Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
07/2013
07/03/2013CN101360029B Communication apparatus and communication parameter setting method
07/02/2013US8479301 Offline access in a document control system
07/02/2013US8479298 Method for encrypting and embedding information in a URL for content delivery
07/02/2013US8479270 Method for allocating authorization key identifier for wireless portable internet system
07/02/2013US8479261 Implementing electronic chip identification (ECID) exchange for network security
07/02/2013US8479259 Secure customer interface for web based data management
07/02/2013US8479020 Method and apparatus for providing an asymmetric encrypted cookie for product data storage
07/02/2013US8479009 Wearable time-bracketed video authentication
07/02/2013US8479008 Providing security services on the cloud
07/02/2013US8479006 Digitally signing documents using identity context information
07/02/2013US8479005 Applet, archive file generation method, archive file generation program, and archive file generation device
07/02/2013US8479003 Electronic signature validation systems and methods for asynchronous environments
07/02/2013US8479002 Electronic certificate issuance system, electronic certificate issuing device, communication device, and program therefor
07/02/2013US8479000 Information processing device, authentication system, authentication device, information processing method, information processing program, recording medium, and integrated circuit
07/02/2013US8478998 Authenticated communication using a shared unpredictable secret
07/02/2013US8478995 Method of encrypting and transferring data between a sender and a receiver using a network
07/02/2013US8478992 Methods for secure restoration of personal identity credentials into electronic devices
07/02/2013US8478989 Method and apparatus to authenticate and authorize user access to a system
07/02/2013US8478985 Determining whether to encrypt outbound traffic
07/02/2013US8478830 Method and apparatus for processing digitally signed messages to determine address mismatches
07/02/2013US8477946 Method and apparatus for protecting encryption keys in a logically partitioned computer system environment
07/02/2013US8477943 Automatic detection of wireless network type
07/02/2013US8477939 Polarization-insensitive one-way quantum key distribution receiver, transmitter/receiver system
07/02/2013US8477933 Cryptographic algorithm fault protections
07/02/2013CA2771080C Secure media path methods, systems, and architecture
07/02/2013CA2709393C Progressive video refresh slice detection
07/02/2013CA2677458C Method and system for securing communications in a metering device
07/02/2013CA2544605C Secure transfer of content to writable media
07/02/2013CA2489303C Managing secure resources in web resources that are accessed by multiple portals
07/02/2013CA2371179C Key and lock device
06/2013
06/30/2013CA2799964A1 Monitoring network performance remotely
06/28/2013CA2799514A1 Encryption system, method, and network devices
06/27/2013WO2013096952A1 Unforgeable noise-tolerant quantum tokens
06/27/2013WO2013096024A1 Techniques to store secret information for global data centers
06/27/2013WO2013095747A1 System and method for key management for issuer security domain using global platform specifications
06/27/2013WO2013095521A1 Instructions processors, methods, and systems to process blake secure hashing algorithm
06/27/2013WO2013095503A1 Method and apparatus to process sha-1 secure hashing algorithm
06/27/2013WO2013095484A1 Instructions to perform jh cryptographic hashing
06/27/2013WO2013095473A1 Systems and methods for protecting symmetric encryption keys
06/27/2013WO2013095425A1 Authentication system and method for authenticating ip communications clients at a central device
06/27/2013WO2013094056A1 Device specific information generation device and device specific information generation method
06/27/2013WO2013094018A1 Encrypted data administration device, encrypted data administration method, and encrypted data administration program
06/27/2013WO2013093373A1 Authentication method between a reader and a radio tag
06/27/2013WO2013093209A1 Automated access, key, certificate, and credential management
06/27/2013WO2013092916A1 Biometric identification using filters and by secure multipart calculation
06/27/2013WO2013092265A1 Method to protect a binary gcd computation against spa attacks
06/27/2013WO2013091840A1 Method for reading an identification document in a contactless manner
06/27/2013WO2013091407A1 Telnet command filter method and network security device and system
06/27/2013WO2013091348A1 Encryption and decryption method based on proxy, network apparatus, network device, and system
06/27/2013WO2013091198A1 Method and device supporting encrypted communication
06/27/2013WO2013040042A9 Systems and methods of performing link setup and authentication
06/27/2013WO2013039952A8 Code hopping based system with increased security
06/27/2013WO2013009280A3 Method of cryptology to authenticate, deny, and disinform
06/27/2013US20130167225 Graphical image password authentication method
06/27/2013US20130167211 Re-authentication
06/27/2013US20130167200 Techniques to store secret information for global data centers
06/27/2013US20130166918 Methods for Single Signon (SSO) Using Decentralized Password and Credential Management
06/27/2013US20130166917 Authenticated checkin via passive nfc
06/27/2013US20130166916 Dual-channel electronic signature system using image codes and related computer program product
06/27/2013US20130166915 Secure text-to-speech synthesis in portable electronic devices
06/27/2013US20130166914 Methods and systems for authenticating electronic messages using client-generated encryption keys
06/27/2013US20130166913 Encryption Device and Method
06/27/2013US20130166912 Information processing apparatus and method
06/27/2013US20130166911 Implementation process for the use of cryptographic data of a user stored in a data base
06/27/2013US20130166910 Revocable Security System and Method for Wireless Access Points
06/27/2013US20130166909 Client-Side Player File and Content License Verification
06/27/2013US20130166908 System and method of protecting data on a communication device
06/27/2013US20130166907 Trusted Certificate Authority to Create Certificates Based on Capabilities of Processes
06/27/2013US20130166906 Methods and Apparatus for Integrating Digital Rights Management (DRM) Systems with Native HTTP Live Streaming
06/27/2013US20130166903 Communication of Information between a Plurality of Network Elements
06/27/2013US20130166902 Simplified smartcard personalization method, and corresponding device
06/27/2013US20130166687 Content transmission device and network node
06/27/2013US20130166661 Social networking system capable of providing location-based notifications
06/27/2013US20130166455 Creating and using digital currency
06/27/2013US20130163764 Secure dynamic on chip key programming
06/27/2013US20130163763 PC Secure Video Path
06/27/2013US20130163759 Quantum key distribution method and apparatus
06/27/2013US20130163758 Methods and Apparatus for Key Delivery in HTTP Live Streaming
06/27/2013US20130163757 Method and apparatus for connection to virtual private networks for secure transactions
06/27/2013US20130163755 Protection method, decryption method, player, storage medium, and encryption apparatus of digital content
06/27/2013US20130163754 Information distribution system and program for the same
06/27/2013US20130163753 Key creation and rotation for data encryption
06/27/2013US20130163752 Apparatus and method for generating group key using status of wireless channel
06/27/2013US20130163751 Method for Determining the Cofactor of an Elliptic Curve, Corresponding Electronic Component and Computer Program Product
06/27/2013US20130162393 Systems and methods for access control
06/27/2013DE102011122273A1 Vorrichtung und Verfahren zum Erzeugen von digitalen Bildern Apparatus and method for generating digital images
06/27/2013DE102011122031A1 Political science, association-technical, work-technical, electronic selection process securing method, involves decrypting data set for evaluating selection information of voter by voting evaluation instance
06/27/2013DE102011089887A1 Method for assisting driver during operation of motor car, involves transmitting and storing information describing type of operating information, information identifying driver and information identifying car in external data memory
06/27/2013DE102011089525A1 Method for activating access to confidential data of mobile data processing unit e.g. laptop, involves deactivating access to confidential data when distance between processing and authentification units exceeds determined threshold value
06/27/2013DE102011089459A1 Verfahren und Vorrichtung zum Bereitstellen einer Zieldatei für eine Zielperson A method and apparatus for providing a destination file for a target person
06/27/2013DE102011016106A1 Device for real-time secure encryption of data stream for providing authenticated confidential communication between network nodes, has module including storage unit for storing digital key data and interfaces for data communication
06/27/2013DE102006022960B9 Verfahren zum Verschlüsseln von Eingabedaten, kryptographisches System und Computerprogrammprodukt A method of encrypting input data, cryptographic system and computer program product
06/26/2013EP2608477A1 Trusted certificate authority to create certificates based on capabilities of processes
06/26/2013EP2608447A2 Revocable security system and method for wireless access points
06/26/2013EP2608446A1 Network device in a smart grid power network and method of encrypting communication between network devices
06/26/2013EP2608445A1 Method to protect a binary GCD computation against SPA attacks
06/26/2013EP2608190A1 Secret distribution system, secret distribution device, secret distribution method, secret sorting method, secret distribution program
06/26/2013EP2608039A1 Secure low pin count scan
06/26/2013EP2606605A2 Authentication device and system
06/26/2013EP2606604A1 Encryption key management