BerandaComputers and TechnologyDiffie-Hellman key exchange – U.S. Patent 4200770A (1977)

Diffie-Hellman key exchange – U.S. Patent 4200770A (1977)

Cryptographic apparatus and method

Download PDF

Info

Publication number
US4200770A

US4200770A

US05/830,754

US83075477A

US4200770A

US 4200770 A

US4200770 A

US 4200770A

US 83075477 A

US83075477 A

US 83075477A

US 4200770 A

US4200770 A

US 4200770A

Authority
US
United States
Prior art keywords
signal
transformed
infeasible
transformation
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired – Lifetime
Application number
US05/830,754
Inventor
Martin E. Hellman
Bailey W. Diffie
Ralph C. Merkle
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Leland Stanford Junior University
Original Assignee
Leland Stanford Junior University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Application filed by Leland Stanford Junior University
filed

Critical

Leland Stanford Junior University

Priority to US05/830,754
priority

Critical

patent/US4200770A/en

Application granted
granted

Critical

Publication of US4200770A
publication

Critical

patent/US4200770A/en

Anticipated expiration
legal-status

Critical

Expired – Lifetime
legal-status

Critical

Current

Links

  • 230000001131
    transforming
    Effects




    0.000

    claims

    abstract

    description

    61

  • 230000001702
    transmitter
    Effects




    0.000

    claims

    description

    19

  • 238000000844
    transformation
    Methods




    0.000

    abstract

    description

    7

  • 238000000034
    methods
    Methods




    0.000

    description

    10

  • 238000010586
    diagrams
    Methods




    0.000

    description

    6

  • 241001442055
    Vipera berus
    Species




    0.000

    description

    4

  • 239000011159
    matrix materials
    Substances




    0.000

    description

    3

  • 281000019761
    Intel, Corp.
    companies




    0.000

    description

    2

  • 230000000694
    effects
    Effects




    0.000

    description

    2

  • 281000070036
    Fairchild
    companies




    0.000

    description

    1

  • 241001331673
    Ipa
    Species




    0.000

    description

    1

  • 238000004364
    calculation methods
    Methods




    0.000

    description

    1

  • 230000000875
    corresponding
    Effects




    0.000

    description

    1

  • 230000001419
    dependent
    Effects




    0.000

    description

    1

  • 238000000605
    extraction
    Methods




    0.000

    description

    1

  • 238000002347
    injection
    Methods




    0.000

    description

    1

  • 239000007924
    injections
    Substances




    0.000

    description

    1

  • 230000004048
    modification
    Effects




    0.000

    description

    1

  • 238000006011
    modification reactions
    Methods




    0.000

    description

    1

  • 230000001960
    triggered
    Effects




    0.000

    description

    1

Images

Classifications

    • HELECTRICITY

    • H04ELECTRIC COMMUNICATION TECHNIQUE

    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION

    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication

    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords

    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use

    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these

    • H04L9/0841Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols

    • H04L9/0844Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these involving Diffie-Hellman or related key agreement protocols with user authentication or key authentication, e.g. ElGamal, MTI, MQV-Menezes-Qu-Vanstone protocol or Diffie-Hellman protocols using implicitly-certified keys
    • HELECTRICITY

    • H04ELECTRIC COMMUNICATION TECHNIQUE

    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION

    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00

    • H04L2209/60Digital content management, e.g. content distribution

Abstract

A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal and exchange an initial transformation of the secret signal with the other converser. The received transformation of the other converser’s secret signal is again transformed with the receiving converser’s secret signal to generate a secure cipher key. The transformations use non-secret operations that are easily performed but extremely difficult to invert. It is infeasible for an eavesdropper to invert the initial transformation to obtain either conversers’ secret signal, or duplicate the latter transformation to obtain the secure cipher key.

Description

The Government has rights in this invention pursuant to Grant No. ENG-10173 of the National Science Foundation and IPA No. 0005.

BACKGROUND OF THE INVENTION

1. Field of Invention

The invention relates to cryptographic systems.

2. Description of Prior Art

Cryptographic systems are widely used to ensure the privacy and authenticity of messages communicated over insecure channels. A privacy system prevents the extraction of information by unauthorized parties from messages transmitted over an insecure channel, thus assuring the sender of a message that it is being read only by the intended receiver. An authentication system prevents the unauthorized injection of messages into an insecure channel, assuring the receiver of the message of the legitimacy of its sender.

One of the principal difficulties with existing cryptographic systems is the need for the sender and receiver to exchange a cipher key over a secure channel to which the unauthorized party does not have access. The exchange of a cipher key frequently is done by sending the key in advance over a secure channel such as private courier or registered mail; such secure channels are usually slow and expensive.

Diffie, et al, in “Multiuser Cryptographic Techniques,” AFIPS–Conference Proceedings, Vol. 45, pp. 109-112, June 8, 1976, propose the concept of a public key cryptosystem that would eliminate the need for a secure channel by making the sender’s keying information public. It is also proposed how such a public key cryptosystem could allow an authentication system which generates an unforgeable message dependent digital signature. Diffie presents the idea of using a pair of keys E and D, for enciphering and deciphering a message, such that E is public information while D is kept secret by the intended receiver. Further, although D is determined by E, it is infeasible to compute D from E. Diffie suggests the plausibility of designing such a public key cryptosystem that would allow a user to encipher a message and send it to the intended receiver, but only the intended receiver could decipher it. While suggesting the plausibility of designing such systems, Diffie presents neither proof that public key cryptosystems exist, nor a demonstration system.

Diffie suggests three plausibility arguments for the existence of a public key cryptosystem; a matrix approach, a machine language approach and a logic mapping approach. While the matrix approach can be designed with matrices that require a demonstrably infeasible cryptanalytic time (i.e., computing D from E) using known methods, the matrix approach exhibits a lack of practical utility because of the enormous dimensions of the required matrices. The machine language approach and logic mapping approach are also suggested, but there is not way shown to design them in such a manner that they would require demonstrably infeasible cryptanalytic time.

Diffie also introduces a procedure using the proposed public key cryptosystems, that could allow the receiver to easily verify the authenticity of a message, but which prevents him from generating apparently authenticated messages. Diffie describes a protocol to be followed to obtain authentication with the proposed public key cryptosystem. However, the authentication procedure relies on the existence of a public key cryptosystem which Diffie did not provide.

SUMMARY AND OBJECTS OF THE INVENTION

Accordingly, it is an object of this invention to allow authorized parties to a conversation (conversers) to converse privately even though an unauthorized party (eavesdropper) intercepts all of their communications.

Another object of this invention is to allow conversers on an insecure channel to authenticate each other’s identity.

An illustrated embodiment of the present invention describes a method for communicating securely over an insecure channel without prearrangement of a cipher key. A secure cipher key is generated from transformations of exchanged transformed signals, which exchanged transformed signals are easy to effect but difficult to invert. The generated secure cipher key is used to encipher and decipher messages transmitted over the insecure communication channel.

This illustrated embodiment of the present invention describes a method and apparatus for generating a secure cipher key for use with conventional cryptographic communication between conversers over an insecure channel. The illustrated embodiment differs from a public key cryptosystem in that it provides a secure cipher key that is used with a conventional cryptographic system; a public key cryptosystem does not require a conventional cryptographic system. Further, the illustrated embodiment provides a means of transforming a signal that is practical to implement and is demonstrably infeasible to invert using known methods.

In the present invention a first converser transforms, in a manner infeasible to invert, a first signal while a second converser transforms, also in a manner infeasible to invert, a second signal. The first converser transmits the transformed first signal to the second converser, keeping the first signal secret, and the second converser transmits the transformed second signal to the first converser, keeping the second signal secret. The first converser then transforms the first signal with the transformed second signal to generate a third signal, representing a secure cipher key, that is infeasible to generate solely by transforming the transformed first signal and the transformed second signal. And, the second converser transforms the second signal with the transformed first signal to generate a fourth signal, also representing the secure cipher key, that is infeasible to generate solely by transforming the transformed first signal and the transformed second signal.

Another illustrated embodiment of the present invention describes a method for allowing a converser to authenticate another converser’s identity. A first converser transforms, in a manner infeasible to invert, a first signal while a second converser transforms, also in a manner infeasible to invert, a second signal. The second converser places the transformed second signal in a public directory as the second converser’s means of identification, keeping the second signal secret. The first converser transmits the transformed first signal to the second converser, with whom the first converser desires to communicate, keeping the first signal secret. The first converser then transforms the first signal with the second converser’s transformed second signal, obtained from the public directory, to generate a third signal. The third signal represents a secure cipher key to be used for conventional cryptographic communication with the second converser, that is infeasible to generate solely by transforming the transformed first signal and the transformed second signal. The second converser transforms the second signal with the transformed first signal to generate a fourth signal, also representing the secure cipher key, that is infeasible to generate solely by transforming the transformed first signal and the transformed second signal. The second converser’s identity is authenticated by the first converser by the second converser’s ability to generate the fourth signal, representing the secure cipher key, and to use the secure cipher key in communicating over a conventional cryptographic system.

Additional objects and features of the present invention will appear from the description that follows wherein the preferred embodiments have been set forth in detail in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of a cryptographic system that transmits a computationally secure cryptogram over an insecure communication channel.

FIG. 2 is a block diagram of a secure key generator for raising various numbers to various powers in modulo arithmetic.

FIG. 3 is a block diagram of a multiplier for performing multiplications in the secure key generator of FIG. 2.

FIG. 4 is a detailed schematic diagram of an adder for performing additions in the multiplier of FIG. 3.

FIG. 5 is a detailed schematic diagram of a comparator for performing magnitude comparisons in the multiplier of FIG. 3.

FIG. 6 is a detailed schematic diagram of a subtractor for performing subtractions in the multiplier of FIG. 3.

DESCRIPTION OF THE PREFERRED EMBODIMENT

Referring to FIG. 1, a cryptographic system is shown in which all communications take place over an insecure communication channel 19, for example a telephone line. Two-way communication is exchanged on the insecure channel 19 between converser 11 and converser 12 using transmitter/receivers 31 and 32, for example modems sch as Bell 210 modems. Converser 11 possesses an unenciphered or plaintext message P to be communicated to converser 12. Converser 11 and converser 12 include cryptographic devices 15 and 16 respectively, for enciphering and deciphering information under the action of a cipher key K on line K. For example, the cryptographic devices 15 and 16 may include the recently adopted National Data Encryption Standard. The cryptographic devices 15 and 16 implement transformations SK and SK-1 (the transformation which is the inverse of SK) when loaded with key K. For example, key K may be a sequence of random letters or digits. The cryptographic device 15 enciphers the plaintext message P into an enciphered message or ciphertext C on line C that is transmitted by converser 11 through the insecure channel 19; the ciphertext C is received by converser 12 and deciphered by cryptographic device 16 to obtain the plaintext message P. An unauthorized party or eavesdropper 13 is assumed to have a cryptographic device 17 and to have access to the insecure channel 19, so if he knew the key K he could decipher the ciphertext C to obtain the plaintext message P.

Converser 11 and converser 12 include independent key sources 25 and 26 respectively, which generate numbers or signals that represent numbers. For example, the key sources may be random number generators that are implemented from noisy amplifiers (e.g., Fairchild μ709 operational amplifiers) with a polarity detector. Key source 25 generates three signals, q, a, and X1, and key source 26 generates X2 ; a, X1 and X2 may be signals that represent independent random numbers chosen uniformly from the set of integers (1, 2, . . . q-1). Signals q and a are transmitted to the secure key generator 21 and are transmitted through the insecure channel 19 to secure key generator 22. Signals X1 and X2 are kept secret by converser 11 and converser 12 respectively, are given to the secure key generators 21 and 22 respectively, but are not transmitted through the insecure channel 19.

Converser 11 and converser 12 also include secure key generators 21 and 22 respectively, which accept the signals generated by the respective key sources 25 and 26. Secure key generator 22 also receives the signals q and a which are transmitted through the insecure channel 19. The secure key generators 21 and 22 generate signals Y1 and Y2 respectively by transforming X1 and X2 respectively with signals q and a in a manner that is easily performed but extremely difficult or infeasible to invert. A task is considered infeasible if its cost as measured by either the amount of memory used or the computing time is finite but impossibly large, for example, on the order of approximately 1030 operations with existing computational methods and equipment such transformations are characterized by the class of mathematical functions known as one-way cipher functions.

Signal Y1 may be generated to represent the number obtained by raising the number represented by signal a to the power represented by signal X1, modulo the number represented by signal q; this transformation may be represented symbolically as Y1 =aX.sbsp.1 mod q. Signal Y2 may be generated to represent the number obtained by raising the number represented by signal a to the power represented by signal X2, modulo the number represented by signal q; this transformation may be represented symbolically as Y2 =aX.sbsp.2 mod q.

Signals Y1 and Y2 are exchanged by transmitting Y1 and Y2 through the insecure channel 19 to secure key generators 22 and 21 respectively. Secure key generator 21 then generates a secure key K by transforming signal Y2 with signals q, a and X1, and secure key generator 22 generates the same secure key K by transforming Y1 with signals q, a and X2.

Secure key generator 21 may generate a secure key K represented by the number obtained by raising the number represented by signal Y2 to the power represented by signal X1, modulo the number represented by signal q; this transformation may be represented symbolically as

K=Y.sub.2.sup.X.sbsp.1 mod q=(a.sup.X.sbsp.2).spsp.X mod q=a.sup.X.sbsp.1 .sup.X.sbsp.2 mod q.

Secure key generator 22 may also generate the same secure key K represented by the number obtained by raising the number represented by signal Y1 to the power represented by signal X2, modulo the number represented by signal q; this transformation may be represented symbolically as

K=Y.sub.1.sup.X.sbsp.2 mod q=(a.sup.X.sbsp.1).spsp.X mod q=a.sup.X.sbsp.1.sup.X.sbsp.2 mod q.

Conversers 11 and 12 then have the same secure key K which may be used with cryptographic devices 15 and 16.

The eavesdropper 13 is assumed to have a secure key generator 23 and to have access to all signals transmitted through the insecure channel 19, including signals q, a, Y1, and Y2. The difficulty of inverting the transformations which generated signals Y1 and Y2 make it infeasible for the eavesdropper 13 to generate signals X1 or X2. Further, the secure key K is infeasible to generate solely with signals q, a, Y1 and Y2.

The eavesdropper 13 is unable to compute the secure key K by multiplication or exponentiation; multiplication yields

Y.sub.1 Y.sub.2 =a.sup.X.sbsp.1.sup.+X.sbsp.2 mod q≠K

and exponentiation yields either ##EQU1## The eavesdropper in theory could obtain X1 or X2 from q, a and Y1 and Y2 by raising a to the first, second, third, etc., powers until Y1 or Y2 was obtained. This is prevented by choosing q to be a large number; if q is a 200 bit quantity, the average number of trials before success is on the order of 2198 =4×1059 and is physically infeasible. Improved algorithms for computing logarithms modulo q (if Y=aX mod q, X is the logarithm of Y to the base a modulo q) are known but, if q=2r+1 with q and r being prime, then the most efficient known algorithm requires approximately q1/2 operations. Again, taking q=2200, about 2100 =1030 operations are required, still physically infeasible. An example of such a paid is r=(2121 ·52 ·72 ·112 ·13·17·19·23·29·31.multidot.37·41·43· 47·53·59)+1 and q=2r+1. Other restrictions on q, a, X1 and X2 may also be imposed.

The secure key generators 21 and 22, for raising various numbers to various powers modulo q, can be implemented in electronic circuitry as shown in FIG. 2. For ease of illustration, FIG. 2 depicts raising a to the X power modulo q; raising Y to the X power modulo q is obtained by initially loading Y, instead of a, into the A register 43.

FIG. 2 shows the initial contents of three registers 41, 42 and 43. The binary representation of X (xk-1 xk-2 . . . x1 x0) is loaded into the X register 41; 1 is loaded into the R register 42; and, the binary representation of a is loaded into the A register 43, corresponding to i=0. The number of bits k in each register is the least integer such that 2k≧ q. If k=200, then all three registers can be obtained from a single 1024 bit random access memory (RAM) such as the Intel 2102. The implementation of multiplier 44, for multiplying two numbers modulo q, will be described in more detail later.

Referring to FIG. 2, if the low order bit, containing x0, of the X register 41 equals 1 then the R register 42 and the A register 43 contents are multiplied modulo q and their product, also a k bit quantity, replaces the contents of the R register 42. If x0 =0, the R register 42 contents are left unchanged. In either case, the A register 43 is then loaded twice into the multiplier 44 so that the square, modulo q, of the A register 43 contents is computed. This value, a.sup.(2.spsp.i+1.sup.), replaces the contents of the A register 43. The X register 41 contents are shifted one bit to the right and a 0 is shifted in at the left so its contents are now 0xk-1 xk-2 . . . x2 x1.

The low order bit, containing x1, of the X register 41 is examined. If it equals 1 then, as before, the R register 42 and A register 43 contents are multiplied modulo q and their product replaces the contents of the R register 42. If the low order bit equals 0 then the R register 42 contents are left unchanged. In either case, the contents of the A register 43 are replaced by the square, modulo q, of the previous contents. The X register 41 contents are shifted one bit to the right and a 0 is shifted in at the left so its contents are now 00xk-1 xk-2 . . . x3 x2.

This process continues until the X register 41 contains all 0’s, at which point the value of aX modulo q is stored in the R register 42.

An example is helpful in following this process. Taking q=23, we find k=5 from 2k ≧q. If a=7 and X=18 then aX =718 =1,628,413,597,910,449=23(70,800,591,213,497)+18 so aX modulo q equals 18. This straightforward but laborious method of computing aX modulo q is used as a check to show that the method of FIG. 2, shown below, yields the correct result. The R register 42 and A register 43 contents are shown in decimal form to facilitate understanding.

______________________________________i       X (in binary)                R         A______________________________________0       10010        1         71       01001        1         32       00100        3         93       00010        3         124       00001        3         65       00000        18        13______________________________________

The row marked i=0 corresponds to the initial contents of each register, X=18, R=1 and A=a=7. Then, as described above, because the right most bit of X register 41 is 0, the R register 42 contents are left unchanged, the contents of the A register 43 are replaced by the square, modulo 23, of its previous contents (72 =49=2×23+3=3 modulo 23), the contents of the X register 41 are shifted one bit to the right, and the process continues. Only when i=1 and 4 do the rightmost bit of the X register 41 contents equal 1, so only going from i=1 to 2 and from i=4 to 5 is the R register 42 replaced by RA modulo q. When i=5, X=0 so the process is complete and the result, 18, is in the R register 42.

Note that the same result, 18, is obtained here as in the straightforward calculation of 718 modulo 23, but that here large numbers never resulted.

Another way to understand the process is to note that the A register contains a, a2, a4, a8 and a16 when i=0, 1, 2, 3 and 4 respectively, and that a18 =a16 a2, so only these two values need to be multiplied.

FIG. 3 continues the description of this illustrative implementation by depicting an implementation of the modulo q multiplier 44 in FIG. 2. The two numbers, y and z, to be multiplied are loaded into the Y and Z registers 51 and 52 respectively, and q is loaded in the Q register 53. The product yz modulo q will be produced in the P register 54 which is initially set to 0. If k=200, then all four registers can be obtained from a single 1024 bit RAM such as the Intel 2102. The implementation of FIG. 3 is based on the fact that y z mod q=y0 z mod q+2y1 z mod q+4y2 z mod q+ . . . +2k-1 yk-1 z mod q, where yk-1 yk-2 . . . y1 y0 is the binary representation of Y.

To multiply y times z, if the rightmost bit, containing y0, of the Y register 51 is 1 then the contents of the Z register 53 are added to the P register 54 by adder 55. If y0 =0, then the P register 54 is unchanged. Then the Q and P register contents are compared by comparator 56 to determine if the contents of the P register 54 are greater than or equal to q, the contents of the Q register 53. If the contents of the P register 54 are greater than or equal to q then subtractor 57 substracts q from the contents of the P register 54 and places the difference in the P register 54, if less than q the P register 54 is unchanged.

Next, the contents of Y register 51 are shifted one bit to the right and a 0 is shifted in at the left so its contents become 0yk-1 yk-2 . . . y2 y1, so that y1 is ready for computing 2y1 z mod q. The quantity 2z mod q is computed for this purpose by using adder 55 to add z to itself, using comparator 56 to determine if the result, 2z, is less than q, and using subtractor 57 for subtracting q from 2z if the result is not less than q. The result, 2z mod q is then stored in the Z register 52. The rightmost bit, containing y1, of the Y register 51 is then examined, as before, and the process repeats.

This process is repeated a maximum of k times or until the Y register 51 contains all 0’s, at which point xy modulo q is stored in the P register 54.

As an example of these operations, consider the problem of computing 7×7 modulo 23 needed to produce the second state of the A register when 718 mod 23 was computed. The following steps show the successive contents of the Y, Z and P registers which result in the answer 7×7=3 modulo 23.

______________________________________i      Y (in binary)              Z      P______________________________________0      00111        7     01      00011       14     0 + 7 = 72      00001        5     7 + 14 = 213      00000       10     21 + 5 = 3 mod 23______________________________________

FIG. 4 depicts an implementation of an adder 55 for adding two k bit numbers p and z. The numbers are presented one bit at a time to the device, low order bit first, and the delay element is initially set to 0. (The delay represents the binary carry bit.) The AND gate 61 determines if the carry bit should be a one based on pi and zi both being 1 and the AND gate 62 determines if the carry should be a 1 based on the previous carry being a 1 and one of pi or zi being 1. If either of these two conditions is met, the OR gate 63 has an output of 1 indicating a carry to the next stage. The two exclusive-or (XOR) gates 64 and 65 determine the ith bit of the sum, si, as the modulo-2 sum of pi, zi and the carry bit from the previous stage. The delay 66 stores the previous carry bit. Typical parts for implementing these gates and the delay are SN7400, SN7404, and SN7474.

FIG. 5 depicts an implementation of a comparator 56 for comparing two numbers p and q. The two numbers are presented one bit at a time, high order bit first. If neither the pq outputs have been triggered after the last bits p0 and q0 have been presented, then p=q. The first triggering of either the pq output causes the comparison operation to cease. The two AND gates 71 and 72 each have one input inverted (denoted by a circle at the input). An SN7400 and SN7404 provide all of the needed logic circuits.

FIG. 6 depicts an implementation of a subtractor 57 for subtracting two numbers. Because the numbers subtracted in FIG. 3 always produce a non-negative difference, there is no need to worry about negative differences. The larger number, the minuend, is labelled p and the smaller number, the substrahend, is labelled q. Both p and q are presented serially to the subtractor 57, low order bit first. AND gates 81 and 83, OR gate 84 and XOR gate 82 determine if borrowing (negative carrying) is in effect. A borrow occurs if either pi =0 and qi =1, or pi =qi and borrowing occurred in the previous stage. The delay 85 stores the previous borrow state. The ith bit of the difference, di, is computed as the XOR, or modulo-2 difference, of pi, qi and the borrow bit. The output of XOR gate 82 gives the modulo-2 difference between pi and qi, and XOR gate 86 takes the modulo-2 difference of this with the previous borrow bit. Typical parts for implementing these gates and the delay are SN7400, SN7404 and SN7474.

There are many methods for implementing this form of the invention. The signals q and a may be public knowledge rather than generated by the key source 25. Further, it should be appreciated that the present invention has the capability of being modified by the use of additional transformations or exchanges of signals.

In some applications, it will prove valuable to have the ith converser on the system generate Yi as above and place it in a public file or directory rather than transmitting it to another converser with whom he wishes to communicate. Then two conversers i and j who wish to establish a secure channel will use Kij =YiX.sbsp.j mod q=YjX.sbsp.i mod q as their key. The advantage is that converser i, having once proved his identity to the system through the use of his driver’s license, fingerprint, etc., can prove his identity to converser j by his ability to compute Kij and encrypt data with it.

Variations on the above described embodiment are possible. For example, in the above method based on logarithms modulo q, m-dimensional vectors, each of whose components are between 0 and q-1 could also be used. Then all operations are performed in the finite field with qm elements, which operations are well described in the literature. Thus, although the best mode contemplated for carrying out the present invention has been herein shown and described, it will be apparent that modification and variation may be made without departing from what is regarded to be the subject matter of this invention.

Claims (8)

What is claimed is:

1. A secure key generator comprising:

a first input connected to receive an applied first signal;

a second input connected to receive an applied second signal;

a first output;

a second output; and

means for generating at the first output a third signal, that is a transformation of said first signal and which transformation is infeasible to invert, and for generating at the second output a fourth signal, that is a transformation of said second signal with said first signal, which represents a secure key and is infeasible to generate solely with said second signal and said third signal.

2. In a method of communicating securely over an insecure communication channel of the type which communicates a message from a transmitter to a receiver, the improvement characterized by:

generating and transforming, in a manner infeasible to invert, a first signal at the transmitter to generate a transformed first signal;

generating and transforming, in a manner infeasible to invert, a second signal at the receiver to generate a transformed second signal;

transmitting said transformed first signal from the transmitter to the receiver;

transmitting said transformed second signal from the receiver to the transmitter;

transforming said transformed second signal with said first signal at the transmitter to generate a third signal, representing a secure cipher key, that is infeasible to generate solely with said transformed first signal and said transformed second signal;

transforming said transformed first signal with said second signal at the receiver to generate a fourth signal that is identical to the third signal and represents said secure cipher key;

enciphering the message with said secure cipher key at the transmitter;

transmitting the enciphered message from the transmitter to the receiver; and

deciphering the enciphered message with said secure cipher key at the receiver.

3. In a method of communicating securely over an insecure communication channel as in claim 2, further comprising:

authenticating the receiver’s identity at the transmitter from the receiver’s ability to generate the fourth signal, representing the secure cipher key.

4. A method of generating a secure cipher key between a transmitter and receiver comprising the steps of:

generating and transforming, in a manner infeasible to invert, a first signal at the transmitter to generate a transformed first signal;

generating and transforming, in a manner infeasible to invert, a second signal at the receiver to generate a transformed second signal;

transmitting said transformed first signal from the transmitter to the receiver

transmitting said transformed second signal from the receiver to the transmitter;

transforming said transformed second signal with said first signal at the transmitter to generate a third signal, representing a secure cipher key, that is infeasible to generate solely with said transformed first signal and said transformed second signal; and

transforming said transformed first signal with said second signal at the receiver to generate a fourth signal that is identical to the third signal and represents said secure cipher key.

5. An apparatus for generating a secure cipher key comprising:

a first secure key generator having a first input connected to receive an applied first signal, having a second input connected to receive a second signal, having a first and second outputs, and having a means for generating at the first output a third signal, that is a transformation of said first signal and which transformation is infeasible to invert, and for generating at the second output a fourth signal, that is a transformation of said second signal with said first signal, which represents a secure key and is infeasible to generate solely with said second signal and said third signal; and

a second secure key generator having a first input connected to receive an applied fifth signal, having a second input connected to receive said third signal, having a first and second outputs, and having a means for generating at the first output said second signal, that is a transformation of said fifth signal and which transformation is infeasible to invert, and for generating at the second output a sixth signal, that is a transformation of said third signal with said fifth signal, which represents the secure key and is infeasible to generate solely with said second signal and said third signal.

6. A method of generating a secure cipher key between a transmitter and receiver comprising the steps of:

transforming, in a manner infeasible to invert, a first signal at the transmitter to generate a transformed first signal wherein transforming said first signal is performed by raising a first number to a power represented by said first signal, modulo a second number;

transforming, in a manner infeasible to invert, a second signal at the receiver to generate a transformed second signal, wherein transforming said second signal is performed by raising the first number to a power represented by said second signal, modulo the second number;

transmitting said transformed first signal from the transmitter to the receiver;

transmitting said transformed second signal from the receiver to the transmitter;

transforming said transformed second signal with said first signal at the transmitter to generate a third signal, representing a secure cipher key, that is infeasible to generate solely with said transformed first signal and said transformed second signal, wherein transforming said transformed second signal with said first signal is performed by raising a number represented by said transformed second signal to a power represented by said first signal, modulo the second number; and

transforming said transformed first signal with said second signal at the receiver to generate a fourth signal, representing said secure cipher key, that is infeasible to generate solely with said transformed first signal and said transformed second signal, wherein transforming said transformed first signal with said second signal is performed by raising a number represented by said transformed first signal to a power represented by said second signal, modulo the second number.

7. An apparatus for generating a secure cipher key comprising:

a first secure key generator having a first input connected to receive an applied first signal, having a second input connected to receive a second signal, having first and second outputs, and having a means for generating at the first output a third signal, that is a transformation of said first signal in which said transformation includes raising a first number to a power represented by said first signal, modulo or second number, and for generating at the second output a fourth signal, that is a transformation of said second signal with said first signal which transformation includes raising a number represented by said second signal to a power represented by said first signal, modulo the second number, which represents a secure key and is infeasible to generate solely with said second signal and said third signal; and

a second secure key generator having a first input connected to receive an applied fifth signal, having a second input connected to receive said third signal, having a first and second outputs, and having a means for generating at the first output said second signal, that is a transformation of said fifth signal in which said transformation includes raising a first number to a power represented by said fifth signal, modulo the second number, and for generating at the second output a sixth signal, that is a transformation of a said third signal with said fifth signal which transformation includes raising a number represented by said third signal to a power represented by said fifth signal, modulo the second number, which represents the secure key and is infeasible to generate solely with said second signal and said third signal.

8. An apparatus for generating a secure cipher key comprising:

a first secure key generator having a first input connected to receive an applied first signal, having a second input connected to receive a second signal, having a first and second outputs, and having a means for generating at the first output a third signal, said third signal Yi being described by

Y.sub.i =a.sup.x.sbsp.i mod q

where

q=a large prime number

a=a random number, such that 1≦a≦q-1

xi =the first signal which represents a random number, such that 1≦Xi ≦q-1

a transformation of said first signal which is infeasible to invert, and for generating at the second output a fourth signal, said fourth signal Kij being described by

K.sub.ij =Y.sub.j.sup.X.sbsp.i mod q

where

Yj =the second signal

a transformation of said second signal with said first signal, which represents said secure cipher key and is infeasible to generate solely with said second signal and said third signal; and

a second secure key generator having a first input connected to receive an applied fifth signal, having a second input connected to receive said third signal, having a first and second outputs, and having a means for generating at the first output a second signal, said second signal Yj being described by

Y.sub.j =a.sup.X.sbsp.j mod q

where

Xj =the fifth signal which represents a random number, such that 1≦Xj ≦q-1

a transformation of said fifth signal which is infeasible to invert, and for generating at the second output a sixth signal, said sixth signal Kij being described by

K.sub.ij =Y.sub.i.sup.X.sbsp.j mod q

a transformation of said third signal with said fifth signal, which represents the secure key and is infeasible to generate solely with said second signal and said third signal.

US05/830,754
1977-09-06
1977-09-06
Cryptographic apparatus and method

Expired – Lifetime


US4200770A
(en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US05/830,754


US4200770A
(en)

1977-09-06 1977-09-06 Cryptographic apparatus and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US05/830,754

US4200770A
(en)
1977-09-06 1977-09-06 Cryptographic apparatus and method

Publications (1)

Publication Number Publication Date
US4200770A

true
US4200770A
(en)

1980-04-29

ID=25257633

Family Applications (1)

Application Number Title Priority Date Filing Date
US05/830,754
Expired – Lifetime


US4200770A
(en)

1977-09-06 1977-09-06 Cryptographic apparatus and method

Country Status (1)

Cited By (685)

Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title


US4306111A
(en)

*

1979-05-31 1981-12-15 Communications Satellite Corporation Simple and effective public-key cryptosystem


US4309569A
(en)

*

1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures


US4315101A
(en)

*

1979-02-05 1982-02-09 Atalla Technovations Method and apparatus for securing data transmissions


US4379205A
(en)

*

1979-06-22 1983-04-05 Bell Telephone Laboratories, Incorporated Analog signal scrambling system


US4393276A
(en)

*

1981-03-19 1983-07-12 Bell Telephone Laboratories, Incorporated Fourier masking analog signal secure communication system


EP0090771A1
(en)

*

1982-03-26 1983-10-05 GRETAG Aktiengesellschaft Method and apparatus for the enciphered transmission of information


US4423287A
(en)

*

1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation


US4471164A
(en)

*

1981-10-13 1984-09-11 At&T Bell Laboratories Stream cipher operation using public key cryptosystem


US4484027A
(en)

*

1981-11-19 1984-11-20 Communications Satellite Corporation Security system for SSTV encryption


US4514592A
(en)

*

1981-07-27 1985-04-30 Nippon Telegraph & Telephone Public Corporation Cryptosystem


US4558176A
(en)

*

1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software


US4567600A
(en)

*

1982-02-02 1986-01-28 Omnet Associates Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission


US4578531A
(en)

*

1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus


EP0191324A2
(en)

*

1985-02-12 1986-08-20 International Business Machines Corporation Offline pin cryptographic validation


US4633036A
(en)

*

1984-05-31 1986-12-30 Martin E. Hellman Method and apparatus for use in public-key data encryption system


US4634808A
(en)

*

1984-03-15 1987-01-06 M/A-Com Government Systems, Inc. Descrambler subscriber key production system utilizing key seeds stored in descrambler


WO1987000377A1
(en)

*

1985-06-27 1987-01-15 Codart Communications, Inc. Scrambling apparatus


WO1987000151A1
(en)

*

1985-07-03 1987-01-15 Hahn Torbjoern Principle for the storing of gas or liquid


US4638120A
(en)

*

1980-03-03 1987-01-20 Compagnie Internationale Pour L’informatique Cii Honeywell Bull Method and system for transmission of confidential data


US4658093A
(en)

*

1983-07-11 1987-04-14 Hellman Martin E Software distribution system


US4668103A
(en)

*

1982-04-30 1987-05-26 Wilson William J Polygraphic encryption-decryption communications system


US4757468A
(en)

*

1982-09-22 1988-07-12 Intel Corporation Authenticated read-only memory


US4759063A
(en)

*

1983-08-22 1988-07-19 Chaum David L Blind signature systems


WO1988010541A1
(en)

*

1987-06-19 1988-12-29 Motorola, Inc. Duplex analog scrambler


US4802220A
(en)

*

1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security


WO1989003143A1
(en)

*

1986-06-16 1989-04-06 Applied Information Technologies Research Center Field initialized authentication system for protective security of electronic information networks


US4881264A
(en)

*

1987-07-30 1989-11-14 Merkle Ralph C Digital signature system and method based on a conventional encryption function


US4891781A
(en)

*

1987-03-04 1990-01-02 Cylink Corporation Modulo arithmetic processor chip


USRE33189E
(en)

*

1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption


US4956863A
(en)

*

1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication


US4964164A
(en)

*

1989-08-07 1990-10-16 Algorithmic Research, Ltd. RSA computation method for efficient batch processing


US4965568A
(en)

*

1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key


US4991209A
(en)

*

1988-10-17 1991-02-05 Grumman Aerospace Corporation Random local message encryption


US4991210A
(en)

*

1989-05-04 1991-02-05 David Chaum Unpredictable blind signature systems


US4996711A
(en)

*

1989-06-21 1991-02-26 Chaum David L Selected-exponent signature systems


US5020105A
(en)

*

1986-06-16 1991-05-28 Applied Information Technologies Corporation Field initialized authentication system for protective security of electronic information networks


US5054066A
(en)

*

1988-11-16 1991-10-01 Grumman Corporation Error correcting public key cryptographic method and program


US5073934A
(en)

*

1990-10-24 1991-12-17 International Business Machines Corporation Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key


EP0482233A1
(en)

*

1990-10-24 1992-04-29 Omnisec Ag Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction


US5124117A
(en)

*

1989-08-07 1992-06-23 Matsushita Electric Industrial Co., Ltd. Cryptographic key distribution method and system


US5140634A
(en)

*

1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages


US5142578A
(en)

*

1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors


US5146500A
(en)

*

1991-03-14 1992-09-08 Omnisec A.G. Public key cryptographic system using elliptic curves over rings


US5159632A
(en)

*

1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system


US5164988A
(en)

*

1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem


US5189700A
(en)

*

1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents


US5201000A
(en)

*

1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase


US5200999A
(en)

*

1991-09-27 1993-04-06 International Business Machines Corporation Public key cryptosystem key management based on control vectors


US5204901A
(en)

*

1991-08-01 1993-04-20 General Electric Company Public key cryptographic mechanism


US5210710A
(en)

*

1990-10-17 1993-05-11 Cylink Corporation Modulo arithmetic processor chip


US5231668A
(en)

*

1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm


US5239584A
(en)

*

1991-12-26 1993-08-24 General Electric Corporation Method and apparatus for encryption/authentication of data in energy metering applications


US5251258A
(en)

*

1991-03-05 1993-10-05 Nec Corporation Key distribution system for distributing a cipher key between two subsystems by one-way communication


US5265164A
(en)

*

1991-10-31 1993-11-23 International Business Machines Corporation Cryptographic facility environment backup/restore and replication in a public key cryptosystem


US5271061A
(en)

*

1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system


US5299262A
(en)

*

1992-08-13 1994-03-29 The United States Of America As Represented By The United States Department Of Energy Method for exponentiating in cryptographic systems


US5313521A
(en)

*

1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network


US5323146A
(en)

*

1990-03-20 1994-06-21 Siemens Nixdorf Informationssysteme Ag Method for authenticating the user of a data station connected to a computer system


US5335277A
(en)

1981-11-03 1994-08-02 The Personalized Mass Media Corporation Signal processing appparatus and methods


US5361359A
(en)

*

1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer


US5371794A
(en)

*

1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks


US5400403A
(en)

*

1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method


US5414771A
(en)

*

1993-07-13 1995-05-09 Mrj, Inc. System and method for the creation of random sequences and for the cryptographic protection of communications


US5425103A
(en)

*

1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system


US5428686A
(en)

*

1981-09-28 1995-06-27 The United States Of America As Represented By The Direrctor Of The National Security Agency Secure communication system having long-term keying variable


US5450493A
(en)

*

1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus


US5481613A
(en)

*

1994-04-15 1996-01-02 Northern Telecom Limited Computer network cryptographic key distribution system


US5497422A
(en)

*

1993-09-30 1996-03-05 Apple Computer, Inc. Message protection mechanism and graphical user interface therefor


US5499295A
(en)

*

1993-08-31 1996-03-12 Ericsson Inc. Method and apparatus for feature authorization and software copy protection in RF communications devices


US5509071A
(en)

*

1994-04-01 1996-04-16 Microelectronics And Computer Technology Corporation Electronic proof of receipt


US5515441A
(en)

*

1994-05-12 1996-05-07 At&T Corp. Secure communication method and apparatus


EP0714204A2
(en)

1994-11-26 1996-05-29 Lg Electronics Inc Illegal view and copy protection method in digital video system and controlling method thereof


US5535276A
(en)

*

1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography


US5539530A
(en)

*

1993-06-07 1996-07-23 Microsoft Corporation Facsimile machine with custom operational parameters


US5557678A
(en)

*

1994-07-18 1996-09-17 Bell Atlantic Network Services, Inc. System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem


EP0734624A1
(en)

*

1993-12-01 1996-10-02 William Micheal Raike A non-deterministic public key encryption system


US5568554A
(en)

*

1995-01-31 1996-10-22 Digital Equipment Corporation Method for improving the processing and storage performance of digital signature schemes


US5577124A
(en)

*

1995-03-09 1996-11-19 Arithmetica, Inc. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions


WO1996038947A1
(en)

*

1995-06-01 1996-12-05 Chung Nan Chang Secure, swift cryptographic key exchange


US5583939A
(en)

*

1995-06-01 1996-12-10 Chung N. Chang Secure, swift cryptographic key exchange


US5588061A
(en)

*

1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem


US5613004A
(en)

*

1995-06-07 1997-03-18 The Dice Company Steganographic method and device


US5615268A
(en)

*

1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents


US5629982A
(en)

*

1995-03-21 1997-05-13 Micali; Silvio Simultaneous electronic transactions with visible trusted parties


US5646998A
(en)

*

1992-11-17 1997-07-08 Stambler; Leon Secure transaction system and method utilized therein


US5666420A
(en)

*

1995-03-21 1997-09-09 Micali; Silvio Simultaneous electronic transactions


US5666416A
(en)

*

1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system


US5675649A
(en)

*

1995-11-30 1997-10-07 Electronic Data Systems Corporation Process for cryptographic key generation and safekeeping


US5699431A
(en)

*

1995-11-13 1997-12-16 Northern Telecom Limited Method for efficient management of certificate revocation lists and update information


US5717757A
(en)

*

1996-08-29 1998-02-10 Micali; Silvio Certificate issue lists


US5721779A
(en)

*

1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party


US5737419A
(en)

*

1994-11-09 1998-04-07 Bell Atlantic Network Services, Inc. Computer system for securing communications using split private key asymmetric cryptography


US5737425A
(en)

*

1996-05-21 1998-04-07 International Business Machines Corporation Cryptosystem employing worst-case difficult-to solve lattice problem


US5745573A
(en)

*

1994-08-11 1998-04-28 Trusted Information Systems, Inc. System and method for controlling access to a user secret


US5745574A
(en)

*

1995-12-15 1998-04-28 Entegrity Solutions Corporation Security infrastructure for electronic transactions


US5745569A
(en)

*

1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code


US5748738A
(en)

*

1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents


US5748735A
(en)

*

1994-07-18 1998-05-05 Bell Atlantic Network Services, Inc. Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography


US5761305A
(en)

*

1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures


US5764766A
(en)

*

1996-06-11 1998-06-09 Digital Equipment Corporation System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same


WO1998026536A1
(en)

1996-12-09 1998-06-18 Tandem Computers Incorporated Public key cryptographic apparatus and method


US5787156A
(en)

*

1985-07-10 1998-07-28 Ronald A. Katz Technology Licensing, Lp Telephonic-interface lottery system


US5787172A
(en)

*

1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system


US5787367A
(en)

*

1996-07-03 1998-07-28 Chrysler Corporation Flash reprogramming security for vehicle computer


US5793868A
(en)

*

1996-08-29 1998-08-11 Micali; Silvio Certificate revocation system


US5799086A
(en)

*

1994-01-13 1998-08-25 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5812669A
(en)

*

1995-07-19 1998-09-22 Jenkins; Lew Method and system for providing secure EDI over an open network


US5812670A
(en)

*

1995-12-28 1998-09-22 Micali; Silvio Traceable anonymous transactions


US5822432A
(en)

*

1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system


US5838792A
(en)

*

1994-07-18 1998-11-17 Bell Atlantic Network Services, Inc. Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem


US5841864A
(en)

*

1996-08-05 1998-11-24 Motorola Inc. Apparatus and method for authentication and session key exchange in a communication system


US5850443A
(en)

*

1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments


US5870543A
(en)

*

1995-06-07 1999-02-09 Digital River, Inc. System for preventing unauthorized copying of active software


US5872917A
(en)

*

1995-06-07 1999-02-16 America Online, Inc. Authentication using random challenges


US5883954A
(en)

*

1995-06-07 1999-03-16 Digital River, Inc. Self-launching encrypted try before you buy software distribution system


US5883955A
(en)

*

1995-06-07 1999-03-16 Digital River, Inc. On-line try before you buy software distribution system


US5887060A
(en)

*

1995-06-07 1999-03-23 Digital River, Inc. Central database system for automatic software program sales


US5889868A
(en)

*

1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US5889861A
(en)

*

1995-01-12 1999-03-30 Kokusai Denshin Denwa Co., Ltd Identity confidentiality method in radio communication system


US5896455A
(en)

*

1995-05-17 1999-04-20 Certicom Corporation Key agreement and transport protocol with implicit signatures


US5898762A
(en)

*

1985-07-10 1999-04-27 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US5903647A
(en)

*

1995-06-07 1999-05-11 Digital River, Inc. Self-launching encrypted digital information distribution system


US5905799A
(en)

*

1994-07-20 1999-05-18 Bell Atlantic Network Services, Inc. Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem


US5907617A
(en)

*

1995-06-07 1999-05-25 Digital River, Inc. Try before you buy software distribution and marketing system


US5907618A
(en)

*

1997-01-03 1999-05-25 International Business Machines Corporation Method and apparatus for verifiably providing key recovery information in a cryptographic system


US5917893A
(en)

*

1985-07-10 1999-06-29 Ronald A. Katz Technology Licensing, L.P. Multiple format telephonic interface control system


US5926551A
(en)

*

1995-12-28 1999-07-20 International Business Machines Corporation System and method for certifying content of hard-copy documents


WO1999044364A1
(en)

*

1998-02-25 1999-09-02 Cipheractive Communication Security System and method for efficient video encryption utilizing global key and partitioning of data blocks


US5953420A
(en)

*

1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users


US5953424A
(en)

*

1997-03-18 1999-09-14 Hitachi Data Systems Corporation Cryptographic system and protocol for establishing secure authenticated remote access


US5956403A
(en)

*

1994-08-11 1999-09-21 Network Association, Inc. System and method for access field verification


US5966444A
(en)

*

1996-12-06 1999-10-12 Yuan; Chuan K. Method and system for establishing a cryptographic key agreement using linear protocols


US5987130A
(en)

*

1997-03-31 1999-11-16 Chang; Chung Nan Simiplified secure swift cryptographic key exchange


US5999624A
(en)

*

1994-06-30 1999-12-07 Compaq Computer Corporation Remote financial transaction system


US6016344A
(en)

*

1985-07-10 2000-01-18 Katz; Ronald A. Telephonic-interface statistical analysis system


US6026163A
(en)

*

1995-12-13 2000-02-15 Micali; Silvio Distributed split-key cryptosystem and applications


US6028679A
(en)

*

1995-11-13 2000-02-22 Netfax Incorporated Internet global area networks fax system


US6031983A
(en)

*

1997-09-03 2000-02-29 Sgs-Thomson Microelectronics Limited Post image techniques


US6038317A
(en)

*

1997-12-24 2000-03-14 Magliveras; Spyros S. Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2l


US6038318A
(en)

*

1998-06-03 2000-03-14 Cisco Technology, Inc. Optimized machine computation of exponential functions and modulo functions


US6041160A
(en)

*

1996-06-21 2000-03-21 Sony Corporation Method and apparatus for picture encoding and decoding


US6044135A
(en)

*

1985-07-10 2000-03-28 Ronald A. Katz Technology Licensing, L.P. Telephone-interface lottery system


US6044373A
(en)

*

1997-09-29 2000-03-28 International Business Machines Corporation Object-oriented access control method and system for military and commercial file systems


US6041704A
(en)

*

1997-10-29 2000-03-28 Francotyp-Postalia Ag & Co. Method for operating a digitally printing postage meter to generate and check a security imprint


US6044378A
(en)

*

1997-09-29 2000-03-28 International Business Machines Corporation Method and system for a federated digital library by managing links


US6044463A
(en)

*

1994-03-07 2000-03-28 Nippon Telegraph And Telephone Corporation Method and system for message delivery utilizing zero knowledge interactive proof protocol


US6052466A
(en)

*

1997-08-28 2000-04-18 Telefonaktiebolaget L M Ericsson (Publ) Encryption of data packets using a sequence of private keys generated from a public key exchange


US6058187A
(en)

*

1997-04-17 2000-05-02 At&T Corp. Secure telecommunications data transmission


US6058188A
(en)

*

1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system


WO1999067909A3
(en)

*

1998-06-03 2000-05-04 Cryptography Res Inc Secure modular exponentiation with leak minimization for smartcards and other cryptosystems


US6061791A
(en)

*

1997-05-09 2000-05-09 Connotech Experts-Conseils Inc. Initial secret key establishment including facilities for verification of identity


US6061790A
(en)

*

1996-11-20 2000-05-09 Starfish Software, Inc. Network computer system with remote user data encipher methodology


US6071190A
(en)

*

1997-05-21 2000-06-06 Casino Data Systems Gaming device security system: apparatus and method


US6078593A
(en)

*

1997-02-04 2000-06-20 Next Level Communications Method and apparatus for reliable operation of universal voice grade cards


US6091835A
(en)

*

1994-08-31 2000-07-18 Penop Limited Method and system for transcribing electronic affirmations


EP1022696A1
(en)

*

1999-01-25 2000-07-26 Giesecke & Devrient GmbH Method for the exchange of a secret initial value between a processing station and an ic-card


US6097811A
(en)

*

1995-11-02 2000-08-01 Micali; Silvio Tree-based certificate revocation system


US6099408A
(en)

*

1996-12-31 2000-08-08 Walker Digital, Llc Method and apparatus for securing electronic games


US6115607A
(en)

*

1998-01-30 2000-09-05 Qualcomm Incorporated Method and apparatus for reducing messaging traffic in a wireless communication system


US6119227A
(en)

*

1995-04-18 2000-09-12 Hewlett-Packard Company Methods and apparatus for authenticating an originator of a message


US6122736A
(en)

*

1995-04-21 2000-09-19 Certicom Corp. Key agreement and transport protocol with implicit signatures


US6122742A
(en)

*

1997-06-18 2000-09-19 Young; Adam Lucas Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys


US6125183A
(en)

*

1995-10-30 2000-09-26 Obducat Ab Cryptosystem for optical storage


US6134326A
(en)

*

1996-11-18 2000-10-17 Bankers Trust Corporation Simultaneous electronic transactions


US6134325A
(en)

*

1994-05-24 2000-10-17 Certicom Corp. Key transmission system


US6137884A
(en)

*

1995-03-21 2000-10-24 Bankers Trust Corporation Simultaneous electronic transactions with visible trusted parties


WO2000064098A1
(en)

*

1999-04-16 2000-10-26 Försvarets Forskningsanstalt Method for distribution of cryptographic keys in a communication network


US6141750A
(en)

*

1995-03-21 2000-10-31 Micali; Silvio Simultaneous electronic transactions with subscriber verification


US6148400A
(en)

*

1994-02-24 2000-11-14 The Merdan Group, Inc. Apparatus and method for establishing a crytographic link between elements of a system


US6154541A
(en)

*

1997-01-14 2000-11-28 Zhang; Jinglong F Method and apparatus for a robust high-speed cryptosystem


US6154543A
(en)

*

1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability


US6185678B1
(en)

1997-10-02 2001-02-06 Trustees Of The University Of Pennsylvania Secure and reliable bootstrap architecture


US6195432B1
(en)

1996-03-11 2001-02-27 Kabushiki Kaisha Toshiba Software distribution system and software utilization scheme for improving security and user convenience


US6202150B1
(en)

1997-05-28 2001-03-13 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems


US6205249B1
(en)

1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking


US6212279B1
(en)

1998-06-26 2001-04-03 The United States Of America As Represented By The United States National Security Agency Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form


US6226618B1
(en)

1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system


US6237096B1
(en)

1995-01-17 2001-05-22 Eoriginal Inc. System and method for electronic transmission storage and retrieval of authenticated documents


US20010002485A1
(en)

*

1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents


US6243467B1
(en)

1998-07-23 2001-06-05 The United States Of America As Represented By The National Security Agency Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form


US6243466B1
(en)

1997-08-29 2001-06-05 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems with fast key generation


US6253323B1
(en)

1996-11-01 2001-06-26 Intel Corporation Object-based digital signatures


US6272632B1
(en)

1995-02-21 2001-08-07 Network Associates, Inc. System and method for controlling access to a user secret using a key recovery field


US6282295B1
(en)

1997-10-28 2001-08-28 Adam Lucas Young Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers


US6282290B1
(en)

1997-03-28 2001-08-28 Mykotronx, Inc. High speed modular exponentiator


US6301659B1
(en)

1995-11-02 2001-10-09 Silvio Micali Tree-based certificate revocation system


US20010029580A1
(en)

*

1996-07-02 2001-10-11 Moskowitz Scott A. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US6304658B1
(en)

1998-01-02 2001-10-16 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus


US6314190B1
(en)

1997-06-06 2001-11-06 Networks Associates Technology, Inc. Cryptographic system with methods for user-controlled message recovery


US6327661B1
(en)

1998-06-03 2001-12-04 Cryptography Research, Inc. Using unpredictable information to minimize leakage from smartcards and other cryptosystems


US20010053220A1
(en)

*

1998-06-03 2001-12-20 Cryptography Research, Inc. Cryptographic computation using masking to prevent differential power analysis and other attacks


US20020016913A1
(en)

*

2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip


US20020021810A1
(en)

*

2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic key exchange method using efficient elliptic curve


WO2002014986A2
(en)

2000-08-15 2002-02-21 Chargenet Limited Method and apparatus for controlling or monitoring access to the content of a telecommunicable data file


US20020021803A1
(en)

*

2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic identification and digital signature method using efficient elliptic curve


US20020026575A1
(en)

*

1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system


US20020025034A1
(en)

*

2000-08-18 2002-02-28 Solinas Jerome Anthony Cryptographic encryption method using efficient elliptic curve


US20020032860A1
(en)

*

1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature


US6363154B1
(en)

1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes


US20020049909A1
(en)

*

2000-03-08 2002-04-25 Shuffle Master Encryption in a secure computerized gaming system


US20020056040A1
(en)

*

2000-08-10 2002-05-09 Timothy J. Simms System and method for establishing secure communication


US6389403B1
(en)

1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system


US6389136B1
(en)

1997-05-28 2002-05-14 Adam Lucas Young Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys


US20020059518A1
(en)

*

2000-10-17 2002-05-16 Smeets Bernard Jan Marie Method and apparatus for secure leveled access control


US20020062452A1
(en)

*

2000-08-18 2002-05-23 Warwick Ford Countering credentials copying


US20020062447A1
(en)

*

2000-08-31 2002-05-23 King James E. Secure network identification


US6411715B1
(en)

1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key


US20020108034A1
(en)

*

2001-02-02 2002-08-08 Tony Hashem System and method for automatically securing data for transmission


US6434223B2
(en)

1985-07-10 2002-08-13 Ronald A. Katz Technology Licensing, L.P. Telephone interface call processing system with call selectivity


US20020124178A1
(en)

*

1998-01-02 2002-09-05 Kocher Paul C. Differential power analysis method and apparatus


WO2002069087A2
(en)

*

2001-02-22 2002-09-06 Bea Systems, Inc. System and method for message encryption and signing in a transaction processing system


US6449346B1
(en)

1985-07-10 2002-09-10 Ronald A. Katz Technology Licensing, L.P. Telephone-television interface statistical analysis system


US20020129261A1
(en)

*

2001-03-08 2002-09-12 Cromer Daryl Carvis Apparatus and method for encrypting and decrypting data recorded on portable cryptographic tokens


MD1872G2
(en)

*

2000-04-25 2002-09-30 Компания ДЕКАРТ с ограниченной ответственностью Proces and device for providing the authenticated exchange with undisclosed keys through open communication channels


DE10116703A1
(en)

*

2001-03-29 2002-10-10 Francotyp Postalia Ag Method for recording a consumption value and consumption counter with a sensor


US20020146118A1
(en)

*

2001-02-14 2002-10-10 Disanto Frank J. Method and system for selecting encryption keys from a plurality of encryption keys


US20020150243A1
(en)

*

2001-04-12 2002-10-17 International Business Machines Corporation Method and system for controlled distribution of application code and content data within a computer network


US6473508B1
(en)

1998-12-22 2002-10-29 Adam Lucas Young Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys


US20020165824A1
(en)

*

1995-10-02 2002-11-07 Silvio Micali Scalable certificate validation and simplified PKI management


US6487294B1
(en)

1999-03-09 2002-11-26 Paul F. Alexander Secure satellite communications system


US20020186837A1
(en)

*

2001-03-26 2002-12-12 Hopkins W. Dale Multiple prime number generation using a parallel prime number search algorithm


US20020186846A1
(en)

*

2001-06-08 2002-12-12 Nokia Corporation Method for ensuring data transmission security, communication system and communication device


US20020191796A1
(en)

*

2001-06-18 2002-12-19 Hans-Joachim Muschenborn Symmetric and asymmetric encryption method with arbitrarily selectable one-time keys


US20020191787A1
(en)

*

2001-06-19 2002-12-19 Litwin Louis Robert Method for using an access card to create a secure sub-network on a public network


US20020198846A1
(en)

*

2001-05-31 2002-12-26 Guillermo Lao Method and system for subscription digital rights management


US20030014372A1
(en)

*

2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system


US20030018904A1
(en)

*

2001-06-14 2003-01-23 Disanto Frank J. Method and system for preventing computer worm dissemination using encryption


US20030016820A1
(en)

*

2001-06-22 2003-01-23 Volpert Thomas R. System and method for data encryption


US6512376B2
(en)

2000-12-11 2003-01-28 Francotyp-Postalia Ag & Co. Kg Method for determining a requirement to replace a component part and arrangement for the implementation of the method


US6512415B1
(en)

1985-07-10 2003-01-28 Ronald A. Katz Technology Licensing Lp. Telephonic-interface game control system


US20030028765A1
(en)

*

2001-07-31 2003-02-06 Cromer Daryl Carvis Protecting information on a computer readable medium


US6526509B1
(en)

*

1995-05-19 2003-02-25 Siemens Aktiengesellschaft Method for interchange of cryptographic codes between a first computer unit and a second computer unit


US20030041136A1
(en)

*

2001-08-23 2003-02-27 Hughes Electronics Corporation Automated configuration of a virtual private network


US20030041091A1
(en)

*

2001-08-23 2003-02-27 Hughes Electronics Corporation Domain name system resolution


US6530020B1
(en)

1997-06-20 2003-03-04 Fuji Xerox Co., Ltd. Group oriented public key encryption and key management system


EP1291868A1
(en)

*

2001-09-11 2003-03-12 STMicroelectronics S.A. Methods and devices for storing and reading digital data on a storage medium


DE10140792A1
(en)

*

2001-08-20 2003-03-13 Roland Beisert Device for automatic recording of a meter count in a supply meter has an optical image-capture device, an evaluatory/control unit to pick up an image signal and a data transmitter to send data to a central data-processing unit


US6535607B1
(en)

1998-11-02 2003-03-18 International Business Machines Corporation Method and apparatus for providing interoperability between key recovery and non-key recovery systems


US20030055990A1
(en)

*

2001-08-23 2003-03-20 Hughes Electronics Corporation, Single-modem multi-user virtual private network


US20030064784A1
(en)

*

2001-09-28 2003-04-03 William Wells Wide screen gaming apparatus


US20030069074A1
(en)

*

2001-09-10 2003-04-10 Shuffle Master, Inc. Method for developing gaming programs compatible with a computerized gaming operating system and apparatus


US20030069070A1
(en)

*

1997-05-28 2003-04-10 Alcorn Allan E. Gaming apparatus with portrait-mode display


US20030072443A1
(en)

*

2001-06-15 2003-04-17 Harley Robert Joseph Method for generating secure elliptic curves using an arithmetic-geometric mean iteration


US20030078103A1
(en)

*

2001-09-28 2003-04-24 Igt Game development architecture that decouples the game logic from the graphics logic


US20030076957A1
(en)

*

2001-10-18 2003-04-24 Nadarajah Asokan Method, system and computer program product for integrity-protected storage in a personal communication device


US20030079122A1
(en)

*

2001-10-18 2003-04-24 Nadarajah Asokan Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device


US6560337B1
(en)

1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key


US20030092484A1
(en)

*

2001-09-28 2003-05-15 Acres Gaming Incorporated System for awarding a bonus to a gaming device on a wide area network


US20030093663A1
(en)

*

2001-11-09 2003-05-15 Walker Jesse R. Technique to bootstrap cryptographic keys between devices


US20030097573A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System


US20030097561A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System


US20030097655A1
(en)

*

2001-11-21 2003-05-22 Novak Robert E. System and method for providing conditional access to digital content


US6570967B2
(en)

1985-07-10 2003-05-27 Ronald A. Katz Technology Licensing, L.P. Voice-data telephonic interface control system


US20030101136A1
(en)

*

2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System


US20030105954A1
(en)

*

2001-10-18 2003-06-05 Olli Immonen Method, system and computer program product for secure ticketing in a communications device


US20030115151A1
(en)

*

2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system


US20030126439A1
(en)

*

2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access


US20030135464A1
(en)

*

1999-12-09 2003-07-17 International Business Machines Corporation Digital content distribution using web broadcasting services


GB2384403A
(en)

*

2002-01-17 2003-07-23 Toshiba Res Europ Ltd Establishing secure data transmission links using the Diffie-Hellman key exchange protocol and public key cryptography


US20030154286A1
(en)

*

2002-02-13 2003-08-14 Infowave Software, Inc. System for and method of protecting a username during authentication over a non-encrypted channel


US6611812B2
(en)

1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs


US20030161475A1
(en)

*

2002-02-28 2003-08-28 Crumly James D. Encryption of digitized physical information based on physical tags


US6620047B1
(en)

1995-06-29 2003-09-16 Igt Electronic gaming apparatus having authentication data sets


EP0952564A3
(en)

*

1998-04-16 2003-09-17 Citicorp Development Center, Inc. System and method for alternative encryption techniques


US20030188158A1
(en)

*

1998-07-02 2003-10-02 Kocher Paul C. Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks


US20030190046A1
(en)

*

2002-04-05 2003-10-09 Kamerman Matthew Albert Three party signing protocol providing non-linkability


US20030191811A1
(en)

*

2002-04-05 2003-10-09 Tony Hashem Method and system for transferring files using file transfer protocol


US20030200439A1
(en)

*

2002-04-17 2003-10-23 Moskowitz Scott A. Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth


US20030203755A1
(en)

*

2002-04-25 2003-10-30 Shuffle Master, Inc. Encryption in a secure computerized gaming system


US20030204734A1
(en)

*

2002-04-24 2003-10-30 Microsoft Corporation Methods for authenticating potential members invited to join a group


US20030212992A1
(en)

*

1998-12-04 2003-11-13 Ronning Joel A. Apparatus and method for using application signatures for the identification of files


US20030221102A1
(en)

*

2002-05-24 2003-11-27 Jakobsson Bjorn Markus Method and apparatus for performing multi-server threshold password-authenticated key exchange


US20030219143A1
(en)

*

1996-07-02 2003-11-27 Moskowitz Scott A. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20030224858A1
(en)

*

2001-03-08 2003-12-04 Yoseloff Mark L. Computerized gaming system, method and apparatus


US20030229789A1
(en)

*

2002-06-10 2003-12-11 Morais Dinarte R. Secure key exchange with mutual authentication


US20030229779A1
(en)

*

2002-06-10 2003-12-11 Morais Dinarte R. Security gateway for online console-based gaming


US20030235300A1
(en)

*

2002-06-25 2003-12-25 Solinas Jerome A. Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same


US20040002381A1
(en)

*

1995-06-29 2004-01-01 Igt Electronic gaming apparatus with authentication


US20040005051A1
(en)

*

2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device


US6678360B1
(en)

1985-07-10 2004-01-13 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US20040009815A1
(en)

*

2002-06-26 2004-01-15 Zotto Banjamin O. Managing access to content


US20040008842A1
(en)

*

2002-07-10 2004-01-15 Mike Partelow Methods and apparatus for secure document printing


US6684330B1
(en)

1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control


US20040030901A1
(en)

*

2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture


US6697944B1
(en)

1999-10-01 2004-02-24 Microsoft Corporation Digital content distribution, transmission and protection system and method, and portable device for use therewith


US20040039918A1
(en)

*

2002-08-21 2004-02-26 Devi Prashanth Secure approach to send data from one system to another


US20040068654A1
(en)

*

2001-08-08 2004-04-08 Igt Process verification


US6724893B1
(en)

1996-10-11 2004-04-20 The United States Of America As Represented By The National Security Agency Method of passing a cryptographic key that allows third party access to the key


US20040081321A1
(en)

*

1995-04-21 2004-04-29 Marinus Struik Key agreement and transport protocol


US20040083368A1
(en)

*

2002-10-24 2004-04-29 Christian Gehrmann Secure communications


US20040086119A1
(en)

*

1998-03-24 2004-05-06 Moskowitz Scott A. Method for combining transfer functions with predetermined key creation


US20040093493A1
(en)

*

1995-01-17 2004-05-13 Bisbee Stephen F. System and method for electronic transmission, storage and retrieval of authenticated documents


US20040103011A1
(en)

*

2001-05-29 2004-05-27 Kouji Hatano Insurance system


US20040107345A1
(en)

*

2002-10-21 2004-06-03 Brandt David D. System and methodology providing automation security protocols and intrusion detection in an industrial controller environment


US6746330B2
(en)

1999-09-21 2004-06-08 Igt Method and device for implementing a coinless gaming environment


US20040117624A1
(en)

*

2002-10-21 2004-06-17 Brandt David D. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment


US20040128508A1
(en)

*

2001-08-06 2004-07-01 Wheeler Lynn Henry Method and apparatus for access authentication entity


US20040133699A1
(en)

*

2002-12-04 2004-07-08 Tony Hashem System and method for performing data transfer


US6769060B1
(en)

2000-10-25 2004-07-27 Ericsson Inc. Method of bilateral identity authentication


US20040153411A1
(en)

*

2003-01-16 2004-08-05 Canon Europa N.V. Method and device for transferring secure information


US6785813B1
(en)

1997-11-07 2004-08-31 Certicom Corp. Key agreement and transport protocol with implicit signatures


US20040176161A1
(en)

*

2001-09-28 2004-09-09 Shelby Michael B. Method and apparatus for authenticating and verifying communication on a network of gaming devices


US6795919B1
(en)

1998-08-14 2004-09-21 Intel Corporation Unique digital signature


US20040186996A1
(en)

*

2000-03-29 2004-09-23 Gibbs Benjamin K. Unique digital signature


US20040193388A1
(en)

*

2003-03-06 2004-09-30 Geoffrey Outhred Design time validation of systems


US20040199774A1
(en)

*

2003-04-07 2004-10-07 Vasileios Zissimopoulos Secure method for roaming keys and certificates


US20040198479A1
(en)

*

2000-03-08 2004-10-07 Igt Computerized gaming system, method and apparatus


US20040210623A1
(en)

*

2003-03-06 2004-10-21 Aamer Hydrie Virtual network topology generation


US6813366B1
(en)

*

1995-05-08 2004-11-02 Digimarc Corporation Steganographic decoding with transform to spatial domain


US6816821B1
(en)

1997-09-03 2004-11-09 Stmicroelectronics Limited Post image techniques


US20040237031A1
(en)

*

2003-05-13 2004-11-25 Silvio Micali Efficient and secure data currentness systems


US20040243540A1
(en)

*

2000-09-07 2004-12-02 Moskowitz Scott A. Method and device for monitoring and analyzing signals


US20040250073A1
(en)

*

2003-06-03 2004-12-09 Cukier Johnas I. Protocol for hybrid authenticated key establishment


US6834342B2
(en)

2000-08-16 2004-12-21 Eecad, Inc. Method and system for secure communication over unstable public connections


US6834110B1
(en)

1999-12-09 2004-12-21 International Business Machines Corporation Multi-tier digital TV programming for content distribution


US20040267920A1
(en)

*

2003-06-30 2004-12-30 Aamer Hydrie Flexible network load balancing


US20040268358A1
(en)

*

2003-06-30 2004-12-30 Microsoft Corporation Network load balancing with host status information


US20050002533A1
(en)

*

2003-07-01 2005-01-06 Langin-Hooper Jerry Joe Fully secure message transmission over non-secure channels without cryptographic key exchange


US20050010783A1
(en)

*

1995-10-24 2005-01-13 Phil Libin Access control


US6848050B1
(en)

1998-04-16 2005-01-25 Citicorp Development Center, Inc. System and method for alternative encryption techniques


US20050020356A1
(en)

*

2003-07-25 2005-01-27 Cannon Lee E. Gaming apparatus with encryption and method


US20050028001A1
(en)

*

2003-07-29 2005-02-03 Jian Huang Secured software patching and upgrade method for densely deployed networks having spanning-tree topology


US6859791B1
(en)

1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region


US20050050323A1
(en)

*

2003-09-02 2005-03-03 Authenture, Inc. Communication session encryption and authentication system


US20050050322A1
(en)

*

2003-09-02 2005-03-03 Authenture, Inc. Key conversion method for communication session encryption and authentication system


US20050050328A1
(en)

*

2003-09-02 2005-03-03 Authenture, Inc. Key generation method for communication session encryption and authentication system


US20050055548A1
(en)

*

1995-10-24 2005-03-10 Silvio Micali Certificate revocation system


US20050055435A1
(en)

*

2003-06-30 2005-03-10 Abolade Gbadegesin Network load balancing with connection manipulation


US20050097362A1
(en)

*

2003-11-05 2005-05-05 Winget Nancy C. Protected dynamic provisioning of credentials


US20050097097A1
(en)

*

2000-10-24 2005-05-05 Microsoft Corporation System and method for distributed management of shared computers


US20050097317A1
(en)

*

2000-01-12 2005-05-05 Jonathan Trostle Directory enabled secure multicast group communications


US6895502B1
(en)

2000-06-08 2005-05-17 Curriculum Corporation Method and system for securely displaying and confirming request to perform operation on host computer


US6901510B1
(en)

1999-12-22 2005-05-31 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure


US20050125212A1
(en)

*

2000-10-24 2005-06-09 Microsoft Corporation System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model


US20050129242A1
(en)

*

2003-12-16 2005-06-16 Jeff Glickman Security for wireless transmission


US20050135615A1
(en)

*

1996-12-20 2005-06-23 Moskowitz Scott A. Z-transform implementation of digital watermarks


US20050138361A1
(en)

*

2003-12-22 2005-06-23 Mart Saarepera System and method for generating a digital certificate


US20050154879A1
(en)

*

2004-01-09 2005-07-14 David Engberg Batch OCSP and batch distributed OCSP


US20050154676A1
(en)

*

1998-12-04 2005-07-14 Digital River, Inc. Electronic commerce system method for detecting fraud


US20050152538A1
(en)

*

2004-01-08 2005-07-14 Encryption Solutions, Inc. Method of encrypting and transmitting data and system for transmitting encrypted data


US20050152550A1
(en)

*

2004-01-08 2005-07-14 Encryption Solutions, Inc. System for transmitting encrypted data


US20050154918A1
(en)

*

2003-11-19 2005-07-14 David Engberg Distributed delegated path discovery and validation


US20050165770A1
(en)

*

2000-03-14 2005-07-28 Sony Corporation Information providing apparatus and method, information processing apparatus and method, and program storage medium


US20050172145A1
(en)

*

2004-01-30 2005-08-04 Kindberg Timothy Paul J.G. Validation for secure device associations


US20050175176A1
(en)

*

2004-02-09 2005-08-11 Microsoft Corporation Primitives for fast secure hash functions and stream ciphers


US6931126B1
(en)

*

1999-01-27 2005-08-16 Lucent Technologies Inc. Non malleable encryption method and apparatus using key-encryption keys and digital signature


US6935953B2
(en)

2000-08-31 2005-08-30 Adrian R. Marcu Method and apparatus for encoding vouchers in a casino gaming system


US20050192092A1
(en)

*

2001-09-28 2005-09-01 Igt Decoupling of the graphical presentation of a game from the presentation logic


US20050190912A1
(en)

*

2001-03-26 2005-09-01 Hopkins W. D. Multiple cryptographic key precompute and store


US20050193203A1
(en)

*

2004-02-27 2005-09-01 Microsoft Corporation Security associations for devices


US6941457B1
(en)

2000-06-30 2005-09-06 Cisco Technology, Inc. Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key


US20050195973A1
(en)

*

2004-03-03 2005-09-08 King Fahd University Of Petroleum And Minerals Method for XZ-elliptic curve cryptography


US20050198502A1
(en)

*

2004-03-05 2005-09-08 Cha Sang H. Digital broadcasting system and contents protection method using the same


US20050216422A1
(en)

*

2000-09-08 2005-09-29 International Business Machines Corporation. System and method for secure authentication of external software modules provided by third parties


US6957330B1
(en)

1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling


US6959288B1
(en)

1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system


US20050246529A1
(en)

*

2004-04-30 2005-11-03 Microsoft Corporation Isolated persistent identity storage for authentication of computing devies


US6965992B1
(en)

2000-02-24 2005-11-15 3Com Corporation Method and system for network security capable of doing stronger encryption with authorized devices


US20050257057A1
(en)

*

2004-05-12 2005-11-17 Viatcheslav Ivanov System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient


US20050262418A1
(en)

*

2002-10-24 2005-11-24 Christian Gehrmann Message authentication


US20050267926A1
(en)

*

2004-05-27 2005-12-01 King Fahd University Of Petroleum And Minerals Finite field serial-serial multiplication/reduction structure and method


US20050273609A1
(en)

*

2004-06-04 2005-12-08 Nokia Corporation Setting up a short-range wireless data transmission connection between devices


DE10136608B4
(en)

*

2001-07-16 2005-12-08 Francotyp-Postalia Ag & Co. Kg Method and system for real-time recording with security module


US6976166B2
(en)

2001-02-06 2005-12-13 Hewlett-Packard Development Company, L.P. Method and apparatus for partial encryption of content


US6978382B1
(en)

2000-08-14 2005-12-20 Qualcomm Incorporated Method and an apparatus for granting use of a session of a packet data transmission standard designated by an identifier


US6983371B1
(en)

1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content


US6986044B1
(en)

1998-10-14 2006-01-10 Fuji Xerox Co., Ltd. Method for group unit encryption/decryption, and method and apparatus for writing signature


US6985869B1
(en)

2000-01-21 2006-01-10 Nextmed, Llc Digital prescription carrier and monitor system


US20060010323A1
(en)

*

2004-07-07 2006-01-12 Xerox Corporation Method for a repository to provide access to a document, and a repository arranged in accordance with the same method


US6987855B1
(en)

*

1999-09-10 2006-01-17 Cisco Technology, Inc. Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups


US7007164B1
(en)

*

1998-11-03 2006-02-28 Infineon Technologies Ag Method and array for authenticating a first instance and a second instance


US7007166B1
(en)

1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking


US20060045263A1
(en)

*

2004-08-26 2006-03-02 International Business Machines Corporation Method and apparatus for efficient generation of modulo inverse for public key cryptosystems


US20060053125A1
(en)

*

2002-10-02 2006-03-09 Bank One Corporation System and method for network-based project management


US7013389B1
(en)

1999-09-29 2006-03-14 Cisco Technology, Inc. Method and apparatus for creating a secure communication channel among multiple event service nodes


US20060062384A1
(en)

*

2004-09-21 2006-03-23 Nortel Networks Limited Method and apparatus for generating large numbers of encryption keys


US7020282B1
(en)

*

2000-09-05 2006-03-28 Chung Nan Chang Simplified secure, swift cryptographic key exchange


US7024559B1
(en)

2002-06-28 2006-04-04 The United States Of America As Represented By The National Security Agency Method of elliptic curve digital signature using expansion in joint sparse form


US20060072743A1
(en)

*

2002-10-17 2006-04-06 Mats Naslund Cryptography using finite fields of odd characteristic on binary hardware


US20060089912A1
(en)

*

1998-08-13 2006-04-27 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content


US20060093138A1
(en)

*

2004-10-29 2006-05-04 Alain Durand Secure authenticated channel


US20060101269A1
(en)

*

1996-07-02 2006-05-11 Wistaria Trading, Inc. Method and system for digital watermarking


US20060097843A1
(en)

*

2004-11-10 2006-05-11 Phil Libin Actuating a security system using a wireless device


US7062044B1
(en)

2002-06-28 2006-06-13 The United States Of America As Represented By The National Security Agency Method of elliptic curve cryptographic key agreement using coefficient splitting


US7062043B1
(en)

2002-06-28 2006-06-13 The United States Of America As Represented By The National Security Agency Method of elliptic curve digital signature using coefficient splitting


US7073068B2
(en)

2002-05-24 2006-07-04 Lucent Technologies Inc. Method and apparatus for distributing shares of a password for use in multi-server password authentication


US20060149988A1
(en)

*

2001-05-09 2006-07-06 Thomas Terence N Calculating apparatus having a plurality of stages


US20060153364A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Asymmetric key cryptosystem based on shared knowledge


US20060153367A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Digital signature system based on shared knowledge


US20060156012A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Facilitating digital signature based on ephemeral private key


US20060156013A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Digital signature software using ephemeral private key and system


US20060153366A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Verifying digital signature based on shared knowledge


US20060153368A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Software for providing based on shared knowledge public keys having same private key


US20060153365A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Providing digital signature and public key based on shared knowledge


US20060153371A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Generating digital signatures using ephemeral cryptographic key


US20060153370A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Generating public-private key pair based on user input data


US20060153369A1
(en)

*

2005-01-07 2006-07-13 Beeson Curtis L Providing cryptographic key based on user input data


US7080041B2
(en)

2000-05-24 2006-07-18 Esecuredocs, Inc. System and method for production and authentication of original documents


US7085376B2
(en)

2001-02-14 2006-08-01 Copytele, Inc. Method and system for securely exchanging encryption key determination information


US7089420B1
(en)

2000-05-24 2006-08-08 Tracer Detection Technology Corp. Authentication method and system


US20060177056A1
(en)

*

2003-07-10 2006-08-10 Peter Rostin Secure seed generation protocol


US20060179319A1
(en)

*

2005-02-10 2006-08-10 International Business Machines Corporation Method and structure for challenge-response signatures and high-performance secure diffie-hellman protocols


US20060184807A1
(en)

*

1999-09-02 2006-08-17 Kocher Paul C Specialized circuitry for cryptographic authentication and other purposes


US7095851B1
(en)

1999-03-11 2006-08-22 Tecsec, Inc. Voice and data encryption method using a cryptographic key split combiner


EP1693982A2
(en)

*

1999-03-11 2006-08-23 TECSEC, Inc. Method for establishing a secure communication channel


US7103185B1
(en)

1999-12-22 2006-09-05 Cisco Technology, Inc. Method and apparatus for distributing and updating private keys of multicast group managers using directory replication


US7111173B1
(en)

1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit


USRE39370E1
(en)

1995-06-29 2006-10-31 Igt Electronic casino gaming system with improved play capacity, authentication and security


US7128650B2
(en)

2001-09-12 2006-10-31 Igt Gaming machine with promotional item dispenser


USRE39369E1
(en)

1995-06-29 2006-10-31 Igt Electronic casino gaming system with improved play capacity, authentication and security


US7136484B1
(en)

2001-10-01 2006-11-14 Silicon Image, Inc. Cryptosystems using commuting pairs in a monoid


US20060265736A1
(en)

*

2005-05-19 2006-11-23 Gilbarco Inc. Encryption system and method for legacy devices in a retail environment


US20060271341A1
(en)

*

2003-03-06 2006-11-30 Microsoft Corporation Architecture for distributed computing system and automated design, deployment, and management of distributed applications


US20070006218A1
(en)

*

2005-06-29 2007-01-04 Microsoft Corporation Model-based virtual system provisioning


US7162035B1
(en)

2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system


US7162036B2
(en)

2001-08-06 2007-01-09 Igt Digital identification of unique game characteristics


US20070011458A1
(en)

*

1996-07-02 2007-01-11 Scott A. Moskowitz Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20070016393A1
(en)

*

2005-06-29 2007-01-18 Microsoft Corporation Model-based propagation of attributes


US20070027921A1
(en)

*

2005-08-01 2007-02-01 Billy Alvarado Context based action


US20070027930A1
(en)

*

2005-08-01 2007-02-01 Billy Alvarado Universal data aggregation


US20070028113A1
(en)

*

1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions


US20070033398A1
(en)

*

2005-08-04 2007-02-08 Gilbarco Inc. System and method for selective encryption of input data during a retail transaction


US20070036353A1
(en)

*

2005-05-31 2007-02-15 Interdigital Technology Corporation Authentication and encryption methods using shared secret randomness in a joint channel


US7181014B1
(en)

1999-09-10 2007-02-20 Cisco Technology, Inc. Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange


US7181017B1
(en)

2001-03-23 2007-02-20 David Felsher System and method for secure three-party communications


US20070058808A1
(en)

*

2005-09-12 2007-03-15 Interdigital Technology Corporation Method and system for deriving an encryption key using joint randomness not shared by others


US20070064940A1
(en)

*

1999-03-24 2007-03-22 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems


US7203841B2
(en)

2001-03-08 2007-04-10 Igt Encryption in a secure computerized gaming system


WO2007039803A1
(en)

2005-10-03 2007-04-12 Nokia Corporation System, method and computer program product for authenticating a data agreement between network entities


US20070110240A1
(en)

*

1999-12-07 2007-05-17 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US7225331B1
(en)

2000-06-15 2007-05-29 International Business Machines Corporation System and method for securing data on private networks


US20070130069A1
(en)

*

2005-12-06 2007-06-07 Microsoft Corporation Encapsulating Address Components


WO2007067372A1
(en)

*

2005-12-05 2007-06-14 Microsoft Corporation Distribution of keys for encryption/decryption


US20070135216A1
(en)

*

2001-11-26 2007-06-14 Igt Pass-through live validation device and method


US20070149280A1
(en)

*

2000-08-21 2007-06-28 Igt Method and Apparatus for Software Authentication


US7242772B1
(en)

2000-09-07 2007-07-10 Eastman Kodak Company Encryption apparatus and method for synchronizing multiple encryption keys with a data stream


US7243232B2
(en)

1995-04-21 2007-07-10 Certicom Corp. Key agreement and transport protocol


US20070177729A1
(en)

*

2005-01-27 2007-08-02 Interdigital Technology Corporation Generation of perfectly secret keys in wireless communication networks


US7260716B1
(en)

1999-09-29 2007-08-21 Cisco Technology, Inc. Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach


CN1333332C
(en)

*

1997-03-20 2007-08-22 凤凰技术有限公司 Fault recoverying method for computer system, computer and method for operating computer


US20070214361A1
(en)

*

2006-10-11 2007-09-13 Frank Rubin Device, System and Method for Fast Secure Message Encryption Without Key Distribution


US20070233769A1
(en)

*

2006-03-28 2007-10-04 Moshier Michael A A Scalable, Faster Method and Apparatus for Montgomery Multiplication


US20070242729A1
(en)

*

2006-04-13 2007-10-18 Quinn Liam B Ultra-wideband (UWB) secure wireless device pairing and associated systems


US20070265099A1
(en)

*

2000-03-03 2007-11-15 Cole Joseph W Gaming apparatus having wide screen display


US20070266247A1
(en)

*

2006-05-12 2007-11-15 Research In Motion Limited System and method for exchanging encryption keys between a mobile device and a peripheral output device


US20070287455A1
(en)

*

2006-06-12 2007-12-13 Benq Corporation Method of registering a network, and mobile station and communication system using the same


US20070297614A1
(en)

*

2006-10-11 2007-12-27 Frank Rubin Device, System and Method for Fast Secure Message Encryption Without Key Distribution


US7315950B1
(en)

*

1999-12-20 2008-01-01 International Business Machines Corporation Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibility


US20080016550A1
(en)

*

2006-06-14 2008-01-17 Mcalister Donald K Securing network traffic by distributing policies in a hierarchy over secure tunnels


US20080022091A1
(en)

*

2006-07-19 2008-01-24 Sanjay Deshpande Secure Communications


US20080019509A1
(en)

*

2006-07-10 2008-01-24 Al-Gahtani Theeb A Scalar multiplication method with inherent countermeasures


US20080028222A1
(en)

*

2000-09-20 2008-01-31 Blue Spike, Inc. Security based on subliminal and supraliminal channels for data objects


US20080040775A1
(en)

*

2006-08-11 2008-02-14 Hoff Brandon L Enforcing security groups in network of data processors


US20080040603A1
(en)

*

2004-01-08 2008-02-14 Encryption Solutions, Inc. Multiple level security system and method for encrypting data within documents


US7334125B1
(en)

2001-11-27 2008-02-19 Cisco Technology, Inc. Facilitating secure communications among multicast nodes in a telecommunications network


US7337315B2
(en)

1995-10-02 2008-02-26 Corestreet, Ltd. Efficient certificate revocation


US20080059214A1
(en)

*

2003-03-06 2008-03-06 Microsoft Corporation Model-Based Policy Application


US7346472B1
(en)

2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US20080069345A1
(en)

*

2006-10-11 2008-03-20 Frank Rubin Device, System and Method for Cryptographic Key Exchange


US20080069346A1
(en)

*

2006-10-11 2008-03-20 Frank Rubin Device, System and Method for Cryptographic Key Exchange


US20080072281A1
(en)

*

2006-09-14 2008-03-20 Willis Ronald B Enterprise data protection management for providing secure communication in a network


US20080075088A1
(en)

*

2006-09-27 2008-03-27 Cipheroptics, Inc. IP encryption over resilient BGP/MPLS IP VPN


US20080077976A1
(en)

*

2006-09-27 2008-03-27 Rockwell Automation Technologies, Inc. Cryptographic authentication protocol


US7353396B2
(en)

1995-10-02 2008-04-01 Corestreet, Ltd. Physical access control


US20080083011A1
(en)

*

2006-09-29 2008-04-03 Mcalister Donald Protocol/API between a key server (KAP) and an enforcement point (PEP)


US20080082446A1
(en)

*

1999-10-01 2008-04-03 Hicks Christian B Remote Authorization for Unlocking Electronic Data System and Method


US20080102919A1
(en)

*

2001-09-28 2008-05-01 Igt Pluggable modular gaming modifiers and configuration templates for gaming environments


US20080120191A1
(en)

*

2006-11-21 2008-05-22 Gilbarco Inc. Remote display tamper detection using data integrity operations


US20080133641A1
(en)

*

2005-08-01 2008-06-05 Gent Robert Paul Van Methods for publishing content


US20080144812A1
(en)

*

2006-12-19 2008-06-19 Al-Gahtani Theeb A Method for performing iterative scalar multiplication which is protected against address bit attack


US20080162938A1
(en)

*

1995-04-21 2008-07-03 Marinus Struik Key agreement and transport protocol


US20080181397A1
(en)

*

2007-01-25 2008-07-31 John Wilson Dorminy Secure data transmission and storage using limited-domain functions


US20080192739A1
(en)

*

2007-02-14 2008-08-14 Serge-Paul Carrasco Ethernet encryption over resilient virtual private LAN services


US20080205653A1
(en)

*

2005-09-20 2008-08-28 Telefonaktiebolaget Lm Ericsson (Publ) Method and Mobility Anchor Point for Authenticating Updates from Mobile Node


US20080205638A1
(en)

*

2007-02-07 2008-08-28 Al-Gahtani Theeb A Method for elliptic curve scalar multiplication


WO2008105703A1
(en)

*

2007-01-19 2008-09-04 Bjoerhn Anders Pos module


US7424615B1
(en)

2001-07-30 2008-09-09 Apple Inc. Mutually authenticated secure key exchange (MASKE)


US7434046B1
(en)

1999-09-10 2008-10-07 Cisco Technology, Inc. Method and apparatus providing secure multicast group communication


EP1983682A2
(en)

2007-04-18 2008-10-22 Memory Experts International Inc. Authentication system and method


US20080260153A1
(en)

*

2007-04-20 2008-10-23 John Almeida Symmetric and asymmetric cryptography using shadow numbers


US20080304669A1
(en)

*

2007-06-11 2008-12-11 The Boeing Company Recipient-signed encryption certificates for a public key infrastructure


US7475246B1
(en)

1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server


DE102005026943B4
(en)

*

2004-06-07 2009-01-29 Rockwell Electronic Commerce Corp., Wood Dale Method and system for secure customer communication


US20090055315A1
(en)

*

1996-06-05 2009-02-26 Fraud Control System.Com Method Of Billing A Purchase Made Over A Computer Network


US7500100B1
(en)

2003-09-10 2009-03-03 Cisco Technology, Inc. Method and apparatus for verifying revocation status of a digital certificate


US20090060175A1
(en)

*

2007-08-29 2009-03-05 Schneider James P Embedding a secret in a bit string for safeguarding the secret


US20090068985A1
(en)

*

2007-09-12 2009-03-12 At&T Knowledge Ventures, L.P. Method and apparatus for end-to-end mobile user security


US7524245B2
(en)

1996-12-31 2009-04-28 Walker Digital, Llc System and method for securing electronic games


US20090154696A1
(en)

*

2007-11-05 2009-06-18 Gilbarco Inc. System and Method for Secure Keypad Protocol Emulation in a Fuel Dispenser Environment


US7567504B2
(en)

2003-06-30 2009-07-28 Microsoft Corporation Network load balancing with traffic routing


US7574343B2
(en)

2000-10-24 2009-08-11 Microsoft Corporation System and method for logical modeling of distributed computer systems


US20090204457A1
(en)

*

2007-11-01 2009-08-13 Buhrmann Michael F System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device


US20090204815A1
(en)

*

2008-02-12 2009-08-13 Dennis Charles L System and method for wireless device based user authentication


US20090217043A1
(en)

*

2008-02-26 2009-08-27 Motorola, Inc. Method and system for mutual authentication of nodes in a wireless communication network


US7587368B2
(en)

2000-07-06 2009-09-08 David Paul Felsher Information record infrastructure, system and method


US7596223B1
(en)

2000-09-12 2009-09-29 Apple Inc. User control of a secure wireless computer network


US7600129B2
(en)

1995-10-02 2009-10-06 Corestreet, Ltd. Controlling access using additional data


US20090268908A1
(en)

*

2008-04-29 2009-10-29 Daniel Martin Bikel Methods and Apparatus for Securely Classifying Data


US7613822B2
(en)

2003-06-30 2009-11-03 Microsoft Corporation Network load balancing with session information


US7617124B1
(en)

1998-12-04 2009-11-10 Digital River, Inc. Apparatus and method for secure downloading of files


US20090323958A1
(en)

*

2008-05-29 2009-12-31 Schneider James P Extending a secret bit string to safeguard the secret


US20090327730A1
(en)

*

2007-04-25 2009-12-31 Konica Minolta Holdings, Inc. Apparatus and method for encrypted communication processing


US20100014669A1
(en)

*

2006-07-13 2010-01-21 Wenyu Jiang Codec-independent encryption of material that represents stimuli intended for human perception


US7684964B2
(en)

2003-03-06 2010-03-23 Microsoft Corporation Model and system state synchronization


US7716486B2
(en)

1995-10-02 2010-05-11 Corestreet, Ltd. Controlling group access to doors


US7730317B2
(en)

1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks


US20100166174A1
(en)

*

2008-12-29 2010-07-01 Lahouari Ghouti Hash functions using elliptic curve cryptography


US20100169658A1
(en)

*

2008-12-30 2010-07-01 Lahouari Ghouti Elliptic curve-based message authentication code


US7769344B1
(en)

1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods


US20100217978A1
(en)

*

2007-08-29 2010-08-26 Schneider James P Method for sharing secret information among cooperating parties


US7797147B2
(en)

2005-04-15 2010-09-14 Microsoft Corporation Model-based system monitoring


US7802144B2
(en)

2005-04-15 2010-09-21 Microsoft Corporation Model-based system monitoring


US7822989B2
(en)

1995-10-02 2010-10-26 Corestreet, Ltd. Controlling access to an area


US20100325423A1
(en)

*

2009-06-22 2010-12-23 Craig Stephen Etchegoyen System and Method for Securing an Electronic Communication


US7899753B1
(en)

2002-03-25 2011-03-01 Jpmorgan Chase Bank, N.A Systems and methods for time variable financial authentication


EP2299653A1
(en)

2000-12-22 2011-03-23 Mosaid Technologies Incorporated Packet encryption system and method


US7917468B2
(en)

2005-08-01 2011-03-29 Seven Networks, Inc. Linking of personal information management data


US7941309B2
(en)

2005-11-02 2011-05-10 Microsoft Corporation Modeling IT operations/policies


US7966496B2
(en)

1999-07-02 2011-06-21 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services


US20110156896A1
(en)

*

1999-02-01 2011-06-30 Hoffberg Steven M Internet appliance system and method


US7987501B2
(en)

2001-12-04 2011-07-26 Jpmorgan Chase Bank, N.A. System and method for single session sign-on


US20110200186A1
(en)

*

2010-02-18 2011-08-18 Lahouari Ghouti Method of cipher block chaining using elliptic curve cryptography


US20110200187A1
(en)

*

2010-02-18 2011-08-18 Lahouari Ghouti Elliptic polynomial cryptography with secret key embedding


US20110200185A1
(en)

*

2010-02-18 2011-08-18 Lahouari Ghouti Method of performing elliptic polynomial cryptography with elliptic polynomial hopping


US20110200188A1
(en)

*

2010-02-18 2011-08-18 Lahouari Ghouti Method of performing cipher block chaining using elliptic polynomial cryptography


US8010082B2
(en)

2004-10-20 2011-08-30 Seven Networks, Inc. Flexible billing architecture


US20110213977A1
(en)

*

2010-02-26 2011-09-01 Research In Motion Limited Methods and devices for computing a shared encryption key


US8015597B2
(en)

1995-10-02 2011-09-06 Corestreet, Ltd. Disseminating additional data used for controlling access


US8064583B1
(en)

2005-04-21 2011-11-22 Seven Networks, Inc. Multiple data store authentication


US8078158B2
(en)

2008-06-26 2011-12-13 Seven Networks, Inc. Provisioning applications for a mobile device


US8095967B2
(en)

2006-07-27 2012-01-10 White Sky, Inc. Secure web site authentication using web site characteristics, secure user credentials and private browser


US8107921B2
(en)

2008-01-11 2012-01-31 Seven Networks, Inc. Mobile virtual network operator


US8116214B2
(en)

2004-12-03 2012-02-14 Seven Networks, Inc. Provisioning of e-mail settings for a mobile terminal


US8127342B2
(en)

2002-01-08 2012-02-28 Seven Networks, Inc. Secure end-to-end transport through intermediary nodes


US8160960B1
(en)

2001-06-07 2012-04-17 Jpmorgan Chase Bank, N.A. System and method for rapid updating of credit information


US8166164B1
(en)

2010-11-01 2012-04-24 Seven Networks, Inc. Application and network-based long poll request detection and cacheability assessment therefor


US8171567B1
(en)

2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system


US8185940B2
(en)

2001-07-12 2012-05-22 Jpmorgan Chase Bank, N.A. System and method for providing discriminated content to network users


US8190513B2
(en)

1996-06-05 2012-05-29 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network


US8190701B2
(en)

2010-11-01 2012-05-29 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache


WO2012072772A1
(en)

2010-12-02 2012-06-07 Nagravision S.A. System and method to record encrypted content with access conditions


US8204945B2
(en)

2000-06-19 2012-06-19 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail


US8209709B2
(en)

2005-03-14 2012-06-26 Seven Networks, Inc. Cross-platform event engine


US20120201378A1
(en)

*

2011-02-03 2012-08-09 Mohamed Nabeel Efficient, remote, private tree-based classification using cryptographic techniques


US8261319B2
(en)

1995-10-24 2012-09-04 Corestreet, Ltd. Logging access attempts to an area


US8301493B2
(en)

2002-11-05 2012-10-30 Jpmorgan Chase Bank, N.A. System and method for providing incentives to consumers to share information


EP0742656B2
(en)

1995-05-12 2012-10-31 ACTIA Automotive Method and system for the security of data transmission between a sensor and a recording unit


WO2012150396A2
(en)

2011-05-05 2012-11-08 Altis Semiconductor Device and method for fast multiplication


WO2012152607A1
(en)

2011-05-09 2012-11-15 Compagnie Industrielle Et Financiere D’ingenierie “Ingenico” Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm


US8316098B2
(en)

2011-04-19 2012-11-20 Seven Networks Inc. Social caching for device resource sharing and management


US8326985B2
(en)

2010-11-01 2012-12-04 Seven Networks, Inc. Distributed management of keep-alive message signaling for mobile network resource conservation and optimization


US8332651B2
(en)

2010-02-18 2012-12-11 King Fahd University Of Petroleum And Minerals Method of generating a password protocol using elliptic polynomial cryptography


WO2012172080A1
(en)

2011-06-17 2012-12-20 Universite Libre De Bruxelles Generation of cryptographic keys


US20130016833A1
(en)

*

2005-04-04 2013-01-17 Research In Motion Limited Securely using a display to exchange information


WO2013009420A1
(en)

2011-06-09 2013-01-17 Power Tagging Technologies, Inc. System and method for grid based cyber security


US8364181B2
(en)

2007-12-10 2013-01-29 Seven Networks, Inc. Electronic-mail filtering for mobile devices


US8364963B2
(en)

2004-05-10 2013-01-29 Sony Ericsson Mobile Communications, Ab Method and device for bluetooth pairing


US8364136B2
(en)

1999-02-01 2013-01-29 Steven M Hoffberg Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system


US8374634B2
(en)

2007-03-16 2013-02-12 Finsphere Corporation System and method for automated analysis comparing a wireless device location with another geographic location


US8381087B1
(en)

1999-07-26 2013-02-19 G&H Nevada-Tek Automated electronic document filing system, method, and article of manufacture


US8411562B2
(en)

2004-05-26 2013-04-02 Panasonic Corporation Network system and method for providing an ad-hoc access environment


US8417823B2
(en)

2010-11-22 2013-04-09 Seven Network, Inc. Aligning data transfer to optimize connections established for transmission over a wireless network


US8438633B1
(en)

2005-04-21 2013-05-07 Seven Networks, Inc. Flexible real-time inbox access


US8484314B2
(en)

2010-11-01 2013-07-09 Seven Networks, Inc. Distributed caching in a wireless network of content delivered for a mobile application over a long-held request


US8489728B2
(en)

2005-04-15 2013-07-16 Microsoft Corporation Model-based system monitoring


US8509426B1
(en)

2010-12-01 2013-08-13 King Fahd University Of Petroleum And Minerals XZ-elliptic curve cryptography system and method


WO2013118082A1
(en)

2012-02-08 2013-08-15 Scientific Games Holdings Limited Logistics methods for portable, mobile processing of lottery and contest tickets


WO2013118081A1
(en)

2012-02-08 2013-08-15 Scientific Games Holdings Limited Logistics methods for processing lottery and contest tickets with generic hardware


US8542825B2
(en)

2007-10-15 2013-09-24 Adobe Systems Incorporated Imparting cryptographic information in network communications


US8600830B2
(en)

2003-02-05 2013-12-03 Steven M. Hoffberg System and method for providing a payment to a non-winning auction participant


US8621075B2
(en)

2011-04-27 2013-12-31 Seven Metworks, Inc. Detecting and preserving state for satisfying application requests in a distributed proxy and cache system


US8621227B2
(en)

2010-12-28 2013-12-31 Authernative, Inc. System and method for cryptographic key exchange using matrices


US8626942B2
(en)

2003-02-13 2014-01-07 Adobe Systems Incorporated Real-time priority-based media communication


US8627097B2
(en)

2012-03-27 2014-01-07 Igt System and method enabling parallel processing of hash functions using authentication checkpoint hashes


US8630942B2
(en)

1996-06-05 2014-01-14 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network


US20140032865A1
(en)

*

2012-07-26 2014-01-30 Yuji Nagai Storage system in which information is prevented


US8656484B2
(en)

2010-12-28 2014-02-18 Authernative, Inc. System and method for mutually authenticated cryptographic key exchange using matrices


US8670564B1
(en)

2006-08-14 2014-03-11 Key Holdings, LLC Data encryption system and method


US8693494B2
(en)

2007-06-01 2014-04-08 Seven Networks, Inc. Polling


US8700728B2
(en)

2010-11-01 2014-04-15 Seven Networks, Inc. Cache defeat detection and caching of content addressed by identifiers intended to defeat cache


US8699701B2
(en)

2010-12-01 2014-04-15 King Fahd University Method of performing XZ-elliptic curve cryptography for use with network security protocols


US8707042B2
(en)

2008-08-28 2014-04-22 Red Hat, Inc. Sharing keys between cooperating parties


EP2735117A1
(en)

*

2011-07-22 2014-05-28 Netflix, Inc. System and method for obfuscating initiation values of a cryptography protocol


US8750123B1
(en)

2013-03-11 2014-06-10 Seven Networks, Inc. Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network


US8761756B2
(en)

2005-06-21 2014-06-24 Seven Networks International Oy Maintaining an IP connection in a mobile network


US8775794B2
(en)

2010-11-15 2014-07-08 Jpmorgan Chase Bank, N.A. System and method for end to end encryption


US8774844B2
(en)

2007-06-01 2014-07-08 Seven Networks, Inc. Integrated messaging


US8775631B2
(en)

2012-07-13 2014-07-08 Seven Networks, Inc. Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications


US8787947B2
(en)

2008-06-18 2014-07-22 Seven Networks, Inc. Application discovery on mobile devices


US8793305B2
(en)

2007-12-13 2014-07-29 Seven Networks, Inc. Content delivery to a mobile device from a content service


US8794516B2
(en)

1999-10-25 2014-08-05 Smartflash, LLC Data storage and access systems


US8799410B2
(en)

2008-01-28 2014-08-05 Seven Networks, Inc. System and method of a relay server for managing communications and notification between a mobile device and a web access server


US8805334B2
(en)

2004-11-22 2014-08-12 Seven Networks, Inc. Maintaining mobile terminal information for secure communications


US8812695B2
(en)

2012-04-09 2014-08-19 Seven Networks, Inc. Method and system for management of a virtual network connection without heartbeat messages


US8831564B2
(en)

2007-03-16 2014-09-09 Finsphere Corporation System and method for identity protection using mobile device signaling network derived location pattern recognition


US8832228B2
(en)

2011-04-27 2014-09-09 Seven Networks, Inc. System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief


US8838783B2
(en)

2010-07-26 2014-09-16 Seven Networks, Inc. Distributed caching for resource and mobile network traffic management


US20140282957A1
(en)

*

2013-03-12 2014-09-18 Cable Television Laboratories, Inc. Dtcp certificate authentication over tls protocol


US8843153B2
(en)

2010-11-01 2014-09-23 Seven Networks, Inc. Mobile traffic categorization and policy for network use optimization while preserving user experience


US8849902B2
(en)

2008-01-25 2014-09-30 Seven Networks, Inc. System for providing policy based content service in a mobile network


US8849716B1
(en)

2001-04-20 2014-09-30 Jpmorgan Chase Bank, N.A. System and method for preventing identity theft or misuse by restricting access


US8855310B2
(en)

2006-05-12 2014-10-07 Blackberry Limited System and method for exchanging encryption keys between a mobile device and a peripheral device


US8861354B2
(en)

2011-12-14 2014-10-14 Seven Networks, Inc. Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization


US8868753B2
(en)

2011-12-06 2014-10-21 Seven Networks, Inc. System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation


US8874761B2
(en)

2013-01-25 2014-10-28 Seven Networks, Inc. Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols


US8881280B2
(en)

2013-02-28 2014-11-04 Uniloc Luxembourg S.A. Device-specific content delivery


US8886176B2
(en)

2010-07-26 2014-11-11 Seven Networks, Inc. Mobile application traffic optimization


US8892495B2
(en)

1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore


US8903954B2
(en)

2010-11-22 2014-12-02 Seven Networks, Inc. Optimization of resource polling intervals to satisfy mobile device requests


US8909202B2
(en)

2012-01-05 2014-12-09 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching


US8909759B2
(en)

2008-10-10 2014-12-09 Seven Networks, Inc. Bandwidth measurement


US8918503B2
(en)

2011-12-06 2014-12-23 Seven Networks, Inc. Optimization of mobile traffic directed to private networks and operator configurability thereof


US8918644B2
(en)

2008-10-15 2014-12-23 Adobe Systems Corporation Imparting real-time priority-based network communications in an encrypted communication session


USRE45348E1
(en)

2004-10-20 2015-01-20 Seven Networks, Inc. Method and apparatus for intercepting events in a communication system


US8949954B2
(en)

2011-12-08 2015-02-03 Uniloc Luxembourg, S.A. Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account


US8984581B2
(en)

2011-07-27 2015-03-17 Seven Networks, Inc. Monitoring mobile application activities for malicious traffic on a mobile device


US9002828B2
(en)

2007-12-13 2015-04-07 Seven Networks, Inc. Predictive content delivery


US9002018B2
(en)

2006-05-09 2015-04-07 Sync Up Technologies Corporation Encryption key exchange system and method


US9009084B2
(en)

2002-10-21 2015-04-14 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis and network intrusion protection in an industrial environment


US9009250B2
(en)

2011-12-07 2015-04-14 Seven Networks, Inc. Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation


US9021021B2
(en)

2011-12-14 2015-04-28 Seven Networks, Inc. Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system


US9043433B2
(en)

2010-07-26 2015-05-26 Seven Networks, Inc. Mobile network traffic coordination across multiple applications


US9043731B2
(en)

2010-03-30 2015-05-26 Seven Networks, Inc. 3D mobile user interface with configurable workspace management


US9055102B2
(en)

2006-02-27 2015-06-09 Seven Networks, Inc. Location-based operations and messaging


US9060032B2
(en)

2010-11-01 2015-06-16 Seven Networks, Inc. Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic


US9065765B2
(en)

2013-07-22 2015-06-23 Seven Networks, Inc. Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network


US9077630B2
(en)

2010-07-26 2015-07-07 Seven Networks, Inc. Distributed implementation of dynamic wireless traffic policy


US9124580B1
(en)

2014-02-07 2015-09-01 The Boeing Company Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications


US9151633B2
(en)

1998-01-27 2015-10-06 Steven M. Hoffberg Mobile communication device for delivering targeted advertisements


US9161258B2
(en)

2012-10-24 2015-10-13 Seven Networks, Llc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion


US9171187B2
(en)

2005-05-13 2015-10-27 Nokia Technologies Oy Implementation of an integrity-protected secure storage


US9173128B2
(en)

2011-12-07 2015-10-27 Seven Networks, Llc Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol


US9203864B2
(en)

2012-02-02 2015-12-01 Seven Networks, Llc Dynamic categorization of applications for network access in a mobile network


US9241314B2
(en)

2013-01-23 2016-01-19 Seven Networks, Llc Mobile device with application or context aware fast dormancy


WO2016009353A1
(en)

2014-07-18 2016-01-21 Scientific Games Holdings Limited Logistics methods for processing lottery and contest tickets with generic hardware


US9270447B2
(en)

2011-11-03 2016-02-23 Arvind Gidwani Demand based encryption and key generation and distribution systems and methods


US9268930B2
(en)

2012-11-29 2016-02-23 Gilbarco Inc. Fuel dispenser user interface system architecture


US9275163B2
(en)

2010-11-01 2016-03-01 Seven Networks, Llc Request and response characteristics based adaptation of distributed caching in a mobile network


US9280696B1
(en)

2008-04-23 2016-03-08 Copilot Ventures Fund Iii Llc Authentication method and system


US9307493B2
(en)

2012-12-20 2016-04-05 Seven Networks, Llc Systems and methods for application management of mobile device radio state promotion and demotion


EP2537284B1
(en)

2010-02-18 2016-04-20 Centre National de la Recherche Scientifique (CNRS) Cryptographic method for communicating confidential information


US9326189B2
(en)

2012-02-03 2016-04-26 Seven Networks, Llc User as an end point for profiling and optimizing the delivery of content and data in a wireless network


US9325662B2
(en)

2011-01-07 2016-04-26 Seven Networks, Llc System and method for reduction of mobile network traffic used for domain name system (DNS) queries


US9330196B2
(en)

2010-11-01 2016-05-03 Seven Networks, Llc Wireless traffic management system cache optimization using http headers


US9380545B2
(en)

2011-08-03 2016-06-28 Astrolink International Llc System and methods for synchronizing edge devices on channels without carrier sense


EP3038001A1
(en)

2014-12-23 2016-06-29 Orange Method for getting a user validation of a key


US9420448B2
(en)

2007-03-16 2016-08-16 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location


US9432845B2
(en)

2007-03-16 2016-08-30 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location


US9438312B2
(en)

2013-06-06 2016-09-06 Astrolink International Llc System and method for inferring schematic relationships between load points and service transformers


WO2016160256A1
(en)

2015-03-30 2016-10-06 Qualcomm Incorporated Authentication and key agreement with perfect forward secrecy


US9564952B2
(en)

2012-02-06 2017-02-07 Uniloc Luxembourg S.A. Near field authentication through communication of enclosed content sound waves


US9571378B2
(en)

2011-06-28 2017-02-14 The Boeing Company Synchronized wireless data concentrator for airborne wireless sensor networks


WO2017141065A1
(en)

2016-02-18 2017-08-24 MAGYAR, Gábor Data management method and registration method for an anonymous data sharing system, as well as data manager and anonymous data sharing system


US9749297B2
(en)

*

2014-11-12 2017-08-29 Yaron Gvili Manicoding for communication verification


US9756024B2
(en)

2015-09-18 2017-09-05 Trillium Incorporated Computer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same


US9755822B2
(en)

2013-06-19 2017-09-05 Cryptography Research, Inc. Countermeasure to power analysis attacks through time-varying impedance of power delivery networks


DE102016104009A1
(en)

2016-03-04 2017-09-21 WIN – Worldwide Innovation Network GmbH Cryptographic method for use in a digital network


US9794797B2
(en)

2005-10-04 2017-10-17 Steven M. Hoffberg Multifactorial optimization system and method


US9832095B2
(en)

2011-12-14 2017-11-28 Seven Networks, Llc Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic


US9853498B2
(en)

2014-10-30 2017-12-26 Astrolink International Llc System, method, and apparatus for grid location


US9860221B2
(en)

2015-03-10 2018-01-02 Intel Corporation Internet of things group formation using a key-based join protocol


US9887845B2
(en)

2013-10-30 2018-02-06 Gilbarco Cryptographic watermarking of content in fuel dispensing environments


US9922323B2
(en)

2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location


WO2018056819A2
(en)

2016-09-22 2018-03-29 Bolt Mobility B.V. Scooter


US10001514B2
(en)

2013-06-13 2018-06-19 Astrolink International Llc System and method for detecting and localizing non-technical losses in an electrical power distribution grid


US10079765B2
(en)

2014-10-30 2018-09-18 Astrolink International Llc System and methods for assigning slots and resolving slot conflicts in an electrical distribution grid


US10097240B2
(en)

2013-02-19 2018-10-09 Astrolink International, Llc System and method for inferring schematic and topological properties of an electrical distribution grid


US10102401B2
(en)

2011-10-20 2018-10-16 Gilbarco Inc. Fuel dispenser user interface system architecture


US10129026B2
(en)

2016-05-03 2018-11-13 Certicom Corp. Method and system for cheon resistant static diffie-hellman security


EP3427795A1
(en)

2017-07-11 2019-01-16 BIOTRONIK SE & Co. KG System comprising a medical device and an external device


US10206060B2
(en)

2012-01-04 2019-02-12 Uniloc 2017 Llc Method and system for implementing zone-restricted behavior of a computing device


US10205590B2
(en)

2015-12-10 2019-02-12 Keysight Technologies Singapore (Holdings) Pte. Ltd. Methods, systems, and computer readable media for reducing the size of a cryptographic key in a test simulation environment


US10263899B2
(en)

2012-04-10 2019-04-16 Seven Networks, Llc Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network


US10361802B1
(en)

1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method


US10412068B2
(en)

2015-12-07 2019-09-10 Salesforce.Com, Inc. API authentication


USRE47642E1
(en)

1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods


US10459411B2
(en)

2011-04-15 2019-10-29 Astrolink International Llc System and method for single and multizonal optimization of utility services delivery and utilization


US10491385B2
(en)

2018-01-12 2019-11-26 Adin Research, Inc. Information processing system, information processing method, and recording medium for improving security of encrypted communications


US10536445B1
(en)

2017-06-12 2020-01-14 Daniel Maurice Lerner Discrete blockchain and blockchain communications


US10579793B2
(en)

2017-06-12 2020-03-03 Daniel Maurice Lerner Managed securitized containers and container communications


US10594668B1
(en)

2016-12-01 2020-03-17 Thales Esecurity, Inc. Crypto Cloudlets


US10650139B2
(en)

2017-06-12 2020-05-12 Daniel Maurice Lerner Securing temporal digital communications via authentication and validation for wireless user and access devices with securitized containers


US10726417B1
(en)

2002-03-25 2020-07-28 Jpmorgan Chase Bank, N.A. Systems and methods for multifactor authentication


US10749571B2
(en)

2013-06-13 2020-08-18 Trc Companies, Inc. System and methods for inferring the feeder and phase powering an on-grid transmitter


US10764282B2
(en)

2017-06-12 2020-09-01 Daniel Maurice Lerner Protected and secured user-wearable devices for assured authentication and validation of data storage and transmission that utilize securitized containers

Non-Patent Citations (2)

Cited by examiner, † Cited by third party
Title
New Directions in Cryptography“, Diffie et al., IEEE Transactions on Information Theory, vol. IT-22, No. 6, Nov. 1976.
*

Diffie & Hellman, Multi-User Cryptographic Techniques”, AFIPS Conference Proceedings, vol. 45, pp. 109-112, Jun. 8, 1976.
*

Cited By (1372)

Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title


US4315101A
(en)

*

1979-02-05 1982-02-09 Atalla Technovations Method and apparatus for securing data transmissions


US4306111A
(en)

*

1979-05-31 1981-12-15 Communications Satellite Corporation Simple and effective public-key cryptosystem


US4379205A
(en)

*

1979-06-22 1983-04-05 Bell Telephone Laboratories, Incorporated Analog signal scrambling system


US4309569A
(en)

*

1979-09-05 1982-01-05 The Board Of Trustees Of The Leland Stanford Junior University Method of providing digital signatures


US4638120A
(en)

*

1980-03-03 1987-01-20 Compagnie Internationale Pour L’informatique Cii Honeywell Bull Method and system for transmission of confidential data


US4393276A
(en)

*

1981-03-19 1983-07-12 Bell Telephone Laboratories, Incorporated Fourier masking analog signal secure communication system


US4423287A
(en)

*

1981-06-26 1983-12-27 Visa U.S.A., Inc. End-to-end encryption system and method of operation


US4514592A
(en)

*

1981-07-27 1985-04-30 Nippon Telegraph & Telephone Public Corporation Cryptosystem


US5428686A
(en)

*

1981-09-28 1995-06-27 The United States Of America As Represented By The Direrctor Of The National Security Agency Secure communication system having long-term keying variable


US4471164A
(en)

*

1981-10-13 1984-09-11 At&T Bell Laboratories Stream cipher operation using public key cryptosystem


US9043859B1
(en)

1981-11-02 2015-05-26 Personalized Media Communications, Llc Signal processing apparatus and methods


US7752649B1
(en)

1981-11-03 2010-07-06 Personalized Media Communications, Llc Signal processing apparatus and methods


US7870581B1
(en)

1981-11-03 2011-01-11 Personalized Media Communications, Llc Signal processing apparatus and methods


US7864956B1
(en)

1981-11-03 2011-01-04 Personalized Media Communications, Llc Signal processing apparatus and methods


US7953223B1
(en)

1981-11-03 2011-05-31 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US7864248B1
(en)

1981-11-03 2011-01-04 Personalized Media Communications, Llc Signal processing apparatus and methods


US7865920B1
(en)

1981-11-03 2011-01-04 Personalized Media Communications LLC Signal processing apparatus and methods


US7860131B1
(en)

1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods


USRE47968E1
(en)

1981-11-03 2020-04-28 Personalized Media Communications LLC Signal processing apparatus and methods


US7992169B1
(en)

1981-11-03 2011-08-02 Personalized Media Communications LLC Signal processing apparatus and methods


US7861263B1
(en)

1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US7861278B1
(en)

1981-11-03 2010-12-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US7926084B1
(en)

1981-11-03 2011-04-12 Personalized Media Communications LLC Signal processing apparatus and methods


US7860249B1
(en)

1981-11-03 2010-12-28 Personalized Media Communications LLC Signal processing apparatus and methods


US7856650B1
(en)

1981-11-03 2010-12-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US7908638B1
(en)

1981-11-03 2011-03-15 Personalized Media Communications LLC Signal processing apparatus and methods


US7856649B1
(en)

1981-11-03 2010-12-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US7849493B1
(en)

1981-11-03 2010-12-07 Personalized Media Communications, Llc Signal processing apparatus and methods


US8191091B1
(en)

1981-11-03 2012-05-29 Personalized Media Communications, Llc Signal processing apparatus and methods


US7849480B1
(en)

1981-11-03 2010-12-07 Personalized Media Communications LLC Signal processing apparatus and methods


US7849479B1
(en)

1981-11-03 2010-12-07 Personalized Media Communications, Llc Signal processing apparatus and methods


US7810115B1
(en)

1981-11-03 2010-10-05 Personalized Media Communications, Llc Signal processing apparatus and methods


US7844995B1
(en)

1981-11-03 2010-11-30 Personalized Media Communications, Llc Signal processing apparatus and methods


US7840976B1
(en)

1981-11-03 2010-11-23 Personalized Media Communications, Llc Signal processing apparatus and methods


US7836480B1
(en)

1981-11-03 2010-11-16 Personalized Media Communications, Llc Signal processing apparatus and methods


US7831204B1
(en)

1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods


US7827587B1
(en)

1981-11-03 2010-11-02 Personalized Media Communications, Llc Signal processing apparatus and methods


US7827586B1
(en)

1981-11-03 2010-11-02 Personalized Media Communications, Llc Signal processing apparatus and methods


US7823175B1
(en)

1981-11-03 2010-10-26 Personalized Media Communications LLC Signal processing apparatus and methods


US7818761B1
(en)

1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods


US7818778B1
(en)

1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods


US7818776B1
(en)

1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods


US7817208B1
(en)

1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods


US5887243A
(en)

1981-11-03 1999-03-23 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US7814526B1
(en)

1981-11-03 2010-10-12 Personalized Media Communications, Llc Signal processing apparatus and methods


US7805749B1
(en)

1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US7805748B1
(en)

1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US7805738B1
(en)

1981-11-03 2010-09-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US8112782B1
(en)

1981-11-03 2012-02-07 Personalized Media Communications, Llc Signal processing apparatus and methods


US8395707B1
(en)

1981-11-03 2013-03-12 Personalized Media Communications LLC Signal processing apparatus and methods


US7801304B1
(en)

1981-11-03 2010-09-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US8046791B1
(en)

1981-11-03 2011-10-25 Personalized Media Communications, Llc Signal processing apparatus and methods


US8060903B1
(en)

1981-11-03 2011-11-15 Personalized Media PMC Communications, L.L.C. Signal processing apparatus and methods


US7797717B1
(en)

1981-11-03 2010-09-14 Personalized Media Communications, Llc Signal processing apparatus and methods


US7793332B1
(en)

1981-11-03 2010-09-07 Personalized Media Communications, Llc Signal processing apparatus and methods


US7784082B1
(en)

1981-11-03 2010-08-24 Personalized Media Communications, Llc Signal processing apparatus and methods


US10616638B1
(en)

1981-11-03 2020-04-07 Personalized Media Communications LLC Signal processing apparatus and methods


US7783252B1
(en)

1981-11-03 2010-08-24 Personalized Media Communications, Llc Signal processing apparatus and methods


US7774809B1
(en)

1981-11-03 2010-08-10 Personalized Media Communications, Llc Signal processing apparatus and method


US7769170B1
(en)

1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods


US10609425B1
(en)

1981-11-03 2020-03-31 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


USRE47867E1
(en)

1981-11-03 2020-02-18 Personalized Media Communications LLC Signal processing apparatus and methods


US7769344B1
(en)

1981-11-03 2010-08-03 Personalized Media Communications, Llc Signal processing apparatus and methods


US5335277A
(en)

1981-11-03 1994-08-02 The Personalized Mass Media Corporation Signal processing appparatus and methods


US10523350B1
(en)

1981-11-03 2019-12-31 Personalized Media Communications LLC Signal processing apparatus and methods


USRE47642E1
(en)

1981-11-03 2019-10-08 Personalized Media Communications LLC Signal processing apparatus and methods


US10334292B1
(en)

1981-11-03 2019-06-25 Personalized Media Communications LLC Signal processing apparatus and methods


US9674560B1
(en)

1981-11-03 2017-06-06 Personalized Media Communications LLC Signal processing apparatus and methods


US7830925B1
(en)

1981-11-03 2010-11-09 Personalized Media Communications, Llc Signal processing apparatus and methods


US7940931B1
(en)

1981-11-03 2011-05-10 Personalized Media Communications LLC Signal processing apparatus and methods


US9294205B1
(en)

1981-11-03 2016-03-22 Personalized Media Communications LLC Signal processing apparatus and methods


US9210370B1
(en)

1981-11-03 2015-12-08 Personalized Media Communications LLC Signal processing apparatus and methods


US7889865B1
(en)

1981-11-03 2011-02-15 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US9038124B1
(en)

1981-11-03 2015-05-19 Personalized Media Communications, Llc Signal processing apparatus and methods


US7764685B1
(en)

1981-11-03 2010-07-27 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US8973034B1
(en)

1981-11-03 2015-03-03 Personalized Media Communications LLC Signal processing apparatus and methods


US8914825B1
(en)

1981-11-03 2014-12-16 Personalized Media Communications LLC Signal processing apparatus and methods


US8893177B1
(en)

1981-11-03 2014-11-18 {Personalized Media Communications, LLC Signal processing apparatus and methods


US8869229B1
(en)

1981-11-03 2014-10-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US8869228B1
(en)

1981-11-03 2014-10-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US8843988B1
(en)

1981-11-03 2014-09-23 Personalized Media Communications, Llc Signal processing apparatus and methods


US8839293B1
(en)

1981-11-03 2014-09-16 Personalized Media Communications, Llc Signal processing apparatus and methods


US8804727B1
(en)

1981-11-03 2014-08-12 Personalized Media Communications, Llc Signal processing apparatus and methods


US8752088B1
(en)

1981-11-03 2014-06-10 Personalized Media Communications LLC Signal processing apparatus and methods


US8739241B1
(en)

1981-11-03 2014-05-27 Personalized Media Communications LLC Signal processing apparatus and methods


US8711885B1
(en)

1981-11-03 2014-04-29 Personalized Media Communications LLC Signal processing apparatus and methods


US8713624B1
(en)

1981-11-03 2014-04-29 Personalized Media Communications LLC Signal processing apparatus and methods


US7761890B1
(en)

1981-11-03 2010-07-20 Personalized Media Communications, Llc Signal processing apparatus and methods


US8683539B1
(en)

1981-11-03 2014-03-25 Personalized Media Communications, Llc Signal processing apparatus and methods


US8675775B1
(en)

1981-11-03 2014-03-18 Personalized Media Communications, Llc Signal processing apparatus and methods


US8646001B1
(en)

1981-11-03 2014-02-04 Personalized Media Communications, Llc Signal processing apparatus and methods


US8640184B1
(en)

1981-11-03 2014-01-28 Personalized Media Communications, Llc Signal processing apparatus and methods


US8635644B1
(en)

1981-11-03 2014-01-21 Personalized Media Communications LLC Signal processing apparatus and methods


US8621547B1
(en)

1981-11-03 2013-12-31 Personalized Media Communications, Llc Signal processing apparatus and methods


US8613034B1
(en)

1981-11-03 2013-12-17 Personalized Media Communications, Llc Signal processing apparatus and methods


US8607296B1
(en)

1981-11-03 2013-12-10 Personalized Media Communications LLC Signal processing apparatus and methods


US8601528B1
(en)

1981-11-03 2013-12-03 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US8587720B1
(en)

1981-11-03 2013-11-19 Personalized Media Communications LLC Signal processing apparatus and methods


US8584162B1
(en)

1981-11-03 2013-11-12 Personalized Media Communications LLC Signal processing apparatus and methods


US8572671B1
(en)

1981-11-03 2013-10-29 Personalized Media Communications LLC Signal processing apparatus and methods


US8566868B1
(en)

1981-11-03 2013-10-22 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US7752650B1
(en)

1981-11-03 2010-07-06 Personalized Media Communications, Llc Signal processing apparatus and methods


US8559635B1
(en)

1981-11-03 2013-10-15 Personalized Media Communications, L.L.C. Signal processing apparatus and methods


US7734251B1
(en)

1981-11-03 2010-06-08 Personalized Media Communications, Llc Signal processing apparatus and methods


US8558950B1
(en)

1981-11-03 2013-10-15 Personalized Media Communications LLC Signal processing apparatus and methods


US8555310B1
(en)

1981-11-03 2013-10-08 Personalized Media Communications, Llc Signal processing apparatus and methods


US7747217B1
(en)

1981-11-03 2010-06-29 Personalized Media Communications, Llc Signal processing apparatus and methods


US7818777B1
(en)

1981-11-03 2010-10-19 Personalized Media Communications, Llc Signal processing apparatus and methods


USRE33189E
(en)

*

1981-11-19 1990-03-27 Communications Satellite Corporation Security system for SSTV encryption


US4484027A
(en)

*

1981-11-19 1984-11-20 Communications Satellite Corporation Security system for SSTV encryption


US4567600A
(en)

*

1982-02-02 1986-01-28 Omnet Associates Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission


EP0090771A1
(en)

*

1982-03-26 1983-10-05 GRETAG Aktiengesellschaft Method and apparatus for the enciphered transmission of information


US4668103A
(en)

*

1982-04-30 1987-05-26 Wilson William J Polygraphic encryption-decryption communications system


US4578531A
(en)

*

1982-06-09 1986-03-25 At&T Bell Laboratories Encryption system key distribution method and apparatus


US4558176A
(en)

*

1982-09-20 1985-12-10 Arnold Mark G Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software


US4757468A
(en)

*

1982-09-22 1988-07-12 Intel Corporation Authenticated read-only memory


US4658093A
(en)

*

1983-07-11 1987-04-14 Hellman Martin E Software distribution system


US4759063A
(en)

*

1983-08-22 1988-07-19 Chaum David L Blind signature systems


US4634808A
(en)

*

1984-03-15 1987-01-06 M/A-Com Government Systems, Inc. Descrambler subscriber key production system utilizing key seeds stored in descrambler


US4633036A
(en)

*

1984-05-31 1986-12-30 Martin E. Hellman Method and apparatus for use in public-key data encryption system


EP0191324A2
(en)

*

1985-02-12 1986-08-20 International Business Machines Corporation Offline pin cryptographic validation


EP0191324A3
(en)

*

1985-02-12 1989-04-26 International Business Machines Corporation Offline pin cryptographic validation


US4802220A
(en)

*

1985-03-20 1989-01-31 American Telephone And Telegraph Company, At&T Bell Laboratories Method and apparatus for multi-channel communication security


WO1987000377A1
(en)

*

1985-06-27 1987-01-15 Codart Communications, Inc. Scrambling apparatus


WO1987000151A1
(en)

*

1985-07-03 1987-01-15 Hahn Torbjoern Principle for the storing of gas or liquid


US6424703B1
(en)

1985-07-10 2002-07-23 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface lottery system


US6044135A
(en)

*

1985-07-10 2000-03-28 Ronald A. Katz Technology Licensing, L.P. Telephone-interface lottery system


US6035021A
(en)

*

1985-07-10 2000-03-07 Katz; Ronald A. Telephonic-interface statistical analysis system


US6434223B2
(en)

1985-07-10 2002-08-13 Ronald A. Katz Technology Licensing, L.P. Telephone interface call processing system with call selectivity


US6449346B1
(en)

1985-07-10 2002-09-10 Ronald A. Katz Technology Licensing, L.P. Telephone-television interface statistical analysis system


US6148065A
(en)

*

1985-07-10 2000-11-14 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US6292547B1
(en)

1985-07-10 2001-09-18 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US6016344A
(en)

*

1985-07-10 2000-01-18 Katz; Ronald A. Telephonic-interface statistical analysis system


US6678360B1
(en)

1985-07-10 2004-01-13 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US6570967B2
(en)

1985-07-10 2003-05-27 Ronald A. Katz Technology Licensing, L.P. Voice-data telephonic interface control system


US5898762A
(en)

*

1985-07-10 1999-04-27 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US6512415B1
(en)

1985-07-10 2003-01-28 Ronald A. Katz Technology Licensing Lp. Telephonic-interface game control system


US6349134B1
(en)

1985-07-10 2002-02-19 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface statistical analysis system


US20020033596A1
(en)

*

1985-07-10 2002-03-21 Ronald A. Katz Technology Licensing, L.P. Telephonic-interface lottery system


US5917893A
(en)

*

1985-07-10 1999-06-29 Ronald A. Katz Technology Licensing, L.P. Multiple format telephonic interface control system


US5787156A
(en)

*

1985-07-10 1998-07-28 Ronald A. Katz Technology Licensing, Lp Telephonic-interface lottery system


WO1989003143A1
(en)

*

1986-06-16 1989-04-06 Applied Information Technologies Research Center Field initialized authentication system for protective security of electronic information networks


US5020105A
(en)

*

1986-06-16 1991-05-28 Applied Information Technologies Corporation Field initialized authentication system for protective security of electronic information networks


US4891781A
(en)

*

1987-03-04 1990-01-02 Cylink Corporation Modulo arithmetic processor chip


WO1988010541A1
(en)

*

1987-06-19 1988-12-29 Motorola, Inc. Duplex analog scrambler


US4827507A
(en)

*

1987-06-19 1989-05-02 Motorola, Inc. Duplex analog scrambler


US4881264A
(en)

*

1987-07-30 1989-11-14 Merkle Ralph C Digital signature system and method based on a conventional encryption function


US5140634A
(en)

*

1987-09-07 1992-08-18 U.S Philips Corporation Method and apparatus for authenticating accreditations and for authenticating and signing messages


US7958527B1
(en)

1987-09-11 2011-06-07 Personalized Media Communications, Llc Signal processing apparatus and methods


US7966640B1
(en)

1987-09-11 2011-06-21 Personalized Media Communications, Llc Signal processing apparatus and methods


US4991209A
(en)

*

1988-10-17 1991-02-05 Grumman Aerospace Corporation Random local message encryption


US5054066A
(en)

*

1988-11-16 1991-10-01 Grumman Corporation Error correcting public key cryptographic method and program


US4965568A
(en)

*

1989-03-01 1990-10-23 Atalla Martin M Multilevel security apparatus and method with personal key


US4956863A
(en)

*

1989-04-17 1990-09-11 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication


EP0393806A2
(en)

*

1989-04-17 1990-10-24 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication


EP0393806A3
(en)

*

1989-04-17 1991-11-13 Trw Inc. Cryptographic method and apparatus for public key exchange with authentication


US4991210A
(en)

*

1989-05-04 1991-02-05 David Chaum Unpredictable blind signature systems


US4996711A
(en)

*

1989-06-21 1991-02-26 Chaum David L Selected-exponent signature systems


US5189700A
(en)

*

1989-07-05 1993-02-23 Blandford Robert R Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents


US4964164A
(en)

*

1989-08-07 1990-10-16 Algorithmic Research, Ltd. RSA computation method for efficient batch processing


US5124117A
(en)

*

1989-08-07 1992-06-23 Matsushita Electric Industrial Co., Ltd. Cryptographic key distribution method and system


US5323146A
(en)

*

1990-03-20 1994-06-21 Siemens Nixdorf Informationssysteme Ag Method for authenticating the user of a data station connected to a computer system


US5210710A
(en)

*

1990-10-17 1993-05-11 Cylink Corporation Modulo arithmetic processor chip


US5073934A
(en)

*

1990-10-24 1991-12-17 International Business Machines Corporation Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key


EP0482233A1
(en)

*

1990-10-24 1992-04-29 Omnisec Ag Cryptographic system allowing encrypted communication between users with a secure mutual cipher key determined without user interaction


US5251258A
(en)

*

1991-03-05 1993-10-05 Nec Corporation Key distribution system for distributing a cipher key between two subsystems by one-way communication


US5146500A
(en)

*

1991-03-14 1992-09-08 Omnisec A.G. Public key cryptographic system using elliptic curves over rings


US5231668A
(en)

*

1991-07-26 1993-07-27 The United States Of America, As Represented By The Secretary Of Commerce Digital signature algorithm


US5204901A
(en)

*

1991-08-01 1993-04-20 General Electric Company Public key cryptographic mechanism


US5142578A
(en)

*

1991-08-22 1992-08-25 International Business Machines Corporation Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors


US5159632A
(en)

*

1991-09-17 1992-10-27 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system


US5271061A
(en)

*

1991-09-17 1993-12-14 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system


WO1993006672A1
(en)

*

1991-09-17 1993-04-01 Next Computer, Inc. Method and apparatus for public key exchange in a cryptographic system


US5200999A
(en)

*

1991-09-27 1993-04-06 International Business Machines Corporation Public key cryptosystem key management based on control vectors


US5201000A
(en)

*

1991-09-27 1993-04-06 International Business Machines Corporation Method for generating public and private key pairs without using a passphrase


US5265164A
(en)

*

1991-10-31 1993-11-23 International Business Machines Corporation Cryptographic facility environment backup/restore and replication in a public key cryptosystem


US5164988A
(en)

*

1991-10-31 1992-11-17 International Business Machines Corporation Method to establish and enforce a network cryptographic security policy in a public key cryptosystem


US8892495B2
(en)

1991-12-23 2014-11-18 Blanding Hovenweep, Llc Adaptive pattern recognition based controller apparatus and method and human-interface therefore


US5239584A
(en)

*

1991-12-26 1993-08-24 General Electric Corporation Method and apparatus for encryption/authentication of data in energy metering applications


US5313521A
(en)

*

1992-04-15 1994-05-17 Fujitsu Limited Key distribution protocol for file transfer in the local area network


US5299262A
(en)

*

1992-08-13 1994-03-29 The United States Of America As Represented By The United States Department Of Energy Method for exponentiating in cryptographic systems


US5361359A
(en)

*

1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer


US5974148A
(en)

*

1992-11-17 1999-10-26 Stambler; Leon Method for securing information relevant to a transaction


US5793302A
(en)

*

1992-11-17 1998-08-11 Stambler; Leon Method for securing information relevant to a transaction


US5646998A
(en)

*

1992-11-17 1997-07-08 Stambler; Leon Secure transaction system and method utilized therein


US5936541A
(en)

*

1992-11-17 1999-08-10 Stambler; Leon Method for securing information relevant to a transaction


US5539530A
(en)

*

1993-06-07 1996-07-23 Microsoft Corporation Facsimile machine with custom operational parameters


US5414771A
(en)

*

1993-07-13 1995-05-09 Mrj, Inc. System and method for the creation of random sequences and for the cryptographic protection of communications


US5400403A
(en)

*

1993-08-16 1995-03-21 Rsa Data Security, Inc. Abuse-resistant object distribution system and method


US5499295A
(en)

*

1993-08-31 1996-03-12 Ericsson Inc. Method and apparatus for feature authorization and software copy protection in RF communications devices


US5497422A
(en)

*

1993-09-30 1996-03-05 Apple Computer, Inc. Message protection mechanism and graphical user interface therefor


USRE36946E
(en)

*

1993-11-02 2000-11-07 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks


US5371794A
(en)

*

1993-11-02 1994-12-06 Sun Microsystems, Inc. Method and apparatus for privacy and authentication in wireless networks


EP0734624A1
(en)

*

1993-12-01 1996-10-02 William Micheal Raike A non-deterministic public key encryption system


EP0734624A4
(en)

*

1993-12-01 1999-10-06 William Micheal Raike A non-deterministic public key encryption system


US5450493A
(en)

*

1993-12-29 1995-09-12 At&T Corp. Secure communication method and apparatus


US5841865A
(en)

*

1994-01-13 1998-11-24 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5872849A
(en)

*

1994-01-13 1999-02-16 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5857022A
(en)

*

1994-01-13 1999-01-05 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5850451A
(en)

*

1994-01-13 1998-12-15 Certco Llc Enhanced cryptographic system and method with key escrow feature


US6009177A
(en)

*

1994-01-13 1999-12-28 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5799086A
(en)

*

1994-01-13 1998-08-25 Certco Llc Enhanced cryptographic system and method with key escrow feature


US5787172A
(en)

*

1994-02-24 1998-07-28 The Merdan Group, Inc. Apparatus and method for establishing a cryptographic link between elements of a system


US6148400A
(en)

*

1994-02-24 2000-11-14 The Merdan Group, Inc. Apparatus and method for establishing a crytographic link between elements of a system


US6456716B1
(en)

1994-02-24 2002-09-24 Merdan Group, Inc. Apparatus and method for establishing a crytographic link between elements of a system


US6044463A
(en)

*

1994-03-07 2000-03-28 Nippon Telegraph And Telephone Corporation Method and system for message delivery utilizing zero knowledge interactive proof protocol


US5425103A
(en)

*

1994-03-14 1995-06-13 Shaw; William Y. Variable-key cryptography system


US5619576A
(en)

*

1994-03-14 1997-04-08 Shaw; William Y. Variable-key cryptography system


US5509071A
(en)

*

1994-04-01 1996-04-16 Microelectronics And Computer Technology Corporation Electronic proof of receipt


US5481613A
(en)

*

1994-04-15 1996-01-02 Northern Telecom Limited Computer network cryptographic key distribution system


US5515441A
(en)

*

1994-05-12 1996-05-07 At&T Corp. Secure communication method and apparatus


US6134325A
(en)

*

1994-05-24 2000-10-17 Certicom Corp. Key transmission system


US6377689B1
(en)

1994-05-24 2002-04-23 Certigom Corp. Key transmission system


US5999624A
(en)

*

1994-06-30 1999-12-07 Compaq Computer Corporation Remote financial transaction system


US5838792A
(en)

*

1994-07-18 1998-11-17 Bell Atlantic Network Services, Inc. Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem


US5748735A
(en)

*

1994-07-18 1998-05-05 Bell Atlantic Network Services, Inc. Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography


US5557678A
(en)

*

1994-07-18 1996-09-17 Bell Atlantic Network Services, Inc. System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem


US5588061A
(en)

*

1994-07-20 1996-12-24 Bell Atlantic Network Services, Inc. System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem


US5905799A
(en)

*

1994-07-20 1999-05-18 Bell Atlantic Network Services, Inc. Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem


US5991406A
(en)

*

1994-08-11 1999-11-23 Network Associates, Inc. System and method for data recovery


US5745573A
(en)

*

1994-08-11 1998-04-28 Trusted Information Systems, Inc. System and method for controlling access to a user secret


US5956403A
(en)

*

1994-08-11 1999-09-21 Network Association, Inc. System and method for access field verification


US6091835A
(en)

*

1994-08-31 2000-07-18 Penop Limited Method and system for transcribing electronic affirmations


US5737419A
(en)

*

1994-11-09 1998-04-07 Bell Atlantic Network Services, Inc. Computer system for securing communications using split private key asymmetric cryptography


US5535276A
(en)

*

1994-11-09 1996-07-09 Bell Atlantic Network Services, Inc. Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography


EP0714204A2
(en)

1994-11-26 1996-05-29 Lg Electronics Inc Illegal view and copy protection method in digital video system and controlling method thereof


US7007166B1
(en)

1994-12-28 2006-02-28 Wistaria Trading, Inc. Method and system for digital watermarking


US5889861A
(en)

*

1995-01-12 1999-03-30 Kokusai Denshin Denwa Co., Ltd Identity confidentiality method in radio communication system


US5615268A
(en)

*

1995-01-17 1997-03-25 Document Authentication Systems, Inc. System and method for electronic transmission storage and retrieval of authenticated documents


US7743248B2
(en)

1995-01-17 2010-06-22 Eoriginal, Inc. System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components


US6237096B1
(en)

1995-01-17 2001-05-22 Eoriginal Inc. System and method for electronic transmission storage and retrieval of authenticated documents


US7162635B2
(en)

1995-01-17 2007-01-09 Eoriginal, Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents


US20040093493A1
(en)

*

1995-01-17 2004-05-13 Bisbee Stephen F. System and method for electronic transmission, storage and retrieval of authenticated documents


US5748738A
(en)

*

1995-01-17 1998-05-05 Document Authentication Systems, Inc. System and method for electronic transmission, storage and retrieval of authenticated documents


US20010002485A1
(en)

*

1995-01-17 2001-05-31 Bisbee Stephen F. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents


US5568554A
(en)

*

1995-01-31 1996-10-22 Digital Equipment Corporation Method for improving the processing and storage performance of digital signature schemes


US6272632B1
(en)

1995-02-21 2001-08-07 Network Associates, Inc. System and method for controlling access to a user secret using a key recovery field


US5577124A
(en)

*

1995-03-09 1996-11-19 Arithmetica, Inc. Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions


US5629982A
(en)

*

1995-03-21 1997-05-13 Micali; Silvio Simultaneous electronic transactions with visible trusted parties


US6137884A
(en)

*

1995-03-21 2000-10-24 Bankers Trust Corporation Simultaneous electronic transactions with visible trusted parties


US6141750A
(en)

*

1995-03-21 2000-10-31 Micali; Silvio Simultaneous electronic transactions with subscriber verification


US5666420A
(en)

*

1995-03-21 1997-09-09 Micali; Silvio Simultaneous electronic transactions


US6119227A
(en)

*

1995-04-18 2000-09-12 Hewlett-Packard Company Methods and apparatus for authenticating an originator of a message


US20080162940A1
(en)

*

1995-04-21 2008-07-03 Vanstone Scott A Key Agreement and Transport Protocol With Implicit Signatures


US20040081321A1
(en)

*

1995-04-21 2004-04-29 Marinus Struik Key agreement and transport protocol


US7779259B2
(en)

1995-04-21 2010-08-17 Certicom Corp. Key agreement and transport protocol with implicit signatures


US8578165B2
(en)

1995-04-21 2013-11-05 Certicom Corp. Key agreement and transport protocol


US7334127B2
(en)

1995-04-21 2008-02-19 Certicom Corp. Key agreement and transport protocol


US5761305A
(en)

*

1995-04-21 1998-06-02 Certicom Corporation Key agreement and transport protocol with implicit signatures


US20100281259A1
(en)

*

1995-04-21 2010-11-04 Certicom Corp. Key agreement and transport protocol with implicit signatures


US8090947B2
(en)

1995-04-21 2012-01-03 Certicom Corp. Key agreement and transport protocol with implicit signatures


US6122736A
(en)

*

1995-04-21 2000-09-19 Certicom Corp. Key agreement and transport protocol with implicit signatures


US8892890B2
(en)

1995-04-21 2014-11-18 Certicom Corp. Key agreement and transport protocol


US20080162938A1
(en)

*

1995-04-21 2008-07-03 Marinus Struik Key agreement and transport protocol


US20050182936A1
(en)

*

1995-04-21 2005-08-18 Cryptech Systems Inc. Key agreement and transport protocol with implicit signatures


US8209533B2
(en)

1995-04-21 2012-06-26 Certicom Corp. Key agreement and transport protocol


US7243232B2
(en)

1995-04-21 2007-07-10 Certicom Corp. Key agreement and transport protocol


US6813366B1
(en)

*

1995-05-08 2004-11-02 Digimarc Corporation Steganographic decoding with transform to spatial domain


EP0742656B2
(en)

1995-05-12 2012-10-31 ACTIA Automotive Method and system for the security of data transmission between a sensor and a recording unit


US5896455A
(en)

*

1995-05-17 1999-04-20 Certicom Corporation Key agreement and transport protocol with implicit signatures


US6526509B1
(en)

*

1995-05-19 2003-02-25 Siemens Aktiengesellschaft Method for interchange of cryptographic codes between a first computer unit and a second computer unit


US5835592A
(en)

*

1995-06-01 1998-11-10 Chang; Chung Nan Secure, swift cryptographic key exchange


WO1996038947A1
(en)

*

1995-06-01 1996-12-05 Chung Nan Chang Secure, swift cryptographic key exchange


US5583939A
(en)

*

1995-06-01 1996-12-10 Chung N. Chang Secure, swift cryptographic key exchange


US8046841B2
(en)

1995-06-07 2011-10-25 Wistaria Trading, Inc. Steganographic method and device


US8467525B2
(en)

1995-06-07 2013-06-18 Wistaria Trading, Inc. Steganographic method and device


US7761712B2
(en)

1995-06-07 2010-07-20 Wistaria Trading, Inc. Steganographic method and device


US20050177727A1
(en)

*

1995-06-07 2005-08-11 Moskowitz Scott A. Steganographic method and device


US20090220074A1
(en)

*

1995-06-07 2009-09-03 Wistaria Trading Inc. Steganographic method and device


US5613004A
(en)

*

1995-06-07 1997-03-18 The Dice Company Steganographic method and device


US8549305B2
(en)

1995-06-07 2013-10-01 Wistaria Trading, Inc. Steganographic method and device


US8238553B2
(en)

1995-06-07 2012-08-07 Wistaria Trading, Inc Steganographic method and device


US20110069864A1
(en)

*

1995-06-07 2011-03-24 Scott Moskowitz Steganographic method and device


US5887060A
(en)

*

1995-06-07 1999-03-23 Digital River, Inc. Central database system for automatic software program sales


US5907617A
(en)

*

1995-06-07 1999-05-25 Digital River, Inc. Try before you buy software distribution and marketing system


US5872917A
(en)

*

1995-06-07 1999-02-16 America Online, Inc. Authentication using random challenges


US5883954A
(en)

*

1995-06-07 1999-03-16 Digital River, Inc. Self-launching encrypted try before you buy software distribution system


US5883955A
(en)

*

1995-06-07 1999-03-16 Digital River, Inc. On-line try before you buy software distribution system


US7568100B1
(en)

1995-06-07 2009-07-28 Wistaria Trading, Inc. Steganographic method and device


US7870393B2
(en)

1995-06-07 2011-01-11 Wistaria Trading, Inc. Steganographic method and device


US5903647A
(en)

*

1995-06-07 1999-05-11 Digital River, Inc. Self-launching encrypted digital information distribution system


US20070294536A1
(en)

*

1995-06-07 2007-12-20 Wistaria Trading, Inc. Steganographic method and device


US5687236A
(en)

*

1995-06-07 1997-11-11 The Dice Company Steganographic method and device


US5870543A
(en)

*

1995-06-07 1999-02-09 Digital River, Inc. System for preventing unauthorized copying of active software


USRE39400E1
(en)

1995-06-29 2006-11-14 Igt Electronic casino gaming system with improved play capacity, authentication and security


USRE39369E1
(en)

1995-06-29 2006-10-31 Igt Electronic casino gaming system with improved play capacity, authentication and security


USRE39370E1
(en)

1995-06-29 2006-10-31 Igt Electronic casino gaming system with improved play capacity, authentication and security


USRE39368E1
(en)

1995-06-29 2006-10-31 Igt Electronic casino gaming system with improved play capacity, authentication and security


US7063615B2
(en)

1995-06-29 2006-06-20 Igt Electronic gaming apparatus with authentication


US20040002381A1
(en)

*

1995-06-29 2004-01-01 Igt Electronic gaming apparatus with authentication


USRE39401E1
(en)

1995-06-29 2006-11-14 Igt Electronic casino gaming system with improved play capacity, authentication and security


US6620047B1
(en)

1995-06-29 2003-09-16 Igt Electronic gaming apparatus having authentication data sets


US5812669A
(en)

*

1995-07-19 1998-09-22 Jenkins; Lew Method and system for providing secure EDI over an open network


US5721779A
(en)

*

1995-08-28 1998-02-24 Funk Software, Inc. Apparatus and methods for verifying the identity of a party


US7716486B2
(en)

1995-10-02 2010-05-11 Corestreet, Ltd. Controlling group access to doors


US7600129B2
(en)

1995-10-02 2009-10-06 Corestreet, Ltd. Controlling access using additional data


US7353396B2
(en)

1995-10-02 2008-04-01 Corestreet, Ltd. Physical access control


US8015597B2
(en)

1995-10-02 2011-09-06 Corestreet, Ltd. Disseminating additional data used for controlling access


US20020165824A1
(en)

*

1995-10-02 2002-11-07 Silvio Micali Scalable certificate validation and simplified PKI management


US8732457B2
(en)

1995-10-02 2014-05-20 Assa Abloy Ab Scalable certificate validation and simplified PKI management


US7337315B2
(en)

1995-10-02 2008-02-26 Corestreet, Ltd. Efficient certificate revocation


US7822989B2
(en)

1995-10-02 2010-10-26 Corestreet, Ltd. Controlling access to an area


US7529928B2
(en)

1995-10-24 2009-05-05 Corestreet, Ltd. Certificate revocation system


US5666416A
(en)

*

1995-10-24 1997-09-09 Micali; Silvio Certificate revocation system


US7660994B2
(en)

1995-10-24 2010-02-09 Corestreet, Ltd. Access control


US20050010783A1
(en)

*

1995-10-24 2005-01-13 Phil Libin Access control


US5960083A
(en)

*

1995-10-24 1999-09-28 Micali; Silvio Certificate revocation system


US20050055548A1
(en)

*

1995-10-24 2005-03-10 Silvio Micali Certificate revocation system


US8261319B2
(en)

1995-10-24 2012-09-04 Corestreet, Ltd. Logging access attempts to an area


US6125183A
(en)

*

1995-10-30 2000-09-26 Obducat Ab Cryptosystem for optical storage


US6301659B1
(en)

1995-11-02 2001-10-09 Silvio Micali Tree-based certificate revocation system


US6097811A
(en)

*

1995-11-02 2000-08-01 Micali; Silvio Tree-based certificate revocation system


US5699431A
(en)

*

1995-11-13 1997-12-16 Northern Telecom Limited Method for efficient management of certificate revocation lists and update information


US6028679A
(en)

*

1995-11-13 2000-02-22 Netfax Incorporated Internet global area networks fax system


US5675649A
(en)

*

1995-11-30 1997-10-07 Electronic Data Systems Corporation Process for cryptographic key generation and safekeeping


US6026163A
(en)

*

1995-12-13 2000-02-15 Micali; Silvio Distributed split-key cryptosystem and applications


US5745574A
(en)

*

1995-12-15 1998-04-28 Entegrity Solutions Corporation Security infrastructure for electronic transactions


US5812670A
(en)

*

1995-12-28 1998-09-22 Micali; Silvio Traceable anonymous transactions


US5926551A
(en)

*

1995-12-28 1999-07-20 International Business Machines Corporation System and method for certifying content of hard-copy documents


US20100098251A1
(en)

*

1996-01-17 2010-04-22 Moskowitz Scott A Method for combining transfer functions and predetermined key creation


US20080016365A1
(en)

*

1996-01-17 2008-01-17 Moskowitz Scott A Data protection method and device


US8930719B2
(en)

1996-01-17 2015-01-06 Scott A. Moskowitz Data protection method and device


US5905800A
(en)

*

1996-01-17 1999-05-18 The Dice Company Method and system for digital watermarking


US6598162B1
(en)

1996-01-17 2003-07-22 Scott A. Moskowitz Method for combining transfer functions with predetermined key creation


US5745569A
(en)

*

1996-01-17 1998-04-28 The Dice Company Method for stega-cipher protection of computer code


US9171136B2
(en)

1996-01-17 2015-10-27 Wistaria Trading Ltd Data protection method and device


US9191205B2
(en)

1996-01-17 2015-11-17 Wistaria Trading Ltd Multiple transform utilization and application for secure digital watermarking


US9021602B2
(en)

1996-01-17 2015-04-28 Scott A. Moskowitz Data protection method and device


US9104842B2
(en)

1996-01-17 2015-08-11 Scott A. Moskowitz Data protection method and device


US5822432A
(en)

*

1996-01-17 1998-10-13 The Dice Company Method for human-assisted random key generation and application for digital watermark system


US9191206B2
(en)

1996-01-17 2015-11-17 Wistaria Trading Ltd Multiple transform utilization and application for secure digital watermarking


US8265276B2
(en)

1996-01-17 2012-09-11 Moskowitz Scott A Method for combining transfer functions and predetermined key creation


US6332025B2
(en)

1996-03-11 2001-12-18 Kabushiki Kaisha Toshiba Software distribution system and software utilization scheme for improving security and user convenience


US6195432B1
(en)

1996-03-11 2001-02-27 Kabushiki Kaisha Toshiba Software distribution system and software utilization scheme for improving security and user convenience


US5737425A
(en)

*

1996-05-21 1998-04-07 International Business Machines Corporation Cryptosystem employing worst-case difficult-to solve lattice problem


US8229844B2
(en)

1996-06-05 2012-07-24 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network


US20090055315A1
(en)

*

1996-06-05 2009-02-26 Fraud Control System.Com Method Of Billing A Purchase Made Over A Computer Network


US8630942B2
(en)

1996-06-05 2014-01-14 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network


US8190513B2
(en)

1996-06-05 2012-05-29 Fraud Control Systems.Com Corporation Method of billing a purchase made over a computer network


US5764766A
(en)

*

1996-06-11 1998-06-09 Digital Equipment Corporation System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same


US6041160A
(en)

*

1996-06-21 2000-03-21 Sony Corporation Method and apparatus for picture encoding and decoding


US8281140B2
(en)

1996-07-02 2012-10-02 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20080022114A1
(en)

*

1996-07-02 2008-01-24 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20080022113A1
(en)

*

1996-07-02 2008-01-24 Wistaria Trading, Inc. Optimization methods for the insertion, protection and detection of digital of digital watermarks in digital data


US7343492B2
(en)

1996-07-02 2008-03-11 Wistaria Trading, Inc. Method and system for digital watermarking


US7987371B2
(en)

1996-07-02 2011-07-26 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7991188B2
(en)

1996-07-02 2011-08-02 Wisteria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7953981B2
(en)

1996-07-02 2011-05-31 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7362775B1
(en)

1996-07-02 2008-04-22 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management


US7877609B2
(en)

1996-07-02 2011-01-25 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20080151934A1
(en)

*

1996-07-02 2008-06-26 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management


US9070151B2
(en)

1996-07-02 2015-06-30 Blue Spike, Inc. Systems, methods and devices for trusted transactions


US20100077220A1
(en)

*

1996-07-02 2010-03-25 Moskowitz Scott A Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20070113094A1
(en)

*

1996-07-02 2007-05-17 Wistaria Trading, Inc. Method and system for digital watermarking


US8774216B2
(en)

1996-07-02 2014-07-08 Wistaria Trading, Inc. Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management


US7409073B2
(en)

1996-07-02 2008-08-05 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US7457962B2
(en)

1996-07-02 2008-11-25 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20090037740A1
(en)

*

1996-07-02 2009-02-05 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US8307213B2
(en)

1996-07-02 2012-11-06 Wistaria Trading, Inc. Method and system for digital watermarking


US9258116B2
(en)

1996-07-02 2016-02-09 Wistaria Trading Ltd System and methods for permitting open access to data objects and for securing data within the data objects


US20070011458A1
(en)

*

1996-07-02 2007-01-11 Scott A. Moskowitz Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20100002904A1
(en)

*

1996-07-02 2010-01-07 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20110019691A1
(en)

*

1996-07-02 2011-01-27 Scott Moskowitz Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management


US20060285722A1
(en)

*

1996-07-02 2006-12-21 Moskowitz Scott A Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20100005308A1
(en)

*

1996-07-02 2010-01-07 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7647502B2
(en)

1996-07-02 2010-01-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7647503B2
(en)

1996-07-02 2010-01-12 Wistaria Trading, Inc. Optimization methods for the insertion, projection, and detection of digital watermarks in digital data


US7664958B2
(en)

1996-07-02 2010-02-16 Wistaria Trading, Inc. Optimization methods for the insertion, protection and detection of digital watermarks in digital data


US20100064140A1
(en)

*

1996-07-02 2010-03-11 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US6522767B1
(en)

1996-07-02 2003-02-18 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US7107451B2
(en)

1996-07-02 2006-09-12 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20010029580A1
(en)

*

1996-07-02 2001-10-11 Moskowitz Scott A. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US7822197B2
(en)

1996-07-02 2010-10-26 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US20030219143A1
(en)

*

1996-07-02 2003-11-27 Moskowitz Scott A. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US8121343B2
(en)

1996-07-02 2012-02-21 Wistaria Trading, Inc Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20060101269A1
(en)

*

1996-07-02 2006-05-11 Wistaria Trading, Inc. Method and system for digital watermarking


US7844074B2
(en)

1996-07-02 2010-11-30 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US20110103639A1
(en)

*

1996-07-02 2011-05-05 Scott Moskowitz Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US9830600B2
(en)

1996-07-02 2017-11-28 Wistaria Trading Ltd Systems, methods and devices for trusted transactions


US9843445B2
(en)

1996-07-02 2017-12-12 Wistaria Trading Ltd System and methods for permitting open access to data objects and for securing data within the data objects


US7930545B2
(en)

1996-07-02 2011-04-19 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digital data


US8161286B2
(en)

1996-07-02 2012-04-17 Wistaria Trading, Inc. Method and system for digital watermarking


US8175330B2
(en)

1996-07-02 2012-05-08 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US7770017B2
(en)

1996-07-02 2010-08-03 Wistaria Trading, Inc. Method and system for digital watermarking


US20100293387A1
(en)

*

1996-07-02 2010-11-18 Wistaria Trading, Inc. Method and system for digital watermarking


US7779261B2
(en)

1996-07-02 2010-08-17 Wistaria Trading, Inc. Method and system for digital watermarking


US7830915B2
(en)

1996-07-02 2010-11-09 Wistaria Trading, Inc. Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments


US20110010555A1
(en)

*

1996-07-02 2011-01-13 Wistaria Trading, Inc. Method and system for digital watermarking


US5889868A
(en)

*

1996-07-02 1999-03-30 The Dice Company Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US7095874B2
(en)

1996-07-02 2006-08-22 Wistaria Trading, Inc. Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data


US5787367A
(en)

*

1996-07-03 1998-07-28 Chrysler Corporation Flash reprogramming security for vehicle computer


US5841864A
(en)

*

1996-08-05 1998-11-24 Motorola Inc. Apparatus and method for authentication and session key exchange in a communication system


US5850443A
(en)

*

1996-08-15 1998-12-15 Entrust Technologies, Ltd. Key management system for mixed-trust environments


US5717757A
(en)

*

1996-08-29 1998-02-10 Micali; Silvio Certificate issue lists


US5793868A
(en)

*

1996-08-29 1998-08-11 Micali; Silvio Certificate revocation system


US6724893B1
(en)

1996-10-11 2004-04-20 The United States Of America As Represented By The National Security Agency Method of passing a cryptographic key that allows third party access to the key


US5953420A
(en)

*

1996-10-25 1999-09-14 International Business Machines Corporation Method and apparatus for establishing an authenticated shared secret value between a pair of users


US6253323B1
(en)

1996-11-01 2001-06-26 Intel Corporation Object-based digital signatures


US6134326A
(en)

*

1996-11-18 2000-10-17 Bankers Trust Corporation Simultaneous electronic transactions


US6061790A
(en)

*

1996-11-20 2000-05-09 Starfish Software, Inc. Network computer system with remote user data encipher methodology


US5966444A
(en)

*

1996-12-06 1999-10-12 Yuan; Chuan K. Method and system for establishing a cryptographic key agreement using linear protocols


US7231040B1
(en)

1996-12-09 2007-06-12 Hewlett-Packard Development Company, L.P. Multiprime RSA public key cryptosystem


WO1998026536A1
(en)

1996-12-09 1998-06-18 Tandem Computers Incorporated Public key cryptographic apparatus and method


US5848159A
(en)

*

1996-12-09 1998-12-08 Tandem Computers, Incorporated Public key cryptographic apparatus and method


USRE40530E1
(en)

*

1996-12-09 2008-10-07 Hewlett-Packard Development Company, L.P. Public key cryptographic apparatus and method


US7152162B2
(en)

1996-12-20 2006-12-19 Wistaria Trading, Inc. Z-transform implementation of digital watermarks


US8225099B2
(en)

1996-12-20 2012-07-17 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks


US20050135615A1
(en)

*

1996-12-20 2005-06-23 Moskowitz Scott A. Z-transform implementation of digital watermarks


US7730317B2
(en)

1996-12-20 2010-06-01 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks


US20100202607A1
(en)

*

1996-12-20 2010-08-12 Wistaria Trading, Inc. Linear predictive coding implementation of digital watermarks


US6099408A
(en)

*

1996-12-31 2000-08-08 Walker Digital, Llc Method and apparatus for securing electronic games


US6264557B1
(en)

1996-12-31 2001-07-24 Walker Digital, Llc Method and apparatus for securing electronic games


US7524245B2
(en)

1996-12-31 2009-04-28 Walker Digital, Llc System and method for securing electronic games


US6450885B2
(en)

1996-12-31 2002-09-17 Walker Digital, Llc Method and apparatus for securing electronic games


US8608558B2
(en)

1996-12-31 2013-12-17 Inventor Holdings, Llc System and method for securing electronic games


US20090227367A1
(en)

*

1996-12-31 2009-09-10 Bruce Schneier System and method for securing electronic games


US5907618A
(en)

*

1997-01-03 1999-05-25 International Business Machines Corporation Method and apparatus for verifiably providing key recovery information in a cryptographic system


US6154541A
(en)

*

1997-01-14 2000-11-28 Zhang; Jinglong F Method and apparatus for a robust high-speed cryptosystem


US6078593A
(en)

*

1997-02-04 2000-06-20 Next Level Communications Method and apparatus for reliable operation of universal voice grade cards


US6574333B1
(en)

1997-02-04 2003-06-03 Next Level Communications, Inc. State machine based universal voice grade cards


US5953424A
(en)

*

1997-03-18 1999-09-14 Hitachi Data Systems Corporation Cryptographic system and protocol for establishing secure authenticated remote access


CN1333332C
(en)

*

1997-03-20 2007-08-22 凤凰技术有限公司 Fault recoverying method for computer system, computer and method for operating computer


US6282290B1
(en)

1997-03-28 2001-08-28 Mykotronx, Inc. High speed modular exponentiator


US5987130A
(en)

*

1997-03-31 1999-11-16 Chang; Chung Nan Simiplified secure swift cryptographic key exchange


US6058187A
(en)

*

1997-04-17 2000-05-02 At&T Corp. Secure telecommunications data transmission


US6061791A
(en)

*

1997-05-09 2000-05-09 Connotech Experts-Conseils Inc. Initial secret key establishment including facilities for verification of identity


US6071190A
(en)

*

1997-05-21 2000-06-06 Casino Data Systems Gaming device security system: apparatus and method


US6364769B1
(en)

1997-05-21 2002-04-02 Casino Data Systems Gaming device security system: apparatus and method


US7267612B2
(en)

1997-05-28 2007-09-11 Igt Gaming apparatus with portrait-mode display


US6202150B1
(en)

1997-05-28 2001-03-13 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems


US20030069070A1
(en)

*

1997-05-28 2003-04-10 Alcorn Allan E. Gaming apparatus with portrait-mode display


US6389136B1
(en)

1997-05-28 2002-05-14 Adam Lucas Young Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys


US7139399B1
(en)

1997-06-06 2006-11-21 Pgp Corporation Cryptographic system with methods for user-controlled message recovery


US6314190B1
(en)

1997-06-06 2001-11-06 Networks Associates Technology, Inc. Cryptographic system with methods for user-controlled message recovery


US6122742A
(en)

*

1997-06-18 2000-09-19 Young; Adam Lucas Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys


US6530020B1
(en)

1997-06-20 2003-03-04 Fuji Xerox Co., Ltd. Group oriented public key encryption and key management system


US6058188A
(en)

*

1997-07-24 2000-05-02 International Business Machines Corporation Method and apparatus for interoperable validation of key recovery information in a cryptographic system


US6052466A
(en)

*

1997-08-28 2000-04-18 Telefonaktiebolaget L M Ericsson (Publ) Encryption of data packets using a sequence of private keys generated from a public key exchange


US6243466B1
(en)

1997-08-29 2001-06-05 Adam Lucas Young Auto-escrowable and auto-certifiable cryptosystems with fast key generation


US6816821B1
(en)

1997-09-03 2004-11-09 Stmicroelectronics Limited Post image techniques


US6031983A
(en)

*

1997-09-03 2000-02-29 Sgs-Thomson Microelectronics Limited Post image techniques


US6044378A
(en)

*

1997-09-29 2000-03-28 International Business Machines Corporation Method and system for a federated digital library by managing links


US6044373A
(en)

*

1997-09-29 2000-03-28 International Business Machines Corporation Object-oriented access control method and system for military and commercial file systems


US6185678B1
(en)

1997-10-02 2001-02-06 Trustees Of The University Of Pennsylvania Secure and reliable bootstrap architecture


US6282295B1
(en)

1997-10-28 2001-08-28 Adam Lucas Young Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers


US6041704A
(en)

*

1997-10-29 2000-03-28 Francotyp-Postalia Ag & Co. Method for operating a digitally printing postage meter to generate and check a security imprint


US6785813B1
(en)

1997-11-07 2004-08-31 Certicom Corp. Key agreement and transport protocol with implicit signatures


US6411715B1
(en)

1997-11-10 2002-06-25 Rsa Security, Inc. Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key


US6038317A
(en)

*

1997-12-24 2000-03-14 Magliveras; Spyros S. Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2l


US7587044B2
(en)

1998-01-02 2009-09-08 Cryptography Research, Inc. Differential power analysis method and apparatus


US7634083B2
(en)

1998-01-02 2009-12-15 Cryptography Research, Inc. Differential power analysis


US9419790B2
(en)

1998-01-02 2016-08-16 Cryptography Research, Inc. Differential power analysis—resistant cryptographic processing


US20020124178A1
(en)

*

1998-01-02 2002-09-05 Kocher Paul C. Differential power analysis method and apparatus


US7506165B2
(en)

1998-01-02 2009-03-17 Cryptography Research, Inc. Leak-resistant cryptographic payment smartcard


US8879724B2
(en)

1998-01-02 2014-11-04 Rambus Inc. Differential power analysis—resistant cryptographic processing


US20080022146A1
(en)

*

1998-01-02 2008-01-24 Kocher Paul C Differential power analysis


US20100091982A1
(en)

*

1998-01-02 2010-04-15 Kocher Paul C Differential power analysis – resistant cryptographic processing


US20030028771A1
(en)

*

1998-01-02 2003-02-06 Cryptography Research, Inc. Leak-resistant cryptographic payment smartcard


US6381699B2
(en)

1998-01-02 2002-04-30 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus


US6304658B1
(en)

1998-01-02 2001-10-16 Cryptography Research, Inc. Leak-resistant cryptographic method and apparatus


US10127816B2
(en)

1998-01-27 2018-11-13 Blanding Hovenweep, Llc Detection and alert of automobile braking event


US9551582B2
(en)

1998-01-27 2017-01-24 Blanding Hovenweep, Llc Mobile communication device


US9151633B2
(en)

1998-01-27 2015-10-06 Steven M. Hoffberg Mobile communication device for delivering targeted advertisements


US6115607A
(en)

*

1998-01-30 2000-09-05 Qualcomm Incorporated Method and apparatus for reducing messaging traffic in a wireless communication system


WO1999044364A1
(en)

*

1998-02-25 1999-09-02 Cipheractive Communication Security System and method for efficient video encryption utilizing global key and partitioning of data blocks


US20040086119A1
(en)

*

1998-03-24 2004-05-06 Moskowitz Scott A. Method for combining transfer functions with predetermined key creation


US7664263B2
(en)

1998-03-24 2010-02-16 Moskowitz Scott A Method for combining transfer functions with predetermined key creation


US7035409B1
(en)

1998-04-02 2006-04-25 Moskowitz Scott A Multiple transform utilization and applications for secure digital watermarking


US8542831B2
(en)

1998-04-02 2013-09-24 Scott A. Moskowitz Multiple transform utilization and application for secure digital watermarking


US20100220861A1
(en)

*

1998-04-02 2010-09-02 Moskowitz Scott A Multiple transform utilization and application for secure digital watermarking


US20060140403A1
(en)

*

1998-04-02 2006-06-29 Moskowitz Scott A Multiple transform utilization and application for secure digital watermarking


US7738659B2
(en)

1998-04-02 2010-06-15 Moskowitz Scott A Multiple transform utilization and application for secure digital watermarking


US6205249B1
(en)

1998-04-02 2001-03-20 Scott A. Moskowitz Multiple transform utilization and applications for secure digital watermarking


US6848050B1
(en)

1998-04-16 2005-01-25 Citicorp Development Center, Inc. System and method for alternative encryption techniques


EP0952564A3
(en)

*

1998-04-16 2003-09-17 Citicorp Development Center, Inc. System and method for alternative encryption techniques


US6327661B1
(en)

1998-06-03 2001-12-04 Cryptography Research, Inc. Using unpredictable information to minimize leakage from smartcards and other cryptosystems


US7668310B2
(en)

1998-06-03 2010-02-23 Cryptography Research, Inc. Cryptographic computation using masking to prevent differential power analysis and other attacks


US20060045264A1
(en)

*

1998-06-03 2006-03-02 Kocher Paul C Prevention of side channel attacks against block cipher implementations and other cryptographic systems


US7787620B2
(en)

1998-06-03 2010-08-31 Cryptography Research, Inc. Prevention of side channel attacks against block cipher implementations and other cryptographic systems


US6298442B1
(en)

1998-06-03 2001-10-02 Cryptography Research, Inc. Secure modular exponentiation with leak minimization for smartcards and other cryptosystems


WO1999067909A3
(en)

*

1998-06-03 2000-05-04 Cryptography Res Inc Secure modular exponentiation with leak minimization for smartcards and other cryptosystems


US6038318A
(en)

*

1998-06-03 2000-03-14 Cisco Technology, Inc. Optimized machine computation of exponential functions and modulo functions


US20010053220A1
(en)

*

1998-06-03 2001-12-20 Cryptography Research, Inc. Cryptographic computation using masking to prevent differential power analysis and other attacks


US6212279B1
(en)

1998-06-26 2001-04-03 The United States Of America As Represented By The United States National Security Agency Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form


US20030188158A1
(en)

*

1998-07-02 2003-10-02 Kocher Paul C. Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks


US7941666B2
(en)

1998-07-02 2011-05-10 Cryptography Research, Inc. Payment smart cards with hierarchical session key derivation providing security against differential power analysis and other attacks


US9852572B2
(en)

1998-07-02 2017-12-26 Cryptography Research, Inc. Cryptographic token with leak-resistant key derivation


US6243467B1
(en)

1998-07-23 2001-06-05 The United States Of America As Represented By The National Security Agency Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form


US6859791B1
(en)

1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region


US6611812B2
(en)

1998-08-13 2003-08-26 International Business Machines Corporation Secure electronic content distribution on CDS and DVDs


US7110984B1
(en)

1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content


US6959288B1
(en)

1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system


US6263313B1
(en)

1998-08-13 2001-07-17 International Business Machines Corporation Method and apparatus to create encoded digital content


US6345256B1
(en)

1998-08-13 2002-02-05 International Business Machines Corporation Automated method and apparatus to package digital content for electronic distribution using the identity of the source content


US7269564B1
(en)

1998-08-13 2007-09-11 International Business Machines Corporation Method and apparatus to indicate an encoding status for digital content


US7487128B2
(en)

1998-08-13 2009-02-03 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content


US6389403B1
(en)

1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system


US6574609B1
(en)

1998-08-13 2003-06-03 International Business Machines Corporation Secure electronic content management system


US6389538B1
(en)

1998-08-13 2002-05-14 International Business Machines Corporation System for tracking end-user electronic content usage


US6587837B1
(en)

1998-08-13 2003-07-01 International Business Machines Corporation Method for delivering electronic content from an online store


US7206748B1
(en)

1998-08-13 2007-04-17 International Business Machines Corporation Multimedia player toolkit for electronic content delivery


US7590866B2
(en)

1998-08-13 2009-09-15 International Business Machines Corporation Super-distribution of protected digital content


US20060095792A1
(en)

*

1998-08-13 2006-05-04 Hurtado Marco M Super-distribution of protected digital content


US6398245B1
(en)

1998-08-13 2002-06-04 International Business Machines Corporation Key management system for digital content player


US6226618B1
(en)

1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system


US20060089912A1
(en)

*

1998-08-13 2006-04-27 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content


US6418421B1
(en)

1998-08-13 2002-07-09 International Business Machines Corporation Multimedia player for an electronic content delivery system


US6795919B1
(en)

1998-08-14 2004-09-21 Intel Corporation Unique digital signature


US7111173B1
(en)

1998-09-01 2006-09-19 Tecsec, Inc. Encryption process including a biometric unit


US6986044B1
(en)

1998-10-14 2006-01-10 Fuji Xerox Co., Ltd. Method for group unit encryption/decryption, and method and apparatus for writing signature


US7089417B2
(en)

1998-10-16 2006-08-08 Tecsec, Inc. Cryptographic information and flow control


US6684330B1
(en)

1998-10-16 2004-01-27 Tecsec, Inc. Cryptographic information and flow control


US6983371B1
(en)

1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content


US6560337B1
(en)

1998-10-28 2003-05-06 International Business Machines Corporation Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key


US6363154B1
(en)

1998-10-28 2002-03-26 International Business Machines Corporation Decentralized systems methods and computer program products for sending secure messages among a group of nodes


US6535607B1
(en)

1998-11-02 2003-03-18 International Business Machines Corporation Method and apparatus for providing interoperability between key recovery and non-key recovery systems


US7007164B1
(en)

*

1998-11-03 2006-02-28 Infineon Technologies Ag Method and array for authenticating a first instance and a second instance


US7519821B2
(en)

1998-11-09 2009-04-14 First Data Corporation Account authority digital signature (AADS) system


US20050044373A1
(en)

*

1998-11-09 2005-02-24 First Data Corporation Account authority digital signature (aads) system using encoded information


US20020032860A1
(en)

*

1998-11-09 2002-03-14 Wheeler Anne Mcafee Account authority digital signature


US20020112160A2
(en)

*

1998-11-09 2002-08-15 First Data Dorporation Three Party Account Authority Digital Signature (AADS) System


US6820202B1
(en)

1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system


US20020116608A1
(en)

*

1998-11-09 2002-08-22 Wheeler Henry Lynn Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system


US8620814B2
(en)

1998-11-09 2013-12-31 First Data Corporation Three party account authority digital signature (AADS) system


US6981154B2
(en)

1998-11-09 2005-12-27 First Data Corporation Account authority digital signature (AADS) accounts


US20020026575A1
(en)

*

1998-11-09 2002-02-28 Wheeler Lynn Henry Account-based digital signature (ABDS) system


US7549050B2
(en)

1998-11-09 2009-06-16 First Data Corporation Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system


US20050005123A1
(en)

*

1998-11-09 2005-01-06 First Data Corporation Account authority digital signature (aads) system


US7257228B2
(en)

1998-11-09 2007-08-14 First Data Corporation Account authority digital signature (AADS) system using encoded information


US20020129248A1
(en)

*

1998-11-09 2002-09-12 Wheeler Lynn Henry Account-based digital signature (ABDS) system


US7047416B2
(en)

1998-11-09 2006-05-16 First Data Corporation Account-based digital signature (ABDS) system


US6820199B2
(en)

1998-11-09 2004-11-16 First Data Corporation Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system


US6154543A
(en)

*

1998-11-25 2000-11-28 Hush Communications Anguilla, Inc. Public key cryptosystem with roaming user capability


US6292895B1
(en)

1998-11-25 2001-09-18 Hush Communication Corporation Public key cryptosystem with roaming user capability


US7165051B2
(en)

1998-12-04 2007-01-16 Digital River, Inc. Electronic commerce system and method for detecting fraud


US8271396B2
(en)

1998-12-04 2012-09-18 Digital River, Inc. Electronic commerce system and method for detecting fraud


US7058597B1
(en)

1998-12-04 2006-06-06 Digital River, Inc. Apparatus and method for adaptive fraud screening for electronic commerce transactions


US7881972B2
(en)

1998-12-04 2011-02-01 Digital River, Inc. Electronic commerce system and method for detecting fraud


US20030212992A1
(en)

*

1998-12-04 2003-11-13 Ronning Joel A. Apparatus and method for using application signatures for the identification of files


US7617124B1
(en)

1998-12-04 2009-11-10 Digital River, Inc. Apparatus and method for secure downloading of files


US9817650B2
(en)

1998-12-04 2017-11-14 Digital River, Inc. Scheduling of a file download and search for updates


US20070198361A1
(en)

*

1998-12-04 2007-08-23 Digital River, Inc. Electronic commerce system and method for detecting fraud


US8050980B2
(en)

1998-12-04 2011-11-01 Digital River, Inc. Secure downloading of a file from a network system and method


US20070198362A1
(en)

*

1998-12-04 2007-08-23 Digital River, Inc. Electronic commerce system and method for detecting fraud


US20100017417A1
(en)

*

1998-12-04 2010-01-21 Digital River, Inc. Secure Downloading of a File from a Network System and Method


US20050154676A1
(en)

*

1998-12-04 2005-07-14 Digital River, Inc. Electronic commerce system method for detecting fraud


US6473508B1
(en)

1998-12-22 2002-10-29 Adam Lucas Young Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys


US7181602B1
(en)

*

1999-01-25 2007-02-20 Giesecke & Devrient Gmbh Method for exchanging at least one secret initial value between a processing station and a chip card


EP1022696A1
(en)

*

1999-01-25 2000-07-26 Giesecke & Devrient GmbH Method for the exchange of a secret initial value between a processing station and an ic-card


US6931126B1
(en)

*

1999-01-27 2005-08-16 Lucent Technologies Inc. Non malleable encryption method and apparatus using key-encryption keys and digital signature


US8369967B2
(en)

1999-02-01 2013-02-05 Hoffberg Steven M Alarm system controller and a method for controlling an alarm system


US8364136B2
(en)

1999-02-01 2013-01-29 Steven M Hoffberg Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system


US9535563B2
(en)

1999-02-01 2017-01-03 Blanding Hovenweep, Llc Internet appliance system and method


US20110156896A1
(en)

*

1999-02-01 2011-06-30 Hoffberg Steven M Internet appliance system and method


US10361802B1
(en)

1999-02-01 2019-07-23 Blanding Hovenweep, Llc Adaptive pattern recognition based control system and method


US6957330B1
(en)

1999-03-01 2005-10-18 Storage Technology Corporation Method and system for secure information handling


US6487294B1
(en)

1999-03-09 2002-11-26 Paul F. Alexander Secure satellite communications system


EP1693982A3
(en)

*

1999-03-11 2006-08-30 TECSEC, Inc. Method for establishing a secure communication channel


EP1693982A2
(en)

*

1999-03-11 2006-08-23 TECSEC, Inc. Method for establishing a secure communication channel


US7095851B1
(en)

1999-03-11 2006-08-22 Tecsec, Inc. Voice and data encryption method using a cryptographic key split combiner


US7664264B2
(en)

1999-03-24 2010-02-16 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems


US8526611B2
(en)

1999-03-24 2013-09-03 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems


US8781121B2
(en)

1999-03-24 2014-07-15 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems


US10461930B2
(en)

1999-03-24 2019-10-29 Wistaria Trading Ltd Utilizing data reduction in steganographic and cryptographic systems


US9270859B2
(en)

1999-03-24 2016-02-23 Wistaria Trading Ltd Utilizing data reduction in steganographic and cryptographic systems


US20100153734A1
(en)

*

1999-03-24 2010-06-17 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic system


US20070064940A1
(en)

*

1999-03-24 2007-03-22 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic systems


US8160249B2
(en)

1999-03-24 2012-04-17 Blue Spike, Inc. Utilizing data reduction in steganographic and cryptographic system


WO2000064098A1
(en)

*

1999-04-16 2000-10-26 Försvarets Forskningsanstalt Method for distribution of cryptographic keys in a communication network


US7966496B2
(en)

1999-07-02 2011-06-21 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services


US8590008B1
(en)

1999-07-02 2013-11-19 Jpmorgan Chase Bank, N.A. System and method for single sign on process for websites with multiple applications and services


US8381087B1
(en)

1999-07-26 2013-02-19 G&H Nevada-Tek Automated electronic document filing system, method, and article of manufacture


US8739295B2
(en)

1999-08-04 2014-05-27 Blue Spike, Inc. Secure personal content server


US9710669B2
(en)

1999-08-04 2017-07-18 Wistaria Trading Ltd Secure personal content server


US7475246B1
(en)

1999-08-04 2009-01-06 Blue Spike, Inc. Secure personal content server


US8789201B2
(en)

1999-08-04 2014-07-22 Blue Spike, Inc. Secure personal content server


US8171561B2
(en)

1999-08-04 2012-05-01 Blue Spike, Inc. Secure personal content server


US9934408B2
(en)

1999-08-04 2018-04-03 Wistaria Trading Ltd Secure personal content server


US20060184807A1
(en)

*

1999-09-02 2006-08-17 Kocher Paul C Specialized circuitry for cryptographic authentication and other purposes


US9569628B2
(en)

1999-09-02 2017-02-14 Cryptography Research, Inc. Specialized circuitry for cryptographic authentication and other purposes


US7434046B1
(en)

1999-09-10 2008-10-07 Cisco Technology, Inc. Method and apparatus providing secure multicast group communication


US6987855B1
(en)

*

1999-09-10 2006-01-17 Cisco Technology, Inc. Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups


US7181014B1
(en)

1999-09-10 2007-02-20 Cisco Technology, Inc. Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange


US6746330B2
(en)

1999-09-21 2004-06-08 Igt Method and device for implementing a coinless gaming environment


US20040219974A1
(en)

*

1999-09-21 2004-11-04 Cannon Lee E. Method and device for implementing a coinless gaming environment


US7013389B1
(en)

1999-09-29 2006-03-14 Cisco Technology, Inc. Method and apparatus for creating a secure communication channel among multiple event service nodes


US7660983B1
(en)

1999-09-29 2010-02-09 Cisco Technology, Inc. Method and apparatus for creating a secure communication channel among multiple event service nodes


US7260716B1
(en)

1999-09-29 2007-08-21 Cisco Technology, Inc. Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach


US6697944B1
(en)

1999-10-01 2004-02-24 Microsoft Corporation Digital content distribution, transmission and protection system and method, and portable device for use therewith


US20080082446A1
(en)

*

1999-10-01 2008-04-03 Hicks Christian B Remote Authorization for Unlocking Electronic Data System and Method


US8794516B2
(en)

1999-10-25 2014-08-05 Smartflash, LLC Data storage and access systems


US7532725B2
(en)

1999-12-07 2009-05-12 Blue Spike, Inc. Systems and methods for permitting open access to data objects and for securing data within the data objects


US10110379B2
(en)

1999-12-07 2018-10-23 Wistaria Trading Ltd System and methods for permitting open access to data objects and for securing data within the data objects


US8265278B2
(en)

1999-12-07 2012-09-11 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US8798268B2
(en)

1999-12-07 2014-08-05 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US20070110240A1
(en)

*

1999-12-07 2007-05-17 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US20090190754A1
(en)

*

1999-12-07 2009-07-30 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US7813506B2
(en)

1999-12-07 2010-10-12 Blue Spike, Inc System and methods for permitting open access to data objects and for securing data within the data objects


US20070028113A1
(en)

*

1999-12-07 2007-02-01 Moskowitz Scott A Systems, methods and devices for trusted transactions


US10644884B2
(en)

1999-12-07 2020-05-05 Wistaria Trading Ltd System and methods for permitting open access to data objects and for securing data within the data objects


US8538011B2
(en)

1999-12-07 2013-09-17 Blue Spike, Inc. Systems, methods and devices for trusted transactions


US8767962B2
(en)

1999-12-07 2014-07-01 Blue Spike, Inc. System and methods for permitting open access to data objects and for securing data within the data objects


US20110026709A1
(en)

*

1999-12-07 2011-02-03 Scott Moskowitz System and methods for permitting open access to data objects and for securing data within the data objects


US20030135464A1
(en)

*

1999-12-09 2003-07-17 International Business Machines Corporation Digital content distribution using web broadcasting services


US6834110B1
(en)

1999-12-09 2004-12-21 International Business Machines Corporation Multi-tier digital TV programming for content distribution


US20060053077A1
(en)

*

1999-12-09 2006-03-09 International Business Machines Corporation Digital content distribution using web broadcasting services


US7213005B2
(en)

1999-12-09 2007-05-01 International Business Machines Corporation Digital content distribution using web broadcasting services


US7277870B2
(en)

1999-12-09 2007-10-02 International Business Machines Corporation Digital content distribution using web broadcasting services


US7315950B1
(en)

*

1999-12-20 2008-01-01 International Business Machines Corporation Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibility


US6901510B1
(en)

1999-12-22 2005-05-31 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure


US7383436B2
(en)

1999-12-22 2008-06-03 Cisco Technology, Inc. Method and apparatus for distributing and updating private keys of multicast group managers using directory replication


US7103185B1
(en)

1999-12-22 2006-09-05 Cisco Technology, Inc. Method and apparatus for distributing and updating private keys of multicast group managers using directory replication


US7502927B2
(en)

2000-01-12 2009-03-10 Cisco Technology, Inc. Directory enabled secure multicast group communications


US20050097317A1
(en)

*

2000-01-12 2005-05-05 Jonathan Trostle Directory enabled secure multicast group communications


US7089211B1
(en)

2000-01-12 2006-08-08 Cisco Technology, Inc. Directory enabled secure multicast group communications


US6985869B1
(en)

2000-01-21 2006-01-10 Nextmed, Llc Digital prescription carrier and monitor system


US6965992B1
(en)

2000-02-24 2005-11-15 3Com Corporation Method and system for network security capable of doing stronger encryption with authorized devices


US20070265099A1
(en)

*

2000-03-03 2007-11-15 Cole Joseph W Gaming apparatus having wide screen display


US20110179409A1
(en)

*

2000-03-08 2011-07-21 Igt Computerized gaming system, method and apparatus


US20020049909A1
(en)

*

2000-03-08 2002-04-25 Shuffle Master Encryption in a secure computerized gaming system


US7470182B2
(en)

2000-03-08 2008-12-30 Igt Computerized gaming system, method and apparatus


US20070015590A1
(en)

*

2000-03-08 2007-01-18 Igt Encryption in a secure computerized gaming system


US20040198479A1
(en)

*

2000-03-08 2004-10-07 Igt Computerized gaming system, method and apparatus


US20080058097A1
(en)

*

2000-03-08 2008-03-06 Igt Computerized gaming system, method and apparatus


US7043641B1
(en)

2000-03-08 2006-05-09 Igt Encryption in a secure computerized gaming system


US7783040B2
(en)

2000-03-08 2010-08-24 Igt Encryption in a secure computerized gaming system


US20110177867A1
(en)

*

2000-03-08 2011-07-21 Igt Computerized gaming system, method and apparatus


US7116782B2
(en)

2000-03-08 2006-10-03 Igt Encryption in a secure computerized gaming system


US7117362B2
(en)

*

2000-03-14 2006-10-03 Sony Corporation Information providing apparatus and method, information processing apparatus and method, and program storage medium


US20050165771A1
(en)

*

2000-03-14 2005-07-28 Sony Corporation Information providing apparatus and method, information processing apparatus and method, and program storage medium


US20050165770A1
(en)

*

2000-03-14 2005-07-28 Sony Corporation Information providing apparatus and method, information processing apparatus and method, and program storage medium


US7124297B2
(en)

*

2000-03-14 2006-10-17 Sony Corporation Information providing apparatus and method, information processing apparatus and method, and program storage medium


US20040186996A1
(en)

*

2000-03-29 2004-09-23 Gibbs Benjamin K. Unique digital signature


MD1872G2
(en)

*

2000-04-25 2002-09-30 Компания ДЕКАРТ с ограниченной ответственностью Proces and device for providing the authenticated exchange with undisclosed keys through open communication channels


US7162035B1
(en)

2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system


US7080041B2
(en)

2000-05-24 2006-07-18 Esecuredocs, Inc. System and method for production and authentication of original documents


US9811671B1
(en)

2000-05-24 2017-11-07 Copilot Ventures Fund Iii Llc Authentication method and system


US7089420B1
(en)

2000-05-24 2006-08-08 Tracer Detection Technology Corp. Authentication method and system


US9363083B1
(en)

2000-05-24 2016-06-07 Copilot Ventures Fund Iii Llc Authentication method and system


US8270603B1
(en)

2000-05-24 2012-09-18 Tracer Detection Technology Corp. Authentication method and system


US7152047B1
(en)

2000-05-24 2006-12-19 Esecure.Biz, Inc. System and method for production and authentication of original documents


US6895502B1
(en)

2000-06-08 2005-05-17 Curriculum Corporation Method and system for securely displaying and confirming request to perform operation on host computer


US7225331B1
(en)

2000-06-15 2007-05-29 International Business Machines Corporation System and method for securing data on private networks


US8272060B2
(en)

2000-06-19 2012-09-18 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses


US8204945B2
(en)

2000-06-19 2012-06-19 Stragent, Llc Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail


US6941457B1
(en)

2000-06-30 2005-09-06 Cisco Technology, Inc. Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key


US7587368B2
(en)

2000-07-06 2009-09-08 David Paul Felsher Information record infrastructure, system and method


US20090158029A1
(en)

*

2000-08-04 2009-06-18 First Data Corporation Manufacturing unique devices that generate digital signatures


US20030177361A1
(en)

*

2000-08-04 2003-09-18 Wheeler Lynn Henry Method and system for using electronic communications for an electronic contract


US7200749B2
(en)

2000-08-04 2007-04-03 First Data Corporation Method and system for using electronic communications for an electronic contract


US6938156B2
(en)

2000-08-04 2005-08-30 First Data Corporation ABDS system and verification status for authenticating entity access


US6978369B2
(en)

2000-08-04 2005-12-20 First Data Corporation Person-centric account-based digital signature system


US20020016913A1
(en)

*

2000-08-04 2002-02-07 Wheeler Lynn Henry Modifying message data and generating random number digital signature within computer chip


US7784106B2
(en)

2000-08-04 2010-08-24 First Data Corporation Manufacturing unique devices that generate digital signatures


US6915430B2
(en)

2000-08-04 2005-07-05 First Data Corporation Reliably identifying information of device generating digital signatures


US20030014372A1
(en)

*

2000-08-04 2003-01-16 Wheeler Lynn Henry Trusted authentication digital signature (tads) system


US6983368B2
(en)

2000-08-04 2006-01-03 First Data Corporation Linking public key of device to information during manufacture


US7096354B2
(en)

2000-08-04 2006-08-22 First Data Corporation Central key authority database in an ABDS system


US7010691B2
(en)

2000-08-04 2006-03-07 First Data Corporation ABDS system utilizing security information in authenticating entity access


US6957336B2
(en)

2000-08-04 2005-10-18 First Data Corporation Establishing initial PuK-linked account database


US6952773B2
(en)

2000-08-04 2005-10-04 First Data Corporation Requesting execution of instructions on accounts in ABDS system


US7143284B2
(en)

2000-08-04 2006-11-28 First Data Corporation ABDS method and verification status for authenticating entity access


US20030131235A1
(en)

*

2000-08-04 2003-07-10 First Data Corporation ABDS Method Utilizing Security Information in Authenticating Entity Access


US20030131234A1
(en)

*

2000-08-04 2003-07-10 First Data Corporation Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource


US6789189B2
(en)

2000-08-04 2004-09-07 First Data Corporation Managing account database in ABDS system


US7558965B2
(en)

2000-08-04 2009-07-07 First Data Corporation Entity authentication in electronic communications by providing verification status of device


US20030126438A1
(en)

*

2000-08-04 2003-07-03 First Data Corporation ABDS System and Verification Status for Authenticating Entity Access


US20030126437A1
(en)

*

2000-08-04 2003-07-03 First Data Corporation ABDS Method and Verification Status for Authenticating Entity Access


US20040005051A1
(en)

*

2000-08-04 2004-01-08 Wheeler Lynn Henry Entity authentication in eletronic communications by providing verification status of device


US20030126439A1
(en)

*

2000-08-04 2003-07-03 First Data Corporation ABDS System Utilizing Security Information in Authenticating Entity Access


US20030115151A1
(en)

*

2000-08-04 2003-06-19 Wheeler Lynn Henry Person-centric account-based digital signature system


US6892302B2
(en)

2000-08-04 2005-05-10 First Data Corporation Incorporating security certificate during manufacture of device generating digital signatures


US7047414B2
(en)

2000-08-04 2006-05-16 First Data Corporation Managing database for reliably identifying information of device generating digital signatures


US20030097570A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures


US7028185B2
(en)

2000-08-04 2006-04-11 First Data Corporation Managing database for identifying to recipients security features of devices generating digital signatures


US20030097561A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Gauging Risk in Electronic Communications Regarding Accounts in ABDS System


US20030115463A1
(en)

*

2000-08-04 2003-06-19 First Data Corporation Requesting Execution of Instructions on Accounts in ABDS System


US7552333B2
(en)

2000-08-04 2009-06-23 First Data Corporation Trusted authentication digital signature (tads) system


US20020023217A1
(en)

*

2000-08-04 2002-02-21 Wheeler Lynn Henry Manufacturing unique devices that generate digital signatures


US20030097562A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Managing Database for Reliably Identifying Information of Device Generating Digital Signatures


US7500272B2
(en)

2000-08-04 2009-03-03 First Data Corporation Manufacturing unique devices that generate digital signatures


US20030101136A1
(en)

*

2000-08-04 2003-05-29 First Data Corporation Managing Account Database in ABDS System


US7082533B2
(en)

2000-08-04 2006-07-25 First Data Corporation Gauging risk in electronic communications regarding accounts in ABDS system


US6950940B2
(en)

2000-08-04 2005-09-27 First Data Corporation ABDS method utilizing security information in authenticating entity access


US20030101344A1
(en)

*

2000-08-04 2003-05-29 First Data Corporation Establishing Initial PuK-Linked Account Database


US6851054B2
(en)

2000-08-04 2005-02-01 First Data Corporation Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource


US20040030901A1
(en)

*

2000-08-04 2004-02-12 Lynn Henry Wheeler Linking public key of device to information during manufacture


US6959381B2
(en)

2000-08-04 2005-10-25 First Data Corporation Central key authority (CKA) database for user accounts in ABDS system


US20030097573A1
(en)

*

2000-08-04 2003-05-22 First Data Corporation Central Key Authority Database in an ABDS System


US20020056040A1
(en)

*

2000-08-10 2002-05-09 Timothy J. Simms System and method for establishing secure communication


US7373507B2
(en)

2000-08-10 2008-05-13 Plethora Technology, Inc. System and method for establishing secure communication


US6978382B1
(en)

2000-08-14 2005-12-20 Qualcomm Incorporated Method and an apparatus for granting use of a session of a packet data transmission standard designated by an identifier


WO2002014986A2
(en)

2000-08-15 2002-02-21 Chargenet Limited Method and apparatus for controlling or monitoring access to the content of a telecommunicable data file


US6834342B2
(en)

2000-08-16 2004-12-21 Eecad, Inc. Method and system for secure communication over unstable public connections


US20020021803A1
(en)

*

2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic identification and digital signature method using efficient elliptic curve


US8478998B2
(en)

2000-08-18 2013-07-02 Symantec Corporation Authenticated communication using a shared unpredictable secret


US20020021810A1
(en)

*

2000-08-18 2002-02-21 Solinas Jerome Anthony Cryptographic key exchange method using efficient elliptic curve


US6898284B2
(en)

2000-08-18 2005-05-24 The United States Of America As Represented By The National Security Agency Cryptographic identification and digital signature method using efficient elliptic curve


US20020062452A1
(en)

*

2000-08-18 2002-05-23 Warwick Ford Countering credentials copying


US20070192829A1
(en)

*

2000-08-18 2007-08-16 Warwick Ford Authenticated communication using a shared unpredictable secret


US20020025034A1
(en)

*

2000-08-18 2002-02-28 Solinas Jerome Anthony Cryptographic encryption method using efficient elliptic curve


US6993136B2
(en)

2000-08-18 2006-01-31 The United States Of America As Represented By The National Security Agency Cryptographic key exchange method using efficient elliptic curve


US20070149280A1
(en)

*

2000-08-21 2007-06-28 Igt Method and Apparatus for Software Authentication


US7520811B2
(en)

2000-08-21 2009-04-21 Igt Method and apparatus for software authentication


US20020062447A1
(en)

*

2000-08-31 2002-05-23 King James E. Secure network identification


US6935953B2
(en)

2000-08-31 2005-08-30 Adrian R. Marcu Method and apparatus for encoding vouchers in a casino gaming system


US7020282B1
(en)

*

2000-09-05 2006-03-28 Chung Nan Chang Simplified secure, swift cryptographic key exchange


US20100106736A1
(en)

*

2000-09-07 2010-04-29 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US7242772B1
(en)

2000-09-07 2007-07-10 Eastman Kodak Company Encryption apparatus and method for synchronizing multiple encryption keys with a data stream


US7660700B2
(en)

2000-09-07 2010-02-09 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US8712728B2
(en)

2000-09-07 2014-04-29 Blue Spike Llc Method and device for monitoring and analyzing signals


US8214175B2
(en)

2000-09-07 2012-07-03 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US7346472B1
(en)

2000-09-07 2008-03-18 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US7949494B2
(en)

2000-09-07 2011-05-24 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US20080109417A1
(en)

*

2000-09-07 2008-05-08 Blue Spike, Inc. Method and device for monitoring and analyzing signals


US20040243540A1
(en)

*

2000-09-07 2004-12-02 Moskowitz Scott A. Method and device for monitoring and analyzing signals


US6978375B1
(en)

2000-09-08 2005-12-20 International Business Machines Corporation System and method for secure authentication of external software modules provided by third parties


US7500109B2
(en)

2000-09-08 2009-03-03 International Business Machines Corporation System and method for secure authentication of external software modules provided by third parties


US20050216422A1
(en)

*

2000-09-08