|
Pat.
No. |
Title |
101. |
5,715,164
System and method for communications with postage meters Feb. 3,
1998 |
102. |
5,712,915
Encrypted digital circuit multiplication system |
103. |
5,712,912
Method and apparatus for securely handling a personal identification number
or cryptographic key using biometric techniques |
104. |
5,712,905
Sequential digital profile for processing analog signals |
105. |
5,708,712
Vehicle security device with electronic use authorization coding |
106. |
5,708,711
Method for selecting a preferred time interval in which to update a communication
unit parameter |
107. |
5,708,710
Method and apparatus for authentication in a communication system |
108. |
5,706,348
Use of marker packets for synchronization of encryption/decryption keys in
a data communication network |
109. |
5,703,952
Method and apparatus for generating a cipher stream |
110. |
5,703,950
Method and apparatus for controlling country specific frequency allocation |
111. |
5,703,949
Method for establishing secure communications among processing devices |
112. |
5,703,948
Protected communication method and system |
113. |
5,699,429
Packet TV program component detector |
114. |
5,699,428
System for automatic decryption of file data on a per-use basis and automatic
re-encryption within context of multi-threaded operating system under which
applications run in real-time |
115. |
5,697,055
Method and apparatus for handoff between different cellular communications
systems |
116. |
5,696,828
Random number generating system and process based on chaos |
117. |
5,696,826
Method and apparatus for encrypting and decrypting information using a digital
chaos signal |
118. |
5,696,825
Personal access management system |
119. |
5,696,823
High-bandwidth encryption system with low-bandwidth cryptographic modules |
120. |
5,694,473
Decryption of retransmitted data in an encrypted communication system |
121. |
5,694,472
Personal access management system |
122. |
5,694,216
Scanning heterodyne acousto-optical interferometers |
123. |
5,692,049
Personal access management system |
124. |
5,692,047
System and method for executing verifiable programs with facility for using
non-verifiable programs from trusted sources |
125. |
5,689,565
Cryptography system and method for providing cryptographic services for a
computer application |
126. |
5,689,564
Personal access management system |
127. |
5,689,563
Method and apparatus for efficient real-time authentication and encryption
in a communication system |
128. |
5,689,560
Method and apparatus for enabling trial period use of software products:
method and apparatus for allowing a try-and-buy user interaction |
129. |
5,687,237
encryption key management system for an integrated circuit |
130. |
RE35,651
Secure hierarchial video delivery system and method |
131. |
5,682,428
Personal access management system |
132. |
5,680,395
Method and apparatus for time division duplex pilot signal generation |
133. |
5,678,043
Data compression and encryption system and method representing records as
differences between sorted domain ordinals that represent field values |
134. |
5,677,989
Speaker verification system and process |
135. |
5,677,956
Method and apparatus for data encryption/decryption using cellular automata
transform |
136. |
5,675,653
Method and apparatus for digital encryption |
137. |
5,675,652
Computer readable device implementing a software-efficient pseudorandom function
encryption |
138. |
5,675,647
Cable TV system using passwords |
139. |
5,674,758
Silicon on insulator achieved using electrochemical etching |
140. |
5,673,322
System and method for providing protocol translation and filtering to access
the world wide web from wireless or low-bandwidth networks |
141. |
5,673,320
Method and apparatus for image-based validations of printed documents |
142. |
5,673,319
Block cipher mode of operation for secure, length-preserving encryption |
143. |
5,673,316
Creation and distribution of cryptographic envelope |
144. |
5,671,285
Secure communication system |
145. |
5,671,279
Electronic commerce using a secure courier system |
146. |
5,668,881
encryption of data in different formats |
147. |
5,668,880
Inter-vehicle personal data communications device |
148. |
5,668,877
Method and apparatus for stepping pair keys in a key-management scheme |
149. |
5,668,874
Identification card verification system and method |
150. |
5,666,421
Mail processing system including data center verification for mailpieces |
151. |
5,666,420
Simultaneous electronic transactions |
152. |
5,666,419
encryption device and communication apparatus using same |
153. |
5,666,417
Fluorescence authentication reader with coaxial optics |
154. |
5,666,416
Certificate revocation system |
155. |
5,666,414
Guaranteed partial key-escrow |
156. |
5,664,017
Internationally regulated system for one to one cryptographic communications
with national sovereignty without key escrow |
157. |
5,661,807
Authentication system using one-time passwords |
158. |
5,661,804
Trainable transceiver capable of learning variable codes |
159. |
5,659,618
Multi-size cryptographic key system |
160. |
5,659,617
Method for providing location certificates |
161. |
5,659,614
Method and system for creating and storing a backup copy of file data stored
on a computer |
162. |
5,652,868
Data processor having BIOS decryption of emulated media images |
163. |
5,652,796
Data encryption control system |
164. |
5,651,064
System for preventing piracy of recorded media |
165. |
5,649,099
Method for delegating access rights through executable access control program
without delegating access rights not in a specification to any intermediary
nor comprising server security |
166. |
5,649,014
Pseudorandom composition-based cryptographic authentication process |
167. |
5,647,001
Nonlinear dynamic substitution devices and methods for block substitutions
employing coset decompositions and direct geometric generation |
168. |
5,647,000
Failsafe key escrow system |
169. |
5,646,993
Information reproducing method and apparatus having protect function and
recording medium used in apparatus |
170. |
5,644,710
Personal access management system |
171. |
5,642,421
encryption of low data content ATM cells |
172. |
5,642,379
Technique for modulating orthogonal signals with one or more analog or digital
signals |
173. |
5,640,456
Computer network encryption/decryption device |
174. |
5,640,454
System and method for access field verification |
175. |
5,638,512
Ring network security system with encoding of data entering a subnetwork
and decoding of data leaving the subnet work |
176. |
5,638,445
Blind encryption |
177. |
5,638,443
System for controlling the distribution and use of composite digital works |
178. |
5,638,442
Method for remotely inspecting a postage meter |
179. |
5,636,280
Dual key reflexive encryption security system |
180. |
5,636,276
Device for the distribution of music information in digital form |
181. |
5,635,012
System for producing a personal ID card |
182. |
5,634,012
System for controlling the distribution and use of digital works having a
fee reporting mechanism |
183. |
5,633,934
Local area nework encryption decryption system |
184. |
5,633,930
Common cryptographic key verification in a transaction network |
185. |
5,633,929
Cryptographic key escrow system having reduced vulnerability to harvesting
attacks |
186. |
5,633,928
Key escrow method with warrant bounds |
187. |
5,631,962
Circuit and method of encrypting key validation |
188. |
5,631,961
Device for and method of cryptography that allows third party access |
189. |
5,631,960
Autotest of encryption algorithms in embedded secure encryption devices |
190. |
5,629,982
Simultaneous electronic transactions with visible trusted parties |
191. |
5,629,980
System for controlling the distribution and use of digital works |
192. |
5,627,894
Random number generator |
193. |
5,627,893
Cryptographic method |
194. |
5,627,831
Personal communication network hand over |
195. |
5,625,690
Software pay per use system |
196. |
5,623,637
Encrypted data storage card including smartcard integrated circuit for storing
an access password and encryption keys |
197. |
5,623,549
Cipher mechanisms with fencing and balanced block mixing |
198. |
5,623,548
Transformation pattern generating device and encryption function device |
199. |
5,623,546
encryption method and system for portable data |
200. |
5,619,575
Pseudorandom composition-based cryptographic authentication process Apr.
8, 1997 |