16 July 1998
Source: http://patents.uspto.gov/access/search-bool.html (search term "encryption")


Results of Search in ALL db for:
encryption
: 933 patents.
Hits 1 through 100 out of 933

Feb. 3, 1998 to Jul. 14, 1998 (latest first)

  Pat. No. Title
1. 5,781,632 Method and apparatus for secured transmission of confidential data over an unsecured network Jul. 14, 1998
2. 5,778,395 System for backing up files from disk volumes on multiple nodes of a computer network
3. 5,778,075 Methods and systems for mobile terminal assisted handover in an private radio communications network
4. 5,778,073 Method and device for speech encryption and decryption in voice transmission
5. 5,778,072 System and method to transparently integrate private key operations from a smart card with host-based encryption services
6. 5,778,071 Pocket encrypting and authenticating communications device
7. 5,778,068 Personal access management system
8. 5,774,546 Secure access system utilizing an access card having more than one embedded integrated circuit and/or plurality of security levels
9. 5,774,544 Method an apparatus for encrypting and decrypting microprocessor serial numbers
10. 5,773,741 Method and apparatus for nonsequential storage of and access to digital musical score and performance information
11. 5,771,354 Internet online backup system provides remote storage for customers using IDs and passwords which were interactively established when signing up for backup services
12. 5,771,292 Device and method for data integrity and authentication
13. 5,771,238 Enhanced one way radio seven bit data network
14. 5,768,390 Cryptographic system with masking
15. 5,768,388 Time delayed key escrow
16. 5,768,386 Method and system for encrypting input from a touch screen
17. 5,768,383 Authorized cellular voice messaging and/or analog or digital data communication access and verification control system
18. 5,768,381 Apparatus for key distribution in an encryption system
19. 5,768,372 Method and apparatus for securing programming data of a programmable logic device
20. 5,765,176 Performing document image management tasks using an iconic image having embedded encoded information
21. 5,765,152 System and method for managing copyrighted electronic media
22. 5,765,106 Authorized cellular telephone communication access and verification control system
23. 5,764,772 Differential work factor cryptography method and system
24. 5,764,770 Image authentication patterning
25. 5,764,768 Blind encryption
26. 5,764,767 System for reconstruction of a secret shared by a plurality of participants
27. 5,764,766 System and method for generation of one-time encryption keys for data communications and a computer program product for implementing the same
28. 5,764,765 Method for key distribution using quantum cryptography
29. 5,761,311 Blind encryption
30. 5,760,385 Transaction system and method
31. 5,758,347 Layered storage structure for computer data storage manager
32. 5,758,327 Electronic requisition and authorization process
33. 5,757,924 Network security device which performs MAC address translation without affecting the IP address
34. 5,757,919 Cryptographically protected paging subsystem
35. 5,757,913 Method and apparatus for data authentication in a data communication environment
36. 5,757,912 System and method for quantum cryptography
37. 5,757,911 encryption communication process and terminal for encryption communication
38. 5,757,908 Method and apparatus for enabling trial period use of software products: method and apparatus for utilizing an encryption header
39. 5,757,907 Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
40. 5,754,787 System for electronically publishing objects with header specifying minimum and maximum required transport delivery rates and threshold being amount publisher is willing to pay
41. 5,754,658 Adaptive encryption to avoid processor oversaturation
42. 5,754,649 Video media security and tracking system
43. 5,754,648 Video media security and tracking system
44. 5,752,080 Cable terminal unit using bit set for selectively enabling a plurality of hardware functions with some functions having a plurality of selectively enabled hardware functions
45. 5,751,814 File encryption method
46. 5,751,813 Use of an encryption server for encrypting messages
47. 5,751,811 32N +D bit key encryption-decryption system using chaos
48. 5,751,808 Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
49. 5,751,805 Data-protecting system
50. 5,748,782 Device for implementing a message signature system and chip card comprising such a device
51. 5,748,744 Secure mass storage system for computers
52. 5,748,740 Method, apparatus, system and firmware for secure transactions
53. 5,748,738 System and method for electronic transmission, storage and retrieval of authenticated documents
54. 5,748,736 System and method for secure group communications via multicast or broadcast
55. 5,748,147 Position locating rescue transceiver
56. 5,745,577 Symmetric cryptographic system for data encryption
57. 5,745,575 Identification-friend-or-foe (IFF) system using variable codes
58. 5,745,574 Security infrastructure for electronic transactions
59. 5,745,573 System and method for controlling access to a user secret
60. 5,745,571 Cryptographic communications method and system
61. 5,745,570 Object-oriented programming environment that provides object encapsulation via encryption
62. 5,745,568 Method of securing CD-ROM data for retrieval by one machine
63. 5,745,044 Electronic security system
64. 5,742,840 General purpose, multiple precision parallel operation, programmable media processor
65. 5,742,686 Device and method for dynamic encryption
66. 5,742,685 Method for verifying an identification card and recording verification of same
67. 5,742,684 Method and apparatus for data encryption and transmission
68. 5,742,682 Method of manufacturing secure boxes in a key management system
69. 5,742,530 Compact microelectronic device for performing modular multiplication and exponentiation over large numbers
70. 5,740,276 Holographic method for encrypting and decrypting information using a fingerprint
71. 5,740,252 Apparatus and method for passing private demographic information between hyperlink destinations
72. 5,740,251 Data processing apparatus
73. 5,740,250 Tame automorphism public key system
74. 5,740,249 Encryption apparatus and method capable of controlling encryption process in accordance with an internal state
75. 5,740,247 Authorized cellular telephone communication payment refill system
76. 5,740,245 Down-line transcription system for manipulating real-time testimony
77. 5,737,421 System for controlling access to a function having clock synchronization
78. 5,737,418 Encryption of bill validation data
79. 5,737,417 Videotape anti-copying encryption scheme
80. 5,734,819 Method and apparatus for validating system operation
81. 5,734,721 Anti-spoof without error extension (ANSWER)
82. 5,732,137 Method and apparatus for secure remote authentication in a public network
83. 5,731,756 Universal encrypted radio transmitter for multiple functions
84. 5,729,610 Radio paging unit
85. 5,727,063 Pseudo-random generator
86. 5,724,428 Block encryption algorithm with data-dependent rotations
87. 5,724,427 Method and apparatus for autokey rotor encryption
88. 5,724,426 Apparatus and method for controlling access to and interconnection of computer system resources
89. 5,724,424 Digital active advertising
90. 5,724,423 Method and apparatus for user authentication
91. 5,724,092 Videophone interactive mailbox facility system and method of processing information
92. 5,721,778 Digital signal transmitting method, digital signal receiving apparatus, and recording medium
93. 5,719,941 Method for changing passwords on a remote computer
94. 5,719,938 Methods for providing secure access to shared information
95. 5,717,760 Message protection system and method
96. 5,717,757 Certificate issue lists
97. D390,554 Key variable loader
98. 5,715,403 System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar
99. 5,715,316 Optical image encryption and decryption processes
100. 5,715,314 Network sales system Feb. 3, 1998