586641 | System for certifying whether printed material corresponds to original | |||
6913 | 7584510 | Network service processing method and system | |||
6914 | 7584504 | Embedding a security support provider interface in a communication class library | |||
6915 | 7584500 | Pre-fetching secure content using proxy architecture | |||
6916 | 7584482 | System and method for authenticating transactions | |||
6917 | 7584362 | Systems and methods for providing signatures | |||
6918 | 7584361 | Encoding and detecting apparatus | |||
6919 | 7584357 | Control device for creating one-time password using pre-input button code, home server for authenticating control device using one-time password, and method for authenticating control device with one-time password | |||
6920 | 7584355 | Authentication service schemes | |||
6921 | 7583801 | Apparatus, system, method and computer program product for distributing service information and digital rights for broadcast data | |||
6922 | 7581242 | Authenticating products | |||
6923 | 7581117 | Method for secure delivery of configuration data for a programmable logic device | |||
6924 | 7581116 | Device control support information acquisition | |||
6925 | 7581113 | System and method for generating and authenticating a computer password | |||
6926 | 7581110 | Key distribution for encrypted broadcast data using minimal system bandwidth | |||
6927 | 7581108 | Method and system for generating time-based identifiers | |||
6928 | 7581107 | Anonymity revocation | |||
6929 | 7581104 | Image watermaking method using human visual system | |||
6930 | 7581103 | Software self-checking systems and methods | |||
6931 | 7581102 | Certificate confirmation method, certificate confirmation program and certificate that can readily and more positively confirm authenticity of certificate | |||
6932 | 7581100 | Key generation method for communication session encryption and authentication system | |||
6933 | 7581096 | Method, apparatus, and program product for automatically provisioning secure network elements | |||
6934 | 7581012 | Virtual communication channel and virtual private community, and agent collaboration system and agent collaboration method for controlling the same | |||
6935 | 7580859 | Intelligent transaction router and process for handling multi-product point of sale transactions | |||
6936 | 7577990 | Method and system for resolving disputes between service providers and service consumers | |||
6937 | 7577987 | Operation modes for user authentication system based on random partial pattern recognition | |||
6938 | 7577985 | Trusted handler and data association | |||
6939 | 7577845 | Information matrix cryptogram | |||
6940 | 7577842 | Methods of scrambling and unscrambling a video signal, a system, an encoder, a decoder, a broadcast server, and a data medium for implementing the methods | |||
6941 | 7577838 | Hybrid systems for securing digital assets | |||
6942 | 7577834 | Message authentication using message gates in a distributed computing environment | |||
6943 | 7577272 | Digital fingerprinting using synchronization marks and watermarks | |||
6944 | 7574747 | Proximity detection employed in connection with rights management system or the like | |||
6945 | 7574744 | System and method for securely duplicating digital documents | |||
6946 | 7574739 | Password authenticating apparatus, method, and program | |||
6947 | 7574733 | System and method of using the public switched telephone network in providing authentication or authorization for online transaction | |||
6948 | 7574732 | Object location based security using RFID | |||
6949 | 7574731 | Self-managed network access using localized access management | |||
6950 | 7574607 | Secure pipeline processing | |||
6951 | 7574602 | Information-processing device, information-processing method, and information-processing program product | |||
6952 | 7574601 | Securely inspecting electronic messages | |||
6953 | 7574535 | Prevention of inadvertent data synchronization to and from removable memory sources on a handheld connected device | |||
6954 | 7571472 | Methods and apparatus for credential validation | |||
6955 | 7571471 | Secure login using a multifactor split asymmetric crypto-key with persistent key security | |||
6956 | 7571469 | Method for communication control in a communication network, communication control entity, key management entity, terminal and gateway entity | |||
6957 | 7571466 | Parental consent service | |||
6958 | 7571464 | Secure bidirectional cross-system communications framework | |||
6959 | 7571462 | Information processing apparatus, transfer program product, and transfer control method | |||
6960 | 7571461 | Personal website for electronic commerce on a smart Java card with multiple security check points | |||
6961 | 7571326 | Relative latency dynamics for identity authentication | |||
6962 | 7571325 | Remote identification of blocked websites while maintaining user privacy | |||
6963 | 7571321 | Identity-based-encryption messaging system | |||
6964 | 7571314 | Method of assembling authorization certificate chains | |||
6965 | 7571313 | Authentication for Ad Hoc network setup | |||
6966 | 7571311 | Scheme for sub-realms within an authentication protocol | |||
6967 | 7570762 | Content delivery service providing apparatus and content delivery service terminal unit | |||
6968 | 7570759 | System and method for secure encryption | |||
6969 | 7568237 | Access control list with convolution-weakened authorization | |||
6970 | 7568235 | Controlling data access using security label components | |||
6971 | 7568226 | Data processing system and method | |||
6972 | 7568222 | Standardized transmission and exchange of data with security and non-repudiation functions | |||
6973 | 7568221 | Information processing system, information processing apparatus and method | |||
6974 | 7568218 | Selective cross-realm authentication | |||
6975 | 7568113 | Reliable storage medium access control method and device | |||
6976 | 7568101 | Digital signatures with an embedded view | |||
6977 | 7567670 | Verification information for digital video signal | |||
6978 | 7565699 | System and method for detecting computer port inactivity | |||
6979 | 7565552 | Method for protecting against manipulation of a controller for at least one motor vehicle component and controller | |||
6980 | 7565551 | Enhancing software integrity through installation and verification | |||
6981 | 7565550 | Automatic registration of a virus/worm monitor in a distributed network | |||
6982 | 7565547 | Trust inheritance in network authentication | |||
6983 | 7565545 | Method, system and program product for auditing electronic transactions based on biometric readings | |||
6984 | 7565538 | Flow token | |||
6985 | 7565536 | Method for secure delegation of trust from a security device to a host computer application for enabling secure access to a resource on the web | |||
6986 | 7565532 | Secure file system server architecture and methods | |||
6987 | 7565529 | Secure authentication and network management system for wireless LAN applications | |||
6988 | 7565528 | Method for generating asymmetrical cryptographic keys by the user | |||
6989 | 7565464 | Programmable transaction initiator architecture for systems with secure and non-secure modes | |||
6990 | 7565297 | Method and apparatus for the secure identification of the owner of a portable device | |||
6991 | 7564976 | System and method for performing security operations on network data | |||
6992 | 7562384 | Method and apparatus for providing a secure name resolution service for network devices | |||
6993 | 7562232 | System and method for providing manageability to security information for secured items | |||
6994 | 7562229 | Codeword-based auditing of computer systems and methods therefor | |||
6995 | 7562221 | Authentication method and apparatus utilizing proof-of-authentication module | |||
6996 | 7559090 | Memory, information apparatus for access to the memory, and method for the information apparatus | |||
6997 | 7559085 | Detection for deceptively similar domain names | |||
6998 | 7559084 | Authentication information processing method | |||
6999 | 7559083 | Method and apparatus for generating secured attention sequence | |||
7000 | 7559081 | Method and apparatus for authenticating a user at an access terminal | |||
7001 | 7558968 | Information processing apparatus and method | |||
7002 | 7558966 | Notifying remote administrator of platform integrity determination | |||
7003 | 7558963 | Communication device and program | |||
7004 | 7558959 | Collusion-resistant watermarking and fingerprinting | |||
7005 | 7558387 | Gathering randomness in a wireless smart card reader | |||
7006 | 7558253 | Method and system for disrupting undesirable wireless communication of devices in computer networks | |||
7007 | 7555787 | IC intrusion detection | |||
7008 | 7555784 | Method and system for safely disclosing identity over the internet | |||
7009 | 7555783 | Wireless network credential provisioning | |||
7010 | 7555781 | Security component for a computing device | |||
7011 | 7555780 | Information security method and system | |||
7012 | 7555779 | Copyright protection system, recording device, and reproduction device | |||
7013 | 7555775 | Recovering from device failure | |||
7014 | 7555771 | System and method for grouping device or application objects in a directory service | |||
7015 | 7555770 | Method and system for controlling access to database information | |||
7016 | 7555657 | Communication device, software update device, software update system, software update method, and program | |||
7017 | 7555654 | Apparatus, transponder, computer program product and method for enabling an active part of a computer program | |||
7018 | 7555652 | Method for user attestation signatures with attributes | |||
7019 | 7555126 | Game apparatus managing system, game apparatus, controlling method, computer program and recording medium | |||
7020 | 7555121 | Methods and apparatus for implementing a cryptography engine | |||
7021 | 7552470 | Generic security infrastructure for COM based systems | |||
7022 | 7552468 | Techniques for dynamically establishing and managing authentication and trust relationships | |||
7023 | 7552467 | Security systems for protecting an asset | |||
7024 | 7552465 | Method and apparatus for time-based communications port protection | |||
7025 | 7552341 | Licensing the use of software on a particular CPU | |||
7026 | 7552332 | Java based electronic signature capture method, device and system | |||
7027 | 7552331 | Secure media path methods, systems, and architectures | |||
7028 | 7552325 | Methods, systems, and products for intrusion detection | |||
7029 | 7551913 | Methods and apparatus for anonymous user identification and content personalization in wireless communication | |||
7030 | 7549172 | Data processing apparatus for digital copyrights management | |||
7031 | 7549170 | System and method of inkblot authentication | |||
7032 | 7549062 | Organization-based content rights management and systems, structures, and methods therefor | |||
7033 | 7549061 | Unauthorized contents detection system | |||
7034 | 7549058 | Method and apparatus for encrypting and decrypting digital data | |||
7035 | 7549047 | Method and system for securely sharing files | |||
7036 | 7549046 | Method and system for vehicle authorization of a service technician | |||
7037 | 7549043 | Providing certificate matching in a system and method for searching and retrieving certificates | |||
7038 | 7548665 | Method, systems, and media for identifying whether a machine readable mark may contain sensitive data | |||
7039 | 7548633 | Data processing apparatus and method, data processing program, and storage medium | |||
7040 | 7546641 | Conditional access to digital rights management conversion | |||
7041 | 7546640 | Fine-grained authorization by authorization table associated with a resource | |||
7042 | 7546639 | Protection of information in computing devices | |||
7043 | 7546634 | Encryption removable storage system | |||
7044 | 7546633 | Role-based authorization management framework | |||
7045 | 7546632 | Methods and apparatus to configure a network device via an authentication protocol | |||
7046 | 7546631 | Embedded management system for a physical device having virtual elements | |||
7047 | 7546630 | Methods, systems, and media to authenticate a user | |||
7048 | 7546453 | Certificate management and transfer system and method | |||
7049 | 7545943 | Apparatus, method, and computer program product for playing back content | |||
7050 | 7543337 | System and method for automatic verification of the holder of an authorization document and automatic establishment of the authenticity and validity of the authorization document | |||
7051 | 7543317 | Service activation of set-top box functionality using broadcast conditional access system | |||
7052 | 7543160 | System and method for generating a secure state indicator on a display | |||
7053 | 7543154 | Method and device for determining an access code | |||
7054 | 7543153 | Digital signature generating apparatus, method, computer program and computer-readable storage medium | |||
7055 | 7543145 | System and method for protecting configuration settings in distributed text-based configuration files | |||
7056 | 7543141 | Method and apparatus for user authentication using infrared communication of a mobile terminal | |||
7057 | 7542570 | Information encryption transmission/reception method | |||
7058 | 7542468 | Dynamic host configuration protocol with security | |||
7059 | 7540028 | Dynamic network security apparatus and methods or network processors | |||
7060 | 7540021 | System and methods for an identity theft protection bot | |||
7061 | 7540017 | Information processing apparatus for performing processing dependent on presence/absence of user, and method therefor | |||
7062 | 7540014 | Automated policy change alert in a distributed enterprise | |||
7063 | 7539877 | Data management apparatus, data management method and computer program | |||
7064 | 7539869 | System and methods for using a signature protocol by a nonsigning client | |||
7065 | 7539864 | Methods and portable device for digitally signing data | |||
7066 | 7539857 | Cooperative processing and escalation in a multi-node application-layer security system and method | |||
7067 | 7539855 | Server-based cryptography | |||
7068 | 7536722 | Authentication system for two-factor authentication in enrollment and pin unblock | |||
7069 | 7536721 | Low cost secure ID card and system | |||
7070 | 7536718 | Method and system for controlling software loads on a third-party mobile station | |||
7071 | 7536713 | Knowledge broadcasting and classification system | |||
7072 | 7536712 | Flexible electronic message security mechanism | |||
7073 | 7536710 | Application-backed groups in a common address book | |||
7074 | 7536559 | Method and apparatus for providing secure programmable logic devices | |||
7075 | 7536558 | Flash memory distribution of digital content | |||
7076 | 7536550 | Image forming apparatus and control method for same | |||
7077 | 7536543 | System and method for authentication and authorization using a centralized authority | |||
7078 | 7536436 | Reliable messaging using clocks with synchronized rates | |||
7079 | 7536016 | Encrypted content data structure package and generation thereof | |||
7080 | 7533422 | Platform independent zero footprint decompression | |||
7081 | 7533418 | Tokens for contact information | |||
7082 | 7533411 | Order-based human interactive proofs (HIPs) and automatic difficulty rating of HIPs | |||
7083 | 7533408 | Portable computing system, apparatus and method | |||
7084 | 7533273 | Method and system for controlling an encryption/decryption engine using descriptors | |||
7085 | 7533257 | Server authentication verification method on user terminal at the time of extensible authentication protocol authentication for internet access | |||
7086 | 7532720 | Utilizing SIMD instructions within montgomery multiplication | |||
7087 | 7530117 | Method and apparatus for preventing unauthorized use of software | |||
7088 | 7530113 | Security system and method for an industrial automation system | |||
7089 | 7530112 | Method and apparatus for providing network security using role-based access control | |||
7090 | 7530110 | System and method for fuzzy multi-level security | |||
7091 | 7530101 | Method and system for managing network access device using a smart card | |||
7092 | 7530094 | Method and apparatus for facilitating single sign-on of an application cluster | |||
7093 | 7529946 | Enabling bits sealed to an enforceably-isolated environment | |||
7094 | 7529945 | Installing software in a system | |||
7095 | 7529944 | Support for multiple login method | |||
7096 | 7529925 | System and method for distributing keys in a wireless network | |||
7097 | 7526811 | Methods for detecting executable code which has been altered | |||
7098 | 7526804 | Hardware assist for pattern matches | |||
7099 | 7526799 | Method for tracking security attributes along invocation chain using secure propagation token | |||
7100 | 7526798 | System and method for credential delegation using identity assertion | |||
7101 | 7526793 | Method for authenticating database connections in a multi-tier environment | |||
7102 | 7526789 | System for the transmission of audiovisual signals between source nodes and destination nodes | |||
7103 | 7526658 | Scalable, distributed method and apparatus for transforming packets to enable secure communication between two stations | |||
7104 | 7526654 | Method and system for detecting a secure state of a computer system | |||
7105 | 7526649 | Session key exchange | |||
7106 | 7526084 | Secure classifying of data with Gaussian distributions | |||
7107 | 7523498 | Method and system for monitoring personal computer documents for sensitive data | |||
7108 | 7523495 | Methods and systems for IC card application loading | |||
7109 | 7523490 | Session key security protocol | |||
7110 | 7523489 | Smart card application system and method | |||
7111 | 7523488 | Method for performing data access transformation with request authorization processing | |||
7112 | 7523487 | Decentralized virus scanning for stored data | |||
7113 | 7523484 | Systems and methods of controlling network access | |||
7114 | 7523307 | Method for ensuring content protection and subscription compliance | |||
7115 | 7523302 | Electronic recipe management | |||
7116 | 7523281 | Authenticating hardware for manually enabling and disabling read and write protection to parts of a storage disk or disks for users | |||
7117 | 7523069 | Assessing and/or determining of user authorizations using a transponder, a finger print recognition routine or the like | |||
7118 | 7520002 | Method for manipulation identification on a sensor | |||
7119 | 7519992 | Access control system, device, and program | |||
7120 | 7519988 | Method and apparatus for authenticated network address allocation | |||
7121 | 7519987 | Method, system, and apparatus to allow for credential vault usage in templated portal applications | |||
7122 | 7519986 | Method and apparatus for network security using a router based authentication system | |||
7123 | 7519834 | Scalable method and apparatus for transforming packets to enable secure communication between two stations | |||
7124 | 7519831 | High speed cryptographic system with modular architecture | |||
7125 | 7519826 | Near real-time multi-party task authorization access control | |||
7126 | 7519822 | Method and apparatus for processing descriptive statements | |||
7127 | 7519820 | Image forming system and image forming method | |||
7128 | 7519813 | System and method for a sidecar authentication mechanism | |||
7129 | 7516496 | Identifying unauthorized communication systems based on their memory contents | |||
7130 | 7516484 | Reader adapted for a portable computer | |||
7131 | 7516483 | System and method for accomplishing two-factor user authentication using the internet | |||
7132 | 7516479 | Data communicating apparatus and method for managing memory of data communicating apparatus | |||
7133 | 7516475 | Method and apparatus for managing security policies on a network | |||
7134 | 7516331 | Tamper-resistant trusted java virtual machine and method of using the same | |||
7135 | 7516227 | Method and apparatus for network deception/emulation | |||
7136 | 7515710 | Federated digital rights management scheme including trusted systems | |||
7137 | 7512989 | Data loader using location identity to provide secure communication of data to recipient devices | |||
7138 | 7512985 | System, method, and computer program product for implementing search-and retrieval-compatible data obfuscation | |||
7139 | 7512984 | Distributed and scalable instant multimedia communication system | |||
7140 | 7512975 | Hardware-assisted credential validation | |||
7141 | 7512973 | Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content | |||
7142 | 7512971 | Method and system for enabling remote access to a computer system | |||
7143 | 7512970 | Host credentials authorization protocol | |||
7144 | 7512969 | System and method for detecting and reporting cable network devices with duplicate media access control addresses | |||
7145 | 7512967 | User authentication in a conversion system | |||
7146 | 7512812 | Method of securely erasing data and hard disk drive using the same | |||
7147 | 7512810 | Method and system for protecting encrypted files transmitted over a network | |||
7148 | 7512808 | Anti-computer viral agent suitable for innoculation of computing devices | |||
7149 | 7512807 | Method and apparatus for biometric verification with data packet transmission prioritization | |||
7150 | 7512805 | Machine readable medium and method for data storage security | |||
7151 | 7512804 | Data storage security apparatus and system | |||
7152 | 7512800 | Key management technique for establishing a secure channel | |||
7153 | 7512799 | System and method for accessing a remote server from an intranet with a single sign-on | |||
7154 | 7512796 | Authentication in a packet data network | |||
7155 | 7512786 | Client-side boot domains and boot rules | |||
7156 | 7510474 | Location based mobile wagering system | |||
7157 | 7509687 | Remotely authenticated operation method | |||
7158 | 7509686 | Method for providing computer-based authentication utilizing biometrics | |||
7159 | 7509683 | System and method for authenticating digital content | |||
7160 | 7509677 | Pattern discovery in a network security system | |||
7161 | 7509501 | Cryptographic apparatus for supporting multiple modes | |||
7162 | 7509500 | Random number generation for encrypting cellular communications | |||
7163 | 7508938 | Method and apparatus for generating and using a tamper-resistant encryption key | |||
7164 | 7508936 | Hardware accelerator for elliptic curve cryptography | |||
7165 | 7506376 | Copy protection method for digital media | |||
7166 | 7506366 | Integrating workstation computer with badging system | |||
7167 | 7506364 | Integrated access authorization | |||
7168 | 7506360 | Tracking communication for determining device states | |||
7169 | 7506359 | Method for preventing parasitic usage of web page embedded files | |||
7170 | 7506177 | Tamper resistant software encoding and analysis | |||
7171 | 7506176 | Encryption mechanism on multi-core processor | |||
7172 | 7506162 | Methods for more flexible SAML session | |||
7173 | 7506158 | Certificate reissuance for checking the status of a certificate in financial transactions | |||
7174 | 7505586 | Method for computer-based encryption and decryption of data | |||
7175 | 7503074 | System and method for enforcing location privacy using rights management | |||
7176 | 7503073 | Information managing apparatus and method, recording medium, and program | |||
7177 | 7503067 | Preset security levels | |||
7178 | 7503065 | Method and system for gateway-based authentication | |||
7179 | 7503061 | Secure resource access | |||
7180 | 7502942 | System and method for authentication of embedded raid on a motherboard having input/output processor | |||
7181 | 7502467 | System and method for authentication seed distribution | |||
7182 | 7502466 | System and method for secure communication of electronic documents | |||
7183 | 7501946 | Electronic control system used in security system for cargo trailers | |||
7184 | 7500267 | Systems and methods for disabling software components to protect digital media | |||
7185 | 7500263 | Methods and systems for accessing networks, methods and systems for accessing the Internet | |||
7186 | 7500108 | Metered execution of code | |||
7187 | 7500107 | Log-in security device | |||
7188 | 7500106 | Method for identifying, authenticating and authorizing a user of protected data | |||
7189 | 7499999 | Security apparatus and method for local area networks | |||
7190 | 7499550 | System and method for protecting a title key in a secure distribution system for recordable media content | |||
7191 | 7496965 | Data recording medium, data recording method, data processing device, data distribution method, data distribution device, data transmission method, data transmission device, data distribution system, and data communication system | |||
7192 | 7496961 | Methods and apparatus to provide network traffic support and physical security support | |||
7193 | 7496959 | Remote collection of computer forensic evidence | |||
7194 | 7496952 | Methods for authenticating a user's credentials against multiple sets of credentials | |||
7195 | 7496951 | Network apparatus and control method therefor | |||
7196 | 7496950 | Secure remote management appliance | |||
7197 | 7496949 | Network system, proxy server, session management method, and program | |||
7198 | 7496948 | Method for controlling access to a target application | |||
7199 | 7496768 | Providing secure input and output to a trusted agent in a system with a high-assurance execution environment | |||
7200 | 7496767 | Secure content objects | |||
7201 | 7496766 | Apparatus, method, and program product for secure data formatting and retriving, and computer readable transportable data recording medium storing the program product | |||
7202 | 7496765 | System, method and program product to prevent unauthorized access to portable memory or storage device | |||
7203 | 7496764 | Data transmission method between a local server and local peripherals | |||
7204 | 7496762 | Security architecture for modified segregated environment for federal telecom services | |||
7205 | 7496761 | Method and system for batch task creation and execution | |||
7206 | 7496752 | System and method for controlling communication using device ID | |||
7207 | 7496198 | Partial dual encrypted stream utilizing program map tables | |||
7208 | 7493659 | Network intrusion detection and analysis system and method | |||
7209 | 7493656 | Drive security session manager | |||
7210 | 7493652 | Verifying location of a mobile node | |||
7211 | 7493495 | Biometrics interface | |||
7212 | 7492747 | Secure patch installation for WWAN systems | |||
7213 | 7490250 | Method and system for detecting a tamper event in a trusted computing environment | |||
7214 | 7490246 | Method for encryption of data based on an iteration of a stored encryption key | |||
7215 | 7490245 | System and method for data processing system planar authentication | |||
7216 | 7490237 | Systems and methods for caching in authentication systems | |||
7217 | 7490149 | Security management apparatus, security management system, security management method, and security management program | |||
7218 | 7487550 | Methods, apparatus and computer programs for processing alerts and auditing in a publish/subscribe system | |||
7219 | 7487540 | Method of, and system for, replacing external links in electronic documents | |||
7220 | 7487537 | Method and apparatus for pervasive authentication domains | |||
7221 | 7487536 | Apparatus and method for applying revision information to software | |||
7222 | 7487535 | Authentication on demand in a distributed network environment | |||
7223 | 7487363 | System and method for controlled copying and moving of content between devices and domains based on conditional encryption of content key depending on usage | |||
7224 | 7487361 | Dynamic cache lookup based on dynamic data | |||
7225 | 7487357 | Virtual smart card system and method | |||
7226 | 7487350 | Fixed client identification system for positive identification of client to server | |||
7227 | 7484247 | System and method for protecting a computer system from malicious software | |||
7228 | 7484242 | Enabling user control over automated provisioning environment | |||
7229 | 7484241 | Secure single sign-on to operating system via power-on password | |||
7230 | 7484238 | Method and apparatus for configuration management of computer system | |||
7231 | 7484107 | Method for selective encryption within documents | |||
7232 | 7484106 | Pre-login data access | |||
7233 | 7484105 | Flash update using a trusted platform module | |||
7234 | 7484098 | Data non repudiation | |||
7235 | 7484097 | Method and system for communicating data to and from network security devices | |||
7236 | 7483950 | System and method for providing secure message signature status and trust status indication | |||
7237 | 7483943 | Reliable messaging using clocks with synchronized rates | |||
7238 | 7480937 | Agent device, image-forming-device management system, image-forming-device management method, image-forming-device management program, and storage medium | |||
7239 | 7480935 | Method for protecting subscriber identification between service and content providers | |||
7240 | 7480932 | Authentication information processing method, program, and device | |||
7241 | 7480931 | Volume mount authentication | |||
7242 | 7480806 | Multi-token seal and unseal | |||
7243 | 7478421 | System and method for role based access control of a document processing device | |||
7244 | 7478420 | Administration of protection of data accessible by a mobile device | |||
7245 | 7478250 | System and method for real-time detection of computer system files intrusion | |||
7246 | 7478237 | System and method of allowing user mode applications with access to file data | |||
7247 | 7478236 | Method of validating certificate by certificate validation server using certificate policies and certificate policy mapping in public key infrastructure | |||
7248 | 7478235 | Methods and systems for protecting data in USB systems | |||
7249 | 7475430 | Data recording apparatus | |||
7250 | 7475420 | Detecting network proxies through observation of symmetric relationships | |||
7251 | 7475353 | World wide web receiving display station with a web browser generating a graphical user interface with a universal web site logoff button enabling a browser routine for user logoff from selected web sites | |||
7252 | 7475257 | System and method for selecting and using a signal processor in a multiprocessor system to operate as a security for encryption/decryption of data | |||
7253 | 7475252 | System, method and program to filter out login attempts by unauthorized entities | |||
7254 | 7475244 | Wireless communication device, portable terminal, communication control program and communication system | |||
7255 | 7475242 | Controlling the distribution of information | |||
7256 | 7475239 | Pluggable trust adapter architecture, method and program product for processing communications | |||
7257 | 7474748 | Modular inversion that is protected against espionage | |||
2008 | |||||
7258 | 7472417 | System for detection and indication of a secure status of appliances | |||
7259 | 7472412 | Network configuration manager | |||
7260 | 7472286 | Selectively authorizing software functionality after installation of the software | |||
7261 | 7472269 | System and method for strong authentication achieved in a single round trip | |||
7262 | 7471479 | System for protection against copying on magnetic tape recorders | |||
7263 | 7469420 | Key transport tamper protection | |||
7264 | 7469339 | Secure multiple application card system and process | |||
7265 | 7469338 | System and method for cryptographic control of system configurations | |||
7266 | 7469337 | System and method for computer storage security | |||
7267 | 7469263 | Content management system for archiving data, managing histories, validity of content registration certification wherein the management device encrypts the content in response to a content storage, encrypts the encryption key with the media ID | |||
7268 | 7469049 | Data dependent scrambler with reduced overhead | |||
7269 | 7467417 | Active verification of boot firmware | |||
7270 | 7467413 | Method and apparatus for accessing session data | |||
7271 | 7467412 | Data transfer system, data transfer program and video server system | |||
7272 | 7467411 | Protecting a service provider from abuse | |||
7273 | 7467404 | System and method for distributing software licenses | |||
7274 | 7467403 | Techniques for entry of less-than-perfect-passwords | |||
7275 | 7467402 | Automated login session extender for use in security analysis systems | |||
7276 | 7467401 | User authentication without prior user enrollment | |||
7277 | 7467304 | System, device, and method of selectively allowing a host processor to access host-executable code | |||
7278 | 7467302 | Secure connection mechanism capable of automatically negotiating password between wireless client terminal and wireless access terminal | |||
7279 | 7466826 | Method of secure transmission of digital data from a source to a receiver | |||
7280 | 7464402 | Authentication of network users | |||
7281 | 7464401 | Secure web access via an original CD | |||
7282 | 7464400 | Distributed environment controlled access facility | |||
7283 | 7464398 | Queuing methods for mitigation of packet spoofing | |||
7284 | 7464270 | Application identification and license enforcement | |||
7285 | 7464162 | Systems and methods for testing whether access to a resource is authorized based on access information | |||
7286 | 7461407 | Debugging port security interface | |||
7287 | 7461400 | Methods, systems, and computer program products for providing authentication in a computer environment | |||
7288 | 7461398 | Methods, systems, and computer program products for dynamic management of security parameters during a communications session | |||
7289 | 7461396 | System and method for providing a secure environment for performing conditional access functions for a set top box | |||
7290 | 7461270 | Methods and systems for promoting security in a computer system employing attached storage devices | |||
7291 | 7461268 | E-fuses for storing security version data | |||
7292 | 7461265 | System and method for single sign on process for websites with multiple applications and services | |||
7293 | 7461264 | Method for automatic identification control and management | |||
7294 | 7461261 | Method to generate, verify and deny an undeniable signature | |||
7295 | 7461257 | System for detecting spoofed hyperlinks | |||
7296 | 7461254 | Broadband certified mail | |||
7297 | 7461253 | Method and apparatus for providing a key for secure communications | |||
7298 | 7461252 | Authentication method, program for implementing the method, and storage medium storing the program | |||
7299 | 7461250 | System and method for certificate exchange | |||
7300 | 7461140 | Method and apparatus for identifying IPsec security policy in iSCSI | |||
7301 | 7458102 | Information security architecture for remote access control using non-bidirectional protocols | |||
7302 | 7458101 | Information viewing/listening system, information player, and information provider | |||
7303 | 7458098 | Systems and methods for enhancing electronic communication security | |||
7304 | 7457958 | System for detecting authentic e-mail messages | |||
7305 | 7457953 | Method and apparatus to provide secure communication | |||
7306 | 7457950 | Managed authentication service | |||
7307 | 7454793 | Method for controlling the opening and transmission of electronic data on electronic communication devices | |||
7308 | 7454784 | System and method for identity verification | |||
7309 | 7454782 | Method and system for camouflaging access-controlled data | |||
7310 | 7454781 | Method enabling multiple sessions and applications in instant messaging and presence service | |||
7311 | 7454779 | Method, system and computer program for controlling access in a distributed data processing system | |||
7312 | 7454778 | Enforcing rights management through edge email servers | |||
7313 | 7454626 | Transmitting/receiving apparatus and a transmitting/receiving method | |||
7314 | 7454625 | Method and apparatus for protecting a calculation in a cryptographic algorithm | |||
7315 | 7454617 | Apparatus for validating the presence of an authorized accessory | |||
7316 | 7454427 | Autonomic control of a distributed computing system using rule-based sensor definitions | |||
7317 | 7453840 | Containment of rogue systems in wireless network environments | |||
7318 | 7451492 | Portable information terminal, and electronic information authenticating system and method using same terminal | |||
7319 | 7451491 | Method and a device for allowing only a specific kind of hardware to correctly execute software | |||
7320 | 7451490 | Media data protection with secure installer | |||
7321 | 7451483 | VLAN router with firewall supporting multiple security layers | |||
7322 | 7451479 | Network apparatus with secure IPSec mechanism and method for operating the same | |||
7323 | 7451478 | Time managing system and method | |||
7324 | 7451477 | System and method for rule-based entitlements | |||
7325 | 7451327 | Method for securing software via late stage processor instruction decryption | |||
7326 | 7451326 | Method and apparatus for processing arbitrary key bit length encryption operations with similar efficiencies | |||
7327 | 7451322 | User authentication method using password | |||
7328 | 7451308 | Method and system to automatically evaluate a participant in a trust management infrastructure | |||
7329 | 7450719 | Gigabit Ethernet-based passive optical network and data encryption method | |||
7330 | 7450554 | Method for establishment of a service tunnel in a WLAN | |||
7331 | 7448087 | System for preventing unauthorized use of recording media | |||
7332 | 7448082 | Method for defining and checking a connection establishment authorisation, associated program data packet, associated device and associated program | |||
7333 | 7448075 | Method and a system for authenticating a user at a network access while the user is making a connection to the Internet | |||
7334 | 7448072 | Techniques for performing UMTS (Universal Mobile Telecommunications System) authentication using SIP (Session Initiation Protocol) messages | |||
7335 | 7448071 | Dynamic downloading of keyboard keycode data to a networked client | |||
7336 | 7447880 | Processor with internal memory configuration | |||
7337 | 7447498 | User-assisted programmable appliance control | |||
7338 | 7444681 | Security measures in a partitionable computing system | |||
7339 | 7444676 | Direct authentication and authorization system and method for trusted network of financial institutions | |||
7340 | 7444523 | System and method for using address bits to signal security attributes of data in the address space | |||
7341 | 7444521 | System and method for detecting computer virus | |||
7342 | 7444513 | Authentication in data communication | |||
7343 | 7444505 | Method, system and software for maintaining network access and security | |||
7344 | 7444476 | System and method for code and data security in a semiconductor device | |||
7345 | 7444404 | Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses | |||
7346 | 7441276 | Content processing limit method, content processing limit program, and content edition device | |||
7347 | 7441122 | Method for providing secure access to a digital resource | |||
7348 | 7441117 | Group formation/management system, group management device, and member device | |||
7349 | 7441116 | Secure resource distribution through encrypted pointers | |||
7350 | 7441020 | Media plug-in registration and dynamic loading | |||
7351 | 7437769 | Multiple entity control of access restrictions for media playback | |||
7352 | 7437761 | Computer virus generation detection apparatus and method | |||
7353 | 7437754 | Web object access authorization protocol based on an HTTP validation model | |||
7354 | 7437753 | Storage area network (SAN) security | |||
7355 | 7437752 | Client architecture for portable device with security policies | |||
7356 | 7437574 | Method for processing information in an electronic device, a system, an electronic device and a processing block | |||
7357 | 7437570 | Method, system, and program for distributing software between computer systems | |||
7358 | 7437568 | Apparatus and method for establishing trust | |||
7359 | 7437556 | Global visibility controls for operating system partitions | |||
7360 | 7437554 | Method and apparatus for generating queries for secure authentication and authorization of transactions | |||
7361 | 7437550 | System for providing session-based network privacy, private, persistent storage, and discretionary access control for sharing private data | |||
7362 | 7436959 | Data recording apparatus and recording method | |||
7363 | 7436955 | Encrypting and decrypting a data stream | |||
7364 | 7436552 | Information processing apparatus, information processing method, and control program | |||
7365 | 7434264 | Data processing system with peripheral access protection and method therefor | |||
7366 | 7434263 | System and method for secure storage data using a key | |||
7367 | 7434253 | User mapping information extension for protocols | |||
7368 | 7434252 | Role-based authorization of network services using diversified security tokens | |||
7369 | 7434251 | System and method for authentication | |||
7370 | 7434231 | Methods and apparatus to protect a protocol interface | |||
7371 | 7434066 | Portable electronic device | |||
7372 | 7434065 | Secure verification using a set-top-box chip | |||
7373 | 7434051 | Method and apparatus for facilitating secure cocktail effect authentication | |||
7374 | 7434047 | System, method and computer program product for detecting a rogue member in a multicast group | |||
7375 | 7434044 | Fast re-authentication with dynamic credentials | |||
7376 | 7433472 | Digital content distribution system | |||
7377 | 7430761 | Command processing system by a management agent | |||
7378 | 7430758 | Prompt authentication | |||
7379 | 7428756 | Access control over dynamic intellectual capital content | |||
7380 | 7428755 | Device that is used for secure diffusion controlled display private copying and management of and conditional access to MPEG-4-type audiovisual content rights | |||
7381 | 7428749 | Secure delegation using public key authorization | |||
7382 | 7428747 | Secure channel reservation | |||
7383 | 7428637 | Dynamic authentication and initialization method | |||
7384 | 7426751 | Recording medium, information transmission method, terminal, server, and recording method | |||
7385 | 7426750 | Network-based content distribution system | |||
7386 | 7426748 | Management mediating device, image processing apparatus, management mediating program, and storing medium storing management mediating program | |||
7387 | 7426747 | Methods and systems for promoting security in a computer system employing attached storage devices | |||
7388 | 7426745 | Methods and systems for transparent data encryption and decryption | |||
7389 | 7426643 | Input device feature | |||
7390 | 7426638 | Controlling access to information on a network using an extended network universal resource locator | |||
7391 | 7424745 | Anti-virus fix for intermittently connected client computers | |||
7392 | 7424737 | Virtual host for protocol transforming traffic traversing between an IP-compliant source and non-IP compliant destination | |||
7393 | 7424732 | Card settlement method and system using mobile information terminal | |||
7394 | 7424622 | Microprocessor with improved task management and table management mechanism | |||
7395 | 7424621 | Data protection | |||
7396 | 7424620 | Interleaved data and instruction streams for application program obfuscation | |||
7397 | 7424619 | System and methods for anomaly detection and adaptive learning | |||
7398 | 7424616 | System and method for facilitating access by sellers to certificate-related and other services | |||
7399 | 7424034 | Information converting apparatus | |||
7400 | 7421739 | System and method for monitoring and ensuring data integrity in an enterprise security system | |||
7401 | 7421733 | System and method for providing multi-class processing of login requests | |||
7402 | 7421583 | System, method and article of manufacture for determining a price of cryptograph IC services based on a computational burden thereof | |||
7403 | 7421579 | Multiplexing a secure counter to implement second level secure counters | |||
7404 | 7421078 | Valid medium management system | |||
7405 | 7418737 | Encrypted data file transmission | |||
7406 | 7418601 | Data transfer control system | |||
7407 | 7418600 | Secure database access through partial encryption | |||
7408 | 7418599 | Deterring theft of media recording devices by encrypting recorded media files | |||
7409 | 7418594 | Mobile unit authenticating method | |||
7410 | 7415721 | Separate authentication processes to secure content | |||
7411 | 7415720 | User authentication system and method for controlling the same | |||
7412 | 7415719 | Policy specification framework for insider intrusions | |||
7413 | 7415618 | Permutation of opcode values for application program obfuscation | |||
7414 | 7415617 | Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management | |||
7415 | 7415615 | Method and system for user authentication in a digital communication system | |||
7416 | 7415610 | Facilitating access to information stored on a network using an extended network universal resource locator | |||
7417 | 7412727 | Media streaming home network system and method for operating the same | |||
7418 | 7412720 | Delegated authentication using a generic application-layer network protocol | |||
7419 | 7412718 | Method for bidirectional data transfer | |||
7420 | 7412717 | Access control apparatus, access control method, and access control program | |||
7421 | 7412598 | Method and system for real-time insertion of service during a call session over a communication network | |||
7422 | 7412450 | Method and apparatus for identifying tampering of data in a file system | |||
7423 | 7409710 | Method and system for dynamically generating a web-based user interface | |||
7424 | 7409560 | Certification processing hardware, certification processing system and use management hardware | |||
7425 | 7409439 | Reducing overhead in reverse proxy servers when processing web pages | |||
7426 | 7408953 | Information converting apparatus | |||
7427 | 7406604 | Method for protecting a memory card, and a memory card | |||
7428 | 7406603 | Data protection systems and methods | |||
7429 | 7404204 | System and method for authentication via a single sign-on server | |||
7430 | 7404202 | System, device, and method for providing secure electronic commerce transactions | |||
7431 | 7404087 | System and method for providing improved claimant authentication | |||
7432 | 7404086 | Method and apparatus for biometric authentication | |||
7433 | 7404083 | Image signal analysis for watermark detection and decoding | |||
7434 | 7401358 | Method of controlling access to control registers of a microprocessor | |||
7435 | 7401338 | System and method for an access layer application programming interface for managing heterogeneous components of a storage area network | |||
7436 | 7401235 | Persistent authorization context based on external authentication | |||
7437 | 7401233 | Method, system, and apparatus for dynamic data-driven privacy policy protection and data sharing | |||
7438 | 7401231 | Information recording/playback device and method | |||
7439 | 7401229 | Remote access system, remote access method, and medium containing remote access program | |||
7440 | 7401224 | System and method for managing sonic token verifiers | |||
7441 | 7401222 | Method of authentication of memory device and device therefor | |||
7442 | 7401218 | Home device authentication system and method | |||
7443 | 7401215 | Method and apparatus for facilitating cryptographic layering enforcement | |||
7444 | 7400725 | Information recording medium for recording a scrambled part of content information, and method and apparatus for reproducing information recorded therein | |||
7445 | 7398557 | Accessing in a rights locker system for digital content access control | |||
7446 | 7398550 | Enhanced shared secret provisioning protocol | |||
7447 | 7398544 | Configurable cableCARD | |||
7448 | 7398399 | Apparatus, methods and computer programs for controlling performance of operations within a data processing system or network | |||
7449 | 7398398 | Authenticated and metered flow control method | |||
7450 | 7398393 | Privacy management of personal data | |||
7451 | 7398392 | Method for using communication channel round-trip response time for digital asset management | |||
7452 | 7398311 | Selective cache flushing in identity and access management systems | |||
7453 | 7397916 | System and method for protecting computer software from a white box attack | |||
7454 | 7397817 | Information converting apparatus | |||
7455 | 7395436 | Methods, software programs, and systems for electronic information security | |||
7456 | 7395435 | Secure memory device for smart cards | |||
7457 | 7395433 | Method and system for sustainable digital watermarking | |||
7458 | 7395430 | Secure authentication using digital certificates | |||
7459 | 7395424 | Method and system for stepping up to certificate-based authentication without breaking an existing SSL session | |||
7460 | 7395245 | Content usage management system and server used in the system | |||
7461 | 7394902 | Encryption apparatus, decryption apparatus and encryption system | |||
7462 | 7392538 | Firewall apparatus | |||
7463 | 7392536 | System and method for unified sign-on | |||
7464 | 7392535 | Access privilege transferring method | |||
7465 | 7392534 | System and method for preventing identity theft using a secure computing device | |||
7466 | 7392533 | System and method for management of a componentized electronic document retrievable over a network | |||
7467 | 7392523 | Systems and methods for distributing objects | |||
7468 | 7392399 | Methods and systems for efficiently integrating a cryptographic co-processor | |||
7469 | 7392385 | Client server system and devices thereof | |||
7470 | 7392383 | Method and apparatus for providing process-based access controls on computer resources | |||
7471 | 7389535 | Password management | |||
7472 | 7389428 | Data processing system, data processing method, and program providing medium | |||
7473 | 7389420 | Content authentication and recovery using digital watermarks | |||
7474 | 7386892 | Method and apparatus for detecting password attacks using modeling techniques | |||
7475 | 7386879 | Broadcast network with interactive services | |||
7476 | 7386878 | Authenticating peer-to-peer connections | |||
7477 | 7386877 | Specifying a repository for an authentication token in a distributed computing system | |||
7478 | 7386876 | MAC address-based communication restricting method | |||
7479 | 7383586 | File system operation and digital rights management (DRM) | |||
7480 | 7383576 | Method and system for displaying and managing security information | |||
7481 | 7383575 | System and method for automatic password reset | |||
7482 | 7383570 | Secure authentication systems and methods | |||
7483 | 7383462 | Method and apparatus for encrypted remote copy for secure data backup and restoration | |||
7484 | 7383447 | Method for controlling database copyrights | |||
7485 | 7383445 | Semiconductor storage device | |||
7486 | 7383444 | Information processing system, information processing apparatus, method of controlling the information processing apparatus, disk array device, method of controlling the disk array device, method of controlling display of the disk array device, and control programs for implementing the methods | |||
7487 | 7383442 | Nested strong loader apparatus and method | |||
7488 | 7383439 | Apparatus and method for facilitating encryption and decryption operations over an email server using an unsupported protocol | |||
7489 | 7383366 | Keypad user interface and port sequence mapping algorithm | |||
7490 | 7382882 | Secure session set up based on the wireless application protocol | |||
7491 | 7380280 | Rights locker for digital content access control | |||
7492 | 7380278 | Protecting software environment in isolated execution | |||
7493 | 7380271 | Grouped access control list actions | |||
7494 | 7380268 | Methods apparatus and program products for wireless access points | |||
7495 | 7380140 | Providing a protected volume on a data storage device | |||
7496 | 7380136 | Methods and apparatus for secure collection and display of user interface information in a pre-boot environment | |||
7497 | 7380134 | Information recording/reproducing apparatus and method of executing encryption processing | |||
7498 | 7380133 | Anti-cloning method | |||
7499 | 7380122 | Fixed pin array identification apparatus and method | |||
7500 | 7380120 | Secured data format for access control | |||
7501 | 7380117 | Process and streaming server for encrypting a data stream | |||
7502 | 7380051 | System and methods for an overlay disk and cache using portable flash memory | |||
7503 | 7376845 | Method for calculating hashing of a message in a device communicating with a smart card | |||
7504 | 7376844 | Countermeasure method for a microcontroller based on a pipeline architecture | |||
7505 | 7376843 | Remote control of VCR with electronic mail | |||
7506 | 7376836 | Systems and methods for preventing an attack on healthcare data processing resources in a hospital information system | |||
7507 | 7376834 | System and method for securely controlling communications | |||
7508 | 7376829 | Terminal, data distribution system comprising such a terminal and method of re-transmitting digital data | |||
7509 | 7376826 | Methods and apparatus for performing encryption and authentication | |||
7510 | 7373672 | Method for securely managing information in database | |||
7511 | 7373671 | Method and system for user information verification | |||
7512 | 7373669 | Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements | |||
7513 | 7373668 | Methods and circuits for protecting proprietary configuration data for programmable logic devices | |||
7514 | 7373667 | Protecting a computer coupled to a network from malicious code infections | |||
7515 | 7373666 | Distributed threat management | |||
7516 | 7373658 | Electronic loose-leaf remote control for enabling access to content from a media player | |||
7517 | 7373657 | Method and apparatus for controlling data and software access | |||
7518 | 7373521 | Semiconductor IC, information processing method, information processing device, and program storage medium | |||
7519 | 7373520 | Method for computing data signatures | |||
7520 | 7373519 | Distinguishing legitimate modifications from malicious modifications during executable computer file modification analysis | |||
7521 | 7373517 | System and method for encrypting and decrypting files | |||
7522 | 7373506 | Data authentication system | |||
7523 | 7370365 | Dynamic control of authorization to access internet services | |||
7524 | 7370364 | Managing content resources | |||
7525 | 7370346 | Method and apparatus for access security services | |||
7526 | 7370212 | Issuing a publisher use license off-line in a digital rights management (DRM) system | |||
7527 | 7370211 | Arrangement and method of execution of code | |||
7528 | 7370198 | Total system for preventing information outflow from inside | |||
7529 | 7370196 | Controlled-content recoverable blinded certificates | |||
7530 | 7367061 | Systems, methods, and a storage medium for storing and securely transmitting digital media data | |||
7531 | 7367060 | Methods and apparatus for secure document printing | |||
7532 | 7367058 | Encoding method | |||
7533 | 7367054 | Packet data communications | |||
7534 | 7367053 | Password strength checking method and apparatus and program and recording medium thereof, password creation assisting method and program thereof, and password creating method and program thereof | |||
7535 | 7367050 | Storage device | |||
7536 | 7367049 | System and method for enrolling in a biometric system | |||
7537 | 7367048 | Apparatus and method for autonomic email access control | |||
7538 | 7366919 | Use of geo-location data for spam detection | |||
7539 | 7366918 | Configuring and managing resources on a multi-purpose integrated circuit card using a personal computer | |||
7540 | 7366917 | System and method for accessing discrete data | |||
7541 | 7366915 | Digital license with referral information | |||
7542 | 7366912 | Method of identifying participants in secure web sessions | |||
7543 | 7366904 | Method for modifying validity of a certificate using biometric information in public key infrastructure-based authentication system | |||
7544 | 7366902 | System and method for authenticating a storage device for use with driver software in a storage network | |||
7545 | 7366898 | Method and apparatus for performing configuration over a network | |||
7546 | 7366896 | Systems and methods for limiting access to potentially dangerous code | |||
7547 | 7366306 | Programmable logic device that supports secure and non-secure modes of decryption-key access | |||
7548 | 7363656 | Event detection/anomaly correlation heuristics | |||
7549 | 7363509 | Method, system and program product for electronically executing contracts within a secure computer infrastructure | |||
7550 | 7363507 | Device and method of preventing pirated copies of computer programs | |||
7551 | 7363506 | Software virus detection methods, apparatus and articles of manufacture | |||
7552 | 7363504 | Method and system for keystroke scan recognition biometrics on a smartcard | |||
7553 | 7363503 | Method for producing a data structure for use in password identification | |||
7554 | 7363498 | Method and apparatus for facilitating secure distributed content delivery | |||
7555 | 7363343 | Computer networks for providing peer to peer remote data storage and collaboration | |||
7556 | 7360252 | Method and apparatus for secure distribution of software | |||
7557 | 7360250 | Illegal access data handling apparatus and method for handling illegal access data | |||
7558 | 7360240 | Portable network encryption keys | |||
7559 | 7360238 | Method and system for authentication of a user | |||
7560 | 7360082 | System and method for downloading security context elements governing execution of downloadable and distributable agents | |||
7561 | 7360076 | Security association data cache and structure | |||
7562 | 7359882 | Distributed run-time licensing | |||
7563 | 7356838 | System and method for controlling access to digital content, including streaming media | |||
7564 | 7356835 | Security monitor for PDA attached telephone | |||
7565 | 7356834 | Solicited authentication of a specific user | |||
7566 | 7356833 | Systems and methods for authenticating a user to a web server | |||
7567 | 7356711 | Secure registration | |||
7568 | 7356696 | Proofs of work and bread pudding protocols | |||
7569 | 7356512 | Contents mediating system and contents mediating method | |||
7570 | 7353543 | Contents distribution system | |||
7571 | 7353541 | Systems and methods for content distribution using one or more distribution keys | |||
7572 | 7353539 | Signal level propagation mechanism for distribution of a payload to vulnerable systems | |||
7573 | 7353400 | Secure program execution depending on predictable error correction | |||
7574 | 7353394 | System and method for digital signature authentication of SMS messages | |||
7575 | 7353391 | Authenticating method for short-distance radio devices and a short-distance radio device | |||
7576 | 7353385 | Authentication system, authentication method, authentication apparatus, and authentication method therefor | |||
7577 | 7352861 | Digital electronic component which is protected against electrical-type analyses | |||
7578 | 7350229 | Authentication and authorization mapping for a computer network | |||
7579 | 7350083 | Integrated circuit chip having firmware and hardware security primitive device(s) | |||
7580 | 7350082 | Upgrading of encryption | |||
7581 | 7350081 | Secure execution of downloaded software | |||
7582 | 7350075 | Method for autoconfiguration of authentication servers | |||
7583 | 7350074 | Peer-to-peer authentication and authorization | |||
7584 | 7346931 | Accepting a set of data in a computer unit | |||
7585 | 7346929 | Method and apparatus for auditing network security | |||
7586 | 7346161 | Method and apparatus for designing cipher logic, and a computer product | |||
7587 | 7344823 | Transient optical state change materials useful in copy-protected compact discs | |||
7588 | 7343623 | Authentication query strategizer and results compiler | |||
7589 | 7343622 | Multi-level secure multi-processor computer architecture | |||
7590 | 7343619 | Trusted flow and operation control method | |||
7591 | 7343495 | Information recording apparatus, information reproducing apparatus, and information distribution system | |||
7592 | 7340773 | Multi-stage authorisation system | |||
7593 | 7340613 | Digital information recording apparatus and recording/reproducing apparatus | |||
7594 | 7340611 | Template-driven XML digital signature | |||
7595 | 7340604 | Using dynamic web components to remotely control the security state of web pages | |||
7596 | 7340058 | Low-overhead secure information processing for mobile gaming and other lightweight device applications | |||
7597 | 7340057 | Method and apparatus for distributing authorization to provision mobile devices on a wireless network | |||
7598 | 7340056 | Remote deactivation of decoders for accessing multimedia digital data | |||
7599 | 7340055 | Memory card and data distribution system using it | |||
7600 | 7337473 | Method and system for network management with adaptive monitoring and discovery of computer systems based on user login | |||
7601 | 7337469 | Method and system for unlocking doorway | |||
7602 | 7337468 | Methods, apparatuses and systems facilitating seamless, virtual integration of online membership models and services | |||
7603 | 7337466 | Information hiding through time synchronization | |||
7604 | 7337329 | Secure video card methods and systems | |||
7605 | 7337328 | Secure video card methods and systems | |||
7606 | 7337324 | System and method for non-interactive human answerable challenges | |||
7607 | 7337323 | Boot-up and hard drive protection using a USB-compliant token | |||
7608 | 7337315 | Efficient certificate revocation | |||
7609 | 7337314 | Apparatus and method for allocating resources within a security processor | |||
7610 | 7336790 | Decoupling access control from key management in a network | |||
7611 | 7336788 | Electronic book secure communication with home subsystem | |||
7612 | 7334267 | Email viewing security | |||
7613 | 7334258 | Configuration file download enforcement | |||
7614 | 7334254 | Business-to-business security integration | |||
7615 | 7334128 | Accessing information on a network using an extended network universal resource locator | |||
7616 | 7333635 | Method and system for confirming personal identity | |||
7617 | 7333481 | Method and system for disrupting undesirable wireless communication of devices in computer networks | |||
7618 | 7331063 | Method and system for limiting software updates | |||
7619 | 7331059 | Access restriction control device and method | |||
7620 | 7331058 | Distributed data structures for authorization and access control for computing resources | |||
7621 | 7330978 | Encrypted software installer | |||
7622 | 7330970 | Methods and systems for protecting information in paging operating systems | |||
7623 | 7328458 | Authoring system, authoring key generator, authoring device, authoring method, and data supply device, information terminal and information distribution method | |||
7624 | 7328454 | Systems and methods for assessing computer security | |||
7625 | 7328353 | Content distribution system | |||
7626 | 7328351 | Mail processing apparatus and method | |||
7627 | 7327843 | Data reproducing device, hard disk, and data storing disk | |||
7628 | 7325247 | Information management method using a recording medium with a secure area and a user-use area | |||
7629 | 7325246 | Enhanced trust relationship in an IEEE 802.1x network | |||
7630 | 7325143 | Digital identity creation and coalescence for service authorization | |||
7631 | 7325141 | Method and system for secure access | |||
7632 | 7325133 | Mass subscriber management | |||
7633 | 7325131 | Robust watermark for DSD signals | |||
7634 | 7325129 | Method for altering encryption status in a relational database in a continuous process | |||
7635 | 7322046 | Method and system for the secure use of a network service | |||
7636 | 7322040 | Authentication architecture | |||
7637 | 7321970 | Method and system for authentication using infrastructureless certificates | |||
7638 | 7321910 | Microprocessor apparatus and method for performing block cipher cryptographic functions | |||
7639 | 7320143 | Method of gaining secure access to intranet resources | |||
7640 | 7320141 | Method and system for server support for pluggable authorization systems | |||
7641 | 7320140 | Modifying digital rights | |||
7642 | 7320076 | Method and apparatus for a transaction-based secure storage file system | |||
7643 | 7320033 | Dynamic local drive and printer sharing | |||
7644 | 7320008 | Data protection mechanism | |||
7645 | 7319759 | Producing a new black box for a digital rights management (DRM) system | |||
7646 | 7318159 | Detecting copied identity of terminal equipment | |||
7647 | 7318156 | Group signature apparatus and method | |||
2007 | |||||
7648 | 7313824 | Method for protecting digital content from unauthorized use by automatically and dynamically integrating a content-protection agent | |||
7649 | 7313820 | Method and system for providing an authorization framework for applications | |||
7650 | 7313816 | Method and system for authenticating a user in a web-based environment | |||
7651 | 7313814 | Scalable, error resilient DRM for scalable media | |||
7652 | 7313812 | Application level security | |||
7653 | 7313703 | Method for protecting a microcomputer system against manipulation of data stored in a storage assembly | |||
7654 | 7313699 | Automatic authentication method and system in print process | |||
7655 | 7313697 | Method for authentication | |||
7656 | 7310822 | Filtering a permission set using permission requests associated with a code assembly | |||
7657 | 7310812 | Service executing method and service providing system | |||
7658 | 7310736 | Method and system for sharing storage space on a computer | |||
7659 | 7310735 | Method, system, and program for distributing software between computer systems | |||
7660 | 7310732 | Content distribution system authenticating a user based on an identification certificate identified in a secure container | |||
7661 | 7308708 | Alternate encodings of a biometric identifier | |||
7662 | 7308707 | Communication and authentication of a composite credential utilizing obfuscation | |||
7663 | 7308703 | Protection of data accessible by a mobile device | |||
7664 | 7308584 | System and method for securing a portable processing module | |||
7665 | 7308581 | Systems and methods for online identity verification | |||
7666 | 7308579 | Method and system for internationally providing trusted universal identification over a global communications network | |||
7667 | 7308572 | Method of printing a document | |||
7668 | 7308102 | System and method for securing access to memory modules | |||
7669 | 7305704 | Management of trusted flow system | |||
7670 | 7305567 | Decoupled architecture for data ciphering operations | |||
7671 | 7305565 | Secure, encrypting pin pad | |||
7672 | 7305555 | Smart card mating protocol | |||
7673 | 7305550 | System and method for providing authentication and verification services in an enhanced media gateway | |||
7674 | 7305545 | Automated electronic messaging encryption system | |||
7675 | 7305470 | Method for displaying web user's authentication status in a distributed single login network | |||
7676 | 7305432 | Privacy preferences roaming and enforcement | |||
7677 | 7302703 | Hardware token self enrollment process | |||
7678 | 7302698 | Operation of trusted state in computing platform | |||
7679 | 7302591 | Access control | |||
7680 | 7302589 | Method for securing memory mapped control registers | |||
7681 | 7302588 | Data recording method, data recording device, and recording medium | |||
7682 | 7302586 | Secure video card methods and systems | |||
7683 | 7302585 | System for providing a trustworthy user interface | |||
7684 | 7302584 | Mechanisms for banning computer programs from use | |||
7685 | 7302571 | Method and system to maintain portable computer data secure and authentication token for use therein | |||
7686 | 7302567 | Technical facility having software stored on a computer of the technical facility | |||
7687 | 7302564 | Translation of secure communications for handshake protocols | |||
7688 | 7302058 | Method and apparatus for securing control words | |||
7689 | 7299499 | Data transfer system, data transfer apparatus, data recording apparatus, data transfer method, and recording medium | |||
7690 | 7299498 | System and method of sharing digital literary works while protecting against illegal reproduction through communication network | |||
7691 | 7299496 | Detection of misuse of authorized access in an information retrieval system | |||
7692 | 7299491 | Authenticated domain name resolution | |||
7693 | 7299490 | Portable wireless device and software for printing by reference | |||
7694 | 7299366 | Secure software customization for smartcard | |||
7695 | 7299365 | Secure video card methods and systems | |||
7696 | 7299364 | Method and system to maintain application data secure and authentication token for use therein | |||
7697 | 7299360 | Method and system for fingerprint template matching | |||
7698 | 7299359 | Apparatus and method for indicating password quality and variety | |||
7699 | 7299357 | Opaque message archives | |||
7700 | 7298845 | Digital content protection system | |||
7701 | 7298505 | Printing apparatus, printing method, and printing system for printing password-protected and normal print jobs | |||
7702 | 7296294 | System for binding secrets to a computer system having tolerance for hardware changes | |||
7703 | 7296289 | Setting or changing an access condition for an access management apparatus and method of a portable electronic device | |||
7704 | 7296160 | Secure user authentication over a communication network | |||
7705 | 7293292 | Method and system for securely and selectively providing optional features or premium functionality in a printer | |||
7706 | 7293285 | Method and system for providing field scalability across a storage product family | |||
7707 | 7293281 | Method and system for verifying a client request | |||
7708 | 7293178 | Methods and systems for maintaining an encrypted video memory subsystem | |||
7709 | 7290286 | Content provider secure and tracable portal | |||
7710 | 7290285 | Systems and methods for distributing and viewing electronic documents | |||
7711 | 7290279 | Access control method using token having security attributes in computer system | |||
7712 | 7290278 | Identity based service system | |||
7713 | 7290277 | Control of authentication data residing in a network device | |||
7714 | 7290151 | Logic circuit with variable internal polarities | |||
7715 | 7290150 | Information integration across autonomous enterprises | |||
7716 | 7290143 | Method of certifying transmission, reception and authenticity of electronic documents and related network unit | |||
7717 | 7290132 | Establishing secure peer networking in trust webs on open networks using shared secret device key | |||
7718 | 7289632 | System and method for distributed security | |||
7719 | 7287277 | Method and apparatus for controlling execution of a computer operation | |||
7720 | 7287158 | Person authentication system, person authentication method, information processing apparatus, and program providing medium | |||
7721 | 7287156 | Methods, systems and computer program products for authentication between clients and servers using differing authentication protocols | |||
7722 | 7287010 | Information processing device and method, and providing medium | |||
7723 | 7284279 | System and method for preventing unauthorized operation of identification and financial document production equipment | |||
7724 | 7284271 | Authorizing a requesting entity to operate upon data structures | |||
7725 | 7284265 | System and method for incremental refresh of a compiled access control table in a content management system | |||
7726 | 7284263 | Rights management inter-entity message policies and enforcement | |||
7727 | 7284135 | Methods and systems for maintaining an encrypted video memory subsystem | |||
7728 | 7284132 | Memory card | |||
7729 | 7284125 | Method and apparatus for personal identification | |||
7730 | 7283632 | Unauthorized access embedded software protection system | |||
7731 | 7281273 | Protecting content on medium from unfettered distribution | |||
7732 | 7281267 | Software audit system | |||
7733 | 7281263 | System and method for managing security access for users to network systems | |||
7734 | 7281137 | Authentication method and system | |||
7735 | 7281128 | One pass security | |||
7736 | 7280662 | Time-shifting data in digital radio system | |||
7737 | 7280661 | Data output method and apparatus, data playback method and apparatus, data recording method and apparatus, and data recording and playback method and apparatus | |||
7738 | 7278169 | Controlling the downloading and recording of digital data | |||
7739 | 7278166 | Method and apparatus for recording and/or reproducing data and record medium | |||
7740 | 7278160 | Presentation of correlated events as situation classes | |||
7741 | 7278026 | Method and system for the generation, management, and use of a unique personal identification token for in person and electronic identification and authentication | |||
7742 | 7277547 | Method for automated security configuration in a wireless network | |||
7743 | 7275260 | Enhanced privacy protection in identification in a data communications network | |||
7744 | 7275259 | System and method for unified sign-on | |||
7745 | 7275162 | On-line directory assistance system | |||
7746 | 7275158 | Home server including a proxy facility, for executing an authentication and an encryption process instead of a user terminal, in an electronic commercial transaction | |||
7747 | 7272857 | Method/system for preventing identity theft or misuse by restricting access | |||
7748 | 7272855 | Unified monitoring and detection of intrusion attacks in an electronic system | |||
7749 | 7272852 | Reserve/release control method | |||
7750 | 7272849 | System and method for sharing data | |||
7751 | 7272727 | Method for managing external storage devices | |||
7752 | 7272726 | Secure video card methods and systems | |||
7753 | 7272721 | System and method for automated border-crossing checks | |||
7754 | 7269745 | Methods and apparatus for composing an identification number | |||
7755 | 7269744 | System and method for safeguarding data between a device driver and a device | |||
7756 | 7269743 | Method and apparatus for secure data mirroring a storage system | |||
7757 | 7269742 | Microprocessor configuration with encryption | |||
7758 | 7269736 | Distributed cryptographic methods and arrangements | |||
7759 | 7269727 | System and method for optimizing authentication in a network environment | |||
7760 | 7269656 | Remote order entry system and method | |||
7761 | 7269649 | Protocol layer-level system and method for detecting virus activity | |||
7762 | 7266846 | System and method of facilitating compliance with information sharing regulations | |||
7763 | 7266842 | Control function implementing selective transparent data authentication within an integrated system | |||
7764 | 7266840 | Method and system for secure, authorized e-mail based transactions | |||
7765 | 7266839 | System and method for providing discriminated content to network users | |||
7766 | 7266838 | Secure resource | |||
7767 | 7266837 | Authentication, authorization, and accounting (AAA) server | |||
7768 | 7266703 | Single-pass cryptographic processor and method | |||
7769 | 7266702 | Method and system for managing security material and services in a distributed database system | |||
7770 | 7266698 | Time stamping system for electronic documents and program medium for the same | |||
7771 | 7266692 | Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates | |||
7772 | 7266684 | Internet third-party authentication using electronic tickets | |||
7773 | 7263716 | Remote management mechanism to prevent illegal system commands | |||
7774 | 7263715 | Communications terminal operable with high security protocol | |||
7775 | 7263618 | Method for binding a program module | |||
7776 | 7263617 | Method and system for detecting a security violation using an error correction code | |||
7777 | 7263610 | Secure multicast flow | |||
7778 | 7260838 | Incorporating password change policy into a single sign-on environment | |||
7779 | 7260834 | Cryptography and certificate authorities in gaming machines | |||
7780 | 7260832 | Process for preventing virus infection of data-processing system | |||
7781 | 7260831 | Method and system for authorization and access to protected resources | |||
7782 | 7260726 | Method and apparatus for a secure computing environment | |||
7783 | 7260724 | Context sensitive dynamic authentication in a cryptographic system | |||
7784 | 7260215 | Method for encryption in an un-trusted environment | |||
7785 | 7257843 | Command processing system by a management agent | |||
7786 | 7257835 | Securely authorizing the performance of actions | |||
7787 | 7257834 | Security framework data scheme | |||
7788 | 7257718 | Cipher message assist instructions | |||
7789 | 7257717 | Method with the functions of virtual space and data encryption and invisibility | |||
7790 | 7257708 | Steganographic authentication | |||
7791 | 7257580 | Method, system, and program for restricting modifications to allocations of computational resources | |||
7792 | 7257107 | Device and method for detecting unauthorized, "rogue" wireless LAN access points | |||
7793 | 7254838 | Copy protection method and system for digital media | |||
7794 | 7254837 | Apparatus and method for storing and distributing encrypted digital content | |||
7795 | 7254712 | System and method for compressing secure e-mail for exchange with a mobile data communication device | |||
7796 | 7254711 | Network authentication system, method, and program, service providing apparatus, certificate authority, and user terminal | |||
7797 | 7254705 | Service providing system in which services are provided from service provider apparatus to service user apparatus via network | |||
7798 | 7254619 | Apparatus for outputting individual authentication information connectable to a plurality of terminals through a network | |||
7799 | 7254586 | Secure and opaque type library providing secure data protection of variables | |||
7800 | 7254237 | System and method for establishing a secure connection | |||
7801 | 7251834 | Filtering a permission set using permission requests associated with a code assembly | |||
7802 | 7251830 | Process-based selection of virus detection actions system, method and computer program product | |||
7803 | 7251828 | Flexible method of security data backup | |||
7804 | 7251826 | Domain manager for plural domains and method of use | |||
7805 | 7251732 | Password synchronization in a sign-on management system | |||
7806 | 7249375 | Method and apparatus for end-to-end identity propagation | |||
7807 | 7249373 | Uniformly representing and transferring security assertion and security response information | |||
7808 | 7249372 | Network based document distribution method | |||
7809 | 7249371 | Communications system and method | |||
7810 | 7249370 | Communication system and transfer device | |||
7811 | 7249369 | Post data processing | |||
7812 | 7249265 | Multi-featured power meter with feature key | |||
7813 | 7249263 | Method and system for user authentication and identification using behavioral and emotional association consistency | |||
7814 | 7248739 | Semiconductor device for compressing video signals with copy protection information | |||
7815 | 7246379 | Method and system for validating software code | |||
7816 | 7246247 | Secure device | |||
7817 | 7246244 | Identity verification method using a central biometric authority | |||
7818 | 7246235 | Time varying presentation of items based on a key hash | |||
7819 | 7243373 | On-access malware scanning | |||
7820 | 7243366 | Key management protocol and authentication system for secure internet protocol rights management architecture | |||
7821 | 7243241 | Data distributing apparatus and terminal apparatus for data distribution | |||
7822 | 7243240 | System and method for firmware authentication | |||
7823 | 7243238 | Person authentication system, person authentication method, information processing apparatus, and program providing medium | |||
7824 | 7243235 | Mandatory access control (MAC) method | |||
7825 | 7242771 | Contents management system | |||
7826 | 7242769 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
7827 | 7240369 | Plug and play device and access control method therefor | |||
7828 | 7240367 | User interface and method for inputting password and password system using the same | |||
7829 | 7240365 | Repositing for digital content access control | |||
7830 | 7240362 | Providing identity-related information and preventing man-in-the-middle attacks | |||
7831 | 7240360 | System and method for controlling access to user interface elements | |||
7832 | 7240219 | Method and system for maintaining backup of portable storage devices | |||
7833 | 7240218 | Method of using a mask programmed key to securely configure a field programmable gate array | |||
7834 | 7240211 | Method of providing an access request to a same server based on a unique identifier | |||
7835 | 7240207 | Fingerprinting media entities employing fingerprint algorithms and bit-to-bit comparisons | |||
7836 | 7240201 | Method and apparatus to provide secure communication between systems | |||
7837 | 7240199 | System and method for verifying delivery and integrity of electronic messages | |||
7838 | 7240198 | Honesty preserving negotiation and computation | |||
7839 | 7239725 | Face image recognition apparatus | |||
7840 | 7237268 | Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith | |||
7841 | 7237257 | Leveraging a persistent connection to access a secured service | |||
7842 | 7237256 | Method and system for providing an open and interoperable system | |||
7843 | 7237125 | Method and apparatus for automatically deploying security components in a content distribution system | |||
7844 | 7237124 | Contents recorder/reproducer | |||
7845 | 7237122 | Method and apparatus to facilitate software installation using embedded user credentials | |||
7846 | 7237081 | Secure mode for processors supporting interrupts | |||
7847 | 7237030 | System and method for preserving post data on a server system | |||
7848 | 7236610 | Authenticating executable code and executions thereof | |||
7849 | 7234160 | Method and apparatus for authorizing the transfer of information | |||
7850 | 7234158 | Separate client state object and user interface domains | |||
7851 | 7234157 | Remote authentication caching on a trusted client or gateway system | |||
7852 | 7234156 | System and method for authentication of network users | |||
7853 | 7233668 | System and method for a commercial multimedia rental and distribution system | |||
7854 | 7233665 | Enciphering apparatus and method, deciphering apparatus and method as well as information processing apparatus and method | |||
7855 | 7231669 | Binding content to a portable storage device or the like in a digital rights management (DRM) system | |||
7856 | 7231663 | System and method for providing key management protocol with client verification of authorization | |||
7857 | 7231659 | Entity authentication in a shared hosting computer network environment | |||
7858 | 7231657 | User authentication system and methods thereof | |||
7859 | 7231527 | Method of making secure the use of a piece of software by means of a processing and secret memorizing unit, and a system constituting an application thereof | |||
7860 | 7231513 | Dynamically linked basic input/output system | |||
7861 | 7231043 | Data processing apparatus and method, and computer-readable storage medium on which program for executing data processing is stored | |||
7862 | 7231042 | Signal transmission apparatus and signal transmission method | |||
7863 | 7228567 | License file serial number tracking | |||
7864 | 7228561 | Open information based access control method | |||
7865 | 7228440 | Scan and boundary scan disable mechanism on secure device | |||
7866 | 7228438 | Computer network security system employing portable storage device | |||
7867 | 7228435 | Program executing method in service system and program executing apparatus for the same | |||
7868 | 7228425 | Protecting content from illicit reproduction by proof of existence of a complete data set via self-referencing sections | |||
7869 | 7228418 | Authentication and signature method for messages using reduced size of binary units of information content and corresponding systems | |||
7870 | 7228417 | Simple secure login with multiple-authentication providers | |||
7871 | 7225469 | BIOS lock encode/decode driver | |||
7872 | 7225465 | Method and system for remote management of personal security devices | |||
7873 | 7225340 | Digital copying method and storage device for digital content | |||
7874 | 7225337 | Cryptographic security method and electronic devices suitable therefor | |||
7875 | 7224802 | Wireless communication device, and method for controlling the same, which authenticates partner device when connecting thereto | |||
7876 | 7224798 | Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system | |||
7877 | 7222363 | Device independent authentication system and method | |||
7878 | 7222361 | Computer security with local and remote authentication | |||
7879 | 7219239 | Method for batching events for transmission by software agent | |||
7880 | 7219238 | Data transfer control device, electronic instrument, and data transfer control method | |||
7881 | 7219236 | Administering a security system | |||
7882 | 7219234 | System and method for managing access rights and privileges in a data processing system | |||
7883 | 7219233 | Methods and apparatus for associating a user with content in a collaborative whiteboard system | |||
7884 | 7216363 | Licensing duplicated systems | |||
7885 | 7216359 | Secure communication overlay using IP address hopping | |||
7886 | 7216225 | Filtered application-to-application communication | |||
7887 | 7215779 | Information providing apparatus and method, information processing apparatus and method, and program storage medium | |||
7888 | 7213268 | Method for controlling customer-implemented data updates | |||
7889 | 7213262 | Method and system for proving membership in a nested group using chains of credentials | |||
7890 | 7213157 | Integrated circuit for digital rights management | |||
7891 | 7213156 | Contents data transmission/reception system, contents data transmitter, contents data receiver and contents data transmission/reception method | |||
7892 | 7213152 | Modular bios update mechanism | |||
7893 | 7213150 | Method and apparatus for secure message queuing | |||
7894 | 7213146 | System and method for establishing security profiles of computers | |||
7895 | 7212637 | Cartridge validation with radio frequency identification | |||
7896 | 7210164 | Method to remotely geolocate and activate or deactivate valuable equipment | |||
7897 | 7210163 | Method and system for user authentication and authorization of services | |||
7898 | 7210044 | Mobile phone with an encryption function | |||
7899 | 7210035 | System and method for graphical indicia for the certification of records | |||
7900 | 7210034 | Distributed control of integrity measurement using a trusted fixed token | |||
7901 | 7207066 | Method for protecting a microcomputer system against manipulation of data stored in a storage arrangement of the microcomputer system | |||
7902 | 7207065 | Apparatus and method for developing secure software | |||
7903 | 7207058 | Method and system for transmitting authentication context information | |||
7904 | 7206943 | Display unit storing and using a cryptography key | |||
7905 | 7206942 | Recording medium cartridge and a recording-and-reproducing apparatus thereof | |||
7906 | 7206940 | Methods and systems providing per pixel security and functionality | |||
7907 | 7206939 | File storage system and a NAS server | |||
7908 | 7206649 | Audio watermarking with dual watermarks | |||
7909 | 7203968 | Method and apparatus for selectively executing information recording using a cognizant mode and a non-cognizant mode | |||
7910 | 7203967 | Methods and apparatus for content protection in a wireless network | |||
7911 | 7200869 | System and method for protecting domain data against unauthorized modification | |||
7912 | 7200862 | Securing uniform resource identifier namespaces | |||
7913 | 7200861 | Method and system for validating physical access to an information handling system | |||
7914 | 7200754 | Variable expiration of passwords | |||
7915 | 7197768 | Software modem for communicating data using encrypted data and unencrypted control codes | |||
7916 | 7197648 | Secure video card methods and systems | |||
7917 | 7197647 | Method of securing programmable logic configuration data | |||
7918 | 7197368 | Audio watermarking with dual watermarks | |||
7919 | 7194768 | Access control for a microprocessor card | |||
7920 | 7194739 | Multi-application execution system and method thereof | |||
7921 | 7194637 | Method for controlling access within a distributed system containing at least one networked processor-based system and a plurality of non-networked processor-based systems | |||
7922 | 7194636 | Data authentication | |||
7923 | 7194617 | Method and apparatus to prevent the unauthorized copying of digital information | |||
7924 | 7194440 | Billing method using SSL/TLS | |||
7925 | 7194091 | Content using system | |||
7926 | 7191467 | Method and system of integrating third party authentication into internet browser code | |||
7927 | 7191466 | Flexible system and method of user authentication for password based system | |||
7928 | 7191464 | Method and system for tracking a secure boot in a trusted computing environment | |||
7929 | 7191344 | Method and system for controlling access to data stored on a data storage device | |||
7930 | 7191340 | Generation of a secret quantity based on an identifier of an integrated circuit | |||
7931 | 7191339 | System and method for using a PLD identification code | |||
7932 | 7190671 | Mitigating denial-of-service attacks using frequency domain techniques | |||
7933 | 7188362 | System and method of user and data verification | |||
7934 | 7188359 | Optimizing authentication service availability and responsiveness via client-side routing | |||
7935 | 7188314 | System and method for user authentication interface | |||
7936 | 7188258 | Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects | |||
7937 | 7188257 | Falsification detection system, and falsification detection method and medium | |||
7938 | 7188256 | Recording medium having encrypted sound data recorded therein and information processor | |||
7939 | 7188243 | System and method for over the air configuration security | |||
7940 | 7187771 | Server-side implementation of a cryptographic system | |||
7941 | 7185364 | Access system interface | |||
7942 | 7185359 | Authentication and authorization across autonomous network systems | |||
7943 | 7185357 | Method and mechanism for implementing synonym-based access control | |||
7944 | 7185207 | Portable terminal apparatus with security function | |||
7945 | 7185197 | Method and apparatus to facilitate secure network communications with a voice responsive network interface device | |||
7946 | 7185092 | Web site, information communication terminal, robot search engine response system, robot search engine registration method, and storage medium and program transmission apparatus therefor | |||
7947 | 7184546 | Method based on an algorithm capable of being graphically implemented to be used for the generation of filtering of data sequences and crytographic applications | |||
7948 | 7181763 | Authentication apparatus, authentication system, and authentication method | |||
7949 | 7181629 | Data distribution system as well as data supply device terminal device and recording device for the same | |||
7950 | 7181628 | Information terminal device and content backup method | |||
7951 | 7181623 | Scalable wide-area upload system and method | |||
7952 | 7181615 | Method and system for vehicle authentication of a remote access device | |||
7953 | 7181014 | Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange | |||
7954 | 7178169 | Method and apparatus for securing transfer of and access to digital content | |||
7955 | 7178165 | Additional layer in operating system to protect system from hacking | |||
7956 | 7178164 | System and method for ensuring proper implementation of computer security policies | |||
7957 | 7178041 | Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device | |||
7958 | 7178040 | Data processing method, system and apparatus for processing a variety of demands from a service provider | |||
7959 | 7178038 | Apparatus and method for reproducing user data | |||
7960 | 7178037 | Computer program copy management system | |||
7961 | 7178027 | System and method for securely copying a cryptographic key | |||
7962 | 7177425 | Device and method for securing information associated with a subscriber in a communication apparatus | |||
7963 | 7176783 | Device for identifying authorization and triggering, enabling an action, preferably an electronic locking device for motor vehicles | |||
7964 | 7174567 | Digital rights management apparatus, methods and multimedia products using biometric data | |||
7965 | 7174564 | Secure wireless local area network | |||
7966 | 7174466 | Method to protect software against unwanted use with a "detection and coercion" principle | |||
7967 | 7174465 | Secure method for system attribute modification | |||
7968 | 7174464 | Method of making a user piece of software secure by means of a processing and secret memorizing unit, and a system constituting an application thereof | |||
7969 | 7174462 | Method of authentication using familiar photographs | |||
7970 | 7174454 | System and method for establishing historical usage-based hardware trust | |||
7971 | 7171694 | Method for performing a transaction over a network | |||
7972 | 7171692 | Asynchronous communication within a server arrangement | |||
7973 | 7171686 | Operating system extension to provide security for web-based public access services | |||
7974 | 7171679 | Generating and maintaining encrypted passwords | |||
7975 | 7171567 | System for protecting information over the internet | |||
7976 | 7171565 | Method and system for producing wise cards | |||
7977 | 7171555 | Method and apparatus for communicating credential information within a network device authentication conversation | |||
7978 | 7168092 | Configuring processing units | |||
7979 | 7167512 | Communication method, communication apparatus, software program and computer-readable recording medium for avoiding delay in authentication due to interruption of communication | |||
7980 | 7165268 | Digital signatures for tangible medium delivery | |||
7981 | 7165110 | System and method for simultaneously establishing multiple connections | |||
7982 | 7162743 | System and method of limiting access to protected hardware addresses and processor instructions | |||
7983 | 7162741 | System and methods for intrusion detection with dynamic window sizes | |||
7984 | 7162737 | Synchronization of security gateway state information | |||
7985 | 7162734 | Method for controlling access to a data communication network, with user identification | |||
7986 | 7162648 | Methods of providing integrated circuit devices with data modifying capabilities | |||
7987 | 7162644 | Methods and circuits for protecting proprietary configuration data for programmable logic devices | |||
7988 | 7162643 | Method and system for providing transfer of analytic application data over a network | |||
7989 | 7162642 | Digital content distribution system and method | |||
7990 | 7162640 | System and method for protecting identity information | |||
7991 | 7162635 | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents | |||
7992 | 7162630 | Systems and methods for implementing host-based security in a computer network | |||
7993 | 7162034 | Method and apparatus for multi-session time-slot multiplexing | |||
7994 | 7159121 | Transmission of information to a reproduction device having user identification by organism information of a specified type | |||
7995 | 7158641 | Recorder | |||
2006 | |||||
7996 | 7155739 | Method and system for secure registration, storage, management and linkage of personal authentication credentials data over a network | |||
7997 | 7155616 | Computer network comprising network authentication facilities implemented in a disk drive | |||
7998 | 7155614 | System and method for single sign on process for websites with multiples applications and services | |||
7999 | 7155611 | Method of operating a conditional access system for broadcast applications | |||
8000 | 7155606 | Method and system for accepting preverified information | |||
8001 | 7152245 | Installation of black box for trusted component for digital rights management (DRM) on computing device | |||
8002 | 7152244 | Techniques for detecting and preventing unintentional disclosures of sensitive data | |||
8003 | 7152230 | Storage media storing data related to smart card, smart card system and smart card application loading method | |||
8004 | 7152166 | Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication | |||
8005 | 7152165 | Trusted storage systems and methods | |||
8006 | 7152164 | Network anti-virus system | |||
8007 | 7151834 | Methods and devices for controlling facsimile transmissions of confidential information | |||
8008 | 7151435 | Method and apparatus for identifying a patient | |||
8009 | 7150043 | Intrusion detection method and signature table | |||
8010 | 7150041 | Disk management interface | |||
8011 | 7150038 | Facilitating single sign-on by using authenticated code to access a password store | |||
8012 | 7150036 | Method of and personal computer for displaying content received from a content delivery server using a disk drive which includes a network address for the content delivery server and a server-contacting program | |||
8013 | 7149900 | Method of defending software from debugger attacks | |||
8014 | 7149897 | Systems and methods for providing increased computer security | |||
8015 | 7146637 | User registry adapter framework | |||
8016 | 7146507 | Information recording apparatus having function of encrypting information | |||
8017 | 7146500 | System for obtaining signatures on a single authoritative copy of an electronic record | |||
8018 | 7146007 | Secure conditional access port interface | |||
8019 | 7143445 | Information processing apparatus, information processing method, and program storage medium | |||
8020 | 7143440 | User authentication system and method | |||
8021 | 7143409 | Automated entitlement verification for delivery of licensed software | |||
8022 | 7143297 | Procedure for the protection of computer software and/or computer-readable data as well as protective equipment | |||
8023 | 7143296 | Transmitting/receiving apparatus and a transmitting/receiving method | |||
8024 | 7143295 | Methods and circuits for dedicating a programmable logic device for use with specific designs | |||
8025 | 7143290 | Trusted and secure techniques, systems and methods for item delivery and execution | |||
8026 | 7143283 | Simplifying the selection of network paths for implementing and managing security policies on a network | |||
8027 | 7140045 | Method and system for user information verification | |||
8028 | 7140042 | System and method for preventing software piracy | |||
8029 | 7140036 | Centralized identity authentication for electronic communication networks | |||
8030 | 7137145 | System and method for detecting an infective element in a network environment | |||
8031 | 7137141 | Single sign-on to an underlying operating system application | |||
8032 | 7137008 | Flexible method of user authentication | |||
8033 | 7137002 | Differential authentication entity validation scheme for international emergency telephone service | |||
8034 | 7137001 | Authentication of vehicle components | |||
8035 | 7136998 | System and method for managing changes in a public key certificate directory | |||
8036 | 7136996 | One-time logon method for distributed computing systems | |||
8037 | 7136490 | Electronic password wallet | |||
8038 | 7136488 | Microprocessor using asynchronous public key decryption processing | |||
8039 | 7136487 | System and method for automatically protecting private video content using embedded cryptographic security | |||
8040 | 7134145 | Registering copy protected material in a check-out, check-in system | |||
8041 | 7134139 | System and method for authenticating block level cache access on network | |||
8042 | 7134138 | Methods and apparatus for providing security for a data storage system | |||
8043 | 7134137 | Providing data to applications from an access system | |||
8044 | 7134026 | Data terminal device providing backup of uniquely existable content data | |||
8045 | 7134025 | Methods and circuits for preventing the overwriting of memory frames in programmable logic devices | |||
8046 | 7133846 | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management | |||
8047 | 7131139 | Method for authorizing access to computer applications | |||
8048 | 7131137 | Communication system including a security system | |||
8049 | 7131010 | Data processing system, data processing method, data processing apparatus, and program providing medium | |||
8050 | 7130886 | System and method for providing secure message signature status and trust status indication | |||
8051 | 7130852 | Internal security system for a relational database system | |||
8052 | 7127617 | On-line directory assistance system | |||
8053 | 7127616 | Semiconductor integrated circuits, data transfer systems, and the method for data transfer | |||
8054 | 7127608 | System and user interface supporting URL processing and concurrent application operation | |||
8055 | 7124433 | Password that associates screen position information with sequentially entered characters | |||
8056 | 7124305 | Data repository and method for promoting network storage of data | |||
8057 | 7124296 | Security chip architecture and implementations for cryptography acceleration | |||
8058 | 7124173 | Method and apparatus for intercepting performance metric packets for improved security and intrusion detection | |||
8059 | 7120935 | Interactive key control system and method of managing access to secured locations | |||
8060 | 7120928 | Secure selective sharing of account information on an internet information aggregation system | |||
8061 | 7120927 | System and method for e-mail alias registration | |||
8062 | 7120801 | Integrated circuit device with data modifying capabilities and related methods | |||
8063 | 7120793 | System and method for electronic certificate revocation | |||
8064 | 7120254 | Cryptographic system and method for geolocking and securing digital information | |||
8065 | 7120128 | Method and system for creating and implementing zones within a fibre channel system | |||
8066 | 7117535 | Software-generated machine identifier | |||
8067 | 7117529 | Identification and authentication management | |||
8068 | 7117528 | Contested account registration | |||
8069 | 7117527 | Device, system, and method for capturing email borne viruses | |||
8070 | 7117526 | Method and apparatus for establishing dynamic tunnel access sessions in a communication network | |||
8071 | 7117373 | Bitstream for configuring a PLD with encrypted design data | |||
8072 | 7117360 | CRL last changed extension or attribute | |||
8073 | 7114183 | Network adaptive baseline monitoring system and method | |||
8074 | 7114176 | Taking ownership of a part-physical, part-virtual device | |||
8075 | 7114175 | System and method for managing network service access and enrollment | |||
8076 | 7114082 | Data security for digital data storage | |||
8077 | 7114081 | Outside leakage preventing system of confidential information | |||
8078 | 7114080 | Architecture for secure remote access and transmission using a generalized password scheme with biometric features | |||
8079 | 7114078 | Method and apparatus for storage of usernames, passwords and associated network addresses in portable memory | |||
8080 | 7114073 | Digital contents generating apparatus and digital contents reproducing apparatus | |||
8081 | 7111322 | Automatic generation of a new encryption key | |||
8082 | 7111174 | Method and system for providing access to secure entity or service by a subset of N persons of M designated persons | |||
8083 | 7111173 | Encryption process including a biometric unit | |||
8084 | 7110543 | Content management system, content management terminal, usage rule management server, content management method, and content management program | |||
8085 | 7107616 | Method of producing a response | |||
8086 | 7107610 | Resource authorization | |||
8087 | 7107458 | Authentication communicating semiconductor device | |||
8088 | 7107455 | Computer information access based on a transmitted identification signal | |||
8089 | 7107347 | Method and apparatus for network deception/emulation | |||
8090 | 7103911 | Identity-based-encryption system with district policy information | |||
8091 | 7103782 | Secure memory and processing system having laser-scribed encryption key | |||
8092 | 7103776 | Emergency logon method | |||
8093 | 7103773 | Message exchange in an information technology network | |||
8094 | 7103770 | Point-to-point data streaming using a mediator node for administration and security | |||
8095 | 7100204 | System and method for determining network users' physical locations | |||
8096 | 7100203 | Operating session reauthorization in a user-operated device | |||
8097 | 7100198 | Printing method, print system and program | |||
8098 | 7100197 | Network user authentication system and method | |||
8099 | 7100054 | Computer network security system | |||
8100 | 7100046 | VPN enrollment protocol gateway | |||
8101 | 7100045 | System, method, and program for ensuring originality | |||
8102 | 7099320 | Method and apparatus for detection of and response to abnormal data streams in high bandwidth data pipes | |||
8103 | 7096494 | Cryptographic system and method for electronic transactions | |||
8104 | 7096369 | Data transformation apparatus and data transformation method | |||
8105 | 7096366 | Portable electronic device with a security function and a nonvolatile memory | |||
8106 | 7096358 | Encrypting file system | |||
8107 | 7096357 | Cryptographic communication terminal, cryptographic communication center apparatus, cryptographic communication system, and storage medium | |||
8108 | 7095859 | Managing private keys in a free seating environment | |||
8109 | 7093298 | Apparatus and method for security object enhancement and management | |||
8110 | 7093297 | Method and apparatus for monitoring a network data processing system | |||
8111 | 7093285 | Supplier portal for global procurement e-business applications | |||
8112 | 7093284 | Method, system, and storage medium for preventing recurrence of a system outage in a computer network | |||
8113 | 7093282 | Method for supporting dynamic password | |||
8114 | 7093281 | Casual access application with context sensitive pin authentication | |||
8115 | 7093280 | Internet security system | |||
8116 | 7093279 | Method and system for automatic invocation of secure sockets layer encryption on a parallel array of Web servers | |||
8117 | 7093136 | Methods, systems, computer program products, and data structures for limiting the dissemination of electronic email | |||
8118 | 7093127 | System and method for computer storage security | |||
8119 | 7093125 | Rote based tool delegation | |||
8120 | 7092909 | Information processing apparatus and method, and distribution medium | |||
8121 | 7089584 | Security architecture for integration of enterprise information system with J2EE platform | |||
8122 | 7089582 | Method and apparatus for identifying universal resource locator rewriting in a distributed data processing system | |||
8123 | 7089428 | Method and system for managing computer security information | |||
8124 | 7089425 | Remote access authorization of local content | |||
8125 | 7089424 | Peripheral device for protecting data stored on host device and method and system using the same | |||
8126 | 7089420 | Authentication method and system | |||
8127 | 7089416 | Information communication apparatus and method, information communication system, and memory medium | |||
8128 | 7089415 | Authentication methods and systems for accessing networks authentication methods and systems for accessing the internet | |||
8129 | 7085931 | Virtual smart card system and method | |||
8130 | 7085929 | Method and apparatus for revocation list management using a contact list having a contact count field | |||
8131 | 7085926 | Electronic contracts | |||
8132 | 7085925 | Trust ratings in group credentials | |||
8133 | 7085924 | Authentication methods and systems for accessing networks, authentication methods and systems for accessing the internet | |||
8134 | 7084736 | Method for checking the authorization of users | |||
8135 | 7082614 | System for identification of smart cards | |||
8136 | 7082198 | Data receiving method and data receiving unit therefor | |||
8137 | 7080403 | Method and system for person data authentication and management | |||
8138 | 7080402 | Access to applications of an electronic processing device solely based on geographic location | |||
8139 | 7080262 | Key compression | |||
8140 | 7080260 | System and computer based method to automatically archive and retrieve encrypted remote client data files | |||
8141 | 7080259 | Electronic information backup system | |||
8142 | 7080258 | IC, IC-mounted electronic device, debugging method and IC debugger | |||
8143 | 7080256 | Method for authenticating a chip card in a message transmission network | |||
8144 | 7080255 | Secret key generation method, encryption method, and cryptographic communications method and system | |||
8145 | 7079655 | Encryption algorithm management system | |||
8146 | 7079278 | Image processing apparatus, data processing method, and storage medium | |||
8147 | 7076805 | Digital data system | |||
8148 | 7076798 | Securing non-EJB corba objects using an EJB security mechanism | |||
8149 | 7076797 | Granular authorization for network user sessions | |||
8150 | 7076796 | Virtual media from a directory service | |||
8151 | 7076795 | System and method for granting access to resources | |||
8152 | 7076656 | Methods and apparatus for providing efficient password-authenticated key exchange | |||
8153 | 7076083 | Personnel access control system | |||
8154 | 7073199 | Document distribution management method and apparatus using a standard rendering engine and a method and apparatus for controlling a standard rendering engine | |||
8155 | 7073073 | Data providing system, device, and method | |||
8156 | 7073071 | Platform and method for generating and utilizing a protected audit log | |||
8157 | 7073069 | Apparatus and method for a programmable security processor | |||
8158 | 7073058 | Authentication system for connecting client to server providing particular information using dedicated system and method therefor | |||
8159 | 7069587 | Electronic device and connection control method | |||
8160 | 7069580 | Function-based process control verification and security in a process control system | |||
8161 | 7069447 | Apparatus and method for secure data storage | |||
8162 | 7069446 | Stateless mechanism for data retrieval | |||
8163 | 7069431 | Recovery of a BIOS image | |||
8164 | 7065655 | Secure enclosure for key exchange | |||
8165 | 7065652 | System for obfuscating computer code upon disassembly | |||
8166 | 7065651 | Secure video card methods and systems | |||
8167 | 7062781 | Method for providing simultaneous parallel secure command execution on multiple remote hosts | |||
8168 | 7062780 | Granular access control of inter-process communications in a compartment mode workstation labeled environment | |||
8169 | 7058977 | Copyright control of encrypted data using uncorrected errors in an error correcting code | |||
8170 | 7058971 | Access privilege transferring method | |||
8171 | 7058968 | Computer security and management system | |||
8172 | 7058820 | Information processing system, medium, information processing apparatus, information processing method, storage medium storing computer readable program for realizing such method | |||
8173 | 7058819 | Data processing system, data processing method, and program providing medium | |||
8174 | 7058818 | Integrated circuit for digital rights management | |||
8175 | 7058817 | System and method for single sign on process for websites with multiple applications and services | |||
8176 | 7055173 | Firewall pooling in a network flowswitch | |||
8177 | 7055170 | Security mechanism and architecture for collaborative software systems using tuple space | |||
8178 | 7055042 | System and method for synchronizing a user password between mainframe and alternative computer operating environments | |||
8179 | 7055036 | System and method to verify trusted status of peer in a peer-to-peer network environment | |||
8180 | 7055033 | Integrated circuit devices with steganographic authentication and steganographic authentication methods | |||
8181 | 7054930 | System and method for propagating filters | |||
8182 | 7051366 | Evidence-based security policy manager | |||
8183 | 7051364 | System and method for preparing, executing, and securely managing electronic documents | |||
8184 | 7051362 | Method and system for operating a network server to discourage inappropriate use | |||
8185 | 7051214 | Information processing system having fortified password function and method thereof | |||
8186 | 7051213 | Storage medium and method and apparatus for separately protecting data in different areas of the storage medium | |||
8187 | 7051211 | Secure software distribution and installation | |||
8188 | 7051209 | System and method for creation and use of strong passwords | |||
8189 | 7050892 | Diagnostic tool security key | |||
8190 | 7047563 | Command authorization via RADIUS | |||
8191 | 7047562 | Conditioning of the execution of an executable program upon satisfaction of criteria | |||
8192 | 7047560 | Credential authentication for mobile users | |||
8193 | 7047420 | Exclusive encryption | |||
8194 | 7047415 | System and method for widely witnessed proof of time | |||
8195 | 7047413 | Collusion-resistant watermarking and fingerprinting | |||
8196 | 7047409 | Automated tracking of certificate pedigree | |||
8197 | 7047408 | Secure mutual network authentication and key exchange protocol | |||
8198 | 7043760 | System and method for establishing and managing relationships between pseudonymous identifications and memberships in organizations | |||
8199 | 7043754 | Method of secure personal identification, information processing, and precise point of contact location and timing | |||
8200 | 7043643 | Method and apparatus for operating a computer in a secure mode | |||
8201 | 7043642 | Process to manage data in a chip card | |||
8202 | 7043456 | Mobile electronic transaction personal proxy | |||
8203 | 7043024 | System and method for key distribution in a hierarchical tree | |||
8204 | 7039954 | Method for enabling a network-addressable device to detect use of its identity by a spoofer | |||
8205 | 7039951 | System and method for confidence based incremental access authentication | |||
8206 | 7039948 | Service control manager security manager lookup | |||
8207 | 7039946 | Piggy-backed key exchange protocol for providing secure, low-overhead browser connections when a client requests a server to propose a message encoding scheme | |||
8208 | 7039815 | Method for protecting a data memory | |||
8209 | 7039814 | Method for securing software via late stage processor instruction decryption | |||
8210 | 7039812 | System and method for user authentication | |||
8211 | 7039809 | Asymmetric encrypted pin | |||
8212 | 7036150 | Data management apparatus, storage medium having stored therein data management program, storage medium having stored therein usage certificate data, and method of using data | |||
8213 | 7036149 | Computer system | |||
8214 | 7036141 | Transmission system, a method and an apparatus providing access for IP data packets to a firewall protected network | |||
8215 | 7036022 | Verification of trusted-path commands | |||
8216 | 7036018 | Integrated security circuit | |||
8217 | 7036017 | Microprocessor configuration with encryption | |||
8218 | 7035403 | Encryption method and apparatus with escrow guarantees | |||
8219 | 7032241 | Methods and systems for accessing networks, methods and systems for accessing the internet | |||
8220 | 7028336 | Firewall providing enhanced network security and user transparency | |||
8221 | 7024700 | Computer with security function and method therefor | |||
8222 | 7024699 | Publication of an attorney-client privilege warning message | |||
8223 | 7024693 | Filter-based attribute value access control | |||
8224 | 7024692 | Non pre-authenticated kerberos logon via asynchronous message mechanism | |||
8225 | 7024691 | User policy for trusting web sites | |||
8226 | 7024689 | Granting access rights to unattended software | |||
8227 | 7024688 | Techniques for performing UMTS (universal mobile telecommunications system) authentication using SIP (session initiation protocol) messages | |||
8228 | 7024686 | Secure network and method of establishing communication amongst network devices that have restricted network connectivity | |||
8229 | 7024565 | Method and apparatus to detect circuit tampering | |||
8230 | 7024564 | Software protection device and method | |||
8231 | 7024558 | Apparatus and method for authenticating digital signatures and computer-readable recording medium thereof | |||
8232 | 7023861 | Malware scanning using a network bridge | |||
8233 | 7017190 | Portable recordable media anti-theft system | |||
8234 | 7017189 | System and method for activating a rendering device in a multi-level rights-management architecture | |||
8235 | 7017184 | Image recording apparatus and image processing method therefor | |||
8236 | 7017183 | System and method for administering security in a corporate portal | |||
8237 | 7017182 | Method of securely transmitting information | |||
8238 | 7017181 | Identity-based-encryption messaging system with public parameter host servers | |||
8239 | 7017050 | Clearinghouse server for internet telephony and multimedia communications | |||
8240 | 7017048 | Circuit configuration for generating current pulses in the supply current of integrated circuits | |||
8241 | 7017046 | System and method for graphical indicia for the certification of records | |||
8242 | 7016497 | Data decryption system | |||
8243 | 7013393 | Universal intelligent card for secure access to system functions | |||
8244 | 7010809 | Reproduction device stopping reproduction of encrypted content data having encrypted region shorter than predetermined length | |||
8245 | 7010808 | Binding digital content to a portable storage device or the like in a digital rights management (DRM) system | |||
8246 | 7010806 | Dynamic downloading of keyboard keycode data to a networked client | |||
8247 | 7010685 | Method and apparatus for storing scrambled digital programs by filtering product identifier | |||
8248 | 7010684 | Method and apparatus for authenticating an open system application to a portable IC device | |||
8249 | 7008456 | Computer with security function and method therefor | |||
8250 | 7007300 | Secure booting of a personal computer system | |||
8251 | 7007174 | System and method for determining user identity fraud using similarity searching | |||
8252 | 7007171 | Method and apparatus for improved fold retention on a security enclosure | |||
8253 | 7007168 | User authentication using member specifying discontinuous different coordinates | |||
8254 | 7003673 | Method for storing and operating on data units in a security module and associated security module | |||
8255 | 7003668 | Secure authentication of users via intermediate parties | |||
8256 | 7003666 | Apparatus and method for embedding information for tamper detection and detecting tamper and recording medium having program for carrying out the method recorded thereon | |||
8257 | 7003112 | Extensible GPS receiver system | |||
8258 | 7003110 | Software aging method and apparatus for discouraging software piracy | |||
8259 | 7000248 | Virtual network and virtual network connection system | |||
8260 | 7000115 | Method and apparatus for uniquely and authoritatively identifying tangible objects | |||
8261 | 7000107 | System and method for using dynamic web components to remotely control the security state of web pages | |||
8262 | 6996844 | Switch-user security for UNIX computer systems | |||
8263 | 6996839 | Authorized user system using biological signature | |||
8264 | 6996723 | Data generating apparatus and data verifying apparatus | |||
8265 | 6996722 | Data communications | |||
8266 | 6996543 | System for protection of goods against counterfeiting | |||
8267 | 6993666 | Method and apparatus for remotely accessing a password-protected service in a data communication system | |||
8268 | 6993660 | System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment | |||
8269 | 6993658 | Use of personal communication devices for user authentication | |||
8270 | 6993654 | Secure encryption processor with tamper protection | |||
8271 | 6993653 | Identity vectoring via chained mapping records | |||
8272 | 6993652 | Method and system for providing client privacy when requesting content from a public server | |||
8273 | 6993651 | Security protocol | |||
8274 | 6993138 | Spatial key trees for key management in wireless environments | |||
8275 | 6993133 | Data recording and reproduction apparatus | |||
8276 | 6990683 | Information providing system utilizing IC cards and method thereof | |||
8277 | 6990589 | Recording and/or playback apparatus and method | |||
8278 | 6990582 | Authentication method in an agent system | |||
8279 | 6990581 | Broadband certified mail | |||
8280 | 6988203 | System and method of extending communications with the wiegand protocol | |||
8281 | 6988198 | System and method for initializing operation for an information security operation | |||
8282 | 6986063 | Method for monitoring software using encryption including digital signatures/certificates | |||
8283 | 6986061 | Integrated system for network layer security and fine-grained identity-based access control | |||
8284 | 6986057 | Security device and method | |||
8285 | 6986056 | Method and arrangement for generating binary sequences of random numbers | |||
8286 | 6986055 | Method for generating random numbers | |||
8287 | 6986054 | Attack-resistant implementation method | |||
8288 | 6986053 | System for protecting cryptographic processing and memory resources for postal franking machines | |||
8289 | 6986052 | Method and apparatus for secure execution using a secure memory partition | |||
8290 | 6986051 | Method and system for controlling and filtering files using a virus-free certificate | |||
8291 | 6986046 | Method and apparatus for managing secure collaborative transactions | |||
8292 | 6985583 | System and method for authentication seed distribution | |||
8293 | 6983486 | Method and apparatus for establishing security scanner attributes in a computer system | |||
8294 | 6983380 | Automatically generating valid behavior specifications for intrusion detection | |||
8295 | 6983377 | Method for checking user access | |||
8296 | 6983371 | Super-distribution of protected digital content | |||
2005 | |||||
8297 | 6968461 | Providing break points in a malware scanning operation | |||
8298 | 6966004 | Method for providing single step log-on access to a differentiated computer network | |||
8299 | 6963980 | Combined hardware and software based encryption of databases | |||
8300 | 6963873 | Method and system for automatic association of a signed certificate with a certificate signing request | |||
8301 | 6963845 | Business card as electronic mail authorization token | |||
8302 | 6961855 | Notification of modifications to a trusted computing base | |||
8303 | 6961429 | Method and device for guaranteeing the integrity and authenticity of a set of data | |||
8304 | 6959392 | Information providing system and method for providing information | |||
8305 | 6959387 | Method and apparatus for verifying secure document timestamping | |||
8306 | 6959382 | Digital signature service | |||
8307 | 6957338 | Individual authentication system performing authentication in multiple steps | |||
8308 | 6957337 | Method and apparatus for secure authorization and identification using biometrics without privacy invasion | |||
8309 | 6957335 | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | |||
8310 | 6957331 | Method of achieving multiple processor agreement in asynchronous networks | |||
8311 | 6957330 | Method and system for secure information handling | |||
8312 | 6956950 | Computer readable medium having a private key encryption program | |||
8313 | 6954860 | Network copy protection for database programs | |||
8314 | 6952778 | Protecting access to microcontroller memory blocks | |||
8315 | 6952479 | Dynamic copy protection of optical media | |||
8316 | 6952476 | Verification of the private components of a public-key cryptographic system | |||
8317 | 6950949 | Method and apparatus for password entry using dynamic interface legitimacy information | |||
8318 | 6950948 | Verifiable, secret shuffles of encrypted data, such as elgamal encrypted data for secure multi-authority elections | |||
8319 | 6950943 | System for electronic repository of data enforcing access control on data search and retrieval | |||
8320 | 6950934 | Method for managing certificate revocation list by distributing it | |||
8321 | 6950933 | Method and system for management and notification of electronic certificate changes | |||
8322 | 6950517 | Efficient encryption and authentication for data processing systems | |||
8323 | 6950200 | Apparatus and method for re-outputting image data under different conditions depending on time passing from output of the image data | |||
8324 | 6948075 | Computer controlling method, information apparatus, computer, and storage medium | |||
8325 | 6948067 | Efficient encryption and authentication for data processing systems | |||
8326 | 6948066 | Technique for establishing provable chain of evidence | |||
8327 | 6948065 | Platform and method for securely transmitting an authorization secret | |||
8328 | 6948061 | Method and device for performing secure transactions | |||
8329 | 6947164 | Image forming system for permitting an image forming job based on an input password | |||
8330 | 6944777 | System and method for controlling access to resources in a distributed environment | |||
8331 | 6944772 | System and method of enforcing executable code identity verification over the network | |||
8332 | 6944300 | Method for migrating a base chip key from one computer system to another | |||
8333 | 6941461 | System and method of uniquely authenticating each replication of a group of soft-copy documents | |||
8334 | 6941460 | Method and system of marking a text document with a pattern of extra blanks for authentication | |||
8335 | 6941455 | System and method for cross directory authentication in a public key infrastructure | |||
8336 | 6938170 | System and method for preventing automated crawler access to web-based data sources using a dynamic data transcoding scheme | |||
8337 | 6938168 | Interactive virtual library system for expeditiously providing automatic updates of user-desired information from content providers, at least one of which is commercial, to users | |||
8338 | 6938159 | Continuous verification system | |||
8339 | 6938157 | Distributed information system and protocol for affixing electronic signatures and authenticating documents | |||
8340 | 6937728 | Verifiable anonymous channel | |||
8341 | 6934860 | System, method and article of manufacture for knowledge-based password protection of computers and other systems | |||
8342 | 6934859 | Authenticated search engines | |||
8343 | 6934856 | System of secret internet web sites for securing user access | |||
8344 | 6934843 | Method for authenticating at least one subscriber during a data interchange | |||
8345 | 6934840 | Composite keystore facility apparatus and method therefor | |||
8346 | 6934839 | Evidencing and verifying indicia of value using secret key cryptography | |||
8347 | 6934836 | Fluid separation conduit cartridge with encryption capability | |||
8348 | 6934393 | System and method for third party recovery of encryption certificates in a public key infrastructure | |||
8349 | 6931539 | Methods and system for improved searching of biometric data | |||
8350 | 6931537 | Folder type time stamping system and distributed time stamping system | |||
8351 | 6931530 | Secure network file access controller implementing access control and auditing | |||
8352 | 6931528 | Secure handshake protocol | |||
8353 | 6931442 | Networked devices, adapters and methods which identify monitored equipment units | |||
8354 | 6931126 | Non malleable encryption method and apparatus using key-encryption keys and digital signature | |||
8355 | 6928557 | Method and apparatus for ejecting a recording medium from a storage unit detachable from host equipment | |||
8356 | 6928546 | Identity verification method using a central biometric authority | |||
8357 | 6928167 | Method for managing public key | |||
8358 | 6925571 | Method and system of remote monitoring and support of devices, using POP3 and decryption using virtual function | |||
8359 | 6925567 | Remote control of VCR with electronic mail | |||
8360 | 6925564 | Digital signatures on a smartcard | |||
8361 | 6925182 | Administration and utilization of private keys in a networked environment | |||
8362 | 6922782 | Apparatus and method for ensuring data integrity of unauthenticated code | |||
8363 | 6922778 | Transcoding in data communications | |||
8364 | 6922776 | Scalable system and method for management and notification of electronic certificate changes | |||
8365 | 6920563 | System and method to securely store information in a recoverable manner on an untrusted system | |||
8366 | 6920561 | Method and system for enabling free seating using biometrics through a centralized authentication | |||
8367 | 6920559 | Using a key lease in a secondary authentication protocol after a primary authentication protocol has been performed | |||
8368 | 6918042 | Secure configuration of a digital certificate for a printer or other network device | |||
8369 | 6918041 | System and method of network communication with client-forced authentication | |||
8370 | 6918036 | Protected platform identity for digital signing | |||
8371 | 6915433 | Securely extensible component meta-data | |||
8372 | 6915423 | Method of providing time stamping service for setting client's system clock | |||
8373 | 6912659 | Methods and device for digitally signing data | |||
8374 | 6912657 | Method and arrangement in a communication network | |||
8375 | 6910133 | Reflected interrupt for hardware-based encryption | |||
8376 | 6910131 | Personal authentication system and portable unit and storage medium used therefor | |||
8377 | 6910130 | System for and method of unconditionally secure digital signature | |||
8378 | 6907399 | Secure user certification for electronic commerce employing value metering system | |||
8379 | 6904528 | Illegitimate duplication preventing method, data processing apparatus and medical imaging apparatus | |||
8380 | 6904527 | Intellectual property protection in a programmable logic device | |||
8381 | 6904524 | Method and apparatus for providing human readable signature with digital signature | |||
8382 | 6904521 | Non-repudiation of e-mail messages | |||
8383 | 6904520 | Method and system for ensuring the securing of computer servers of games | |||
8384 | 6904435 | Method and system for secure electronic distribution, archiving and retrieval | |||
8385 | 6904416 | Signature verification using a third party authenticator via a paperless electronic document platform | |||
8386 | 6901513 | Process for generating a digital signature and process for checking the signature | |||
8387 | 6901509 | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data | |||
8388 | 6898713 | Residue transfer for encrypted messages split across multiple data segments | |||
8389 | 6898711 | User authentication system and method for multiple process applications | |||
8390 | 6898710 | System and method for secure legacy enclaves in a public key infrastructure | |||
8391 | 6898709 | Personal computer system and methods for proving dates in digital data files | |||
8392 | 6898707 | Integrating a digital signature service into a database | |||
8393 | 6898581 | Secure user certification for electronic commerce employing value metering system | |||
8394 | 6898579 | System, method and article of manufacture for contract term certification utilizing a network | |||
8395 | 6898284 | Cryptographic identification and digital signature method using efficient elliptic curve | |||
8396 | 6895514 | Method and apparatus for achieving secure password access | |||
8397 | 6895509 | Tamper detection system for securing data | |||
8398 | 6895507 | Method and system for determining and maintaining trust in digital data files with certifiable time | |||
8399 | 6892308 | Internet protocol telephony security architecture | |||
8400 | 6892305 | Method and system for booting up a computer system in a secure fashion | |||
8401 | 6892288 | System for making automatic backup copies of computer files when a personal computer is switched off | |||
8402 | 6889324 | Digital measurement apparatus and image measurement apparatus | |||
8403 | 6889322 | Identification protocols | |||
8404 | 6886095 | Method and apparatus for efficiently initializing secure communications among wireless devices | |||
8405 | 6883095 | System and method for password throttling | |||
8406 | 6880083 | Method and apparatus for creating and executing secure scripts | |||
8407 | 6880080 | Method to provide authorization from a certifying authority to a service provider using a certificate | |||
8408 | 6880079 | Methods and systems for secure transmission of information using a mobile device | |||
8409 | 6877093 | System and method for secure provisioning and configuration of a transaction processing device | |||
8410 | 6874087 | Integrity checking an executable module and associated protected service provider module | |||
8411 | 6871286 | Method and apparatus for resetting passwords in a computer system | |||
8412 | 6871278 | Secure transactions with passive storage media | |||
8413 | 6871276 | Controlled-content recoverable blinded certificates | |||
8414 | 6871150 | Expandable intelligent electronic device | |||
8415 | 6868499 | Method and apparatus for password re-entry | |||
8416 | 6865678 | Personal date/time notary device | |||
8417 | 6862686 | Method and apparatus in a data processing system for the separation of role-based permissions specification from its corresponding implementation of its semantic behavior | |||
8418 | 6862638 | RSM-resident program initiation sequence | |||
8419 | 6859794 | Image processing system, image processing apparatus, image processing method, and storage medium | |||
8420 | 6854057 | Digital certificate proxy | |||
8421 | 6854056 | Method and system for coupling an X.509 digital certificate with a host identity | |||
8422 | 6851052 | Method and device for generating approximate message authentication codes | |||
8423 | 6848048 | Method and apparatus for providing verifiable digital signatures | |||
8424 | 6847951 | Method for certifying public keys used to sign postal indicia and indicia so signed | |||
8425 | 6847719 | Limiting receiver access to secure read-only communications over a network by preventing access to source-formatted plaintext | |||
8426 | 6845449 | System and method for fast nested message authentication codes and error correction codes | |||
8427 | 6845447 | Electronic voting method and system and recording medium having recorded thereon a program for implementing the method | |||
8428 | 6842863 | Certificate reissuance for checking the status of a certificate in financial transactions | |||
8429 | 6842860 | System and method for selectively authenticating data | |||
8430 | 6842859 | Authentication system, authentication device, authentication data producing device, and authentication method | |||
8431 | 6842741 | Recording medium with electronic ticket definitions recorded thereon and electronic ticket processing methods and apparatuses | |||
8432 | 6842628 | Method and system for event notification for wireless PDA devices | |||
8433 | 6842523 | Encryption apparatus, cryptographic communication system, key recovery system, and storage medium | |||
8434 | 6842106 | Challenged-based tag authentication model | |||
8435 | 6839848 | Information processing system and peripheral apparatus | |||
8436 | 6839843 | System for electronic repository of data enforcing access control on data retrieval | |||
8437 | 6839437 | Method and apparatus for managing keys for cryptographic operations | |||
2004 | |||||
8438 | 6836846 | Method and apparatus for controlling e-mail access | |||
8439 | 6836845 | Method and apparatus for generating queries for secure authentication and authorization of transactions | |||
8440 | 6834347 | Target self-security for upgrades for an embedded device | |||
8441 | 6834112 | Secure distribution of private keys to multiple clients | |||
8442 | 6832349 | Remote activation of enhanced functionality features in locally created documents | |||
8443 | 6832316 | Systems and methods for protecting data secrecy and integrity | |||
8444 | 6829367 | Content data judging apparatus | |||
8445 | 6829355 | Device for and method of one-way cryptographic hashing | |||
8446 | 6826695 | Method and system for grouping of systems in heterogeneous computer network | |||
8447 | 6826690 | Using device certificates for automated authentication of communicating devices | |||
8448 | 6826687 | Commitments in signatures | |||
8449 | 6826686 | Method and apparatus for secure password transmission and password changes | |||
8450 | 6826685 | Method and system for the digital certificate generation and distribution | |||
8451 | 6823458 | Apparatus and method for securing resources shared by multiple operating systems | |||
8452 | 6823456 | System and method for providing trusted services via trusted server agents | |||
8453 | 6820202 | Account authority digital signature (AADS) system | |||
8454 | 6820201 | System and method using information-based indicia for securing and authenticating transactions | |||
8455 | 6820199 | Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | |||
8456 | 6816970 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
8457 | 6816969 | Digital signature generating method and digital signature verifying method | |||
8458 | 6813716 | Secure calling card and authentication process | |||
8459 | 6813712 | Viral replication detection using a counter virus | |||
8460 | 6813571 | Apparatus and method for seamlessly upgrading the firmware of an intelligent electronic device | |||
8461 | 6813354 | Mixing in small batches | |||
8462 | 6810123 | Rolling code security system | |||
8463 | 6807633 | Digital signature system | |||
8464 | 6802010 | Multiple user computer system and method for remote control thereof | |||
8465 | 6802002 | Method and apparatus for providing field confidentiality in digital certificates | |||
8466 | 6801999 | Passive and active software objects containing bore resistant watermarking | |||
8467 | 6801935 | Secure printing using electronic mailbox | |||
8468 | 6799272 | Remote device authentication system | |||
8469 | 6798190 | Compact intelligent electronic device incorporating transformers | |||
8470 | 6795919 | Unique digital signature | |||
8471 | 6795861 | Dynamic controlling method for field authority and system thereof | |||
8472 | 6795404 | Device for aggregating, translating, and disseminating communications within a multiple device environment | |||
8473 | 6792545 | Enterprise computer investigation system | |||
8474 | 6792536 | Smart card system and methods for proving dates in digital files | |||
8475 | 6792530 | Implicit certificate scheme | |||
8476 | 6792425 | Secure multi database system including a client, multi database server, and database server | |||
8477 | 6789200 | Method of automatically instituting secure, safe libraries and functions when exposing a system to potential system attacks | |||
8478 | 6782476 | Data processing apparatus and authentication method applied to the apparatus | |||
8479 | 6782349 | Method and system for updating a root of trust measurement function in a personal computer | |||
8480 | 6778667 | Method and apparatus for integrated ciphering and hashing | |||
8481 | 6775777 | Secure system using images of only part of a body as the key where the part has continuously-changing features | |||
8482 | 6775770 | Platform and method for securing data provided through a user input device | |||
8483 | 6772350 | System and method for controlling access to resources in a distributed environment | |||
8484 | 6772342 | Document or message security arrangements using a numerical hash function | |||
8485 | 6772331 | Method and apparatus for exclusively pairing wireless devices | |||
8486 | 6771386 | Image forming system | |||
8487 | 6769118 | Dynamic, policy based management of administrative procedures within a distributed computing environment | |||
8488 | 6766450 | Certificate revocation system | |||
8489 | 6763467 | Network traffic intercepting method and system | |||
8490 | 6763459 | Lightweight public key infrastructure employing disposable certificates | |||
8491 | 6760842 | Finite state automata security system | |||
8492 | 6757827 | Autonomously secured image data | |||
8493 | 6757825 | Secure mutual network authentication protocol | |||
8494 | 6754824 | Modulated message authentication system and method | |||
8495 | 6751733 | Remote authentication system | |||
8496 | 6751730 | Method and apparatus for documenting cap removal data | |||
8497 | 6751318 | Method and apparatus for digital signature authentication | |||
8498 | 6748540 | Method and apparatus for detection and notification of unauthorized access attempts in a distributed data processing system | |||
8499 | 6748539 | System and method for securely checking in and checking out digitized content | |||
8500 | 6748534 | System and method for partitioned distributed scanning of a large dataset for viruses and other malware | |||
8501 | 6748530 | Certification apparatus and method | |||
8502 | 6747546 | Data communication transponder and communications system employing it | |||
8503 | 6745327 | Electronic certificate signature program | |||
8504 | 6745138 | Intelligent electronic device with assured data storage on powerdown | |||
8505 | 6742119 | Time stamping method using time delta in key certificate | |||
8506 | 6741852 | Method and device to authenticate subscribers in a mobile radiotelephone systems | |||
8507 | 6738912 | Method for securing data relating to users of a public-key infrastructure | |||
8508 | 6738899 | Method for publishing certification information certified by a plurality of authorities and apparatus and portable data storage media used to practice said method | |||
8509 | 6732270 | Method to authenticate a network access server to an authentication server | |||
8510 | 6728880 | Secure time on computers with insecure clocks | |||
8511 | 6728378 | Secret key messaging | |||
8512 | 6725373 | Method and apparatus for verifying the integrity of digital objects using signed manifests | |||
8513 | 6725370 | Sharing data safely using service replication | |||
8514 | 6721891 | Method of distributing piracy protected computer software | |||
8515 | 6721886 | Preventing unauthorized use of service | |||
8516 | 6720985 | Method and system for object selection | |||
8517 | 6718470 | System and method for granting security privilege in a communication system | |||
8518 | 6718468 | Method for associating a password with a secured public/private key pair | |||
8519 | 6718314 | Multi-purpose transaction card system | |||
8520 | 6715085 | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | |||
8521 | 6715083 | Method and system of alerting internet service providers that a hacker may be using their system to gain access to a target system | |||
8522 | 6715079 | Method and system for soft modem protection | |||
8523 | 6711680 | Method of limiting key usage in a postage metering system that produces cryptographically secured indicium | |||
8524 | 6711679 | Public key infrastructure delegation | |||
8525 | 6711677 | Secure printing method | |||
8526 | 6711263 | Secure distribution and protection of encryption key information | |||
8527 | 6708049 | Sensor with signature of data relating to sensor | |||
8528 | 6704870 | Digital signatures on a Smartcard | |||
8529 | 6704868 | Method for associating a pass phase with a secured public/private key pair | |||
8530 | 6704867 | Method for publishing certification information representative of selectable subsets of rights and apparatus and portable data storage media used to practice said method | |||
8531 | 6704715 | Method and system for ensuring the security of the remote supply of services of financial institutions | |||
8532 | 6701434 | Efficient hybrid public key signature scheme | |||
8533 | 6697947 | Biometric based multi-party authentication | |||
8534 | 6697946 | Message recovery signature apparatus | |||
8535 | 6694414 | Magnetic disc device having copy protect function | |||
8536 | 6690796 | Rolling code security system | |||
8537 | 6690794 | Electronic ticket system | |||
8538 | 6687835 | Command authorization method | |||
8539 | 6681214 | Secure system for printing authenticating digital signatures | |||
8540 | 6679420 | Business card as electronic mail token | |||
8541 | 6678665 | Computer system for protecting software and a method for protecting software | |||
8542 | 6677888 | Secure aircraft communications addressing and reporting system (ACARS) | |||
8543 | 6676023 | Method and system for checking an original recorded information | |||
8544 | 6675296 | Information certificate format converter apparatus and method | |||
2003 | |||||
8545 | 6671803 | Method and system for consumer electronic device certificate management | |||
8546 | 6671759 | Apparatus and method for mapping IEEE 1394 node IDS to unchanging node unique IDS to maintain continuity across bus resets | |||
8547 | 6654889 | Method and apparatus for protecting proprietary configuration data for programmable logic devices | |||
8548 | 6654883 | Device authentication and encrypted communication system offering increased security | |||
8549 | 6651169 | Protection of software using a challenge-response protocol embedded in the software | |||
8550 | 6651166 | Sender driven certification enrollment system | |||
8551 | 6647493 | Method and system for authentication and electronic signature | |||
8552 | 6640303 | System and method for encryption using transparent keys | |||
8553 | 6640294 | Data integrity check method using cumulative hash function | |||
8554 | 6636969 | Digital signatures having revokable anonymity and improved traceability | |||
8555 | 6633979 | Methods and arrangements for secure linking of entity authentication and ciphering key generation | |||
8556 | 6622247 | Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority | |||
8557 | 6620047 | Electronic gaming apparatus having authentication data sets | |||
8558 | 6615352 | Device and method for authenticating user's access rights to resources | |||
8559 | 6615347 | Digital certificate cross-referencing | |||
8560 | 6611913 | Escrowed key distribution for over-the-air service provisioning in wireless communication networks | |||
8561 | 6609197 | Method and system for secure emergency access to network devices | |||
8562 | 6601172 | Transmitting revisions with digital signatures | |||
8563 | 6594362 | Radio data transmission apparatus | |||
8564 | 6591273 | Method and system for secure electronic distribution, archiving and retrieval | |||
8565 | 6591249 | Touch scan internet credit card verification purchase process | |||
8566 | 6587945 | Transmitting reviews with digital signatures | |||
8567 | 6587880 | Session management system and management method | |||
8568 | 6584565 | Method and apparatus for long term verification of digital signatures | |||
8569 | 6584454 | Method and apparatus for community management in remote system servicing | |||
8570 | 6581044 | Method and apparatus for encoding license parameters within a license number for authentication purposes | |||
8571 | 6578144 | Secure hash-and-sign signatures | |||
8572 | 6574733 | Centralized secure backup system and method | |||
8573 | 6574730 | User authentication in a communications network | |||
8574 | 6571344 | Method and apparatus for authenticating time-sensitive interactive communications | |||
8575 | 6571334 | Apparatus and method for authenticating the dispatch and contents of documents | |||
8576 | 6570988 | Simple technique for implementing a cryptographic primitive using elementary register operations | |||
8577 | 6567916 | Method and device for authentication | |||
8578 | 6567793 | Remote authorization for unlocking electronic data system and method | |||
8579 | 6567530 | Device and method for authenticating and certifying printed documents | |||
8580 | 6563928 | Strengthened public key protocol | |||
8581 | 6556680 | Method for authorization check | |||
8582 | 6553494 | Method and apparatus for applying and verifying a biometric-based digital signature to an electronic document | |||
8583 | 6553493 | Secure mapping and aliasing of private keys used in public key cryptography | |||
8584 | 6542610 | Content protection for digital transmission systems | |||
8585 | 6542607 | Device and method for the cryptographic processing of a digital data stream presenting any number of data | |||
8586 | 6539479 | System and method for securely logging onto a remotely located computer | |||
8587 | 6535980 | Keyless encryption of messages using challenge response | |||
8588 | 6535978 | Digital signature providing non-repudiation based on biological indicia | |||
8589 | 6532541 | Method and apparatus for image authentication | |||
8590 | 6532540 | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data | |||
8591 | 6532290 | Authentication methods | |||
8592 | 6532194 | Method and apparatus for providing certified time | |||
8593 | 6530023 | Method and device that validates time of an internal source using an external source | |||
8594 | 6530020 | Group oriented public key encryption and key management system | |||
8595 | 6529886 | Authenticating method for an access and/or payment control system | |||
8596 | 6529487 | Method and apparatus for securely transmitting distributed RAND for use in mobile station authentication | |||
8597 | 6526509 | Method for interchange of cryptographic codes between a first computer unit and a second computer unit | |||
8598 | 6523115 | ENCRYPTION DEVICE, DECRYPTION DEVICE, ENCRYPTION METHOD, DECRYPTION METHOD, CRYPTOGRAPHY SYSTEM, COMPUTER-READABLE RECORDING MEDIUM STORING ENCRYPTION PROGRAM, AND COMPUTER-READABLE RECORDING MEDIUM STORING DECRYPTION PROGRAM WHICH PERFORM ERROR DIAGNOSIS | |||
8599 | 6523114 | Method and apparatus for embedding authentication information within digital data | |||
8600 | 6522767 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
8601 | 6516415 | Device and method of maintaining a secret code within an integrated circuit package | |||
8602 | 6516413 | Apparatus and method for user authentication | |||
8603 | 6510514 | Device for reliability creating electronic signatures | |||
8604 | 6510513 | Security services and policy enforcement for electronic data | |||
8605 | 6507912 | Protection of biometric data via key-dependent sampling | |||
8606 | 6507907 | Protecting information in a system | |||
8607 | 6507656 | Non malleable encryption apparatus and method | |||
8608 | 6505302 | Authentication for secure devices with limited cryptography | |||
8609 | 6505301 | Authentication for secure devices with limited cryptography | |||
8610 | 6504932 | Method of transferring information between a subscriber identification module and a radiocommunication mobile terminal, and a corresponding subscriber identification module and mobile terminal | |||
8611 | 6502861 | Seat belt guide | |||
2002 | |||||
8612 | 6499104 | Digital signature method | |||
8613 | 6499019 | Electronic payment device using unbalanced binary tree and the method of the same | |||
8614 | 6498837 | Method and apparatus capable of performing information providing operation with information security measures | |||
8615 | 6493823 | Instrument for making secure data exchanges | |||
8616 | 6490682 | Log-on verification protocol | |||
8617 | 6490680 | Access control and authorization system | |||
8618 | 6490358 | Enabling business transactions in computer networks | |||
8619 | 6487659 | Device and method for conditional authentication | |||
8620 | 6487658 | Efficient certificate revocation | |||
8621 | 6483918 | Technique for producing a parameter, such as a checksum, through a primitive that uses elementary register operations | |||
8622 | 6480957 | Method and system for secure lightweight transactions in wireless data networks | |||
8623 | 6473742 | Reception apparatus for authenticated access to coded broadcast signals | |||
8624 | 6473508 | Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys | |||
8625 | 6470449 | Time-stamped tamper-proof data storage | |||
8626 | 6470448 | Apparatus and method for proving transaction between users in network environment | |||
8627 | 6456716 | Apparatus and method for establishing a crytographic link between elements of a system | |||
8628 | 6453417 | Microcontroller with secure signature extraction | |||
8629 | 6453416 | Secure proxy signing device and method of use | |||
8630 | 6449473 | Security method for transmissions in telecommunication networks | |||
8631 | 6446207 | Verification protocol | |||
8632 | 6446051 | Document transfer systems | |||
8633 | 6445780 | Method and system for ensuring the security of telephone call management centers | |||
8634 | 6445281 | Dynamically controlled electronic locking system and control system fitted with such a locking system | |||
8635 | 6442691 | Authenticated time device | |||
8636 | 6442689 | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data | |||
8637 | 6442688 | Method and apparatus for obtaining status of public key certificate updates | |||
8638 | 6442532 | Wireless transaction and information system | |||
8639 | 6438691 | Transmitting messages over a network | |||
8640 | 6434561 | Method and system for accessing electronic resources via machine-readable data on intelligent documents | |||
8641 | 6434238 | Multi-purpose transaction card system | |||
8642 | 6430690 | Secure one-way authentication communication system | |||
8643 | 6425081 | Electronic watermark system electronic information distribution system and image filing apparatus | |||
8644 | 6424718 | Data communications system using public key cryptography in a web environment | |||
8645 | 6424712 | Accelerated signature verification on an elliptic curve | |||
8646 | 6421779 | Electronic data storage apparatus, system and method | |||
8647 | 6411716 | Method of changing key fragments in a multi-step digital signature system | |||
8648 | 6411715 | Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key | |||
8649 | 6408389 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
8650 | 6408388 | Personal date/time notary device | |||
8651 | 6405923 | Method for secure distribution of data | |||
8652 | 6405314 | Secure system using images of only part of a body as the key where the part has continuously-changing features | |||
8653 | 6405313 | Method for providing authentication assurance in a key-binding system | |||
8654 | 6401206 | Method and apparatus for binding electronic impressions made by digital identities to documents | |||
8655 | 6401203 | Method for automatic handling of certificate and key-based processes | |||
8656 | 6397329 | Method for efficiently revoking digital identities | |||
8657 | 6396928 | Digital message encryption and authentication | |||
8658 | 6393566 | Time-stamp service for the national information network | |||
8659 | 6385318 | Encrypting method, deciphering method and certifying method | |||
8660 | 6381699 | Leak-resistant cryptographic method and apparatus | |||
8661 | 6381696 | Method and system for transient key digital time stamps | |||
8662 | 6381695 | Encryption system with time-dependent decryption | |||
8663 | 6377692 | Method and system for controlling key for electronic signature | |||
8664 | 6377670 | Method and system for ensuring the security of the supply of services of telecommunication operators | |||
8665 | 6370250 | Method of authentication and storage of private keys in a public key cryptography system (PKCS) | |||
8666 | 6370249 | Method and apparatus for public key management | |||
8667 | 6370247 | Hash value generating method and device, data encryption method and device, data decryption method and device | |||
8668 | 6370209 | Process for sensing manipulations of digital information | |||
8669 | 6367014 | Enhanced short message and method for synchronizing and ensuring security of enhanced short messages exchanged in a cellular radio communication system | |||
8670 | 6367013 | System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents | |||
8671 | 6366570 | Processing CDMA signals | |||
8672 | 6363485 | Multi-factor biometric authenticating device and method | |||
8673 | 6357006 | Digital signaturing method and system for re-creating specialized native files from single wrapped files imported from an open network or residing on a CD-ROM | |||
8674 | 6353889 | Portable device and method for accessing data key actuated devices | |||
8675 | 6353888 | Access rights authentication apparatus | |||
8676 | 6347373 | Method and device for the protected storage of data from message traffic | |||
8677 | 6341349 | Digital signature generating/verifying method and system using public key encryption | |||
8678 | 6339828 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
2001 | |||||
8679 | 6332193 | Method and apparatus for securely transmitting and authenticating biometric data over a network | |||
8680 | 6330674 | Use of biometrics as a methodology for defining components for ECC encryption | |||
8681 | 6330673 | Determination of a best offset to detect an embedded pattern | |||
8682 | 6327656 | Apparatus and method for electronic document certification and verification | |||
8683 | 6324645 | Risk management for public key management infrastructure using digital certificates | |||
8684 | 6323752 | Electronic instrument having resettable security code and method for resetting security code | |||
8685 | 6321333 | Efficient digital certificate processing in a data processing system | |||
8686 | 6321094 | Access method through radio mobile communication system | |||
8687 | 6320966 | Cryptographic methods for demonstrating satisfiable formulas from propositional logic | |||
8688 | 6317834 | Biometric authentication system with encrypted models | |||
8689 | 6317829 | Public key cryptography based security system to facilitate secure roaming of users | |||
8690 | 6314521 | Secure configuration of a digital certificate for a printer or other network device | |||
8691 | 6314517 | Method and system for notarizing digital signature data in a system employing cryptography based security | |||
8692 | 6311271 | How to sign digital streams | |||
8693 | 6311171 | Symmetrically-secured electronic communication system | |||
8694 | 6308277 | Virtual certificate authority | |||
8695 | 6307935 | Method and apparatus for fast elliptic encryption with direct embedding | |||
8696 | 6304974 | Method and apparatus for managing trusted certificates | |||
8697 | 6304658 | Leak-resistant cryptographic method and apparatus | |||
8698 | 6301664 | Method and system for non-malleable and non-interactive cryptographic commitment in a network | |||
8699 | 6301661 | Enhanced security for applications employing downloadable executable content | |||
8700 | 6301659 | Tree-based certificate revocation system | |||
8701 | 6297891 | Method & system for electronic document certification | |||
8702 | 6292897 | Undeniable certificates for digital signature verification | |||
8703 | 6292896 | Method and apparatus for entity authentication and session key generation | |||
8704 | 6292893 | Certificate revocation system | |||
8705 | 6292892 | Apparatus and method for providing secured communications | |||
8706 | 6289460 | Document management system | |||
8707 | 6289453 | Method and apparatus for secure measurement certification | |||
8708 | 6289451 | System and method for efficiently implementing an authenticated communications channel that facilitates tamper detection | |||
8709 | 6285873 | Method for generating a broadcast challenge value | |||
8710 | 6285760 | Method and apparatus for digital signature authentication | |||
8711 | 6282648 | Method and apparatus for secure measurement certification | |||
8712 | 6279110 | Masked digital signatures | |||
8713 | 6269446 | Authenticating images from digital cameras | |||
8714 | 6269445 | Electronic shopping method, electronic shopping system and document authenticating method relating thereto | |||
8715 | 6266771 | Probabilistic signature scheme | |||
8716 | 6266680 | Method for electronically checking authenticity of document | |||
8717 | 6263446 | Method and apparatus for secure distribution of authentication credentials to roaming users | |||
8718 | 6263438 | Method and apparatus for secure document timestamping | |||
8719 | 6263436 | Method and apparatus for simultaneous electronic exchange using a semi-trusted third party | |||
8720 | 6263434 | Signed group criteria | |||
8721 | 6263081 | Elliptic curve calculation apparatus capable of calculating multiples at high speed | |||
8722 | 6260145 | System and method of authentication of digital information | |||
8723 | 6259790 | Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion | |||
8724 | 6259789 | Computer implemented secret object key block cipher encryption and digital signature device and method | |||
8725 | 6253323 | Object-based digital signatures | |||
8726 | 6253322 | Electronic certification authentication method and system | |||
8727 | 6249871 | System and method for using a second resource to store a data element from a first resource in a first-in last-out stack | |||
8728 | 6249867 | Method for transferring sensitive information using initially unsecured communication | |||
8729 | 6243812 | Authentication for secure devices with limited cryptography | |||
8730 | 6243467 | Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form | |||
8731 | 6237096 | System and method for electronic transmission storage and retrieval of authenticated documents | |||
8732 | 6237095 | Apparatus for transfer of secure information between a data carrying module and an electronic device | |||
8733 | 6233341 | System and method for installing and using a temporary certificate at a remote site | |||
8734 | 6230269 | Distributed authentication system and method | |||
8735 | 6230266 | Authentication system and process | |||
8736 | 6226743 | Method for authentication item | |||
8737 | 6226742 | Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message | |||
8738 | 6216014 | Communication system for managing safely and independently a plurality of applications by each user card and corresponding user card and management method | |||
8739 | 6215872 | Method for creating communities of trust in a secure communication system | |||
8740 | 6212638 | Method for generating unpredictable authentication identification symbols | |||
8741 | 6212637 | Method and apparatus for en-bloc verification of plural digital signatures and recording medium with the method recorded thereon | |||
8742 | 6212634 | Certifying authorization in computer networks | |||
8743 | 6212281 | Digital signature protocol | |||
8744 | 6209093 | Technique for producing a privately authenticatable product copy indicia and for authenticating such an indicia | |||
8745 | 6209091 | Multi-step digital signature method and system | |||
8746 | 6209090 | Method and apparatus for providing secure time stamps for documents and computer files | |||
8747 | 6201871 | Secure processing for authentication of a wireless communications device | |||
8748 | 6199161 | Management of authentication keys in a mobile communication system | |||
8749 | 6199053 | Digital signature purpose encoding | |||
8750 | 6198824 | System for providing secure remote command execution network | |||
8751 | 6192474 | Method for establishing a key using over-the-air communication and password protocol and password protocol | |||
8752 | 6192130 | Information security subscriber trust authority transfer system with private key history transfer | |||
8753 | 6189098 | Client/server protocol for proving authenticity | |||
8754 | 6189097 | Digital Certificate | |||
8755 | 6189096 | User authentification using a virtual private key | |||
8756 | 6185685 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | |||
8757 | 6185682 | Authentication system | |||
8758 | 6185546 | Apparatus and method for providing secured communications | |||
8759 | 6185316 | Self-authentication apparatus and method | |||
8760 | 6182219 | Apparatus and method for authenticating the dispatch and contents of documents | |||
8761 | 6182217 | Electronic data-processing device and system | |||
8762 | 6182215 | Information devices which select and use one out of plurality of encryption utilization protocols for protecting copyrights of digital productions | |||
8763 | 6175923 | Secure system using images of only part of a body as the key where the part has continuously-changing features | |||
8764 | 6175626 | Digital certificates containing multimedia data extensions | |||
8765 | 6173400 | Methods and systems for establishing a shared secret using an authentication token | |||
8766 | 6170058 | Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use | |||
2000 | |||||
8767 | 6167518 | Digital signature providing non-repudiation based on biological indicia | |||
8768 | 6167516 | Data file authentication device | |||
8769 | 6163842 | Method and apparatus for embedding authentication information within digital data | |||
8770 | 6163841 | Technique for producing privately authenticatable cryptographic signatures and for authenticating such signatures | |||
8771 | 6161183 | Data verifying method apparatus for creating data to be verified and data verifying apparatus | |||
8772 | 6161181 | Secure electronic transactions using a trusted intermediary | |||
8773 | 6161180 | Authentication for secure devices with limited cryptography | |||
8774 | 6158005 | Cloning protection scheme for a digital information playback device | |||
8775 | 6158003 | Method and system for electronic document certification | |||
8776 | 6154841 | Digital signature method and communication system | |||
8777 | 6154544 | Rolling code security system | |||
8778 | 6152367 | Wired logic microcircuit and authentication method having protection against fraudulent detection of a user secret code during authentication | |||
8779 | 6149522 | Method of authenticating game data sets in an electronic casino gaming system | |||
8780 | 6148405 | Method and system for secure lightweight transactions in wireless data networks | |||
8781 | 6148404 | Authentication system using authentication information valid one-time | |||
8782 | 6148400 | Apparatus and method for establishing a crytographic link between elements of a system | |||
8783 | 6148084 | Restrictedly blindable certificates on secret keys | |||
8784 | 6141750 | Simultaneous electronic transactions with subscriber verification | |||
8785 | 6141421 | Method and apparatus for generating hash value | |||
8786 | 6137884 | Simultaneous electronic transactions with visible trusted parties | |||
8787 | 6134550 | Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths | |||
8788 | 6134431 | Personal station authentication system and authentication method | |||
8789 | 6134328 | Secure user certification for electronic commerce employing value metering system | |||
8790 | 6134327 | Method and apparatus for creating communities of trust in a secure communication system | |||
8791 | 6134326 | Simultaneous electronic transactions | |||
8792 | 6130623 | Encryption for modulated backscatter systems | |||
8793 | 6128740 | Computer security system and method with on demand publishing of certificate revocation lists | |||
8794 | 6128737 | Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key | |||
8795 | 6125445 | Public key identification process using two hash functions | |||
8796 | 6125185 | System and method for encryption key generation | |||
8797 | 6122736 | Key agreement and transport protocol with implicit signatures | |||
8798 | 6122375 | Hash value generating method and device, data encryption method and device, data decryption method and device | |||
8799 | 6122372 | System and method for encapsulating transaction messages with verifiable data generated identifiers | |||
8800 | 6119227 | Methods and apparatus for authenticating an originator of a message | |||
8801 | 6115818 | Method and apparatus for embedding authentication information within digital data | |||
8802 | 6115472 | Contents transmission control method with user authentication functions and recording medium with the method recorded thereon | |||
8803 | 6111956 | Method for secure key distribution over a nonsecure communications network | |||
8804 | 6111953 | Method and apparatus for authenticating a document | |||
8805 | 6111952 | Asymmetrical cryptographic communication method and portable object therefore | |||
8806 | 6108788 | Certificate management system and method for a communication security system | |||
8807 | 6108783 | Chameleon hashing and signatures | |||
8808 | 6108656 | Automatic access of electronic information through machine-readable codes on printed documents | |||
8809 | 6108425 | Method and apparatus for controlling the configuration of a cryptographic processor | |||
8810 | 6106396 | Electronic casino gaming system with improved play capacity, authentication and security | |||
8811 | 6105133 | Bilateral authentication and encryption system | |||
8812 | 6101605 | Method and apparatus for performing a secure operation | |||
8813 | 6101604 | Method and apparatus for embedding authentication information within digital data | |||
8814 | 6101603 | System and method for using a second resource to store a data element from a first resource in a first-in last-out stack | |||
8815 | 6101254 | Security method for making secure an authentication method that uses a secret key algorithm | |||
8816 | 6097813 | Digital signature protocol with reduced bandwidth | |||
8817 | 6097811 | Tree-based certificate revocation system | |||
8818 | 6094487 | Apparatus and method for encryption key generation | |||
8819 | 6092201 | Method and apparatus for extending secure communication operations via a shared list | |||
8820 | 6092193 | Authentication of accumulated instrument data | |||
8821 | 6092192 | Apparatus and methods for providing repetitive enrollment in a plurality of biometric recognition systems based on an initial enrollment | |||
8822 | 6092191 | Packet authentication and packet encryption/decryption scheme for security gateway | |||
8823 | 6091821 | Pipelined hardware implementation of a hashing algorithm | |||
8824 | 6091816 | Integrated audio recording and GPS system | |||
8825 | 6088798 | Digital signature method using an elliptic curve, a digital signature system, and a program storage medium having the digital signature method stored therein | |||
8826 | 6088454 | Key management method, encryption system, and sharing digital signature system which have hierarchies | |||
8827 | 6085322 | Method and apparatus for establishing the authenticity of an electronic document | |||
8828 | 6085321 | Unique digital signature | |||
8829 | 6085320 | Client/server protocol for proving authenticity | |||
8830 | 6084965 | Identification scheme, digital signature scheme giving message recovery and digital signature scheme with appendix | |||
8831 | 6081899 | Time stamp authority hierarchy protocol and associated validating system | |||
8832 | 6081893 | System for supporting secured log-in of multiple users into a plurality of computers using combined presentation of memorized password and transportable passport record | |||
8833 | 6079018 | System and method for generating unique secure values for digitally signing documents | |||
8834 | 6076163 | Secure user identification based on constrained polynomials | |||
8835 | 6076162 | Certification of cryptographic keys for chipcards | |||
8836 | 6073236 | Authentication method, communication method, and information processing apparatus | |||
8837 | 6073234 | Device for authenticating user's access rights to resources and method | |||
8838 | 6072875 | Method and apparatus for secure identification of a mobile user in a communication network | |||
8839 | 6072874 | Signing method and apparatus using the same | |||
8840 | 6069955 | System for protection of goods against counterfeiting | |||
8841 | 6065117 | Systems, methods and computer program products for sharing state information between a stateless server and a stateful client | |||
8842 | 6061799 | Removable media for password based authentication in a distributed system | |||
8843 | 6061789 | Secure anonymous information exchange in a network | |||
8844 | 6058478 | Apparatus and method for a vetted field upgrade | |||
8845 | 6058476 | Encryption apparatus for ensuring security in communication between devices | |||
8846 | 6058383 | Computationally efficient method for trusted and dynamic digital objects dissemination | |||
8847 | 6055518 | Secure auction systems | |||
8848 | 6055508 | Method for secure accounting and auditing on a communications network | |||
8849 | 6052469 | Interoperable cryptographic key recovery system with verification by comparison | |||
8850 | 6052468 | Method of securing a cryptographic key | |||
8851 | 6052467 | System for ensuring that the blinding of secret-key certificates is restricted, even if the issuing protocol is performed in parallel mode | |||
8852 | 6052365 | Multi-channel digital data transmission in a wireless telecommunications system | |||
8853 | 6049877 | Systems, methods and computer program products for authorizing common gateway interface application requests | |||
8854 | 6049872 | Method for authenticating a channel in large-scale distributed systems | |||
8855 | 6049612 | File encryption method and system | |||
8856 | 6049611 | One-way data conversion apparatus and device authentication system | |||
8857 | 6049610 | Method and apparatus for digital signature authentication | |||
8858 | 6047374 | Method and apparatus for embedding authentication information within digital data | |||
8859 | 6047242 | Computer system for protecting software and a method for protecting software | |||
8860 | 6047072 | Method for secure key distribution over a nonsecure communications network | |||
8861 | 6047066 | Communication method and device | |||
8862 | 6044488 | Process for generating a check word for a bit sequence for verifying the integrity and authenticity of the bit sequence | |||
8863 | 6044463 | Method and system for message delivery utilizing zero knowledge interactive proof protocol | |||
8864 | 6044462 | Method and apparatus for managing key revocation | |||
8865 | 6044350 | Certificate meter with selectable indemnification provisions | |||
8866 | 6041409 | Device and method for data integrity and authentication | |||
8867 | 6039248 | Method for preparing safe electronic notarized documents in electronic commerce | |||
8868 | 6038321 | Data transfer method, communication system and storage medium | |||
8869 | 6038316 | Method and system for protection of digital information | |||
8870 | 6038315 | Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy | |||
8871 | 6035402 | Virtual certificate authority | |||
8872 | 6035398 | Cryptographic key generation using biometric data | |||
8873 | 6035397 | Process for data certification by scrambling and certification system using such a process | |||
8874 | 6034618 | Device authentication system which allows the authentication function to be changed | |||
8875 | 6028938 | Secure electronic forms permitting layout revision | |||
8876 | 6028937 | Communication device which performs two-way encryption authentication in challenge response format | |||
8877 | 6023689 | Method for secure communication in a telecommunications system | |||
8878 | 6023509 | Digital signature purpose encoding | |||
8879 | 6021201 | Method and apparatus for integrated ciphering and hashing | |||
8880 | 6011848 | Method and system for message delivery utilizing zero knowledge interactive proof protocol | |||
1999 | |||||
8881 | 6009177 | Enhanced cryptographic system and method with key escrow feature | |||
8882 | 6009176 | How to sign digital streams | |||
8883 | 6005487 | Electronic security system with novel electronic T-handle lock | |||
8884 | 6002768 | Distributed registration and key distribution system and method | |||
8885 | 5999628 | Method and apparatus for improved digital message transaction model | |||
8886 | 5999626 | Digital signatures on a smartcard | |||
8887 | 5995624 | Bilateral authentication and information encryption token system and method | |||
8888 | 5991408 | Identification and security using biometric measurements | |||
8889 | 5991407 | Subscriber authentication in a mobile communications system | |||
8890 | 5991406 | System and method for data recovery | |||
8891 | 5991404 | System for diversifying information in a network for distributing goods or services | |||
8892 | 5991401 | Method and system for checking security of data received by a computer system within a network environment | |||
8893 | 5987140 | System, method and article of manufacture for secure network electronic payment and credit collection | |||
8894 | 5987138 | Identification and/or signature process | |||
8895 | 5987134 | Device and method for authenticating user's access rights to resources | |||
8896 | 5987133 | Electronic authentication system | |||
8897 | 5982898 | Certification process | |||
8898 | 5982892 | System and method for remote authorization for unlocking electronic data | |||
8899 | 5982506 | Method and system for electronic document certification | |||
8900 | 5978668 | Radio communication apparatus | |||
8901 | 5978482 | Method and system for protection of digital information | |||
8902 | 5974550 | Method for strongly authenticating another process in a different address space | |||
8903 | 5974150 | System and method for authentication of goods | |||
8904 | 5970148 | Low cost encryption transponder | |||
8905 | 5970147 | System and method for configuring and registering a cryptographic device | |||
8906 | 5966446 | Time-bracketing infrastructure implementation | |||
8907 | 5966445 | Identification scheme single or multi-digital signature scheme giving message recovery single or multi-digital signature scheme with appendix key exchange scheme and blind digital signature scheme | |||
8908 | 5963649 | Message authorization system for authorizing message for electronic document | |||
8909 | 5963644 | Process and device for making secure a telephone link connecting two subscriber sets | |||
8910 | 5960083 | Certificate revocation system | |||
8911 | 5956408 | Apparatus and method for secure distribution of data | |||
8912 | 5956405 | Implementation efficient encryption and message authentication | |||
8913 | 5956404 | Digital signature with auditing bits | |||
8914 | 5956403 | System and method for access field verification | |||
8915 | 5953424 | Cryptographic system and protocol for establishing secure authenticated remote access | |||
8916 | 5949879 | Auditable security system for the generation of cryptographically protected digital data | |||
8917 | 5949877 | Content protection for transmission systems | |||
8918 | 5946397 | Method of cryptography with public key based on the discrete logarithm | |||
8919 | 5946396 | System and method for ensuring integrity of audio | |||
8920 | 5943426 | Method and apparatus for relaying digitally signed messages | |||
8921 | 5940509 | Method and apparatus for controlling country specific frequency allocation | |||
8922 | 5940007 | Remote control system for motor vehicle related devices | |||
8923 | 5940002 | Security system with random number remote communication | |||
8924 | 5936541 | Method for securing information relevant to a transaction | |||
8925 | 5936149 | Personal date/time notary device | |||
8926 | 5933829 | Automatic access of electronic information through secure machine-readable codes on printed documents | |||
8927 | 5933504 | Strengthened public key protocol | |||
8928 | 5933503 | Controlled modular cryptography apparatus and method | |||
8929 | 5930704 | Reconfigurable subscriber terminal for a wireless telecommunications system | |||
8930 | 5926551 | System and method for certifying content of hard-copy documents | |||
8931 | 5926550 | Peripheral device preventing post-scan modification | |||
8932 | 5923763 | Method and apparatus for secure document timestamping | |||
8933 | 5923756 | Method for providing secure remote command execution over an insecure computer network | |||
8934 | 5923668 | Apparatus and method of establishing a downlink communication path in a wireless telecommunications system | |||
8935 | 5918160 | Subscriber terminal for a wireless telecommunications system | |||
8936 | 5915216 | Apparatus and method of transmitting and receiving information in a wireless telecommunications system | |||
8937 | 5915024 | Electronic signature addition method, electronic signature verification method, and system and computer program product using these methods | |||
8938 | 5915021 | Method for secure communications in a telecommunications system | |||
8939 | 5913175 | Method of making the use of a terminal of a cellular mobile radio system more secure, and corresponding terminal and user card | |||
8940 | 5912974 | Apparatus and method for authentication of printed documents | |||
8941 | 5912972 | Method and apparatus for embedding authentication information within digital data | |||
8942 | 5910989 | Method for the generation of electronic signatures, in particular for smart cards | |||
8943 | 5907619 | Secure compressed imaging | |||
8944 | 5905976 | System of secured payment by the transfer of electronic money through an interbank network | |||
8945 | 5905963 | Subscriber terminal monitor system for a wireless telecommunications system | |||
8946 | 5905800 | Method and system for digital watermarking | |||
8947 | 5903651 | Apparatus and method for demonstrating and confirming the status of a digital certificates and other data | |||
8948 | 5901227 | Method and apparatus for implementing partial and complete optional key escrow | |||
8949 | 5898782 | Method and system to secure the transmission of data elements between a sensor and a recorder | |||
8950 | 5898779 | Photograhic system with selected area image authentication | |||
8951 | 5896455 | Key agreement and transport protocol with implicit signatures | |||
8952 | 5894519 | Process for the dissimulaton of a secret code in a data authentication device | |||
8953 | 5892829 | Method and apparatus for generating secure hash functions | |||
8954 | 5889868 | Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | |||
8955 | 5889865 | Key agreement and transport protocol with implicit signatures | |||
8956 | 5889862 | Method and apparatus for implementing traceable electronic cash | |||
8957 | 5884272 | Method and system for establishing and maintaining user-controlled anonymous communications | |||
8958 | 5884270 | Method and system for facilitating an employment search incorporating user-controlled anonymous communications | |||
8959 | 5883958 | Method and device for data decryption, a method and device for device identification, a recording medium, a method of disk production, and a method and apparatus for disk recording | |||
8960 | 5883956 | Dynamic configuration of a secure processing unit for operations in various environments | |||
8961 | 5878144 | Digital certificates containing multimedia data extensions | |||
8962 | 5878142 | Pocket encrypting and authenticating communications device | |||
8963 | 5878140 | Limited-traceability systems | |||
8964 | 5875248 | Method of counterfeit detection of electronic data stored on a device | |||
8965 | 5872849 | Enhanced cryptographic system and method with key escrow feature | |||
8966 | 5872848 | Method and apparatus for witnessed authentication of electronic documents | |||
8967 | 5870476 | Process for pledging data for a secure data exchange protocol | |||
8968 | 5870354 | Data recording and reproducing apparatus capable of detecting an input for controlling an output | |||
8969 | 5869821 | Credit inquiry service system and method | |||
8970 | 5867776 | Receiver for receiving text-based multiplex broadcasts | |||
8971 | 5867578 | Adaptive multi-step digital signature system and method of operation thereof | |||
8972 | 5864667 | Method for safe communications | |||
8973 | 5860099 | Stored program system with protected memory and secure signature extraction | |||
8974 | 5857022 | Enhanced cryptographic system and method with key escrow feature | |||
1998 | |||||
8975 | 5850451 | Enhanced cryptographic system and method with key escrow feature | |||
8976 | 5841873 | Methods of detecting decryption errors | |||
8977 | 5841865 | Enhanced cryptographic system and method with key escrow feature | |||
8978 | 5838913 | Control message transmission in telecommunications systems | |||
8979 | 5835726 | System for securing the flow of and selectively modifying packets in a computer network | |||
8980 | 5835596 | International cryptography framework | |||
8981 | 5828751 | Method and apparatus for secure measurement certification | |||
8982 | 5825885 | Bit agitator | |||
8983 | 5825880 | Multi-step digital signature method and system | |||
8984 | 5825877 | Support for portable trusted software | |||
8985 | 5825300 | Method of protected distribution of keying and certificate material | |||
8986 | 5822432 | Method for human-assisted random key generation and application for digital watermark system | |||
8987 | 5822430 | System for encoding encryption/decryption information into IFF challenges | |||
8988 | 5818937 | Telephone tone security device | |||
8989 | 5815798 | Apparatus and method of controlling transmitting power in a subscriber terminal of a wireless telecommunications system | |||
8990 | 5812670 | Traceable anonymous transactions | |||
8991 | 5812669 | Method and system for providing secure EDI over an open network | |||
8992 | 5812667 | Subscriber registration and authentication method | |||
8993 | 5809093 | Apparatus and method of frame aligning information in a wireless telecommunications system | |||
8994 | 5805712 | Apparatus and method for providing secured communications | |||
8995 | 5805703 | Method and apparatus for digital signature authentication | |||
8996 | 5805702 | Method, apparatus, and system for transferring units of value | |||
8997 | 5799088 | Non-deterministic public key encrypton system | |||
8998 | 5799086 | Enhanced cryptographic system and method with key escrow feature | |||
8999 | 5799083 | Event verification system | |||
9000 | 5796841 | Secure user certification for electronic commerce employing value metering system | |||
9001 | 5796840 | Apparatus and method for providing secured communications | |||
9002 | 5796833 | Public key sterilization | |||
9003 | 5796832 | Wireless transaction and information system | |||
9004 | 5796830 | Interoperable cryptographic key recovery system | |||
9005 | 5796827 | System and method for near-field human-body coupling for encrypted communication with identification cards | |||
9006 | 5794139 | Automatic generation of private authentication key for wireless communication systems | |||
9007 | 5793868 | Certificate revocation system | |||
9008 | 5793866 | Communication method and device | |||
9009 | 5793302 | Method for securing information relevant to a transaction | |||
9010 | 5790669 | Lightweight non-repudiation system and method | |||
9011 | 5790667 | Personal authentication method | |||
9012 | 5787178 | Computerized method for signing a message | |||
9013 | 5787175 | Method and apparatus for collaborative document control | |||
9014 | 5787172 | Apparatus and method for establishing a cryptographic link between elements of a system | |||
9015 | 5787154 | Universal authentication device for use over telephone lines | |||
9016 | 5784566 | System and method for negotiating security services and algorithms for communication across a computer network | |||
9017 | 5784464 | System for and method of authenticating a client | |||
9018 | 5781723 | System and method for self-identifying a portable information device to a computing unit | |||
9019 | 5781635 | Method and apparatus for improved digital message transaction model | |||
9020 | 5781631 | Limited-traceability systems | |||
9021 | 5781630 | Method and device for accurately dating an electronic document | |||
9022 | 5781629 | Digital document authentication system | |||
9023 | 5778071 | Pocket encrypting and authenticating communications device | |||
9024 | 5774552 | Method and apparatus for retrieving X.509 certificates from an X.500 directory | |||
9025 | 5771292 | Device and method for data integrity and authentication | |||
9026 | 5771287 | Apparatus and method for secured control of feature set of a programmable device | |||
9027 | 5768389 | Method and system for generation and management of secret key of public key cryptosystem | |||
9028 | 5767784 | Initialization method for keyless entry system | |||
9029 | 5761309 | Authentication system | |||
9030 | 5761305 | Key agreement and transport protocol with implicit signatures | |||
9031 | 5757919 | Cryptographically protected paging subsystem | |||
9032 | 5757917 | Computerized payment system for purchasing goods and services on the internet | |||
9033 | 5757913 | Method and apparatus for data authentication in a data communication environment | |||
9034 | 5754659 | Generation of cryptographic signatures using hash keys | |||
9035 | 5754656 | Electronic shopping method, electronic shopping system and document authenticating method relating thereto | |||
9036 | 5751809 | Apparatus and method for securing captured data transmitted between two sources | |||
9037 | 5748782 | Device for implementing a message signature system and chip card comprising such a device | |||
9038 | 5748739 | Access control for sensitive functions | |||
9039 | 5748738 | System and method for electronic transmission, storage and retrieval of authenticated documents | |||
9040 | 5745574 | Security infrastructure for electronic transactions | |||
9041 | 5745573 | System and method for controlling access to a user secret | |||
9042 | 5745496 | Apparatus and method of establishing a downlink communication path in a wireless telecommunications system | |||
9043 | 5745044 | Electronic security system | |||
9044 | 5742685 | Method for verifying an identification card and recording verification of same | |||
9045 | 5742595 | Processing CDMA signals | |||
9046 | 5737419 | Computer system for securing communications using split private key asymmetric cryptography | |||
9047 | 5733047 | Enciphering system applicable to various keyless entry systems | |||
9048 | 5729608 | Method and system for providing secure key distribution in a communication system | |||
9049 | 5729537 | Method and apparatus for providing anonymous data transfer in a communication system | |||
9050 | 5721779 | Apparatus and methods for verifying the identity of a party | |||
9051 | 5719940 | Method for providing information security by exchanging authentication and signing an electronic signature and apparatus therefor | |||
9052 | 5717759 | Method for certifying public keys in a digital signature scheme | |||
9053 | 5717758 | Witness-based certificate revocation system | |||
9054 | 5717757 | Certificate issue lists | |||
9055 | 5715390 | Method and apparatus for providing upgrades in electricity meters | |||
9056 | 5712914 | Digital certificates containing multimedia data extensions | |||
9057 | 5712913 | Limited-traceability systems | |||
9058 | 5708714 | Method for sharing secret information and performing certification in a communication system that has a plurality of information processing apparatuses | |||
9059 | 5708712 | Vehicle security device with electronic use authorization coding | |||
9060 | 5708710 | Method and apparatus for authentication in a communication system | |||
9061 | 5706349 | Authenticating remote users in a distributed environment | |||
9062 | 5706347 | Method and system for authenticating a computer network node | |||
1997 | |||||
9063 | 5703950 | Method and apparatus for controlling country specific frequency allocation | |||
9064 | 5699431 | Method for efficient management of certificate revocation lists and update information | |||
9065 | 5696827 | Secure cryptographic methods for electronic transfer of information | |||
9066 | 5696766 | Apparatus and method of synchronizing a transmitter in a subscriber terminal of a wireless telecommunications system | |||
9067 | 5694569 | Method for protecting a volatile file using a single hash | |||
9068 | 5689567 | Electronic signature method and apparatus | |||
9069 | 5689563 | Method and apparatus for efficient real-time authentication and encryption in a communication system | |||
9070 | 5687235 | Certificate revocation performance optimization | |||
9071 | 5682430 | Secure anonymous message transfer and voting scheme | |||
9072 | 5680455 | Digital signature generator /verifier/ recorder (DS-GVR) for analog transmissions | |||
9073 | 5677955 | Electronic funds transfer instruments | |||
9074 | 5673318 | Method and apparatus for data authentication in a data communication environment | |||
9075 | 5673316 | Creation and distribution of cryptographic envelope | |||
9076 | 5671285 | Secure communication system | |||
9077 | 5671283 | Secure communication system with cross linked cryptographic codes | |||
9078 | 5668878 | Secure cryptographic methods for electronic transfer of information | |||
9079 | 5666420 | Simultaneous electronic transactions | |||
9080 | 5666416 | Certificate revocation system | |||
9081 | 5666415 | Method and apparatus for cryptographic authentication | |||
9082 | 5664016 | Method of building fast MACS from hash functions | |||
9083 | 5661807 | Authentication system using one-time passwords | |||
9084 | 5661806 | Process of combined authentication of a telecommunication terminal and of a user module | |||
9085 | 5661805 | Signature verification apparatus capable of obtaining information required for a document recipient by using an apparatus's verification key alone | |||
9086 | 5659617 | Method for providing location certificates | |||
9087 | 5659616 | Method for securely using digital signatures in a commercial cryptographic system | |||
9088 | 5659613 | Method and apparatus for copy protection for various recording media using a video finger print | |||
9089 | 5657388 | Method and apparatus for utilizing a token for resource access | |||
9090 | 5655021 | Method for checking data sequences | |||
9091 | 5651069 | Software-efficient message authentication | |||
9092 | 5651068 | International cryptography framework | |||
9093 | 5649014 | Pseudorandom composition-based cryptographic authentication process | |||
9094 | 5646998 | Secure transaction system and method utilized therein | |||
9095 | 5646997 | Method and apparatus for embedding authentication information within digital data | |||
9096 | 5643086 | Electronic casino gaming apparatus with improved play capacity, authentication and security | |||
9097 | 5642401 | System and method of authenticating a service request in a mobile communication system | |||
9098 | 5640454 | System and method for access field verification | |||
9099 | 5638447 | Compact digital signatures | |||
9100 | 5638446 | Method for the secure distribution of electronic files in a distributed environment | |||
9101 | 5636280 | Dual key reflexive encryption security system | |||
9102 | 5633932 | Apparatus and method for preventing disclosure through user-authentication at a printing node | |||
9103 | 5633931 | Method and apparatus for calculating message signatures in advance | |||
9104 | 5631962 | Circuit and method of encrypting key validation | |||
9105 | 5629982 | Simultaneous electronic transactions with visible trusted parties | |||
9106 | 5627893 | Cryptographic method | |||
9107 | 5625695 | Process for generating DSA signatures with low-cost portable apparatuses | |||
9108 | 5623545 | Automatic data generation for self-test of cryptographic hash algorithms in personal security devices | |||
9109 | 5621798 | Method and apparatus for cooperative messaging | |||
9110 | 5621796 | Transferring information between transaction networks | |||
9111 | 5619575 | Pseudorandom composition-based cryptographic authentication process | |||
9112 | 5619573 | Vehicle security device with electronic use authorization coding | |||
9113 | 5615268 | System and method for electronic transmission storage and retrieval of authenticated documents | |||
9114 | 5613001 | Digital signature verification technology for smart credit card and internet applications | |||
9115 | 5610982 | Compact certification with threshold signatures | |||
9116 | 5608801 | Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions | |||
9117 | 5608800 | Process for detecting unauthorized introduction of any data transmitted by a transmitter to a receiver | |||
9118 | 5606617 | Secret-key certificates | |||
9119 | 5606609 | Electronic document verification system and method | |||
9120 | 5604805 | Privacy-protected transfer of electronic information | |||
9121 | 5604804 | Method for certifying public keys in a digital signature scheme | |||
9122 | 5602918 | Application level security system and method | |||
9123 | 5600725 | Digital signature method and key agreement method | |||
9124 | 5598476 | Random clock composition-based cryptographic authentication process and locking system | |||
9125 | 5598475 | Rolling code identification scheme for remote control applications | |||
9126 | 5598473 | Digital signature generator/verifier/recorder (DS-GVR) for analog transmissions | |||
9127 | 5598459 | Authentication and handover methods and systems for radio personal communications | |||
9128 | 5596641 | Authentication method for mobile communications | |||
9129 | 5592553 | Authentication system using one-time passwords | |||
1996 | |||||
9130 | 5590199 | Electronic information network user authentication and authorization system | |||
9131 | 5590197 | Electronic payment system and method | |||
9132 | 5587809 | System and a process for transmission of secure faxes | |||
9133 | 5581616 | Method and apparatus for digital signature authentication | |||
9134 | 5581615 | Scheme for authentication of at least one prover by a verifier | |||
9135 | 5579485 | Apparatus for remote implementation of a command | |||
9136 | 5579393 | System and method for secure medical and dental record interchange | |||
9137 | 5577121 | Transaction system for integrated circuit cards | |||
9138 | 5577120 | Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transaction or the like | |||
9139 | 5572193 | Method for authentication and protection of subscribers in telecommunications systems | |||
9140 | 5568554 | Method for improving the processing and storage performance of digital signature schemes | |||
9141 | 5559885 | Two stage read-write method for transaction cards | |||
9142 | 5557765 | System and method for data recovery | |||
9143 | 5557346 | System and method for key escrow encryption | |||
9144 | 5555307 | Device and process for rendering secure the transmission of faxes, as well as fax unit which has been made secure and incorporating such a device | |||
9145 | 5555303 | Secure transaction system and method utilized therein | |||
9146 | 5553145 | Simultaneous electronic transactions with visible trusted parties | |||
9147 | 5546463 | Pocket encrypting and authenticating communications device | |||
9148 | 5544322 | System and method for policy-based inter-realm authentication within a distributed processing system | |||
9149 | 5544245 | Mutual authentication/cipher key delivery system | |||
9150 | 5541581 | Electronic combination lock security system | |||
9151 | 5539828 | Apparatus and method for providing secured communications | |||
9152 | 5539826 | Method for message authentication from non-malleable crypto systems | |||
9153 | 5539824 | Method and system for key distribution and authentication in a data communication network | |||
9154 | 5537475 | Efficient digital signature algorithm and use thereof technical field | |||
9155 | 5535276 | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | |||
9156 | 5530757 | Distributed fingerprints for information integrity verification | |||
9157 | 5528231 | Method for the authentication of a portable object by an offline terminal, and apparatus for implementing the process | |||
9158 | 5524073 | Secure transaction system and method utilized therein | |||
9159 | 5521980 | Privacy-protected transfer of electronic information | |||
9160 | 5515441 | Secure communication method and apparatus | |||
9161 | 5513260 | Method and apparatus for copy protection for various recording media | |||
9162 | 5513245 | Automatic generation of private authentication key for wireless communication systems | |||
9163 | 5511121 | Efficient electronic money | |||
9164 | 5506905 | Authentication method for keyless entry system | |||
9165 | 5504817 | Method and apparatus for memory efficient variants of public key encryption and identification schemes for smart card applications | |||
9166 | 5502765 | Method and apparatus for settlement of accounts by IC cards | |||
9167 | 5502764 | Method, identification device and verification device for identificaiton and/or performing digital signature | |||
9168 | 5500897 | Client/server based secure timekeeping system | |||
9169 | 5499296 | Natural input encryption and method of use | |||
9170 | 5499294 | Digital camera with apparatus for authentication of images produced from an image file | |||
9171 | 5497423 | Method of implementing elliptic curve cryptosystems in digital signatures or verification and privacy communication | |||
9172 | 5497422 | Message protection mechanism and graphical user interface therefor | |||
9173 | 5495533 | Personal key archive | |||
9174 | 5495532 | Secure electronic voting using partially compatible homomorphisms | |||
9175 | 5493614 | Private signature and proof systems | |||
9176 | 5491752 | System for increasing the difficulty of password guessing attacks in a distributed authentication scheme employing authentication tokens | |||
9177 | 5491750 | Method and apparatus for three-party entity authentication and key distribution using message authentication codes | |||
9178 | 5491749 | Method and apparatus for entity authentication and key distribution secure against off-line adversarial attacks | |||
9179 | 5485519 | Enhanced security for a secure token code | |||
9180 | 5483597 | Authentication process for at least one identification device using a verification device and a device embodying the process | |||
1995 | |||||
9181 | 5479512 | Method and apparatus for performing concryption | |||
9182 | 5479511 | Method, sender apparatus and receiver apparatus for modulo operation | |||
9183 | 5475826 | Method for protecting a volatile file using a single hash | |||
9184 | 5475763 | Method of deriving a per-message signature for a DSS or El Gamal encryption system | |||
9185 | 5473689 | Method for authentication between two electronic devices | |||
9186 | 5469507 | Secure communication and computation in an insecure environment | |||
9187 | 5465299 | Electronic document processing system and method of forming digital signature | |||
9188 | 5463690 | Method and apparatus for public key exchange in a cryptographic system | |||
9189 | 5457747 | Anti-fraud verification system using a data card | |||
9190 | 5455865 | Robust packet routing over a distributed network containing malicious failures | |||
9191 | 5455863 | Method and apparatus for efficient real-time authentication and encryption in a communication system | |||
9192 | 5452357 | Method and apparatus for access control and/or identification | |||
9193 | 5450493 | Secure communication method and apparatus | |||
9194 | 5448639 | Digital signature device | |||
9195 | 5448638 | Security apparatus and system for retail environments | |||
9196 | 5446796 | Method and apparatus for settlement of accounts by IC cards | |||
9197 | 5444780 | Client/server based secure timekeeping system | |||
9198 | 5442707 | Method for generating and verifying electronic signatures and privacy communication using elliptic curves | |||
9199 | 5440635 | Cryptographic protocol for remote authentication | |||
9200 | 5434919 | Compact endorsement signature systems | |||
9201 | 5432852 | Large provably fast and secure digital signature schemes based on secure hash functions | |||
9202 | 5422953 | Personal date/time notary device | |||
9203 | 5420927 | Method for certifying public keys in a digital signature scheme | |||
9204 | 5420925 | Rolling code encryption process for remote keyless entry system | |||
9205 | 5414772 | System for improving the digital signature algorithm | |||
9206 | 5412727 | Anti-fraud voter registration and voting system using a data card | |||
9207 | 5412726 | Telecommunication installation with secure remote loading of prepayment means and corresponding remote loading process | |||
9208 | 5406628 | Public key authentication and key agreement for low-cost terminals | |||
9209 | 5406619 | Universal authentication device for use over telephone lines | |||
9210 | 5402490 | Process for improving public key authentication | |||
9211 | 5398285 | Method for generating a password using public key cryptography | |||
9212 | 5396558 | Method and apparatus for settlement of accounts by IC cards | |||
9213 | 5392355 | Secure communication system | |||
9214 | 5390252 | Authentication method and communication terminal and communication processing unit using the method | |||
9215 | 5390247 | Method and apparatus for creating, supporting, and using travelling programs | |||
9216 | 5388158 | Secure document and method and apparatus for producing and authenticating same | |||
9217 | 5386468 | Method of registering identification number in personal communication terminal | |||
9218 | 5384850 | Security apparatus and system for retail environments | |||
9219 | 5384847 | Method and apparatus for protecting cordless telephone account authentication information | |||
9220 | 5384846 | System and apparatus for controlled production of a secure identification card | |||
9221 | 5379343 | Detection of unauthorized use of software applications in communication units | |||
1994 | |||||
9222 | 5377270 | Cryptographic authentication of transmitted messages using pseudorandom numbers | |||
9223 | 5377267 | Method of authentication with improved security for secrecy of authentication key | |||
9224 | 5375170 | Efficient signature scheme based on birational permutations | |||
9225 | 5373561 | Method of extending the validity of a cryptographic certificate | |||
9226 | 5373558 | Desinated-confirmer signature systems | |||
9227 | 5371796 | Data communication system | |||
9228 | 5371794 | Method and apparatus for privacy and authentication in wireless networks | |||
9229 | 5369707 | Secure network method and apparatus | |||
9230 | 5369705 | Multi-party secure session/conference | |||
9231 | 5367573 | Signature data object | |||
9232 | 5365589 | Method and apparatus for encryption, decryption and authentication using dynamical systems | |||
9233 | 5363449 | Personal identification encryptor and method | |||
9234 | 5363448 | Pseudorandom number generation and cryptographic authentication | |||
9235 | 5355412 | Identifying secret data messages in a one-direction multipoint network | |||
9236 | 5351302 | Method for authenticating objects identified by images or other identifying information | |||
9237 | 5351295 | Secure method of neighbor discovery over a multiaccess medium | |||
9238 | 5351293 | System method and apparatus for authenticating an encrypted signal | |||
9239 | 5349643 | System and method for secure initial program load for diskless workstations | |||
9240 | 5349642 | Method and apparatus for authentication of client server communication | |||
9241 | 5347650 | Device for transforming a digital data sequence into a condensed digital data block using tables and logic operators | |||
9242 | 5347581 | Verification process for a communication system | |||
9243 | 5347580 | Authentication method and system with a smartcard | |||
9244 | 5347579 | Personal computer diary | |||
9245 | 5345507 | Secure message authentication for binary additive stream cipher systems | |||
9246 | 5345506 | Mutual authentication/cipher key distribution system | |||
9247 | 5343529 | Transaction authentication using a centrally generated transaction identifier | |||
9248 | 5341428 | Multiple cross-check document verification system | |||
9249 | 5339361 | System and method for authenticating transmission and receipt of electronic information | |||
9250 | 5337360 | Method and apparatus for creating, supporting, and using travelling programs | |||
9251 | 5337358 | Apparatus for recording a transaction including authenticating an identification card | |||
9252 | 5323146 | Method for authenticating the user of a data station connected to a computer system | |||
9253 | 5319711 | Wireless device for verifying identification | |||
9254 | 5319710 | Method and means for combining and managing personal verification and message authentication encrytions for network transmission | |||
9255 | 5317637 | Data exchange system with a check of the apparatus for its authentication status | |||
9256 | 5315658 | Fair cryptosystems and methods of use | |||
9257 | 5311596 | Continuous authentication using an in-band or out-of-band side channel | |||
9258 | 5307523 | Protective eyewear | |||
9259 | 5307411 | Means for identification and exchange of encryption keys | |||
9260 | 5299263 | Two-way public key authentication and key agreement for low-cost terminals | |||
9261 | 5299262 | Method for exponentiating in cryptographic systems | |||
9262 | 5295188 | Public key encryption and decryption circuitry and method | |||
9263 | 5293576 | Command authentication process | |||
9264 | 5278904 | Method of verifying identification | |||
9265 | 5276737 | Fair cryptosystems and methods of use | |||
9266 | 5276736 | Optionally moderated transaction systems | |||
1993 | |||||
9267 | 5271061 | Method and apparatus for public key exchange in a cryptographic system | |||
9268 | 5268963 | System for encoding personalized identification for storage on memory storage devices | |||
9269 | 5267314 | Secure transaction system and method utilized therein | |||
9270 | 5263085 | Fast signature scheme based on sequentially linearized equations | |||
9271 | 5261070 | Method and apparatus for forming unique user identification data at remote terminal for secure transmission of data from host terminal | |||
9272 | 5261002 | Method of issuance and revocation of certificates of authenticity used in public key networks and other systems | |||
9273 | 5259025 | Method of verifying fake-proof video identification data | |||
9274 | 5253295 | Process for authentication, by an outside medium, of a portable object connected to that medium via a transmission line and system for carrying out the process | |||
9275 | 5249230 | Authentication system | |||
9276 | 5247577 | Methods and apparatus for securely enabling features in highly integrated electronic circuits | |||
9277 | 5245657 | Verification method and apparatus | |||
9278 | 5245656 | Security method for private information delivery and filtering in public networks | |||
9279 | 5243652 | Location-sensitive remote database access control | |||
9280 | 5241600 | Vertification system for credit or bank card or the like | |||
9281 | 5241598 | Rolling key resynchronization in cellular verification and validation system | |||
9282 | 5241594 | One-time logon means and methods for distributed computing systems | |||
9283 | 5239584 | Method and apparatus for encryption/authentication of data in energy metering applications | |||
9284 | 5239294 | Method and apparatus for authenication and protection of subscribers in telecommunication systems | |||
9285 | 5237614 | Integrated network security system | |||
9286 | 5237612 | Cellular verification and validation system | |||
9287 | 5235642 | Access control subsystem and method for distributed computer system using locally cached authentication credentials | |||
9288 | 5231668 | Digital signature algorithm | |||
9289 | 5231666 | Cryptographic method for updating financial records | |||
9290 | 5228084 | Security apparatus and system for retail environments | |||
9291 | 5226079 | Non-repudiation in computer networks | |||
9292 | 5224163 | Method for delegating authorization from one entity to another through the use of session encryption keys | |||
9293 | 5224162 | Electronic cash system | |||
9294 | 5222140 | Cryptographic method for key agreement and user authentication | |||
9295 | 5222138 | Remote signature rendering system & apparatus | |||
9296 | 5222136 | Encrypted communication system | |||
9297 | 5218637 | Method of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization | |||
9298 | 5216715 | Key distribution in public communication networks taking account of security gradations | |||
9299 | 5214702 | Public key/signature cryptosystem with enhanced digital signature certification | |||
9300 | 5214700 | Method for obtaining a securitized cleartext attestation in a distributed data processing system environment | |||
9301 | 5210795 | Secure user authentication from personal computer | |||
9302 | 5208858 | Method for allocating useful data to a specific originator | |||
9303 | 5208853 | Method and apparatus for usage protection of data files using split key and unique variable | |||
9304 | 5204902 | Cellular telephony authentication arrangement | |||
9305 | 5202921 | Method and apparatus for authenticating users of a communication system to each other | |||
9306 | 5196840 | Secure communications system for remotely located computers | |||
9307 | 5193114 | Consumer oriented smart card system and authentication techniques | |||
9308 | 5191613 | Knowledge based system for document authentication | |||
9309 | 5189700 | Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents | |||
9310 | 5185795 | Authentication of rekey messages in a communication system | |||
1992 | |||||
9311 | 5175765 | Robust data broadcast over a distributed network with malicious failures | |||
9312 | 5172414 | Speech and control message encrypton in cellular radio | |||
9313 | 5170431 | Electronic bolt lock with enhanced security features | |||
9314 | 5164988 | Method to establish and enforce a network cryptographic security policy in a public key cryptosystem | |||
9315 | 5164986 | Formation of rekey messages in a communication system | |||
9316 | 5163098 | System for preventing fraudulent use of credit card | |||
9317 | 5163091 | Knowledge based system for document authentication (apparatus) | |||
9318 | 5159634 | Cryptosystem for cellular telephony | |||
9319 | 5159632 | Method and apparatus for public key exchange in a cryptographic system | |||
9320 | 5157726 | Document copy authentication | |||
9321 | 5153919 | Service provision authentication protocol | |||
9322 | 5153581 | Method for authentication by an external medium of a portable object such as a memory card coupled to this medium | |||
9323 | 5150411 | Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction | |||
9324 | 5148481 | Transaction system security method and apparatus | |||
9325 | 5148479 | Authentication protocols in communication networks | |||
9326 | 5148007 | Method for generating random number for the encoded transmission of data | |||
9327 | 5144667 | Method of secure remote access | |||
9328 | 5142577 | Method and apparatus for authenticating messages | |||
9329 | 5140634 | Method and apparatus for authenticating accreditations and for authenticating and signing messages | |||
9330 | 5140317 | Electronic security system | |||
9331 | 5136647 | Method for secure time-stamping of digital documents | |||
9332 | 5136646 | Digital document time-stamping with catenate certificate | |||
9333 | 5136643 | Public/key date-time notary facility | |||
9334 | 5131039 | Optionally moderated transaction systems | |||
9335 | 5131038 | Portable authentification system | |||
9336 | 5101430 | Method and device for generating and for validating a digital message and application of such a device | |||
9337 | 5091942 | Authentication system for digital cellular communications | |||
1991 | |||||
9338 | 5068894 | Method of generating a unique number for a smart card and its use for the cooperation of the card with a host system | |||
9339 | 5060263 | Computer access control system and method | |||
9340 | 5056140 | Communication security accessing system and process | |||
9341 | 5048085 | Transaction system security method and apparatus | |||
9342 | 5046094 | Server-aided computation method and distributed information processing unit | |||
9343 | 5031214 | Document authentication apparatus | |||
9344 | 5022080 | Electronic notary | |||
9345 | 5020105 | Field initialized authentication system for protective security of electronic information networks | |||
9346 | 5018196 | Method for electronic transaction with digital signature | |||
9347 | 5016274 | On-line/off-line digital signing | |||
9348 | 5010573 | Cryptographic system by blocs of binery data | |||
9349 | 5005200 | Public key/signature cryptosystem with enhanced digital signature certification | |||
9350 | 5001752 | Public/key date-time notary facility | |||
9351 | 4996711 | Selected-exponent signature systems | |||
9352 | 4995082 | Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system | |||
9353 | 4993068 | Unforgeable personal identification system | |||
9354 | 4993067 | Secure satellite over-the-air rekeying method and system | |||
9355 | 4991210 | Unpredictable blind signature systems | |||
9356 | 4987593 | One-show blind signature systems | |||
9357 | 4981370 | Document authentication apparatus | |||
1990 | |||||
9358 | 4977595 | Method and apparatus for implementing electronic cash | |||
9359 | 4969189 | Authentication system and apparatus therefor | |||
9360 | 4965827 | Authenticator | |||
9361 | 4965568 | Multilevel security apparatus and method with personal key | |||
9362 | 4962532 | Method for providing notification of classified electronic message delivery restriction | |||
9363 | 4956863 | Cryptographic method and apparatus for public key exchange with authentication | |||
9364 | 4949380 | Returned-value blind signature systems | |||
9365 | 4947430 | Undeniable signature systems | |||
9366 | 4935962 | Method and system for authentication | |||
9367 | 4933970 | Variants of the fiat-shamir identification and signature scheme | |||
9368 | 4932056 | Method and apparatus for user identification based on permuted kernels | |||
9369 | 4926480 | Card-computer moderated systems | |||
9370 | 4926479 | Multiprover interactive verification system | |||
9371 | 4924514 | Personal identification number processing using control vectors | |||
9372 | 4919545 | Distributed security procedure for intelligent networks | |||
9373 | 4914698 | One-show blind signature systems | |||
9374 | 4908861 | Data authentication using modification detection codes based on a public one way encryption function | |||
9375 | 4907272 | Method for authenticating an external authorizing datum by a portable object, such as a memory card | |||
9376 | 4907270 | Method for certifying the authenticity of a datum exchanged between two devices connected locally or remotely by a transmission line | |||
9377 | 4897875 | Key management system for open communication environments | |||
1989 | |||||
9378 | 4890323 | Data communication systems and methods | |||
9379 | 4888801 | Hierarchical key management system | |||
9380 | 4885777 | Electronic transaction system | |||
9381 | 4881264 | Digital signature system and method based on a conventional encryption function | |||
9382 | 4868877 | Public key/signature cryptosystem with enhanced digital signature certification | |||
9383 | 4866707 | Secure messaging systems | |||
9384 | 4860352 | Satellite communication system and method with message authentication suitable for use in financial institutions | |||
9385 | 4823388 | Communications network using an enciphering and deciphering device | |||
9386 | 4816651 | Process and apparatus for the simultaneous and remote reading and certifying of an information present in a memory of an electronic medium | |||
9387 | 4802217 | Method and apparatus for securing access to a computer facility | |||
9388 | 4799061 | Secure component authentication system | |||
1988 | |||||
9389 | 4783798 | Encrypting transponder | |||
9390 | 4759064 | Blind unanticipated signature systems | |||
9391 | 4759063 | Blind signature systems | |||
9392 | 4748668 | Method, apparatus and article for identification and signature | |||
9393 | 4731841 | Field initialized authentication system for protective security of electronic information networks | |||
9394 | 4723284 | Authentication system | |||
9395 | 4720859 | Method and system for the mutual encyphered indentification between data communicating stations and stations for use with such method and system | |||
1987 | |||||
9396 | 4694492 | Computer communications security control system | |||
9397 | 4691355 | Interactive security control system for computer communications and the like | |||
9398 | 4677670 | Paired-secure message identification controller for computers and the like | |||
9399 | 4665396 | Validation check for remote digital station | |||
9400 | 4661658 | Offline PIN validation with DES | |||
9401 | 4656474 | Process and apparatus for authenticating the signature of a signed message | |||
9402 | 4649233 | Method for establishing user authenication with composite session keys among cryptographically communicating nodes | |||
1986 | |||||
9403 | 4633037 | Generation of identification keys | |||
9404 | 4625076 | Signed document transmission system | |||
9405 | 4612413 | Authentication system between a card reader and a pay card exchanging data | |||
9406 | 4578532 | Method and apparatus for code transmission | |||
1985 | |||||
9407 | 4549075 | Method for certifying the origin of at least one item of information stored in the memory of a first electronic device and transmitted to a second electronic device, and system for carrying out the method | |||
9408 | 4544833 | Process and apparatus for authenticating or certifying at least one item of information contained in a memory of a removable and portable electronic carrier, such as a card | |||
9409 | 4500750 | Cryptographic application for interbank verification | |||
9410 | 4498000 | Security method and device for communicating confidential data via an intermediate stage | |||
1984 | |||||
9411 | 4467139 | Process and system for transmission of signed messages | |||
9412 | 4458109 | Method and apparatus providing registered mail features in an electronic communication system | |||
9413 | 4438824 | Apparatus and method for cryptographic identity verification | |||
1983 | |||||
9414 | 4393269 | Method and apparatus incorporating a one-way sequence for transaction and identity verification | |||
9415 | 4386233 | Crytographic key notarization methods and apparatus | |||
1982 | |||||
9416 | 4349695 | Recipient and message authentication method and system | |||
9417 | 4326098 | High security system for electronic signature verification | |||
9418 | 4314097 | Authenticator device for precluding compensating text modifications in transmitted messages | |||
9419 | 4310720 | Computer accessing system | |||
9420 | 4309569 | Method of providing digital signatures | |||
1981 | |||||
9421 | 4304961 | Authenticator code generator | |||
9422 | 4264782 | Method and apparatus for transaction and identity verification | |||
9423 | 4259720 | Security system for electronic funds transfer system | |||
1980 | |||||
9424 | 4223403 | Cryptographic architecture for use with a high security personal identification system | |||
9425 | 4206315 | Digital signature system and apparatus | |||
1979 | |||||
9426 | 4159468 | Communications line authentication device | |||
© 2017, ПАТ-Инфо, В.И. Карнышев
Дата формирования списка: 03.04.2017 |