Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
05/2013
05/30/2013CA2797306A1 Security processing system and method for http live streaming
05/30/2013CA2796673A1 Adapter for electronic devices
05/29/2013EP2597812A1 Encryption device, decryption device, encryption method, decryption method, program, and recording medium
05/29/2013EP2597811A1 Method and system for storing large data files
05/29/2013EP2597591A2 Secure key generation
05/29/2013EP2597588A1 Information processing device, controller, certificate issuing authority, method of determining validity of revocation list, and method of issuing certificates
05/29/2013EP2596598A2 Mechanism for internal processing of content through partial authentication on secondary channel
05/29/2013EP2596597A2 Method and apparatus for managing consumption right for multimedia service
05/29/2013EP2596596A1 Automated provisioning of a network appliance
05/29/2013EP2596595A1 Method and system for secure electronic signing
05/29/2013EP2596594A2 Mechanism for partial encryption of data streams
05/29/2013EP2596593A1 Encryption device and method
05/29/2013EP2596450A2 Method of protecting a content
05/29/2013DE102011088550B4 Zugangskontrollsystem und Zugangskontrollverfahren hierfür Access control system and access control method therefor
05/29/2013DE102005033228B4 Verfahren und Sicherungssystem zur Sicherung einer Datenübertragung in einem Kommunikationssystem Method and system for securing data transmission in a communication system
05/29/2013CN202957842U Electronic certificate device and security authentication system
05/29/2013CN202957830U Distributed general false-proof system based on NFC and mobile communication
05/29/2013CN1925679B Authentication method for fast handover in a wireless local area network
05/29/2013CN1921452B Access device for preventing transmission of copyrighted content to external network and method for the same
05/29/2013CN1766771B Scalable and flexible information security for industrial automation
05/29/2013CN1713197B Method for verifying human interaction to a computer entity by way of a trusted component on a computing device or the like
05/29/2013CN103125098A System and method for facilitating protection against run-away subnet manager instances in a middleware machine environment
05/29/2013CN103124269A Bidirectional identity authentication method based on dynamic password and biologic features under cloud environment
05/29/2013CN103124257A Security alliance management method and security alliance management equipment
05/29/2013CN103124256A Trusted cryptography module and trusted computing method
05/29/2013CN103124231A Method for forwarding mail and transit server
05/29/2013CN103124215A Self-certifying method with time marks
05/29/2013CN103124214A Identity recognition method and handheld electronic device and communication system using same
05/29/2013CN103124213A Key management method of sensor network based on elliptic curve cryptography
05/29/2013CN103123707A Credit card safety payment method and system based on Internet Protocol Television (IPTV)
05/29/2013CN102185697B Solution of two-factor authentication security system
05/29/2013CN102098669B Method for preventing node attack in Ad Hoc network
05/29/2013CN102073819B Digital rights management methods
05/29/2013CN101997685B Single sign-on method, single sign-on system and associated equipment
05/29/2013CN101860528B Authentication device and authentication method
05/29/2013CN101753312B Security certification method and security certification device for power grid equipment and negative control terminal
05/29/2013CN101729554B Construction method of division protocol based on cryptology in distributed computation
05/29/2013CN101651507B Method and system for securely playing multimedia broadcast content and multimedia broadcast system
05/29/2013CN101467159B Biometric and demographic data transfer and management system and apparatus
05/29/2013CN101441529B Topic-changeable automatic network society cluster mouse
05/29/2013CN101421969B Method, system, and device for license-centric content consumption
05/29/2013CN101420300B Double factor combined public key generating and authenticating method
05/29/2013CN101359986B Apparatus and method for direct anonymous attestation from bilinear maps
05/28/2013US8453258 Protecting an electronic document by embedding an executable script
05/28/2013US8453241 Method for securing streaming multimedia network transmissions
05/28/2013US8453224 Single sign-on authentication
05/28/2013US8453172 Content replacement by PID mapping
05/28/2013US8453050 Method and apparatus for creating and editing electronic documents
05/28/2013US8453005 System and method for container monitoring, real time authentication, anomaly detection, and alerts
05/28/2013US8452979 Portable telecommunications apparatus
05/28/2013US8452974 Image processing apparatus, electronic signature generation system, electronic signature key generation method, image processing method, and program
05/28/2013US8452973 Digital signature method, program, and apparatus
05/28/2013US8452972 Methods and systems for encoding and protecting data using digital signature and watermarking techniques
05/28/2013US8452971 Embedding and detection of watermark in a motion image signal
05/28/2013US8452969 Flexible broadcast authentication in resource-constrained systems: providing a tradeoff between communication and computational overheads
05/28/2013US8452967 Using flash storage device to prevent unauthorized use of software
05/28/2013US8452964 Method for providing confidentiality protection of control signaling using certificate
05/28/2013US8452963 Generating protected access credentials
05/28/2013US8452962 Method and apparatus for simulating a workflow and analyzing the behavior of information assurance attributes through a data providence architecture
05/28/2013US8452961 Method and system for authentication between electronic devices with minimal user intervention
05/28/2013US8452959 Method and system for registering a presence user with a presence service
05/28/2013US8452016 Interoperable keychest for use by service providers
05/28/2013US8452014 Group key management for mobile ad-hoc networks
05/28/2013US8452013 Secure message handling on a mobile device
05/28/2013US8452012 Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
05/28/2013US8452010 Video slice and active region based multiple partial encryption
05/28/2013US8452007 Security key generating method, device and system
05/28/2013US8452005 Unicode-compatible encipherment
05/28/2013US8451086 Remote control signaling using audio watermarks
05/28/2013US8448719 Key exchange device
05/28/2013CA2796540A1 Transparent bridge device
05/28/2013CA2683275C Computer network intrusion detection
05/28/2013CA2646861C Methods and systems for secure channel initialization transaction security based on a low entropy shared secret
05/28/2013CA2601075C Virtual im buddy in an instant messaging system to provide authentic information
05/28/2013CA2560577C Apparatus and method for moving and copying rights objects between device and portable storage device
05/28/2013CA2552987C Security system and method
05/28/2013CA2446364C Secure group secret distribution
05/28/2013CA2438255C Secure encryption key distribution
05/28/2013CA2417531C System and method for verifying delivery and integrity of electronic messages
05/23/2013WO2013074724A1 Distributing overlay network ingress information
05/23/2013WO2013074041A1 Cryptographic system and methodology for securing software cryptography
05/23/2013WO2013073829A1 Method, host apparatus and machine-readable storage medium for authenticating a storage apparatus
05/23/2013WO2013073780A1 Method and server for providing automatic login function
05/23/2013WO2013073335A1 Information processing device, information storage device, information processing system, and information processing method, as well as program
05/23/2013WO2013073164A1 Information reproducing device, information recording device, information reproducing method, and information recording method
05/23/2013WO2013072973A1 Communication node, communication control method and communication node control program
05/23/2013WO2013072947A1 Secret character string search system
05/23/2013WO2013072657A1 Simd instructions for supporting generation of hash values in cryptographic algorithms
05/23/2013WO2013072437A1 Key protected nfc tag method and system, and a method for diversify coupon on a viral distribution chain by nfc
05/23/2013WO2013071858A1 Payment secret key system of intelligent tv and payment method based on intelligent tv
05/23/2013WO2013071711A1 Method for processing payment business and terminal
05/23/2013WO2013071689A1 Method and analog circuit for implementing automatic switching of chaotic systems of integer order and fractional order
05/23/2013WO2013049414A3 Host agnostic integration and interoperation system
05/23/2013WO2013048102A3 Security-enhanced cloud system and security management method thereby
05/23/2013WO2013048084A3 Profile management method, embedded uicc, and device provided with the embedded uicc
05/23/2013WO2013040713A3 System and method for user authentication
05/23/2013WO2013022647A3 System and method for wireless data protection
05/23/2013WO2013021107A9 Method, server and system for authentication of a person
05/23/2013WO2012172832A3 Authenticator, authenticatee and authentication method
05/23/2013US20130133078 System and method for permitting use of content