$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Public key cryptographic apparatus and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/04
출원번호 US-0839939 (1977-10-06)
발명자 / 주소
  • Hellman Martin E. (Stanford CA) Merkle Ralph C. (Palo Alto CA)
출원인 / 주소
  • The Board of Trustees of the Leland Stanford Junior University (Stanford CA 02)
인용정보 피인용 횟수 : 506  인용 특허 : 0

초록

A cryptographic system transmits a computationally secure cryptogram that is generated from a publicly known transformation of the message sent by the transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. T

대표청구항

In a method of communicating securely over an insecure communication channel of the type which communicates a message from a transmitter to a receiver, the improvement characterized by: providing random numbers at the receiver; generating from said random numbers a public enciphering key at the rece

이 특허를 인용한 특허 (506)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Libin, Phil; Micali, Silvio, Access control.
  6. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  10. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  11. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  12. Libin,Phil, Actuating a security system using a wireless device.
  13. Scalisi, Joseph F.; Morse, David M.; Mejia, Desiree, Adaptable user interface for monitoring location tracking devices out of GPS monitoring range.
  14. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  15. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  16. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  17. Scalisi, Joseph F.; Anderson, Roger B., Apparatus and method for adjusting refresh rate of location coordinates of a tracking device.
  18. Scalisi, Joseph F.; Butler, David; Anderson, Roger B.; Mejia, Desiree; Beydler, Michael L., Apparatus and method for determining location and tracking coordinates of a tracking device.
  19. Scalisi, Joseph F.; Butler, David; Anderson, Roger B.; Mejia, Desiree; Beydler, Michael L., Apparatus and method for determining location and tracking coordinates of a tracking device.
  20. Scalisi, Joseph F.; Butler, David; Anderson, Roger B.; Mejia, Desiree; Beydler, Michael L., Apparatus and method for determining location and tracking coordinates of a tracking device.
  21. Scalisi, Joseph F.; Butler, David; Anderson, Roger B.; Mejia, Desiree; Beydler, Michael L., Apparatus and method for determining location and tracking coordinates of a tracking device.
  22. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  23. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  24. Scalisi, Joseph F.; Mejia, Desiree; Butler, David; Anderson, Roger B., Apparatus and method for generating position fix of a tracking device in accordance with a subscriber service usage profile to conserve tracking device power.
  25. Scalisi, Joseph F.; Morse, David M.; Butler, David, Apparatus and method for manufacturing an electronic package.
  26. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  27. Rosen Sholom S., Apparatus and method for secure transacting.
  28. Anderson, Roger B.; Anderson, Jennifer B., Apparatus and method to provide secure communication over an insecure communication channel for location information using tracking devices.
  29. Cahill, Conor Patrick; Roth, Gregory Branchek, Application instances authenticated by secure measurements.
  30. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  31. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  32. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  33. Hellman Martin E., Authentication using random challenges.
  34. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  35. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  36. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  37. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  38. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  39. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  40. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  41. Scalisi, Joseph F.; Hecox, Lawrence E., Call receiving system and apparatus for selective reception of caller communication.
  42. Rackman Michael I. (1710 Glenwood Rd. Brooklyn NY 11230), Cartridge-controlled system whose use is limited to authorized cartridges.
  43. Ronning Joel A., Central database system for automatic software program sales.
  44. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  45. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  46. Micali Silvio, Certificate issue lists.
  47. Micali Silvio, Certificate revocation system.
  48. Micali Silvio, Certificate revocation system.
  49. Micali, Silvio, Certificate revocation system.
  50. Peacham, Anthony David, Codelets.
  51. Shona Yoshihiro,JPX ; Kawano Kazuya,JPX ; Kizaki Masaharu,JPX, Communication system and communication method.
  52. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  53. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  54. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  55. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  56. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  57. Libin, Phil; Micali, Silvio; Engberg, David, Controlling access to an area.
  58. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Controlling access using additional data.
  59. Libin, Phil; Micali, Silvio; Engberg, David, Controlling group access to doors.
  60. Rhoads, Geoffrey B., Controlling use of audio or image content.
  61. Follendore ; III Roy D., Cryptographic access and labeling system.
  62. Wack, C. Jay; Scheidt, Edward M.; Morris, Jeffrey K., Cryptographic information and flow control.
  63. Wack,C. Jay; Scheidt,Edward M.; Morris,Jeffrey K., Cryptographic information and flow control.
  64. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  65. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  66. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  67. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  68. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  69. Ajtai Miklos, Cryptosystem employing worst-case difficult-to solve lattice problem.
  70. Koh,Jee H., Cryptosystems using commuting pairs in a monoid.
  71. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  72. Takada,Masayuki; Kusakabe,Susumu; Sasaki,Masachika; Morita,Tadashi, Data processing method and system of same portable device data processing apparatus and method of same and program.
  73. Moskowitz, Scott A., Data protection method and device.
  74. Moskowitz, Scott A., Data protection method and device.
  75. Moskowitz, Scott A., Data protection method and device.
  76. Moskowitz, Scott A., Data protection method and device.
  77. Dahl, Ulf, Data security system for a database.
  78. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  79. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  80. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  81. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  82. Hoffberg, Steven M., Detection and alert of automobile braking event.
  83. Langer,Randy, Deterring reverse-engineering of software systems by randomizing the siting of stack-based data.
  84. Etchegoyen, Craig S., Device-specific content delivery.
  85. Etchegoyen, Craig S., Device-specific content delivery.
  86. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  87. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  88. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  89. Rowe, Richard E., Digital identification of unique game characteristics.
  90. Rowe,Richard E., Digital identification of unique game characteristics.
  91. Merkle Ralph C. (1134 Pimento Ave. Sunnyvale CA 94087), Digital signature system and method based on a conventional encryption function.
  92. Libin, Phil; Micali, Silvio; Engberg, David; Sinelnikov, Alex, Disseminating additional data used for controlling access.
  93. Shanton M. Greg, Distributed cryptographic object method.
  94. Shanton M. Greg, Distributed cryptographic object method.
  95. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  96. Engberg, David, Distributed delegated path discovery and validation.
  97. Micali Silvio, Distributed split-key cryptosystem and applications.
  98. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  99. Micali, Silvio; Libin, Phil; Volbright, Brandon, Efficient and secure data currentness systems.
  100. Micali,Silvio, Efficient certificate revocation.
  101. Alcorn Allan E. ; Barnett Michael ; Giacalone ; Jr. Louis D. ; Levinthal Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  102. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  103. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  104. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  105. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  106. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  107. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  108. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  109. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  110. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  111. Alcorn, Allan E.; Jenkins, Harry H., Electronic gaming apparatus having authentication data sets.
  112. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  113. Rosen Sholom S., Electronic-monetary system.
  114. Rosen Sholom S., Electronic-monetary system.
  115. Rosen Sholom S., Electronic-monetary system.
  116. Rosen Sholom S., Electronic-monetary system.
  117. Takaragi Kazuo (Ebina JPX) Nakagawa Fusao (Yokohama JPX) Nagai Yasuhiko (Yokohama JPX) Sasaki Ryoichi (Fujisawa JPX), Encrypting system of data.
  118. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  119. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  120. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  121. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  122. Wilkins, John; Keefe, Michael; Rehman, Sam, Encryption key exchange system and method.
  123. Kasahara, Masao; Murakami, Yasuyuki, Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium.
  124. Kasahara, Masao; Murakami, Yasuyuki, Encryption method, decryption method, encryption/decryption method, cryptographic communications system, and computer usable medium.
  125. Wright Andrew S.,CAX, Encryption of data packets using a sequence of private keys generated from a public key exchange.
  126. Scheidt,Edward M., Encryption process including a biometric unit.
  127. Golomb,Solomon W.; Welch,Lloyd R.; D?nes,J?zsef, Encryption system based on crossed inverse quasigroups.
  128. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  129. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  130. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  131. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  132. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  133. Iwamura Keiichi,JPX, Error correction apparatus.
  134. Smith Sean William ; Weingart Steve Harris, Establishing and employing the provable untampered state of a device.
  135. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  136. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  137. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  138. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  139. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  140. Henry Paul S. (Holmdel NJ), Fast real-time public key cryptography.
  141. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  142. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  143. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  144. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  145. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  146. Cannon, Lee E., Gaming apparatus with encryption and method.
  147. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  148. Saffari, Ali, Gaming machine with promotional item dispenser.
  149. Saffari,Ali, Gaming machine with promotional item dispenser.
  150. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  151. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  152. Daly Brian Kevin ; Owens Leslie Dale, Generation of encryption key.
  153. Steve Cornelius ; Lonnie C. Goff, Hybrid one time pad encryption and decryption apparatus with methods for encrypting and decrypting data.
  154. Richards Timothy Philip,GBX, IC card with shell feature.
  155. Ohashi Masayoshi,JPX ; Sakai Seiichiro,JPX ; Suzuki Toshinori,JPX, Identity confidentiality method in radio communication system.
  156. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  157. Felsher, David Paul, Information record infrastructure, system and method.
  158. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  159. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  160. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  161. Murphy Frederick J., Internet global area networks fax system.
  162. Okamoto Eiji (Tokyo JPX), Key distribution method.
  163. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  164. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  165. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  166. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  167. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  168. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  169. Timothy Philip Richards GB, Key transformation unit for an IC card.
  170. Cross, David B.; Nath, Satyajit; Li, George Z.; Dutta, Tanmoy; Gottumukkala, Sunil, Labeling of data objects to apply and enforce policies.
  171. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  172. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  173. Best, Robert M., Linked electronic game systems.
  174. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  175. Libin, Phil; Micali, Silvio; Engberg, David, Logging access attempts to an area.
  176. Nice, Nir; Wieder, Ehud; Feldbaum, Boaz; Ophir, Sefy; Shamir, Eran; Yacobi, Yacov; Friedman, Arie, Maintaining privacy during user profiling.
  177. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  178. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  179. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  180. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  181. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  182. Okada Satoru (Kyoto JPX) Nishizawa Kenji (Kyoto JPX), Memory cartridge and game apparatus using the same.
  183. Nakagawa Katsuya (Kusatsu JPX) Yukawa Masayuki (Kyoto JPX), Memory cartridge and information processor unit using such cartridge.
  184. Nakagawa Katsuya (Kyoto JPX), Memory cartridge bank selecting.
  185. Nakanishi Yoshiaki (Kyoto JPX) Nakagawa Katsuya (Kyoto JPX), Memory cartridge having a multi-memory controller with memory bank switching capabilities and data processing apparatus.
  186. Zhang Jinglong F, Method and apparatus for a robust high-speed cryptosystem.
  187. Marcu, Adrian R., Method and apparatus for encoding vouchers in a casino gaming system.
  188. Lonnie C. Goff ; Steve Cornelius, Method and apparatus for generating one time pads simultaneously in separate encryption/decryption systems.
  189. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  190. Ruehle, Michael D., Method and apparatus for performing modular multiplication.
  191. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  192. Eames Thomas R. ; Trinh Lac X. ; Manchester E. Barton ; Yearwood Bradley N. ; Manley David J. ; Hicks Scott T. ; Johal Jaskarn S. ; Eldering Charles A., Method and apparatus for reliable operation of universal voice grade cards.
  193. Devarakonda Murthy ; Tetzlaff William H. ; Zukowski Deborra Jean, Method and apparatus for secure, remote swapping of memory resident active entities.
  194. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  195. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  196. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305) Bach Carl E. (Albany CA), Method and apparatus for use in public-key data encryption system.
  197. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  198. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  199. Cannon, Lee E., Method and device for implementing a coinless gaming environment.
  200. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  201. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  202. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  203. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  204. Harrison, Keith Alexander; Spiller, Timothy Paul; Munro, William John; Tofts, Christopher, Method and device using one-time pad data.
  205. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  206. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  207. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  208. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  209. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  210. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  211. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  212. Hou, Chien-Tzu, Method and system for emulating a secret code between two hardware modules.
  213. Yuan Chuan K. ; Hao Feng Q., Method and system for establishing a cryptographic key agreement using linear protocols.
  214. Chao, Ching-Yun, Method and system for establishing a trust framework based on smart key devices.
  215. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  216. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  217. Chao, Ching-Yun, Method and system for protecting master secrets using smart key devices.
  218. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  219. Lao, Guillermo, Method and system for subscription digital rights management.
  220. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  221. Hashem,Tony; Quinn,Keri; Parmar,Ashwin, Method and system for transferring files using file transfer protocol.
  222. Bade,Steven A.; Chao,Ching Yun, Method and system for using a compact disk as a smart key device.
  223. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  224. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  225. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  226. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  227. Thrane Lars (Soborg DKX), Method for cryptographic transmission of speech signals and a communication station for performing the method.
  228. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  229. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  230. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  231. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  232. Eastlake ; 3rd Donald E. (Carlisle MA), Method for improving the processing and storage performance of digital signature schemes.
  233. Barkan Mordhay,ILX, Method for safe communications.
  234. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  235. Bade,Steven A.; Chao,Ching Yun, Method for using a portable computing device as a smart key device.
  236. Felger, David, Method of billing a purchase made over a computer network.
  237. Felger, David, Method of billing a purchase made over a computer network.
  238. Felger, David, Method of billing a purchase made over a computer network.
  239. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  240. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  241. Moses Liskov ; Robert Silverman ; Ari Juels, Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key.
  242. Johnson, Alan E., Methods and systems for IC card application loading.
  243. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  244. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  245. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  246. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  247. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  248. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  249. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  250. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  251. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  252. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  253. Hoffberg, Steven M., Mobile communication device.
  254. Hoffberg, Steven M., Mobile communication device for delivering targeted advertisements.
  255. Hoffberg, Steven M; Hoffberg-Borghesani, Linda I, Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system.
  256. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  257. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  258. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  259. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  260. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  261. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  262. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  263. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  264. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  265. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  266. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.
  267. Fujimoto, Hiroshi; Suzuki, Takashi; Nakayama, Takehiro; Takeshita, Atsushi, Multi signature verification system, electronic signature attaching apparatus, data addition apparatus, and electronic signature verification apparatus.
  268. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  269. Roth, Gregory Branchek; Dokey, Aaron Douglas, Multi-party computation services.
  270. Wolf, Bryan, Multi-party encryption systems and methods.
  271. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  272. Hoffberg, Steven M., Multifactorial optimization system and method.
  273. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  274. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  275. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  276. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  277. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  278. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  279. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  280. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  281. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  282. Moskowitz,Scott A., Multiple transform utilization and applications for secure digital watermarking.
  283. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Multiprime RSA public key cryptosystem.
  284. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  285. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  286. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  287. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  288. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  289. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  290. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  291. Ronning Joel A., On-line try before you buy software distribution system.
  292. Cooper James A. (Albuquerque NM), One-way transformation of information.
  293. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  294. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  295. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  296. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  297. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  298. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  299. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  300. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  301. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  302. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  303. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  304. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  305. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  306. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  307. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  308. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  309. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  310. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  311. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  312. Micali,Silvio; Engberg,David; Libin,Phil; Reyzin,Leo; Sinelnikov,Alex, Physical access control.
  313. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  314. Wilson William J. (1239 Blevins Gap Rd. Huntsville AL 35802), Polygraphic encryption-decryption communications system.
  315. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Posture assessment in a secure execution environment.
  316. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Posture assessment in a secure execution environment.
  317. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  318. Brennan J. J. (Rochester MI) Geist Bruce K. (Clinton Township ; Macomb County MI) Van Eeuwen Jeffrey A. (Waterford MI), Process for cryptographic key generation and safekeeping.
  319. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  320. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  321. Cooper, Thomas P.; Hill, Michael J.; Konrad, Dennis R.; Nowatzki, Thomas L., Protecting duplicate/lost updates against host failures.
  322. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  323. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Public key cryptographic apparatus and method.
  324. Lipson, Jesse D., Public key cryptographic methods and systems.
  325. Slavin,Keith R, Public key cryptography using matrices.
  326. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  327. Merkle, Ralph C., Public key distribution using an approximate linear function.
  328. Miller William J. (North Miami FL) Trbovich Nick G. (Hollywood FL), RSA Public-key data encryption system having large random prime number generating microprocessor or the like.
  329. Fiat Amos (Tel Aviv ILX), RSA computation method for efficient batch processing.
  330. Nakagawa Katsuya (Kusatsu JPX), Recordable data device having identification symbols formed thereon and cooperating data processing system having regist.
  331. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  332. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  333. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Ring-based public key cryptosystem method.
  334. Micali, Silvio, Scalable certificate validation and simplified PKI management.
  335. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  336. Murakami,Yasuyuki; Kasahara,Masao; Tsujii,Shigeo, Secret key generating method, common key generating method, encryption method, cryptographic communication method and cryptographic communication system.
  337. Prashanth, Devi, Secure approach to send data from one system to another.
  338. Prashanth,Devi, Secure approach to send data from one system to another.
  339. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  340. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  341. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  342. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  343. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  344. Neuman, Michael; Neuman, Diana, Secure authentication in a multi-party system.
  345. Best,Robert M., Secure distribution of portable game software.
  346. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  347. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  348. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  349. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  350. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Secure execution environment services.
  351. Best,Robert M., Secure execution of downloaded software.
  352. Lion,St챕phanie; Tang Talpin,Yan Mei, Secure method for remote game management.
  353. Zissimopoulos,Vasileios; Topalov,Ognian Zdravkov, Secure method for roaming keys and certificates.
  354. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  355. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  356. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  357. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  358. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  359. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  360. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  361. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  362. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  363. Chen Tsuhan, Secure telecommunications data transmission.
  364. Krolopp Robert K. (Hoffman Estates IL) Auchter Thomas J. (Barrington IL) Pregont Gary J. (Elgin IL) Dabbish Ezzat A. (Buffalo Grove IL), Secure transfer of radio specific data.
  365. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  366. Smith Sean William ; Weingart Steve Harris, Securely downloading and executing code from mutually suspicious authorities.
  367. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  368. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service control on third party hardware.
  369. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service control on third party hardware.
  370. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service layer on third party hardware.
  371. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service layer on third party hardware.
  372. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  373. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  374. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  375. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  376. Rosen, Sholom S., Security systems and methods applicable to an electronic monetary system.
  377. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  378. Wright Michael M. W.,CAX ; Boshard David James,CAX ; Ting Henry K.,CAX, Selection and control.
  379. Ronning Joel A., Self-launching encrypted digital information distribution system.
  380. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  381. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  382. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  383. Okamoto Tatsuaki (Yokosuka JPX) Miyaguchi Shoji (Yokohama JPX) Shiraishi Akira (Yokosuka JPX) Kawaoka Tsukasa (Yokosuka JPX), Signed document transmission system.
  384. Chang Chung Nan, Simiplified secure swift cryptographic key exchange.
  385. Micali Silvio, Simultaneous electronic transactions.
  386. Micali Silvio, Simultaneous electronic transactions with subscriber verification.
  387. Micali Silvio, Simultaneous electronic transactions with visible trusted parties.
  388. Micali Silvio (459 Chesnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  389. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  390. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  391. Manchester, E. Barton; Yearwood, Bradley N., State machine based universal voice grade cards.
  392. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  393. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  394. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  395. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  396. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  397. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  398. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  399. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  400. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  401. Henry Paul S. (Holmdel NJ), Stream cipher operation using public key cryptosystem.
  402. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  403. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  404. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  405. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  406. Buhrmann, Michael F.; Dennis, Charles; Reeder, Mary; Brennan, Jeffrey, System and method for automated analysis comparing a wireless device location with another geographic location.
  407. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  408. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  409. Dankar, Ajay; Reddy, Sunita; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L.; Snyder, Randall A., System and method for automated analysis comparing a wireless device location with another geographic location.
  410. Dankar, Ajay; Reddy, Sunita; Snyder, Randall A.; Mortier, Michael P.; Buhrmann, Michael F.; Dennis, Charles L., System and method for automated analysis comparing a wireless device location with another geographic location.
  411. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  412. Rosen Sholom S., System and method for connecting money modules.
  413. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  414. Scalisi, Joseph F.; Mejia, Desiree; Morse, David M.; Beydler, Michael L., System and method for creating and managing a personalized web interface for monitoring location information on individuals and objects using tracking devices.
  415. Barton, Edward M.; Mizrah, Len L., System and method for cryptographic key exchange using matrices.
  416. Volpert, Jr.,Thomas R., System and method for data encryption.
  417. Hoffberg, Steven M., System and method for determining contingent relevance.
  418. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  419. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  420. Keller,Merle L.; Mower,Vaughn L.; McEntire,Steve J.; Albertini,Victor D., System and method for fast data encryption/decryption using time slot numbering.
  421. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  422. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  423. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  424. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  425. Saarepera, Mart; Buldas, Ahto, System and method for generating a digital certificate.
  426. Spratte Michael, System and method for generation of one-time encryption keys for data communications and a computer program product for.
  427. Ferguson, William M.; Snyder, Randall A.; Miller, Devin P., System and method for identity protection using mobile device signaling network derived location pattern recognition.
  428. Ferguson, William M.; Snyder, Randall A.; Miller, Devin P., System and method for identity protection using mobile device signaling network derived location pattern recognition.
  429. Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
  430. Beydler, Michael L.; Anderson, Roger B.; Scalisi, Joseph F.; Mejia, Desiree; Morse, David M., System and method for improved communication bandwidth utilization when monitoring location information.
  431. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  432. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  433. Dennis, Charles L.; Snyder, Randall A.; Buhrmann, Michael F.; Boyle, Patrick E., System and method for mobile identity protection for online user authentication.
  434. Dennis, Charles L.; Snyder, Randall A; Buhrmann, Michael F; Boyle, Patrick J., System and method for mobile identity protection for online user authentication.
  435. Buhrmann, Michael F.; Snyder, Randall A.; Dennis, Charles L.; Boxberger, Robert C.; Ferguson, William M., System and method for mobile identity protection of a user of multiple computer applications, networks or devices.
  436. Barton, Edward M.; Mizrah, Len L., System and method for mutually authenticated cryptographic key exchange using matrices.
  437. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  438. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  439. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  440. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  441. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  442. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  443. Schneier, Bruce; Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M., System and method for securing electronic games.
  444. Schneier, Bruce; Walker, Jay S.; Jorasch, James A.; Gelman, Geoffrey M., System and method for securing electronic games.
  445. Veiseh, Nima; Baarman, David W.; Leppien, Thomas Jay, System and method for three-phase data encryption.
  446. Rosen Sholom S., System and method for updating security information in a time-based electronic monetary system.
  447. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  448. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  449. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  450. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  451. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  452. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  453. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  454. Nakagawa Katsuya (Kusatsu JPX), System for determining authenticity of an external memory used in an information processing apparatus.
  455. Ronning Joel A., System for preventing unauthorized copying of active software.
  456. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  457. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  458. Takeda Genyo,JPX ; Kato Shuhei,JPX ; Nishiumi Satoshi,JPX, Systems and method for providing security in a video game system.
  459. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  460. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  461. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  462. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  463. Serret-Avila, Xavier, Systems and methods for authenticating and protecting the integrity of data streams and other data.
  464. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  465. Genyo Takeda JP; Shuhei Kato JP; Satoshi Nishiumi JP, Systems and methods for providing security in a video game system.
  466. Takeda Genyo,JPX ; Kato Shuhei,JPX ; Nishiumi Satoshi,JPX, Systems and methods for providing security in a video game system.
  467. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  468. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  469. Peyravian, Mohammad; Matyas, Jr., Stephen Michael; Zunic, Nevenko, Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key.
  470. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  471. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  472. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  473. Tie, Teck Sing; Backal, Shaul O., T-sequence apparatus and method for general deterministic polynomial-time primality testing and composite factoring.
  474. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  475. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  476. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  477. Vishnu, Vardhan Itta; Puthali, H. B., Techniques for validating and sharing secrets.
  478. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  479. Micali Silvio, Traceable anonymous transactions.
  480. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Transforms within secure execution environments.
  481. Micali Silvio, Tree-based certificate revocation system.
  482. Micali Silvio, Tree-based certificate revocation system.
  483. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  484. Ronning Joel A., Try before you buy software distribution and marketing system.
  485. Morris C. Carson (Broad Run VA) Bielsker Barry H. (Vienna VA) Cole Donald A. (Rockville MD), Two-tiered communication security employing asymmetric session keys.
  486. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  487. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Unpredictable blind signature systems.
  488. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  489. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  490. Bade, Steven A.; Chao, Ching-Yun, Using a portable computing device as a smart key device.
  491. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  492. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  493. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  494. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  495. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  496. Dieleman Adrianus H. (Eindhoven NLX), Validation check for remote digital station.
  497. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Virtual secure execution environments.
  498. Scheidt,Edward M., Voice and data encryption method using a cryptographic key split combiner.
  499. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Web services in secure execution environments.
  500. Wells, William R.; Griswold, Chauncey W., Wide screen gaming apparatus.
  501. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  502. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  503. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  504. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  505. Kolouch, James L., XML encryption scheme.
  506. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로