|
Pat.
No. |
Title |
201. |
5,619,574
Personal access management system Apr. 8, 1997 |
202. |
5,619,573
Vehicle security device with electronic use authorization coding |
203. |
5,615,268
System and method for electronic transmission storage and retrieval of
authenticated documents |
204. |
5,615,267
Method for adaptively switching between PCS authentication schemes |
205. |
5,613,007
Portable thermal printing apparatus including a security device for detecting
attempted unauthorized access |
206. |
5,613,005
Cipher communication method and device |
207. |
5,613,001
Digital signature verification technology for smart credit card and internet
applications |
208. |
5,612,683
Security key holder |
209. |
5,610,984
Optimal L2 tracking in a SPS receiver under encryption without knowledge
of encryption timing characteristics |
210. |
5,610,981
Preboot protection for a data security system with anti-intrusion
capability |
211. |
5,610,980
Method and apparatus for re-initializing a processing device and a storage
device |
212. |
5,608,801
Efficient cryptographic hash functions and methods for amplifying the security
of hash functions and pseudo-random functions |
213. |
5,608,798
Crytographic device with secure testing function |
214. |
5,606,616
Cryptographic apparatus with double feedforward hash function |
215. |
5,606,613
Method for identifying a metering accounting vault to digital printer |
216. |
5,606,609
Electronic document verification system and method |
217. |
5,606,361
Videophone interactive mailbox facility system and method of processing
information |
218. |
5,604,803
Method and apparatus for secure remote authentication in a public network |
219. |
5,604,800
Personal access management system |
220. |
5,604,343
Secure storage of monetary equivalent data systems and processes |
221. |
5,602,917
Method for secure session key generation |
222. |
5,600,726
Method for creating specific purpose rule-based n-bit virtual machines |
223. |
5,600,725
Digital signature method and key agreement method |
224. |
5,600,722
System and scheme of cipher communication |
225. |
5,600,720
encryption apparatus, communication system using the same and method
therefor |
226. |
5,600,579
Hardware simulation and design verification system and method |
227. |
5,598,477
Apparatus and method for issuing and validating tickets |
228. |
5,598,476
Random clock composition-based cryptographic authentication process and locking
system |
229. |
5,598,475
Rolling code identification scheme for remote control applications |
230. |
5,598,471
Method and apparatus for encoding and decoding of audio transmission
signals |
231. |
5,594,869
Method and apparatus for end-to-end encryption of a data packet in a computer
network |
232. |
5,594,798
Secure telecommunications |
233. |
5,594,797
Variable security level encryption |
234. |
5,594,793
Integrated circuit containing a protected memory and secured system using
said integrated circuit |
235. |
5,594,718
Method and apparatus for providing mobile unit assisted hard handoff from
a CDMA communication system to an alternative access communication system |
236. |
5,592,556
Digital radio with vocoding encrypting codec |
237. |
5,592,553
Authentication system using one-time passwords |
238. |
5,592,552
Broadcast encryption |
239. |
5,590,196
Secure payment method using facsimile |
240. |
5,588,060
Method and apparatus for a key-management scheme for internet protocols |
241. |
5,588,059
Computer system and method for secure remote communication sessions |
242. |
5,586,186
Method and system for controlling unauthorized access to information distributed
to users |
243. |
5,586,185
Communications system capable of communicating encrypted information |
244. |
5,586,036
Postage payment system with security for sensitive mailer data and enhanced
carrier data functionality |
245. |
RE35,403
encryption printed circuit board |
246. |
5,584,023
Computer system including a transparent and secure file transform mechanism |
247. |
5,583,933
Method and apparatus for the secure communication of data |
248. |
5,583,779
Method for preventing monitoring of data remotely sent from a metering accounting
vault to digital printer |
249. |
5,581,613
Color image processing apparatus and method |
250. |
5,579,485
Apparatus for remote implementation of a command |
251. |
5,579,393
System and method for secure medical and dental record interchange |
252. |
5,577,125
Graphical manipulation of encryption |
253. |
5,577,124
Multi-purpose high speed cryptographically secure sequence generator based
on zeta-one-way functions |
254. |
5,577,122
Secure communication of information |
255. |
5,577,121
Transaction system for integrated circuit cards |
256. |
5,577,120
Method and apparatus for restrospectively identifying an individual who had
engaged in a commercial or retail transaction or the like |
257. |
5,574,790
Fluorescence authentication reader with coaxial optics |
258. |
5,574,789
encryption communication method and terminal device for encryption
communication |
259. |
5,574,788
Trunked radio repeater system |
260. |
5,568,556
System and method for encrypting sensitive information |
261. |
5,568,552
Method for providing a roving software license from one node to another
node |
262. |
5,564,106
Method for providing blind access to an encryption key |
263. |
5,563,950
System and methods for data encryption using public key cryptography |
264. |
5,563,946
Method and apparatus for enabling trial period use of software products:
method and apparatus for passing encrypted files between data processing
systems |
265. |
5,563,945
Data storage device |
266. |
5,559,889
System and methods for data encryption using public key cryptography |
267. |
5,557,765
System and method for data recovery |
268. |
5,557,679
Method for personalization of an active card |
269. |
5,557,678
System and method for centralized session key distribution, privacy enhanced
messaging and information distribution using a split private key public
cryptosystem |
270. |
5,557,674
Absolute static lock of files and directories on magnetic disk storage media
in single machine personal microcomputers |
271. |
5,557,346
System and method for key escrow encryption |
272. |
5,555,308
encryption of signals to insure viewership of commercials |
273. |
5,555,304
Storage medium for preventing an illegal use by a third party |
274. |
5,553,145
Simultaneous electronic transactions with visible trusted parties |
275. |
5,553,141
encryption and decryption (scrambling and unscrambling) of video signals |
276. |
5,550,976
Decentralized distributed asynchronous object oriented system and method
for electronic data management, storage, and communication |
277. |
5,550,561
Display cursor controlling device for reading card information from an
information bearing credit or debit card |
278. |
5,548,648
encryption method and system |
279. |
5,548,646
System for signatureless transmission and reception of data packets between
computer networks |
280. |
5,546,463
Pocket encrypting and authenticating communications device |
281. |
5,544,245
Mutual authentication/cipher key delivery system |
282. |
5,541,996
Apparatus and method for a pseudo-random number generator for high precision
numbers |
283. |
5,541,995
Method and apparatus for decoding non-sequential data packets |
284. |
5,541,606
W-code enhanced cross correlation satellite positioning system receiver |
285. |
5,541,581
Electronic combination lock security system |
286. |
5,539,828
Apparatus and method for providing secured communications |
287. |
5,539,827
Device and method for data encryption |
288. |
5,539,826
Method for message authentication from non-malleable crypto systems |
289. |
5,539,769
Adaptive fuzzy frequency hopping system |
290. |
5,537,475
Efficient digital signature algorithm and use thereof technical field |
291. |
5,535,278
Global positioning system (GPS) receiver for recovery and tracking of signals
modulated with P-code |
292. |
5,535,277
encryption communication apparatus |
293. |
5,533,127
encryption system |
294. |
5,533,124
Electronic trading card system |
295. |
5,533,123
Programmable distributed personal security |
296. |
5,530,753
Methods and apparatus for secure hardware configuration |
297. |
5,530,752
Systems and methods for protecting software from unlicensed copying and use |
298. |
5,530,749
Methods and apparatus for secure hardware configuration |
299. |
5,528,693
Method and apparatus for voice encryption in a communications system |
300. |
5,528,691
Method for automatically assigning encryption information to a group of
radios Jun. 18, 1996 |