Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
09/2009
09/23/2009EP1454493B1 Method of rights management for streaming media
09/23/2009EP0872077B1 Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
09/23/2009CN201315597Y A portable wireless electronic key device
09/23/2009CN201315596Y Dial safety gateway device
09/23/2009CN101542973A Method and system for authenticating peer devices using EAP
09/23/2009CN101542972A Device and portable storage device which are capable of transferring rights object, and a method of transferring rights object
09/23/2009CN101542971A Fuzzy biometrics based signatures
09/23/2009CN101542970A Method for determining identification of an electronic device
09/23/2009CN101542969A Encrypting apparatus
09/23/2009CN101542968A Key terminal apparatus, lsi for encryption process, unique key producing method, and content system
09/23/2009CN101542967A MIH pre-authentication
09/23/2009CN101542966A 信息处理装置 The information processing apparatus
09/23/2009CN101542965A Authentication delegation based on re-verification of cryptographic evidence
09/23/2009CN101542964A Systems and methods for contracting with multiple parties
09/23/2009CN101542963A Authentication of e-commerce transactions using a wireless telecommunications device
09/23/2009CN101542962A Processing method for message integrity with tolerance for non-sequential arrival of message data
09/23/2009CN101542961A Encrypting data in a communication network
09/23/2009CN101542452A Method, apparatus and system for authentication of external storage devices
09/23/2009CN101541007A An improved method for an authentication of a user subscription identity module
09/23/2009CN101541001A Method and system for updating base key
09/23/2009CN101540999A Method and equipment for establishing safe data tunnel
09/23/2009CN101540771A Autonomic provisioning of hosted applications with level of isolation terms
09/23/2009CN101540765A Automatic threat ensuring method facing to network security risk assessment based on first order logic predicate reasoning
09/23/2009CN101540760A Quantum key agreement method
09/23/2009CN101540755A Method, system and device for recovering data
09/23/2009CN101540715A Method, system and device for protecting quick switching
09/23/2009CN101540687A Remote wake up method, host computers capable of being waken up remotely and wakeup management server
09/23/2009CN101540682A Image junk mail filtering method based on visual features
09/23/2009CN101540681A Method and system for monitoring computer network connection statuses
09/23/2009CN101540680A Content transmission apparatus, content reception apparatus and content transmission method
09/23/2009CN101540679A Method for acquiring WLAN authentication and privacy infrastructure certificate and system thereof
09/23/2009CN101540678A 固定终端及其认证方法 Fixed terminal and authentication methods
09/23/2009CN101540677A Method, apparatus and system for signiture
09/23/2009CN101540676A Platform identifying method suitable to identify credible network connecting construction in ternary equal way
09/23/2009CN101540675A Smart key equipment and communication method and system of application software
09/23/2009CN101540674A Method for logging on Web end in instant communication device
09/23/2009CN101540673A Public key encryption and decryption method and digital signature method thereof
09/23/2009CN101540672A Data processing system and data processing method
09/23/2009CN101540671A Method for establishing security association among WAPI websites under self-organizing network
09/23/2009CN101540670A Method and equipment for agitating downstream data in Ethernet Passive Optical Network
09/23/2009CN101540669A Method for distributing keys and protecting information for wireless mobile communication network
09/23/2009CN101540668A Data processing equipment
09/23/2009CN101540667A Method and equipment for interfering with communication in wireless local area network
09/23/2009CN101540666A Method for protecting network data
09/23/2009CN101540031A Confirmation method for ensuring data validity in network electronic trade
09/23/2009CN101540024A Method for theft prevention of account password
09/23/2009CN101539966A System and method for electronic scratch lottery
09/23/2009CN100544348C Agency testing method
09/23/2009CN100544258C Information processing method and apparatus
09/23/2009CN100544257C A RSA based joint electronic signature method
09/23/2009CN100544256C Method of positioning user access authorization function entity in NASS
09/23/2009CN100544255C Method of positioning describing data function entity in NASS
09/23/2009CN100544254C Method for implementing network access authentication
09/23/2009CN100544253C Security reidentification method for mobile terminal of radio local network
09/23/2009CN100544252C Security management method and system for networked computer users
09/23/2009CN100544251C A method for acquiring one-off secret code via handset
09/23/2009CN100544250C Method for encrypting and decrypting broadcast of network information
09/23/2009CN100544249C Mobile communication user certification and key negotiation method
09/23/2009CN100544248C Method for sending and receiving data of cipher key
09/23/2009CN100544247C Safety ability consultation method
09/23/2009CN100544246C Use of KEELOQ technology in computer system safety protection
09/22/2009US7594275 Digital rights management system
09/22/2009US7594273 Network security system having a device profiler communicatively coupled to a traffic monitor
09/22/2009US7594265 System for preventing unauthorized access to sensitive data and a method thereof
09/22/2009US7594263 Operating a communication network through use of blocking measures for responding to communication traffic anomalies
09/22/2009US7594262 System and method for secure group communications
09/22/2009US7594261 Cryptographic applications of the Cartier pairing
09/22/2009US7594256 Remote interface for policy decisions governing access control
09/22/2009US7594236 Thread to thread communication
09/22/2009US7594224 Distributed enterprise security system
09/22/2009US7594124 Cross validation of data using multiple subsystems
09/22/2009US7594123 Data recording apparatus and method and data reproducing apparatus and method
09/22/2009US7594122 Method of determining whether a test subject is a specific individual
09/22/2009US7594121 Methods and apparatus for determining an identity of a user
09/22/2009US7594120 User-defined passwords having associated unique version data to assist user recall of the password
09/22/2009US7594119 System for managing time rights linked to a digital content
09/22/2009US7594118 Data-processing system and method for controlling same, computer program, and computer-readable recording medium
09/22/2009US7594116 Mediated key exchange between source and target of communication
09/22/2009US7594115 Contents information output system and contents information output method
09/22/2009US7594114 Authentication apparatus and method for universal appliance communication controller
09/22/2009US7594113 Identification information protection method in WLAN inter-working
09/22/2009US7594112 Delegated administration for a distributed security system
09/22/2009US7594108 Operator root certificates
09/22/2009US7593896 Credit card system and method
09/22/2009US7593717 Authenticating access to a wireless local area network based on security value(s) associated with a cellular system
09/22/2009US7593579 Method for secure encoding of data
09/22/2009US7593532 Management of the retention and/or discarding of stored data
09/22/2009US7593531 Methods and systems for transceiving chaotic signals
09/22/2009US7593530 Secure legacy media peripheral association with authentication in a media exchange network
09/22/2009US7593529 Scramble methods and apparatus for packetized digital video signal in conditional access system
09/22/2009US7593528 Managing device keys in cryptographic communication
09/22/2009US7593527 Providing digital signature and public key based on shared knowledge
09/22/2009US7593526 Method and apparatus for compressing rabin signatures
09/22/2009US7593525 Patternless encryption and decryption system and method
09/22/2009US7593343 Method and apparatus for monitoring and the prevention of call storms in a communications network
09/22/2009US7593126 Method for delivering a greeting card to a user
09/22/2009US7592829 On-chip storage of secret information as inverse pair
09/22/2009CA2493021C Architecture and method for the centralised control of remote peripheral electronic devices
09/22/2009CA2444170C Reprogrammable terminal for suggesting programs offered on a television program delivery system
09/17/2009WO2009114835A1 Authenticated adversarial routing