Patents for H04L 9 - Arrangements for secret or secure communication (111,914) |
---|
10/14/2009 | CN100550734C Method and apparatus for verifying authority and charging between comprehensive management platform and business engine |
10/14/2009 | CN100550733C Personal electronic identification device and safety identification method thereof |
10/14/2009 | CN100550732C Method of positioning describing function entity in NASS |
10/14/2009 | CN100550731C Security system and method for accessing fixed network user to IP multimedia subsystem |
10/14/2009 | CN100550730C Document management apparatus, a document management method, a document management program and a recording medium storing the document management program |
10/14/2009 | CN100550729C Authentication method in use for digital clustering operation in CDMA system |
10/14/2009 | CN100550728C Method for switching in multimedia subsystem based on IP by user |
10/14/2009 | CN100550727C Authentication processing method for broadband network |
10/14/2009 | CN100550726C Distribution type dynamic secret key management method |
10/14/2009 | CN100550725C Method for negotiating about cipher key shared by users and application server |
10/14/2009 | CN100550724C Information-processing apparatus, control method |
10/14/2009 | CN100550723C Camouflage communication method based on voice identification |
10/14/2009 | CN100550722C Three way validation and authentication of boot files transmitted from server to client |
10/14/2009 | CN100550721C A method and system for end-to-end wireless encryption communication |
10/14/2009 | CN100550083C Converting method for character string and method for forming and identifying intelligent net service card |
10/14/2009 | CN100550061C System for and method of authenticating items |
10/14/2009 | CN100550038C Image content recognizing method and recognition system |
10/13/2009 | US7603721 Restricted software and hardware usage on a computer |
10/13/2009 | US7603720 Non-repudiation watermarking protection based on public and private keys |
10/13/2009 | US7603719 Resource access control |
10/13/2009 | US7603714 Method, system and computer program product for computer system vulnerability analysis and fortification |
10/13/2009 | US7603710 Method and system for detecting characteristics of a wireless network |
10/13/2009 | US7603706 System security using human authorization |
10/13/2009 | US7603704 Secure execution of a computer program using a code cache |
10/13/2009 | US7603703 Method and system for controlled distribution of application code and content data within a computer network |
10/13/2009 | US7603702 Method and device for identifying user-selected equipment |
10/13/2009 | US7603701 Tools for access to databases via internet protocol networks |
10/13/2009 | US7603700 Authenticating a client using linked authentication credentials |
10/13/2009 | US7603699 Method for establishing trust online |
10/13/2009 | US7603698 Image forming apparatus and image forming method |
10/13/2009 | US7603697 Method and system for securely delivering authentication-related data |
10/13/2009 | US7603567 Information processing system and information processing method |
10/13/2009 | US7603566 Authenticated process switching on a microprocessor |
10/13/2009 | US7603565 Apparatus and method for authenticating access to a network resource |
10/13/2009 | US7603563 Adaptable security mechanism for preventing unauthorized access of digital data |
10/13/2009 | US7603562 System and method for reducing memory requirements of firmware |
10/13/2009 | US7603561 Methods and apparatus for input of coded image data |
10/13/2009 | US7603560 Method and apparatus for digital signature authentication |
10/13/2009 | US7603559 Real-time signature embedding in video |
10/13/2009 | US7603558 Montgomery transform device, arithmetic device, IC card, encryption device, decryption device and program |
10/13/2009 | US7603557 Communication device, communication system and authentication method |
10/13/2009 | US7603556 Challenge response-based device authentication system and method |
10/13/2009 | US7603555 Providing tokens to access extranet resources |
10/13/2009 | US7603554 Encryption communication system |
10/13/2009 | US7603553 System and method to make file handles opaque to clients |
10/13/2009 | US7603552 Piracy prevention using unique module translation |
10/13/2009 | US7603550 Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path |
10/13/2009 | US7603548 Security provider development model |
10/13/2009 | US7603547 Security control module |
10/13/2009 | US7603417 Identifying and using identities deemed to be known to a user |
10/13/2009 | US7603322 Method and apparatus for managing a key management system |
10/13/2009 | US7603313 Charging system and charging method |
10/13/2009 | US7602920 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor |
10/13/2009 | US7602919 Method of integrating QKD with IPSec |
10/13/2009 | US7602918 Method for distributing security keys during hand-off in a wireless communication system |
10/13/2009 | US7602917 Method of ciphering data transmission in a radio system |
10/13/2009 | US7602916 Access-protected data carrier |
10/13/2009 | US7602915 Communication system having plurality of nodes sharing a common cipher key, cipher key dispatching apparatus for use in the system, and anti-theft apparatus utilizing information derived from cipher key utilization |
10/13/2009 | US7602910 Password protection |
10/13/2009 | US7602909 Self-service terminal |
10/13/2009 | US7602908 System and method for using a streaming protocol |
10/13/2009 | US7602906 Cipher for disk encryption |
10/13/2009 | US7602905 Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making |
10/13/2009 | US7602904 Order invariant fuzzy commitment system |
10/13/2009 | US7602903 Cryptography correctness detection methods and apparatuses |
10/13/2009 | US7602817 Low deviation field modulation for transfer of information |
10/13/2009 | US7602731 System and method for integrated header, state, rate and content anomaly prevention with policy enforcement |
10/13/2009 | US7602515 System and method for providing a form for use in greeting card delivery |
10/13/2009 | CA2505477C A system and method to proactively detect software tampering |
10/13/2009 | CA2474819C Methods and apparatus for performing a subscriber identity module (sim) initialization procedure |
10/13/2009 | CA2416227C A system and method for directory services and e-commerce across multi-provider networks |
10/13/2009 | CA2414768C Method and system for user registration on terminal |
10/13/2009 | CA2331442C Robust efficient distributed rsa-key generation |
10/13/2009 | CA2297323C Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal |
10/13/2009 | CA2278420C Quantum cryptography system for the secure transmission of random keys, using the polarization adjustment method |
10/08/2009 | WO2009123913A1 Distribution of storage area network encryption keys across data centers |
10/08/2009 | WO2009123712A2 Information server and mobile delivery system and method |
10/08/2009 | WO2009123411A1 User terminal with identity selector and method for identity authentication using identity selector of the same |
10/08/2009 | WO2009123366A1 Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program |
10/08/2009 | WO2009123074A1 User authentication method, wireless communication apparatus, base station, and account management apparatus |
10/08/2009 | WO2009122831A1 Concealment processing device, concealment processing method, and concealment processing program |
10/08/2009 | WO2009122730A1 Goods processing method |
10/08/2009 | WO2009122558A1 Goods manufacturing method, goods manufacturing system, and goods |
10/08/2009 | WO2009122461A1 Encrypting method having countermeasure function against power analyzing attacks |
10/08/2009 | WO2009122302A2 Systems and methods for implementing and tracking identification tests |
10/08/2009 | WO2009122165A1 Authentication of transmissions |
10/08/2009 | WO2009122141A1 Keys for protecting user access to media |
10/08/2009 | WO2009122095A2 White-box protection for cryptographic algorithms including calculation of a quadratic form |
10/08/2009 | WO2009121437A1 Dynamic authentication method |
10/08/2009 | WO2009121390A1 Method for managing encryption keys in a communication network |
10/08/2009 | WO2009121270A1 Method, apparatus and system for preventing the abuse of authentication vectors |
10/08/2009 | WO2009121253A1 Network configuring method for preventing attack, method and device for preventing attack |
10/08/2009 | WO2009098379A3 Method of sharing a strong secret between two parties, one of whom has little processing power |
10/08/2009 | WO2009095574A3 Method and entity for probabilistic symmetrical encryption |
10/08/2009 | WO2009082717A3 A method for authenticating a communication channel between a client and a server |
10/08/2009 | WO2009066978A3 Method and system for generating a proxy digital certificate to a grid portal in distributed computing infrastructure by data transfer across a public network |
10/08/2009 | US20090255000 Internet Protocol (IP) Location, Privacy and Presence |
10/08/2009 | US20090254999 Mediated access of software dumped data through specialized analysis modules |
10/08/2009 | US20090254997 Method and apparatus for content rights management |
10/08/2009 | US20090254996 Security module for audio/video data processing unit |