16 July 1998
Source: http://patents.uspto.gov/access/search-bool.html (search term "encryption")


Results of Search in ALL db for:
encryption
: 933 patents.
Hits 501 through 600 out of 933

Oct. 27, 1992 to Apr. 19, 1994 (latest first)

  Pat. No. Title
501. 5,305,384 Apparatus, system and method for transmitting secure signals over narrow spaced channels Apr. 19, 1994
502. 5,303,293 Cryptographic device with a display means for identification of a defective function in the cryptographic device
503. 5,301,247 Method for ensuring secure communications
504. 5,301,234 Radiotelephone installation for prepayment operation with security protection
505. 5,301,232 Method and apparatus for over-the-air programming of communication devices
506. 5,299,263 Two-way public key authentication and key agreement for low-cost terminals
507. 5,297,800 Ultra-enigma code game
508. 5,297,208 Secure file transfer system and method
509. 5,297,207 Machine generation of cryptographic keys by non-linear processes similar to processes normally associated with encryption of data
510. 5,295,188 Public key encryption and decryption circuitry and method
511. 5,293,576 Command authentication process
512. 5,293,029 System for mutually certifying an IC card and an IC card terminal
513. 5,289,542 Caller identification system with encryption
514. 5,285,497 Methods and apparatus for scrambling and unscrambling compressed data streams
515. 5,283,832 Paging message encryption
516. 5,283,829 System and method for paying bills electronically
517. 5,283,828 Architecture for utilizing coprocessing systems to increase performance in security adapted computer systems
518. 5,280,529 Communication network intended for secure transmissions
519. 5,278,905 Method and apparatus for processor base encryption
520. 5,274,567 Table top image based document processing machine and methods of processing documents
521. 5,271,582 Modular mother satellite bus for subsidiary payloads
522. 5,271,061 Method and apparatus for public key exchange in a cryptographic system
523. 5,271,023 Uninterruptable fault tolerant data processor
524. 5,268,962 Computer network with modified host-to-host encryption keys
525. 5,267,313 File security system
526. 5,265,162 Portable pin card
527. 5,265,159 Secure file erasure
528. 5,265,093 Hardware interface and protocol for a mobile radio transceiver
529. 5,261,003 Data communication system and method with data scrambling
530. 5,261,001 Microcircuit for the implementation of RSA algorithm and ordinary and modular arithmetic, in particular exponentiation, with large operands
531. 5,253,294 Secure transmission system
532. 5,249,232 Data processing system having an encryption device
533. 5,247,577 Methods and apparatus for securely enabling features in highly integrated electronic circuits
534. 5,247,576 Key variable identification method
535. 5,247,575 Information distribution system
536. 5,245,660 System for producing synchronized signals
537. 5,245,658 Domain-based encryption
538. 5,243,653 Method and apparatus for maintaining continuous synchronous encryption and decryption in a wireless communication system throughout a hand-off
539. 5,243,650 Method and apparatus for encryption/decryption of digital multisound in television
540. 5,243,649 Apparatus and method for quantum mechanical encryption for the transmission of secure communications
541. 5,241,599 Cryptographic protocol for secure communications
542. 5,241,597 Method for recovering from encryption key variable loss
543. 5,239,584 Method and apparatus for encryption/authentication of data in energy metering applications
544. 5,239,294 Method and apparatus for authenication and protection of subscribers in telecommunication systems
545. 5,237,616 Secure computer system having privileged and unprivileged memories
546. 5,237,614 Integrated network security system
547. 5,237,611 encryption/decryption apparatus with non-accessible table of keys
548. 5,235,644 Probabilistic cryptographic processing method
549. 5,235,641 File encryption method and file cryptographic system
550. 5,228,084 Security apparatus and system for retail environments
551. 5,228,076 High fidelity speech encoding for telecommunications systems
552. 5,227,613 Secure encrypted data communication system having physically secure IC cards and session key generation based on card identifying information
553. 5,224,163 Method for delegating authorization from one entity to another through the use of session encryption keys
554. 5,222,141 Apparatus and method for encoding data
555. 5,222,140 Cryptographic method for key agreement and user authentication
556. 5,222,139 Cryptographic method and apparatus
557. 5,222,137 Dynamic encryption key selection for encrypted radio transmissions
558. 5,222,136 Encrypted communication system
559. 5,220,606 Cryptographic system and method
560. 5,214,704 Nonlinear dynamic substitution devices and methods for block substitutions
561. 5,214,703 Device for the conversion of a digital block and use of same
562. 5,212,729 Computer data security device and method
563. 5,210,710 Modulo arithmetic processor chip
564. 5,208,859 Method for rekeying secure communication units by group
565. 5,208,853 Method and apparatus for usage protection of data files using split key and unique variable
566. 5,206,906 Video scrambling system
567. 5,206,863 Processor-to-processor communications protocol for a public service trunking system
568. 5,204,902 Cellular telephony authentication arrangement
569. 5,204,901 Public key cryptographic mechanism
570. 5,202,921 Method and apparatus for authenticating users of a communication system to each other
571. 5,199,074 encryption system
572. 5,199,072 Method and apparatus for restricting access within a wireless local area network
573. 5,199,069 Automatic encryption selector
574. 5,195,136 Method and apparatus for data encryption or decryption
575. 5,193,114 Consumer oriented smart card system and authentication techniques
576. 5,189,700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents
577. 5,185,798 IC card system having a function of authenticating destroyed data
578. 5,185,797 Encrypted trunked control channel system
579. 5,185,796 encryption synchronization combined with encryption key identification
580. 5,179,591 Method for algorithm independent cryptographic key management
581. 5,179,517 Game machine data transfer system utilizing portable data units
582. RE34,161 Memory cartridge and information processor unit using such cartridge
583. 5,175,866 Fail-soft architecture for public trunking system
584. 5,175,766 Signalling scheme for controlling data encryption device in an electronic fund transaction processing system
585. 5,175,765 Robust data broadcast over a distributed network with malicious failures
586. 5,173,938 Key management system
587. 5,172,414 Speech and control message encrypton in cellular radio
588. 5,172,413 Secure hierarchial video delivery system and method
589. 5,168,523 Method of rotating a word constituted by binary elements and arrangement in which the said method is carried out
590. 5,168,521 Method of executing an irregular permutation of data protected by encryption
591. 5,166,978 Encoding system according to the so-called RSA method, by means of a microcontroller and arrangement implementing this system
592. 5,163,098 System for preventing fraudulent use of credit card
593. 5,161,193 Pipelined cryptography processor and method for its use in communication networks
594. 5,161,191 encryption system for time division multiplexed networks
595. 5,161,190 System for encryption and identification
596. 5,161,189 encryption and decryption of chained messages
597. 5,159,634 Cryptosystem for cellular telephony
598. 5,159,633 Multimedia network system
599. 5,159,632 Method and apparatus for public key exchange in a cryptographic system
600. 5,159,630 Facsimile message encryption system Oct. 27, 1992