Patents for H04L 9 - Arrangements for secret or secure communication (111,914)
06/2009
06/24/2009CN101467387A Time and event based one time password
06/24/2009CN101467385A Data storage device, management server, integrated circuit, data update system, home electric apparatuses, data update method, encryption method, and encryption/decryption key generation method
06/24/2009CN101465739A Method and equipment for implementing authentication mode smooth transition
06/24/2009CN101465738A Real time monitoring method and system for document transmission
06/24/2009CN101465737A Method for searching optimum certificate chain facing risk evaluation
06/24/2009CN101465736A Identification authentication method and system
06/24/2009CN101465735A Network user identification verification method, server and client terminal
06/24/2009CN101465734A Online artificial signing system and method
06/24/2009CN101465733A Identity authentication method based on telephone
06/24/2009CN101465732A Method and terminal for ensuring digital certificate safety
06/24/2009CN101465731A Verification method and device
06/24/2009CN101465730A Method and system for automatically uploading and downloading data
06/24/2009CN101465729A Method for implementing coexistence of various cryptographic algorithm in wireless LAN
06/24/2009CN101465728A Method, system and device for distributing cipher key
06/24/2009CN101465727A Method for ensuring communication safety, network appliance, device and communication system
06/24/2009CN101465726A Decode-proof method for cipher key as well as controller and memory device for implementing the method
06/24/2009CN101465725A Key distribution method for public key system based on identification
06/24/2009CN101465724A Encrypted Huffman encoding method and decoding method
06/24/2009CN100505866C A video information encrypting-decrypting method
06/24/2009CN100505845C 电视接收机以及电子设备装置 The television receiver apparatus and an electronic device
06/24/2009CN100505653C Network safety isolating device
06/24/2009CN100505633C Wideband network access intelligent control system and method
06/24/2009CN100505624C Protection method of network authentication charging information
06/24/2009CN100505623C Apparatus, method and system for authentication
06/24/2009CN100505621C Method for digital signature locking localization
06/24/2009CN100505620C Method for reducing RSA key varible storage space
06/24/2009CN100505619C Device and method for crypto-protecting data by odd-even check bit
06/24/2009CN100505618C Encrypted communication system, key delivery server thereof, terminal device and key sharing method
06/24/2009CN100505617C Handshake negotiation method and system in safe grade
06/24/2009CN100505616C Treat method of information safety IC directing against encryption and decryption operation
06/24/2009CN100504939C Cash automatic transaction device
06/24/2009CN100504895C System and method for using DRM to control conditional access to broadband digital content
06/24/2009CN100504829C Communication of information via a side-band channel, and use of same to verify positional relationship
06/24/2009CN100504818C Method for regulating access for non-volatile memory region and automatic method for judging access
06/24/2009CN100504715C Data processing apparatus
06/23/2009USRE40791 Method and system for verifying the authenticity of a first communication participants in a communications network
06/23/2009US7552482 Data security system and method
06/23/2009US7552480 Method and system of assessing risk using a one-dimensional risk assessment model
06/23/2009US7552479 Detecting shellcode that modifies IAT entries
06/23/2009US7552478 Network unauthorized access preventing system and network unauthorized access preventing apparatus
06/23/2009US7552475 Systems and methods for securing ports
06/23/2009US7552474 Detecting the presence of an installation on a data processing system based on the relative storage locations of one or more files
06/23/2009US7552470 Generic security infrastructure for COM based systems
06/23/2009US7552468 Techniques for dynamically establishing and managing authentication and trust relationships
06/23/2009US7552467 Security systems for protecting an asset
06/23/2009US7552465 Method and apparatus for time-based communications port protection
06/23/2009US7552457 Method of controlling descrambling of a plurality of program transport streams, receiver system and portable secure device
06/23/2009US7552443 System and method for implementing an event adapter
06/23/2009US7552345 Implementation of storing secret information in data storage reader products
06/23/2009US7552344 Hardware-based encryption/decryption employing dual ported key storage
06/23/2009US7552343 Conditional access control
06/23/2009US7552341 Licensing the use of software on a particular CPU
06/23/2009US7552340 Method and apparatus of storage anti-piracy key encryption (SAKE) device to control data access for networks
06/23/2009US7552339 Image transmission device, operations management method, and computer-readable medium having operations management program embodied therein
06/23/2009US7552338 Dynamic multimedia fingerprinting system
06/23/2009US7552337 Service protection
06/23/2009US7552336 Watermarking with covert channel and permutations
06/23/2009US7552335 Information processing apparatus, method therefor, computer program, and computer-readable storage medium
06/23/2009US7552334 System and method for presentation integrity
06/23/2009US7552333 Trusted authentication digital signature (tads) system
06/23/2009US7552332 Java based electronic signature capture method, device and system
06/23/2009US7552331 Secure media path methods, systems, and architectures
06/23/2009US7552330 Mutual authentication system between user and system
06/23/2009US7552329 Masked digital signatures
06/23/2009US7552326 Use of kernel authorization data to maintain security in a digital processing system
06/23/2009US7552325 Methods, systems, and products for intrusion detection
06/23/2009US7552324 Printer and print system, and data receiving device and data transmitting and receiving system
06/23/2009US7552322 Using a portable security token to facilitate public key certification for devices in a network
06/23/2009US7552321 Method and hybrid system for authenticating communications
06/23/2009US7552196 Detecting corrupted data before transmission to a client
06/23/2009US7552094 Optical payment transceiver and system using the same
06/23/2009US7552093 Resolving license dependencies for aggregations of legally-protectable content
06/23/2009US7552092 Program distribution method and system
06/23/2009US7551915 Method of establishing route optimized communication in mobile IPv6 by securing messages sent between a mobile node and home agent
06/23/2009US7551913 Methods and apparatus for anonymous user identification and content personalization in wireless communication
06/23/2009US7551740 Weighted secret sharing and reconstructing method
06/23/2009US7551739 System and method for container monitoring, real time authentication, anomaly detection, and alerts
06/23/2009US7551737 Cryptographic keys using random numbers instead of random primes
06/23/2009US7551736 Physical layer header scrambling in satellite broadcast systems
06/23/2009US7551305 Computer system for generating a second mail item in response to a first mail item
06/23/2009US7551056 Use-authorization device for security-related applications
06/23/2009US7549922 Software security for gaming devices
06/21/2009CA2646862A1 Methods and systems for secure channel initialization
06/21/2009CA2646861A1 Methods and systems for secure channel initialization transaction security based on a low entropy shared secret
06/20/2009CA2647318A1 Method and system for validating a device that uses a dynamic identifier
06/20/2009CA2647312A1 Dynamic identifier for use in identification of a device
06/20/2009CA2645990A1 Contact-less tag with signature, and applications thereof
06/20/2009CA2615559A1 Content searching for portals having secure content
06/18/2009WO2009076653A1 Apparatus and method for processing fragmented cryptographic keys
06/18/2009WO2009076652A1 Apparatus and method for facilitating cryptographic key management services
06/18/2009WO2009076251A2 Accelerating peer-to-peer content distribution
06/18/2009WO2009076232A1 System and method for device bound public key infrastructure
06/18/2009WO2009075987A2 Document verification using dynamic document identification framework
06/18/2009WO2009075986A2 Identification and verification of an unknown document according to an eigen image process
06/18/2009WO2009075688A1 Method and apparatus for gpon gem error correction implementation
06/18/2009WO2009075627A1 Login system
06/18/2009WO2009075353A1 Distributed information creating device, restoring device, verifying device, and secret information distributing system
06/18/2009WO2009075263A1 Side channel attack tolerance evaluation device, method and program
06/18/2009WO2009075180A1 Authentication device, authentication system, authentication method and program
06/18/2009WO2009075020A1 Method for authentication of wireless communication and system for authentication of wireless communication