Patents for H04L 9 - Arrangements for secret or secure communication (111,914) |
---|
08/27/2013 | US8522318 Enabling dynamic authentication with different protocols on the same port for a switch |
08/27/2013 | US8522316 Connector and method for providing access to a data-processing network for a data-processing device |
08/27/2013 | US8522315 Automatic configuration of client terminal in public hot spot |
08/27/2013 | US8522311 Authentication techniques |
08/27/2013 | US8522310 Psychometric keycard for online applications |
08/27/2013 | US8522307 Flexibly assigning security configurations to applications |
08/27/2013 | US8522201 Methods and apparatus for sub-asset modification |
08/27/2013 | US8522053 Program execution device |
08/27/2013 | US8522052 Method and integrated circuit for secure encryption and decryption |
08/27/2013 | US8522049 Secure processor for extreme outdoor temperature conditions |
08/27/2013 | US8522046 Method, apparatus and system for acquiring service by portable device |
08/27/2013 | US8522041 System and method for efficiently performing a data encryption operation |
08/27/2013 | US8522039 Method and apparatus for establishing a federated identity using a personal wireless device |
08/27/2013 | US8522036 Method for providing access control to media services |
08/27/2013 | US8522035 Assisted certificate enrollment |
08/27/2013 | US8522034 Systems and methods for transparent configuration authentication of networked devices |
08/27/2013 | US8522033 Authentication device, authentication method, program, and signature generation device |
08/27/2013 | US8522032 System and method to prevent audio watermark detection |
08/27/2013 | US8522031 Method and apparatus for establishing a trusted and secure relationship between two parties connected to a network |
08/27/2013 | US8522030 Verification and protection of genuine software installation using hardware super key |
08/27/2013 | US8522029 Secret-key exchange for wireless and sensor networks |
08/27/2013 | US8522028 Method for secure data exchange between two devices |
08/27/2013 | US8522027 Method for authenticating an entity by a verifier |
08/27/2013 | US8522025 Authenticating an application |
08/27/2013 | US8522023 Rural services platform |
08/27/2013 | US8522021 Communication channel of a device |
08/27/2013 | US8522019 Method and apparatus to create trust domains based on proximity |
08/27/2013 | US8522018 Method and system for implementing a mobile trusted platform module |
08/27/2013 | US8522017 Systems and methods for signal reduction in wireless communication |
08/27/2013 | US8522015 Authentication of binaries in memory with proxy code execution |
08/27/2013 | US8522014 Method and system for storing a key in a remote security module |
08/27/2013 | US8522012 Method for the application of implicit signature schemes |
08/27/2013 | US8522008 Portable security device and methods of user authentication |
08/27/2013 | US8520856 Controlling the validity period of a decryption key |
08/27/2013 | US8520853 Wireless communication device, method for wireless connection, and computer usable medium therefor |
08/27/2013 | US8520851 Wireless communication device with securely added randomness and related method |
08/27/2013 | US8520847 Split-key key-agreement protocol |
08/27/2013 | US8520846 Method and device for key generation |
08/27/2013 | US8520845 Method and apparatus for expansion key generation for block ciphers |
08/27/2013 | US8520844 Methods and apparatus for providing secure two-party public key cryptosystem |
08/27/2013 | US8520841 Algorithms for generating parameters for genus 2 hyperelliptic curve cryptography |
08/27/2013 | US8520840 System, method and computer product for PKI (public key infrastructure) enabled data transactions in wireless devices connected to the internet |
08/27/2013 | US8520839 Data transmitter with a secure and efficient signature |
08/27/2013 | CA2683230C Systems and methods for secure transaction management and electronic rights protection |
08/27/2013 | CA2561614C System and method for providing code signing services |
08/27/2013 | CA2553648C Adaptive transparent encryption |
08/27/2013 | CA2530288C Fingerprinting of data |
08/23/2013 | CA2806713A1 Apparatus and methods for content distribution to packet-enabled devices via a network bridge |
08/23/2013 | CA2769893A1 Apparatus and methods for providing content to an ip-enabled device in a content distribution network |
08/22/2013 | WO2013123490A1 Methods for dynamically constructing a service principal name and devices thereof |
08/22/2013 | WO2013123079A1 Credential management system |
08/22/2013 | WO2013123057A1 Trusted connected vehicle systems and methods |
08/22/2013 | WO2013122869A1 Sharing secure data |
08/22/2013 | WO2013122571A1 Peer to peer networking and sharing systems and methods |
08/22/2013 | WO2013120762A1 Method and device for protecting an electronic device against fault attack(s) |
08/22/2013 | WO2013120169A1 Key management on device for perimeters |
08/22/2013 | WO2013110055A8 Apparatus and methods to hide power signature in cryptographic circuits |
08/22/2013 | WO2013090211A3 Security device access |
08/22/2013 | WO2013083415A3 Soft decision error correction for memory based puf using a single enrollment |
08/22/2013 | US20130219184 Method and system for secure electronic signing |
08/22/2013 | US20130219183 VALlDATING A SYSTEM WITH MULTIPLE SUBSYSTEMS USING TRUSTED PLATFORM MODULES AND VIRTUAL PLATFORM MODULES |
08/22/2013 | US20130219182 Scalable watermark insertion for fragmented media stream delivery |
08/22/2013 | US20130219178 Media Player Security for Full Length Episodes |
08/22/2013 | US20130219174 Agile network protocol for secure communications with assured system availability |
08/22/2013 | US20130219171 Network node with network-attached stateless security offload device employing in-band processing |
08/22/2013 | US20130219167 Network node with network-attached stateless security offload device employing in-band processing |
08/22/2013 | US20130219166 Hardware based identity manager |
08/22/2013 | US20130219165 System and method for processing feedback entries received from software |
08/22/2013 | US20130219164 Cloud-based hardware security modules |
08/22/2013 | US20130218779 Dual factor digital certificate security algorithms |
08/22/2013 | US20130216044 Homomorphic evaluation including key switching, modulus switching, and dynamic noise management |
08/22/2013 | DE102013101508A1 Datenkommunikationsauthentifizierungssystem für ein Fahrzeug, Netzkopplungsvorrichtung für ein Fahrzeug, Datenkommunikationssystem für ein Fahrzeug und Datenkommunikationsvorrichtung für ein Fahrzeug Authentication data communication system for a vehicle, power coupling device for a vehicle, data communication system for a vehicle and data communications apparatus for a vehicle |
08/22/2013 | DE102012202744A1 Verfahren zur Erzeugung eines Pseudonyms mit Hilfe eines ID-Tokens A method of generating an alias using an ID-tokens |
08/22/2013 | DE102012202701A1 Verfahren zur Bearbeitung von patientenbezogenen Datensätzen A method for processing of patient related data sets |
08/22/2013 | DE102012201505B4 Authentisierungssystem für mobile Geräte zum Datenaustausch von medizinischen Daten Authentication system for mobile devices for data exchange of medical data |
08/22/2013 | DE102012003009A1 Übertragen von Datenströmen zu und von einem Sicherheitsmodul Transmitting data streams to and from a security module |
08/22/2013 | DE102010033231B4 Verfahren und Vorrichtung zur manipulationssicheren Bereitstellung eines Schlüssel-Zertifikates Method and apparatus for providing a tamper-proof key certificate |
08/22/2013 | DE102008010788B4 Verfahren zur Authentisierung und Authentifizierung von Personen und Einheiten Method for authentication and authentication of individuals and entities |
08/21/2013 | EP2629558A1 Method and system for authenticating entity based on symmetric encryption algorithm |
08/21/2013 | EP2629480A2 Designation Of Classes For Certificates And Keys |
08/21/2013 | EP2629451A1 Method and arrangement in a telecommunication system |
08/21/2013 | EP2629450A2 Key derivation |
08/21/2013 | EP2629449A2 Key derivation |
08/21/2013 | EP2629448A1 Encryption and decryption method based on proxy, network apparatus, network device, and system |
08/21/2013 | EP2629447A1 Method and device for protecting an electronic device against fault attack(s) |
08/21/2013 | EP2628329A1 Sending protected data in a communication network via an intermediate unit |
08/21/2013 | EP2628328A1 Dynamic content-based ciphering on a control channel |
08/21/2013 | EP2628124A1 A system and method of generating encryption/decryption keys and encrypting/decrypting a derivative work |
08/21/2013 | EP2628120A1 Compression and decompression techniques for drm license information delivery |
08/21/2013 | EP2628118A1 Efficient procedure for pairing medical devices for wireless communication with limited user interaction |
08/21/2013 | EP2476228B1 Technique for determining usage of encrypted media content |
08/21/2013 | EP1766852B1 Device for user identity management |
08/21/2013 | CN203151740U Random code verification system based on mobile terminal |
08/21/2013 | CN203151543U IC card intelligent water meter embedded with information security management module |
08/21/2013 | CN203151520U Electronic signing device |
08/21/2013 | CN203151519U One-time password display system |
08/21/2013 | CN203151518U Internet of things intelligent water meter embedded with information security management module |
08/21/2013 | CN203149836U Vehicle electronic identity card emitting device |
08/21/2013 | CN203149832U Vehicle electronic identity card receiving device |
08/21/2013 | CN203149650U Security payment authentication device adopting audio interface to communicate |