16 July 1998
Source: http://patents.uspto.gov/access/search-bool.html (search term "encryption")


Results of Search in ALL db for:
encryption
: 933 patents.
Hits 201 through 300 out of 933

Jun. 18, 1996 to Apr. 8, 1997 (latest first)

  Pat. No. Title
201. 5,619,574 Personal access management system Apr. 8, 1997
202. 5,619,573 Vehicle security device with electronic use authorization coding
203. 5,615,268 System and method for electronic transmission storage and retrieval of authenticated documents
204. 5,615,267 Method for adaptively switching between PCS authentication schemes
205. 5,613,007 Portable thermal printing apparatus including a security device for detecting attempted unauthorized access
206. 5,613,005 Cipher communication method and device
207. 5,613,001 Digital signature verification technology for smart credit card and internet applications
208. 5,612,683 Security key holder
209. 5,610,984 Optimal L2 tracking in a SPS receiver under encryption without knowledge of encryption timing characteristics
210. 5,610,981 Preboot protection for a data security system with anti-intrusion capability
211. 5,610,980 Method and apparatus for re-initializing a processing device and a storage device
212. 5,608,801 Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions
213. 5,608,798 Crytographic device with secure testing function
214. 5,606,616 Cryptographic apparatus with double feedforward hash function
215. 5,606,613 Method for identifying a metering accounting vault to digital printer
216. 5,606,609 Electronic document verification system and method
217. 5,606,361 Videophone interactive mailbox facility system and method of processing information
218. 5,604,803 Method and apparatus for secure remote authentication in a public network
219. 5,604,800 Personal access management system
220. 5,604,343 Secure storage of monetary equivalent data systems and processes
221. 5,602,917 Method for secure session key generation
222. 5,600,726 Method for creating specific purpose rule-based n-bit virtual machines
223. 5,600,725 Digital signature method and key agreement method
224. 5,600,722 System and scheme of cipher communication
225. 5,600,720 encryption apparatus, communication system using the same and method therefor
226. 5,600,579 Hardware simulation and design verification system and method
227. 5,598,477 Apparatus and method for issuing and validating tickets
228. 5,598,476 Random clock composition-based cryptographic authentication process and locking system
229. 5,598,475 Rolling code identification scheme for remote control applications
230. 5,598,471 Method and apparatus for encoding and decoding of audio transmission signals
231. 5,594,869 Method and apparatus for end-to-end encryption of a data packet in a computer network
232. 5,594,798 Secure telecommunications
233. 5,594,797 Variable security level encryption
234. 5,594,793 Integrated circuit containing a protected memory and secured system using said integrated circuit
235. 5,594,718 Method and apparatus for providing mobile unit assisted hard handoff from a CDMA communication system to an alternative access communication system
236. 5,592,556 Digital radio with vocoding encrypting codec
237. 5,592,553 Authentication system using one-time passwords
238. 5,592,552 Broadcast encryption
239. 5,590,196 Secure payment method using facsimile
240. 5,588,060 Method and apparatus for a key-management scheme for internet protocols
241. 5,588,059 Computer system and method for secure remote communication sessions
242. 5,586,186 Method and system for controlling unauthorized access to information distributed to users
243. 5,586,185 Communications system capable of communicating encrypted information
244. 5,586,036 Postage payment system with security for sensitive mailer data and enhanced carrier data functionality
245. RE35,403 encryption printed circuit board
246. 5,584,023 Computer system including a transparent and secure file transform mechanism
247. 5,583,933 Method and apparatus for the secure communication of data
248. 5,583,779 Method for preventing monitoring of data remotely sent from a metering accounting vault to digital printer
249. 5,581,613 Color image processing apparatus and method
250. 5,579,485 Apparatus for remote implementation of a command
251. 5,579,393 System and method for secure medical and dental record interchange
252. 5,577,125 Graphical manipulation of encryption
253. 5,577,124 Multi-purpose high speed cryptographically secure sequence generator based on zeta-one-way functions
254. 5,577,122 Secure communication of information
255. 5,577,121 Transaction system for integrated circuit cards
256. 5,577,120 Method and apparatus for restrospectively identifying an individual who had engaged in a commercial or retail transaction or the like
257. 5,574,790 Fluorescence authentication reader with coaxial optics
258. 5,574,789 encryption communication method and terminal device for encryption communication
259. 5,574,788 Trunked radio repeater system
260. 5,568,556 System and method for encrypting sensitive information
261. 5,568,552 Method for providing a roving software license from one node to another node
262. 5,564,106 Method for providing blind access to an encryption key
263. 5,563,950 System and methods for data encryption using public key cryptography
264. 5,563,946 Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems
265. 5,563,945 Data storage device
266. 5,559,889 System and methods for data encryption using public key cryptography
267. 5,557,765 System and method for data recovery
268. 5,557,679 Method for personalization of an active card
269. 5,557,678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem
270. 5,557,674 Absolute static lock of files and directories on magnetic disk storage media in single machine personal microcomputers
271. 5,557,346 System and method for key escrow encryption
272. 5,555,308 encryption of signals to insure viewership of commercials
273. 5,555,304 Storage medium for preventing an illegal use by a third party
274. 5,553,145 Simultaneous electronic transactions with visible trusted parties
275. 5,553,141 encryption and decryption (scrambling and unscrambling) of video signals
276. 5,550,976 Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
277. 5,550,561 Display cursor controlling device for reading card information from an information bearing credit or debit card
278. 5,548,648 encryption method and system
279. 5,548,646 System for signatureless transmission and reception of data packets between computer networks
280. 5,546,463 Pocket encrypting and authenticating communications device
281. 5,544,245 Mutual authentication/cipher key delivery system
282. 5,541,996 Apparatus and method for a pseudo-random number generator for high precision numbers
283. 5,541,995 Method and apparatus for decoding non-sequential data packets
284. 5,541,606 W-code enhanced cross correlation satellite positioning system receiver
285. 5,541,581 Electronic combination lock security system
286. 5,539,828 Apparatus and method for providing secured communications
287. 5,539,827 Device and method for data encryption
288. 5,539,826 Method for message authentication from non-malleable crypto systems
289. 5,539,769 Adaptive fuzzy frequency hopping system
290. 5,537,475 Efficient digital signature algorithm and use thereof technical field
291. 5,535,278 Global positioning system (GPS) receiver for recovery and tracking of signals modulated with P-code
292. 5,535,277 encryption communication apparatus
293. 5,533,127 encryption system
294. 5,533,124 Electronic trading card system
295. 5,533,123 Programmable distributed personal security
296. 5,530,753 Methods and apparatus for secure hardware configuration
297. 5,530,752 Systems and methods for protecting software from unlicensed copying and use
298. 5,530,749 Methods and apparatus for secure hardware configuration
299. 5,528,693 Method and apparatus for voice encryption in a communications system
300. 5,528,691 Method for automatically assigning encryption information to a group of radios Jun. 18, 1996