| |
Pat.
No. |
Title |
| 101. |
5,715,164
System and method for communications with postage meters Feb. 3,
1998 |
| 102. |
5,712,915
Encrypted digital circuit multiplication system |
| 103. |
5,712,912
Method and apparatus for securely handling a personal identification number
or cryptographic key using biometric techniques |
| 104. |
5,712,905
Sequential digital profile for processing analog signals |
| 105. |
5,708,712
Vehicle security device with electronic use authorization coding |
| 106. |
5,708,711
Method for selecting a preferred time interval in which to update a communication
unit parameter |
| 107. |
5,708,710
Method and apparatus for authentication in a communication system |
| 108. |
5,706,348
Use of marker packets for synchronization of encryption/decryption keys in
a data communication network |
| 109. |
5,703,952
Method and apparatus for generating a cipher stream |
| 110. |
5,703,950
Method and apparatus for controlling country specific frequency allocation |
| 111. |
5,703,949
Method for establishing secure communications among processing devices |
| 112. |
5,703,948
Protected communication method and system |
| 113. |
5,699,429
Packet TV program component detector |
| 114. |
5,699,428
System for automatic decryption of file data on a per-use basis and automatic
re-encryption within context of multi-threaded operating system under which
applications run in real-time |
| 115. |
5,697,055
Method and apparatus for handoff between different cellular communications
systems |
| 116. |
5,696,828
Random number generating system and process based on chaos |
| 117. |
5,696,826
Method and apparatus for encrypting and decrypting information using a digital
chaos signal |
| 118. |
5,696,825
Personal access management system |
| 119. |
5,696,823
High-bandwidth encryption system with low-bandwidth cryptographic modules |
| 120. |
5,694,473
Decryption of retransmitted data in an encrypted communication system |
| 121. |
5,694,472
Personal access management system |
| 122. |
5,694,216
Scanning heterodyne acousto-optical interferometers |
| 123. |
5,692,049
Personal access management system |
| 124. |
5,692,047
System and method for executing verifiable programs with facility for using
non-verifiable programs from trusted sources |
| 125. |
5,689,565
Cryptography system and method for providing cryptographic services for a
computer application |
| 126. |
5,689,564
Personal access management system |
| 127. |
5,689,563
Method and apparatus for efficient real-time authentication and encryption
in a communication system |
| 128. |
5,689,560
Method and apparatus for enabling trial period use of software products:
method and apparatus for allowing a try-and-buy user interaction |
| 129. |
5,687,237
encryption key management system for an integrated circuit |
| 130. |
RE35,651
Secure hierarchial video delivery system and method |
| 131. |
5,682,428
Personal access management system |
| 132. |
5,680,395
Method and apparatus for time division duplex pilot signal generation |
| 133. |
5,678,043
Data compression and encryption system and method representing records as
differences between sorted domain ordinals that represent field values |
| 134. |
5,677,989
Speaker verification system and process |
| 135. |
5,677,956
Method and apparatus for data encryption/decryption using cellular automata
transform |
| 136. |
5,675,653
Method and apparatus for digital encryption |
| 137. |
5,675,652
Computer readable device implementing a software-efficient pseudorandom function
encryption |
| 138. |
5,675,647
Cable TV system using passwords |
| 139. |
5,674,758
Silicon on insulator achieved using electrochemical etching |
| 140. |
5,673,322
System and method for providing protocol translation and filtering to access
the world wide web from wireless or low-bandwidth networks |
| 141. |
5,673,320
Method and apparatus for image-based validations of printed documents |
| 142. |
5,673,319
Block cipher mode of operation for secure, length-preserving encryption |
| 143. |
5,673,316
Creation and distribution of cryptographic envelope |
| 144. |
5,671,285
Secure communication system |
| 145. |
5,671,279
Electronic commerce using a secure courier system |
| 146. |
5,668,881
encryption of data in different formats |
| 147. |
5,668,880
Inter-vehicle personal data communications device |
| 148. |
5,668,877
Method and apparatus for stepping pair keys in a key-management scheme |
| 149. |
5,668,874
Identification card verification system and method |
| 150. |
5,666,421
Mail processing system including data center verification for mailpieces |
| 151. |
5,666,420
Simultaneous electronic transactions |
| 152. |
5,666,419
encryption device and communication apparatus using same |
| 153. |
5,666,417
Fluorescence authentication reader with coaxial optics |
| 154. |
5,666,416
Certificate revocation system |
| 155. |
5,666,414
Guaranteed partial key-escrow |
| 156. |
5,664,017
Internationally regulated system for one to one cryptographic communications
with national sovereignty without key escrow |
| 157. |
5,661,807
Authentication system using one-time passwords |
| 158. |
5,661,804
Trainable transceiver capable of learning variable codes |
| 159. |
5,659,618
Multi-size cryptographic key system |
| 160. |
5,659,617
Method for providing location certificates |
| 161. |
5,659,614
Method and system for creating and storing a backup copy of file data stored
on a computer |
| 162. |
5,652,868
Data processor having BIOS decryption of emulated media images |
| 163. |
5,652,796
Data encryption control system |
| 164. |
5,651,064
System for preventing piracy of recorded media |
| 165. |
5,649,099
Method for delegating access rights through executable access control program
without delegating access rights not in a specification to any intermediary
nor comprising server security |
| 166. |
5,649,014
Pseudorandom composition-based cryptographic authentication process |
| 167. |
5,647,001
Nonlinear dynamic substitution devices and methods for block substitutions
employing coset decompositions and direct geometric generation |
| 168. |
5,647,000
Failsafe key escrow system |
| 169. |
5,646,993
Information reproducing method and apparatus having protect function and
recording medium used in apparatus |
| 170. |
5,644,710
Personal access management system |
| 171. |
5,642,421
encryption of low data content ATM cells |
| 172. |
5,642,379
Technique for modulating orthogonal signals with one or more analog or digital
signals |
| 173. |
5,640,456
Computer network encryption/decryption device |
| 174. |
5,640,454
System and method for access field verification |
| 175. |
5,638,512
Ring network security system with encoding of data entering a subnetwork
and decoding of data leaving the subnet work |
| 176. |
5,638,445
Blind encryption |
| 177. |
5,638,443
System for controlling the distribution and use of composite digital works |
| 178. |
5,638,442
Method for remotely inspecting a postage meter |
| 179. |
5,636,280
Dual key reflexive encryption security system |
| 180. |
5,636,276
Device for the distribution of music information in digital form |
| 181. |
5,635,012
System for producing a personal ID card |
| 182. |
5,634,012
System for controlling the distribution and use of digital works having a
fee reporting mechanism |
| 183. |
5,633,934
Local area nework encryption decryption system |
| 184. |
5,633,930
Common cryptographic key verification in a transaction network |
| 185. |
5,633,929
Cryptographic key escrow system having reduced vulnerability to harvesting
attacks |
| 186. |
5,633,928
Key escrow method with warrant bounds |
| 187. |
5,631,962
Circuit and method of encrypting key validation |
| 188. |
5,631,961
Device for and method of cryptography that allows third party access |
| 189. |
5,631,960
Autotest of encryption algorithms in embedded secure encryption devices |
| 190. |
5,629,982
Simultaneous electronic transactions with visible trusted parties |
| 191. |
5,629,980
System for controlling the distribution and use of digital works |
| 192. |
5,627,894
Random number generator |
| 193. |
5,627,893
Cryptographic method |
| 194. |
5,627,831
Personal communication network hand over |
| 195. |
5,625,690
Software pay per use system |
| 196. |
5,623,637
Encrypted data storage card including smartcard integrated circuit for storing
an access password and encryption keys |
| 197. |
5,623,549
Cipher mechanisms with fencing and balanced block mixing |
| 198. |
5,623,548
Transformation pattern generating device and encryption function device |
| 199. |
5,623,546
encryption method and system for portable data |
| 200. |
5,619,575
Pseudorandom composition-based cryptographic authentication process Apr.
8, 1997 |