Patents for H04L 9 - Arrangements for secret or secure communication (111,914) |
---|
08/15/2013 | WO2013120100A1 Method, apparatus, and computer-readable medium for content access authorization |
08/15/2013 | WO2013119967A1 Systems and methods for password-free authentication |
08/15/2013 | WO2013119747A1 Method and system for managing digital rights for content |
08/15/2013 | WO2013119739A1 Mobile human challenge-response test |
08/15/2013 | WO2013119353A1 Data leakage prevention for cloud and enterprise networks |
08/15/2013 | WO2013119238A1 Repeatable application-specific encryption key derivation using a hidden root key |
08/15/2013 | WO2013116928A1 Method and system for a certificate-less authentication encryption (clae) |
08/15/2013 | WO2013116916A1 System and method for generating and protecting cryptographic keys |
08/15/2013 | WO2013086043A3 Data exchange via authenticated router |
08/15/2013 | US20130212696 Apparatuses, systems, and methods for renewability with digital content protection systems |
08/15/2013 | US20130212405 Secure data parser method and system |
08/15/2013 | US20130212401 Methods and devices for authentication and data encryption |
08/15/2013 | US20130212400 Double authentication for controlling disruptive operations on storage resources |
08/15/2013 | US20130212398 Method and system for validating a device that uses a dynamic identifier |
08/15/2013 | US20130212396 Methods and Systems for State Synchronization Over a Non-Reliable Network Using Signature Processing |
08/15/2013 | US20130212395 Monitoring and controlling access to electronic content |
08/15/2013 | US20130212393 Securing a secret of a user |
08/15/2013 | US20130212392 Key management on device for perimeters |
08/15/2013 | US20130212391 Elliptic curve cryptographic signature |
08/15/2013 | US20130212390 Method and system for authenticating entity based on symmetric encryption algorithm |
08/15/2013 | US20130212389 Enterprise computer investigation system |
08/15/2013 | US20130212388 Providing trustworthy workflow across trust boundaries |
08/15/2013 | US20130212386 Storage Access Authentication Mechanism |
08/15/2013 | US20130212385 Utilization of a protected module to prevent offline dictionary attacks |
08/15/2013 | US20130212380 Securely upgrading or downgrading platform components |
08/15/2013 | US20130212377 Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption |
08/15/2013 | US20130212374 Method for identifying a device used by a hacked terminal, and related device |
08/15/2013 | US20130212014 Disaster-relief cards |
08/15/2013 | US20130211859 Devices and methods for disaster-relief support |
08/15/2013 | US20130211622 Hashed Strings for Machine-to-Machine Communication Based on Time and Secret Strings |
08/15/2013 | US20130208894 Cryptographic key distribution system |
08/15/2013 | US20130208893 Sharing secure data |
08/15/2013 | US20130208892 Computer system and computer system control method |
08/15/2013 | US20130208886 Method of preventing fault-injection attacks on chinese remainder theorem-rivest shamir adleman cryptographic operations and recording medium for storing program implementing the same |
08/14/2013 | EP2627095A1 Device and method for partial encryption |
08/14/2013 | EP2627030A1 Ciphering between a CDMA network and a GSM network |
08/14/2013 | EP2626807A1 Two- factor user authentication system, and method therefor |
08/14/2013 | EP2626806A1 Offline two- factor user authentication system, method thereforthereof, and program thereforthereof |
08/14/2013 | EP2625820A1 Private data sharing system |
08/14/2013 | EP2625819A1 System and method for securing wireless communications |
08/14/2013 | EP2625818A1 Public key encryption system based on the quadratic residuosity assumption |
08/14/2013 | EP2625817A2 Apparatus and method for the detection of attacks taking control of the single photon detectors of a quantum cryptography apparatus by randomly changing their efficiency |
08/14/2013 | EP2625645A2 Secure deployment of provable identity for dynamic application environments |
08/14/2013 | EP2625640A1 Physical unclonable function with improved start-up behavior |
08/14/2013 | DE102012101091A1 Method for processing non-cash transaction in communication network, involves performing payment transaction after receiving acknowledgment message comprising customer password from other terminal |
08/14/2013 | DE102008053354B4 Vorrichtung und Verfahren zur Freigabe von lokalen Dateninhalten für einen IP-basierten Datenzugriff, zugehöriges Kommunikationssystem, digitales Speichermedium, Computer-Programm-Produkt und Computer-Programm Apparatus and method for enabling local data content for an IP-based data access, associated communication system, digital storage media, computer program product and computer program |
08/14/2013 | CN203135902U Portable anti-disassembly dynamic token |
08/14/2013 | CN203135901U Encryption equipment management device |
08/14/2013 | CN203135889U Encryption and decryption module quasi dynamic synchronous control device of strong dispersion secrecy optical communication system |
08/14/2013 | CN1764104B Data coding system and method |
08/14/2013 | CN103250441A Method and apparatus for provisioning temporary identity module using a key-sharing scheme |
08/14/2013 | CN103250440A Privacy control for wireless devices |
08/14/2013 | CN103250372A Obtaining a control word to reveal a client device identity |
08/14/2013 | CN103250172A Information processing apparatus, server, information processing system and information processing method |
08/14/2013 | CN103249037A Low-power multi-standard cryptography processing units with common flip-flop/register banks |
08/14/2013 | CN103248854A Medical image encryption method based on uniform scrambling and chaotic mapping |
08/14/2013 | CN103248791A Secrete fax method and device based on information hiding technology |
08/14/2013 | CN103248768A Realization method for card punching system using cellphone |
08/14/2013 | CN103248767A Mobile phone |
08/14/2013 | CN103248726A Analytic method for multi-root peer-to-peer identity of internet of things |
08/14/2013 | CN103248553A Mail encryption method, mail decryption method and clients |
08/14/2013 | CN103248495A In-app paying method, server, client side and system |
08/14/2013 | CN103248492A Verifiable distributed private data comparing and sequencing method |
08/14/2013 | CN103248491A Method and system for backing up electronic signed token private key |
08/14/2013 | CN103248490A Method and system for backing-up information in electronic signature token |
08/14/2013 | CN103248489A Method for realizing client login through intelligent terminal, server and intelligent terminal |
08/14/2013 | CN103248488A Identity-based key generation method and identity-based authentication method |
08/14/2013 | CN103248487A Near field communication authentication method, certificate authorization center and near field communication equipment |
08/14/2013 | CN103248486A Conversion device and display system |
08/14/2013 | CN103248485A Security label-based power secondary system access control method and system |
08/14/2013 | CN103248484A Door access control system and method |
08/14/2013 | CN103248483A Real-name authentication apparatus |
08/14/2013 | CN103248482A Method and device for generation of secret key |
08/14/2013 | CN103248481A Open-end API (application program interface) public license access control method based on digital application signature certification |
08/14/2013 | CN103248480A Method and system for encrypting, saving and verifying account data |
08/14/2013 | CN103248479A Cloud storage safety system, data protection method and data sharing method |
08/14/2013 | CN103248478A Multi-party security agreement based sealed electric auction scheme and verification method |
08/14/2013 | CN103248477A Dynamic encryption method and device |
08/14/2013 | CN103248476A Data encryption key management method, system and terminal |
08/14/2013 | CN103248475A Transmission method and device for quantum secret key provided with high light coding function |
08/14/2013 | CN103248474A Encryption and decryption method and device for streaming media |
08/14/2013 | CN103248473A Dual-parameter constant-Lyapunov-exponent four-dimensional autonomous super-chaos system |
08/14/2013 | CN103248472A Operation request processing method and system and attack identification device |
08/14/2013 | CN103246863A Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes |
08/14/2013 | CN103246842A Methods and devices for authentication and data encryption |
08/14/2013 | CN102300182B Short-message-based authentication method, system and device |
08/14/2013 | CN102271041B Root service system for personal identity authentication |
08/14/2013 | CN102195771B Security protocol analysis method and device |
08/14/2013 | CN102098318B Method for performing end-to-end anonymity safety communication of hop network |
08/14/2013 | CN102035802B Authentication control method, authentication server and system |
08/14/2013 | CN101998405B WLAN access authentication based method for accessing services |
08/14/2013 | CN101969638B Method for protecting international mobile subscriber identity (IMSI) in mobile communication |
08/14/2013 | CN101938563B Protection method, system and mobile terminal of SIM card information |
08/14/2013 | CN101933271B Method and system for secure block acknowledgment (block ack) with protected MAC sequence number |
08/14/2013 | CN101931631B Method for digital signatures capable of establishing reliable correspondence with handwritten signatures |
08/14/2013 | CN101833676B Method for controlling reading and writing of intelligent card with USBKEY module and reader thereof |
08/14/2013 | CN101803272B Authentication system and method |
08/14/2013 | CN101626502B Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method |
08/14/2013 | CN101582125B Communication device, communication method, reader/writer, and communication system |
08/13/2013 | US8510860 Local storage of information pedigrees |