|
Pat.
No. |
Title |
1. |
5,781,632
Method and apparatus for secured transmission of confidential data over an
unsecured network Jul. 14, 1998 |
2. |
5,778,395
System for backing up files from disk volumes on multiple nodes of a computer
network |
3. |
5,778,075
Methods and systems for mobile terminal assisted handover in an private radio
communications network |
4. |
5,778,073
Method and device for speech encryption and decryption in voice
transmission |
5. |
5,778,072
System and method to transparently integrate private key operations from
a smart card with host-based encryption services |
6. |
5,778,071
Pocket encrypting and authenticating communications device |
7. |
5,778,068
Personal access management system |
8. |
5,774,546
Secure access system utilizing an access card having more than one embedded
integrated circuit and/or plurality of security levels |
9. |
5,774,544
Method an apparatus for encrypting and decrypting microprocessor serial
numbers |
10. |
5,773,741
Method and apparatus for nonsequential storage of and access to digital musical
score and performance information |
11. |
5,771,354
Internet online backup system provides remote storage for customers using
IDs and passwords which were interactively established when signing up for
backup services |
12. |
5,771,292
Device and method for data integrity and authentication |
13. |
5,771,238
Enhanced one way radio seven bit data network |
14. |
5,768,390
Cryptographic system with masking |
15. |
5,768,388
Time delayed key escrow |
16. |
5,768,386
Method and system for encrypting input from a touch screen |
17. |
5,768,383
Authorized cellular voice messaging and/or analog or digital data communication
access and verification control system |
18. |
5,768,381
Apparatus for key distribution in an encryption system |
19. |
5,768,372
Method and apparatus for securing programming data of a programmable logic
device |
20. |
5,765,176
Performing document image management tasks using an iconic image having embedded
encoded information |
21. |
5,765,152
System and method for managing copyrighted electronic media |
22. |
5,765,106
Authorized cellular telephone communication access and verification control
system |
23. |
5,764,772
Differential work factor cryptography method and system |
24. |
5,764,770
Image authentication patterning |
25. |
5,764,768
Blind encryption |
26. |
5,764,767
System for reconstruction of a secret shared by a plurality of participants |
27. |
5,764,766
System and method for generation of one-time encryption keys for data
communications and a computer program product for implementing the same |
28. |
5,764,765
Method for key distribution using quantum cryptography |
29. |
5,761,311
Blind encryption |
30. |
5,760,385
Transaction system and method |
31. |
5,758,347
Layered storage structure for computer data storage manager |
32. |
5,758,327
Electronic requisition and authorization process |
33. |
5,757,924
Network security device which performs MAC address translation without affecting
the IP address |
34. |
5,757,919
Cryptographically protected paging subsystem |
35. |
5,757,913
Method and apparatus for data authentication in a data communication
environment |
36. |
5,757,912
System and method for quantum cryptography |
37. |
5,757,911
encryption communication process and terminal for encryption communication |
38. |
5,757,908
Method and apparatus for enabling trial period use of software products:
method and apparatus for utilizing an encryption header |
39. |
5,757,907
Method and apparatus for enabling trial period use of software products:
method and apparatus for generating a machine-dependent identification |
40. |
5,754,787
System for electronically publishing objects with header specifying minimum
and maximum required transport delivery rates and threshold being amount
publisher is willing to pay |
41. |
5,754,658
Adaptive encryption to avoid processor oversaturation |
42. |
5,754,649
Video media security and tracking system |
43. |
5,754,648
Video media security and tracking system |
44. |
5,752,080
Cable terminal unit using bit set for selectively enabling a plurality of
hardware functions with some functions having a plurality of selectively
enabled hardware functions |
45. |
5,751,814
File encryption method |
46. |
5,751,813
Use of an encryption server for encrypting messages |
47. |
5,751,811
32N +D bit key encryption-decryption system using chaos |
48. |
5,751,808
Multi-purpose high speed cryptographically secure sequence generator based
on zeta-one-way functions |
49. |
5,751,805
Data-protecting system |
50. |
5,748,782
Device for implementing a message signature system and chip card comprising
such a device |
51. |
5,748,744
Secure mass storage system for computers |
52. |
5,748,740
Method, apparatus, system and firmware for secure transactions |
53. |
5,748,738
System and method for electronic transmission, storage and retrieval of
authenticated documents |
54. |
5,748,736
System and method for secure group communications via multicast or
broadcast |
55. |
5,748,147
Position locating rescue transceiver |
56. |
5,745,577
Symmetric cryptographic system for data encryption |
57. |
5,745,575
Identification-friend-or-foe (IFF) system using variable codes |
58. |
5,745,574
Security infrastructure for electronic transactions |
59. |
5,745,573
System and method for controlling access to a user secret |
60. |
5,745,571
Cryptographic communications method and system |
61. |
5,745,570
Object-oriented programming environment that provides object encapsulation
via encryption |
62. |
5,745,568
Method of securing CD-ROM data for retrieval by one machine |
63. |
5,745,044
Electronic security system |
64. |
5,742,840
General purpose, multiple precision parallel operation, programmable media
processor |
65. |
5,742,686
Device and method for dynamic encryption |
66. |
5,742,685
Method for verifying an identification card and recording verification of
same |
67. |
5,742,684
Method and apparatus for data encryption and transmission |
68. |
5,742,682
Method of manufacturing secure boxes in a key management system |
69. |
5,742,530
Compact microelectronic device for performing modular multiplication and
exponentiation over large numbers |
70. |
5,740,276
Holographic method for encrypting and decrypting information using a
fingerprint |
71. |
5,740,252
Apparatus and method for passing private demographic information between
hyperlink destinations |
72. |
5,740,251
Data processing apparatus |
73. |
5,740,250
Tame automorphism public key system |
74. |
5,740,249
Encryption apparatus and method capable of controlling encryption process
in accordance with an internal state |
75. |
5,740,247
Authorized cellular telephone communication payment refill system |
76. |
5,740,245
Down-line transcription system for manipulating real-time testimony |
77. |
5,737,421
System for controlling access to a function having clock synchronization |
78. |
5,737,418
Encryption of bill validation data |
79. |
5,737,417
Videotape anti-copying encryption scheme |
80. |
5,734,819
Method and apparatus for validating system operation |
81. |
5,734,721
Anti-spoof without error extension (ANSWER) |
82. |
5,732,137
Method and apparatus for secure remote authentication in a public network |
83. |
5,731,756
Universal encrypted radio transmitter for multiple functions |
84. |
5,729,610
Radio paging unit |
85. |
5,727,063
Pseudo-random generator |
86. |
5,724,428
Block encryption algorithm with data-dependent rotations |
87. |
5,724,427
Method and apparatus for autokey rotor encryption |
88. |
5,724,426
Apparatus and method for controlling access to and interconnection of computer
system resources |
89. |
5,724,424
Digital active advertising |
90. |
5,724,423
Method and apparatus for user authentication |
91. |
5,724,092
Videophone interactive mailbox facility system and method of processing
information |
92. |
5,721,778
Digital signal transmitting method, digital signal receiving apparatus, and
recording medium |
93. |
5,719,941
Method for changing passwords on a remote computer |
94. |
5,719,938
Methods for providing secure access to shared information |
95. |
5,717,760
Message protection system and method |
96. |
5,717,757
Certificate issue lists |
97. |
D390,554
Key variable loader |
98. |
5,715,403
System for controlling the distribution and use of digital works having attached
usage rights where the usage rights are defined by a usage rights grammar |
99. |
5,715,316
Optical image encryption and decryption processes |
100. |
5,715,314
Network sales system Feb. 3, 1998 |