US6292568B1
(en)
|
1966-12-16 |
2001-09-18 |
Scientific-Atlanta, Inc. |
Representing entitlements to service in a conditional access system
|
US5870474A
(en)
|
1995-12-04 |
1999-02-09 |
Scientific-Atlanta, Inc. |
Method and apparatus for providing conditional access in connection-oriented, interactive networks with a multiplicity of service providers
|
US10361802B1
(en)
|
1999-02-01 |
2019-07-23 |
Blanding Hovenweep, Llc |
Adaptive pattern recognition based control system and method
|
IL106796A
(en)
*
|
1993-08-25 |
1997-11-20 |
Algorithmic Res Ltd |
Broadcast encryption
|
US20020013898A1
(en)
*
|
1997-06-04 |
2002-01-31 |
Sudia Frank W. |
Method and apparatus for roaming use of cryptographic values
|
US5825880A
(en)
|
1994-01-13 |
1998-10-20 |
Sudia; Frank W. |
Multi-step digital signature method and system
|
US5557765A
(en)
*
|
1994-08-11 |
1996-09-17 |
Trusted Information Systems, Inc. |
System and method for data recovery
|
US5557346A
(en)
*
|
1994-08-11 |
1996-09-17 |
Trusted Information Systems, Inc. |
System and method for key escrow encryption
|
CA2138302C
(en)
*
|
1994-12-15 |
1999-05-25 |
Michael S. Fortinsky |
Provision of secure access to external resources from a distributed computing environment
|
US6658568B1
(en)
*
|
1995-02-13 |
2003-12-02 |
Intertrust Technologies Corporation |
Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
|
US7133846B1
(en)
*
|
1995-02-13 |
2006-11-07 |
Intertrust Technologies Corp. |
Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
|
US6272632B1
(en)
*
|
1995-02-21 |
2001-08-07 |
Network Associates, Inc. |
System and method for controlling access to a user secret using a key recovery field
|
US5633928A
(en)
*
|
1995-03-10 |
1997-05-27 |
Bell Communications Research, Inc. |
Key escrow method with warrant bounds
|
US7224798B2
(en)
*
|
1995-04-03 |
2007-05-29 |
Scientific-Atlanta, Inc. |
Methods and apparatus for providing a partial dual-encrypted stream in a conditional access overlay system
|
US6157719A
(en)
*
|
1995-04-03 |
2000-12-05 |
Scientific-Atlanta, Inc. |
Conditional access system
|
US6252964B1
(en)
|
1995-04-03 |
2001-06-26 |
Scientific-Atlanta, Inc. |
Authorization of services in a conditional access system
|
US6560340B1
(en)
|
1995-04-03 |
2003-05-06 |
Scientific-Atlanta, Inc. |
Method and apparatus for geographically limiting service in a conditional access system
|
US6937729B2
(en)
|
1995-04-03 |
2005-08-30 |
Scientific-Atlanta, Inc. |
Representing entitlements to service in a conditional access system
|
US20040136532A1
(en)
*
|
1995-04-03 |
2004-07-15 |
Pinder Howard G. |
Partial dual-encrypted stream utilizing program map tables
|
US6424717B1
(en)
|
1995-04-03 |
2002-07-23 |
Scientific-Atlanta, Inc. |
Encryption devices for use in a conditional access system
|
US6246767B1
(en)
|
1995-04-03 |
2001-06-12 |
Scientific-Atlanta, Inc. |
Source authentication of download information in a conditional access system
|
US8548166B2
(en)
|
1995-04-03 |
2013-10-01 |
Anthony J. Wasilewski |
Method for partially encrypting program data
|
CN1192834A
(zh)
*
|
1995-06-05 |
1998-09-09 |
塞特科有限公司 |
多步数字签名方法和系统
|
US5687235A
(en)
*
|
1995-10-26 |
1997-11-11 |
Novell, Inc. |
Certificate revocation performance optimization
|
DE19540930C1
(de)
*
|
1995-11-03 |
1997-04-24 |
Strohschneider Sabine |
Verfahren zum Erstellen eines Informationsverteilungssystems für beliebig viele geschlossene Nutzergruppen mit Hilfe einer physikalischen Einheit
|
DE19549014C1
(de)
*
|
1995-12-28 |
1997-02-20 |
Siemens Ag |
Verfahren zum Aktivieren und Ausführen von gesicherten Funktionen in einem Kommunikationssystem
|
EP0872077B1
(de)
*
|
1995-12-29 |
2009-09-23 |
Scientific-Atlanta, Inc. |
Verfahren und einrichtung zum bedingten zugang in verbindungsorientierten interaktiven netzwerken mit mehreren dienstanbietern
|
US5768373A
(en)
*
|
1996-05-06 |
1998-06-16 |
Symantec Corporation |
Method for providing a secure non-reusable one-time password
|
US6483920B2
(en)
|
1996-12-04 |
2002-11-19 |
Bull, S.A. |
Key recovery process used for strong encryption of messages
|
FR2763192B1
(fr)
*
|
1996-10-18 |
1999-07-02 |
Bull Sa |
Procede de recuperation de cles mis en oeuvre pour un chiffrement fort de message
|
US5920630A
(en)
*
|
1997-02-25 |
1999-07-06 |
United States Of America |
Method of public key cryptography that includes key escrow
|
US6035041A
(en)
*
|
1997-04-28 |
2000-03-07 |
Certco, Inc. |
Optimal-resilience, proactive, public-key cryptographic system and method
|
DE19718583C5
(de)
*
|
1997-05-05 |
2007-04-26 |
T-Mobile Deutschland Gmbh |
Ende-zu-Ende Verschlüsselung
|
BR9809664A
(pt)
*
|
1997-05-28 |
2000-09-05 |
Adan Lucas Young |
Processo e aparelho compreendendo um criptossistema que pode ser usado para gerar, verificar, usar, e recuperar códigos criptográficos
|
US6314190B1
(en)
*
|
1997-06-06 |
2001-11-06 |
Networks Associates Technology, Inc. |
Cryptographic system with methods for user-controlled message recovery
|
US6775382B1
(en)
*
|
1997-06-30 |
2004-08-10 |
Sun Microsystems, Inc. |
Method and apparatus for recovering encryption session keys
|
US6229894B1
(en)
*
|
1997-07-14 |
2001-05-08 |
Entrust Technologies, Ltd. |
Method and apparatus for access to user-specific encryption information
|
US6603857B1
(en)
*
|
1997-07-14 |
2003-08-05 |
Entrust Technologies Limited |
Method and apparatus for controlling release of time sensitive information
|
WO1999004530A1
(en)
*
|
1997-07-15 |
1999-01-28 |
V-One Corporation |
File encryption with key recovery
|
WO1999007145A1
(en)
*
|
1997-08-01 |
1999-02-11 |
Scientific-Atlanta, Inc. |
Verification of the source of program of information in a conditional access system
|
US7515712B2
(en)
*
|
1997-08-01 |
2009-04-07 |
Cisco Technology, Inc. |
Mechanism and apparatus for encapsulation of entitlement authorization in conditional access system
|
US6160891A
(en)
*
|
1997-10-20 |
2000-12-12 |
Sun Microsystems, Inc. |
Methods and apparatus for recovering keys
|
US6349289B1
(en)
|
1998-01-16 |
2002-02-19 |
Ameritech Corporation |
Method and system for tracking computer system usage through a remote access security device
|
US6243470B1
(en)
|
1998-02-04 |
2001-06-05 |
International Business Machines Corporation |
Method and apparatus for advanced symmetric key block cipher with variable length key and block
|
US6192129B1
(en)
|
1998-02-04 |
2001-02-20 |
International Business Machines Corporation |
Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block
|
US6189095B1
(en)
|
1998-06-05 |
2001-02-13 |
International Business Machines Corporation |
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
|
WO2000022787A2
(en)
*
|
1998-10-09 |
2000-04-20 |
Bankers Trust Company |
Method, system, and computer program product for providing enhanced electronic mail services
|
US6230266B1
(en)
|
1999-02-03 |
2001-05-08 |
Sun Microsystems, Inc. |
Authentication system and process
|
JP2003526833A
(ja)
*
|
1999-02-26 |
2003-09-09 |
レヴェオ・インコーポレーテッド |
グローバル時間同期システム、装置および方法
|
US20020026321A1
(en)
|
1999-02-26 |
2002-02-28 |
Sadeg M. Faris |
Internet-based system and method for fairly and securely enabling timed-constrained competition using globally time-sychronized client subsystems and information servers having microsecond client-event resolution
|
US6625734B1
(en)
*
|
1999-04-26 |
2003-09-23 |
Disappearing, Inc. |
Controlling and tracking access to disseminated information
|
SE514105C2
(sv)
*
|
1999-05-07 |
2001-01-08 |
Ericsson Telefon Ab L M |
Säker distribution och skydd av krypteringsnyckelinformation
|
US6694025B1
(en)
|
1999-06-02 |
2004-02-17 |
Koninklijke Philips Electronics N.V. |
Method and apparatus for secure distribution of public/private key pairs
|
US7142676B1
(en)
*
|
1999-06-08 |
2006-11-28 |
Entrust Limited |
Method and apparatus for secure communications using third-party key provider
|
US7269261B1
(en)
*
|
1999-09-22 |
2007-09-11 |
Raytheon Company |
Key escrow systems
|
US20080082446A1
(en)
*
|
1999-10-01 |
2008-04-03 |
Hicks Christian B |
Remote Authorization for Unlocking Electronic Data System and Method
|
US20050213758A1
(en)
*
|
2000-02-07 |
2005-09-29 |
Lenstra Arjen K |
Efficient and compact subgroup trace representation ("XTR")
|
US7076061B1
(en)
|
2000-02-07 |
2006-07-11 |
Citibank, N.A. |
Efficient and compact subgroup trace representation (“XTR”)
|
SG103257A1
(en)
*
|
2000-04-13 |
2004-04-29 |
Kent Ridge Digital Labs |
Private retrieval of digital objects
|
US6807277B1
(en)
|
2000-06-12 |
2004-10-19 |
Surety, Llc |
Secure messaging system with return receipts
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
AU7182701A
(en)
*
|
2000-07-06 |
2002-01-21 |
David Paul Felsher |
Information record infrastructure, system and method
|
US6851049B1
(en)
*
|
2000-10-02 |
2005-02-01 |
Pgp Corporation |
Method and apparatus for facilitating secure anonymous email recipients
|
US20020071567A1
(en)
*
|
2000-12-12 |
2002-06-13 |
Kurn David Michael |
Scalable computer system using remote agents to manipulate cryptographic keys
|
US8161565B1
(en)
*
|
2000-12-26 |
2012-04-17 |
Entrust, Inc. |
Key release systems, components and methods
|
US7181017B1
(en)
|
2001-03-23 |
2007-02-20 |
David Felsher |
System and method for secure three-party communications
|
US8077679B2
(en)
*
|
2001-03-28 |
2011-12-13 |
Qualcomm Incorporated |
Method and apparatus for providing protocol options in a wireless communication system
|
US9100457B2
(en)
*
|
2001-03-28 |
2015-08-04 |
Qualcomm Incorporated |
Method and apparatus for transmission framing in a wireless communication system
|
US8121296B2
(en)
*
|
2001-03-28 |
2012-02-21 |
Qualcomm Incorporated |
Method and apparatus for security in a data processing system
|
UA75125C2
(uk)
*
|
2001-03-28 |
2006-03-15 |
Квалкомм Інкорпорейтид |
Спосіб керування потужністю для обслуговування багатоточкового з'єднання у системі зв'язку (варіанти) та пристрій для його здійснення (варіанти)
|
US7693508B2
(en)
*
|
2001-03-28 |
2010-04-06 |
Qualcomm Incorporated |
Method and apparatus for broadcast signaling in a wireless communication system
|
JP2003023421A
(ja)
*
|
2001-07-09 |
2003-01-24 |
C4 Technology Inc |
暗号方法、そのプログラム、そのプログラムを記録した記録媒体および暗号装置並びに復号方法および復号装置
|
US7564970B2
(en)
*
|
2004-08-12 |
2009-07-21 |
Cmla, Llc |
Exponential data transform to enhance security
|
US7577250B2
(en)
|
2004-08-12 |
2009-08-18 |
Cmla, Llc |
Key derivation functions to enhance security
|
US8077861B2
(en)
|
2004-08-12 |
2011-12-13 |
Cmla, Llc |
Permutation data transform to enhance security
|
US7185362B2
(en)
*
|
2001-08-20 |
2007-02-27 |
Qualcomm, Incorporated |
Method and apparatus for security in a data processing system
|
US20040120527A1
(en)
*
|
2001-08-20 |
2004-06-24 |
Hawkes Philip Michael |
Method and apparatus for security in a data processing system
|
US7697523B2
(en)
*
|
2001-10-03 |
2010-04-13 |
Qualcomm Incorporated |
Method and apparatus for data packet transport in a wireless communication system using an internet protocol
|
US7352868B2
(en)
*
|
2001-10-09 |
2008-04-01 |
Philip Hawkes |
Method and apparatus for security in a data processing system
|
US7649829B2
(en)
|
2001-10-12 |
2010-01-19 |
Qualcomm Incorporated |
Method and system for reduction of decoding complexity in a communication system
|
US7093133B2
(en)
*
|
2001-12-20 |
2006-08-15 |
Hewlett-Packard Development Company, L.P. |
Group signature generation system using multiple primes
|
US7146009B2
(en)
*
|
2002-02-05 |
2006-12-05 |
Surety, Llc |
Secure electronic messaging system requiring key retrieval for deriving decryption keys
|
FR2836609A1
(fr)
*
|
2002-02-25 |
2003-08-29 |
Thomson Licensing Sa |
Procede de traitement de donnees chiffrees pour un premier domaine et recues dans un reseau appartenant a un second domaine
|
US20040117618A1
(en)
*
|
2002-03-13 |
2004-06-17 |
Kyoko Kawaguchi |
Service execution module
|
US6711678B2
(en)
*
|
2002-04-05 |
2004-03-23 |
Expand Beyond Corporation |
Pre-authenticated communication within a secure computer network
|
TW576063B
(en)
*
|
2002-07-10 |
2004-02-11 |
Benq Corp |
Device and method for securing information associated with a subscriber in a communication apparatus
|
US7599655B2
(en)
*
|
2003-01-02 |
2009-10-06 |
Qualcomm Incorporated |
Method and apparatus for broadcast services in a communication system
|
US9818136B1
(en)
|
2003-02-05 |
2017-11-14 |
Steven M. Hoffberg |
System and method for determining contingent relevance
|
DE10305730B4
(de)
*
|
2003-02-12 |
2005-04-07 |
Deutsche Post Ag |
Verfahren zum Überprüfen der Gültigkeit von digitalen Freimachungsvermerken
|
EP1460796A3
(de)
*
|
2003-03-17 |
2005-02-16 |
Broadcom Corporation |
Erzeugung und Verteilung eines Schlüssels zur Verschlüsselung/Entschlüsselung
|
US8098818B2
(en)
*
|
2003-07-07 |
2012-01-17 |
Qualcomm Incorporated |
Secure registration for a multicast-broadcast-multimedia system (MBMS)
|
US8718279B2
(en)
*
|
2003-07-08 |
2014-05-06 |
Qualcomm Incorporated |
Apparatus and method for a secure broadcast system
|
US8724803B2
(en)
*
|
2003-09-02 |
2014-05-13 |
Qualcomm Incorporated |
Method and apparatus for providing authenticated challenges for broadcast-multicast communications in a communication system
|
US8332652B2
(en)
*
|
2003-10-01 |
2012-12-11 |
International Business Machines Corporation |
Computing device that securely runs authorized software
|
US8396216B2
(en)
*
|
2003-11-21 |
2013-03-12 |
Howard G. Pinder |
Partial dual-encryption using program map tables
|
AU2004319170B2
(en)
*
|
2004-05-03 |
2008-05-01 |
Blackberry Limited |
System and method for generating reproducible session keys
|
US7548152B2
(en)
*
|
2004-10-08 |
2009-06-16 |
Entrust Limited |
RFID transponder information security methods systems and devices
|
US20060182277A1
(en)
*
|
2005-02-14 |
2006-08-17 |
Tricipher, Inc. |
Roaming utilizing an asymmetric key pair
|
US20060182283A1
(en)
*
|
2005-02-14 |
2006-08-17 |
Tricipher, Inc. |
Architecture for asymmetric crypto-key storage
|
US8099607B2
(en)
*
|
2005-01-18 |
2012-01-17 |
Vmware, Inc. |
Asymmetric crypto-graphy with rolling key security
|
US8874477B2
(en)
|
2005-10-04 |
2014-10-28 |
Steven Mark Hoffberg |
Multifactorial optimization system and method
|
US8095960B2
(en)
*
|
2005-11-21 |
2012-01-10 |
Novell, Inc. |
Secure synchronization and sharing of secrets
|
US8135645B2
(en)
*
|
2005-12-06 |
2012-03-13 |
Microsoft Corporation |
Key distribution for secure messaging
|
US7499552B2
(en)
*
|
2006-01-11 |
2009-03-03 |
International Business Machines Corporation |
Cipher method and system for verifying a decryption of an encrypted user data key
|
US8670564B1
(en)
*
|
2006-08-14 |
2014-03-11 |
Key Holdings, LLC |
Data encryption system and method
|
US20090097657A1
(en)
*
|
2007-10-05 |
2009-04-16 |
Scheidt Edward M |
Constructive Channel Key
|
US8376381B2
(en)
|
2008-12-01 |
2013-02-19 |
Commonwheel Ventures, Inc. |
Versatile, collapsible cart-trailer with modular components
|
US8954752B2
(en)
|
2011-02-23 |
2015-02-10 |
International Business Machines Corporation |
Building and distributing secure object software
|
US8578175B2
(en)
|
2011-02-23 |
2013-11-05 |
International Business Machines Corporation |
Secure object having protected region, integrity tree, and unprotected region
|
US8819446B2
(en)
|
2009-06-26 |
2014-08-26 |
International Business Machines Corporation |
Support for secure objects in a computer system
|
US9846789B2
(en)
|
2011-09-06 |
2017-12-19 |
International Business Machines Corporation |
Protecting application programs from malicious software or malware
|
US9298894B2
(en)
|
2009-06-26 |
2016-03-29 |
International Business Machines Corporation |
Cache structure for a computer system providing support for secure objects
|
US9954875B2
(en)
|
2009-06-26 |
2018-04-24 |
International Business Machines Corporation |
Protecting from unintentional malware download
|
US8397281B2
(en)
*
|
2009-12-30 |
2013-03-12 |
Symantec Corporation |
Service assisted secret provisioning
|
US9026805B2
(en)
|
2010-12-30 |
2015-05-05 |
Microsoft Technology Licensing, Llc |
Key management using trusted platform modules
|
US9864853B2
(en)
|
2011-02-23 |
2018-01-09 |
International Business Machines Corporation |
Enhanced security mechanism for authentication of users of a system
|
US20120250865A1
(en)
*
|
2011-03-23 |
2012-10-04 |
Selerity, Inc |
Securely enabling access to information over a network across multiple protocols
|
CA2795287C
(en)
*
|
2011-04-01 |
2018-02-27 |
Certicom Corp. |
Identity-based decryption
|
US9172529B2
(en)
*
|
2011-09-16 |
2015-10-27 |
Certicom Corp. |
Hybrid encryption schemes
|
WO2013046102A2
(en)
|
2011-09-28 |
2013-04-04 |
Koninklijke Philips Electronics N.V. |
Hierarchical attribute-based encryption and decryption
|
US9008316B2
(en)
*
|
2012-03-29 |
2015-04-14 |
Microsoft Technology Licensing, Llc |
Role-based distributed key management
|
EP2785010A1
(de)
*
|
2013-03-28 |
2014-10-01 |
Astrium Limited |
Schlüsselverteilung in einem Satellitensystem
|
WO2014171513A1
(ja)
|
2013-04-18 |
2014-10-23 |
岡本硝子株式会社 |
水中ビデオカメラ用ハウジング
|
US9223965B2
(en)
|
2013-12-10 |
2015-12-29 |
International Business Machines Corporation |
Secure generation and management of a virtual card on a mobile device
|
US9235692B2
(en)
|
2013-12-13 |
2016-01-12 |
International Business Machines Corporation |
Secure application debugging
|
US10002512B2
(en)
|
2014-01-30 |
2018-06-19 |
Le-Jun Yin |
System and method for object entry and egress control in a predefined area
|
US11200560B2
(en)
*
|
2014-12-19 |
2021-12-14 |
Capital One Services, Llc |
Systems and methods for contactless and secure data transfer
|
US20160292445A1
(en)
|
2015-03-31 |
2016-10-06 |
Secude Ag |
Context-based data classification
|
JP6419660B2
(ja)
*
|
2015-07-29 |
2018-11-07 |
株式会社日立製作所 |
秘密情報設定方法、秘密情報設定システム、および秘密情報設定装置
|
EP3196798A1
(de)
|
2016-01-19 |
2017-07-26 |
Secude AG |
Kontextsensitiver kopier- und einfügungsblock
|
US10484379B2
(en)
*
|
2017-03-16 |
2019-11-19 |
Motorola Solutions, Inc. |
System and method for providing least privilege access in a microservices architecture
|
US10944733B2
(en)
*
|
2017-07-31 |
2021-03-09 |
Cisco Technology, Inc. |
Dynamic disassociated channel encryption key distribution
|
CN107590748B
(zh)
*
|
2017-08-17 |
2020-07-10 |
天津大学 |
一种配电网安全域的全维观测方法
|
US11115395B2
(en)
*
|
2019-07-23 |
2021-09-07 |
Harris Global Communications, Inc. |
Cross-domain information transfer system and associated methods
|
WO2021092488A1
(en)
*
|
2019-11-06 |
2021-05-14 |
Washington University |
Public key encryption using self powered timers
|
US11372986B1
(en)
*
|
2021-01-18 |
2022-06-28 |
Axiom Technologies LLC |
Systems and methods for encrypted content management
|
RU2766319C1
(ru)
*
|
2021-03-24 |
2022-03-15 |
федеральное государственное казенное военное образовательное учреждение высшего образования "Военная орденов Жукова и Ленина Краснознаменная академия связи имени Маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации |
Способ формирования ключа шифрования / дешифрования
|