$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Exponentiation cryptographic apparatus and method 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04K-009/00
출원번호 US-0901770 (1978-05-01)
발명자 / 주소
  • Hellman Martin E. (Stanford CA) Pohlig Stephen C. (Acton MA)
출원인 / 주소
  • Board of Trustees of the Leland Stanford Junior University (Stanford CA 02)
인용정보 피인용 횟수 : 303  인용 특허 : 1

초록

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent

대표청구항

In a method of communicating securely over an insecure communication channel of the type which communicates a message from a transmitter to a receiver by enciphering the message with a secret enciphering key at the transmitter, transmitting the enciphered message from the transmitter to the receiver

이 특허에 인용된 특허 (1)

  1. Kinch ; Jr. ; Frederick A. ; Morgan ; Barrie O., Multi-mode digital enciphering system.

이 특허를 인용한 특허 (303)

  1. Wheeler,Henry Lynn; Wheeler,Anne M., ABDS method and verification status for authenticating entity access.
  2. Wheeler, Lynn Henry; Wheeler, Anne M., ABDS method utilizing security information in authenticating entity access.
  3. Wheeler, Henry Lynn; Wheeler, Anne M., ABDS system and verification status for authenticating entity access.
  4. Wheeler,Lynn Henry; Wheeler,Anne M., ABDS system utilizing security information in authenticating entity access.
  5. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Account authority digital signature (AADS) accounts.
  6. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  7. Wheeler, Lynn Henry; Wheeler, Anne M., Account authority digital signature (AADS) system.
  8. Wheeler,Lynn Henry; Wheeler,Anne M., Account authority digital signature (AADS) system using encoded information.
  9. Wheeler, Lynn Henry; Wheeler, Anne M., Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource.
  10. Wheeler,Lynn Henry; Wheeler,Anne M., Account-based digital signature (ABDS) system.
  11. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Adaptive pattern recognition based controller apparatus and method and human-interface therefore.
  12. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Alarm system controller and a method for controlling an alarm system.
  13. Ronning,Joel A.; Wical,Kelly J., Apparatus and method for adaptive fraud screening for electronic commerce transactions.
  14. Arnold Terry Sutton, Apparatus and method for establishing a crytographic link between elements of a system.
  15. Terry Sutton Arnold, Apparatus and method for establishing a crytographic link between elements of a system.
  16. Ronning, Joel A.; Wical, Kelly J., Apparatus and method for secure downloading of files.
  17. Brown, Mathilde C.; Chase, Charlie D.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Noble, David; Outhred, Geoffrey; Peterson, Glenn R.; Tabbara, Bassam; Torone, Alexander; Welland, Robert V., Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  18. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  19. Hunt, Galen C.; Tabbara, Bassam; Grealish, Kevin; Outhred, Geoffrey; Mensching, Rob, Architecture for distributed computing system and automated design, deployment, and management of distributed applications.
  20. Hellman Martin E., Authentication using random challenges.
  21. Adam Lucas Young ; Marcel Mordechay Yung, Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys.
  22. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems.
  23. Young Adam Lucas ; Yung Marcel Mordechay, Auto-escrowable and auto-certifiable cryptosystems with fast key generation.
  24. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers.
  25. Young Adam Lucas ; Yung Marcel Mordechay, Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys.
  26. Adam Lucas Young ; Marcel Mordechay Yung, Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys.
  27. Kenneth Louis Milsted ; Craig Kindell ; Qing Gong, Automated method and apparatus to package digital content for electronic distribution using the identity of the source content.
  28. Ronning Joel A., Central database system for automatic software program sales.
  29. Wheeler, Anne M.; Wheeler, Lynn Henry, Central key authority (CKA) database for user accounts in ABDS system.
  30. Wheeler,Lynn Henry; Wheeler,Anne M., Central key authority database in an ABDS system.
  31. Naciri Robert,FRX, Communication system for messages enciphered according to an RSA-type procedure.
  32. Ganesan Ravi, Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using.
  33. Ganesan Ravi, Computer system for securing communications using split private key asymmetric cryptography.
  34. Chen, Yuqun; Kirovski, Darko; Yacobi, Yacov; Yuval, Gideon A., Counterfeit and tamper resistant labels with randomly occurring features.
  35. Chen,Yuqun; Kirovski,Darko; Yacobi,Yacov; Yuval,Gideon A., Counterfeit and tamper resistant labels with randomly occurring features.
  36. Follendore ; III Roy D., Cryptographic access and labeling system.
  37. Koopman ; Jr. Philip J. ; Finn Alan M., Cryptographic authentication of transmitted messages using pseudorandom numbers.
  38. Crosley Thomas W. (Saratoga CA) Davison Wayne (Portland OR) Goldberg James R. (Novato CA) Hofheins Leonard L. (Concord CA) Lichty Ronald D. (San Francisco CA) Vollum Charles A. (Sherwood OR) Vollum S, Cryptographic based electronic lock system and method of operation.
  39. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Najjar, Atef J., Cryptographic hash functions using elliptic polynomial cryptography.
  40. Seheidt Edward M. (McLean VA) Crowley John J. (Rockville MD), Cryptographic key management method and apparatus.
  41. Wack, C. Jay; Scheidt, Edward M.; Kolouch, James L., Cryptographic key split binder for use with tagged data elements.
  42. Wack,C. Jay; Scheidt,Edward M.; Kolouch,James L., Cryptographic key split binder for use with tagged data elements.
  43. Scheidt,Edward M.; Wack,C. Jay, Cryptographic key split binding process and apparatus.
  44. Scheidt, Edward M.; Wack, C. Jay, Cryptographic key split combiner.
  45. Asai Hitohisa (892 Catalina Dr. Newport News VA 23602), Cryptographic system using pseudocomplements of vector Boolean algebra.
  46. Ajtai Miklos, Cryptosystem employing worst-case difficult-to solve lattice problem.
  47. Moskowitz, Scott A., Data protection method and device.
  48. Moskowitz, Scott A., Data protection method and device.
  49. Moskowitz, Scott A., Data protection method and device.
  50. Moskowitz, Scott A., Data protection method and device.
  51. Dahl, Ulf, Data security system for a database.
  52. Racz, Patrick Sandor; Hulst, Hermen-ard, Data storage and access systems.
  53. Mohammad Peyravian ; Stephen Michael Matyas, Jr. ; Nevenko Zunic, Decentralized systems methods and computer program products for sending secure messages among a group of nodes.
  54. Outhred, Geoffrey; Grealish, Kevin; Mensching, Rob; Tabbara, Bassam, Design time validation of systems.
  55. Hoffberg, Steven M., Detection and alert of automobile braking event.
  56. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  57. Mourad,Magda; Munson,Jonathan P.; Pacifici,Giovanni; Tantawy,Ahmed; Youssef,Alaa S., Digital content distribution using web broadcasting services.
  58. Medina, Cesar; Gong, Qing; Milsted, Kenneth Louis, Digital content preparation system.
  59. Shanton M. Greg, Distributed cryptographic object method.
  60. Shanton M. Greg, Distributed cryptographic object method.
  61. Shanton M. Greg (Manassas VA), Distributed cryptographic object method.
  62. Marry Patrick J. (Cary IL) Wilson Gregory P. (Lake Zurich IL) Houghton Michael W. (Hoffman Estates IL), Duplex analog scrambler.
  63. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  64. Ronning, Joel Alan; Wical, Kelly J., Electronic commerce system and method for detecting fraud.
  65. Ronning,Joel A.; Wical,Kelly J., Electronic commerce system and method for detecting fraud.
  66. Downs Edgar ; Gruse George Gregory ; Hurtado Marco M. ; Lehman Christopher T. ; Milsted Kenneth Louis ; Lotspiech Jeffrey B., Electronic content delivery system.
  67. Ghouti, Lahouari; Ibrahim, Mohammad K., Elliptic curve-based message authentication code system and method.
  68. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Elliptic polynomial cryptography with secret key embedding.
  69. Ghouti, Lahouari; Ibrahim, Mohammad K., Elliptical polynomial-based message authentication code.
  70. Clark James M. (Verona NJ), Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large u.
  71. Wilkins, John; Keefe, Michael; Rehman, Sam, Encryption key exchange system and method.
  72. Golomb,Solomon W.; Welch,Lloyd R.; D?nes,J?zsef, Encryption system based on crossed inverse quasigroups.
  73. Wheeler, Lynn Henry; Wheeler, Anne M., Entity authentication in electronic communications by providing verification status of device.
  74. Hunt,Galen C.; Simon,Jeff, Establishing computing trust with a staging area.
  75. Wheeler, Anne M.; Wheeler, Lynn Henry, Establishing initial PuK-linked account database.
  76. Moskowitz, Scott, Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  77. Moskowitz,Scott A., Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management.
  78. Beeson,Curtis Linn, Facilitating digital signature based on ephemeral private key.
  79. Hunt,Galen C.; Simon,Jeff, Filters to isolate untrusted ports of switches.
  80. Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Flexible network load balancing.
  81. Wheeler,Lynn Henry; Wheeler,Anne M., Gauging risk in electronic communications regarding accounts in ABDS system.
  82. Beeson, Curtis Linn, Generating digital signatures using ephemeral cryptographic key.
  83. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Najjar, Atef J., Hash functions using elliptic curve cryptography.
  84. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Najjar, Atef J., Hash functions with elliptic polynomial hopping.
  85. Wheeler, Anne M.; Wheeler, Lynn Henry, Incorporating security certificate during manufacture of device generating digital signatures.
  86. Hunt, Galen C.; Outhred, Geoffrey; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob, Integrating design, deployment, and management phases for systems.
  87. Hoffberg, Steven M.; Hoffberg-Borghesani, Linda I., Internet appliance system and method.
  88. Schonberg,Daniel; Kirovski,Darko, Iris-based biometric identification.
  89. Schonberg,Daniel; Kirovski,Darko, Iris-based biometric identification.
  90. George Gregory Gruse ; Marco M. Hurtado ; Kenneth Louis Milsted ; Jeffrey B. Lotspiech, Key management system for digital content player.
  91. Cross, David B.; Nath, Satyajit; Li, George Z.; Dutta, Tanmoy; Gottumukkala, Sunil, Labeling of data objects to apply and enforce policies.
  92. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  93. Moskowitz, Scott A.; Cooperman, Marc, Linear predictive coding implementation of digital watermarks.
  94. Wheeler,Lynn Henry; Wheeler,Anne M., Linking public key of device to information during manufacture.
  95. Wheeler, Lynn Henry; Wheeler, Anne M., Managing account database in ABDS system.
  96. Wheeler,Lynn Henry; Wheeler,Anne M., Managing database for identifying to recipients security features of devices generating digital signatures.
  97. Wheeler,Anne M.; Wheeler,Lynn Henry, Managing database for reliably identifying information of device generating digital signatures.
  98. Wheeler, Lynn Henry; Wheeler, Anne M., Manufacturing unique devices that generate digital signatures.
  99. Wheeler,Lynn Henry; Wheeler,Anne M., Manufacturing unique devices that generate digital signatures.
  100. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Najjar, Atef J., Message authentication code with elliptic polynomial hopping.
  101. Matyas ; Jr. Stephen Michael ; Johnson Donald Byron, Method and apparatus for establishing an authenticated shared secret value between a pair of users.
  102. Massey James L. (Zurich CA CHX) Omura Jimmy K. (Culver City CA), Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission.
  103. Curiger Andreas ; Little Wendell, Method and apparatus for masking modulo exponentiation calculations in an integrated circuit.
  104. Diffie Whitfield ; Aziz Ashar,PKX, Method and apparatus for privacy and authentication in wireless networks.
  105. Crandall Richard E. (Portland OR), Method and apparatus for public key exchange in a cryptographic system.
  106. Eames Thomas R. ; Trinh Lac X. ; Manchester E. Barton ; Yearwood Bradley N. ; Manley David J. ; Hicks Scott T. ; Johal Jaskarn S. ; Eldering Charles A., Method and apparatus for reliable operation of universal voice grade cards.
  107. Duane, William M., Method and apparatus for secure validation of tokens.
  108. John J. Dorak, Jr., Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system.
  109. Milsted Kenneth Louis ; Nguyen Kha Dinh ; Gong Qing, Method and apparatus to create encoded digital content.
  110. Milsted,Kenneth Louis; Gong,Qing, Method and apparatus to indicate an encoding status for digital content.
  111. Moskowitz, Scott A.; Berry, Michael, Method and device for monitoring and analyzing signals.
  112. Moskowitz, Scott A.; Berry, Mike W., Method and device for monitoring and analyzing signals.
  113. Moskowitz, Scott; Berry, Mike W., Method and device for monitoring and analyzing signals.
  114. Moskowitz,Scott A.; Berry,Michael W., Method and device for monitoring and analyzing signals.
  115. Austin Jeffrey R. (Hindhead GB2), Method and system for authentication.
  116. Moskowitz Scott A. ; Cooperman Marc, Method and system for digital watermarking.
  117. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  118. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  119. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  120. Moskowitz, Scott A.; Cooperman, Marc S., Method and system for digital watermarking.
  121. Moskowitz,Scott A.; Cooperman,Marc, Method and system for digital watermarking.
  122. Moskowitz,Scott A.; Cooperman,Marc S., Method and system for digital watermarking.
  123. Daugaard, Kim, Method and system for ensuring connection of a module to an electronic apparatus.
  124. Kim Daugaard DK, Method and system for ensuring connection of a module to an electronic apparatus.
  125. Mattsson, Ulf, Method and system for preventing impersonation of a computer system user.
  126. Jenkins Lew ; Pasetes ; Jr. Emmanuel K., Method and system for providing secure EDI over an open network.
  127. Lao, Guillermo, Method and system for subscription digital rights management.
  128. Lao, Guillermo; Ta, Thanh, Method and system for subscription digital rights management.
  129. Hashem,Tony; Quinn,Keri; Parmar,Ashwin, Method and system for transferring files using file transfer protocol.
  130. Wheeler,Lynn Henry; Wheeler,Anne Mcafree, Method and system for using electronic communications for an electronic contract.
  131. Moskowitz, Scott A., Method for combining transfer functions and predetermined key creation.
  132. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  133. Moskowitz, Scott A., Method for combining transfer functions with predetermined key creation.
  134. Spagna, Richard; Milsted, Kenneth Louis; Lybrand, David P.; Downs, Edgar, Method for delivering electronic content from an online store.
  135. Spagna, Richard L.; Rettig, Paul R.; Rodgers, Jeremy; Best, Arthur; Best, II, Arthur R., Method for determining internet users geographic region.
  136. Moskowitz Scott A. ; Cooperman Marc, Method for human-assisted random key generation and application for digital watermark system.
  137. Eastlake ; 3rd Donald E. (Carlisle MA), Method for improving the processing and storage performance of digital signature schemes.
  138. Moskowitz Scott A. ; Cooperman Marc, Method for stega-cipher protection of computer code.
  139. Felger, David, Method of billing a purchase made over a computer network.
  140. Felger, David, Method of billing a purchase made over a computer network.
  141. Felger, David, Method of billing a purchase made over a computer network.
  142. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of cipher block chaining using elliptic curve cryptography.
  143. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of generating a password protocol using elliptic polynomial cryptography.
  144. Ghouti, Lahouari; Al-Khoraidly, Abdulaziz M.; Ibrahim, Mohammad K., Method of performing XZ-elliptic curve cryptography for use with network security protocols.
  145. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of performing cipher block chaining using elliptic polynomial cryptography.
  146. Ghouti, Lahouari; Ibrahim, Mohammad K.; Gutub, Adnan A., Method of performing elliptic polynomial cryptography with elliptic polynomial hopping.
  147. Moskowitz, Scott A., Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments.
  148. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  149. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  150. Moskowitz, Scott, Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  151. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  152. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  153. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  154. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  155. Moskowitz, Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  156. Moskowitz,Scott A., Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth.
  157. Hoffberg, Steven M., Mobile communication device.
  158. Hoffberg, Steven M., Mobile communication device for delivering targeted advertisements.
  159. Hoffberg, Steven M; Hoffberg-Borghesani, Linda I, Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system.
  160. Outhred, Geoffrey; Han, Eric K; Grealish, Kevin D. J.; Brown, Mathilde C.; Gustin, Reid B; Mensching, Rob; Nielsen, Steven T, Model and system state synchronization.
  161. Vinberg, Anders B.; Copeland, Bruce W.; Fries, Robert; Grealish, Kevin D. J.; Hardwick, Jonathan C.; Healy, Michael J.; Hunt, Galen C.; Hydrie, Aamer; James, David C.; Lakshminarayanan, Anand; Lassettre, Edwin R.; McCollum, Raymond W.; Mensching, Rob; Mohammed, Mazhar; Narayanan, Rajagopalan Badri; Outhred, Geoffrey H.; Pan, Zhengkai Kenneth; Papaefstathiou, Efstathios; Parchem, John M.; Rajarajan, Vij; Sanghvi, Ashvinkumar J.; Tabbara, Bassam; Vega, Rene Antonio; Voloshin, Vitaly; Welland, Robert V.; Wilson, John H.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based policy application.
  162. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Pardyak, Przemek; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based provisioning of test environments.
  163. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  164. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  165. Vinberg, Anders B.; Lakshminarayanan, Anand; Sanghvi, Ashvinkumar J.; Rajarajan, Vij; Voloshin, Vitaly; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system monitoring.
  166. Vinberg, Anders B.; Tabbara, Bassam; Grealish, Kevin; Mensching, Rob; Outhred, Geoffrey; Hunt, Galen C.; Hydrie, Aamer; Welland, Robert V., Model-based system provisioning.
  167. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  168. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Lassettre, Edwin R.; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  169. Vinberg, Anders B.; Fries, Robert M.; Grealish, Kevin; Hunt, Galen C.; Hydrie, Aamer; Mensching, Rob; Outhred, Geoffrey; Parchem, John M.; Tabbara, Bassam; Vega, Rene Antonio; Welland, Robert V.; Winner, Eric J.; Woolsey, Jeffrey A., Model-based virtual system provisioning.
  170. Omura Jimmy K. (Cupertino CA), Modulo arithmetic processor chip.
  171. Marconcini, Franco; Munson, Jonathan P.; Pacifici, Giovanni; Tantawy, Ahmed; Youssef, Alaa S., Multi-tier digital TV programming for content distribution.
  172. Marco M. Hurtado ; George Gregory Gruse ; Edgar Downs ; Kenneth Louis Milsted, Multimedia player for an electronic content delivery system.
  173. Gruse,George Gregory; Dorak, Jr.,John J.; Milsted,Kenneth Louis, Multimedia player toolkit for electronic content delivery.
  174. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Hines,Larry L., Multiple cryptographic key precompute and store.
  175. Hopkins,W. Dale; Collins,Thomas W.; Wierenga,Steven W.; Wang,Ruth A., Multiple prime number generation using a parallel prime number search algorithm.
  176. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  177. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  178. Moskowitz, Scott A., Multiple transform utilization and application for secure digital watermarking.
  179. Moskowitz Scott A., Multiple transform utilization and applications for secure digital watermarking.
  180. Moskowitz,Scott A., Multiple transform utilization and applications for secure digital watermarking.
  181. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Multiprime RSA public key cryptosystem.
  182. Gbadegesin, Abolade; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Kaniyar, Sanjay N.; Welland, Robert V., Network load balancing with connection manipulation.
  183. Darling, Christopher L.; Joy, Joseph M.; Shrivastava, Sunita; Subbaraman, Chittur, Network load balancing with host status information.
  184. Joy, Joseph M.; Sivathanup, Karthic Nadarajapillai, Network load balancing with session information.
  185. Darling, Christopher L.; House, Sean B.; Hydrie, Aamer; Joy, Joseph M.; Welland, Robert V., Network load balancing with traffic routing.
  186. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  187. Ronning Joel A., On-line try before you buy software distribution system.
  188. Moskowitz, Scott A., Optimization methods for the insertion, projection, and detection of digital watermarks in digital data.
  189. Moskowitz, Scott A., Optimization methods for the insertion, protection and detection of digital watermarks in digital data.
  190. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  191. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  192. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  193. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  194. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  195. Moskowitz, Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  196. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digital data.
  197. Moskowitz Scott A. ; Cooperman Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  198. Moskowitz, Scott A.; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  199. Moskowitz, Scott A.; Cooperman, Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  200. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  201. Moskowitz, Scott; Cooperman, Marc, Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  202. Moskowitz,Scott A., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  203. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  204. Moskowitz,Scott A.; Cooperman,Marc S., Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data.
  205. Wheeler, Lynn Henry; Wheeler, Anne M., Person-centric account-based digital signature system.
  206. Brookner George, Postal security device incorporating periodic and automatic self implementation of public/private key pair.
  207. Venkatesan,Ramarathnam; Cary,Matthew, Primitives for fast secure hash functions and stream ciphers.
  208. Brennan J. J. (Rochester MI) Geist Bruce K. (Clinton Township ; Macomb County MI) Van Eeuwen Jeffrey A. (Waterford MI), Process for cryptographic key generation and safekeeping.
  209. Ganesan Ravi, Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public crypt.
  210. Beeson, Curtis Linn, Providing digital signature and public key based on shared knowledge.
  211. Koopman ; Jr. Philip J. ; Finn Alan M., Pseudorandom number generation and crytographic authentication.
  212. Collins,Thomas; Hopkins,Dale; Langford,Susan; Sabin,Michael, Public key cryptographic apparatus and method.
  213. Miyaji Atsuko (Kawachinagano JPX) Tatebayashi Makoto (Takarazuka JPX), Public key cryptosystem with an elliptic curve.
  214. Austin Jeffrey R. (Hindhead GB2), Public key diversification method.
  215. Fiat Amos (Tel Aviv ILX), RSA computation method for efficient batch processing.
  216. Wheeler, Anne M.; Wheeler, Lynn Henry, Reliably identifying information of device generating digital signatures.
  217. Hopkins W. Dale, Remote financial transaction system.
  218. Wheeler, Lynn Henry; Wheeler, Anne M., Requesting execution of instructions on accounts in ABDS system.
  219. Ronning, Joel A.; Wical, Kelly J.; Kukura, Marc A., Scheduling of a file download and search for updates.
  220. Durand, Alain; Andreaux, Jean Pierre; Sirvent, Thomas, Secure authenticated channel.
  221. Rimpo Charles Robert ; Ciccone John Charles ; Yuenyongsgool Yongyut, Secure cryptographic multi-exponentiation method and coprocessor subsystem.
  222. Hunt, Galen C.; Simon, Jeff, Secure domain join for computing devices.
  223. Ronning, Joel Alan; Wical, Kelly J., Secure downloading of a file from a network system and method.
  224. Hurtado, Marco M.; Milsted, Kenneth L.; Gruse, George G.; Downs, Edgar; Lehman, Christopher T.; Spagna, Richard L.; Lotspiech, Jeffrey B., Secure electronic content distribution on CDS and DVDs.
  225. Downs, Edgar; Gruse, George Gregory; Hurtado, Marco M.; Medina, Cesar; Milsted, Kenneth Louis, Secure electronic content management system.
  226. Zissimopoulos,Vasileios; Topalov,Ognian Zdravkov, Secure method for roaming keys and certificates.
  227. Moskowitz, Scott A.; Berry, Michael, Secure personal content server.
  228. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  229. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  230. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  231. Moskowitz, Scott A.; Berry, Mike W., Secure personal content server.
  232. Moskowitz,Scott A.; Berry,Michael, Secure personal content server.
  233. Duane, William M.; Silva, Eric A.; Ciaffi, Marco, Secure seed provisioning.
  234. Chen Tsuhan, Secure telecommunications data transmission.
  235. Chang Chung Nan ; Yuan Chuan Kuan ; Hao Feng Qi, Secure, swift cryptographic key exchange.
  236. Ganesan Ravi, Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography.
  237. Freeman, Trevor W.; Moore, Tim; Aboba, Bernard, Security associations for devices.
  238. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  239. Moskowitz, Scott A., Security based on subliminal and supraliminal channels for data objects.
  240. Muftic Sead,SEX, Security infrastructure for electronic transactions.
  241. Utz Hubert W.,DEX, Security system with randomized synchronization code.
  242. Chaum David L. (14652 Sutton St. Sherman Oaks CA 91403), Selected-exponent signature systems.
  243. Ronning Joel A., Self-launching encrypted digital information distribution system.
  244. Ronning Joel A., Self-launching encrypted try before you buy software distribution system.
  245. Wheeler, Lynn Henry; Wheeler, Anne M., Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system.
  246. Wheeler, Henry Lynn; Wheeler, Anne M., Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system.
  247. Kaliski,Burton S., Server-assisted regeneration of a strong secret from a weak secret.
  248. Chang Chung Nan, Simiplified secure swift cryptographic key exchange.
  249. Hellman Martin E. (730 Alvarado Ct. Stanford CA 94305), Software distribution system.
  250. Beeson, Curtis Linn, Software for providing based on shared knowledge public keys having same private key.
  251. Manchester, E. Barton; Yearwood, Bradley N., State machine based universal voice grade cards.
  252. Cooperman Marc (Palo Alto CA) Moskowitz Scott A. (Tokyo JPX), Steganographic method and device.
  253. Moskowitz Scott A. (Tokyo JPX) Cooperman Marc (Palo Alto CA), Steganographic method and device.
  254. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  255. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  256. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  257. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  258. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  259. Moskowitz, Scott A.; Cooperman, Marc, Steganographic method and device.
  260. Moskowitz, Scott; Cooperman, Marc, Steganographic method and device.
  261. Hurtado, Marco M.; Mahlbacher, James C.; Spagna, Richard L., Super-distribution of protected digital content.
  262. Hurtado,Marco M.; Mahlbacher,James C.; Spagna,Richard L., Super-distribution of protected digital content.
  263. Dwork Cynthia ; Naor Moni,ILX ; Pestoni Florian,ARX, System and method for certifying content of hard-copy documents.
  264. Volpert, Jr.,Thomas R., System and method for data encryption.
  265. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  266. Hunt, Galen C.; Hydrie, Aamer; Levi, Steven P.; Stutz, David S.; Tabbara, Bassam; Welland, Robert V., System and method for distributed management of shared computers.
  267. Ganesan Ravi (Arlington VA) Yacobi Yacov (Berkeley Heights NJ), System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptos.
  268. Kaliski, Jr., Burton S., System and method for increasing the security of encrypted secrets and authentication.
  269. Levi, Steven; Hunt, Galen; Hydrie, Aamer; Rehof, Jakob; Tabbara, Bassam; Welland, Robert, System and method for logical modeling of distributed computer systems.
  270. Nusser, Stefan; Lotspiech, Jeffrey B.; Rettig, Paul R., System and method for secure authentication of external software modules provided by third parties.
  271. Nusser,Stefan; Lotspiech,Jeffrey B.; Rettig,Paul R., System and method for secure authentication of external software modules provided by third parties.
  272. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  273. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  274. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  275. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  276. Moskowitz, Scott A.; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  277. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  278. Moskowitz, Scott; Berry, Mike W., System and methods for permitting open access to data objects and for securing data within the data objects.
  279. Ronning Joel A., System for preventing unauthorized copying of active software.
  280. George Gregory Gruse ; John J. Dorak, Jr. ; Kenneth Louis Milsted, System for tracking end-user electronic content usage.
  281. Kirovski, Darko, Systems and methods for encoding randomly distributed features in an object.
  282. Moskowitz, Scott A.; Berry, Mike W., Systems and methods for permitting open access to data objects and for securing data within the data objects.
  283. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  284. Everhart, Glenn Cobourm, Systems and methods for time variable financial authentication.
  285. Peyravian, Mohammad; Matyas, Jr., Stephen Michael; Zunic, Nevenko, Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key.
  286. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  287. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  288. Moskowitz, Scott A., Systems, methods and devices for trusted transactions.
  289. Duane, William M., Techniques for carrying out seed or key derivation.
  290. Wheeler, Anne Mcafee; Wheeler, Lynn Henry, Three party account authority digital signature (AADS) system.
  291. Wheeler, Lynn Henry; Wheeler, Anne M., Trusted authentication digital signature (tads) system.
  292. Ronning Joel A., Try before you buy software distribution and marketing system.
  293. Chaum David (14652 Sutton St. Sherman Oaks CA 91403), Unpredictable blind signature systems.
  294. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  295. Spagna,Richard L.; Hurtado,Marco M.; Rettig,Paul R.; Zhao,Ting, Updating usage conditions in lieu of download digital rights management protected content.
  296. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic system.
  297. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  298. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  299. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  300. Moskowitz, Scott A.; Berry, Mike W., Utilizing data reduction in steganographic and cryptographic systems.
  301. Kolouch, James L., XML encryption scheme.
  302. Ghouti, Lahouari; Ibrahim, Mohammad K.; Al-Khoraidly, Abdulaziz M., XZ-elliptic curve cryptography system and method.
  303. Moskowitz,Scott A.; Cooperman,Marc, Z-transform implementation of digital watermarks.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로