Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
10/2009
10/14/2009CN100550734C Method and apparatus for verifying authority and charging between comprehensive management platform and business engine
10/14/2009CN100550733C Personal electronic identification device and safety identification method thereof
10/14/2009CN100550732C Method of positioning describing function entity in NASS
10/14/2009CN100550731C Security system and method for accessing fixed network user to IP multimedia subsystem
10/14/2009CN100550730C Document management apparatus, a document management method, a document management program and a recording medium storing the document management program
10/14/2009CN100550729C Authentication method in use for digital clustering operation in CDMA system
10/14/2009CN100550728C Method for switching in multimedia subsystem based on IP by user
10/14/2009CN100550727C Authentication processing method for broadband network
10/14/2009CN100550726C Distribution type dynamic secret key management method
10/14/2009CN100550725C Method for negotiating about cipher key shared by users and application server
10/14/2009CN100550724C Information-processing apparatus, control method
10/14/2009CN100550723C Camouflage communication method based on voice identification
10/14/2009CN100550722C Three way validation and authentication of boot files transmitted from server to client
10/14/2009CN100550721C A method and system for end-to-end wireless encryption communication
10/14/2009CN100550083C Converting method for character string and method for forming and identifying intelligent net service card
10/14/2009CN100550061C System for and method of authenticating items
10/14/2009CN100550038C Image content recognizing method and recognition system
10/13/2009US7603721 Restricted software and hardware usage on a computer
10/13/2009US7603720 Non-repudiation watermarking protection based on public and private keys
10/13/2009US7603719 Resource access control
10/13/2009US7603714 Method, system and computer program product for computer system vulnerability analysis and fortification
10/13/2009US7603710 Method and system for detecting characteristics of a wireless network
10/13/2009US7603706 System security using human authorization
10/13/2009US7603704 Secure execution of a computer program using a code cache
10/13/2009US7603703 Method and system for controlled distribution of application code and content data within a computer network
10/13/2009US7603702 Method and device for identifying user-selected equipment
10/13/2009US7603701 Tools for access to databases via internet protocol networks
10/13/2009US7603700 Authenticating a client using linked authentication credentials
10/13/2009US7603699 Method for establishing trust online
10/13/2009US7603698 Image forming apparatus and image forming method
10/13/2009US7603697 Method and system for securely delivering authentication-related data
10/13/2009US7603567 Information processing system and information processing method
10/13/2009US7603566 Authenticated process switching on a microprocessor
10/13/2009US7603565 Apparatus and method for authenticating access to a network resource
10/13/2009US7603563 Adaptable security mechanism for preventing unauthorized access of digital data
10/13/2009US7603562 System and method for reducing memory requirements of firmware
10/13/2009US7603561 Methods and apparatus for input of coded image data
10/13/2009US7603560 Method and apparatus for digital signature authentication
10/13/2009US7603559 Real-time signature embedding in video
10/13/2009US7603558 Montgomery transform device, arithmetic device, IC card, encryption device, decryption device and program
10/13/2009US7603557 Communication device, communication system and authentication method
10/13/2009US7603556 Challenge response-based device authentication system and method
10/13/2009US7603555 Providing tokens to access extranet resources
10/13/2009US7603554 Encryption communication system
10/13/2009US7603553 System and method to make file handles opaque to clients
10/13/2009US7603552 Piracy prevention using unique module translation
10/13/2009US7603550 Computer system including a secure execution mode-capable CPU and a security services processor connected via a secure communication path
10/13/2009US7603548 Security provider development model
10/13/2009US7603547 Security control module
10/13/2009US7603417 Identifying and using identities deemed to be known to a user
10/13/2009US7603322 Method and apparatus for managing a key management system
10/13/2009US7603313 Charging system and charging method
10/13/2009US7602920 Method for making secure the pre-initialising phase of a silicon chip integrated system, in particular a smart card and integrated system therefor
10/13/2009US7602919 Method of integrating QKD with IPSec
10/13/2009US7602918 Method for distributing security keys during hand-off in a wireless communication system
10/13/2009US7602917 Method of ciphering data transmission in a radio system
10/13/2009US7602916 Access-protected data carrier
10/13/2009US7602915 Communication system having plurality of nodes sharing a common cipher key, cipher key dispatching apparatus for use in the system, and anti-theft apparatus utilizing information derived from cipher key utilization
10/13/2009US7602910 Password protection
10/13/2009US7602909 Self-service terminal
10/13/2009US7602908 System and method for using a streaming protocol
10/13/2009US7602906 Cipher for disk encryption
10/13/2009US7602905 Processes, circuits, devices, and systems for encryption and decryption and other purposes, and processes of making
10/13/2009US7602904 Order invariant fuzzy commitment system
10/13/2009US7602903 Cryptography correctness detection methods and apparatuses
10/13/2009US7602817 Low deviation field modulation for transfer of information
10/13/2009US7602731 System and method for integrated header, state, rate and content anomaly prevention with policy enforcement
10/13/2009US7602515 System and method for providing a form for use in greeting card delivery
10/13/2009CA2505477C A system and method to proactively detect software tampering
10/13/2009CA2474819C Methods and apparatus for performing a subscriber identity module (sim) initialization procedure
10/13/2009CA2416227C A system and method for directory services and e-commerce across multi-provider networks
10/13/2009CA2414768C Method and system for user registration on terminal
10/13/2009CA2331442C Robust efficient distributed rsa-key generation
10/13/2009CA2297323C Personal device, terminal, server and methods for establishing a trustworthy connection between a user and a terminal
10/13/2009CA2278420C Quantum cryptography system for the secure transmission of random keys, using the polarization adjustment method
10/08/2009WO2009123913A1 Distribution of storage area network encryption keys across data centers
10/08/2009WO2009123712A2 Information server and mobile delivery system and method
10/08/2009WO2009123411A1 User terminal with identity selector and method for identity authentication using identity selector of the same
10/08/2009WO2009123366A1 Transmission/reception system, transmission device, reception device, authentication device, user equipment, method executed using these, and program
10/08/2009WO2009123074A1 User authentication method, wireless communication apparatus, base station, and account management apparatus
10/08/2009WO2009122831A1 Concealment processing device, concealment processing method, and concealment processing program
10/08/2009WO2009122730A1 Goods processing method
10/08/2009WO2009122558A1 Goods manufacturing method, goods manufacturing system, and goods
10/08/2009WO2009122461A1 Encrypting method having countermeasure function against power analyzing attacks
10/08/2009WO2009122302A2 Systems and methods for implementing and tracking identification tests
10/08/2009WO2009122165A1 Authentication of transmissions
10/08/2009WO2009122141A1 Keys for protecting user access to media
10/08/2009WO2009122095A2 White-box protection for cryptographic algorithms including calculation of a quadratic form
10/08/2009WO2009121437A1 Dynamic authentication method
10/08/2009WO2009121390A1 Method for managing encryption keys in a communication network
10/08/2009WO2009121270A1 Method, apparatus and system for preventing the abuse of authentication vectors
10/08/2009WO2009121253A1 Network configuring method for preventing attack, method and device for preventing attack
10/08/2009WO2009098379A3 Method of sharing a strong secret between two parties, one of whom has little processing power
10/08/2009WO2009095574A3 Method and entity for probabilistic symmetrical encryption
10/08/2009WO2009082717A3 A method for authenticating a communication channel between a client and a server
10/08/2009WO2009066978A3 Method and system for generating a proxy digital certificate to a grid portal in distributed computing infrastructure by data transfer across a public network
10/08/2009US20090255000 Internet Protocol (IP) Location, Privacy and Presence
10/08/2009US20090254999 Mediated access of software dumped data through specialized analysis modules
10/08/2009US20090254997 Method and apparatus for content rights management
10/08/2009US20090254996 Security module for audio/video data processing unit