Patents for H04L 9 - Arrangements for secret or secure communication (111,914) |
---|
10/30/2014 | US20140325220 "Unpassword": Risk Aware End-to-End Multi-Factor Authentication Via Dynamic Pairing |
10/30/2014 | US20140325219 Secret key management method for multi-network platform |
10/30/2014 | US20140325218 Wireless Charging System Using Secure Wireless Charging Protocols |
10/30/2014 | US20140325213 Block management unification system and method |
10/30/2014 | US20140325210 Apparatus and methods for activation of communication devices |
10/30/2014 | US20140325209 System and method for managing network access based on a history of a certificate |
10/30/2014 | US20140325207 Multi-version message condition based delivery |
10/30/2014 | US20140325206 Digital device and method for performing secure communication using same |
10/30/2014 | US20140325205 Secure transmission between a source component and a node device |
10/30/2014 | US20140323091 Integrity Check In A Communication System |
10/30/2014 | US20140321651 Distribution of keys for encryption/decryption |
10/30/2014 | US20140321650 Key-based content management and access systems and methods |
10/30/2014 | US20140321649 Method and apparatus for distributing a quantum key |
10/30/2014 | US20140321645 Apparatus and method for converting random binary sequence into random integer |
10/30/2014 | US20140321644 Method and system for calculations on encrypted data |
10/30/2014 | US20140321643 Method of generating multi-dimensional key |
10/30/2014 | US20140321642 Group encryption methods and devices |
10/30/2014 | US20140321641 Method and system for decoupling user authentication and data encryption on mobile devices |
10/30/2014 | US20140321639 Apparatus and method to prevent side channel power attacks in advanced encryption standard using floating point operation |
10/30/2014 | US20140321638 Apparatus and method to prevent side channel power attacks in advanced encryption standard |
10/30/2014 | US20140321637 Secure Time and Crypto System |
10/28/2014 | USRE45213 Method of managing user key for broadcast encryption |
10/28/2014 | US8875310 System and method of protecting digital media contents |
10/28/2014 | US8875282 Accessing a processing device |
10/28/2014 | US8875269 User initiated and controlled identity federation establishment and revocation mechanism |
10/28/2014 | US8875264 System, method and program for off-line two-factor user authentication |
10/28/2014 | US8875263 Controlling a soft token running within an electronic apparatus |
10/28/2014 | US8875262 Method and apparatus for secure communication between mobile devices |
10/28/2014 | US8875259 On-demand service security system and method for managing a risk of access as a condition of permitting access to the on-demand service |
10/28/2014 | US8875258 Constraining a login to a subset of access rights |
10/28/2014 | US8875257 Restricting mature content |
10/28/2014 | US8875250 Method and system for authenticating an end user |
10/28/2014 | US8875245 Authority delegating system, authority delegating method, authentication apparatus, information processing apparatus, control method, and computer-readable medium |
10/28/2014 | US8875244 Method and apparatus for authenticating a user using dynamic client-side storage values |
10/28/2014 | US8875237 Private network access using IPv6 tunneling |
10/28/2014 | US8875235 Independent administering of verified user-controlled electronic identifications utilizing specifically programmed computer-implemented methods and computer systems |
10/28/2014 | US8875234 Operator provisioning of a trustworthy workspace to a subscriber |
10/28/2014 | US8875228 Systems, methods, and computer program products for managing secure elements |
10/28/2014 | US8875222 Efficient XACML access control processing |
10/28/2014 | US8875219 Apparatus and method for controlled sharing of personal information |
10/28/2014 | US8874991 Appending data to existing data stored in a dispersed storage network |
10/28/2014 | US8874990 Pre-fetching data segments stored in a dispersed storage network |
10/28/2014 | US8874938 Program execution device |
10/28/2014 | US8874936 Terminal device, verification device, key distribution device, content playback method, key distribution method, and recording medium |
10/28/2014 | US8874930 Graph encryption |
10/28/2014 | US8874929 Cross domain discovery |
10/28/2014 | US8874926 Increasing security in inter-chip communication |
10/28/2014 | US8874924 Methods and apparatus to identify media |
10/28/2014 | US8874923 Policy-based signature authentication system and method |
10/28/2014 | US8874922 Systems and methods for multi-layered authentication/verification of trusted platform updates |
10/28/2014 | US8874921 System and method for generating keyless digital multi-signatures |
10/28/2014 | US8874920 Verifying cryptographic signature from stored primitives of previously received signature |
10/28/2014 | US8874919 Apparatus and method of a portable terminal authenticating another portable terminal |
10/28/2014 | US8874917 Storage system in which fictitious information is prevented |
10/28/2014 | US8874916 Introduction of discrete roots of trust |
10/28/2014 | US8874915 Optimized encryption key exchange |
10/28/2014 | US8874914 Secure and automated credential information transfer mechanism |
10/28/2014 | US8874913 Secure communications between devices using a trusted server |
10/28/2014 | US8874912 Systems and methods for securely transferring personal identifiers |
10/28/2014 | US8874911 Terminal device, system, connection management server, and computer readable medium |
10/28/2014 | US8874910 Method for implementing encryption and device thereof |
10/28/2014 | US8874909 System and method of storing data |
10/28/2014 | US8874906 Launching a secure kernel in a multiprocessor system |
10/28/2014 | US8874904 View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device |
10/28/2014 | US8874903 Network device and computer readable medium therefor |
10/28/2014 | US8874900 Direct anonymous attestation scheme with outsourcing capability |
10/28/2014 | US8874898 Power line based theft protection of electronic devices |
10/28/2014 | US8874896 Secure processing systems and methods |
10/28/2014 | US8874895 Data transmitting apparatus, data receiving apparatus, data transmitting method, and data receiving method |
10/28/2014 | US8874868 Memory utilization balancing in a dispersed storage network |
10/28/2014 | US8874794 Block floating point compression with exponent difference and mantissa coding |
10/28/2014 | US8874771 Agile network protocol for secure communications with assured system availability |
10/28/2014 | US8874769 Facilitating group access control to data objects in peer-to-peer overlay networks |
10/28/2014 | US8874768 Methods for providing security over untrusted networks |
10/28/2014 | US8874672 Identifying and using identities deemed to be known to a user |
10/28/2014 | US8874578 Stopping functions for grouping and differentiating files based on content |
10/28/2014 | US8874487 Software wrapper having use limitation within a geographic boundary |
10/28/2014 | US8874150 Device for aggregating, translating, and disseminating communications within a multiple device environment |
10/28/2014 | US8874067 Medical data access system |
10/28/2014 | US8873760 Service key delivery system |
10/28/2014 | US8873759 Electronic key management using PKI to support group key establishment in the tactical environment |
10/28/2014 | US8873756 System for transmitting a data signal in a network, method, mobile transmitting device and network device |
10/28/2014 | US8873755 Establishing secure links between wireless devices in proximity using ambient wireless signals |
10/28/2014 | US8873754 Proxy-based encryption method, proxy-based decryption method, network equipment, network device and system |
10/28/2014 | US8873750 Instruction for performing a pseudorandom number generate operation |
10/28/2014 | US8873749 Multi-user searchable encryption system and method with index validation and tracing |
10/28/2014 | US8873748 Unique surrogate key generation using cryptographic hashing |
10/28/2014 | US8873747 Key management using security enclave processor |
10/28/2014 | US8873746 Establishing, at least in part, secure communication channel between nodes so as to permit inspection, at least in part, of encrypted communication carried out, at least in part, between the nodes |
10/28/2014 | US8873744 Electronic document processing system |
10/28/2014 | US8872970 System and method for transport stream sync byte detection with transport stream having multiple emulated sync bytes |
10/28/2014 | US8870971 Method and apparatus for protecting data in a portable electronic device |
10/28/2014 | US8870084 Method and system for the generation and validation of personal identification numbers |
10/28/2014 | US8870067 Identification device having electronic key stored in a memory |
10/23/2014 | US20140317614 Multiple System Images for Over-The-Air Updates |
10/23/2014 | US20140317421 Data storage system and method by shredding and deshredding |
10/23/2014 | US20140317413 Secure remediation of devices requesting cloud services |
10/23/2014 | US20140317409 System for managing cryptographic keys and trust relationships in a secure shell (ssh) environment |
10/23/2014 | US20140317408 Data backup and service encryption key management |
10/23/2014 | US20140317407 Incremental mac tag generation device, method, and program, and message authentication device |