Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
06/2010
06/24/2010US20100161490 Method and apparatus for protecting the privacy of responder information
06/24/2010US20100161114 Electronic vending machine management method
06/24/2010US20100159911 Remote locking arrangements for electronic devices
06/24/2010US20100158255 Method and system for protecting broadcasting program
06/24/2010US20100158254 Distributed access control for document centric collaborations
06/24/2010US20100158253 System and Method for Generalized Authentication
06/24/2010US20100158252 Polarization coding quantum cryptography system
06/24/2010US20100158247 Method and system for secure storage, transmission and control of cryptographic keys
06/24/2010US20100158246 Method for authentication and electronic device for performing the authentication
06/24/2010US20100158245 Implicit iteration of keyed array symbol
06/24/2010US20100158244 Communication encryption method for supporting remote monitoring and control system
06/24/2010US20100158242 Systems and computer program products for generating and verifying randomized hash values
06/24/2010US20100158241 Method and apparatus to perform redundant array of independent disks (RAID) operations
06/24/2010US20100155467 Security document scanner
06/24/2010DE112004002943B4 Inhalte-Management-Programm, -Verfahren und -Vorrichtung Content management program, method and apparatus
06/24/2010DE102009054483A1 Ladeüberwachungsvorrichtung Charge monitoring device
06/24/2010DE102008063864A1 Verfahren zur Authentifizierung einer Person gegenüber einer elektronischen Datenverarbeitungsanlage mittels eines elektronischen Schlüssels A method for authentication of a person with respect to an electronic data processing system by means of an electronic key
06/24/2010DE102008062872A1 Method for bi-directional transmission of click position information of smart card between server of bank and personal computer system of bank customer in online banking process, involves determining symbols associated to line surface
06/24/2010DE102008061483A1 Verfahren und Vorrichtung zum Verarbeiten von Daten Method and apparatus for processing data
06/24/2010DE102008061482A1 Method for efficient transfer of data from transmitter to receiver in message, involves increasing information content per transmitted bit of message by transmitter within original data
06/24/2010DE102008059487A1 Method for generating parameterization data for communication protection system of communications network in automation system, involves determining communication parameters of automation system
06/24/2010CA2747553A1 Validation method and system for use in securing nomadic electronic transactions
06/24/2010CA2746830A1 Acceleration of key agreement protocols
06/24/2010CA2729231A1 Processing of communication device signatures for use in securing nomadic electronic transactions
06/23/2010EP2200310A1 A system for sorting and classifying users of an image information management system
06/23/2010EP2200218A1 Dynamic identifier for use in identification of a device
06/23/2010EP2200217A1 Server certificate issuance system
06/23/2010EP2200216A1 Revocation of credentials in secret handshake protocols
06/23/2010EP2200215A1 Method and apparatus for key expansion to encode data
06/23/2010EP2198552A1 Systems and methods for biometric identification
06/23/2010EP2198377A1 Method and system of interacting with a server, and method and system for generating and presenting search results
06/23/2010EP1277299B1 Method for securing communications between a terminal and an additional user equipment
06/23/2010CN1992624B Method for handling information flow of joining instant communication group communication in secret mode
06/23/2010CN1988539B System and method for compensable sending classified content based on radio digital broadcast path
06/23/2010CN1960256B Apparatus and program for update of time stamp
06/23/2010CN1909454B System, method, and computer readable medium for providing secure access between devices
06/23/2010CN1823519B Peer-to-peer telephone system and method thereof
06/23/2010CN1777174B Internet safety protocol high-speed processing IP burst method
06/23/2010CN1684408B Microprocessor apparatus and method for providing configurable cryptographic block cipher round results
06/23/2010CN1536847B Method for authority discrimination grouping and effective loading
06/23/2010CN1295763B Transmission system
06/23/2010CN101755414A Method and system for verifying the authenticity of a product, and reading device
06/23/2010CN101754221A Data transmission method between heterogeneous systems and data transmission system
06/23/2010CN101754205A Parallelized multi-receiver signcryption method
06/23/2010CN101754204A Semiconductor integrated circuit
06/23/2010CN101754200A Registration method, registration system and registration device
06/23/2010CN101754191A Method of handling handover security configuration and related communication device
06/23/2010CN101754190A Method for establishing equipment secure access
06/23/2010CN101753996A Management method for user rights in video monitoring system, and video monitoring system
06/23/2010CN101753703A Method and system for destroying information and mobile terminal
06/23/2010CN101753589A Method and device for decrypting data file and data broadcast system
06/23/2010CN101753569A Master terminal device for registering and managing the terminal device included in personal using scope, method and system for using the same
06/23/2010CN101753562A Detection methods, device and network security protecting device for botnet
06/23/2010CN101753539A Network data storage method and server
06/23/2010CN101753533A Method, device and system for negotiating authentication methods
06/23/2010CN101753529A Method and system for providing self-adaption specification e-book and e-book reading device
06/23/2010CN101753477A Business service method, business server and business service system
06/23/2010CN101753469A Mail device and method
06/23/2010CN101753316A Method and system for intelligently extracting features
06/23/2010CN101753315A Method, device and system for testing DDOS (distributed denial of service) attacks
06/23/2010CN101753314A Another circuit security system and method operated by adopting account in telephone limiting server
06/23/2010CN101753313A Password management method, password management system and password management server
06/23/2010CN101753312A Security certification method and security certification device for power grid equipment and negative control terminal
06/23/2010CN101753311A Information privacy and identity authentication method and digital signature program
06/23/2010CN101753310A Digital signature method based on multivariable array problem and super logarithm problem
06/23/2010CN101753309A User login information registration method and system thereof
06/23/2010CN101753308A Completeness certification method
06/23/2010CN101753307A System and operation method of communication terminal user authentication
06/23/2010CN101753306A Digital signature authentication method for applying Montgomery elliptic curve
06/23/2010CN101753305A Network security certification method, device and system
06/23/2010CN101753304A Method for binding biological specificity and key
06/23/2010CN101753303A Double-factor authentication method
06/23/2010CN101753302A Method and system for guaranteeing SIP communication security
06/23/2010CN101753301A Fingerprint dynamic password ID authentication device and the implementation method thereof
06/23/2010CN101753300A Device and method thereof for producing and verifying voice signature of message
06/23/2010CN101753299A Dynamically inputting hashing function DIH
06/23/2010CN101753298A Dynamically inputting hashing sequence DIHS
06/23/2010CN101753297A System and device for data encryption and recovery
06/23/2010CN101753296A Key embedded password
06/23/2010CN101753295A Group key management method based on linear geometry
06/23/2010CN101753294A Storage device management system, method and relative storage device
06/23/2010CN101753293A Network equipment and network equipment configuration method
06/23/2010CN101753292A Methods and devices for a chained encryption mode
06/23/2010CN101753291A Hash value calculation apparatus and method thereof
06/23/2010CN101753290A Method for encrypting and deciphering wireless local area network WAPI and CCMP
06/23/2010CN101751528A Working method and system of cipher machine
06/23/2010CN101267310B Computer network access control system and method
06/23/2010CN101252430B Combined signal source channel effective user safety recognizing method
06/23/2010CN101227596B DVR video monitoring software enciphering method and implementing circuit
06/23/2010CN101217374B A protection method on user privacy in three-party conversation
06/23/2010CN101136777B Security management method of dual-encryption channel cooperation in network management system
06/23/2010CN101127604B Information secure transmission method and system
06/23/2010CN101093627B Device for encoding and decoding cipher
06/23/2010CN101051910B Method and device for certifying authorized charging server to identify client-side software
06/23/2010CN101047832B Implementing method for service capability authentication and its trigger of internet network TV
06/23/2010CN101034990B Right management method and device
06/23/2010CN101005353B Intelligent key device for realizing positioning and navigation function
06/23/2010CA2665230A1 Enhanced content sharing framework
06/22/2010US7743425 Security restrictions on binary behaviors
06/22/2010US7743424 Method for protecting data in a hard disk