Patents for G09C 1 - Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system (12,544) |
---|
08/17/2000 | CA2362879A1 System for automated comprehensive remote servicing for media information |
08/17/2000 | CA2361378A1 Media distribution system |
08/16/2000 | EP1028401A2 Method and system for performing a bankcard transaction |
08/16/2000 | EP1027784A1 Method for digital signing of a message |
08/16/2000 | EP0861539A4 Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions |
08/16/2000 | CN1263331A Product protecting system for processing digital product contents |
08/16/2000 | CN1263305A Digital data file scrambler and its method |
08/15/2000 | US6105134 Verification of the source of program information in a conditional access system |
08/15/2000 | US6105013 Method, apparatus, system and firmware for secure transactions |
08/15/2000 | US6105012 Security system and method for financial institution server and client web browser |
08/15/2000 | US6104811 Cryptographically secure pseudo-random bit generator for fast and secure encryption |
08/15/2000 | US6102287 Method and apparatus for providing product survey information in an electronic payment system |
08/10/2000 | WO2000046954A1 Method and apparatus for generating encryption stream ciphers |
08/10/2000 | WO2000046953A1 Method for protecting an electronic cryptographic set with secret key against cryptanalytical attack |
08/10/2000 | WO2000046947A2 Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message using specific prime factors |
08/10/2000 | WO2000046946A2 Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message |
08/10/2000 | CA2361627A1 Method, system, device for proving the authenticity of an entity and/or the integrity and/or the authenticity of a message |
08/09/2000 | EP1026854A2 Method and system for analyzing the content of encrypted electronic data |
08/09/2000 | EP1026852A2 Show-thru prevention and user authentication of uplink bursts without overhead |
08/09/2000 | EP1025674A1 Signature verification for elgamal schemes |
08/09/2000 | EP1025673A1 Accelerated signature verification on an elliptic curve |
08/09/2000 | EP1025671A1 Virtual matrix encryption (vme) and virtual key cryptographic method and apparatus |
08/09/2000 | EP1025498A1 Method and apparatus for targeting a digital information playback device |
08/09/2000 | CN1262830A Pseudo-random generator based on hash coding function for cryptographic systems requiring random drawing |
08/09/2000 | CN1262754A Computer memory organization |
08/09/2000 | CN1262563A Method, apparatus and communication system for exchanging message in all over environment |
08/09/2000 | CN1262509A Method and device for making watermark without clear print |
08/09/2000 | CN1055341C Copy-proof chaos software security card |
08/08/2000 | US6101543 Pseudo network adapter for frame capture, encapsulation and encryption |
08/08/2000 | US6101255 Programmable cryptographic processing system and method |
08/03/2000 | WO2000045550A2 Method for proving the authenticity or integrity of a message by means of a public exponent equal to the power of two |
08/03/2000 | WO2000045549A1 Authenticating or signature method with reduced computations |
08/03/2000 | WO2000045548A1 Public key cryptograph and key sharing method |
08/03/2000 | WO2000045546A2 Multiple level public key hierarchy for performance and high security |
08/03/2000 | WO2000045539A1 Key management for telephone calls to protect signaling and call packets between cta's |
08/03/2000 | WO2000045273A1 Authentication enforcement using decryption and authentication in a single transaction in a secure microprocessor |
08/03/2000 | WO2000045241A2 Self-generation of certificates using a secure microprocessor in a device for transferring digital information |
08/03/2000 | WO1999035781A3 Method for generating asymmetrical cryptographic keys by the user |
08/03/2000 | DE19903105A1 Verfahren zur Sicherung des Zugangs zu einer Datenverarbeitungseinrichtung und entsprechende Vorrichtung Method for securing access to a data processing device and corresponding device |
08/03/2000 | CA2361053A1 Reliance manager for electronic transaction system |
08/03/2000 | CA2360954A1 Method for proving the authenticity of an entity and/or the integrity of a message by means of a public exponent equal to the power of two |
08/03/2000 | CA2360781A1 Key management for telephone calls to protect signaling and call packets between cta's |
08/03/2000 | CA2359685A1 Authentication enforcement using decryption and authentication in a single transaction in a secure microprocessor |
08/02/2000 | EP1024626A1 Method, apparatus, and communication system for exchange of information in pervasive environments |
08/02/2000 | EP1023794A1 System for detecting unauthorized account access |
08/02/2000 | CN1262007A Auto-recoverable auto-certifiable cryptosystems |
08/02/2000 | CA2296967A1 Show-thru prevention and user authentication of uplink bursts without overhead |
08/01/2000 | US6098172 Methods and apparatus for a computer network firewall with proxy reflection |
08/01/2000 | US6097818 Data copyright management method |
07/27/2000 | WO2000027069A3 Incorporating shared randomness into distributed cryptography |
07/27/2000 | WO2000004717A9 A conditional access system for broadcast digital television |
07/27/2000 | DE19902722A1 Verfahren zum Austauschen von mindestens einem geheimen Anfangswert zwischen einer Bearbeitungsstation und einer Chipkarte A method for exchanging at least one secret initial value between a processing station and a smart card |
07/27/2000 | DE19901204A1 Verfahren zur Realisierung von Mehrfach-Punktcodes in einer Vermittlungsstelle A process for the realization of multiple point codes in a switching center |
07/26/2000 | EP1022696A1 Method for the exchange of a secret initial value between a processing station and an ic-card |
07/26/2000 | EP1022685A2 Selective security level certificate meter |
07/26/2000 | CN1261172A Technology for making holographic mother plate with multi-encryption hidden rainbow |
07/25/2000 | US6094572 Method of generating a random number from a radio signal |
07/25/2000 | US6093026 Method and apparatus for administering a survey |
07/25/2000 | CA2159159C Secret-key enciphering method and arrangement therefor capable of preventing unfair acquirement of information |
07/20/2000 | WO2000042781A1 Method for implementing multipoint codes in an exchange |
07/20/2000 | WO2000042748A1 Web-based delivery of secure e-mail messages |
07/20/2000 | WO2000042734A1 Public and private key cryptographic method |
07/20/2000 | WO2000042511A1 Method and apparatus for minimizing differential power attacks on processors |
07/20/2000 | CA2357016A1 Web-based delivery of secure e-mail messages |
07/19/2000 | EP1020809A2 Electronic tender system |
07/19/2000 | EP1020049A1 Tamper resistant methods and apparatus |
07/19/2000 | EP1019888A2 Device for storing codes |
07/19/2000 | CN1260894A Payment process and system |
07/18/2000 | US6092191 Packet authentication and packet encryption/decryption scheme for security gateway |
07/18/2000 | US6092051 Secure receipt-free electronic voting |
07/18/2000 | US6091820 Method and apparatus for achieving perfect forward secrecy in closed user groups |
07/18/2000 | US6091819 Accelerating public-key cryptography by precomputing randomly generated pairs |
07/18/2000 | US6091818 Conditional access system using messages with multiple encryption keys |
07/12/2000 | EP1018239A1 Method and system for transient key digital time stamps |
07/12/2000 | EP1018237A1 Method and system of dynamic transformation of encrypted material |
07/12/2000 | EP1018078A1 Method and apparatus for protection of recorded digital data |
07/12/2000 | EP0671090A4 Method and apparatus for improved security within encrypted communication devices |
07/12/2000 | CN1260056A 访问控制系统 Access Control System |
07/12/2000 | CN1260055A Obfuscation techniques for enhancing software security |
07/11/2000 | US6088800 Encryption processor with shared memory interconnect |
07/11/2000 | US6088687 Billing procedure and system for data transmission networks |
07/11/2000 | US6088454 Key management method, encryption system, and sharing digital signature system which have hierarchies |
07/11/2000 | US6086706 Document copying deterrent method |
07/11/2000 | CA2093094C Method and apparatus for creating, supporting, and using travelling programs |
07/06/2000 | WO2000039668A1 A method for accelerating cryptographic operations on elliptic curves |
07/06/2000 | WO2000039659A1 Transmitting reviews with digital signatures |
07/06/2000 | WO1999066669A9 Block ciphers with integer multiplication, data-dependent and fixed number of rotations in each round |
07/06/2000 | DE19960977A1 Data achiving system with access check on data recall, has third party acting as manager |
07/05/2000 | EP1017223A2 System for authenticating digital data |
07/05/2000 | EP1017029A2 Portable communication device and system using the portable communication device and attachment for a portable communication device |
07/05/2000 | CN1259260A Conditional access system for set-top boxes |
07/05/2000 | CN1054245C Apparatus and method for data encrypting |
07/04/2000 | US6085320 Client/server protocol for proving authenticity |
07/04/2000 | US6085225 Information transmission system, information storing and providing apparatus, and information receiving apparatus |
07/04/2000 | US6084965 Identification scheme, digital signature scheme giving message recovery and digital signature scheme with appendix |
06/29/2000 | WO2000038382A1 Communication system and communication method |
06/29/2000 | WO2000038365A1 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys |
06/29/2000 | WO2000038157A1 Method for inserting a watermark signal into data |
06/29/2000 | DE19960769A1 Authenticating objects and object data involves encoding identification data based on interrogation of object identifier(s) together with recorded image to produce combination data |
06/29/2000 | CA2356665A1 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys |