$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Cryptographic communications system and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-001/00
  • H04I-009/04
출원번호 US-0860586 (1977-12-14)
발명자 / 주소
  • Rivest Ronald L. (Belmont MA) Shamir Adi (Cambridge MA) Adleman Leonard M. (Arlington MA)
출원인 / 주소
  • Massachusetts Institute of Technology (Cambridge MA 02)
인용정보 피인용 횟수 : 1106  인용 특허 : 0

초록

A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first e

대표청구항

A communications system for transferring a message signal Mi comprising k terminals, wherein each terminal is characterized by an encoding key Ei=(ei, ni) and decoding key Di=(ei, ni), where i=1,2, . . . ,k, and wherein Mi corresponds to a number representative of a message signal to be transmitted

이 특허를 인용한 특허 (1106)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Farber, David A.; Lachman, Ronald D., Accessing data in a data processing system.
  6. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., Accessing protected content in a rights-management architecture.
  7. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  8. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  11. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  12. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  13. Aggarwal, Alok; Dubey, Pradeep K.; Jutla, Charanjit Singh; Kumar, Vijay; Martens, Marco; Shub, Michael Ira; Tresser, Charles P.; Wu, Chai Wah, Achieving buyer-seller anonymity for unsophisticated users under collusion amongst intermediaries.
  14. Fiske, Michael Stephen, Active element machine computation.
  15. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  16. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  17. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  18. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  19. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  20. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Agile network protocol for secure communications using secure domain names.
  21. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D., Agile network protocol for secure communications with assured system availability.
  22. Munger, Edmund Colby; Sabio, Vincent J.; Short, III, Robert Dunham; Gligor, Virgil D.; Schmidt, Douglas Charles, Agile network protocol for secure communications with assured system availability.
  23. Munger, Edmund Colby; Schmidt, Douglas Charles; Short, III, Robert Dunham; Larson, Victor; Williamson, Michael, Agile network protocol for secure video communications with assured system availability.
  24. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  25. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  26. Benjamin K. Gibbs, Apparatus and method for an authenticated electronic userid.
  27. Satake,Syuichi, Apparatus and method for authenticating digital signatures and computer-readable recording medium thereof.
  28. Dean, Gregory Lewis; Thompson, Erik Jonathon; Schwab, Frank; Erhart, Richard Alexander, Apparatus and method for culling substantially redundant data in fingerprint sensing circuits.
  29. Kocher Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  30. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  31. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  32. Paul Carl Kocher, Apparatus and method for demonstrating and confirming the status of a digital certificates and other data.
  33. Kocher, Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  34. Kocher,Paul Carl, Apparatus and method for demonstrating and confirming the status of digital certificates and other data.
  35. Thompson, Erik Jonathon; Dean, Gregory Lewis; Jandu, Jaswinder; Erhart, Richard Alexander, Apparatus and method for detecting finger activity on a fingerprint sensor.
  36. Palmer,Glennard D.; Doughty,Ralph O.; Antaki,Patrick R., Apparatus and method for effecting secure physical and commercial transactions in a contactless manner using biometric identity validation.
  37. Perezselsky, Armando Leon; Nelson, Richard Brian, Apparatus and method for electrostatic discharge protection.
  38. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  39. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  40. Thompson, Erik Jonathon; Dean, Gregory Lewis; Jandu, Jaswinder; Erhart, Richard Alexander, Apparatus and method for finger activity on a fingerprint sensor.
  41. Nelson, Richard Brian; Erhart, Richard Alexander; Perezselsky, Armando Leon, Apparatus and method for protecting fingerprint sensing circuitry from electrostatic discharge.
  42. Dean, Gregory Lewis; Erhart, Richard Alexander; Jandu, Jaswinder; Thompson, Erik Jonathan, Apparatus and method for reducing noise in fingerprint sensing circuits.
  43. Dean, Gregory Lewis; Erhart, Richard Alexander; Jandu, Jaswinder; Thompson, Erik Jonathon, Apparatus and method for reducing noise in fingerprint sensing circuits.
  44. Dean, Gregory Lewis; Erhart, Richard Alexander; Jandu, Jaswinder; Thompson, Erik Jonathon, Apparatus and method for reducing noise in fingerprint sensing circuits.
  45. Arnold Todd Weston, Apparatus and method for secure distribution of data.
  46. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  47. Rosen Sholom S., Apparatus and method for secure transacting.
  48. Palmer, Shelton L., Apparatus and method of automatically accessing on-line services in response to broadcast of on-line addresses.
  49. Schaffran, Michelle R.; McKim, Dale W.; Cooper, Stephen R. W.; Gillis, Edward J., Apparatus and method of vehicle occupant sensing using multiple ultrasonic frequencies.
  50. Aylward, Adrian; Hollar, Mark A, Apparatus for and a method of providing content data.
  51. Ruben Gary D. ; Goldwater Mark H., Apparatuses, methods, and media for authoring, distributing, and using software resources with purposely restricted use.
  52. Cahill, Conor Patrick; Roth, Gregory Branchek, Application instances authenticated by secure measurements.
  53. Shaked, Shvat; Tal, Or; Tarsi, Yuval; Wilf, Saar, Application of automatic internet identification methods.
  54. Narin, Attila; DeMello, Marco A.; Yaacovi, Yoram; Alger, Jeffrey A.; Keely, Leroy B.; Silver, David Michael; Madonna, Christopher Robert Richard; Beezer, John; Hughes, Kathryn E., Architecture for an electronic shopping service integratable with a software application.
  55. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  56. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  57. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  58. Hubert, Gerardus Tarcisius Maria, Arrangement for and method of protecting a data processing device against an attack or analysis.
  59. Capone, Christopher D.; Heller, Ronald; Haury, John A.; Seman, Richard A.; Mator, Joseph C., Assembly method for a fluid pump device for a continuous multi-fluid delivery system.
  60. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Malik,Prashant; Hughes,Kathryn E.; Byrum,Frank D., Asynchronous communication within a server arrangement.
  61. Sundararajan, Narasimhan, Authenticated exchange of public information using electronic mail.
  62. Shimabukuro, Jorge L.; Veradej, Anussorn; Wang, Jun; Weijers, Gerardus A., Authenticating components in wagering game systems.
  63. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  64. Durst, David I.; Kaish, Norman; Fraser, Jay, Authentication method and system.
  65. Durst, David I.; Kaish, Norman; Fraser, Jay; Hoffberg, Michael; Rodricks, Brian, Authentication method and system.
  66. Durst,David I.; Kaish,Norman; Fraser,Jay, Authentication method and system.
  67. Durst,David I.; Kaish,Norman; Fraser,Jay; Hoffberg,Michael; Rodricks,Brian, Authentication method and system.
  68. Fraser, Jay, Authentication method and system.
  69. Fraser, Jay, Authentication method and system.
  70. Fraser, Jay; Weber, Larry, Authentication method and system.
  71. Fraser, Jay; Weber, Larry, Authentication method and system.
  72. Fraser, Jay; Weber, Lawrence, Authentication method and system.
  73. DeFreese, Darryl L.; Seaman, Jeffrey M.; Wasilewski, Anthony J., Authentication of entitlement authorization in conditional access systems.
  74. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  75. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Banker, Robert O., Authorization of services in a conditional access system.
  76. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  77. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  78. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  79. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  80. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  81. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  82. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  83. Kelley, Raymond H; Sutton, III, John C.; Bruce, Donna L.; Ardalan, Sasan H., Automated on-site meter registration confirmation using a portable, wireless computing device.
  84. Khan Shabbir A. ; Hussain Basit ; Rajput Saeed A., Automated software metering of digital payloads.
  85. Wright Christopher B. (San Francisco CA) Bristow Stephen (Los Altos Hills CA), Automated transaction system.
  86. Gudbjartsson,Hakon; Karlsson,Sverrir; Thormar,Skeggi, Automatic identity protection system with remote third party monitoring.
  87. Shuey,Kenneth C., Bias technique for electric utility meter.
  88. Khan, Shabbir; Cohen, Alexander, Bidding network.
  89. Dulude Robert S. ; Musgrave Clyde, Biometric certificates.
  90. Musgrave Clyde, Biometric certifying authorities.
  91. Musgrave,Clyde, Biometric certifying authorities.
  92. Benkley, III, Fred G., Biometric image sensing.
  93. Benkley, III, Fred G., Biometric image sensing.
  94. Benkley, III, Fred G., Biometric image sensing.
  95. Benkley, III, Fred G., Biometric image sensing.
  96. Benkley, III, Fred G., Biometric image sensing.
  97. Erhart, Richard Alexander; Thompson, Erik Jonathon; Jandu, Jaswinder; Percy, Pamela, Biometric object sensor and method.
  98. Erhart, Richard; Thompson, Erik; Jandu, Jas Singh; Percy, Pam, Biometric object sensor and method.
  99. Benkley, III, Fred G.; Geoffroy, David Joseph, Biometric sensing.
  100. Benkley, III, Fred G.; Geoffroy, David Joseph, Biometric sensing.
  101. Benkley, III, Fred G.; Geoffroy, David Joseph, Biometric sensing.
  102. Musgrave Clyde, Biometric watermarks.
  103. Gentry, Craig B., Bootstrappable homomorphic encryption method, computer program and apparatus.
  104. Lien, Ty Bao; Thompson, Erik Jonathon, Button depress wakeup and wakeup strategy.
  105. Kahl, Helmut, Calculating the modular inverses of a value.
  106. DePond Paul F. ; Larson Gaylan, Call waiting-caller identification notification device.
  107. Ronning Joel A., Central database system for automatic software program sales.
  108. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  109. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  110. Kurn, David Michael; Salmond, Kent Adams; Panero, Robert A., Centralized cryptographic key administration scheme for enabling secure context-free application operation.
  111. Robinson, Richard L.; Serkowski, Robert J.; Walker, William T., Certificate distribution via license files.
  112. Peacham, Anthony David, Codelets.
  113. Douceur John R. ; Calligaro Michael P. ; Thomlinson Matthew W., Coercion resistant one-time-pad cryptosystem that facilitates transmission of messages having different levels of security.
  114. Naciri Robert,FRX, Communication system for messages enciphered according to an RSA-type procedure.
  115. Farber, David A.; Lachman, Ronald D., Computer file system using content-dependent file identifiers.
  116. Shostack Adam ; Allouch David,ILX, Computer security.
  117. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  118. Glover John J., Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information.
  119. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  120. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  121. Martinek,Michael G.; Jackson,Mark D.; Yoseloff,Mark L., Computerized gaming system, method and apparatus.
  122. Yoseloff, Mark L.; Jackson, Mark D.; Martinek, Michael G.; Brower, Donald A.; DeJournett, John L., Computerized gaming system, method and apparatus.
  123. Ducharme, Paul D.; Jao, Weiguo, Concealing plain text in scrambled blocks.
  124. Wasilewski Anthony J. ; Pinder Howard G. ; Akins ; III Glendon L. ; Palgon Michael S., Conditional access system.
  125. Wasilewski, Anthony J.; Pinder, Howard G.; Akins, III, Glendon L.; Palgon, Michael S., Conditional access system.
  126. Peachman, Anthony David; Simmons, Ian Stephen, Configuration of IC card.
  127. Reasons,John D.; Vineyard,James L., Connected support entitlement system and method of operation.
  128. Reasons,John D.; Vineyard,James L., Connected support entitlement system method of operation.
  129. Farber, David A.; Lachman, Ronald D., Controlling access to data in a data processing system.
  130. Daniel Schreiber IL; Andrew Goldman IL, Copy protection of digital images transmitted over networks.
  131. Michael Smola DE; Dietmar Zaig DE, Copy protection system only authorizes the use of data if proper correlation exists between the storage medium and the useful data.
  132. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  133. Schreiber,Daniel; Goldman,Andrew, Copyright protection of digital images transmitted over networks.
  134. Han, Minghui; Wachs, Megan; Lan, Hai, Countermeasure to power analysis attacks through time-varying impedance of power delivery networks.
  135. Crosley Thomas W. (Saratoga CA) Davison Wayne (Portland OR) Goldberg James R. (Novato CA) Hofheins Leonard L. (Concord CA) Lichty Ronald D. (San Francisco CA) Vollum Charles A. (Sherwood OR) Vollum S, Cryptographic based electronic lock system and method of operation.
  136. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Cryptographic computation using masking to prevent differential power analysis and other attacks.
  137. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  138. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  139. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  140. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  141. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  142. Jayant Shukla, Cryptographic method and apparatus for data communication and storage.
  143. Sedlak Holger (Braunschweiger Strasse 1A D-3300 Braunschweig DEX), Cryptographic method and cryptographic processor for carrying out the method.
  144. Thomas Collins ; John Gregory ; Ralph Bestock, Cryptographic system.
  145. Asai Hitohisa (892 Catalina Dr. Newport News VA 23602), Cryptographic system using pseudocomplements of vector Boolean algebra.
  146. Zimmermann Philip, Cryptographic system with methods for user-controlled message recovery.
  147. Zimmermann,Philip, Cryptographic system with methods for user-controlled message recovery.
  148. Kocher, Paul C., Cryptographic token with leak-resistant key derivation.
  149. Carapelli, Giovanni; Welch, Bruce, Cryptographic watermarking of content in fuel dispensing environments.
  150. Carlson, Rolf E, Cryptography and certificate authorities in gaming machines.
  151. Carlson,Rolf E., Cryptography and certificate authorities in gaming machines.
  152. Fiske, Michael Stephen, Cryptography related to keys.
  153. Miyaguchi Shoji (Yokohama JPX), Cryptosystem.
  154. Ajtai Miklos, Cryptosystem employing worst-case difficult-to solve lattice problem.
  155. Koh,Jee H., Cryptosystems using commuting pairs in a monoid.
  156. Etchegoyen, Craig S., Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account.
  157. Hsieh, Hsiang-Tsuen; Indirabhai, Jyothis S., DC offset and bit timing system and method for use with a wireless transceiver.
  158. Mason, Jr.,Robert T.; Hodges,Eugene W.; Smith,Kathryn J.; Borleske,Andrew J., Data collector for an automated meter reading system.
  159. Etzel, Mark H.; Faucher, David W.; Heer, Daniel Nelson; Maher, David P.; Rance, Robert John, Data encryption key management system.
  160. Belenky, Yaacov, Data expansion using an approximate method.
  161. Smeets,Ben, Data integrity mechanisms for static and dynamic data.
  162. Takada,Masayuki; Kusakabe,Susumu; Sasaki,Masachika; Morita,Tadashi, Data processing method and system of same portable device data processing apparatus and method of same and program.
  163. Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
  164. Moskowitz, Scott A., Data protection method and device.
  165. Moskowitz, Scott A., Data protection method and device.
  166. Moskowitz, Scott A., Data protection method and device.
  167. Moskowitz, Scott A., Data protection method and device.
  168. Dahl, Ulf, Data security system for a database.
  169. Benaloh,Josh D., Data signal with a database and a compressed key.
  170. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  171. Sandford ; II Maxwell T. ; Handel Theodore G., Data validation.
  172. Herzberg, Amir; Shai, Eldad; Zisser, Ilan, Decentralized electronic certified payment.
  173. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  174. Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; LeMay, Steven G.; Nelson, Dwayne R.; Palchetti, Johnny; Benbrahim, Jamal, Decoupling of the graphical presentation of a game from the presentation logic.
  175. Gidwani, Arvind, Demand based encryption and key generation and distribution systems and methods.
  176. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  177. Hoffberg, Steven M., Detection and alert of automobile braking event.
  178. Naccache, David; Coron, Jean-Sébastien; Tibouchi, Medhi, Device and method for generating keys with enhanced security for fully homomorphic encryption algorithm.
  179. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  180. Jain, Amit; Storm, Clifford Paul; Cutter, Jr., Benjamin Brooks; Evans, Brian Patrick, Device certificate individualization.
  181. Ferreira Ronald,FRX ; Hoppe Joseph,FRX, Device for implementing a message signature system and chip card comprising such a device.
  182. Etchegoyen, Craig S., Device-specific content delivery.
  183. Etchegoyen, Craig S., Device-specific content delivery.
  184. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis.
  185. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis method and apparatus.
  186. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  187. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Differential power analysis—resistant cryptographic processing.
  188. Kaufman Charles W. ; Matyas ; Jr. Stephen M., Differential work factor cryptography method and system.
  189. Lee, Chiou-Haun, Diffused symmetric encryption/decryption method with asymmetric keys.
  190. Azuma,Motoo, Digital camera, customer authentication communication terminal equipment, and encoding service system.
  191. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management.
  192. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  193. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  194. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  195. Haber Stuart A. ; Stornetta ; Jr. W. Scott, Digital document authentication system.
  196. Rowe, Richard E., Digital identification of unique game characteristics.
  197. Rowe,Richard E., Digital identification of unique game characteristics.
  198. Khan, Shabbir; Cohen, Alexander, Digital object routing based on a service request.
  199. Khan, Shabbir; Cohen, Alexander, Digital object title and transmission information.
  200. Antoine Joux FR, Digital signature method.
  201. Chen, Liqun, Digital signature method and system.
  202. Renaud Benjamin J., Digital signatures for data streams and data archives.
  203. Stefik, Mark J.; Pirolli, Peter L. T., Digital work structure.
  204. Benkley, III, Fred G.; Geoffroy, David Joseph, Display with integrated touch screen and fingerprint sensor.
  205. Shanton M. Greg, Distributed cryptographic object method.
  206. Shanton M. Greg, Distributed cryptographic object method.
  207. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  208. Horita,Eiichi; Ono,Satoshi, Distributed digital signature generation method and digitally signed digital document generation method and apparatus.
  209. Showers, Brian; Prud'homme, Graham; Gindikin, Daniel S.; Oppenheim, Kyle A., Distributed secrets for validation of gaming transactions.
  210. Micali Silvio, Distributed split-key cryptosystem and applications.
  211. Badenell, Jon Edward, Domain-based application functionality.
  212. Badenell, Jon Edward, Domain-based application functionality.
  213. Osler, Bruce P.; Riley, Kevin, Dual-channel communications protocol providing enhanced capabilities for modems.
  214. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  215. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  216. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  217. Shuey,Kenneth C.; Hemminger,Rodney C.; Mason, Jr.,Robert T.; Hodges,Eugene W., Dynamic self-configuring metering network.
  218. Lenstra,Arjen K.; Verheul,Eric R., Efficient and compact subgroup trace representation ("XTR").
  219. Halevi, Shai; Gentry, Craig B.; Vaikuntanathan, Vinod, Efficient homomorphic encryption scheme for bilinear forms.
  220. Halevi, Shai; Gentry, Craig B.; Vaikuntanathan, Vinod, Efficient homomorphic encryption scheme for bilinear forms.
  221. Gentry, Craig B.; Halevi, Shai, Efficient implementation of fully homomorphic encryption.
  222. Pulkus, Jurgen, Efficient prime-number check.
  223. Morris, Martin, Efficient time-division multiplexed addressing protocol.
  224. Morris,Martin, Efficient time-division multiplexed addressing protocol.
  225. Hendricks,John S.; Asmussen,Michael L.; McCoskey,John S., Electronic Book having electronic commerce features.
  226. Hendricks, John S.; Asmussen, Michael L.; McCoskey, John S., Electronic book alternative delivery systems.
  227. Hendricks, John S.; McCoskey, John S.; Asmussen, Michael L., Electronic book connection to world watch live.
  228. Hendricks,John S.; Asmussen,Michael L., Electronic book electronic links.
  229. Hendricks, John S.; Asmussen, Michael L.; McCoskey, John S., Electronic book having electronic commerce features.
  230. Hendricks, John S., Electronic book library/bookstore system.
  231. Hendricks,John S., Electronic book secure communication with home subsystem.
  232. Hendricks,John S.; Asmussen,Michael L.; McCoskey,John S., Electronic book security and copyright protection system.
  233. Hendricks,John S., Electronic book selection and delivery system having encryption and security features.
  234. Hendricks, John S.; Asmussen, Michael L., Electronic book with restricted access features.
  235. Hendricks, John S.; Asmussen, Michael L., Electronic book with voice emulation features.
  236. Hendricks, John S.; Asmussen, Michael L., Electronic book with voice emulation features.
  237. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  238. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  239. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  240. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  241. Alcorn,Allan E.; Barnett,Michael; Giacalone, Jr.,Louis D.; Levinthal,Adam E., Electronic casino gaming system with improved play capacity, authentication and security.
  242. Messing, John H., Electronic certificate signature program.
  243. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  244. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  245. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  246. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  247. Wickboldt, Paul; Thammasouk, Khamvong, Electronic device packages and methods.
  248. Alcorn, Allan E.; Jenkins, Harry H., Electronic gaming apparatus having authentication data sets.
  249. Alcorn,Allan E.; Jenkins,Harry H., Electronic gaming apparatus with authentication.
  250. Benkley, III, Fred G., Electronic imager using an impedance sensor grid array and method of making.
  251. Benkley, III, Fred G., Electronic imager using an impedance sensor grid array and method of making.
  252. Benkley, III, Fred G., Electronic imager using an impedance sensor grid array mounted on or about a switch and method of making.
  253. Messing,John H., Electronic signature method.
  254. Miyauchi Hiroshi (Tokyo JPX), Electronic signature method and apparatus.
  255. Rosen Sholom S., Electronic-monetary system.
  256. Rosen Sholom S., Electronic-monetary system.
  257. Rosen Sholom S., Electronic-monetary system.
  258. Craigie, Jim, Email policy manager.
  259. Benaloh, Josh D., Encrypted content data structure package and generation thereof.
  260. Benaloh,Josh D., Encrypted content data structure package and generation thereof.
  261. Takaragi Kazuo (Ebina JPX) Nakagawa Fusao (Yokohama JPX) Nagai Yasuhiko (Yokohama JPX) Sasaki Ryoichi (Fujisawa JPX), Encrypting system of data.
  262. Shigenori Uchiyama JP; Tatsuaki Okamoto JP, Encryption and decryption devices for public-key cryptosystems and recording medium with their processing programs recorded thereon.
  263. Tehranchi,Babak, Encryption apparatus and method for synchronizing multiple encryption keys with a data stream.
  264. Clark James M. (Verona NJ), Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large u.
  265. Howard G. Pinder ; Michael S. Palgon, Encryption devices for use in a conditional access system.
  266. Jackson, Mark D.; Martinek, Michael G., Encryption in a secure computerized gaming system.
  267. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  268. Jackson,Mark D.; Martinek,Michael G., Encryption in a secure computerized gaming system.
  269. Martinek,Michael G.; Jackson,Mark D., Encryption in a secure computerized gaming system.
  270. Wilkins, John; Keefe, Michael; Rehman, Sam, Encryption key exchange system and method.
  271. Ryota Akiyama JP; Akio Munakata JP; Yuzuru Koga JP; Masayuki Ishizaki JP; Makoto Yoshioka JP, Encryption processing system.
  272. Charles M. Doland, Encryption technique using stream cipher and block cipher.
  273. Orrin Steven M., Encryption-based selection system for steganography.
  274. Farber, David A.; Lachman, Ronald D., Enforcement and policing of licensed content using content-based identifiers.
  275. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  276. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  277. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  278. Sudia Frank Wells, Enhanced cryptographic system and method with key escrow feature.
  279. Rudran,Dileep; Scoggins,Sean M; Christopher,Russell G, Ensuring automatic season change demand resets in a mesh type network of telemetry devices.
  280. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  281. Marsh, David J., Establishing a unique session key using a hardware functionality scan.
  282. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  283. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  284. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  285. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  286. Khandelwal, Vikas; Oliveira, Eduardo P.; Van Dyke, Clifford P.; VanAntwerp, Mark D.; Storm, Clifford P.; Alkove, James M., Extensible media rights.
  287. Benaloh, Josh D., Extraction of multiple single keys from a compressed key.
  288. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  289. Micali Silvio, Fair cryptosystems and methods of use.
  290. Gentry, Craig B.; Halevi, Shai, Fast computation of a single coefficient in an inverse polynomial.
  291. Gentry, Craig B.; Halevi, Shai, Fast computation of a single coefficient in an inverse polynomial.
  292. Gentry, Craig B.; Halevi, Shai, Fast computation of a single coefficient in an inverse polynomial.
  293. Gentry, Craig B.; Halevi, Shai, Fast evaluation of many polynomials with small coefficients on the same point.
  294. Sharif, Imran; Knapp, William; Rahman, Tawhidur; Ivey, Glen Edward; Bremsteller, John, Fax-compatible internet appliance.
  295. Rosen Richard D. (Columbus OH) McCown Robert B. (Columbus OH) Fleming Matthew S. (Columbus OH), Field initialized authentication system for protective security of electronic information networks.
  296. Rose, Anthony, Filter for a distributed network.
  297. Rose, Anthony, Filter for a distributed network.
  298. Rose, Anthony, Filter for a distributed network.
  299. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  300. Benkley, III, Fred G., Fingerprint sensing assemblies and methods of making.
  301. Benkley, III, Fred G., Fingerprint sensing assemblies and methods of making.
  302. Erhart, Richard Alex; Nelson, Richard Brian; Thompson, Erik; Perezselsky, Armando Leon, Fingerprint sensing circuit.
  303. Erhart, Richard Alexander; Nelson, Richard Brian; Wickboldt, Paul, Fingerprint sensor and integratable electronic display.
  304. Erhart, Richard Alexander; Nelson, Richard Brian; Wickboldt, Paul, Fingerprint sensor and integratable electronic display.
  305. Wickboldt, Paul; Nelson, Richard Brian; Erhart, Richard Alexander, Fingerprint sensor packagings and methods.
  306. Walker, William T.; Rhodes, James E.; Serkowski, Robert J.; Morgan, Lawrence J.; Gopalakrishna, Mohana Krishnan, Flexible license file feature controls.
  307. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  308. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Flexibly loading a tamper resistant module.
  309. Liu Shen-Iuan (Keelung TWX), Four-quadrant three-input multiplier.
  310. Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  311. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  312. Williams, Rodger K.; Carapelli, Giovanni, Fuel dispenser user interface system architecture.
  313. Gentry, Craig B., Fully homomorphic encryption.
  314. Gentry, Craig B., Fully homomorphic encryption.
  315. Gentry, Craig B., Fully homomorphic encryption method based on a bootstrappable encryption scheme, computer program and apparatus.
  316. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  317. LeMay, Steven G.; Nelson, Dwayne R.; Breckner, Robert E.; Schlottmann, Greg A.; Beaulieu, Nicole M.; Palchetti, Johnny; Benbrahim, Jamal, Game development architecture that decouples the game logic from the graphics logic.
  318. Cannon, Lee E., Gaming apparatus with encryption and method.
  319. Alcorn,Allan E.; Jenkins,Harry H., Gaming apparatus with portrait-mode display.
  320. Steven A. Weiss ; Rex R. Carlson, Gaming device security system: apparatus and method.
  321. Weiss Steven A. ; Carlson Rex R., Gaming device security system: apparatus and method.
  322. Canterbury,Stephen A., Gaming machine having hardware-accelerated software authentication.
  323. Gentles, Thomas A., Gaming machine having reduced-read software authentication.
  324. Ryan,Chad A., Gaming machine having targeted run-time software authentication.
  325. Gazdic, Daniel J.; Ryan, Chad A.; Sylla, Craig J., Gaming software authentication.
  326. Gazdic, Daniel J.; Ryan, Chad A.; Sylla, Craig J., Gaming software authentication.
  327. Gazdic, Daniel J.; Sylla, Craig J.; Ryan, Chad A., Gaming software authentication.
  328. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  329. Arjen K. Lenstra, Generating RSA moduli including a predetermined portion.
  330. Eldridge, Alan D.; Kern, David S., Generating a secret key from an asymmetric private key.
  331. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  332. Daly Brian Kevin ; Owens Leslie Dale, Generation of encryption key.
  333. Mazza, Bruce P.; Walker, William T., Generation of enterprise-wide licenses in a customer environment.
  334. Murphy Michael ; Woo Arthur N. ; Nichols Mark ; Schipper John, Geographical position/image digital recording and display system.
  335. Davis, Hedley C.; Stirret, Prakash R., Hard drive authentication.
  336. Smyers Scott D., Hardware authentication mechanism for transmission of data between devices on an IEEE 1394-1995 serial bus network.
  337. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  338. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  339. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  340. Gentry, Craig B.; Halevi, Shai; Smart, Nibel P., Homomorphic evaluation including key switching, modulus switching, and dynamic noise management.
  341. Gentry, Craig B.; Halevi, Shai; Smart, Nigel P., Homomorphic evaluation including key switching, modulus switching, and dynamic noise management.
  342. Gentry, Craig B.; Halevi, Shai; Smart, Nigel P., Homomorphic evaluation including key switching, modulus switching, and dynamic noise management.
  343. Gentry, Craig B.; Halevi, Shai; Smart, Nigel P., Homomorphic evaluation including key switching, modulus switching, and dynamic noise management.
  344. Gentry, Craig B.; Halevi, Shai; Smart, Nigel P., Homomorphic evaluation including key switching, modulus switching, and dynamic noise management.
  345. Kitchener Robert A. (Armonk NY), IC card and an identification system thereof.
  346. Richards Timothy Philip,GBX, IC card with shell feature.
  347. Ohashi Masayoshi,JPX ; Sakai Seiichiro,JPX ; Suzuki Toshinori,JPX, Identity confidentiality method in radio communication system.
  348. Schipper John F. ; Pelley Allan M., Image authentication patterning.
  349. Renaud Benjamin J. ; Pampuch John C. ; Hodges Wilsher Avril E., Implementing digital signatures for data streams and data archives.
  350. Borleske,Andrew J.; Shuey,Kenneth C.; Mason, Jr.,Robert T., In-home display communicates with a fixed network meter reading system.
  351. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  352. Mankovitz Roy J. (18057 Medley Dr. Encino CA 91316), Information distribution system with self-contained programmable automatic interface unit.
  353. Felsher, David Paul, Information record infrastructure, system and method.
  354. Moreau Thierry,CAX, Initial secret key establishment including facilities for verification of identity.
  355. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Integrated circuit card with application history list.
  356. Erhart, Richard Alex, Integrated fingerprint sensor and display.
  357. Dean, Gregory Lewis; Erhart, Richard Alexander; Jandu, Jaswinder; Russo, Anthony; Thompson, Erik, Integrated fingerprint sensor and navigation device.
  358. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  359. DeMello, Marco A.; Zeman, Pavel; Krishnaswamy, Vinay; Byrum, Frank D., Inter-server communication using request with encrypted parameter.
  360. Hendricks, John S.; Asmussen, Michael L., Interactive electronic book.
  361. Carbajal, John M.; Dittert, Eric R.; Drews, Paul C., Interface for ensuring system boot image integrity and authenticity.
  362. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  363. Murphy Frederick J., Internet global area networks fax system.
  364. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malaviarachchi, Rushmi U.; Parambir, Kumar B.; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, Charles F., Issuing a publisher use license off-line in a digital rights management (DRM) system.
  365. Bourne, Steve; Dillaway, Blair Brewster; Jacomet, Pierre; Malviarachchi, Rushmi U; Parambir, Kumar B; Rozenfeld, Yevgeniy Eugene; Venkatesh, Chandramouli; Rose, III, Charles F, Issuing a publisher use license off-line in a digital rights management (DRM) system.
  366. Struik, Marinus, Key agreement and transport protocol.
  367. Struik, Marinus, Key agreement and transport protocol.
  368. Struik, Marinus, Key agreement and transport protocol.
  369. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  370. Vanstone Scott,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Key agreement and transport protocol with implicit signatures.
  371. Vanstone, Scott Alexander; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  372. Vanstone, Scott; Menezes, Alfred John; Qu, Minghua, Key agreement and transport protocol with implicit signatures.
  373. Fu,Xiaodong, Key based decipher including its generation, distribution and usage.
  374. Benaloh,Josh D., Key compression.
  375. Benaloh,Josh D., Key generation.
  376. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  377. Van Oorschot Paul C.,CAX ; Wiener Michael James,CAX, Key management system for mixed-trust environments.
  378. Lewis Tony, Key replacement in a public key cryptosystem.
  379. Lewis Tony, Key replacement in a public key cryptosystem.
  380. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  381. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  382. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  383. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  384. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Key transformation unit for a tamper resistant module.
  385. Timothy Philip Richards GB, Key transformation unit for an IC card.
  386. Scott C. Vanstone CA; Robert J. Zuccherato CA, Key transmission system.
  387. Vanstone Scott C.,CAX ; Zuccherato Robert J.,CAX, Key transmission system.
  388. Johnson, Donald B., Key validation scheme.
  389. Johnson, Donald B., Key validation scheme.
  390. Johnson,Donald B., Key validation scheme.
  391. Cross, David B.; Nath, Satyajit; Li, George Z.; Dutta, Tanmoy; Gottumukkala, Sunil, Labeling of data objects to apply and enforce policies.
  392. Kaplan George R. ; Shachrai Avigdor,ILX ; Anner Oded,ILX ; Gurvich Leonid,ILX, Laser making system and certificate for a gemstone.
  393. George R. Kaplan ; Avigdor Shachrai IL; Oded Anner IL; Leonid Gurvich IL, Laser marking system.
  394. Kaplan George R. ; Shachrai Avigdor,ILX ; Anner Oded,ILX ; Gurvich Leonid,ILX, Laser marking system.
  395. Kocher Paul C. ; Jaffe Joshua M., Leak-resistant cryptographic method and apparatus.
  396. Paul C. Kocher ; Joshua M. Jaffe, Leak-resistant cryptographic method and apparatus.
  397. Kocher,Paul C.; Jaffe,Joshua M., Leak-resistant cryptographic payment smartcard.
  398. Rhodes, James E.; Serkowski, Robert J.; Walker, William T.; Morgan, Lawrence John; Gopalakrishna, Mohana Krishnan, License modes in call processing.
  399. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  400. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  401. Best, Robert M., Linked electronic game systems.
  402. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  403. Benkley, Fred George; Geoffroy, David Joseph, Live finger detection.
  404. Shuey, Kenneth C.; Borleske, Andrew J.; Mason, Jr., Robert T.; Hart, David G., Load control unit in communication with a fixed network meter reading system.
  405. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  406. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  407. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  408. Gvili, Yaron, Manicoding for communication verification.
  409. Gvili, Yaron, Manicoding for communication verification.
  410. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  411. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  412. Brindze Paul L. ; Tully Geoffrey A., Mass storage element and drive unit therefor.
  413. Wasilewski, Anthony J.; Seaman, Jeffery M.; Defreese, Darryl L., Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system.
  414. Jevans, David, Mechanism for efficient private bulk messaging.
  415. Jevans, David, Mechanism for efficient private bulk messaging.
  416. Okaue, Takumi; Nakanishi, Kenich; Tashiro, Jun; Okubo, Hideaki, Memory device having secure non-volatile locking functionality.
  417. Appenzeller, Guido; Choi, Timothy Y.; Pauker, Matthew J., Message authentication using signatures.
  418. Appenzeller, Guido; Choi, Timothy Y.; Pauker, Matthew J., Message authentication using signatures.
  419. Benkley, Fred George; Geoffroy, David Joseph; Satyan, Pallavi, Method and algorithm for accurate finger motion tracking.
  420. Bori, Josep, Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability.
  421. Zhang Jinglong F, Method and apparatus for a robust high-speed cryptosystem.
  422. Didier, Patrick Francis; Cross, Ray Lynn; Odell, Roger Charles; Ossenkop, Stephen Edward, Method and apparatus for ad hoc cryptographic key transfer.
  423. Angelo Michael F., Method and apparatus for allowing access to secured computer resources by utilzing a password and an external encryptio.
  424. Gibbs, Benjamin K., Method and apparatus for an adapted digital signature.
  425. Kingdon Kevin, Method and apparatus for authentication of client server communication.
  426. Shabbir A. Khan ; Saeed A. Rajput ; Basit Hussain, Method and apparatus for binding electronic impressions made by digital identities to documents.
  427. Maddury,Mahesh S.; Tomei,Kenneth J., Method and apparatus for calculating a multiplicative inverse of an element of a prime field.
  428. Musyck Emile P. (Geel BEX) Binard Luc A. (Mol BEX) Coupe Bernard G. (Tournai BEX), Method and apparatus for checking the authenticity of individual-linked documents and the identity of the holders thereo.
  429. Stefik, Mark J.; Pirolli, Peter L. T., Method and apparatus for client customization by executing software parts on plural servers.
  430. Smith ; Sr. Ronald M. ; D'Avignon Edward J. ; DeBellis Robert S. ; Easter Randall J. ; Green Lucina L. ; Kelly Michael J. ; Spano Vincent A. ; Yeh Phil Chi-Chung, Method and apparatus for controlling the configuration of a cryptographic processor.
  431. Iris Anshel ; Michael M. Anshel ; Dorian Goldfeld, Method and apparatus for cryptographically secure algebraic key establishment protocols based on monoids.
  432. Nelson ; Jr. Douglas Valmore (916 Spring Creek La. Atlanta GA 30350), Method and apparatus for digital encryption.
  433. Marcu, Adrian R., Method and apparatus for encoding vouchers in a casino gaming system.
  434. Aird, Kenneth Alan; Sirotin, Mike; Volmerding, Matthew D.; Wilson, Timothy D., Method and apparatus for filtering wagering game content.
  435. Benkley, Fred George; Geoffroy, David Joseph; Satyan, Pallavi, Method and apparatus for fingerprint image reconstruction.
  436. Benkley, Fred George; Geoffroy, David Joseph; Satyan, Pallavi, Method and apparatus for fingerprint image reconstruction.
  437. Benkley, Fred George; Geoffroy, David Joseph, Method and apparatus for fingerprint motion tracking using an in-line array.
  438. Benkley, Fred George; Geoffroy, David Joseph, Method and apparatus for fingerprint motion tracking using an in-line array for use in navigation applications.
  439. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  440. Akins, III, Glendon L.; Pinder, Howard G.; Wasilewski, Anthony J., Method and apparatus for geographically limiting service in a conditional access system.
  441. Mann Steven D., Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data.
  442. Herley, Cormac; Xu, Yihong, Method and apparatus for partial encryption of content.
  443. Schreiber,Daniel; Guedaliah,David, Method and apparatus for preventing reuse of text, images and software transmitted via networks.
  444. Schreiber, Daniel; Guedaliah, David, Method and apparatus for preventing reuse of text, images, and software transmitted via networks.
  445. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  446. Trimberger, Stephen M., Method and apparatus for protecting proprietary configuration data for programmable logic devices.
  447. Anthony J. Wasilewski ; Douglas F. Woodhead ; Gary Lee Logston, Method and apparatus for providing conditional access in connection-oriented interactive networks with a multiplicity of service providers.
  448. Wasilewski Anthony John ; Woodhead Douglas F. ; Logston Gary Lee, Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity.
  449. Ronald M. Smith, Sr. ; Edward J. D'Avignon ; Robert S. DeBellis ; Randall J. Easter ; Lucina L. Green ; Michael J. Kelly ; William A. Merz ; Vincent A. Spano ; Phil Chi-Chung Yeh, Method and apparatus for providing public key security control for a cryptographic processor.
  450. Smith, Sr., Ronald M.; D'Avignon, Edward J.; DeBellis, Robert S.; Easter, Randall J.; Green, Lucina L.; Kelly, Michael J.; Merz, William A.; Spano, Vincent A.; Yeh, Phil Chi-Chung, Method and apparatus for providing public key security control for a cryptographic processor.
  451. Eames Thomas R. ; Trinh Lac X. ; Manchester E. Barton ; Yearwood Bradley N. ; Manley David J. ; Hicks Scott T. ; Johal Jaskarn S. ; Eldering Charles A., Method and apparatus for reliable operation of universal voice grade cards.
  452. Kahrobaei, Delaram; Cavallo, Bren; Shpilrain, Vladimir, Method and apparatus for secure delegation of computation.
  453. Akira Yaegashi ; Henry Theo F. Guico, Method and apparatus for secure distribution of information recorded of fixed media.
  454. Yaegashi, Akira; Guico, Henry Theo F., Method and apparatus for secure distribution of information recorded on fixed media.
  455. Smeets,Bernhard Jan Marie; Poon,Kar Fat; Bodensjo,Marcus, Method and apparatus for secure leveled access control.
  456. LeMay, Steven G.; Benbrahim, Jamal; Chen, Xuedong, Method and apparatus for software authentication.
  457. Smith ; Sr. Ronald M. ; D'Avignon Edward J. ; DeBellis Robert S. ; Yeh Phil Chi-Chung, Method and apparatus for the secure transfer of objects between cryptographic processors.
  458. Benkley, Fred George; Geoffroy, David Joseph; Satyan, Pallavi, Method and apparatus for two-dimensional finger motion tracking and control.
  459. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  460. Todor Cooklev, Method and apparatus for wavelet-based digital watermarking.
  461. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  462. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  463. Vorbr��ggen,Jan C.; Kubbilun,Wolfgang; Koch,Eckhard; Kubbilun,Ingo A.; Bickenbach,Hans Joachim; Belke,Marcus, Method and device for confirming the authenticity of a document and a safe for storing data.
  464. Cannon, Lee E., Method and device for implementing a coinless gaming environment.
  465. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  466. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  467. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  468. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  469. Blumberg, Manfred; Dirrichs, Stefan; London, Wolfgang; Töpfer, Gary, Method and device for preventing a control error of a machine tool.
  470. Alao,Rachad, Method and system for accelerated data encryption.
  471. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  472. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  473. DeMello, Marco A.; Keely, Leroy B.; Byrum, Frank D.; Yaacovi, Yoram; Hughes, Kathryn E., Method and system for binding enhanced software features to a persona.
  474. Russo, Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  475. Russo,Anthony P., Method and system for biometric image assembly from multiple partial biometric frame scans.
  476. Stefik, Mark J.; Pirolli, Peter L.T., Method and system for conducting transactions between repositories.
  477. Mason, Jr.,Robert T.; Borleske,Andrew J., Method and system for configurable qualification and registration in a fixed network automated meter reading system.
  478. Yuval Gideon A. (Mercer Island WA) Ernst Michael (Redmond WA), Method and system for controlling unauthorized access to information distributed to users.
  479. Goodman,Daniel I; Leib,David, Method and system for controlling use of a dynamically linked software library.
  480. Rubin, Moshe; Schreiber, Daniel, Method and system for copy protection of displayed data content.
  481. Rubin,Moshe; Schreiber,Daniel, Method and system for copy protection of displayed data content.
  482. Rubin, Moshe B.; Halibard, Moishe, Method and system for copy protection of images displayed on a computer monitor.
  483. Rubin,Moshe; Goldman,Andrew; Schreiber,Daniel A., Method and system for copyright protection of digital images.
  484. Schreiber Daniel,ILX ; Goldman Andrew,ILX, Method and system for copyright protection of digital images transmitted over networks.
  485. Khosravi, Hassan; Muslukhov, Ildar; Luong, Peter, Method and system for decoupling user authentication and data encryption on mobile devices.
  486. Ramachandra Rao, Ravi Honnavalli; Chokkanahalli, Vishnuteja; Gaonkar, Ajay Maruti, Method and system for digital rights management of encrypted digital content.
  487. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  488. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  489. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  490. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  491. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  492. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  493. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  494. Armstrong,William Craig, Method and system for enabling the single use of digital cameras.
  495. Carcia,Peter P., Method and system for enabling the use of single use reloadable digital camera.
  496. Yuan Chuan K. ; Hao Feng Q., Method and system for establishing a cryptographic key agreement using linear protocols.
  497. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  498. Reed, Sonia; Aabye, Christian, Method and system for facilitating data access and management on a secure token.
  499. Levy, Philippe; Hammad, Ayman; Simcox, Virginia I.; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  500. Levy, Philippe; Hammad, Ayman; Simcox, Virginia; Sloan, Jerry; Gorden, Mary, Method and system for facilitating memory and application management on a secured token.
  501. Levy,Philippe; Hammad,Ayman; Simcox,Virginia I.; Sloan,Jerry; Gorden,Mary, Method and system for facilitating memory and application management on a secured token.
  502. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Method and system for implementing zone-restricted behavior of a computing device.
  503. Meyer, Peter Ronald, Method and system for improving wireless data packet delivery.
  504. DeMello, Marco A.; Yaacovi, Yoram; Zeman, Pavel, Method and system for limiting the use of user-specific software features.
  505. DeMello,Marco A.; Yaacovi,Yoram; Zeman,Pavel; Hughes,Kathryn E.; Byrum,Frank D., Method and system for limiting the use of user-specific software features.
  506. Kanda Masayuki,JPX ; Yamanaka Kiyoshi,JPX ; Takashima Youichi,JPX, Method and system for message delivery utilizing zero knowledge interactive proof protocol.
  507. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  508. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  509. Dwork Cynthia ; Halpern Joseph Y. ; Lotspiech Jeffrey Bruce, Method and system for protection of digital information.
  510. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  511. Goodman, Daniel I., Method and system for real-time control of document printing.
  512. Goodman, Daniel I., Method and system for real-time control of document printing.
  513. Bleumer,Gerrit; Heinrich,Glemens, Method and system for real-time registration of transactions with a security module.
  514. Hughes, James P., Method and system for secure information handling.
  515. DiSanto, Frank J.; Krusos, Denis A., Method and system for securely exchanging encryption key determination information.
  516. DiSanto, Frank J.; Krusos, Denis A., Method and system for securely exchanging encryption key determination information.
  517. DiSanto,Frank J.; Krusos,Denis A., Method and system for securely exchanging encryption key determination information.
  518. DiSanto,Frank J.; Krusos,Denis A., Method and system for selecting encryption keys from a plurality of encryption keys.
  519. Lao, Guillermo, Method and system for subscription digital rights management.
  520. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  521. Barakat Simon (Andresy FRX), Method and system for suthenticating electronic memory cards.
  522. Smithies Christopher P. K.,GBX ; Newman Jeremy M.,GBX ; Wright Benjamin, Method and system for transcribing electronic affirmations.
  523. Hashem,Tony; Quinn,Keri; Parmar,Ashwin, Method and system for transferring files using file transfer protocol.
  524. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  525. Tresser, Charles Philippe; Gambaudo, Jean-Marc, Method and system using renormalized pixels for public key and compressed images watermarks on prints.
  526. DeMello,Marco A.; Narin,Attila; Yaacovi,Yoram, Method for authenticating and securing integrated bookstore entries.
  527. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Method for authorizing a substitute software license server.
  528. Zolotorev, Oleg Anatolivich; Kuznetsov, Ivan Vladimirovich; Moshokin, Andrey Gennadievich; Smirnov, Alexandr Leonidovich; Khamitov, Ildar Magafurovich, Method for carrying out transactions and device for realizing the same.
  529. Isaak, James DeWitt, Method for certifying the authenticity of digital objects by an authentication authority and for certifying their compliance by a testing authority.
  530. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  531. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  532. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  533. Angelo Michael F., Method for controlling access to a computer system by utilizing an external device containing a hash value representati.
  534. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  535. Rosenau, Dirk; Schlaaff, Torsten, Method for determining a requirement to replace a component part and arrangement for the implementation of the method.
  536. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  537. Jackson, Mark D., Method for developing gaming programs compatible with a computerized gaming operating system and apparatus.
  538. R��ver,Stefan; Groffman,Hans Dieter, Method for digital signing of a message.
  539. Brokenshire,Daniel Alan; Peyravian,Mohammad, Method for efficient generation of modulo inverse for public key cryptosystems.
  540. Van Oorschot Paul C. (Ottawa CAX) Ford Warwick S. (Nepean CAX) Hillier Stephen W. (Ottawa CAX) Otway Josanne (Ottawa CAX), Method for efficient management of certificate revocation lists and update information.
  541. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  542. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing connection between devices.
  543. Larson, Victor; Short, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing encrypted channel.
  544. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Method for establishing secure communication link between computers of virtual private network.
  545. Harley,Robert Joseph; Mestre,Jean Francois, Method for generating secure elliptic curves using an arithmetic-geometric mean iteration.
  546. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  547. Eastlake ; 3rd Donald E. (Carlisle MA), Method for improving the processing and storage performance of digital signature schemes.
  548. Stefik, Mark J.; Pirolli, Peter L. T., Method for loaning digital works.
  549. Zolotorev,Oleg Anatolievich; Kuznetsov,Ivan Vladimirovich; Moshonkin,Andrei Gennadievich; Smirnov,Alexandr Leonidovich; Khamitov,Ildar Magafurovich, Method for making a blind RSA-signature and apparatus therefor.
  550. Pauschinger Dieter,DEX, Method for operating a digitally printing postage meter to generate and check a security imprint.
  551. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  552. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  553. Wasilewski, Anthony J.; Pinder, Howard G., Method for partially encrypting program data.
  554. Puhl Larry C. (Sleepy Hollow IL) Finkelstein Louis D. (Wheeling IL) Dabbish Ezzat A. (Cary IL), Method for providing blind access to an encryption key.
  555. Algesheimer,Joy; Camenisch,Jan; Shoup,Victor, Method for reducing a value modulo a shared secret.
  556. Barkan Mordhay,ILX, Method for safe communications.
  557. Angelo Michael F. ; Collins David L. ; Kim Donald D. ; Jansen Kenneth A., Method for securely communicating remote control commands in a computer network.
  558. Angelo, Michael F.; Michels, Peter J., Method for securely creating, storing and using encryption keys in a computer system.
  559. Endrys, Bretislav, Method for securing authorized data entry and the device to perform this method.
  560. Büttiker, Daniel, Method for securing data relating to users of a public-key infrastructure.
  561. Stambler Leon, Method for securing information relevant to a transaction.
  562. Stambler Leon, Method for securing information relevant to a transaction.
  563. Stambler Leon, Method for securing information relevant to a transaction.
  564. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  565. Edwards, John, Method for the provision of a network service.
  566. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  567. Richard Patrick,CAX ; Csinger Andrew,CAX ; Knipe Bruce,CAX ; Woodward Bruce,CAX, Method of and apparatus for providing secure distributed directory services and public key infrastructure.
  568. Russo, Anthony P.; Hattery, Larry E.; Krishnapura, Rohini; Chan, Philip Yiu Kwong, Method of and system for enrolling and matching biometric data.
  569. Reiter Robert W. ; Solinas Jerome A., Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form.
  570. Solinas,Jerome A., Method of elliptic curve digital signature using coefficient splitting.
  571. Solinas,Jerome A., Method of elliptic curve digital signature using expansion in joint sparse form.
  572. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  573. Stedron, Robert Allen; Chmielewski, John L., Method of encrypting and transmitting data and system for transmitting encrypted data.
  574. Di Giusto, Sandro; Montessoro, Pier Luca; Pierattoni, Davide, Method to search for affinities between subjects and relative apparatus.
  575. Geoffroy, David J.; Buxton, Jeffrey J., Methods and apparatus for acquiring a swiped fingerprint image.
  576. Schreiber Daniel,ILX ; Guedaliah David,ILX, Methods and apparatus for preventing reuse of text, images and software transmitted via networks.
  577. Albrecht, Mark; Wildgrube, Frank, Methods and apparatus for preventing unauthorized write access to a protected non-volatile storage.
  578. Pinder, Howard G.; Woodward, Jr., William D.; Evans, Jonathan Bradford; Wasilewski, Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  579. Pinder,Howard G.; Woodward, Jr.,William D.; Evans,Jonathan Bradford; Wasilewski,Anthony J., Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system.
  580. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  581. Partelow, Michael; Farimani, Mehran; Fulton, Truxton, Methods and apparatus for secure document printing.
  582. Partelow,Mike; Fulton,Truxton; Faramani,Mehran, Methods and apparatus for secure document printing.
  583. Moses Liskov ; Robert Silverman ; Ari Juels, Methods and apparatus for verifying the cryptographic security of a selected private and public key pair without knowing the private key.
  584. Erhart, Richard Alexander; Wickboldt, Paul, Methods and devices for capacitive image sensing.
  585. Johnson, Alan E., Methods and systems for IC card application loading.
  586. Russo, Anthony P., Methods and systems for enrolling biometric data.
  587. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  588. Adleman, Leonard M., Methods and systems for using deep-strings in computation and communication.
  589. Benaloh, Josh D.; Rosen, Andrew D.; Yuval, Gideon A., Methods and systems of protecting digital content.
  590. Benaloh,Josh D.; Rosen,Andrew D.; Yuval,Gideon A., Methods and systems of protecting digital content.
  591. Shear, Victor H.; Van Wie, David M.; Weber, Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  592. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  593. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  594. Asokan, Nadarajah; Ekberg, Jan-Erik; Kiiveri, Antti; Muukka, Olli, Methods, apparatuses, and computer program products for bootstrapping device and user authentication.
  595. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  596. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  597. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  598. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  599. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  600. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  601. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  602. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  603. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  604. Jakobsson, Bjorn Markus, Minimalistic electronic commerce system.
  605. Hoffberg, Steven M., Mobile communication device.
  606. Hoffberg, Steven M., Mobile communication device for delivering targeted advertisements.
  607. Hoffberg, Steven M; Hoffberg-Borghesani, Linda I, Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system.
  608. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  609. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  610. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  611. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  612. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  613. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  614. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  615. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  616. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  617. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  618. Ganesan Ramanan V. ; Rao Vijay, Modem compatible method and apparatus for encrypting data that is transparent to software applications.
  619. Bauer,Sven, Modular inversion that is protected against espionage.
  620. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.
  621. Everett David Barrington,GBX ; Miller Stuart James,GBX ; Peacham Anthony David,GBX ; Simmons Ian Stephen,GBX ; Richards Timothy Philip,GBX ; Viner John Charles,GBX, Multi-application IC card with delegation feature.
  622. Roth, Gregory Branchek; Dokey, Aaron Douglas, Multi-party computation services.
  623. Wolf, Bryan, Multi-party encryption systems and methods.
  624. Anshel Michael M. (New York NY) Goldfeld Dorian (Tenafly NJ), Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions.
  625. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  626. Hoffberg, Steven M., Multifactorial optimization system and method.
  627. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  628. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  629. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  630. Katz Ronald A., Multiple format telephonic interface control system.
  631. Stedron, Robert Allen, Multiple level security system and method for encrypting data within documents.
  632. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  633. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  634. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  635. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  636. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  637. Moskowitz,Scott A., Multiple transform utilization and applications for secure digital watermarking.
  638. Erfani, Shervin; Ren, Jian, Multiple-use smart card with security features and method.
  639. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Multiprime RSA public key cryptosystem.
  640. Borleske,Andrew J., Multipurpose interface for an automated meter reading device.
  641. Ding,Jintai, Multivariable cryptosystem.
  642. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  643. Etchegoyen, Craig S.; Harjanto, Dono; Burdick, Sean D., Near field authentication through communication of enclosed content sound waves.
  644. Edwards, John, Network communications.
  645. Bodnar Eric O., Network computer system with remote user data encipher methodology.
  646. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  647. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  648. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  649. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  650. Reardon David C., Network security system allowing access and modification to a security subsystem after initial installation when a master token is in place.
  651. Carpenter,Richard Christopher; Kelley,Raymond; Scoggins,Sean Michael; Ardalan,Sasan, Network-enabled, extensible metering system.
  652. Carpenter,Richard Christopher; Kelley,Raymond; Scoggins,Sean Michael; Ardalan,Sasan, Network-enabled, extensible metering system.
  653. Blumberg, Manfred; Dirrichs, Stefan; London, Wolfgang; Töpfer, Gary, Neutral data computer control system for a machine tool used to produce workpieces with a threaded surface and associated machine tool.
  654. Fiske,Michael, Non-autonomous dynamical orbit cryptography.
  655. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  656. Hopkins,W. Dale, On-line PIN verification using polynomials.
  657. Ronning Joel A., On-line try before you buy software distribution system.
  658. Campbell, Steven M., On-the-fly encryption on a gaming machine.
  659. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  660. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  661. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  662. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  663. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  664. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  665. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  666. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  667. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  668. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  669. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  670. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  671. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  672. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  673. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  674. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  675. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  676. Borleske, Andrew J.; Shuey, Kenneth C.; Mason, Jr., Robert T.; Uy, David V., Optimized data collection in a wireless fixed network metering system.
  677. Alkove, James M.; Strom, Clifford P.; Cutter, Jr., Benjamin B.; Evans, Brian P., Output protection levels.
  678. Richeson, Keith D.; Uy, David; Borleske, Andrew J.; Brian, Brent R.; Mason, Jr., Robert T.; Hemminger, Rodney C.; Christopher, Russell G.; Kelley, Raymond, Over the air microcontroller flash memory updates.
  679. Erhart, Richard Alexander; Nelson, Richard Brian, Packaging for fingerprint sensors and methods of manufacture.
  680. Pinder,Howard; Evans,Jonathan Bradford; Wasilewski,Anthony J.; Woodward, Jr.,William D., Partial dual encrypted stream utilizing program map tables.
  681. Pinder, Howard G.; Evans, Jonathan Bradford; Wasilewski, Anthony J.; Woodward, Jr., William D., Partial dual-encryption using program map tables.
  682. Martinek, Michael G.; Jackson, Mark D.; Downs, III, Justin G., Pass-through live validation device and method.
  683. Shaik, Cheman, Password self encryption method and system and encryption by keys generated from personal secret information.
  684. Shaik, Cheman, Password self encryption method and system and encryption by keys generated from personal secret information.
  685. Shaik, Cheman, Password self encryption method and system and encryption by keys generated from personal secret information.
  686. Chen, Liqun; Majumdar, Saugat, Password-based cryptographic method and apparatus.
  687. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  688. Rowe, Richard E.; Moser, Timothy W.; Schaefer, Craig Michael; Iddings, Cara; Nelson, Dwayne R., Pluggable modular gaming modifiers and configuration templates for gaming environments.
  689. Moussa Mohamed A. ; Chan Chih S., Plurality-factor security system.
  690. Wilson William J. (1239 Blevins Gap Rd. Huntsville AL 35802), Polygraphic encryption-decryption communications system.
  691. Dreifus Henry N. (Narberth PA), Portable electronic transaction device and system therefor.
  692. Brookner George, Postal security device incorporating periodic and automatic self implementation of public/private key pair.
  693. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Posture assessment in a secure execution environment.
  694. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Posture assessment in a secure execution environment.
  695. Lenard, Rohan; Orbach, Julian J.; Smyrk, Martin, Predictive software license balancing.
  696. Kocher, Paul C.; Jaffe, Joshua M.; Jun, Benjamin C., Prevention of side channel attacks against block cipher implementations and other cryptographic systems.
  697. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  698. Belenky, Yaacov; Levy, Yaakov (Jordan), Private key compression.
  699. Brennan J. J. (Rochester MI) Geist Bruce K. (Clinton Township ; Macomb County MI) Van Eeuwen Jeffrey A. (Waterford MI), Process for cryptographic key generation and safekeeping.
  700. Röver, Stefan; Groffman, Hans-Dieter, Process for digital signing of a message.
  701. Cockerille, Warner; LeMay, Steven G.; Breckner, Robert, Process verification.
  702. Zurko, Mary Ellen; Casey, Jr., Thomas Andrew; Gasser, Morrie; Hall, Judith Shelhorse; Kahn, Clifford Earl; Mason, Andrew Halstead; Sawyer, Paul Douglas; Kendall, Leslie Richard; Lipner, Steven B., Processing trusted commands in trusted and untrusted environments.
  703. Walter Paul Alan ; McGrogan ; Jr. Ellwood Patrick ; Kleidermacher Mike, Programmable telecommunications security module for key encryption adaptable for tokenless use.
  704. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  705. Yanovsky Eli (Haifa ILX), Protected communication method and system.
  706. Barde, Sumedh N.; Schwartz, Jonathan D.; Kuhn, Reid Joseph; Grigorovitch, Alexandre Vicktorovich; Debique, Kirt A.; Knowlton, Chadd B.; Alkove, James M.; Dunbar, Geoffrey T.; Grier, Michael J.; Ma, Ming; Upadhyay, Chaitanya D.; Sherwani, Adil Ahmed; Kishan, Arun Upadhyaya, Protected computing environment.
  707. Bockes, Markus; Drexler, Hermann; Kahl, Helmut, Protected cryptographic calculation.
  708. Grigorovitch, Alexandre; Knowlton, Chadd; Debique, Kirt; Alkove, James; Dunbar, Geoffrey T.; Barde, Sumedh N., Protected media pipeline.
  709. Roy, Jarrod A.; Koushanfar, Farinaz; Markov, Igor L., Protecting hardware circuit design by secret sharing.
  710. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  711. Micali Silvio (Cambridge MA) Schnorr Claus (Bad Nauheim DEX), Pseudo-random sequence generator.
  712. Oishi,Kazuomi, Public key certification issuing apparatus.
  713. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Public key cryptographic apparatus and method.
  714. Lipson, Jesse, Public key cryptographic methods and systems.
  715. Lipson, Jesse D., Public key cryptographic methods and systems.
  716. Slavin Keith R., Public key cryptographic system having differential security levels.
  717. Slavin Keith R., Public key cryptographic system having nested security levels.
  718. Slavin,Keith R, Public key cryptography using matrices.
  719. Slavin,Keith R, Public key cryptography using matrices.
  720. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Public key cryptosystem method and apparatus.
  721. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  722. Baltzley Cliff A., Public key cryptosystem with roaming user capability.
  723. Austin Jeffrey R. (Hindhead GB2), Public key diversification method.
  724. Fischer Addison M. (60 14th Ave. S. Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  725. Fischer Addison M. (60 14th Ave. South Naples FL 33942), Public key/signature cryptosystem with enhanced digital signature certification.
  726. Shimada Michio (Tokyo JPX), Public-key cryptographic apparatus handling ciphertext by public-key.
  727. Lu, Yang; Sun, Xiangzheng; Qiao, Nan, RSA algorithm acceleration processors, methods, systems, and instructions.
  728. Fiat Amos (Tel Aviv ILX), RSA computation method for efficient batch processing.
  729. Niedermeyer, Brian Joseph; Niedermeyer, Terrence Patrick, Radio frequency identification communication and applications thereof.
  730. Shuey,Kenneth C., Reducing power consumption of electrical meters.
  731. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  732. Ardalan,Sasan H.; Van den Bout,David E., Remote access to electronic meters using a TCP/IP protocol suite.
  733. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  734. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  735. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  736. Kipnis, Shlomo; Meir, Rannen, Remote administration of smart cards for secure access systems.
  737. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  738. Long, Joseph D.; Carapelli, Giovanni, Remote display tamper detection using data integrity operations.
  739. Walker, William T.; Serkowski, Robert J., Remote feature activation authentication file system.
  740. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  741. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  742. Walker, William T.; Lieou, Bruce G.; Lourenco, Mary K.; Serkowski, Robert J.; Levy, Leslie, Remote feature activator feature extraction.
  743. Hopkins W. Dale, Remote financial transaction system.
  744. Eliyahou Harari ; Daniel C. Guterman ; Robert F. Wallace, Removable mother/daughter peripheral card.
  745. Harari Eliyahou ; Guterman Daniel C. ; Wallace Robert F., Removable mother/daughter peripheral card.
  746. Harari, Eliyahou; Guterman, Daniel C.; Wallace, Robert F., Removable mother/daughter peripheral card.
  747. Harari, Eliyahou; Guterman, Daniel C.; Wallace, Robert F., Removable mother/daughter peripheral card.
  748. Harari,Eliyahou; Guterman,Daniel C.; Wallace,Robert F., Removable mother/daughter peripheral card.
  749. Akins ; III Glendon L. ; Banker Robert O. ; Palgon Michael S. ; Pinder Howard G. ; Wasilewski Anthony J., Representing entitlements to service in a conditional access system.
  750. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Representing entitlements to service in a conditional access system.
  751. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  752. Hendricks, John S., Resizing document pages to fit available hardware screens.
  753. Hoffstein Jeffrey ; Pipher Jill ; Silverman Joseph H., Ring-based public key cryptosystem method.
  754. Cabos, Ralf, SMS communication to and from messaging devices in an aircraft.
  755. Watts, Christian M., Scalable and flexible internet fax architecture.
  756. Moshier, Michael Andrew; Furlong, Jeff, Scalable, faster method and apparatus for montgomery multiplication.
  757. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  758. Tsuyoshi Takagi JP; Shozo Naito JP, Scheme for fast realization of encrytion, decryption and authentication.
  759. Magliveras Spyros S. ; Tran Van Trung,DEX ; Horvath Tamas,DEX, Secret key cryptosystem and method utilizing factorizations of permutation groups of arbitrary order 2.sup.l.
  760. Cabos, Ralf, Secure aircraft data channel communication for aircraft operations.
  761. Prashanth, Devi, Secure approach to send data from one system to another.
  762. Prashanth,Devi, Secure approach to send data from one system to another.
  763. Jain, Amit; Evans, Brian P.; Strom, Clifford P.; Cutter, Jr., Benjamin B., Secure clock with grace periods.
  764. Chang,Chung Nan, Secure cryptographic key exchange and verifiable digital signature.
  765. Dezonno, Tony, Secure customer communication method and system.
  766. Best,Robert M., Secure distribution of portable game software.
  767. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  768. Rao, Santhpur N.; Trapa, Valerie, Secure download manager.
  769. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  770. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  771. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  772. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Secure execution environment services.
  773. Best,Robert M., Secure execution of downloaded software.
  774. Gilman, Robert R.; Robinson, Richard L.; Serkowski, Robert J., Secure installation activation.
  775. Angelo Michael F., Secure method for enabling/disabling power to a computer system following two-piece user verification.
  776. Kocher Paul C. ; Jaffe Joshua M., Secure modular exponentiation with leak minimization for smartcards and other cryptosystems.
  777. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  778. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephens; Richards, Timothy Philip; Viner, John Charles, Secure multi-application IC card system having selective loading and deleting capability.
  779. Everett,David Barrington; Miller,Stuart James; Peacham,Anthony David; Simmons,Ian Stephen; Richards,Timothy Philip; Viner,John Charles, Secure multiple application card system and process.
  780. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  781. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  782. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  783. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  784. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  785. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  786. Schwartz, Robert G.; Brookner, George M.; Eskandari, Fetneh; Brown, Michael A.; Mechler, David H.; Gardner, Gary A.; Gardner, legal representative, Gaye D.; Heroy, Douglas T., Secure postage payment system and method.
  787. Schwartz,Robert G.; Brookner,George M.; Eskandari,Fetneh; Brown,Michael A.; Mechler,David H.; Gardner, legal representative,Gaye D.; Heroy,Douglas T.; Gardner, deceased,Gary A., Secure postage payment system and method.
  788. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  789. Manferdelli, John L.; Marr, Michael David; Krishnaswamy, Vinay; Jakubowski, Mariusz H., Secure repository with layers of tamper resistance and system and method for providing same.
  790. Paul F. Alexander, Secure satellite communications system.
  791. Chen Tsuhan, Secure telecommunications data transmission.
  792. Eldridge, Margery A.; Flynn, Michael J.; Jones, Christopher M.; Merkle, Ralph C.; Lamming, Michael G.; Pendlebury, David L.; Stringer, Mark; Kleyn, Michiel F. E., Secure token-based document server.
  793. Margery A. Eldridge GB; Michael J. Flynn GB; Christopher M. Jones GB; Ralph C. Merkle ; Michael G. Lamming GB; David L. Pendlebury GB; Mark Stringer GB; Michiel F. E. Kleyn GB, Secure token-based document server.
  794. Angelo Michael F. ; Olarig Sompong P., Secure two-piece user authentication in a computer network.
  795. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  796. Cordery Robert A. ; Lee David K. ; Pintsov Leon A. ; Ryan ; Jr. Frederick W. ; Weiant ; Jr. Monroe A., Secure user certification for electronic commerce employing value metering system.
  797. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  798. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  799. Cordery, Robert A.; Lee, David K.; Pintsov, Leon A.; Ryan, Jr., Frederick W.; Weiant, Jr., Monroe A., Secure user certification for electronic commerce employing value metering system.
  800. Cordery,Robert A.; Lee,David K.; Pintsov,Leon A.; Ryan, Jr.,Frederick W.; Weiant, Jr.,Monroe A., Secure user certification for electronic commerce employing value metering system.
  801. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  802. Bikel, Daniel Martin; Sorensen, Jeffrey Scott, Securely classifying data.
  803. Michael F. Angelo, Securely generating a computer system password by utilizing an external encryption algorithm.
  804. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  805. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service control on third party hardware.
  806. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service control on third party hardware.
  807. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service layer on third party hardware.
  808. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Securing service layer on third party hardware.
  809. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  810. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  811. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  812. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  813. Gentles, Thomas A.; Loose, Timothy C.; Rothschild, Wayne H., Security of gaming software.
  814. Gentles,Thomas A.; Loose,Timothy C.; Rothschild,Wayne H., Security of gaming software.
  815. Nunally, Patrick O'Neal; Bostenero, Kevin, Security system, method, and apparatus.
  816. Rosen, Sholom S., Security systems and methods applicable to an electronic monetary system.
  817. Griffith John B. (Plantation FL) Linton Donald F. (Pompano Beach FL), Security transaction system for financial data.
  818. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  819. Ronning Joel A., Self-launching encrypted digital information distribution system.
  820. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  821. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  822. Califano, Andrea; Kaufman, Stephen Carl; Martens, Marco; Pulleyblank, William Robert; Stolovitzky, Gustavo Alejandro; Tresser, Charles Philippe; Wu, Chai Wah, Semiotic system and method with privacy protection.
  823. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  824. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  825. DeMello,Marco A.; Narin,Attila; Madonna,Christopher Robert Richard, Server controlled branding of client software deployed over computer networks.
  826. DeMello,Marco A.; Zeman,Pavel; Krishnaswamy,Vinay; Byrum,Frank D., Server for an electronic distribution system and method of operating same.
  827. Serbetciouglu Bekir ; Ozulkulu Esref ; Bagoren Ilhan, Short message transaction handling system.
  828. Harvey, John Christopher; Cuddihy, James William, Signal processing apparatus and methods.
  829. Osawa, Yoshitomo; Sako, Yoichiro; Kurihara, Akira; Kawashima, Isao, Signal recording apparatus, signal record medium and signal reproducing apparatus.
  830. Chang Chung Nan, Simiplified secure swift cryptographic key exchange.
  831. Matias, Yossi; Mayer, Alain Jules; Silberschatz, Abraham, Simplified secure shared key establishment and data delivery protocols for electronic commerce.
  832. Chang,Chung Nan, Simplified secure, swift cryptographic key exchange.
  833. Micali Silvio, Simultaneous electronic transactions.
  834. Micali Silvio, Simultaneous electronic transactions with subscriber verification.
  835. Micali Silvio, Simultaneous electronic transactions with visible trusted parties.
  836. Micali Silvio (459 Chesnut Hill Ave. Brookline MA 02146), Simultaneous electronic transactions with visible trusted parties.
  837. Gardner, Lawrence C., Smart card system with ergonomic fingerprint sensor and method of using.
  838. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  839. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  840. Takahashi Toshinari,JPX ; Nogami Hiroyasu,JPX, Software distribution system and software utilization scheme for improving security and user convenience.
  841. Akiyama, Ryota; Yoshioka, Makoto, Software encoding using a combination of two types of encoding and encoding type identification information.
  842. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  843. Horning,James J.; Sibert,W. Olin; Tarjan,Robert E.; Maheshwari,Umesh; Horne,William G.; Wright,Andrew K.; Matheson,Lesley R.; Owicki,Susan K., Software self-defense systems and methods.
  844. Akins, III, Glendon L.; Banker, Robert O.; Palgon, Michael S.; Pinder, Howard G.; Wasilewski, Anthony J., Source authentication of download information in a conditional access system.
  845. Manchester, E. Barton; Yearwood, Bradley N., State machine based universal voice grade cards.
  846. Rhoads, Geoffrey B., Steganographic decoding with transform to spatial domain.
  847. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  848. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  849. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  850. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  851. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  852. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  853. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  854. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  855. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  856. Van Wie, David M.; Weber, Robert P., Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels.
  857. Vanstone Scott A.,CAX ; Menezes Alfred John ; Qu Minghua,CAX, Strengthened public key protocol.
  858. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua, Strengthened public key protocol.
  859. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  860. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  861. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  862. Vanstone, Scott A.; Menezes, Alfred John; Qu, Minghua; Johnson, Donald B., Strengthened public key protocol.
  863. Wickboldt, Paul; Jones, Eric, Structures and manufacturing methods for glass covered electronic devices.
  864. Appenzeller, Guido; Spies, Terence, Subscription management service for secure messaging system.
  865. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  866. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  867. Shuey,Kenneth C., Switch to bypass optical diode for reducing power consumption of electrical meters.
  868. Mital Amit, System and apparatus for monitoring secure information in a computer network.
  869. Larson, Victor; Short, III, Robert Dunham; Munger, Edmond Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  870. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  871. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  872. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  873. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method employing an agile network protocol for secure communications using secure domain names.
  874. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  875. Wolf, Bryan D., System and method enabling parallel processing of hash functions using authentication checkpoint hashes.
  876. Bisbee, Stephen F.; Moskowitz, Jack J.; Becker, Keith F.; Hilton, Walter J.; Szebenyi, Joshua, System and method for a remote access service enabling trust and interoperability when retrieving certificate status from multiple certification authority reporting components.
  877. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for access field verification.
  878. DeMello, Marco A.; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  879. DeMello, Marco; Krishnaswamy, Vinay; Manferdelli, John L., System and method for accessing protected content in a rights-management architecture.
  880. DeMello,Marco A.; Krishnaswamy,Vinay; Manferdelli,John L., System and method for accessing protected content in a rights-management architecture.
  881. DeMello,Marco A.; Narin,Attila; Setty,Venkateshaiah; Zeman,Pavel; Krishnaswamy,Vinay; Manferdelli,John L.; Byrum,Frank D.; Keely,Leroy Bertrand; Yaacovi,Yoram; Alger,Jeffrey A., System and method for activating a rendering device in a multi-level rights-management architecture.
  882. Musgrave Clyde ; Dulude Robert S., System and method for authenticating electronic transactions using biometric certificates.
  883. Scoggins, Sean M.; Christopher, Russell G.; Garianov, Alexei; Rudran, Dileep, System and method for automated configuration of meters.
  884. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  885. DeMello, Marco A.; Narin, Attila; Setty, Venkateshaiah, System and method for client interaction in a multi-level rights-management architecture.
  886. Schwartz,Robert G.; Brookner,George M.; Eskandari,Fetneh; Brown,Michael A.; Mechler,David H.; Gardner, legal representative,Gaye D.; Heroy,Douglas T.; Gardner, deceased,Gary A., System and method for conducting a financial transaction between a sender and recipient of a mail piece.
  887. Morris, Martin, System and method for connecting bluetooth-enabled devices to a personal computer.
  888. Morris, Martin, System and method for connecting bluetooth-enabled devices to a personal computer.
  889. Morris,Martin, System and method for connecting bluetooth-enabled devices to a personal computer.
  890. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  891. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  892. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  893. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  894. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  895. Saunders, Michael W.; Carlson, Rolf E.; Miller, William D., System and method for connecting gaming devices to a network for remote play.
  896. Saunders, Michael W; Carlson, Rolf E; Miller, William D, System and method for connecting gaming devices to a network for remote play.
  897. Rosen Sholom S., System and method for connecting money modules.
  898. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for controlling access to a user secret.
  899. Carman David W. ; Balenson David M. ; Tajalli Homayoon ; Walker Stephen T., System and method for controlling access to a user secret using a key recovery field.
  900. Markakis, Dimitrios; Hochfield, Barry; Beric, John; Roberts, David Anthony, System and method for controlling access to computer code in an IC card.
  901. Christopher,Russell G.; Kelley,Raymond; Rudran,Dileep; Nemecz,Susane K., System and method for creating multiple operating territories within a meter reading system.
  902. Barton, Edward M.; Mizrah, Len L., System and method for cryptographic key exchange using matrices.
  903. Volpert, Jr.,Thomas R., System and method for data encryption.
  904. Lipner Steven B. ; Balenson David M. ; Ellison Carl M. ; Walker Stephen T., System and method for data recovery.
  905. Hoffberg, Steven M., System and method for determining contingent relevance.
  906. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  907. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  908. Borleske,Andrew J.; Scoggins,Sean M.; Uy,David, System and method for efficient configuration in a fixed network automated meter reading system.
  909. Lowry, Troy William; Wang, Hao; Sulzer, Carl Richard, System and method for electronic test delivery.
  910. Bisbee Stephen F. ; Moskowitz Jack J. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission storage and retrieval of authenticated documents.
  911. Bisbee Stephen F. ; Moskowitz Jack J. ; Sheehan Edward R. ; Trotter Douglas H. ; White Michael W., System and method for electronic transmission, storage and retrieval of authenticated documents.
  912. Bisbee,Stephen F.; Moskowitz,Jack J.; Becker,Keith F.; Peterson,Ellis K., System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents.
  913. Garrison, Greg B., System and method for encrypting data messages.
  914. Turk, Doughan, System and method for encrypting traffic on a network.
  915. Benson, Glenn, System and method for end to end encryption.
  916. Stefik, Mark J.; Pirolli, Peter L. T., System and method for enforcing usage rights associated with digital content.
  917. Watson,Scott, System and method for enhanced broadcasting and interactive.
  918. Watson, Scott, System and method for enhanced broadcasting and interactive television.
  919. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing a communication link.
  920. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for establishing an encrypted communication link based on IP address lookup requests.
  921. Morris,Martin, System and method for establishing word synchronization.
  922. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, System and method for flexibly loading an IC card.
  923. David Barrington Everett GB; Stuart James Miller GB; Anthony David Peacham GB; Ian Stephen Simmons GB; Timothy Philip Richards GB; John Charles Viner GB, System and method for flexibly loading in IC card.
  924. Lotspiech, Jeffrey B., System and method for guaranteeing software integrity via combined hardware and software authentication.
  925. Lotspiech, Jeffrey B., System and method for guaranteeing software integrity via combined hardware and software authentication.
  926. Lotspiech,Jeffrey Bruce, System and method for guaranteeing software integrity via combined hardware and software authentication.
  927. Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
  928. Satyan, Pallavi, System and method for improved scanning of fingerprint edges.
  929. Brian,Brent R.; Borleske,Andrew J.; Mason, Jr.,Robert T., System and method for improved transmission of meter data.
  930. Shribman, Derry; Vilenski, Ofer, System and method for improving internet communication by using intermediate nodes.
  931. Shribman, Derry; Vilenski, Ofer, System and method for improving internet communication by using intermediate nodes.
  932. Hoffberg, Steven M., System and method for incentivizing participation in a market transaction.
  933. Manferdelli,John L.; Marr,Michael David; Krishnaswamy,Vinay; Jakubowski,Mariusz H., System and method for interfacing a software process to secure repositories.
  934. Sharif,Imran; Kadir,Noor A; Ivey,Glen Edward; Waseq,Noman; Knapp,William; Bremsteller,John, System and method for internet appliance data entry and navigation.
  935. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  936. Barton, Edward M.; Mizrah, Len L., System and method for mutually authenticated cryptographic key exchange using matrices.
  937. Fowler,Stephan; Rodgers,James; Green,Colin, System and method for network operation.
  938. Scott, Kelly W., System and method for network-based project management.
  939. Everhart, Glenn C., System and method for preventing identity theft or misuse by restricting access.
  940. Nagel,Robert H., System and method for production and authentication of original documents.
  941. Nagel,Robert H., System and method for production and authentication of original documents.
  942. Kurz, Brian E., System and method for protecting train event data.
  943. Hoffberg, Steven M., System and method for providing a payment to a non-winning auction participant.
  944. Bowers, Theodore J; Ilijasic, Dean; Sanders, Shelley F., System and method for providing discriminated content to network users.
  945. Sanders, Shelley F.; Bowers, Theodore; Ilijasic, Dean, System and method for providing incentives to consumers to share information.
  946. Raji, Alexander David, System and method for providing secure sharing of electronic data.
  947. Fei, Huchen; Yang, Dong; Hong, Xiao, System and method for rapid updating of credit information.
  948. Binder, Yehuda, System and method for routing-based internet security.
  949. Binder, Yehuda, System and method for routing-based internet security.
  950. Binder, Yehuda, System and method for routing-based internet security.
  951. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  952. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  953. Morris,Martin; Senyei,Andrew; Calcagno,Jeff, System and method for secure biometric identification.
  954. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  955. Felsher, David P.; Nagel, Robert H.; Hoffberg, Steven M., System and method for secure three-party communications.
  956. Nagel,Robert H.; Felsher,David P.; Hoffberg,Steven M., System and method for secure three-party communications.
  957. Etchegoyen, Craig Stephen, System and method for securing an electronic communication.
  958. Robertson, Philip A.; Williams, Rodger K.; Weston, Timothy M., System and method for selective encryption of input data during a retail transaction.
  959. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  960. Miller, Lawrence R; Trenholm, Martin J., System and method for single session sign-on.
  961. Ellmore, Kimberly, System and method for single sign on process for websites with multiple applications and services.
  962. Rosen Sholom S., System and method for updating security information in a time-based electronic monetary system.
  963. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, System and method for using a registered name to connect network devices with a link that uses encryption.
  964. Sharif,Imran; Husain,Shabbir Syed; Chakraborty,Pijush, System and method for using an internet appliance to send/receive digital content files as E-mail attachments.
  965. Russo, Anthony P, System and method of image reconstruction with dual line scanner using line counts.
  966. Kapur, Shashi; Bianco, Ralph A., System and method of processing PIN-based payment transactions via mobile devices.
  967. Kumar,Navaneet; Kelley,Raymond; Rudran,Dileep; Scoggins,Sean M., System and method of providing a geographic view of nodes in a wireless network.
  968. Scoggins,Sean M., System and method of visualizing network layout and performance characteristics in a wireless network.
  969. Satyan, Pallavi; Chan, Philip Yiu Kwong, System and method to remove artifacts from fingerprint sensor scans.
  970. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  971. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  972. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  973. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  974. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  975. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  976. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  977. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., System and methods for secure transaction management and electronic rights protection.
  978. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., System and methods for secure transaction management and electronics rights protection.
  979. Khan, Shabbir; Cohen, Alexander, System and/or method for downstream bidding.
  980. Russo, Anthony, System for and method of image reconstruction with dual line scanner using line counts.
  981. Scoggins, Sean M.; Christopher, Russell G.; Garianov, Alexei; Smith, Kathryn J.; Nemecz, Susane K.; Rudran, Dileep, System for automated management of spontaneous node migration in a distributed fixed wireless network.
  982. Scoggins,Sean M.; Mills,Stuart; Mason,Robert T.; Borleske,Andrew J.; Smith,Kathryn J.; Rudran,Dileep, System for automatically enforcing a demand reset in a fixed network of electricity meters.
  983. Benkley, Fred George; Geoffroy, David Joseph, System for determining the motion of a fingerprint surface with respect to a sensor surface.
  984. Kallahalla,Mahesh; Riedel,Erik; Swaminathan,Ram, System for enabling lazy-revocation through recursive key generation.
  985. Riedel,Erik; Karamanolis,Christos; Kallahalla,Mahesh; Swaminathan,Ram, System for ensuring data privacy and user differentiation in a distributed file system.
  986. Osborn William R., System for preventing electronic memory tampering.
  987. Ronning Joel A., System for preventing unauthorized copying of active software.
  988. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  989. Stedron, Robert Allen; Chmielewski, John L., System for transmitting encrypted data.
  990. Erhart, Richard Alex; Schwab, Frank, System, device and method for securing a user device component by authenticating the user of a biometric sensor by performance of a replication of a portion of an authentication process performed at a remote computing device.
  991. Doughty, Ralph O.; Antaki, Patrick R.; Palmer, Glennard D.; Gilliom, Robert M., System, method and apparatus for electronic ticketing.
  992. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  993. Doughty, Ralph O.; Antaki, Patrick R., System, method and apparatus for enabling transactions using a biometrically enabled programmable magnetic stripe.
  994. Doughty, Ralph O.; Antaki, Patrick R.; Weiss, Kenneth P., System, method and apparatus for enabling transactions using a user enabled programmable magnetic stripe.
  995. Naono, Norihiko; Ota, Tomohisa, System, server, information terminal operating system, middleware, information communication device, certification method, and system and application software.
  996. Bobo, II, Charles R., Systems and method for storing, delivering, and managing messages.
  997. Benaloh,Josh D., Systems and methods for compression of key sets having multiple keys.
  998. Larson, Victor; Short, III, Robert Dunham; Munger, Edmund Colby; Williamson, Michael, Systems and methods for connecting network devices over communication network.
  999. McKune,Jeffrey R.; Chu,Chengyun; Alkove,James M.; Barde,Sumedh; Grigorovitch,Alexandre, Systems and methods for disabling software components to protect digital media.
  1000. Ellingson, John; Richardson, Matthew, Systems and methods for ephemeral shared data set management and communication protection.
  1001. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  1002. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  1003. Boneh, Dan; Franklin, Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  1004. Boneh,Dan; Franklin,Matthew, Systems and methods for identity-based encryption and related cryptographic techniques.
  1005. Okaue, Takumi; Nakanishi, Kenichi; Tashiro, Jun; Okubo, Hideaki, Systems and methods for locking and exporting the locking of a removable memory device.
  1006. Okaue, Takumi; Nakanishi, Kenichi; Tashiro, Jun; Okubo, Hideaki, Systems and methods for locking and exporting the locking of a removable memory device.
  1007. Shear,Victor H.; Van Wie,David M.; Weber,Robert P., Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information.
  1008. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  1009. LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  1010. LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Hart, III,John J., Systems and methods for preventing unauthorized use of digital content.
  1011. Levine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Hart, III, John J., Systems and methods for preventing unauthorized use of digital content.
  1012. Ginter, Karl L.; Shear, Victor H.; Sibert, W. Olin; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1013. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1014. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M., Systems and methods for secure transaction management and electronic rights protection.
  1015. Ginter,Karl L.; Shear,Victor H.; Sibert,W. Olin; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1016. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1017. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1018. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1019. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1020. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1021. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M., Systems and methods for secure transaction management and electronic rights protection.
  1022. Bobo, II, Charles R., Systems and methods for storing, delivering, and managing messages.
  1023. Bobo, II, Charles R., Systems and methods for storing, delivering, and managing messages.
  1024. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  1025. Merkle, Jr., James A.; LeVine, Richard B.; Lee, Andrew R.; Howard, Daniel G.; Goldman, Daniel M.; Pagliarulo, Jeffrey A.; Hart, III, John J.; Bouza, Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  1026. Merkle, Jr.,James A.; LeVine,Richard B.; Lee,Andrew R.; Howard,Daniel G.; Goldman,Daniel M.; Pagliarulo,Jeffrey A.; Hart, III,John J.; Bouza,Jose L., Systems and methods for the prevention of unauthorized use and manipulation of digital content.
  1027. Shear,Victor H.; Sibert,W. Olin; Van Wie,David M., Systems and methods for using cryptography to protect secure computing environments.
  1028. Dipaola, Todd J., Systems, apparatuses, and methods for secure beacon authentication via mobile devices.
  1029. Dipaola, Todd J., Systems, apparatuses, and methods for secure beacon authentication via mobile devices.
  1030. Peyravian, Mohammad; Matyas, Jr., Stephen Michael; Zunic, Nevenko, Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key.
  1031. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1032. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1033. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  1034. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  1035. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  1036. Everett, David Barrington; Miller, Stuart James; Peacham, Anthony David; Simmons, Ian Stephen; Richards, Timothy Philip; Viner, John Charles, Tamper resistant module certification authority.
  1037. Hall,Edwin J.; Shear,Victor H.; Tomasello,Luke S.; Van Wie,David M.; Weber,Robert P.; Worsencroft,Kim; Xu,Xuejun, Techniques for defining, using and manipulating rights management data structures.
  1038. Mason, Jr., Robert T.; Richeson, Keith D.; Minton, III, Charlie E., Techniques for limiting demand from an electricity meter with an installed relay.
  1039. Ronald A. Katz, Telephone interface call processing system with call selectivity.
  1040. Katz Ronald A., Telephone-interface lottery system.
  1041. Ronald A. Katz, Telephone-television interface statistical analysis system.
  1042. Katz, Ronald A., Telephonic-interface game control system.
  1043. Ronald A. Katz, Telephonic-interface lottery system.
  1044. Katz Ronald A., Telephonic-interface statistical analysis system.
  1045. Katz Ronald A., Telephonic-interface statistical analysis system.
  1046. Katz Ronald A., Telephonic-interface statistical analysis system.
  1047. Katz Ronald A., Telephonic-interface statistical analysis system.
  1048. Katz Ronald A., Telephonic-interface statistical analysis system.
  1049. Katz, Ronald A., Telephonic-interface statistical analysis system.
  1050. Ronald A. Katz, Telephonic-interface statistical analysis system.
  1051. Sulpizio, Jr., Ronald Francis, Temporal key generation and PKI gateway.
  1052. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  1053. Thompson, Erik Jonathon; Bellman, Charles Walter; Russo, Anthony P.; Chan, Philip Yiu Kwong; Davis, Bjoren Kurt; Dean, Gregory Lewis; Erhart, Richard Alexander; Jandu, Jaswinder; Lien, Ty Bao; Schwab, Frank, Tiered wakeup strategy.
  1054. Marcotte, Garrett, Token-based access control.
  1055. Micali Silvio, Traceable anonymous transactions.
  1056. Vanstone, Scott A., Transaction verification protocol for smart cards.
  1057. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Transforms within secure execution environments.
  1058. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1059. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1060. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted and secure techniques, systems and methods for item delivery and execution.
  1061. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  1062. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1063. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management.
  1064. Ginter, Karl L.; Shear, Victor H.; Spahn, Francis J.; Van Wie, David M.; Weber, Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1065. Ginter,Karl L.; Shear,Victor H.; Spahn,Francis J.; Van Wie,David M.; Weber,Robert P., Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management.
  1066. Ronning Joel A., Try before you buy software distribution and marketing system.
  1067. Gibbs Benjamin K. ; Roeder G. R. Konrad, Unique digital signature.
  1068. Gibbs, Benjamin K.; Roeder, G. R. Konrad, Unique digital signature.
  1069. Gardner, Lawrence C., Unitized ergonomic two-dimensional fingerprint motion tracking device and method.
  1070. Gardner, Lawrence C., Unitized ergonomic two-dimensional fingerprint motion tracking device and method.
  1071. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Unpredictable blind signature systems.
  1072. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  1073. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  1074. Chandrasekaran, Subramaniyam; Ramachandran, Arun C.; Velusamy, Lakshmanan; Venkatesan, Vinodh Kumar, Use of a private key to encrypt and decrypt a message.
  1075. Benaloh,Josh D., User access to a unique data subset of a database.
  1076. Okamoto Toshio,JPX ; Shimbo Atsushi,JPX ; Ishiyama Masahiro,JPX, User identification data management scheme for networking computer systems using wide area network.
  1077. Russo, Anthony, User input utilizing dual line scanner apparatus and method.
  1078. Russo, Anthony, User input utilizing dual line scanner apparatus and method.
  1079. Mason, Jr.,Robert T; Borleske,Andrew J; Shuey,Kenneth C, Using a fixed network wireless data collection system to improve utility responsiveness to power outages.
  1080. Kocher Paul C. ; Jaffe Joshua M. ; Jun Benjamin C., Using unpredictable information to minimize leakage from smartcards and other cryptosystems.
  1081. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  1082. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1083. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1084. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1085. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  1086. Brinkmeyer Horst (Waiblingen DEX) Daiss Michael (Filderstadt DEX) Schwegler Gunter (Weinstadt DEX) Kruger Bertolt (Bonn DEX), Vehicle security device with electronic use authorization coding.
  1087. Brinkmeyer Horst,DEX ; Daiss Michael,DEX ; Schwegler Gunter,DEX ; Kruger Bertolt,DEX, Vehicle security device with electronic use authorization coding.
  1088. Mao, Wenbo, Verification of the private components of a public-key cryptographic system.
  1089. Pinder Howard G. ; Palgon Michael S. ; Akins ; III Glendon L. ; Banker Robert O., Verification of the source of program information in a conditional access system.
  1090. Zurko,Mary Ellen; Casey, Jr.,Thomas Andrew; Gasser,Morrie; Hall,Judith Shelhorse; Kahn,Clifford Earl; Mason,Andrew Halstead; Sawyer,Paul Douglas; Kendall,Leslie Richard; Lipner,Steven B., Verification of trusted-path commands.
  1091. Hendricks, John S.; McCoskey, John S., Virtual on-demand electronic book.
  1092. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Virtual secure execution environments.
  1093. Tanaka Youko,JPX ; Motai Seizo,JPX ; Hirokawa Katsuhisa,JPX, Virtual shop computer network system which displays member shops and member shop certification method.
  1094. Katz, Ronald A., Voice-data telephonic interface control system.
  1095. Bragg, Steven D.; Yost, Robert W., Wakeup and interrogation of meter-reading devices using licensed narrowband and unlicensed wideband radio communication.
  1096. Lien, Ty Bao; Thompson, Erik Jonathon, Wakeup strategy using a biometric sensor.
  1097. Natarajan, Balas K., Watermarking of digital object.
  1098. Roth, Gregory Branchek; Dokey, Aaron Douglas; Brandwine, Eric Jason; Thomas, Nathan Bartholomew, Web services in secure execution environments.
  1099. Wells, William R.; Griswold, Chauncey W., Wide screen gaming apparatus.
  1100. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  1101. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  1102. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  1103. Wells, William; Griswold, Chan, Wide screen gaming apparatus.
  1104. Seger,Paul Joseph, Wireless security access management for a portable data storage cartridge.
  1105. Kolouch, James L., XML encryption scheme.
  1106. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로