$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Secure processor with external memory using block chaining and block re-ordering 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-009/28
출원번호 US-0949111 (1997-10-10)
발명자 / 주소
  • Candelore Brant
  • Sprunk Eric
출원인 / 주소
  • General Instrument Corporation
대리인 / 주소
    Lipsitz
인용정보 피인용 횟수 : 235  인용 특허 : 3

초록

A scrambled data transmission is descrambled by communicating encrypted program information and authentication information between an external storage device and block buffers of a secure circuit. The program information is communicated in block chains to reduce the overhead of the authentication in

대표청구항

[ What is claimed is:] [1.] An apparatus for processing program information, comprising:a secure circuit including a central processing unit (CPU) and at least one block buffer for storing at least one block of the program information;an external storage device which is adapted to store the program

이 특허에 인용된 특허 (3)

  1. Best Robert M. (16016 9th Ave. NE. Seattle WA 98155), Crypto microprocessor that executes enciphered programs.
  2. Best Robert M. (16016 - 9th Ave. NE. Seattle WA 98155), Crypto microprocessor using block cipher.
  3. Frutiger Peter (Sonnahlde 18 Wangen CHX), Method and apparatus for enciphering and deciphering audio information.

이 특허를 인용한 특허 (235)

  1. Bidan, Christophe; Naccache, David; Girard, Pierre; Guterman, Pascal; Rousseau, Ludovic, Access control to data processing means.
  2. Davies, David B.; Russ, Samuel H.; Krantzler, Irvan J., Access of stored video from peer devices in a local network.
  3. Vater, Harald; Drexler, Hermann; Johnson, Eric, Access-controlled data storage medium.
  4. Vater, Harald; Drexler, Hermann; Johnson, Eric, Access-controlled data storage medium.
  5. Glider, Joseph S.; Sorniotti, Alessandro, Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters.
  6. Glider, Joseph S.; Sorniotti, Alessandro, Achieving storage efficiency in presence of end-to-end encryption using downstream decrypters.
  7. Katayama,Hiroshi, Apparatus for decoding an MPEG picture stream.
  8. Katayama,Hiroshi, Apparatus for decoding an MPEG picture stream.
  9. Grauzer, Attila; Bourbour, Feraidoon; Yoseloff, Mark L., Apparatus, system, method, and computer-readable medium for casino card handling with multiple hand recall feature.
  10. Grauzer, Attila; Bourbour, Feraidoon; Yoseloff, Mark L., Apparatus, system, method, and computer-readable medium for casino card handling with multiple hand recall feature.
  11. Grauzer, Attila; Bourbour, Feraidoon; Yoseloff, Mark L., Apparatus, system, method, and computer-readable medium for casino card handling with multiple hand recall feature.
  12. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  13. Johnson, Richard C.; Morgan, Andrew; Anvin, H. Peter; Torvalds, Linus, Architecture, system, and method for operating on encrypted and/or hidden information.
  14. Ho, Jin-Meng, Authentication and encryption for secure data transmission.
  15. Scheper, Paul K.; Grauzer, Attila; Kelly, James V.; Stasson, James B.; Swanson, Ronald R.; Bourbour, Feraidoon; Nelson, Troy D.; Lopez, David B.; Yoseloff, Mark L.; Dunn, R. Brooke; Krenn, Peter; Blaha, Ernst, Automatic card shuffler with pivotal card weight and divider gate.
  16. Rynda, Robert J.; Bourbour, Feraidoon; Swanson, Ronald R.; Grauzer, Attila, Automatic system and methods for accurate card handling.
  17. Stasson, James B.; Rynda, Robert J.; Scheper, Paul K.; Swanson, Ronald R.; Grauzer, Attila, Batch card shuffling apparatuses including multi card storage compartments.
  18. Stasson, James B.; Rynda, Robert J.; Scheper, Paul K.; Swanson, Ronald R.; Grauzer, Attila, Batch card shuffling apparatuses including multi card storage compartments, and related methods.
  19. Kaabouch, Majid; Le Cocquen, Eric, Bi-processor architecture for secure systems.
  20. Schneider, James P., Block cipher using multiplication over a finite field of even characteristic.
  21. Ybarra, Danny O.; Deforest, Marvin R.; Meyer, Alan T., Buffer memory protection unit.
  22. Blaha, Ernst; Krenn, Peter, Card handling apparatus.
  23. Blaha, Ernst; Krenn, Peter, Card handling apparatus.
  24. Blaha, Ernst; Krenn, Peter, Card handling apparatus and associated methods.
  25. Grauzer, Attila; Scheper, Paul K.; Swanson, Ronald R., Card handling apparatuses and methods for handling cards.
  26. Krenn, Peter; Blaha, Ernst, Card handling devices and related assemblies and components.
  27. Grauzer, Attila; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K.; Nelson, Troy D., Card handling devices and related methods.
  28. Krenn, Peter, Card handling systems, devices for use in card handling systems and related methods.
  29. Kelly, James V.; Zvercov, Vladislav; Miller, Brian, Card recognition system, card handling device, and method for tuning a card handling device.
  30. Kelly, James V.; Zvercov, Vladislav; Miller, Brian E., Card recognition system, card handling device, and method for tuning a card handling device.
  31. Tedham, Thomas A., Card shuffler device.
  32. Grauzer, Attila; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K., Card shuffler with card rank and value reading capability.
  33. Downs, III, Justin G.; Roberts, James R.; Kulakkunnath, Kapilkumar N.; Zvercov, Vladislav, Card shuffling apparatus and card handling device.
  34. Downs, Justin G.; Roberts, James D.; Zvercov, Vladislav; Kulakkunnath, Kapilkumar N., Card shuffling apparatus and card handling device.
  35. Sines, Randy D.; Griffin, Gary W.; Lahti, Joseph J., Card shuffling apparatuses and related methods.
  36. Sines, Randy D.; Lahti, Joseph John; Griffin, Gary Wayne, Card shuffling apparatuses and related methods.
  37. Kelly, James V.; Helgesen, James P.; Zvercov, Vladislav; Bourbour, Feraidoon; Rynda, Robert J., Card shuffling device and calibration method.
  38. Swanson, Ronald R., Card-feeding device for a card-handling device including a pivotable arm.
  39. Hessing, Lynn C.; Mahoney, Daniel J.; Blad, Steven J.; Baker, Thompson A., Card-handling device and method of operation.
  40. Hessing, Lynn C.; Mahoney, Daniel J.; Blad, Steven J.; Baker, Thompson A., Card-handling device and method of operation.
  41. Grauzer, Attila; Bourbour, Feraidoon; Nelson, Troy D.; Rynda, Robert J.; Scheper, Paul K.; Stasson, James B.; Swanson, Ronald R., Card-handling devices.
  42. Johnson, Rodney G., Card-handling devices and methods of using such devices.
  43. Stasson, James B.; Grauzer, Attila; Rynda, Robert J.; Scheper, Paul K.; Swanson, Ronald R., Card-handling methods with simultaneous removal.
  44. Daemen, Joan; Van Assche, Gilles; Bertoni, Guido Marco, Ciphering by blocks of the content of a memory external to a processor.
  45. Chen, Yuqun, Code individualism and execution protection.
  46. Noguchi, Yasuo; Ogiwara, Kazutaka; Tamura, Masahisa; Tsuchiya, Yoshihiro; Maruyama, Tetsutaro; Take, Riichiro, Computer-readable recording medium having recorded hash-value generation program, computer-readable recording medium having recorded storage management program, and storage system.
  47. Ducharme, Paul D.; Jao, Weiguo, Concealing plain text in scrambled blocks.
  48. Rashkovskiy, Oleg; Hannah, Eric C., Content protection using block reordering.
  49. Rashkovskiy, Oleg; Hannah, Eric C., Content protection using block reordering.
  50. Fujioka, Naotaka, Contents distribution system with integrated recording rights control.
  51. Park,Tae Gon; Nam,Kyung Wan; Park,Young Wook, Cryptographic apparatus for supporting multiple modes.
  52. Derouet, Odile, Cryptographic systems for encrypting input data using an address associated with the input data, error detection circuits, and methods of operating the same.
  53. Taunton, Mark; Dobson, Timothy Martin, DSL trellis encoding.
  54. Wall, William E.; Russ, Samuel H., DVD playback over multi-room by copying to HDD.
  55. Wall, William E.; Russ, Samuel H., DVD playback over multi-room by copying to HDD.
  56. Taunton, Mark; Dobson, Timothy Martin, Data de-scrambler.
  57. Völp, Marcus; Anguille, Claude, Data encryption in a symmetric multiprocessor electronic apparatus.
  58. Matthews, Jr., Donald Preston, Data encryption to provide data security and memory cell bit wear leveling.
  59. Payne,Robert Edwin; Smith,Peter John, Data handling system.
  60. Balakrishnan, Sreeram Viswanath; Ananthanarayanan, Rema; Datta, Souptik, Data obfuscation of text data using entity detection and replacement.
  61. Balakrishnan, Sreeram Viswanath; Ananthanarayanan, Rema; Datta, Souptik, Data obfuscation of text data using entity detection and replacement.
  62. Furukawa, Kazuyoshi; Shimoyama, Takeshi; Takenaka, Masahiko, Data processing apparatus and data processing method.
  63. Meyer, Alan T.; Habbinga, Erik R., Data storage device comprising a secure processor for maintaining plaintext access to an LBA table.
  64. Hamada, Ichiro; Yuzawa, Keiji, Data transmission apparatus and method, data receiving apparatus and method, and data transmission and reception system and method.
  65. Liang,Bor Sung, Device and method for data protection by scrambling address lines.
  66. Graunke, Gary L.; Lee, David A.; Faber, Robert W., Digital video content transmission ciphering and deciphering method and apparatus.
  67. Graunke,Gary L.; Lee,David A.; Faber,Robert W., Digital video content transmission ciphering and deciphering method and apparatus.
  68. Robert W. Faber ; David A. Lee ; Brendan S. Traw ; Gary L. Graunke, Digital video content transmission ciphering and deciphering method and apparatus.
  69. Shih, Yin, Disk drive with flexible data stream encryption.
  70. Ficco, Michael H., Distributed media-aggregation systems and methods to operate the same.
  71. Ficco, Michael H., Distributed media-protection systems and methods to operate the same.
  72. Graunke,Gary L.; Lee,David A.; Faber,Robert W., Dual use block/stream cipher.
  73. Murakoshi, Sho, Electronic device and method for updating authentication reference information.
  74. Kaabouch, Majid; Le Cocquen, Eric, Embedded software camouflage against code reverse engineering.
  75. McGrew,David A.; Fluhrer,Scott, Enciphering method.
  76. Yearsley, Gyle D.; Nekl, Joshua J., Encrypting an address-dependent value along with code to prevent execution or use of moved code.
  77. Ma, Edward Tangkwai; Grider, Stephen N.; Little, Wendell L., Encryption-based security protection for processors.
  78. Deng, Feng; Ke, Yan; Luo, Dongping, Firewall including local bus.
  79. Robertson, Neil C.; Fernandez, Jose M., Full duplex wideband communications system for a local coaxial network.
  80. Robertson, Neil C.; Fernandez, Jose M., Full duplex wideband communications system for a local coaxial network.
  81. Schneider, James P., Generating pseudo random bits from polynomials.
  82. Chang,Hoi; Atallah,Mikhail J.; Rice,John R., Guards for application in software tamperproofing.
  83. Stasson, James B.; Rynda, Robert J.; Helgesen, James P.; Nelson, Troy D.; Scheper, Paul K.; Swanson, Ronald R.; Helsen, Colin A.; Wadds, Nathan J., Hand-forming card shuffling apparatuses including multi-card storage compartments, and related methods.
  84. Stasson, James B.; Rynda, Robert J.; Helgesen, James P.; Nelson, Troy D.; Scheper, Paul K.; Swanson, Ronald R.; Helsen, Collin A.; Wadds, Nathan J., Hand-forming card shuffling apparatuses including multi-card storage compartments, and related methods.
  85. LeQuere, Patrick, High speed cryptographic system with modular architecture.
  86. Davies, David B.; Russ, Samuel H.; Krantzler, Irvan J., Home communication systems.
  87. Thibadeau, Robert H., Hybrid computer security clock.
  88. Ananth,Viswanath, Hybrid stream cipher.
  89. Hirayama, Noriyuki, Information processing apparatus.
  90. Hiroshi Hayashi JP; Mamoru Nagatani JP, Information processing device capable of allowing the maximum processing performance of microprocessor.
  91. Asano, Tomoyuki; Osawa, Yoshitomo; Kato, Motoki, Information recording and/or reproducing apparatus.
  92. Kobres, Erick Christian; Rogers, Ron William, Installable secret functions for a peripheral.
  93. Mangard, Stefan, Instruction encryption/decryption arrangement and method with iterative encryption/decryption key update.
  94. Ogawa, Hajime; Odani, Kensuke, Instruction string optimization with estimation of basic block dependence relations where the first step is to remove self-dependent branching.
  95. Jia,Zheng; Shen,Ji, Instruction/data protection employing derived obscuring instruction/data.
  96. Russ, Samuel H.; Gaul, Michael A., Interactive program guide with selectable updating.
  97. Timothy Philip Richards GB, Key transformation unit for an IC card.
  98. Liu,Fang cheng; Syu,Ding jyan, LIFM algorithm for security association database lookup in IPSEC application.
  99. Russ, Samuel H.; Gaul, Michael A., Locally-updated interactive program guide.
  100. Hawkes, Philip Michael; Xiao, Lu; Rose, Gregory Gordon; Millendorf, Steve, Low latency block cipher.
  101. Schneider, James P., Mechanism for generating pseudorandom number sequences.
  102. Russ, Samuel H.; Lett, David B.; Robinson, Jonathan A.; Gaul, Michael A., Media content sharing over a home network.
  103. Fischaber,Scott J.; Ogden,James E., Memory of and circuit for rearranging the order of data in a memory having asymmetric input and output ports.
  104. Schneider, James Paul, Method and an apparatus to generate pseudo random bits for a cryptographic key.
  105. Sydir, Jaroslaw; Koshy, Kamal J.; Feghali, Wajdi; Burres, Bradley A.; Wolrich, Gilbert M., Method and apparatus for aligning ciphered data.
  106. Faber, Robert W.; Traw, Brendan S.; Graunke, Gary L.; Lee, David A., Method and apparatus for authenticating an hierarchy of video receiving devices.
  107. Grauzer, Attila; Stasson, James B.; Bourbour, Feraidoon, Method and apparatus for card handling device calibration.
  108. Grauzer, Attila; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K., Method and apparatus for card handling device calibration.
  109. Ruehle, Michael Darryl, Method and apparatus for command perception by data value sequencing, allowing a bounded total amount of spurious data.
  110. Ruehle, Michael Darryl; Cosky, Jason E., Method and apparatus for command perception by data value sequencing, allowing finite amount of unrelated interim data.
  111. Baughman, Daniel G., Method and apparatus for conducting purchases in private over a network.
  112. Kurdziel, Michael Thomas, Method and apparatus for data encryption.
  113. Kurdziel, Michael Thomas, Method and apparatus for data encryption.
  114. Kurdziel, Michael Thomas, Method and apparatus for data encryption.
  115. Kurdziel,Michael Thomas, Method and apparatus for data encryption.
  116. McLean, Ivan, Method and apparatus for deterring a timing-based glitch attack during a secure boot process.
  117. Faber, Robert W.; Lee, David A.; Traw, Brendan S.; Graunke, Gary L., Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit.
  118. Faber,Robert W.; Lee,David A.; Traw,Brendan S.; Graunke,Gary L., Method and apparatus for generating pseudo random numbers in a video device having an embedded cipher unit.
  119. Sydir, Jaroslaw J.; Koshy, Kamal J.; Feghali, Wajdi; Burres, Bradley A.; Wolrich, Gilbert M., Method and apparatus for performing an authentication after cipher operation in a network processor.
  120. Sydir, Jaroslaw J.; Koshy, Kamal J.; Feghali, Wajdi; Burres, Bradley A.; Wolrich, Gilbert M., Method and apparatus for performing an authentication after cipher operation in a network processor.
  121. Sydir, Jaroslaw J.; Koshy, Kamal J.; Feghali, Wajdi; Burres, Bradley A.; Woolrich, Gilbert M., Method and apparatus for performing an authentication after cipher operation in a network processor.
  122. Faber, Robert W.; Lee, David A.; Traw, Brendan; Graunke, Gary L.; Mangold, Richard P., Method and apparatus for protected exchange of status and secret values between a video source application and a video hardware interface.
  123. Faber, Robert W.; Traw, Brendan, Method and apparatus for protecting copy control information provided to a video recording device.
  124. Sydir, Jaroslaw J.; Kuo, Chen-Chi; Koshy, Kamal J.; Feghali, Wajdi; Burres, Bradley A.; Wolrich, Gilbert M., Method and apparatus for scheduling the processing of commands for execution by cryptographic algorithm cores in a programmable network processor.
  125. Sydir,Jaroslaw J.; Kuo,Chen Chi; Koshy,Kamal J.; Feghali,Wajdi; Burres,Bradley A.; Wolrich,Gilbert M., Method and apparatus for scheduling the processing of commands for execution by cryptographic algorithm cores in a programmable network processor.
  126. Kean,Thomas A., Method and apparatus for secure configuration of a field programmable gate array.
  127. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  128. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  129. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  130. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  131. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  132. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  133. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  134. Mittal, Millind, Method and apparatus for secure execution using a secure memory partition.
  135. Mittal,Millind, Method and apparatus for secure execution using a secure memory partition.
  136. Schwartzman, Sharon; Schieber, Ami; Inbar, Victoria, Method and apparatus for selection of authentication servers based on the authentication mechanisms in supplicant attempts to access network resources.
  137. Sampson, David E.; Forte, Steven L., Method and apparatus for shuffling and handling cards.
  138. Lee,David A., Method and apparatus for the generation of cryptographic keys.
  139. Grauzer, Attila; Lopez, David B., Method and apparatus for using upstream communication in a card shuffler.
  140. Grauzer, Attila; Lopez, David B., Method and apparatus for using upstream communication in a card shuffler.
  141. Grauzer, Attila; Lopez, David B., Method and apparatus for using upstream communication in a card shuffler.
  142. Sarfati,Jean Claude; Chau,Herv��, Method and device for authenticating digital data by means of an authentication extension module.
  143. Hill, Michael John; Sasselli, Marco; Nicolas, Christophe, Method and device for guaranteeing the integrity and authenticity of a set of data.
  144. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  145. Rice, John R.; Atallah, Mikhail J., Method and system for secure computational outsourcing and disguise.
  146. Atallah, Mikhail J.; Chang, Hoi, Method and system for tamperproofing software.
  147. Jakubowski,Mariusz H.; Venkatesan,Ramarathnam, Method and system for using a portion of a digital good as a substitution box.
  148. Katayama,Hiroshi, Method for decoding an MPEG picture stream.
  149. Walton, Charles; Lerch, Matthias, Method for managing memory space in a secure non-volatile memory of a secure element.
  150. Crosson Smith,Steven A., Method for remotely authorizing a payment transaction file over an open network.
  151. Sampson, David E.; Forte, Steven L., Method for shuffling and dealing cards.
  152. Jahnich, Michael; Wueppenhorst, Guido; Doppmeler, Werner, Method for the execution of an encryption program for the encryption of data in a microprocessor-based portable data carrier.
  153. Scheper, Paul K.; Grauzer, Attila; Kelly, James V.; Stasson, James B.; Swanson, Ronald R.; Bourbour, Feraidoon; Nelson, Troy D.; Lopez, David B.; Yoseloff, Mark L.; Dunn, R. Brooke; Krenn, Peter; Blaha, Ernst, Method of readying a card shuffler.
  154. Kean,Thomas A., Method of using a mask programmed key to securely configure a field programmable gate array.
  155. Shibata, Osamu; Yugawa, Taihei; Sekibe, Tsutomu; Hirota, Teruto; Saito, Yoshiyuki; Otake, Toshihiko, Method, apparatus and system for performing authentication according to challenge-response protocol using scrambled access information.
  156. Herz, Erik; Uhl, Douglas, Methods and apparatus for collaboration.
  157. Czyzewski, Zbigniew; Zvercov, Vladislav; Grauzer, Attila, Methods and apparatuses for an automatic card handling device and communication networks including same.
  158. Wallentin, Pontus; Gunnarsson, Fredrik, Methods and devices for addressing device to device communications.
  159. Dewan, Prashant; Durham, David, Methods and systems to directly render an image and correlate corresponding user input in a secure memory domain.
  160. Kelly, James V.; Zvercov, Vladislav; Miller, Brian, Methods for automatically generating a card deck library and master images for a deck of cards, and a related card processing apparatus.
  161. Hessing, Lynn; Mahoney, Daniel J.; Blad, Steven J.; Baker, Thompson A., Methods for handling playing cards with a card handling device.
  162. Grauzer, Attila; Scheper, Paul K.; Swanson, Ronald R., Methods for shuffling cards and rack assemblies for use in automatic card shufflers.
  163. Grauzer, Attila; Bourbour, Feraidoon; Nelson, Troy D.; Rynda, Robert J.; Scheper, Paul K.; Stasson, James B.; Swanson, Ronald R., Methods of randomizing cards.
  164. Hashimoto, Mikio; Fujimoto, Kensaku; Shirakawa, Kenji, Microprocessor with improved task management and table management mechanism.
  165. Hashimoto,Mikio; Fujimoto,Kensaku; Shirakawa,Kenji, Microprocessor with improved task management and table management mechanism.
  166. Hegg, Joel C.; Sriram, Siddharth; Talreja, Kamlesh T., Modular device authentication framework.
  167. Le Quere,Patrick, Module for secure management of digital date by encryption/decryption and/or signature/verification of signature which can be used for dedicated servers.
  168. He, Miao; Ren, Changrui; Shao, Bing; Tong, Yue, Monitoring actions performed by a network of peer devices using a blockchain.
  169. Grauzer, Atilla; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K., Multiple mode card shuffler and card reading device.
  170. Grauzer, Atilla; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K., Multiple mode card shuffler and card reading device.
  171. Grauzer, Attila; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K.; Nelson, Troy D., Multiple mode card shuffler and card reading device.
  172. Grauzer, Attila; Schubert, Oliver M.; Kelly, James V.; Stasson, James B.; Bourbour, Feraidoon; Scheper, Paul K.; Nelson, Troy D., Multiple mode card shuffler and card reading device.
  173. Wall, William E.; Russ, Samuel H., Multiroom point of deployment module.
  174. Claussen, Paul J., Networked multimedia overlay system.
  175. Russ, Samuel H.; Lett, David B.; Robinson, Jonathan A.; Gaul, Michael A., Networked subscriber television distribution.
  176. Russ, Samuel H.; Lett, David B.; Robinson, Jonathan A.; Gaul, Michael A., Networked subscriber television distribution.
  177. Figueira, Norival R., Networking device and method for making cyclic redundancy check (CRC) immune to scrambler error duplication.
  178. Schneider, James Paul, Non-linear mixing of pseudo-random number generator output.
  179. Schneider, James P., Nonlinear feedback mode for block ciphers.
  180. Robertson, Neil C.; Fernandez, Jose M., Optimization of a full duplex wideband communications system.
  181. Robertson,Neil C.; Fernandez,Jose M., Optimization of a full duplex wideband communications system.
  182. Huynh,Dung Le; Brouwer,Roger J., Packet Processor.
  183. Mantin, Itsik; Hibshoosh, Eliphaz, Plaintext injection attack protection.
  184. Stasson, James B., Playing card handling devices including shufflers.
  185. Haushalter, Todd M.; Wadds, Nathan J., Playing card handling devices, systems, and methods for verifying sets of cards.
  186. Haushalter, Todd M.; Wadds, Nathan J., Playing card handling devices, systems, and methods for verifying sets of cards.
  187. Sines, Randy D., Playing card shuffler.
  188. Sines, Randy D., Playing card shuffler.
  189. Sines, Randy D., Playing card shufflers and related methods.
  190. Rynda, Robert J.; Bourbour, Feraidoon; Swanson, Ronald R.; Grauzer, Attila, Playing card shuffling devices and related methods.
  191. Macchetti, Marco; Kudelski, Henri, Processor-implemented method for ensuring software integrity.
  192. Claussen, Paul J.; Nair, Ajith N.; Russ, Samuel H., Proximity detection using wireless connectivity in a communications system.
  193. Pickles, Stephen Charles, Randomizing current consumption in memory devices.
  194. Pickles, Stephen Charles, Randomizing current consumption in memory devices.
  195. Buer, Mark Leonard, Secure cache for instruction and data protection.
  196. Atallah, Mikhail J.; Rice, John R.; Spafford, Eugene H.; Pantazopoulos, Kostas N., Secure computational outsourcing techniques.
  197. Jakobsson, Bjorn Markus; Wetzel, Susanne Gudrun, Secure distributed computation in cryptographic applications.
  198. Ludloff, Christian; Daverman, Kurt; Morgan, Andrew, Secure memory access system and method.
  199. Ludloff,Christian; Daverman,Kurt; Morgan,Andrew, Secure memory access system and method.
  200. Morgan, Andrew; Ludloff, Christian; Daverman, Kurt, Secure memory access system and method.
  201. Okaue, Takumi; Kihara, Nobuyuki; Yokota, Teppei, Security memory card compatible with secure and non-secure data processing systems.
  202. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  203. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  204. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  205. Stewart, Roger Green; Paley, Daniel Noah, Security system and method.
  206. Schwartzman, Sharon; Schieber, Ami; Inbar, Victoria, Selection of authentication servers based on authentication mechanisms in supplicant attempts to access network resources.
  207. Ulf Carlsen NO; Hakon Hammerstad NO, Sequence numbering mechanism to ensure execution order integrity of inter-dependent smart card applications.
  208. Stasson, James B.; Swanson, Ronald R.; Scheper, Paul K.; Nelson, Troy D.; Bourbour, Feraidoon; Grauzer, Attila, Shuffler and method of shuffling cards.
  209. Krenn, Peter; Blaha, Ernst, Shuffling devices including one or more sensors for detecting operational parameters and related methods.
  210. Kaabouch, Majid; Le Cocquen, Eric; Parlange, Dominique, Software execution randomization.
  211. Wecker,David Brian, Software-generated machine identifier.
  212. Merry, David E.; Diggs, Mark; Drossel, Gary A.; Hajeck, Michael J., Solid-state storage subsystem security solution.
  213. Ananth,Viswanath, State-varying hybrid stream cipher.
  214. Adams Donald E. ; Cohn Robert S., Storage device capacity management.
  215. Yasuhiro Nakamura JP; Hideko Ueno JP; Era Satoshi JP, Storage system, storage device, storage medium controller, access device, method for protecting data, storage medium and computer data signal.
  216. Graunke, Gary L.; Lee, David A.; Faber, Robert W., Stream cipher having a shuffle network combiner function.
  217. Daemen, Joan; Guillemin, Pierre; Anguille, Claude; Bardouillet, Michel; Liardet, Pierre-Yvan; Teglia, Yannick, Stream ciphering of the content of a memory external to a processor.
  218. Taunton, Mark; Dobson, Timothy Martin, System and method for bit-reversing and scrambling payload bytes in an asynchronous transfer mode cell.
  219. Taunton, Mark; Dobson, Timothy Martin, System and method for de-scrambling and bit-order-reversing payload bytes in an Asynchronous Transfer Mode cell.
  220. Taunton, Mark; Dobson, Timothy Martin, System and method for generating header error control byte for Asynchronous Transfer Mode cell.
  221. Chang, Hoi; Kerschbaum, Florian; Faulkner, Kyle; M'Raïhi, David; Mehlberg, Michael Joseph, System and method for inserting security mechanisms into a software program.
  222. Hamilton, Neil; Bourdon, François; Borza, Michael, System and method for multichannel cryptographic processing.
  223. Stull, Edward L.; Lentz, Robert J.; Lang, George, System and method for obfuscation of data across an enterprise.
  224. Wadds, Nathan; Helsen, Collin; Czyzewski, Zbigniew; Helgesen, James; Marsden, Russ, System for billing usage of a card handling device.
  225. Arai, Yuko; Suzuki, Takayuki; Karibe, Tomoyuki; Shinohara, Hiroki; Hikita, Hiroyuki, System for downloading computer software with broadcasting program.
  226. Castagna, Brandon Matthew, System for multiplexing and demultiplexing blockchain ledgers via a cryptographic hash.
  227. Morgan, Andrew; Anvin, H. Peter, System with secure cryptographic capabilities using a hardware specific digital secret.
  228. Ramasamy, Arul Selvan; Sudhaker, Gosukonda Naga Venkata Satya, Systems and methods for encrypting data.
  229. Davies, David B.; Russ, Samuel H.; Krantzler, Irvan J., Systems and methods for operating a peripheral record playback device in a networked multimedia system.
  230. Patel,Baiju V.; Elzur,Uri, Technique and apparatus for processing cryptographic services of data in a network system.
  231. Clifford, Thomas; Malhotra, Gaurav, Techniques for providing multiplexed data for backup.
  232. Thibadeau, Robert H., Versatile access control system.
  233. Thibadeau, Robert H., Versatile secure and non-secure messaging.
  234. Arsenault, Robert G.; Stanger, Leon J., Virtual video on demand using multiple encrypted video segments.
  235. Lenoir, Petrus Johannes; Talstra, Johan Cornelis; Linnartz, Johan Paul Marie Gerard, Watermark detector.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로