Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
08/2010
08/26/2010US20100217993 Display window control system and method
08/26/2010US20100217992 Compounding security with a security dongle
08/26/2010US20100217991 Surgery robot system of server and client type
08/26/2010US20100217990 Communication method, relay server device, program, and recording medium
08/26/2010US20100217989 Visualization of trust in an address bar
08/26/2010US20100217988 Electronic document management and delivery
08/26/2010US20100217987 Document Security Management System
08/26/2010US20100217986 Authenticated secret sharing
08/26/2010US20100217985 Authenticated Communication Between Security Devices
08/26/2010US20100217984 Methods and apparatus for encrypting and decrypting email messages
08/26/2010US20100217983 Archive system, management apparatus, and control method
08/26/2010US20100217982 Method and system for registering a presence user with a presence service
08/26/2010US20100217981 Method and apparatus for performing security communication
08/26/2010US20100217980 Communication Control System, Mobile Communication Terminal and Computer Program
08/26/2010US20100217979 System and Method for Providing Certified Proof of Delivery Receipts for Electronic Mail
08/26/2010US20100217978 Method for sharing secret information among cooperating parties
08/26/2010US20100217977 Systems and methods of security for an object based storage device
08/26/2010US20100217975 Method and system for secure online transactions with message-level validation
08/26/2010US20100217973 System and method for encrypting provider identifiers on medical service claim transactions
08/26/2010US20100217970 Encrypting operating system
08/26/2010US20100217969 System for, and method of, providing the transmission, receipt and content of an e-mail message to a recipient
08/26/2010US20100217967 Real-time communication security for automation networks
08/26/2010US20100217964 Method and apparatus for controlling enablement of jtag interface
08/26/2010US20100217897 Data transfer device and mobile telephone
08/26/2010US20100217710 Electronic money system and electronic money transaction method
08/26/2010US20100217642 System and method for single-action energy resource scheduling and participation in energy-related securities
08/26/2010US20100215270 System and Methods for Automatically Accessing a Web Site on Behalf of a Client
08/26/2010US20100215181 Method for importing rights object and rights issuer
08/26/2010US20100215180 Replacement of keys
08/26/2010US20100215179 Security Key Method In Semiconductor Manufacturing
08/26/2010US20100215178 Key selection vector, mobile device and method for processing the key selection vector, digital content output device, and revocation list
08/26/2010US20100215177 System and method for establishing a secure communication link
08/26/2010US20100215176 Means and method for controlling the distribution of unsolicited electronic communications
08/26/2010US20100215174 Reliable elliptic curve cryptography computation
08/26/2010US20100215173 Data security
08/26/2010US20100215172 Sharing a secret with modular inverses
08/26/2010DE10347455B4 Pseudozufallszahlengenerator für einen Stream Cipher Pseudo-random number generator for a stream cipher
08/26/2010DE102009010523A1 Motor vehicle i.e. land vehicle, has engine control device connected with additional control device via bus system, and cryptography module converting information transmitted via bus system into pseudo random number using hash algorithm
08/26/2010CA2753039A1 System and methods for online authentication
08/26/2010CA2692416A1 Authentication using a wireless mobile communication device
08/25/2010EP2222082A1 Methods and devices for digital content protection
08/25/2010EP2222081A1 Methods and devices for digital content protection
08/25/2010EP2222030A1 Dhcp client server system, dhcp client device and dhcp server device
08/25/2010EP2222016A1 Method and device for hashing onto points of an elliptic curve
08/25/2010EP2222015A1 Method and device for hashing onto points of an elliptic curve
08/25/2010EP2222014A1 A trusted network acces control system based ternery equal identification
08/25/2010EP2222013A1 Method and device for countering fault attacks
08/25/2010EP2222012A1 Method and device for countering fault attacks
08/25/2010EP2220812A2 Method of authenticating a user
08/25/2010EP2220811A2 Methods and apparatus relating to a security system
08/25/2010EP2220810A1 Communication apparatus, control method thereof, and storage medium
08/25/2010EP2220809A1 Communication apparatus and control method thereof
08/25/2010EP2220808A1 Apparatus and method for processing fragmented cryptographic keys
08/25/2010EP2220807A1 System and method for controlling features on a device
08/25/2010EP2220634A1 Method and device for detecting whether a vehicle has exceeded a speed limit
08/25/2010EP1673690B1 Data converter
08/25/2010CN1992714B Authority principal method based on trusted computing platform
08/25/2010CN1941698B Method for managing instant messages and data processing system
08/25/2010CN1929367B Game data-transmission method and system
08/25/2010CN1889426B Method and system for realizing network safety storing and accessing
08/25/2010CN1883154B Method and apparatus of communicating security/encryption information to a physical layer transceiver
08/25/2010CN1848727B Method for establishing safety data communication link
08/25/2010CN1848722B Method and system for establishing credible virtual special network connection
08/25/2010CN1815956B Method for identifying authority in wireless group business
08/25/2010CN1801701B Method for applying digital signature
08/25/2010CN1798026B Method for enhancing security of electronic signature tool in use for computer
08/25/2010CN1711740B Lightweight extensible authentication protocol password preprocessing
08/25/2010CN1703004B Method for implementing network access authentication
08/25/2010CN1677917B Method and system for circulated storage unit for stream cipher
08/25/2010CN1523811B System and method for user authentication at the level of the access network during a connection of the user to the internet
08/25/2010CN101816150A Method of establishing authentication keys and secure wireless communication
08/25/2010CN101816149A Server certificate issuance system
08/25/2010CN101816148A System and method for authentication, data transfer, and protection against phishing
08/25/2010CN101815296A Method, device and system for performing access authentication
08/25/2010CN101815293A Link security certification method, device and system in wireless relay network
08/25/2010CN101815290A Method for safely transmitting physical activity monitoring data
08/25/2010CN101815202A Methods and devices for digital content protection
08/25/2010CN101815128A Method and device for destroying terminal data
08/25/2010CN101815091A Cipher providing equipment, cipher authentication system and cipher authentication method
08/25/2010CN101815071A Method, device and system for applying for digital certificate
08/25/2010CN101815066A Vote detection and statistics method applied to heterogeneous wireless sensor network
08/25/2010CN101815059A Multistage network structure and data transmission method thereof
08/25/2010CN101814992A Method for server login authentication based on encryption keyboard
08/25/2010CN101814991A Mutual authentication method and system based on identity
08/25/2010CN101814990A Home network-oriented digital rights certificate management system
08/25/2010CN101814989A Method and device for hashing onto points of an elliptic curve
08/25/2010CN101814988A Two-way quantum key generating and receiving device and generating and receiving method thereof
08/25/2010CN101814987A Method and system for establishing key between nodes
08/25/2010CN101814986A Method and device for countering fault attacks
08/25/2010CN101814985A Block cipher system using multi-chaotic mapping multi-dynamic S-box
08/25/2010CN101814169A Method and device for realizing secure payment based on payment confirmation terminal and digital certification
08/25/2010CN101814131A Method for improving security of fuzzy fingerprint safe
08/25/2010CN101355459B Method for monitoring network based on credible protocol
08/25/2010CN101345625B Remote authentication method based on biological characteristic
08/25/2010CN101291426B Method and system for third party to real-time monitor remote control process
08/25/2010CN101217359B Method, device and system of controlling wide band user on assessing the network
08/25/2010CN101193103B A method and system for allocating and validating identity identifier
08/25/2010CN101188495B A secure system and method for realizing powerful password authentication mode
08/25/2010CN101114901B Safety authentication system, apparatus and method for non-contact type wireless data transmission
08/25/2010CN101102180B Inter-system binding and platform integrity verification method based on hardware security unit