| |
Pat.
No. |
Title |
| 1. |
5,781,632
Method and apparatus for secured transmission of confidential data over an
unsecured network Jul. 14, 1998 |
| 2. |
5,778,395
System for backing up files from disk volumes on multiple nodes of a computer
network |
| 3. |
5,778,075
Methods and systems for mobile terminal assisted handover in an private radio
communications network |
| 4. |
5,778,073
Method and device for speech encryption and decryption in voice
transmission |
| 5. |
5,778,072
System and method to transparently integrate private key operations from
a smart card with host-based encryption services |
| 6. |
5,778,071
Pocket encrypting and authenticating communications device |
| 7. |
5,778,068
Personal access management system |
| 8. |
5,774,546
Secure access system utilizing an access card having more than one embedded
integrated circuit and/or plurality of security levels |
| 9. |
5,774,544
Method an apparatus for encrypting and decrypting microprocessor serial
numbers |
| 10. |
5,773,741
Method and apparatus for nonsequential storage of and access to digital musical
score and performance information |
| 11. |
5,771,354
Internet online backup system provides remote storage for customers using
IDs and passwords which were interactively established when signing up for
backup services |
| 12. |
5,771,292
Device and method for data integrity and authentication |
| 13. |
5,771,238
Enhanced one way radio seven bit data network |
| 14. |
5,768,390
Cryptographic system with masking |
| 15. |
5,768,388
Time delayed key escrow |
| 16. |
5,768,386
Method and system for encrypting input from a touch screen |
| 17. |
5,768,383
Authorized cellular voice messaging and/or analog or digital data communication
access and verification control system |
| 18. |
5,768,381
Apparatus for key distribution in an encryption system |
| 19. |
5,768,372
Method and apparatus for securing programming data of a programmable logic
device |
| 20. |
5,765,176
Performing document image management tasks using an iconic image having embedded
encoded information |
| 21. |
5,765,152
System and method for managing copyrighted electronic media |
| 22. |
5,765,106
Authorized cellular telephone communication access and verification control
system |
| 23. |
5,764,772
Differential work factor cryptography method and system |
| 24. |
5,764,770
Image authentication patterning |
| 25. |
5,764,768
Blind encryption |
| 26. |
5,764,767
System for reconstruction of a secret shared by a plurality of participants |
| 27. |
5,764,766
System and method for generation of one-time encryption keys for data
communications and a computer program product for implementing the same |
| 28. |
5,764,765
Method for key distribution using quantum cryptography |
| 29. |
5,761,311
Blind encryption |
| 30. |
5,760,385
Transaction system and method |
| 31. |
5,758,347
Layered storage structure for computer data storage manager |
| 32. |
5,758,327
Electronic requisition and authorization process |
| 33. |
5,757,924
Network security device which performs MAC address translation without affecting
the IP address |
| 34. |
5,757,919
Cryptographically protected paging subsystem |
| 35. |
5,757,913
Method and apparatus for data authentication in a data communication
environment |
| 36. |
5,757,912
System and method for quantum cryptography |
| 37. |
5,757,911
encryption communication process and terminal for encryption communication |
| 38. |
5,757,908
Method and apparatus for enabling trial period use of software products:
method and apparatus for utilizing an encryption header |
| 39. |
5,757,907
Method and apparatus for enabling trial period use of software products:
method and apparatus for generating a machine-dependent identification |
| 40. |
5,754,787
System for electronically publishing objects with header specifying minimum
and maximum required transport delivery rates and threshold being amount
publisher is willing to pay |
| 41. |
5,754,658
Adaptive encryption to avoid processor oversaturation |
| 42. |
5,754,649
Video media security and tracking system |
| 43. |
5,754,648
Video media security and tracking system |
| 44. |
5,752,080
Cable terminal unit using bit set for selectively enabling a plurality of
hardware functions with some functions having a plurality of selectively
enabled hardware functions |
| 45. |
5,751,814
File encryption method |
| 46. |
5,751,813
Use of an encryption server for encrypting messages |
| 47. |
5,751,811
32N +D bit key encryption-decryption system using chaos |
| 48. |
5,751,808
Multi-purpose high speed cryptographically secure sequence generator based
on zeta-one-way functions |
| 49. |
5,751,805
Data-protecting system |
| 50. |
5,748,782
Device for implementing a message signature system and chip card comprising
such a device |
| 51. |
5,748,744
Secure mass storage system for computers |
| 52. |
5,748,740
Method, apparatus, system and firmware for secure transactions |
| 53. |
5,748,738
System and method for electronic transmission, storage and retrieval of
authenticated documents |
| 54. |
5,748,736
System and method for secure group communications via multicast or
broadcast |
| 55. |
5,748,147
Position locating rescue transceiver |
| 56. |
5,745,577
Symmetric cryptographic system for data encryption |
| 57. |
5,745,575
Identification-friend-or-foe (IFF) system using variable codes |
| 58. |
5,745,574
Security infrastructure for electronic transactions |
| 59. |
5,745,573
System and method for controlling access to a user secret |
| 60. |
5,745,571
Cryptographic communications method and system |
| 61. |
5,745,570
Object-oriented programming environment that provides object encapsulation
via encryption |
| 62. |
5,745,568
Method of securing CD-ROM data for retrieval by one machine |
| 63. |
5,745,044
Electronic security system |
| 64. |
5,742,840
General purpose, multiple precision parallel operation, programmable media
processor |
| 65. |
5,742,686
Device and method for dynamic encryption |
| 66. |
5,742,685
Method for verifying an identification card and recording verification of
same |
| 67. |
5,742,684
Method and apparatus for data encryption and transmission |
| 68. |
5,742,682
Method of manufacturing secure boxes in a key management system |
| 69. |
5,742,530
Compact microelectronic device for performing modular multiplication and
exponentiation over large numbers |
| 70. |
5,740,276
Holographic method for encrypting and decrypting information using a
fingerprint |
| 71. |
5,740,252
Apparatus and method for passing private demographic information between
hyperlink destinations |
| 72. |
5,740,251
Data processing apparatus |
| 73. |
5,740,250
Tame automorphism public key system |
| 74. |
5,740,249
Encryption apparatus and method capable of controlling encryption process
in accordance with an internal state |
| 75. |
5,740,247
Authorized cellular telephone communication payment refill system |
| 76. |
5,740,245
Down-line transcription system for manipulating real-time testimony |
| 77. |
5,737,421
System for controlling access to a function having clock synchronization |
| 78. |
5,737,418
Encryption of bill validation data |
| 79. |
5,737,417
Videotape anti-copying encryption scheme |
| 80. |
5,734,819
Method and apparatus for validating system operation |
| 81. |
5,734,721
Anti-spoof without error extension (ANSWER) |
| 82. |
5,732,137
Method and apparatus for secure remote authentication in a public network |
| 83. |
5,731,756
Universal encrypted radio transmitter for multiple functions |
| 84. |
5,729,610
Radio paging unit |
| 85. |
5,727,063
Pseudo-random generator |
| 86. |
5,724,428
Block encryption algorithm with data-dependent rotations |
| 87. |
5,724,427
Method and apparatus for autokey rotor encryption |
| 88. |
5,724,426
Apparatus and method for controlling access to and interconnection of computer
system resources |
| 89. |
5,724,424
Digital active advertising |
| 90. |
5,724,423
Method and apparatus for user authentication |
| 91. |
5,724,092
Videophone interactive mailbox facility system and method of processing
information |
| 92. |
5,721,778
Digital signal transmitting method, digital signal receiving apparatus, and
recording medium |
| 93. |
5,719,941
Method for changing passwords on a remote computer |
| 94. |
5,719,938
Methods for providing secure access to shared information |
| 95. |
5,717,760
Message protection system and method |
| 96. |
5,717,757
Certificate issue lists |
| 97. |
D390,554
Key variable loader |
| 98. |
5,715,403
System for controlling the distribution and use of digital works having attached
usage rights where the usage rights are defined by a usage rights grammar |
| 99. |
5,715,316
Optical image encryption and decryption processes |
| 100. |
5,715,314
Network sales system Feb. 3, 1998 |