US4868877A
(en)
|
1988-02-12 |
1989-09-19 |
Fischer Addison M |
Public key/signature cryptosystem with enhanced digital signature certification
|
US4918728A
(en)
|
1989-08-30 |
1990-04-17 |
International Business Machines Corporation |
Data cryptography operations using control vectors
|
US5146498A
(en)
|
1991-01-10 |
1992-09-08 |
Motorola, Inc. |
Remote key manipulations for over-the-air re-keying
|
US5201000A
(en)
|
1991-09-27 |
1993-04-06 |
International Business Machines Corporation |
Method for generating public and private key pairs without using a passphrase
|
US5495533A
(en)
|
1994-04-29 |
1996-02-27 |
International Business Machines Corporation |
Personal key archive
|
US5761306A
(en)
|
1996-02-22 |
1998-06-02 |
Visa International Service Association |
Key replacement in a public key cryptosystem
|
JPH1041933A
(en)
|
1996-07-22 |
1998-02-13 |
Fuji Xerox Co Ltd |
Decoder
|
US6253323B1
(en)
|
1996-11-01 |
2001-06-26 |
Intel Corporation |
Object-based digital signatures
|
US6546492B1
(en)
|
1999-03-26 |
2003-04-08 |
Ericsson Inc. |
System for secure controlled electronic memory updates via networks
|
JP2000295209A
(en)
|
1999-04-09 |
2000-10-20 |
Ntt Data Corp |
Method and system for key management and recording medium
|
SE9904094D0
(en)
|
1999-11-12 |
1999-11-12 |
Protegrity Research & Dev |
Method for reencryption of a database
|
US6826609B1
(en)
|
2000-03-31 |
2004-11-30 |
Tumbleweed Communications Corp. |
Policy enforcement in a secure data file delivery system
|
DE10025626A1
(en)
|
2000-05-24 |
2001-11-29 |
Deutsche Telekom Ag |
Encrypt data to be stored in an IV system
|
US8538843B2
(en)
|
2000-07-17 |
2013-09-17 |
Galactic Computing Corporation Bvi/Bc |
Method and system for operating an E-commerce service provider
|
US6986040B1
(en)
|
2000-11-03 |
2006-01-10 |
Citrix Systems, Inc. |
System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
|
US20050120232A1
(en)
|
2000-11-28 |
2005-06-02 |
Yoshihiro Hori |
Data terminal managing ciphered content data and license acquired by software
|
US7181017B1
(en)
|
2001-03-23 |
2007-02-20 |
David Felsher |
System and method for secure three-party communications
|
US7050583B2
(en)
|
2001-03-29 |
2006-05-23 |
Etreppid Technologies, Llc |
Method and apparatus for streaming data using rotating cryptographic keys
|
CA2358048A1
(en)
|
2001-09-25 |
2003-03-25 |
Luis Rueda |
A cryptosystem for data security
|
US7200747B2
(en)
|
2001-10-31 |
2007-04-03 |
Hewlett-Packard Development Company, L.P. |
System for ensuring data privacy and user differentiation in a distributed file system
|
US7243366B2
(en)
|
2001-11-15 |
2007-07-10 |
General Instrument Corporation |
Key management protocol and authentication system for secure internet protocol rights management architecture
|
US20020076044A1
(en)
|
2001-11-16 |
2002-06-20 |
Paul Pires |
Method of and system for encrypting messages, generating encryption keys and producing secure session keys
|
US7580972B2
(en)
|
2001-12-12 |
2009-08-25 |
Valve Corporation |
Method and system for controlling bandwidth on client and server
|
US7117366B2
(en)
|
2002-01-08 |
2006-10-03 |
International Business Machines Corporation |
Public key based authentication method for transaction delegation in service-based computing environments
|
US7376967B1
(en)
|
2002-01-14 |
2008-05-20 |
F5 Networks, Inc. |
Method and system for performing asynchronous cryptographic operations
|
JP3897613B2
(en)
|
2002-02-27 |
2007-03-28 |
株式会社日立製作所 |
Operation method of registration authority server, registration authority server, and program in public key cryptosystem
|
US20030188188A1
(en)
|
2002-03-15 |
2003-10-02 |
Microsoft Corporation |
Time-window-constrained multicast for future delivery multicast
|
US7890771B2
(en)
|
2002-04-17 |
2011-02-15 |
Microsoft Corporation |
Saving and retrieving data based on public key encryption
|
US7778606B2
(en)
|
2002-05-17 |
2010-08-17 |
Network Security Technologies, Inc. |
Method and system for wireless intrusion detection
|
US20040009815A1
(en)
|
2002-06-26 |
2004-01-15 |
Zotto Banjamin O. |
Managing access to content
|
US7620680B1
(en)
|
2002-08-15 |
2009-11-17 |
Microsoft Corporation |
Fast byzantine paxos
|
US7877607B2
(en)
|
2002-08-30 |
2011-01-25 |
Hewlett-Packard Development Company, L.P. |
Tamper-evident data management
|
FR2844656B1
(en)
|
2002-09-18 |
2005-01-28 |
France Telecom |
ELECTRONIC SIGNATURE METHOD, PROGRAM AND SERVER FOR IMPLEMENTING THE METHOD
|
US20040107345A1
(en)
|
2002-10-21 |
2004-06-03 |
Brandt David D. |
System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
|
US7565419B1
(en)
|
2002-11-22 |
2009-07-21 |
Symantec Operating Corporation |
Conflict resolution in a peer to peer network
|
US20040143733A1
(en)
|
2003-01-16 |
2004-07-22 |
Cloverleaf Communication Co. |
Secure network data storage mediator
|
GB2400699B
(en)
|
2003-04-17 |
2006-07-05 |
Hewlett Packard Development Co |
Security data provision method and apparatus and data recovery method and system
|
US7409545B2
(en)
*
|
2003-09-18 |
2008-08-05 |
Sun Microsystems, Inc. |
Ephemeral decryption utilizing binding functions
|
JP2005151529A
(en)
|
2003-10-20 |
2005-06-09 |
Sony Corp |
Data transmission method, data transmission device, and data reception device
|
US7296023B2
(en)
|
2004-01-15 |
2007-11-13 |
International Business Machines Corporation |
Method and apparatus for persistent real-time collaboration
|
EP2267625A3
(en)
|
2004-04-19 |
2015-08-05 |
Lumension Security S.A. |
On-line centralized and local authorization of executable files
|
JP4532484B2
(en)
|
2004-05-17 |
2010-08-25 |
三菱電機株式会社 |
Quantum cryptographic communication device
|
US20060010323A1
(en)
|
2004-07-07 |
2006-01-12 |
Xerox Corporation |
Method for a repository to provide access to a document, and a repository arranged in accordance with the same method
|
EP1768303A1
(en)
|
2004-07-15 |
2007-03-28 |
Matsushita Electric Industrial Co., Ltd. |
Time authentication device, time authentication method, computer program, recording medium, integrated circuit, and time authentication system
|
US20060021018A1
(en)
|
2004-07-21 |
2006-01-26 |
International Business Machines Corporation |
Method and system for enabling trust infrastructure support for federated user lifecycle management
|
US7814314B2
(en)
|
2004-08-31 |
2010-10-12 |
Ntt Docomo, Inc. |
Revocation of cryptographic digital certificates
|
JP4816458B2
(en)
|
2004-09-03 |
2011-11-16 |
日本電気株式会社 |
Group signature system, member status determination apparatus, group signature method, and member status determination program
|
JP2006120089A
(en)
|
2004-10-25 |
2006-05-11 |
Ntt Docomo Inc |
Data management system and data management method
|
JP2006127349A
(en)
|
2004-11-01 |
2006-05-18 |
Ntt Communications Kk |
Digital copyright management apparatus and program
|
JP4714482B2
(en)
|
2005-02-28 |
2011-06-29 |
株式会社日立製作所 |
Cryptographic communication system and method
|
US7900247B2
(en)
|
2005-03-14 |
2011-03-01 |
Microsoft Corporation |
Trusted third party authentication for web services
|
US7774826B1
(en)
|
2005-03-18 |
2010-08-10 |
Novell, Inc. |
System and method for determining effective policy profiles in a client-server architecture
|
US8295492B2
(en)
|
2005-06-27 |
2012-10-23 |
Wells Fargo Bank, N.A. |
Automated key management system
|
US7784087B2
(en)
|
2005-08-04 |
2010-08-24 |
Toshiba Corporation |
System and method for securely sharing electronic documents
|
US8566607B2
(en)
|
2005-08-26 |
2013-10-22 |
International Business Machines Corporation |
Cryptography methods and apparatus used with a processor
|
JP4569464B2
(en)
|
2005-12-20 |
2010-10-27 |
沖電気工業株式会社 |
Key update system, key management device, communication terminal and key information construction method in multi-hop network
|
US7912994B2
(en)
|
2006-01-27 |
2011-03-22 |
Apple Inc. |
Reducing connection time for mass storage class peripheral by internally prefetching file data into local cache in response to connection to host
|
JP4226606B2
(en)
|
2006-02-06 |
2009-02-18 |
株式会社コナミデジタルエンタテインメント |
COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
|
US7925023B2
(en)
*
|
2006-03-03 |
2011-04-12 |
Oracle International Corporation |
Method and apparatus for managing cryptographic keys
|
US8064604B2
(en)
|
2006-04-04 |
2011-11-22 |
Oracle International Corporation |
Method and apparatus for facilitating role-based cryptographic key management for a database
|
US9002018B2
(en)
|
2006-05-09 |
2015-04-07 |
Sync Up Technologies Corporation |
Encryption key exchange system and method
|
US20070283446A1
(en)
|
2006-06-05 |
2007-12-06 |
Kabushiki Kaisha Toshiba |
System and method for secure handling of scanned documents
|
WO2008014328A2
(en)
|
2006-07-25 |
2008-01-31 |
Pivx Solutions, Inc. |
Systems and methods for digitally-signed updates
|
US8689287B2
(en)
|
2006-08-17 |
2014-04-01 |
Northrop Grumman Systems Corporation |
Federated credentialing system and method
|
US20100316219A1
(en)
|
2007-08-06 |
2010-12-16 |
David Boubion |
Systems and methods for simultaneous integrated multiencrypted rotating key communication
|
US7953978B2
(en)
|
2006-09-07 |
2011-05-31 |
International Business Machines Corporation |
Key generation and retrieval using key servers
|
US8407806B2
(en)
|
2006-09-29 |
2013-03-26 |
Purusharth Agrawal |
Digital data distribution detection, deterrence and disablement system and method
|
GB2443244A
(en)
|
2006-10-05 |
2008-04-30 |
Hewlett Packard Development Co |
Authenticated Encryption Method and Apparatus
|
CN101166259B
(en)
*
|
2006-10-16 |
2010-11-10 |
华为技术有限公司 |
Mobile phone TV service protection method, system, mobile phone TV server and terminal
|
US8090098B2
(en)
|
2006-11-13 |
2012-01-03 |
Electronics And Telecommunications Research Institute |
Method of generating message authentication code using stream cipher and authentication/encryption and authentication/decryption methods using stream cipher
|
WO2008071353A2
(en)
|
2006-12-12 |
2008-06-19 |
Fraunhofer-Gesellschaft Zur Förderung Der Angewandten Forschung E.V: |
Encoder, decoder and methods for encoding and decoding data segments representing a time-domain data stream
|
US20080172562A1
(en)
|
2007-01-12 |
2008-07-17 |
Christian Cachin |
Encryption and authentication of data and for decryption and verification of authenticity of data
|
JP4890309B2
(en)
|
2007-03-19 |
2012-03-07 |
株式会社リコー |
Information processing apparatus and information protection method
|
US8218761B2
(en)
|
2007-04-06 |
2012-07-10 |
Oracle International Corporation |
Method and apparatus for generating random data-encryption keys
|
US8429406B2
(en)
|
2007-06-04 |
2013-04-23 |
Qualcomm Atheros, Inc. |
Authorizing customer premise equipment into a network
|
US20080319909A1
(en)
|
2007-06-25 |
2008-12-25 |
Perkins George S |
System and method for managing the lifecycle of encryption keys
|
MX2010000619A
(en)
|
2007-07-17 |
2010-05-17 |
William Howard Peirson Jr |
Systems and processes for obtaining and managing electronic signatures for real estate transaction documents.
|
US8111828B2
(en)
|
2007-07-31 |
2012-02-07 |
Hewlett-Packard Development Company, L.P. |
Management of cryptographic keys for securing stored data
|
US8140847B1
(en)
|
2007-09-18 |
2012-03-20 |
Jianqing Wu |
Digital safe
|
CN101400059B
(en)
|
2007-09-28 |
2010-12-08 |
华为技术有限公司 |
Cipher key updating method and device under active state
|
KR100980831B1
(en)
|
2007-12-12 |
2010-09-10 |
한국전자통신연구원 |
Method and apparatus for deterrence of secure communication using One Time Password
|
US8495357B2
(en)
|
2007-12-19 |
2013-07-23 |
International Business Machines Corporation |
Data security policy enforcement
|
WO2009104873A2
(en)
|
2008-02-19 |
2009-08-27 |
Lg Electronics Inc. |
Method and device for managing authorization of right object in digital rights management
|
US8681990B2
(en)
|
2008-03-28 |
2014-03-25 |
International Business Machines Corporation |
Renewal management for data items
|
US8225106B2
(en)
|
2008-04-02 |
2012-07-17 |
Protegrity Corporation |
Differential encryption utilizing trust modes
|
US8494168B1
(en)
|
2008-04-28 |
2013-07-23 |
Netapp, Inc. |
Locating cryptographic keys stored in a cache
|
US8589697B2
(en)
|
2008-04-30 |
2013-11-19 |
Netapp, Inc. |
Discarding sensitive data from persistent point-in-time image
|
US20090300356A1
(en)
|
2008-05-27 |
2009-12-03 |
Crandell Jeffrey L |
Remote storage encryption system
|
US20100014662A1
(en)
|
2008-06-19 |
2010-01-21 |
Sami Antti Jutila |
Method, apparatus and computer program product for providing trusted storage of temporary subscriber data
|
US20110099362A1
(en)
|
2008-06-23 |
2011-04-28 |
Tomoyuki Haga |
Information processing device, encryption key management method, computer program and integrated circuit
|
US8261320B1
(en)
|
2008-06-30 |
2012-09-04 |
Symantec Corporation |
Systems and methods for securely managing access to data
|
GB0811897D0
(en)
|
2008-06-30 |
2008-07-30 |
Steed Darren |
Intelligent file encapsulation
|
JP4620146B2
(en)
|
2008-07-18 |
2011-01-26 |
株式会社東芝 |
Information processing apparatus and authentication method
|
US8302170B2
(en)
|
2008-09-22 |
2012-10-30 |
Bespoke Innovations S.A.R.L. |
Method for enhancing network application security
|
US8804950B1
(en)
|
2008-09-30 |
2014-08-12 |
Juniper Networks, Inc. |
Methods and apparatus for producing a hash value based on a hash function
|
JP2010087888A
(en)
|
2008-09-30 |
2010-04-15 |
Onkyo Corp |
Encryption key distribution system, encryption key distribution server, content distribution server, and client
|
US8699704B2
(en)
|
2010-01-13 |
2014-04-15 |
Entropic Communications, Inc. |
Secure node admission in a communication network
|
US9165154B2
(en)
|
2009-02-16 |
2015-10-20 |
Microsoft Technology Licensing, Llc |
Trusted cloud computing and services framework
|
US8245037B1
(en)
|
2009-02-17 |
2012-08-14 |
Amazon Technologies, Inc. |
Encryption key management
|
US8284945B2
(en)
|
2009-06-02 |
2012-10-09 |
Hewlett-Packard Development Company, L.P. |
Automatic change of symmetrical encryption key
|
US9031876B2
(en)
|
2009-06-19 |
2015-05-12 |
Hewlett-Packard Development Company, L.P. |
Managing keys for encrypted shared documents
|
US8799322B2
(en)
|
2009-07-24 |
2014-08-05 |
Cisco Technology, Inc. |
Policy driven cloud storage management and cloud storage policy router
|
US8904169B2
(en)
|
2009-09-15 |
2014-12-02 |
Symantec Corporation |
Just in time trust establishment and propagation
|
US9311465B2
(en)
|
2009-09-21 |
2016-04-12 |
James McNulty |
Secure information storage and retrieval apparatus and method
|
IL201351A0
(en)
|
2009-10-01 |
2010-05-31 |
Michael Feldbau |
Device and method for electronic signature via proxy
|
DE102009046436A1
(en)
|
2009-11-05 |
2011-05-12 |
Robert Bosch Gmbh |
Cryptographic hardware module or method for updating a cryptographic key
|
WO2011073894A1
(en)
|
2009-12-18 |
2011-06-23 |
Koninklijke Philips Electronics N.V. |
Digital rights management using attribute-based encryption
|
GB201000288D0
(en)
|
2010-01-11 |
2010-02-24 |
Scentrics Information Security |
System and method of enforcing a computer policy
|
US20110213971A1
(en)
|
2010-03-01 |
2011-09-01 |
Nokia Corporation |
Method and apparatus for providing rights management at file system level
|
US8667269B2
(en)
|
2010-04-02 |
2014-03-04 |
Suridx, Inc. |
Efficient, secure, cloud-based identity services
|
EP2378451B1
(en)
|
2010-04-19 |
2018-07-04 |
Vodafone Holding GmbH |
User authentication in a tag-based service
|
US8601600B1
(en)
|
2010-05-18 |
2013-12-03 |
Google Inc. |
Storing encrypted objects
|
US20120079289A1
(en)
|
2010-09-27 |
2012-03-29 |
Skymedi Corporation |
Secure erase system for a solid state non-volatile memory device
|
US8401186B2
(en)
|
2010-11-29 |
2013-03-19 |
Beijing Z&W Technology Consulting Co., Ltd. |
Cloud storage data access method, apparatus and system based on OTP
|
US8565422B2
(en)
*
|
2010-12-03 |
2013-10-22 |
Salesforce.Com, Inc. |
Method and system for enryption key versioning and key rotation in a multi-tenant environment
|
KR101145766B1
(en)
|
2010-12-10 |
2012-05-16 |
고려대학교 산학협력단 |
System and method for providing security service
|
US8478858B2
(en)
|
2011-02-01 |
2013-07-02 |
Limelight Networks, Inc. |
Policy management for content storage in content delivery networks
|
US8588426B2
(en)
|
2011-02-21 |
2013-11-19 |
Blackberry Limited |
Methods and apparatus to secure communications in a mobile network
|
EP2515499B1
(en)
*
|
2011-04-21 |
2015-10-28 |
Wibu-Systems AG |
Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer
|
US8850593B2
(en)
|
2011-05-12 |
2014-09-30 |
Hewlett-Packard Development Company, L.P. |
Data management using a virtual machine-data image
|
US9076020B2
(en)
|
2011-05-13 |
2015-07-07 |
Microsoft Technology Licensing, Llc |
Protected mode for mobile communication and other devices
|
US9049023B2
(en)
|
2011-05-24 |
2015-06-02 |
Zeutro Llc |
Outsourcing the decryption of functional encryption ciphertexts
|
US20120303310A1
(en)
|
2011-05-26 |
2012-11-29 |
First Data Corporation |
Systems and Methods for Providing Test Keys to Mobile Devices
|
KR20120134509A
(en)
|
2011-06-02 |
2012-12-12 |
삼성전자주식회사 |
Apparatus and method for generating and installing application for device in application development system
|
US8516244B2
(en)
|
2011-06-10 |
2013-08-20 |
Zeutro Llc |
System, apparatus and method for decentralizing attribute-based encryption information
|
US20120323990A1
(en)
|
2011-06-15 |
2012-12-20 |
Microsoft Corporation |
Efficient state reconciliation
|
US20120324225A1
(en)
|
2011-06-20 |
2012-12-20 |
Jason Chambers |
Certificate-based mutual authentication for data security
|
US8751807B2
(en)
|
2011-06-23 |
2014-06-10 |
Azuki Systems Inc. |
Method and system for secure over-the-top live video delivery
|
US9009315B2
(en)
|
2011-07-28 |
2015-04-14 |
Telefonaktiebolaget L M Ericsson (Publ) |
Hierarchical delegation and reservation of lookup keys
|
US8798273B2
(en)
|
2011-08-19 |
2014-08-05 |
International Business Machines Corporation |
Extending credential type to group Key Management Interoperability Protocol (KMIP) clients
|
US8788843B2
(en)
|
2011-10-28 |
2014-07-22 |
LogMeln, Inc. |
Storing user data in a service provider cloud without exposing user-specific secrets to the service provider
|
WO2013084054A1
(en)
|
2011-12-08 |
2013-06-13 |
Dark Matter Labs Inc. |
Key creation and rotation for data encryption
|
US8639951B2
(en)
|
2011-12-19 |
2014-01-28 |
International Business Machines Corporation |
States for breakout appliance in a mobile data network
|
US8954758B2
(en)
|
2011-12-20 |
2015-02-10 |
Nicolas LEOUTSARAKOS |
Password-less security and protection of online digital assets
|
US9449183B2
(en)
|
2012-01-28 |
2016-09-20 |
Jianqing Wu |
Secure file drawer and safe
|
US9237446B2
(en)
|
2012-05-24 |
2016-01-12 |
Blackberry Limited |
System and method for controlling access to media content
|
US9590959B2
(en)
|
2013-02-12 |
2017-03-07 |
Amazon Technologies, Inc. |
Data security service
|
US9563891B2
(en)
|
2012-07-09 |
2017-02-07 |
Google Inc. |
Systems, methods, and computer program products for integrating third party services with a mobile wallet
|
US9137222B2
(en)
|
2012-10-31 |
2015-09-15 |
Vmware, Inc. |
Crypto proxy for cloud storage services
|
US8713311B1
(en)
|
2012-11-07 |
2014-04-29 |
Google Inc. |
Encryption using alternate authentication key
|
US8997197B2
(en)
|
2012-12-12 |
2015-03-31 |
Citrix Systems, Inc. |
Encryption-based data access management
|
US10038679B2
(en)
|
2012-12-24 |
2018-07-31 |
Intel Corporation |
Centralized secure device pairing
|
JP6112874B2
(en)
|
2013-01-21 |
2017-04-12 |
キヤノン株式会社 |
COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND PROGRAM
|
US9547771B2
(en)
|
2013-02-12 |
2017-01-17 |
Amazon Technologies, Inc. |
Policy enforcement with associated data
|
US9311500B2
(en)
*
|
2013-09-25 |
2016-04-12 |
Amazon Technologies, Inc. |
Data security using request-supplied keys
|
US9094453B2
(en)
|
2013-11-06 |
2015-07-28 |
Google Technology Holdings LLC |
Method and apparatus for associating mobile devices using audio signature detection
|