Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
03/2010
03/24/2010CN101677271A Method, device and system for multicast key management
03/24/2010CN101677270A Approved safe key stream generator based on multivariate quadratic equation
03/24/2010CN101677269A Method and system for transmitting keys
03/24/2010CN101677268A High-efficiency approved safe pseudo-random generator
03/24/2010CN101677010A Content distribution system, recording device and method, reproduction device and method, and program
03/24/2010CN101676925A Computer system and method of setting authentication information in security chip
03/24/2010CN101676792A Projector for projecting password and method thereof
03/24/2010CN100596188C STB terminal and its verification method
03/24/2010CN100596137C A method for checking IP message stream security
03/24/2010CN100596105C Method and server for determining net element business operation legality
03/24/2010CN100596071C Method for implementing conversation control and duration collection through DHCP extension
03/24/2010CN100596070C Method, system and identification server for configuring service channel after identification failure
03/24/2010CN100596069C Automatic configuration system and method of IPSec safety tactis in domestic gateway
03/24/2010CN100596068C Safety multicast method based on protocol of conversation initialization
03/24/2010CN100596067C Information processing apparatus and information processing method
03/24/2010CN100596066C Entity identification method based on H323 system
03/24/2010CN100596065C A system and method for preventing worm virus from spreading across network
03/24/2010CN100596064C Encrypted communication system, encrypted communication method, communication status management server, and communication status management method
03/24/2010CN100596063C Distributing system, method and device for group key control message
03/24/2010CN100596062C Secure protection device and method for distributed packet transfer
03/24/2010CN100596061C Method for watermarking small wave threshold digital audio multiple mesh based on blind source separation
03/24/2010CN100596060C A method, system and device for preventing optical network unit in passive optical network from being counterfeiting
03/24/2010CN100596059C Multicast authentication method, system and application
03/24/2010CN100596058C System and method for managing credible calculating platform key authorization data
03/24/2010CN100596057C Method and system for secure update of terminals in a large range
03/24/2010CN100596056C Method for realizing digital information safety access
03/24/2010CN100596055C System for invoking a privileged function in a device
03/24/2010CN100595826C Inscroll registration authorization system for downloading spreading display identification data and method thereof
03/24/2010CN100595816C Encrypting method and device, and decrypting method and device
03/24/2010CN100595748C Electronic value authentication method, authentication system and device
03/24/2010CN100595736C Methods and systems for cryptographically protecting secure content
03/23/2010US7685647 Information processing apparatus
03/23/2010US7685645 Security containers for document components
03/23/2010US7685642 System and method for controlling rights expressions by stakeholders of an item
03/23/2010US7685639 Using inserted e-mail headers to enforce a security policy
03/23/2010US7685637 System security approaches using sub-expression automata
03/23/2010US7685636 System, service, and method for enabling authorized use of distributed content on a protected media
03/23/2010US7685631 Authentication of a server by a client to prevent fraudulent user interfaces
03/23/2010US7685629 Methods and systems for authenticating users
03/23/2010US7685626 Information management system
03/23/2010US7685516 Creation of electronically processable signature files
03/23/2010US7685437 Query optimization in encrypted database systems
03/23/2010US7685436 System and method for a secure I/O interface
03/23/2010US7685433 Recognition of live object in motion
03/23/2010US7685429 Signature-generation method, signature-verification method, public-key distribution method, and information-processing apparatus
03/23/2010US7685428 Transmission of event markers to data stream recorder
03/23/2010US7685427 System and method for loading digital watermarks automatically
03/23/2010US7685426 Managing and indexing content on a network with image bookmarks and digital watermarks
03/23/2010US7685425 Server computer for guaranteeing files integrity
03/23/2010US7685424 Validating untrusted objects and entities
03/23/2010US7685423 Validation protocol and system
03/23/2010US7685421 System and method for initializing operation for an information security operation
03/23/2010US7685420 Cookie-based mechanism providing lightweight authentication of layer-2 frames
03/23/2010US7685418 Mechanisms and techniques for protecting intellectual property
03/23/2010US7685414 Subscription management service for secure messaging system
03/23/2010US7685247 System for publishing and converting messages from identified, authorized senders
03/23/2010US7685246 Control of an instant message system that allows multiple clients with identical credentials
03/23/2010US7685071 Mobile communication terminal
03/23/2010US7684805 Systems and methods for facilitating instant communications over distributed cellular networks
03/23/2010US7684701 Photonic quantum information system using unpolarised light
03/23/2010US7684569 Electronic device control system and method and electronic device, and control apparatus
03/23/2010US7684568 Encrypting data in a communication network
03/23/2010US7684566 Encryption scheme for streamed multimedia content protected by rights management system
03/23/2010US7684565 System for securely communicating information packets
03/23/2010US7684563 Apparatus and method for implementing a unified hash algorithm pipeline
03/23/2010US7683758 Electronic access control device
03/23/2010US7681800 Handheld security document scanner
03/23/2010CA2603253C Method and apparatus for encryption and pass-through handling of confidential information in software applications
03/23/2010CA2551055C Method for controlling memory consumption in router-based virtual private networks
03/23/2010CA2530908C Wireless personal area network having authentication and associated methods
03/19/2010CA2670970A1 Method and apparatus for provisioning a communication device
03/18/2010WO2010030927A2 Method and system for secret key exchange using wireless link characteristics and random device movement
03/18/2010WO2010030680A1 Method, system, and apparatus for secure data editing
03/18/2010WO2010030437A1 Methods and systems for securely managing virtualization platform
03/18/2010WO2010030233A1 Controlling of data traffic
03/18/2010WO2010030232A1 A data processing system
03/18/2010WO2010030231A1 A method for secure communication
03/18/2010WO2010030230A1 Communication s stem for secure exchange of information
03/18/2010WO2010030161A2 Method of integrating quantum key distribution with internet key exchange protocol
03/18/2010WO2010030127A2 Method for selectively encrypting control signal
03/18/2010WO2010029981A1 Image processing device, execution method for job encrypted in the device, and recording medium
03/18/2010WO2010028936A1 Method for transmitting data between network nodes
03/18/2010WO2010028705A1 Method for enabling limitation of service access
03/18/2010WO2010028681A1 Authentication in a communication network
03/18/2010WO2010011457A3 Fuel fluidizing nozzle assembly
03/18/2010WO2010002596A3 Two-way authentication between two communication endpoints using a one-way out-of-band (oob) channel
03/18/2010WO2009154869A3 Method and system of using a local hosted cache and cryptographic hash functions to reduce network traffic
03/18/2010WO2009152512A3 Methods, systems, and computer readable media for providing presence data from multiple presence information providers
03/18/2010WO2009148263A3 A system and method of reducing encryption overhead by concatenating multiple connection packets associated with a security association
03/18/2010WO2009142834A3 Protocol for verifying integrity of remote data
03/18/2010WO2009024913A4 Identification of devices using physically unclonable functions
03/18/2010US20100071073 Techniques for shuffling video information
03/18/2010US20100071070 Managing Sharing of Media Content From a Server Computer to One or More of a Plurality of Client Computers Across the Computer Network
03/18/2010US20100071060 Electronic device and method for verifying user identification
03/18/2010US20100071057 Real-time equipment behavior selection
03/18/2010US20100071056 Method and system for multi-protocol single logout
03/18/2010US20100071054 Network security appliance
03/18/2010US20100071052 Reverse proxy architecture
03/18/2010US20100071048 Service binding
03/18/2010US20100071047 Authentication system, terminal and information processing device, having function of performing stable authentication