$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cryptographic apparatus and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/04
출원번호 US-0830754 (1977-09-06)
발명자 / 주소
  • Hellman Martin E. (Stanford CA) Diffie Bailey W. (Berkeley CA) Merkle Ralph C. (Palo Alto CA)
출원인 / 주소
  • Stanford University (Palo Alto CA 02)
인용정보 피인용 횟수 : 874  인용 특허 : 0

초록

A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal an

대표청구항

A secure key generator comprising: a first input connected to receive an applied first signal; a second input connected to receive an applied second signal; a first output; a second output; and means for generating at the first output a third signal, that is a transformation of said first signal and

이 특허를 인용한 특허 (874)

  1. Luna, Michael; Fiatal, Trevor A., 3D mobile user interface with configurable workspace management.
  2. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  3. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  4. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  5. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  6. Libin, Phil; Micali, Silvio, Access control.
  7. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  11. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  12. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  13. Libin,Phil, Actuating a security system using a wireless device.
  14. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  15. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  16. Luna, Michael; Tervahauta, Mikko, Aligning data transfer to optimize connections established for transmission over a wireless network.
  17. Wyner, Aaron D., Analog signal scrambling system.
  18. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  19. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  20. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  21. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  22. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  23. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  24. Luna, Michael; Tsõmbaljuk, Andrei, Application and network-based long poll request detection and cacheability assessment therefor.
  25. Backholm, Ari; Liang, Sheng, Application discovery on mobile devices.
  26. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Application or context aware fast dormancy.
  27. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  28. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  29. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  30. Ford, Warwick, Authenticated communication using a shared unpredictable secret.
  31. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  32. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  33. Durst, David I.; Kaish, Norman; Fraser, Jay; Hoffberg, Michael; Rodricks, Brian, Authentication method and system.
  34. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  35. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  36. Fraser, Jay, Authentication method and system.
  37. Fraser, Jay, Authentication method and system.
  38. Fraser, Jay; Weber, Larry, Authentication method and system.
  39. Fraser, Jay; Weber, Larry, Authentication method and system.
  40. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  41. Krahn, Darren; Hamid, Laurence, Authentication system and method.
  42. Krahn, Darren; Hamid, Laurence, Authentication system and method.
  43. Hellman Martin E., Authentication using random challenges.
  44. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  45. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  46. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  47. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  48. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  49. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  50. Cheline,Douglas A.; Ma,Michael; Zhang,Ye; Chong,Lester J., Automated configuration of a virtual private network.
  51. Hickman, Paul L.; Gough, James J., Automated electronic document filing system, method, and article of manufacture.
  52. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  53. Luna, Michael; Bott, Ross, Automatic generation and distribution of policy information regarding malicious mobile traffic in a wireless network.
  54. Fiatal, Trevor, Bandwidth measurement.
  55. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  56. Luna, Michael; Ponomarenko, Andrei, Cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  57. Luna, Michael, Cache state management on a mobile device to preserve user experience.
  58. Thomas, Terence Neil; Davis, Stephen J., Calculating apparatus having a plurality of stages.
  59. Ronning Joel A., Central database system for automatic software program sales.
  60. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  61. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  62. Micali Silvio, Certificate issue lists.
  63. Micali Silvio, Certificate revocation system.
  64. Micali Silvio, Certificate revocation system.
  65. Micali, Silvio, Certificate revocation system.
  66. Mizrah,Len L., Communication session encryption and authentication system.
  67. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  68. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  69. Arnold, Mark G.; Winkel, Mark D., Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software.
  70. Benedek, Aaron Sanjaya, Computer-implemented cryptographic method for improving a computer network, and terminal, system and computer-readable medium for the same.
  71. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  72. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  73. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Connection architecture for a mobile network.
  74. Fiatal, Trevor, Content delivery to a mobile device from a content service.
  75. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Context aware data presentation.
  76. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  77. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  78. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  79. Han, Minghui; Wachs, Megan; Lan, Hai, Countermeasure to power analysis attacks through time-varying impedance of power delivery networks.
  80. Fleming, Michael, Cross-platform event engine.
  81. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  82. Solinas, Jerome Anthony, Cryptographic identification and digital signature method using efficient elliptic curve.
  83. Wack, C. Jay; Scheidt, Edward M.; Morris, Jeffrey K., Cryptographic information and flow control.
  84. Wack,C. Jay; Scheidt,Edward M.; Morris,Jeffrey K., Cryptographic information and flow control.
  85. Solinas,Jerome Anthony, Cryptographic key exchange method using efficient elliptic curve.
  86. Goss Kenneth C (Oceano CA), Cryptographic method and apparatus for public key exchange with authentication.
  87. Vogelesang A. Ian ; Claunch Carl V., Cryptographic system and protocol for establishing secure authenticated remote access.
  88. Zimmermann Philip, Cryptographic system with methods for user-controlled message recovery.
  89. Zimmermann,Philip, Cryptographic system with methods for user-controlled message recovery.
  90. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  91. Carapelli, Giovanni; Welch, Bruce, Cryptographic watermarking of content in fuel dispensing environments.
  92. Näslund, Mats; Blom, Rolf, Cryptography using finite fields of odd characteristic on binary hardware.
  93. Miyaguchi Shoji (Yokohama JPX), Cryptosystem.
  94. Ajtai Miklos, Cryptosystem employing worst-case difficult-to solve lattice problem.
  95. Jiawook Rizgar Nabi,SEX ; Heidari Babak,SEX ; Olsson Lennart,SEX, Cryptosystem for optical storage.
  96. Koh,Jee H., Cryptosystems using commuting pairs in a monoid.
  97. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  98. Thakore, Darshak; Hoggan, Stuart; Belt, Dave; Bhagwat, Amol, DTCP certificate authentication over TLS protocol.
  99. Thakore, Darshak; Hoggan, Stuart; Belt, Dave; Bhagwat, Amol, DTCP certificate authentication over TLS protocol.
  100. Clayton, Ray; Mendoza, Eliel J.; Cochran, Ronn Warren, Data encryption system and method.
  101. Moskowitz, Scott A., Data protection method and device.
  102. Moskowitz, Scott A., Data protection method and device.
  103. Moskowitz, Scott A., Data protection method and device.
  104. Moskowitz, Scott A., Data protection method and device.
  105. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  106. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  107. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  108. Gidwani, Arvind, Demand based encryption and key generation and distribution systems and methods.
  109. Moerder Karl E. (Poway CA), Descrambler subscriber key production system utilizing key seeds stored in descrambler.
  110. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  111. Luna, Michael, Detecting and preserving state for satisfying application requests in a distributed proxy and cache system.
  112. Hoffberg, Steven M., Detection and alert of automobile braking event.
  113. Luna, Michael; Bott, Ross, Detection and management of user interactions with foreground applications on a mobile device in distributed caching.
  114. Naccache, David; Coron, Jean-Sébastien; Tibouchi, Medhi, Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm.
  115. Luna, Michael; Bott, Ross, Device resources sharing for network resource conservation.
  116. Rubin, Frank, Device, system and method for cryptographic key exchange.
  117. Rubin, Frank, Device, system and method for cryptographic key exchange.
  118. Etchegoyen, Craig S., Device-specific content delivery.
  119. Etchegoyen, Craig S., Device-specific content delivery.
  120. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  121. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  122. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  123. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  124. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  125. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  126. Jones, Thomas C.; Brackenridge, Billy, Digital content distribution, transmission and protection system and method, and portable device for use therewith.
  127. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  128. Rowe, Richard E., Digital identification of unique game characteristics.
  129. Rowe,Richard E., Digital identification of unique game characteristics.
  130. Stoll,Thomas G.; Schmidt,Karl P., Digital prescription carrier and monitor system.
  131. Merkle Ralph C. (1134 Pimento Ave. Sunnyvale CA 94087), Digital signature system and method based on a conventional encryption function.
  132. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  133. Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad; Srivastava,Sunil, Directory enabled secure multicast group communications.
  134. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  135. Luna, Michael; Haines, John, Distributed caching for resource and mobile network traffic management.
  136. Luna, Michael; Tsõmbaljuk, Andrei, Distributed caching in a wireless network of content delivered for a mobile application over a long-held request.
  137. Engberg, David, Distributed delegated path discovery and validation.
  138. Backholm, Ari; Luna, Michael, Distributed implementation of dynamic wireless traffic policy.
  139. Luna, Michael; Tervahauta, Mikko, Distributed management of keep-alive message signaling for mobile network resource conservation and optimization.
  140. Micali Silvio, Distributed split-key cryptosystem and applications.
  141. Luna, Michael; Ponomarenko, Andrei, Distributed system for cache defeat detection and caching of content addressed by identifiers intended to defeat cache.
  142. Hodges, Stephen E.; Wood, Kenneth R.; Srinivasan, James; Sellen, Abigail, Distribution of keys for encryption/decryption.
  143. Cheline,Douglas A.; Ma,Michael; Zhang,Ye; Chong,Lester J., Domain name system resolution.
  144. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  145. Luna, Michael, Dynamic bandwidth adjustment for browsing or streaming activity in a wireless network based on prediction of user behavior when interacting with mobile applications.
  146. Luna, Michael; Bott, Ross, Dynamic categorization of applications for network access in a mobile network.
  147. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  148. Micali,Silvio, Efficient certificate revocation.
  149. Nabeel, Mohamed; Stork, David G., Efficient, remote, private tree-based classification using cryptographic techniques.
  150. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  151. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  152. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  153. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  154. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  155. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  156. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  157. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  158. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  159. Alcorn, Allan E.; Jenkins, Harry H., Electronic gaming apparatus having authentication data sets.
  160. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  161. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  162. Backholm, Ari; Vuornos, Lauri, Electronic-mail filtering for mobile devices.
  163. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Elliptic polynomial cryptography with secret key embedding.
  164. Schneider, James P., Embedding a secret in a bit string for safeguarding the secret.
  165. Tehranchi,Babak, Encryption apparatus and method for synchronizing multiple encryption keys with a data stream.
  166. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  167. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  168. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  169. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  170. Wilkins, John; Keefe, Michael; Rehman, Sam, Encryption key exchange system and method.
  171. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  172. Scheidt,Edward M., Encryption process including a biometric unit.
  173. Everhart Joseph R. (Holmdel NJ) Osborn Jeffrey G. (Old Bridge NJ), Encryption system key distribution method and apparatus.
  174. Zeidler Howard M. (Palo Alto CA), End-to-end encryption system and method of operation.
  175. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  176. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  177. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  178. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  179. Bott, Ross, Enhanced customer service for mobile carriers using real-time and historical mobile application and traffic or optimization data associated with mobile devices in a mobile network.
  180. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  181. Gundavelli, Srinath; McNamee, David, Establishing a new shared secret key over a broadcast channel for a multicast group based on an old shared secret key.
  182. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  183. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  184. Carrasco, Serge-Paul, Ethernet encryption over resilient virtual private LAN services.
  185. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  186. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  187. Schneider, James P., Extending a secret bit string to safeguard the secret.
  188. Ariel, Ido; van Gent, Robert Paul, Extending user relationships.
  189. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  190. Pellacuru,Chinna Narasimha Reddy, Facilitating secure communications among multicast nodes in a telecommunications network.
  191. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  192. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  193. Al Khoraidly, Abdulaziz; Ibrahim, Mohammad K., Finite field serial-serial multiplication/reduction structure and method.
  194. Luna, Michael, Flexible and dynamic integration schemas of a traffic management system with various network operators for network traffic alleviation.
  195. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, Flexible billing architecture.
  196. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  197. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  198. Backholm, Ari; Sawney, Parvinder, Flexible real-time inbox access.
  199. Steele Raymond (Hazlet NJ), Fourier masking analog signal secure communication system.
  200. Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  201. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  202. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  203. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  204. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  205. Cannon, Lee E., Gaming apparatus with encryption and method.
  206. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  207. Steven A. Weiss ; Rex R. Carlson, Gaming device security system: apparatus and method.
  208. Weiss Steven A. ; Carlson Rex R., Gaming device security system: apparatus and method.
  209. Saffari, Ali, Gaming machine with promotional item dispenser.
  210. Saffari,Ali, Gaming machine with promotional item dispenser.
  211. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  212. Brown, Michael Kenneth; Little, Herbert Anthony; Brown, Michael Stephen; Adams, Neil Patrick, Generating a symmetric key to secure a communication link.
  213. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  214. Reznik, Alexander; Kumoluyi, Akinlolu Oloruntosi; Zhang, Guodong; Chitrapu, Prabhakar R.; Sternberg, Gregory S.; Shah, Yogendra C.; Briancon, Alain Charles Louis; Ye, Chunxuan, Generation of perfectly secret keys in wireless communication networks.
  215. Reznik, Alexander; Kumoluyi, Akinlolu Oloruntosi; Zhang, Guodong; Chitrapu, Prabhakar R.; Sternberg, Gregory S.; Shah, Yogendra C.; Briancon, Alain Charles Louis; Ye, Chunxuan, Generation of perfectly secret keys in wireless communication networks.
  216. Aoki, Ryuichi, Group oriented public key encryption and key management system.
  217. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Najjar, Atef J., Hash functions using elliptic curve cryptography.
  218. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  219. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  220. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  221. Luna, Michael; Bott, Ross, Hierarchies and categories for management and deployment of policies for distributed wireless traffic optimization.
  222. Powell Gregory Alan ; Wilson Mark William ; Truong Kevin Quoc ; Curren Christopher Peter, High speed modular exponentiator.
  223. Carrasco, Serge-Paul, IP encryption over resilient BGP/MPLS IP VPN.
  224. Ohashi Masayoshi,JPX ; Sakai Seiichiro,JPX ; Suzuki Toshinori,JPX, Identity confidentiality method in radio communication system.
  225. Whillock, Asa; Chan, Edward; Manapragada, Srinivas; Kaufman, Matthew; Shetty, Pritham; Thornburgh, Michael, Imparting cryptographic information in network communications.
  226. Whillock, Asa; Chan, Edward; Manapragada, Srinivas; Kaufman, Matthew; Shetty, Pritham; Thornburgh, Michael, Imparting cryptographic information in network communications.
  227. Shetty, Pritham; Whillock, Asa; Chan, Edward; Manapragada, Srinivas; Kaufman, Matthew; Thornburgh, Michael, Imparting real-time priority-based network communications in an encrypted communication session.
  228. Asokan, Nadarajah; Ekberg, Jan-Erik; Paatero, Lauri, Implementation of an integrity-protected secure storage.
  229. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  230. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  231. Go,Naomi; Kurihara,Akira, Information providing apparatus and method, information processing apparatus and method, and program storage medium.
  232. Felsher, David Paul, Information record infrastructure, system and method.
  233. Moreau Thierry,CAX, Initial secret key establishment including facilities for verification of identity.
  234. Fiatal, Trevor, Integrated messaging.
  235. Fiatal, Trevor, Integrated messaging.
  236. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  237. Fleming, Michael, Intelligent rendering of information in a limited display environment.
  238. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  239. Murphy Frederick J., Internet global area networks fax system.
  240. Smith, Ned M., Internet of things group formation using a key-based join protocol.
  241. Struik, Marinus, Key agreement and transport protocol.
  242. Struik, Marinus, Key agreement and transport protocol.
  243. Struik, Marinus, Key agreement and transport protocol.
  244. Struik,Marinus, Key agreement and transport protocol.
  245. Vanstone,Scott A.; Menezes,Alfred J.; Qu,Minghua; Struik,Rene, Key agreement and transport protocol.
  246. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  247. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  248. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Mingua,CAX, Key agreement and transport protocol with implicit signatures.
  249. Vanstone, Scott Alexander; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  250. Vanstone, Scott; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  251. Vanstone, Scott; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  252. Mizrah,Len L., Key conversion method for communication session encryption and authentication system.
  253. Mizrah, Len L., Key generation method for communication session encryption and authentication system.
  254. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  255. Van Oorschot Paul C.,CAX ; Wiener Michael James,CAX, Key management system for mixed-trust environments.
  256. Scott C. Vanstone CA; Robert J. Zuccherato CA, Key transmission system.
  257. Vanstone Scott C.,CAX ; Zuccherato Robert J.,CAX, Key transmission system.
  258. Kocher Paul C. ; Jaffe Joshua M., Leak-resistant cryptographic method and apparatus.
  259. Paul C. Kocher ; Joshua M. Jaffe, Leak-resistant cryptographic method and apparatus.
  260. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  261. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  262. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  263. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  264. Fiatal, Trevor; Guesman, Jason, Location-based operations and messaging.
  265. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  266. Backholm, Ari; Salorinne, Seppo; Ahonen, Jukka; Daavittila, Mikko; Everitt, Andrew; Vuornos, Lauri, Maintaining an IP connection in a mobile network.
  267. Backholm, Ari; Ahonen, Jukka; Groeber, Marcus; Salorinne, Seppo; Vuornos, Lauri; Saarlilahti, Antti; Ketonen, Marko; Salmi, Petri, Maintaining mobile terminal information for secure communications.
  268. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  269. Luna, Michael; Bott, Ross, Managing cache to prevent overloading of a wireless network due to user activity.
  270. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  271. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  272. Alvarado, Billy; Ariel, Ido; van Gent, Robert Paul, Managing user-to-user contact with inferred presence information.
  273. Gvili, Yaron, Manicoding for communication verification.
  274. Gvili, Yaron, Manicoding for communication verification.
  275. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  276. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  277. Gehrmann, Christian, Message authentication.
  278. Bender, Paul E.; Rezaiifar, Ramin, Method and an apparatus for granting use of a session of a packet data transmission standard designated by an identifier.
  279. Zhang Jinglong F, Method and apparatus for a robust high-speed cryptosystem.
  280. Shelby, Michael B.; Dailey, Mark N., Method and apparatus for authenticating and verifying communication on a network of gaming devices.
  281. Srivastava, Sunil K.; Trostle, Jonathan; Bell, Raymond; Golla, Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  282. Srivastava,Sunil K.; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for creating a secure communication channel among multiple event service nodes.
  283. Srivastava, Sunil K., Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure.
  284. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  285. Srivastava,Sunil; Trostle,Jonathan; Bell,Raymond; Golla,Ramprasad, Method and apparatus for distributing and updating private keys of multicast group managers using directory replication.
  286. Jakobsson,Bjorn Markus; MacKenzie,Philip D, Method and apparatus for distributing shares of a password for use in multi-server password authentication.
  287. Marcu, Adrian R., Method and apparatus for encoding vouchers in a casino gaming system.
  288. Nguyen, Nam; Zhang, Donggen; Tomalenas, Paul, Method and apparatus for end-to-end mobile user security.
  289. Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
  290. Dondeti, Lakshminath, Method and apparatus for generating large numbers of encryption keys.
  291. Fiatal, Trevor A.; Sutaria, Jay; Nanjundeswaran, Sridhar; Bavadekar, Shailesh, Method and apparatus for intercepting events in a communication system.
  292. Chandersekaran Coimbatore S. ; Gennaro Rosario ; Gupta Sarbari ; Matyas ; Jr. Stephen M. ; Safford David R. ; Zunic Nevenko, Method and apparatus for interoperable validation of key recovery information in a cryptographic system.
  293. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  294. Marker ; Jr. Walter S. (Warrenville IL), Method and apparatus for multi-channel communication security.
  295. Herley, Cormac; Xu, Yihong, Method and apparatus for partial encryption of content.
  296. Yagasaki Yoichi,JPX ; Tahara Katsumi,JPX, Method and apparatus for picture encoding and decoding.
  297. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  298. Chandersekaran, Coimbatore S.; Gennaro, Rosario; Gupta, Sarbari; Matyas, Jr., Stephen M.; Safford, David R.; Zunic, Nevenko, Method and apparatus for providing interoperability between key recovery and non-key recovery systems.
  299. Crandall Richard E. (Portland OR), Method and apparatus for public key exchange in a cryptographic system.
  300. Holcman Alejandro R., Method and apparatus for reducing messaging traffic in a wireless communication system.
  301. Eames Thomas R. ; Trinh Lac X. ; Manchester E. Barton ; Yearwood Bradley N. ; Manley David J. ; Hicks Scott T. ; Johal Jaskarn S. ; Eldering Charles A., Method and apparatus for reliable operation of universal voice grade cards.
  302. Smeets,Bernhard Jan Marie; Poon,Kar Fat; Bodensjo,Marcus, Method and apparatus for secure leveled access control.
  303. Atalla Martin M. (Atherton CA), Method and apparatus for securing data transmissions.
  304. Bruce Schneier ; Jay S. Walker ; James A. Jorasch, Method and apparatus for securing electronic games.
  305. Schneier Bruce ; Walker Jay S. ; Jorasch James A., Method and apparatus for securing electronic games.
  306. Schneier Bruce ; Walker Jay S. ; Jorasch James A., Method and apparatus for securing electronic games.
  307. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  308. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  309. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  310. Gennaro Rosario ; Karger Paul Ashley ; Matyas ; Jr. Stephen Michael ; Peyravian Mohammad ; Safford David Robert ; Zunic Nevenko, Method and apparatus for verifiably providing key recovery information in a cryptographic system.
  311. Kobozev,Alexey; Zavalkovsky,Arthur; Frenkel,Ilan, Method and apparatus for verifying revocation status of a digital certificate.
  312. Srivastava,Sunil K., Method and apparatus providing secure multicast group communication.
  313. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  314. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  315. Euchner,Martin, Method and array for authenticating a first instance and a second instance.
  316. Lind, Patric; Weinans, Erwin, Method and device for bluetooth pairing.
  317. Cannon, Lee E., Method and device for implementing a coinless gaming environment.
  318. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  319. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  320. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  321. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  322. Krawczyk, Hugo M., Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols.
  323. Gladney Henry Martin, Method and system for a federated digital library by managing links.
  324. Brown, Daniel Richard L., Method and system for cheon resistant static diffie-hellman security.
  325. Craft, David John; Dubey, Pradeep K.; Hofstee, Harm Peter; Kahle, James Allan, Method and system for controlled distribution of application code and content data within a computer network.
  326. Rudolf, Marian; Mukherjee, Rajat Pritam, Method and system for deriving an encryption key using joint randomness not shared by others.
  327. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  328. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  329. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  330. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  331. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  332. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  333. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  334. Yuan Chuan K. ; Hao Feng Q., Method and system for establishing a cryptographic key agreement using linear protocols.
  335. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  336. Luna, Michael; Tervahauta, Mikko; Pan, Yixin, Method and system for management of a virtual network connection without heartbeat messages.
  337. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  338. Metke, Anthony E.; Lewis, Adam C.; Popovich, George, Method and system for mutual authentication of nodes in a wireless communication network.
  339. Joseph, Boby; Freed, Michael; Borella, Michael S., Method and system for network security capable of doing stronger encryption with authorized devices.
  340. DiSanto,Frank J.; Krusos,Denis A.; Lewit,Edward, Method and system for preventing computer worm dissemination using encryption.
  341. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  342. Bleumer,Gerrit; Heinrich,Glemens, Method and system for real-time registration of transactions with a security module.
  343. Halliday, David C.; Lauderback, David W.; Hahad, Mounir; Potts, Michael A. S., Method and system for secure communication over unstable public connections.
  344. Hughes, James P., Method and system for secure information handling.
  345. Fraser, Neil R., Method and system for securely displaying and confirming request to perform operation on host computer.
  346. Sampigethaya, Radhakrishna G., Method and system for securely establishing cryptographic keys for aircraft-to-aircraft communications.
  347. DiSanto, Frank J.; Krusos, Denis A., Method and system for securely exchanging encryption key determination information.
  348. DiSanto, Frank J.; Krusos, Denis A., Method and system for securely exchanging encryption key determination information.
  349. DiSanto,Frank J.; Krusos,Denis A., Method and system for securely exchanging encryption key determination information.
  350. DiSanto,Frank J.; Krusos,Denis A., Method and system for selecting encryption keys from a plurality of encryption keys.
  351. Lao, Guillermo, Method and system for subscription digital rights management.
  352. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  353. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  354. Hashem,Tony; Quinn,Keri; Parmar,Ashwin, Method and system for transferring files using file transfer protocol.
  355. Herve Robert J. L. A. (Versailles FRX), Method and system for transmission of confidential data.
  356. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  357. Ibrahim,Mohammad K., Method for XZ-elliptic curve cryptography.
  358. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  359. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  360. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  361. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  362. Rosenau, Dirk; Schlaaff, Torsten, Method for determining a requirement to replace a component part and arrangement for the implementation of the method.
  363. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  364. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  365. Brokenshire,Daniel Alan; Peyravian,Mohammad, Method for efficient generation of modulo inverse for public key cryptosystems.
  366. Van Oorschot Paul C. (Ottawa CAX) Ford Warwick S. (Nepean CAX) Hillier Stephen W. (Ottawa CAX) Otway Josanne (Ottawa CAX), Method for efficient management of certificate revocation lists and update information.
  367. Al-Gahtani, Theeb A.; Ibrahim, Mohammad K., Method for elliptic curve scalar multiplication.
  368. Nyberg, Kaisa; Niemi, Valtteri, Method for ensuring data transmission security, communication system and communication device.
  369. Rankl,Wolfgang, Method for exchanging at least one secret initial value between a processing station and a chip card.
  370. Harley,Robert Joseph; Mestre,Jean Francois, Method for generating secure elliptic curves using an arithmetic-geometric mean iteration.
  371. Inada,Ryu, Method for group unit encryption/decryption, and method and apparatus for writing signature.
  372. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  373. Eastlake ; 3rd Donald E. (Carlisle MA), Method for improving the processing and storage performance of digital signature schemes.
  374. Horn, Gunther; Muller, Klaus; Kessler, Volker, Method for interchange of cryptographic codes between a first computer unit and a second computer unit.
  375. Pauschinger Dieter,DEX, Method for operating a digitally printing postage meter to generate and check a security imprint.
  376. Srivastava,Sunil K., Method for overcoming the single point of failure of the central group controller in a binary tree group key exchange approach.
  377. Al-Gahtani, Theeb A.; Ibrahim, Mohammad K., Method for performing iterative scalar multiplication which is protected against address bit attack.
  378. Stambler Leon, Method for securing information relevant to a transaction.
  379. Stambler Leon, Method for securing information relevant to a transaction.
  380. Stambler Leon, Method for securing information relevant to a transaction.
  381. Schneider, James P., Method for sharing secret information among cooperating parties.
  382. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  383. Litwin, Jr., Louis Robert; Ramaswamy, Kumar; Derrenberger, Michael Arthur, Method for using an access card to create a secure sub-network on a public network.
  384. Dent, Paul W.; Rydbeck, Nils, Method of bilateral identity authentication.
  385. Felger, David, Method of billing a purchase made over a computer network.
  386. Felger, David, Method of billing a purchase made over a computer network.
  387. Felger, David, Method of billing a purchase made over a computer network.
  388. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of cipher block chaining using elliptic curve cryptography.
  389. Reiter Robert W. ; Solinas Jerome A., Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form.
  390. Solinas,Jerome A., Method of elliptic curve cryptographic key agreement using coefficient splitting.
  391. Reiter Robert W. ; Solinas Jerome A., Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form.
  392. Solinas,Jerome A., Method of elliptic curve digital signature using coefficient splitting.
  393. Solinas,Jerome A., Method of elliptic curve digital signature using expansion in joint sparse form.
  394. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  395. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  396. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of generating a password protocol using elliptic polynomial cryptography.
  397. Solinas,Jerome A., Method of generating cryptographic key using elliptic curve and expansion in joint sparse form and using same.
  398. Petro, John, Method of passing a cryptographic key that allows third party access to the key.
  399. Ghouti, Lahouari; Al-Khoraidly, Abdulaziz M.; Ibrahim, Mohammad K., Method of performing XZ-elliptic curve cryptography for use with network security protocols.
  400. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of performing cipher block chaining using elliptic polynomial cryptography.
  401. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of performing elliptic polynomial cryptography with elliptic polynomial hopping.
  402. Merkle Ralph C. (Mountain View CA), Method of providing digital signatures.
  403. Baransky,Yurij Andrij; Franke,Hubertus; Pattnaik,Pratap Chandra; Safford,David R.; Wisniewski,Robert William, Method of securely sharing information over public networks using untrusted service providers and tightly controlling client accessibility.
  404. Asokan,Nadarajah; Ekberg,Jan Erik; Paatero,Lauri, Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device.
  405. Immonen,Olli; Asokan,Nadarajah; Markkanen,Panu S., Method, system and computer program product for secure ticketing in a communications device.
  406. Mao Wenbo,GBX, Methods and apparatus for authenticating an originator of a message.
  407. Thomas, Terence Neil; Davis, Stephen J., Methods and apparatus for pipeline processing of encryption data.
  408. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  409. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  410. Partelow,Mike; Fulton,Truxton; Faramani,Mehran, Methods and apparatus for secure document printing.
  411. Moses Liskov ; Robert Silverman ; Ari Juels, Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key.
  412. Little, Herbert A., Methods and devices for computing a shared encryption key.
  413. Little, Herbert A., Methods and devices for computing a shared encryption key.
  414. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  415. Wheeler,Graham A., Methods for authenticating potential members invited to join a group.
  416. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  417. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  418. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  419. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  420. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  421. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  422. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  423. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  424. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  425. Cipu, Andrei; Badea, Alexandru, Methods, systems, and computer readable media for reducing the size of a cryptographic key in a test simulation environment.
  426. Luna, Michael, Mobile application traffic optimization.
  427. Luna, Michael; Ylinen, Heikki; Salorinne, Seppo, Mobile application traffic optimization.
  428. Hoffberg, Steven M., Mobile communication device.
  429. Hoffberg, Steven M., Mobile communication device for delivering targeted advertisements.
  430. Luna, Michael, Mobile device and method to utilize the failover mechanism for fault tolerance provided for mobile traffic management and network/device resource conservation.
  431. Fiatal, Trevor, Mobile device configured for communicating with another mobile device associated with an associated user.
  432. Alisawi, Rami, Mobile device equipped with mobile network congestion recognition to make intelligent decisions regarding connecting to an operator network.
  433. Luna, Michael, Mobile device having content caching mechanisms integrated with a network operator for traffic alleviation in a wireless network and methods therefor.
  434. Fiatal, Trevor A.; Boynton, Lee R.; Burke, Scott M.; Gustafson, Brian D.; Raj, Binu; Alvarado, William; Benitez, Juan; Duncan, Fred J., Mobile device power management in data synchronization over a mobile network with or without a trigger notification.
  435. Ismail, Mohanad; Wendling, Michael; Backholm, Ari, Mobile device with application or context aware fast dormancy.
  436. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management.
  437. Luna, Michael; Tervahauta, Mikko, Mobile network background traffic data management with optimized polling intervals.
  438. Backholm, Ari; Bott, Ross; Luna, Michael, Mobile network reporting and usage analytics system and method aggregated using a distributed traffic optimization system.
  439. Backholm, Ari; Luna, Michael; Ylinen, Heikki, Mobile network traffic coordination across multiple applications.
  440. Luna, Michael, Mobile network traffic coordination across multiple applications.
  441. Hoffberg, Steven M; Hoffberg-Borghesani, Linda I, Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system.
  442. Luna, Michael; Backholm, Ari, Mobile traffic categorization and policy for network use optimization while preserving user experience.
  443. Fiatal, Trevor, Mobile virtual network operator.
  444. Fiatal, Trevor, Mobile virtual network operator.
  445. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  446. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  447. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  448. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  449. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  450. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  451. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  452. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  453. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  454. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  455. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.
  456. Luna, Michael; Bott, Ross, Monitoring mobile application activities for malicious traffic on a mobile device.
  457. Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  458. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  459. Hoffberg, Steven M., Multifactorial optimization system and method.
  460. Atalla Martin M. (18 Monte Vista Ave. Atherton CA 94025) Hopkins Webster D. (2425 Rick Dr. Morgan Hill CA 95020), Multilevel security apparatus and method with personal key.
  461. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  462. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  463. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  464. Sutaria, Jay; Gustafson, Brian Daniel; van Gent, Robert Paul; Lin, Ruth; Merriwether, David; Sawhney, Parvinder, Multiple data store authentication.
  465. Katz Ronald A., Multiple format telephonic interface control system.
  466. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  467. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  468. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  469. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  470. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  471. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  472. Moskowitz,Scott A., Multiple transform utilization and applications for secure digital watermarking.
  473. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Multiprime RSA public key cryptosystem.
  474. Jalbert,Christopher P.; Wallace,Leland A.; O'Rourke,David M., Mutually authenticated secure key exchange (MASKE).
  475. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  476. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  477. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  478. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  479. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  480. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  481. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  482. Chia, Pei Yen; Tan, Pek Yew, Network system and method for providing an ad-hoc access environment.
  483. Jakobsson, Bjorn Markus; Schnorr, Claus Peter, Non malleable encryption method and apparatus using key-encryption keys and digital signature.
  484. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  485. Gladney Henry Martin ; Reimer James Allen, Object-oriented access control method and system for military and commercial file systems.
  486. Ronning Joel A., On-line try before you buy software distribution system.
  487. Bott, Ross; Luna, Michael, Operation modes for mobile traffic optimization and concurrent management of optimized and non-optimized traffic.
  488. Srivastava,Sunil K., Operational optimization of a shared secret Diffie-Hellman key exchange among broadcast or multicast groups.
  489. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  490. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  491. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  492. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  493. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  494. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  495. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  496. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  497. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  498. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  499. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  500. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  501. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  502. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  503. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  504. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  505. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  506. Luna, Michael, Optimization of mobile traffic directed to private networks and operator configurability thereof.
  507. Luna, Michael, Optimization of mobile traffic directed to private networks and operator configurability thereof.
  508. Luna, Michael; Campbell, Stan, Optimization of resource polling intervals to satisfy mobile device requests.
  509. Wendling, Michael; Kokhanovskyi, Andrii; Backholm, Ari; Bott, Ross, Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion.
  510. Roden Tom, Optimized machine computation of exponential functions and modulo functions.
  511. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  512. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  513. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  514. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  515. Fiatal, Trevor, Policy based content service.
  516. Fiatal, Trevor, Polling.
  517. Wilson William J. (1239 Blevins Gap Rd. Huntsville AL 35802), Polygraphic encryption-decryption communications system.
  518. Barrett Geoff,GBX, Post image techniques.
  519. Barrett, Geoff, Post image techniques.
  520. Fiatal, Trevor, Predictive content delivery.
  521. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  522. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  523. Brennan J. J. (Rochester MI) Geist Bruce K. (Clinton Township ; Macomb County MI) Van Eeuwen Jeffrey A. (Waterford MI), Process for cryptographic key generation and safekeeping.
  524. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  525. Srivastava,Sunil K., Processing method for key exchange among broadcast or multicast groups that provides a more efficient substitute for Diffie-Hellman key exchange.
  526. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  527. Winget, Nancy Cam; Krischer, Mark; Frenkel, Ilan; Zhou, Hao, Protected dynamic provisioning of credentials.
  528. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  529. Backholm, Ari, Provisioning applications for a mobile device.
  530. Backholm, Ari, Provisioning applications for a mobile device.
  531. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  532. Backholm, Ari; Salorinne, Seppo; Heinonen, Jussi; Ketonen, Marko; Vuornos, Lauri, Provisioning of e-mail settings for a mobile terminal.
  533. Alisawi, Rami, Proxy server associated with a mobile carrier for enhancing mobile traffic management in a mobile network.
  534. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Public key cryptographic apparatus and method.
  535. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  536. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  537. van Gent, Robert Paul; Ariel, Ido, Publishing data in an information community.
  538. Fiat Amos (Tel Aviv ILX), RSA computation method for efficient batch processing.
  539. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  540. Backholm, Ari; Luna, Michael; Pan, Yixin, Radio-awareness of mobile device for sending server-side control signals using a wireless network optimized transport protocol.
  541. Kolbert Melvin (Boca Raton FL), Random local message encryption.
  542. Edelman, Bradley A.; Gay, Jonathan; Lozben, Slavik; Shetty, Pritham, Real-time priority-based media communication.
  543. Edelman, Bradley A.; Gay, Jonathan; Lozben, Slavik; Shetty, Pritham, Real-time priority-based media communication.
  544. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  545. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  546. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  547. Hopkins W. Dale, Remote financial transaction system.
  548. Luna, Michael; Tsõmbaljuk, Andrei, Request and response characteristics based adaptation of distributed caching in a mobile network.
  549. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  550. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  551. Moshier, Michael Andrew; Furlong, Jeff, Scalable, faster method and apparatus for montgomery multiplication.
  552. Al-Gahtani, Theeb A.; Ibrahim, Mohammad K., Scalar multiplication method with inherent countermeasures.
  553. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  554. Magliveras Spyros S. ; Tran Van Trung,DEX ; Horvath Tamas,DEX, Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l.
  555. Arbaugh William A. ; Farber David J. ; Keromytis Angelos D. ; Smith Jonathan M., Secure and reliable bootstrap architecture.
  556. Prashanth, Devi, Secure approach to send data from one system to another.
  557. Prashanth,Devi, Secure approach to send data from one system to another.
  558. Durand, Alain; Andreaux, Jean Pierre; Sirvent, Thomas, Secure authenticated channel.
  559. Gehrmann,Christian, Secure communications.
  560. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  561. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  562. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  563. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  564. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  565. Boynton, Lee R.; Fiatal, Trevor A.; Burke, Scott M.; Sikes, Mark, Secure end-to-end transport through intermediary nodes.
  566. Morais, Dinarte R.; Chen, Ling Tony; Danieli, Damon V., Secure key exchange with mutual authentication.
  567. Zissimopoulos,Vasileios; Topalov,Ognian Zdravkov, Secure method for roaming keys and certificates.
  568. Kocher Paul C. ; Jaffe Joshua M., Secure modular exponentiation with leak minimization for smartcards and other cryptosystems.
  569. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  570. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  571. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  572. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  573. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  574. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  575. Paul F. Alexander, Secure satellite communications system.
  576. Röstin, Peter; Nyström, Magnus; Duane, William M., Secure seed generation protocol.
  577. Chen Tsuhan, Secure telecommunications data transmission.
  578. Loesch, William; Fluker, Derek, Secure web site authentication using web site characteristics, secure user credentials and private browser.
  579. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  580. Bikel, Daniel Martin; Sorensen, Jeffrey Scott, Securely classifying data.
  581. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  582. McAlister, Donald K., Securing network traffic by distributing policies in a hierarchy over secure tunnels.
  583. McAlister, Donald K., Securing network traffic by distributing policies in a hierarchy over secure tunnels.
  584. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  585. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  586. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  587. Glickman, Jeff, Security for wireless transmission.
  588. Morais, Dinarte R.; VanAntwerp, Mark D.; Multerer, Boyd C.; Caiafa, Daniel; Chen, Ling T.; Courage, Michael; Danieli, Damon V.; Neustadter, Eric; Wohlgemuth, Sean Christian, Security gateway for online console-based gaming.
  589. Morais,Dinarte R.; Chen,Ling T.; VanAntwerp,Mark D.; Caiafa,Daniel; Multerer,Boyd C.; Danieli,Damon V.; Wohlgemuth,Sean Christian; Neustadter,Eric; Courage,Michael, Security gateway for online console-based gaming.
  590. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  591. Lee Lin-nan (Germantown MD) Fang Russell J. (Brookeville MD), Security system for SSTV encryption.
  592. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  593. Luna, Michael, Selective data compression by a distributed traffic management system to reduce mobile data traffic and signaling traffic.
  594. Ronning Joel A., Self-launching encrypted digital information distribution system.
  595. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  596. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  597. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  598. Schneider, James Paul, Sharing keys between cooperating parties.
  599. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and method.
  600. Harvey John Christopher ; Cuddihy James William, Signal processing apparatus and methods.
  601. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  602. Harvey, John C.; Cuddihy, James W., Signal processing apparatus and methods.
  603. Harvey, John Christopher; Ciddihy, James William, Signal processing apparatus and methods.
  604. Harvey, John Christopher; Cuddihy, James Willam, Signal processing apparatus and methods.
  605. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  606. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  607. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  608. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  609. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  610. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  611. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  612. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  613. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  614. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  615. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  616. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  617. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  618. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  619. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  620. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  621. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  622. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  623. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  624. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  625. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  626. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  627. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  628. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  629. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  630. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  631. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  632. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  633. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  634. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  635. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  636. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  637. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  638. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  639. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  640. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  641. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  642. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  643. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  644. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  645. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  646. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  647. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  648. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  649. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  650. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  651. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  652. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  653. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  654. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  655. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  656. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  657. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  658. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  659. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  660. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  661. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  662. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  663. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  664. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  665. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  666. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  667. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  668. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  669. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  670. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  671. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  672. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  673. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  674. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  675. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  676. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  677. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  678. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  679. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  680. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  681. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  682. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  683. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  684. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  685. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  686. Backholm, Ari, Signaling optimization in a wireless network for traffic utilizing proprietary and non-proprietary protocols.
  687. Chang Chung Nan, Simiplified secure swift cryptographic key exchange.
  688. Lu Shyue-Ching (Chung-Li MD TWX) Lee Lin-nan (Germantown MD), Simple and effective public-key cryptosystem.
  689. Chang,Chung Nan, Simplified secure, swift cryptographic key exchange.
  690. Micali Silvio, Simultaneous electronic transactions.
  691. Micali Silvio, Simultaneous electronic transactions with subscriber verification.
  692. Micali Silvio, Simultaneous electronic transactions with visible trusted parties.
  693. Micali Silvio (459 Chesnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  694. Cheline, Douglas A.; Ma, Michael; Zhang, Ye; Chong, Lester J., Single-modem multi-user virtual private network.
  695. Luna, Michael; Bott, Ross, Social caching for device resource sharing and management.
  696. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  697. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  698. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  699. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  700. Kocher, Paul C.; Jun, Benjamin C.; Jaffe, Joshua M., Specialized circuitry for cryptographic authentication and other purposes.
  701. Manchester, E. Barton; Yearwood, Bradley N., State machine based universal voice grade cards.
  702. Rhoads, Geoffrey B., Steganographic decoding with transform to spatial domain.
  703. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  704. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  705. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  706. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  707. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  708. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  709. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  710. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  711. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  712. Henry Paul S. (Holmdel NJ), Stream cipher operation using public key cryptosystem.
  713. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  714. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  715. Dame, Stephen G., Synchronized wireless data concentrator for airborne wireless sensor networks.
  716. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  717. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  718. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  719. Luna, Michael; Bott, Ross, System and method for a mobile device to use physical storage of another device for caching.
  720. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Hilton, Walter J.; Szebenyi, Joshua, System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components.
  721. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  722. Merman, Michael; Smushkovich, Yosif, System and method for alternative encryption techniques.
  723. Buhrmann, Michael F.; Dennis, Charles; Reeder, Mary; Brennan, Jeffrey, System and method for automated analysis comparing a wireless device location with another geographic location.
  724. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  725. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  726. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  727. Dankar, Ajay; Reddy, Sunita; Snyder, Randall A.; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L., System and method for automated analysis comparing a wireless device location with another geographic location.
  728. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  729. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  730. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  731. Barton, Edward M.; Mizrah, Len L., System and method for cryptographic key exchange using matrices.
  732. Volpert, Jr.,Thomas R., System and method for data encryption.
  733. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  734. Bernheim, Henrik F.; Hansell, Jerritt H.; Martin, Marcia Reid, System and method for detecting and localizing non-technical losses in an electrical power distribution grid.
  735. Hoffberg, Steven M., System and method for determining contingent relevance.
  736. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  737. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  738. Bisbee Stephen F. ; Moskowitz Jack J. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission storage and retrieval of authenticated documents.
  739. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  740. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  741. Benson, Glenn, System and method for end to end encryption.
  742. Simms,Timothy J., System and method for establishing secure communication.
  743. Kirkup, Michael Grant; Brown, Michael Kenneth; Brown, Michael Stephen, System and method for exchanging encryption keys between a mobile device and a peripheral device.
  744. Kirkup, Michael Grant; Brown, Michael Kenneth; Brown, Michael Stephen, System and method for exchanging encryption keys between a mobile device and a peripheral device.
  745. Kirkup, Michael G.; Brown, Michael K.; Brown, Michael S., System and method for exchanging encryption keys between a mobile device and a peripheral output device.
  746. Fleming, Michael, System and method for executing commands that are non-native to the native environment of a mobile device.
  747. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  748. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  749. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  750. Spratte Michael, System and method for generation of one-time encryption keys for data communications and a computer program product for.
  751. Bernheim, Henrik F.; Martin, Marcia Reid; Berens, Steven J.; Loporto, John J.; Niemann, Theodore V., System and method for grid based cyber security.
  752. Bernheim, Henrik F.; Martin, Marcia Reid; Berens, Steven J.; Loporto, John J.; Niemann, Theodore V., System and method for grid based cyber security.
  753. Bernheim, Henrik F.; Martin, Marcia Reid; Berens, Steven J.; Loporto, John J.; Niemann, Theodore V., System and method for grid based cyber security.
  754. Ferguson, William M.; Snyder, Randall A.; Miller, Devin P., System and method for identity protection using mobile device signaling network derived location pattern recognition.
  755. Ferguson, William M.; Snyder, Randall A.; Miller, Devin P., System and method for identity protection using mobile device signaling network derived location pattern recognition.
  756. Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
  757. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  758. Hansell, Jerritt; Bernheim, Henrik F.; Liao, Yu; Martin, Marcia Reid; Abendschein, Andrew Louis, System and method for inferring schematic and topological properties of an electrical distribution grid.
  759. Hansell, Jerritt; Bernheim, Henrik F.; Liao, Yu; Martin, Marcia Reid; Abendschein, Andrew Louis, System and method for inferring schematic and topological properties of an electrical distribution grid.
  760. Hansell, Jerritt; Bernheim, Henrik F.; Liao, Yu; Martin, Marcia Reid; Abendschein, Andrew Louis, System and method for inferring schematic and topological properties of an electrical distribution grid.
  761. Hansell, Jerritt; Bernheim, Henrik F.; Liao, Yu; Martin, Marcia Reid; Abendschein, Andrew Louis, System and method for inferring schematic and topological properties of an electrical distribution grid.
  762. Bernheim, Henrik F.; Hansell, Jerritt; Martin, Marcia Reid; Bullard, Jason Mark, System and method for inferring schematic relationships between load points and service transformers.
  763. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  764. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  765. Luna, Michael, System and method for making requests on behalf of a mobile device based on atomic processes for mobile network traffic relief.
  766. Wells,John R.; Felt,Edward P., System and method for message encryption and signing in a transaction processing system.
  767. Dennis, Charles L.; Snyder, Randall A.; Buhrmann, Michael F.; Boyle, Patrick E., System and method for mobile identity protection for online user authentication.
  768. Dennis, Charles L.; Snyder, Randall A; Buhrmann, Michael F; Boyle, Patrick J., System and method for mobile identity protection for online user authentication.
  769. Buhrmann, Michael F.; Snyder, Randall A.; Dennis, Charles L.; Boxberger, Robert C.; Ferguson, William M., System and method for mobile identity protection of a user of multiple computer applications, networks or devices.
  770. Barton, Edward M.; Mizrah, Len L., System and method for mutually authenticated cryptographic key exchange using matrices.
  771. Scott, Kelly W., System and method for network-based project management.
  772. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  773. Nagel,Robert H., System and method for production and authentication of original documents.
  774. Nagel,Robert H., System and method for production and authentication of original documents.
  775. Fiatal, Trevor, System and method for providing a network service in a distributed fashion to a mobile device.
  776. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  777. Novak, Robert E., System and method for providing conditional access to digital content.
  778. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  779. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  780. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  781. Luna, Michael; Diederich, Anton, System and method for reduction of mobile network traffic used for domain name system (DNS) queries.
  782. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  783. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  784. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  785. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  786. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  787. Etchegoyen, Craig Stephen, System and method for securing an electronic communication.
  788. McBrearty,Gerald Francis; Mullen,Shawn Patrick; Shieh,Johnny Meng Han; Unnikrishnan,Ramachandran, System and method for securing data on private networks.
  789. Schneier, Bruce; Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M., System and method for securing electronic games.
  790. Schneier, Bruce; Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M., System and method for securing electronic games.
  791. Robertson, Philip A.; Williams, Rodger K.; Weston, Timothy M., System and method for selective encryption of input data during a retail transaction.
  792. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  793. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  794. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  795. Sutaria, Jay; Nanjundeswaran, Sridhar; Gustafson, Brian; van Gent, Robert, System and method for tracking billing events in a mobile wireless network for a network operator.
  796. Fiatal, Trevor, System and method of a relay server for managing communications and notification between a mobile device and a web access server.
  797. Gremaud, Fabien; Fischer, Nicolas, System and method to record encrypted content with access conditions.
  798. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis and network intrusion protection in an industrial environment.
  799. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis and network intrusion protection in an industrial environment.
  800. Brandt, David D.; Hall, Kenwood; Anderson, Mark Burton; Anderson, Craig D.; Collins, George Bradford, System and methodology providing automation security analysis, validation, and learning in an industrial controller environment.
  801. Bernheim, Henrik Fernand; Hansell, Jerritt Harold, System and methods for assigning slots and resolving slot conflicts in an electrical distribution grid.
  802. Bernheim, Henrik Fernand; Hansell, Jerritt Harold, System and methods for assigning slots and resolving slot conflicts in an electrical distribution grid.
  803. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  804. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  805. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  806. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  807. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  808. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  809. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  810. Martin, Marcia R.; Abendschein, Andrew Louis; Bernheim, Henrick F., System and methods for synchronizing edge devices on channels without carrier sense.
  811. Martin, Marcia R.; Bernheim, Henrick F.; Abendschein, Andrew Louis, System and methods for synchronizing edge devices on channels without carrier sense.
  812. Schneider, Richard J.; Shelby, Michael B.; Pitman, Lawrence R.; Porterfield, Carrie D.; Petersen, Erik B., System for awarding a bonus to a gaming device on a wide area network.
  813. Schneider, Richard J.; Shelby, Michael B.; Pitman, Lawrence R.; Porterfield, Carrie D.; Petersen, Erik B., System for awarding a bonus to a gaming device on a wide area network.
  814. Ronning Joel A., System for preventing unauthorized copying of active software.
  815. Fiatal, Trevor, System for providing policy based content service in a mobile network.
  816. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  817. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  818. Luna, Michael, System of redundantly clustered machines to provide failover mechanisms for mobile traffic management and network resource conservation.
  819. Ivanov, Viatcheslav; Lai, Qinshen; Mansell, Michael Graves; Roberts, Michael Albert; Sorbara, Joseph Dominic Michael, System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient.
  820. Hansell, Jerritt Harold; Barnett, Alan Drew; Reed, Joseph Robert; Bernheim, Henrik Fernand, System, method, and apparatus for grid location.
  821. Hansell, Jerritt Harold; Barnett, Alan Drew; Reed, Joseph Robert; Bernheim, Henrik Fernand, System, method, and apparatus for grid location.
  822. Backholm, Ari; Alisawi, Rami, Systems and methods for application management of mobile device radio state promotion and demotion.
  823. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  824. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  825. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  826. Peyravian, Mohammad; Matyas, Jr., Stephen Michael; Zunic, Nevenko, Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key.
  827. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  828. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  829. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  830. Ronald A. Katz, Telephone interface call processing system with call selectivity.
  831. Katz Ronald A., Telephone-interface lottery system.
  832. Ronald A. Katz, Telephone-television interface statistical analysis system.
  833. Katz, Ronald A., Telephonic-interface game control system.
  834. Ronald A. Katz, Telephonic-interface lottery system.
  835. Katz Ronald A., Telephonic-interface statistical analysis system.
  836. Katz Ronald A., Telephonic-interface statistical analysis system.
  837. Katz Ronald A., Telephonic-interface statistical analysis system.
  838. Katz Ronald A., Telephonic-interface statistical analysis system.
  839. Katz Ronald A., Telephonic-interface statistical analysis system.
  840. Katz, Ronald A., Telephonic-interface statistical analysis system.
  841. Ronald A. Katz, Telephonic-interface statistical analysis system.
  842. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  843. Luna, Michael; Tervahauta, Mikko, Timing of keep-alive messages used in a system for mobile network resource conservation and optimization.
  844. Micali Silvio, Traceable anonymous transactions.
  845. Micali Silvio, Tree-based certificate revocation system.
  846. Micali Silvio, Tree-based certificate revocation system.
  847. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  848. Ronning Joel A., Try before you buy software distribution and marketing system.
  849. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  850. Alvarado, Billy; Ariel, Ido; Gent, Robert Paul van, Universal data aggregation.
  851. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Unpredictable blind signature systems.
  852. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  853. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  854. Luna, Michael; Bott, Ross, User as an end point for profiling and optimizing the delivery of content and data in a wireless network.
  855. Vogel, III, "J" Leslie, User control of a secure wireless computer network.
  856. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Using unpredictable information to minimize leakage from smartcards and other cryptosystems.
  857. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  858. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  859. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  860. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  861. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  862. Kindberg,Timothy Paul James Gerard; Tourrilhes,Jean; Zhang,Kan, Validation for secure device associations.
  863. Shaw William Y. (5449 Pacifica Dr. La Jolla CA 92037), Variable-key cryptography system.
  864. Scheidt,Edward M., Voice and data encryption method using a cryptographic key split combiner.
  865. Katz, Ronald A., Voice-data telephonic interface control system.
  866. Fiatal, Trevor, Web-based access to data objects.
  867. Wells, William R.; Griswold, Chauncey W., Wide screen gaming apparatus.
  868. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  869. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  870. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  871. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  872. Luna, Michael, Wireless traffic management system cache optimization using http headers.
  873. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Khoraidly, Abdulaziz M., XZ-elliptic curve cryptography system and method.
  874. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로