Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
08/2013
08/15/2013WO2013120100A1 Method, apparatus, and computer-readable medium for content access authorization
08/15/2013WO2013119967A1 Systems and methods for password-free authentication
08/15/2013WO2013119747A1 Method and system for managing digital rights for content
08/15/2013WO2013119739A1 Mobile human challenge-response test
08/15/2013WO2013119353A1 Data leakage prevention for cloud and enterprise networks
08/15/2013WO2013119238A1 Repeatable application-specific encryption key derivation using a hidden root key
08/15/2013WO2013116928A1 Method and system for a certificate-less authentication encryption (clae)
08/15/2013WO2013116916A1 System and method for generating and protecting cryptographic keys
08/15/2013WO2013086043A3 Data exchange via authenticated router
08/15/2013US20130212696 Apparatuses, systems, and methods for renewability with digital content protection systems
08/15/2013US20130212405 Secure data parser method and system
08/15/2013US20130212401 Methods and devices for authentication and data encryption
08/15/2013US20130212400 Double authentication for controlling disruptive operations on storage resources
08/15/2013US20130212398 Method and system for validating a device that uses a dynamic identifier
08/15/2013US20130212396 Methods and Systems for State Synchronization Over a Non-Reliable Network Using Signature Processing
08/15/2013US20130212395 Monitoring and controlling access to electronic content
08/15/2013US20130212393 Securing a secret of a user
08/15/2013US20130212392 Key management on device for perimeters
08/15/2013US20130212391 Elliptic curve cryptographic signature
08/15/2013US20130212390 Method and system for authenticating entity based on symmetric encryption algorithm
08/15/2013US20130212389 Enterprise computer investigation system
08/15/2013US20130212388 Providing trustworthy workflow across trust boundaries
08/15/2013US20130212386 Storage Access Authentication Mechanism
08/15/2013US20130212385 Utilization of a protected module to prevent offline dictionary attacks
08/15/2013US20130212380 Securely upgrading or downgrading platform components
08/15/2013US20130212377 Method and System for a Certificate-less Authenticated Encryption Scheme Using Identity-based Encryption
08/15/2013US20130212374 Method for identifying a device used by a hacked terminal, and related device
08/15/2013US20130212014 Disaster-relief cards
08/15/2013US20130211859 Devices and methods for disaster-relief support
08/15/2013US20130211622 Hashed Strings for Machine-to-Machine Communication Based on Time and Secret Strings
08/15/2013US20130208894 Cryptographic key distribution system
08/15/2013US20130208893 Sharing secure data
08/15/2013US20130208892 Computer system and computer system control method
08/15/2013US20130208886 Method of preventing fault-injection attacks on chinese remainder theorem-rivest shamir adleman cryptographic operations and recording medium for storing program implementing the same
08/14/2013EP2627095A1 Device and method for partial encryption
08/14/2013EP2627030A1 Ciphering between a CDMA network and a GSM network
08/14/2013EP2626807A1 Two- factor user authentication system, and method therefor
08/14/2013EP2626806A1 Offline two- factor user authentication system, method thereforthereof, and program thereforthereof
08/14/2013EP2625820A1 Private data sharing system
08/14/2013EP2625819A1 System and method for securing wireless communications
08/14/2013EP2625818A1 Public key encryption system based on the quadratic residuosity assumption
08/14/2013EP2625817A2 Apparatus and method for the detection of attacks taking control of the single photon detectors of a quantum cryptography apparatus by randomly changing their efficiency
08/14/2013EP2625645A2 Secure deployment of provable identity for dynamic application environments
08/14/2013EP2625640A1 Physical unclonable function with improved start-up behavior
08/14/2013DE102012101091A1 Method for processing non-cash transaction in communication network, involves performing payment transaction after receiving acknowledgment message comprising customer password from other terminal
08/14/2013DE102008053354B4 Vorrichtung und Verfahren zur Freigabe von lokalen Dateninhalten für einen IP-basierten Datenzugriff, zugehöriges Kommunikationssystem, digitales Speichermedium, Computer-Programm-Produkt und Computer-Programm Apparatus and method for enabling local data content for an IP-based data access, associated communication system, digital storage media, computer program product and computer program
08/14/2013CN203135902U Portable anti-disassembly dynamic token
08/14/2013CN203135901U Encryption equipment management device
08/14/2013CN203135889U Encryption and decryption module quasi dynamic synchronous control device of strong dispersion secrecy optical communication system
08/14/2013CN1764104B Data coding system and method
08/14/2013CN103250441A Method and apparatus for provisioning temporary identity module using a key-sharing scheme
08/14/2013CN103250440A Privacy control for wireless devices
08/14/2013CN103250372A Obtaining a control word to reveal a client device identity
08/14/2013CN103250172A Information processing apparatus, server, information processing system and information processing method
08/14/2013CN103249037A Low-power multi-standard cryptography processing units with common flip-flop/register banks
08/14/2013CN103248854A Medical image encryption method based on uniform scrambling and chaotic mapping
08/14/2013CN103248791A Secrete fax method and device based on information hiding technology
08/14/2013CN103248768A Realization method for card punching system using cellphone
08/14/2013CN103248767A Mobile phone
08/14/2013CN103248726A Analytic method for multi-root peer-to-peer identity of internet of things
08/14/2013CN103248553A Mail encryption method, mail decryption method and clients
08/14/2013CN103248495A In-app paying method, server, client side and system
08/14/2013CN103248492A Verifiable distributed private data comparing and sequencing method
08/14/2013CN103248491A Method and system for backing up electronic signed token private key
08/14/2013CN103248490A Method and system for backing-up information in electronic signature token
08/14/2013CN103248489A Method for realizing client login through intelligent terminal, server and intelligent terminal
08/14/2013CN103248488A Identity-based key generation method and identity-based authentication method
08/14/2013CN103248487A Near field communication authentication method, certificate authorization center and near field communication equipment
08/14/2013CN103248486A Conversion device and display system
08/14/2013CN103248485A Security label-based power secondary system access control method and system
08/14/2013CN103248484A Door access control system and method
08/14/2013CN103248483A Real-name authentication apparatus
08/14/2013CN103248482A Method and device for generation of secret key
08/14/2013CN103248481A Open-end API (application program interface) public license access control method based on digital application signature certification
08/14/2013CN103248480A Method and system for encrypting, saving and verifying account data
08/14/2013CN103248479A Cloud storage safety system, data protection method and data sharing method
08/14/2013CN103248478A Multi-party security agreement based sealed electric auction scheme and verification method
08/14/2013CN103248477A Dynamic encryption method and device
08/14/2013CN103248476A Data encryption key management method, system and terminal
08/14/2013CN103248475A Transmission method and device for quantum secret key provided with high light coding function
08/14/2013CN103248474A Encryption and decryption method and device for streaming media
08/14/2013CN103248473A Dual-parameter constant-Lyapunov-exponent four-dimensional autonomous super-chaos system
08/14/2013CN103248472A Operation request processing method and system and attack identification device
08/14/2013CN103246863A Identifying system and identifying method for interactive anti-counterfeiting based on identifying codes
08/14/2013CN103246842A Methods and devices for authentication and data encryption
08/14/2013CN102300182B Short-message-based authentication method, system and device
08/14/2013CN102271041B Root service system for personal identity authentication
08/14/2013CN102195771B Security protocol analysis method and device
08/14/2013CN102098318B Method for performing end-to-end anonymity safety communication of hop network
08/14/2013CN102035802B Authentication control method, authentication server and system
08/14/2013CN101998405B WLAN access authentication based method for accessing services
08/14/2013CN101969638B Method for protecting international mobile subscriber identity (IMSI) in mobile communication
08/14/2013CN101938563B Protection method, system and mobile terminal of SIM card information
08/14/2013CN101933271B Method and system for secure block acknowledgment (block ack) with protected MAC sequence number
08/14/2013CN101931631B Method for digital signatures capable of establishing reliable correspondence with handwritten signatures
08/14/2013CN101833676B Method for controlling reading and writing of intelligent card with USBKEY module and reader thereof
08/14/2013CN101803272B Authentication system and method
08/14/2013CN101626502B Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method
08/14/2013CN101582125B Communication device, communication method, reader/writer, and communication system
08/13/2013US8510860 Local storage of information pedigrees