US Patent No: 4,424,414

Number of patents in Portfolio can not be more than 2000

Exponentiation cryptographic apparatus and method

1 Status Updates

Stats

See full text
ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITYPALO ALTO, CA2851

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hellman, Martin E Stanford, CA 12 2406
Pohlig, Stephen C Acton, MA 1 314

Cited Art Landscape

  • No Cited Art to Display

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
WISTARIA TRADING, INC. (42)
5,613,004 Steganographic method and device 664 1995
5,822,432 Method for human-assisted random key generation and application for digital watermark system 286 1996
7,362,775 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 44 1996
5,889,868 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 389 1996
5,687,236 Steganographic method and device 453 1996
7,568,100 Steganographic method and device 43 1997
6,598,162 Method for combining transfer functions with predetermined key creation 90 1998
5,905,800 Method and system for digital watermarking 410 1998
6,205,249 Multiple transform utilization and applications for secure digital watermarking 197 1998
6,522,767 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 112 1999
7,007,166 Method and system for digital watermarking 87 2000
7,107,451 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 62 2001
7,095,874 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 44 2003
7,152,162 Z-transform implementation of digital watermarks 40 2004
7,761,712 Steganographic method and device 34 2005
7,343,492 Method and system for digital watermarking 43 2005
7,409,073 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 39 2006
7,457,962 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 39 2006
7,730,317 Linear predictive coding implementation of digital watermarks 5 2006
7,930,545 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 1 2006
7,647,502 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 35 2006
7,779,261 Method and system for digital watermarking 35 2007
8,046,841 Steganographic method and device 2 2007
7,870,393 Steganographic method and device 3 2007
7,664,958 Optimization methods for the insertion, protection and detection of digital watermarks in digital data 6 2007
7,822,197 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2007
7,647,503 Optimization methods for the insertion, projection, and detection of digital watermarks in digital data 36 2007
7,770,017 Method and system for digital watermarking 3 2007
7,830,915 Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments 4 2008
7,844,074 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 5 2008
7,987,371 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2008
8,238,553 Steganographic method and device 1 2009
7,953,981 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 2 2009
7,877,609 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
8,281,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
8,225,099 Linear predictive coding implementation of digital watermarks 0 2010
8,467,525 Steganographic method and device 0 2010
8,307,213 Method and system for digital watermarking 0 2010
8,161,286 Method and system for digital watermarking 0 2010
8,121,343 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 0 2010
8,549,305 Steganographic method and device 0 2010
8,175,330 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 2 2011
 
MICROSOFT CORPORATION (35)
7,606,898 System and method for distributed management of shared computers 7 2000
7,636,917 Network load balancing with host status information 9 2003
7,613,822 Network load balancing with session information 9 2003
7,590,736 Flexible network load balancing 11 2003
7,606,929 Network load balancing with connection manipulation 3 2003
7,567,504 Network load balancing with traffic routing 21 2003
8,122,106 Integrating design, deployment, and management phases for systems 5 2003
7,890,543 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 13 2003
7,809,767 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 0 2003
7,289,629 Primitives for fast secure hash functions and stream ciphers 1 2004
7,778,422 Security associations for devices 2 2004
7,497,379 Counterfeit and tamper resistant labels with randomly occurring features 19 2004
7,886,041 Design time validation of systems 38 2004
7,577,844 Systems and methods for encoding randomly distributed features in an object 11 2004
7,669,235 Secure domain join for computing devices 4 2004
7,305,549 Filters to isolate untrusted ports of switches 27 2004
7,305,561 Establishing computing trust with a staging area 34 2004
7,336,806 Iris-based biometric identification 8 2004
7,711,121 System and method for distributed management of shared computers 0 2004
7,739,380 System and method for distributed management of shared computers 0 2004
7,792,931 Model-based system provisioning 3 2005
8,489,728 Model-based system monitoring 0 2005
7,802,144 Model-based system monitoring 21 2005
7,797,147 Model-based system monitoring 3 2005
8,549,513 Model-based virtual system provisioning 1 2005
7,890,951 Model-based provisioning of test environments 11 2005
7,684,964 Model and system state synchronization 2 2005
7,565,275 Model and system state synchronization 0 2005
7,941,309 Modeling IT operations/policies 2 2005
7,630,877 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 27 2005
7,574,343 System and method for logical modeling of distributed computer systems 6 2006
7,689,676 Model-based policy application 8 2007
8,127,133 Labeling of data objects to apply and enforce policies 0 2007
7,444,007 Iris-based biometric identification 6 2007
7,878,398 Counterfeit and tamper resistant labels with randomly occurring features 1 2009
 
FIRST DATA CORPORATION (34)
6,820,202 Account authority digital signature (AADS) system 75 1998
8,620,814 Three party account authority digital signature (AADS) system 0 2001
7,558,965 Entity authentication in electronic communications by providing verification status of device 24 2001
7,552,333 Trusted authentication digital signature (tads) system 16 2001
7,500,272 Manufacturing unique devices that generate digital signatures 11 2001
7,200,749 Method and system for using electronic communications for an electronic contract 20 2001
7,047,416 Account-based digital signature (ABDS) system 15 2001
6,983,368 Linking public key of device to information during manufacture 9 2001
6,978,369 Person-centric account-based digital signature system 79 2001
6,981,154 Account authority digital signature (AADS) accounts 10 2001
6,820,199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 22 2002
7,010,691 ABDS system utilizing security information in authenticating entity access 16 2003
6,950,940 ABDS method utilizing security information in authenticating entity access 29 2003
6,938,156 ABDS system and verification status for authenticating entity access 58 2003
6,851,054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource 50 2003
7,096,354 Central key authority database in an ABDS system 41 2003
7,082,533 Gauging risk in electronic communications regarding accounts in ABDS system 9 2003
7,047,414 Managing database for reliably identifying information of device generating digital signatures 33 2003
7,028,185 Managing database for identifying to recipients security features of devices generating digital signatures 18 2003
6,959,381 Central key authority (CKA) database for user accounts in ABDS system 21 2003
6,957,336 Establishing initial PuK-linked account database 10 2003
6,952,773 Requesting execution of instructions on accounts in ABDS system 9 2003
6,915,430 Reliably identifying information of device generating digital signatures 13 2003
6,892,302 Incorporating security certificate during manufacture of device generating digital signatures 14 2003
6,789,189 Managing account database in ABDS system 35 2003
7,257,228 Account authority digital signature (AADS) system using encoded information 7 2004
7,549,050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system 0 2004
7,519,821 Account authority digital signature (AADS) system 1 2004
7,936,869 Verifying digital signature based on shared knowledge 0 2005
7,869,593 Software for providing based on shared knowledge public keys having same private key 3 2005
7,693,277 Generating digital signatures using ephemeral cryptographic key 0 2005
7,593,527 Providing digital signature and public key based on shared knowledge 2 2005
7,490,239 Facilitating digital signature based on ephemeral private key 4 2005
7,784,106 Manufacturing unique devices that generate digital signatures 0 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (17)
4,736,423 Technique for reducing RSA Crypto variable storage 50 1986
5,163,096 Storage protection utilizing public storage key control 73 1991
5,926,551 System and method for certifying content of hard-copy documents 19 1995
5,737,425 Cryptosystem employing worst-case difficult-to solve lattice problem 4 1996
5,953,420 Method and apparatus for establishing an authenticated shared secret value between a pair of users 68 1996
6,560,337 Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key 6 1998
6,363,154 Decentralized systems methods and computer program products for sending secure messages among a group of nodes 60 1998
7,269,564 Method and apparatus to indicate an encoding status for digital content 24 1998
6,345,256 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content 465 1998
6,959,288 Digital content preparation system 80 1999
6,834,110 Multi-tier digital TV programming for content distribution 88 1999
7,213,005 Digital content distribution using web broadcasting services 93 2000
6,978,375 System and method for secure authentication of external software modules provided by third parties 3 2000
7,500,109 System and method for secure authentication of external software modules provided by third parties 0 2005
7,487,128 Updating usage conditions in lieu of download digital rights management protected content 12 2005
7,277,870 Digital content distribution using web broadcasting services 57 2005
7,590,866 Super-distribution of protected digital content 9 2005
 
DIGITAL RIVER, INC. (12)
5,903,647 Self-launching encrypted digital information distribution system 59 1995
5,883,954 Self-launching encrypted try before you buy software distribution system 56 1995
5,883,955 On-line try before you buy software distribution system 124 1995
5,870,543 System for preventing unauthorized copying of active software 52 1997
5,907,617 Try before you buy software distribution and marketing system 88 1997
5,887,060 Central database system for automatic software program sales 33 1997
7,058,597 Apparatus and method for adaptive fraud screening for electronic commerce transactions 11 1999
7,617,124 Apparatus and method for secure downloading of files 3 2000
7,165,051 Electronic commerce system and method for detecting fraud 46 2005
8,271,396 Electronic commerce system and method for detecting fraud 2006
7,881,972 Electronic commerce system and method for detecting fraud 1 2006
8,050,980 Secure downloading of a file from a network system and method 1 2009
 
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS (11)
8,184,803 Hash functions using elliptic curve cryptography 0 2008
8,139,765 Elliptical polynomial-based message authentication code 3 2008
8,165,287 Cryptographic hash functions using elliptic polynomial cryptography 1 2008
8,170,203 Message authentication code with elliptic polynomial hopping 1 2008
8,189,771 Hash functions with elliptic polynomial hopping 0 2009
8,385,541 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping 0 2010
8,351,601 Elliptic polynomial cryptography with secret key embedding 0 2010
8,331,558 Method of cipher block chaining using elliptic curve cryptography 0 2010
8,332,651 Method of generating a password protocol using elliptic polynomial cryptography 0 2010
8,189,775 Method of performing cipher block chaining using elliptic polynomial cryptography 0 2010
8,509,426 XZ-elliptic curve cryptography system and method 0 2010
 
BLUE SPIKE, INC. (9)
8,538,011 Systems, methods and devices for trusted transactions 0 2006
8,271,795 Security based on subliminal and supraliminal channels for data objects 2006
7,664,264 Utilizing data reduction in steganographic and cryptographic systems 4 2006
7,532,725 Systems and methods for permitting open access to data objects and for securing data within the data objects 35 2006
8,171,561 Secure personal content server 2 2008
7,813,506 System and methods for permitting open access to data objects and for securing data within the data objects 0 2009
8,160,249 Utilizing data reduction in steganographic and cryptographic system 1 2009
8,265,278 System and methods for permitting open access to data objects and for securing data within the data objects 0 2010
8,526,611 Utilizing data reduction in steganographic and cryptographic systems 0 2012
 
TECSEC, INCORPORATED (9)
5,369,707 Secure network method and apparatus 169 1993
5,369,702 Distributed cryptographic object method 227 1993
5,717,755 Distributed cryptographic object method 60 1994
5,680,452 Distributed cryptographic object method 109 1995
5,898,781 Distributed cryptographic object method 57 1997
6,694,433 XML encryption scheme 12 1999
7,095,852 Cryptographic key split binder for use with tagged data elements 28 2001
7,079,653 Cryptographic key split binding process and apparatus 9 2002
8,077,870 Cryptographic key split binder for use with tagged data elements 0 2010
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (8)
5,568,554 Method for improving the processing and storage performance of digital signature schemes 66 1995
5,675,649 Process for cryptographic key generation and safekeeping 61 1995
5,999,624 Remote financial transaction system 200 1996
5,848,159 Public key cryptographic apparatus and method 51 1997
7,231,040 Multiprime RSA public key cryptosystem 2 1998
RE40530 Public key cryptographic apparatus and method 0 2000
7,120,248 Multiple prime number generation using a parallel prime number search algorithm 2 2001
7,016,494 Multiple cryptographic key precompute and store 6 2001
 
LEVEL 3 COMMUNICATIONS, LLC (8)
6,226,618 Electronic content delivery system 1011 1998
6,263,313 Method and apparatus to create encoded digital content 341 1998
6,587,837 Method for delivering electronic content from an online store 324 1998
6,398,245 Key management system for digital content player 198 1998
7,206,748 Multimedia player toolkit for electronic content delivery 54 1998
6,418,421 Multimedia player for an electronic content delivery system 325 1998
7,110,984 Updating usage conditions in lieu of download digital rights management protected content 55 2000
6,859,791 Method for determining internet users geographic region 70 2000
 
LEAR CORPORATION EEDS AND INTERIORS (7)
5,377,270 Cryptographic authentication of transmitted messages using pseudorandom numbers 48 1993
5,363,448 Pseudorandom number generation and cryptographic authentication 140 1993
5,398,284 Cryptographic encoding process 28 1993
5,369,706 Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code 69 1993
5,757,923 Method of generating secret identification numbers 131 1996
RE36181 Pseudorandom number generation and crytographic authentication 20 1996
RE36752 Cryptographic authentication of transmitted messages using pseudorandom numbers 7 1996
 
BELL ATLANTIC NETWORK SERVICES, INC. (6)
5,557,678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 141 1994
5,535,276 Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography 317 1994
5,748,735 Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography 91 1996
5,737,419 Computer system for securing communications using split private key asymmetric cryptography 87 1996
5,838,792 Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 70 1996
5,905,799 Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 22 1996
 
BLUE SPIKE LLC (6)
5,745,569 Method for stega-cipher protection of computer code 350 1996
7,346,472 Method and device for monitoring and analyzing signals 64 2000
7,660,700 Method and device for monitoring and analyzing signals 21 2007
7,949,494 Method and device for monitoring and analyzing signals 17 2009
8,214,175 Method and device for monitoring and analyzing signals 18 2011
8,612,765 Security based on subliminal and supraliminal channels for data objects 0 2012
 
EMC CORPORATION (5)
7,716,484 System and method for increasing the security of encrypted secrets and authentication 10 2001
7,359,507 Server-assisted regeneration of a strong secret from a weak secret 96 2001
8,060,750 Secure seed provisioning 0 2007
8,059,814 Techniques for carrying out seed or key derivation 2 2007
8,307,210 Method and apparatus for secure validation of tokens 0 2008
 
WISTRON CORPORATION (5)
6,574,609 Secure electronic content management system 255 1998
6,389,538 System for tracking end-user electronic content usage 416 1998
6,611,812 Secure electronic content distribution on CDS and DVDs 224 1999
6,389,403 Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system 163 1999
6,983,371 Super-distribution of protected digital content 112 2000
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (4)
5,124,117 Cryptographic key distribution method and system 82 1991
5,272,755 Public key cryptosystem with an elliptic curve 96 1992
5,351,297 Method of privacy communication using elliptic curves 41 1993
5,442,707 Method for generating and verifying electronic signatures and privacy communication using elliptic curves 84 1993
 
COMCAST CABLE COMMUNICATIONS, LLC (3)
5,787,172 Apparatus and method for establishing a cryptographic link between elements of a system 184 1994
6,148,400 Apparatus and method for establishing a crytographic link between elements of a system 23 1998
6,456,716 Apparatus and method for establishing a crytographic link between elements of a system 10 2000
 
FRAUD CONTROL SYSTEMS.COM CORPORATION (3)
8,630,942 Method of billing a purchase made over a computer network 0 2008
8,229,844 Method of billing a purchase made over a computer network 3 2008
8,190,513 Method of billing a purchase made over a computer network 2 2008
 
GILBARCO INC. (3)
5,228,084 Security apparatus and system for retail environments 38 1991
5,384,850 Security apparatus and system for retail environments 20 1992
5,448,638 Security apparatus and system for retail environments 27 1994
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (3)
4,759,063 Blind signature systems 182 1983
4,991,210 Unpredictable blind signature systems 73 1989
4,996,711 Selected-exponent signature systems 115 1989
 
CHANG, CHUNG NAN (2)
5,583,939 Secure, swift cryptographic key exchange 28 1995
5,835,592 Secure, swift cryptographic key exchange 47 1995
 
CONTENTGUARD HOLDINGS, INC. (2)
8,275,716 Method and system for subscription digital rights management 0 2002
8,468,098 Method and system for subscription digital rights management 0 2012
 
GENERAL ELECTRIC COMPANY (2)
5,204,901 Public key cryptographic mechanism 17 1991
5,239,584 Method and apparatus for encryption/authentication of data in energy metering applications 55 1991
 
MOTOROLA MOBILITY LLC (2)
6,078,593 Method and apparatus for reliable operation of universal voice grade cards 12 1997
6,574,333 State machine based universal voice grade cards 8 1999
 
NCR CORPORATION (2)
4,944,007 Public key diversification method 31 1989
4,935,962 Method and system for authentication 146 1989
 
NEXT SOFTWARE, INC. (2)
5,159,632 Method and apparatus for public key exchange in a cryptographic system 114 1991
5,271,061 Method and apparatus for public key exchange in a cryptographic system 80 1992
 
PROTEGRITY CORPORATION (2)
8,443,426 Method and system for preventing impersonation of a computer system user 0 2008
8,402,281 Data security system for a database 0 2010
 
SAFENET, INC. (2)
4,891,781 Modulo arithmetic processor chip 32 1988
5,210,710 Modulo arithmetic processor chip 28 1990
 
STEVEN M. HOFFBERG 2004-1 GRAT (2)
8,369,967 Alarm system controller and a method for controlling an alarm system 5 2011
8,364,136 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system 3 2011
 
SUN MICROSYSTEMS, INC. (2)
5,371,794 Method and apparatus for privacy and authentication in wireless networks 302 1993
RE36946 Method and apparatus for privacy and authentication in wireless networks 65 1996
 
TELLABS DENMARK A/S (2)
6,422,461 Method and system for ensuring connection of a module to an electronic apparatus 0 1999
6,739,504 Method and system for ensuring connection of a module to an electronic apparatus 0 2002
 
UNIKEN INC. (2)
7,949,867 Secure communications 1 2006
7,949,869 Establishing relative identity 0 2010
 
UT AUTOMOTIVE DEARBORN, INC. (2)
5,646,996 Automatic resynchronization of transmitter in the event of corrupted memory 10 1995
5,696,828 Random number generating system and process based on chaos 91 1995
 
ALGORITHMIC RESEARCH LTD. (1)
4,964,164 RSA computation method for efficient batch processing 35 1989
 
AT&T Bell Laboratories (1)
5,353,351 Secure teleconferencing 70 1992
 
AT&T CORP. (1)
6,058,187 Secure telecommunications data transmission 40 1997
 
BRIGHT SUN TECHNOLOGIES (1)
7,320,073 Secure method for roaming keys and certificates 2 2003
 
CHRYSLER GROUP LLC (1)
5,787,367 Flash reprogramming security for vehicle computer 48 1996
 
CROWLEY, JOHN J. (1)
5,375,169 Cryptographic key management method and apparatus 113 1993
 
DE LA RUE CARTES ET SYSTEMES SAS (1)
5,761,310 Communication system for messages enciphered according to an RSA-type procedure 7 1996
 
E-CONTACT TECHNOLOGIES LLC (1)
5,189,700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents 96 1991
 
ENERGY, UNITED STATES DEPARTMENT OF (1)
5,299,262 Method for exponentiating in cryptographic systems 33 1992
 
ENTEGRITY SOLUTIONS CORPORATION (1)
5,745,574 Security infrastructure for electronic transactions 210 1995
 
ERICSSON INC. (1)
5,499,295 Method and apparatus for feature authorization and software copy protection in RF communications devices 145 1993
 
FUJITSU LIMITED (1)
5,313,521 Key distribution protocol for file transfer in the local area network 98 1992
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
5,323,146 Method for authenticating the user of a data station connected to a computer system 41 1992
 
GENWORTH HOLDINGS, INC. (1)
7,155,578 Method and system for transferring files using file transfer protocol 1 2002
 
GRUMMAN CORPORATION (1)
5,054,066 Error correcting public key cryptographic method and program 50 1988
 
HELLMAN, MARTIN (1)
5,872,917 Authentication using random challenges 49 1997
 
INTEL CORPORATION (1)
6,253,323 Object-based digital signatures 27 1996
 
JPMORGAN CHASE BANK, N.A. (1)
7,899,753 Systems and methods for time variable financial authentication 3 2003
 
KEYBYTE TECHNOLOGIES, INC. (1)
6,011,847 Cryptographic access and labeling system 58 1995
 
KILE GOEKJIAN REED & MCMANUS (1)
6,243,466 Auto-escrowable and auto-certifiable cryptosystems with fast key generation 8 1997
 
MAXIM INTEGRATED PRODUCTS, INC. (1)
6,064,740 Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 42 1997
 
MICRON TECHNOLOGY, INC. (1)
4,658,094 Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer 28 1985
 
MOTOROLA, INC. (1)
4,827,507 Duplex analog scrambler 20 1987
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
6,097,307 Security system with randomized synchronization code 5 1997
 
NEOPOST TECHNOLOGIES (1)
6,041,317 Postal security device incorporating periodic and automatic self implementation of public/private key pair 22 1997
 
OMNET ASSOCIATES A CA PARTNERSHIP (1)
4,567,600 Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission 59 1982
 
PHILIPS ELECTRONICS NORTH AMERICA CORPORATION (1)
6,141,422 Secure cryptographic multi-exponentiation method and coprocessor subsystem 13 1997
 
PREMINOS CORPORATION (1)
5,812,669 Method and system for providing secure EDI over an open network 87 1995
 
PREVIEW SOFTWARE (1)
4,658,093 Software distribution system 717 1983
 
RIVERWOOD INTERNATIONAL CORPORATION (1)
7,143,284 ABDS method and verification status for authenticating entity access 9 2003
 
SCHLAGE LOCK COMPANY (1)
4,837,822 Cryptographic based electronic lock system and method of operation 44 1986
 
The United States of America as represented by the Secretary of Commerce (1)
5,231,668 Digital signature algorithm 146 1991
 
THOMSON LICENSING (1)
7,545,932 Secure authenticated channel 4 2004
 
UNIVERSITY OF SOUTHERN CALIFORNIA (1)
7,280,663 Encryption system based on crossed inverse quasigroups 2 2000
 
UPONUS TECHNOLOGIES, LLC. (1)
7,382,878 System and method for data encryption 3 2001
 
VERIDIAN INFORMATION SOLUTIONS, INC. (1)
5,414,771 System and method for the creation of random sequences and for the cryptographic protection of communications 25 1993
 
VERIZON SERVICES CORP. (1)
5,588,061 System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 47 1994
 
Wisteria Trading, Inc. (1)
7,991,188 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 1 2007
 
Other [Check patent profile for assignment information] (20)
4,703,503 Cryptographic system using pseudocomplements of vector Boolean algebra 7 1986
5,987,130 Simiplified secure swift cryptographic key exchange 7 1997
6,202,150 Auto-escrowable and auto-certifiable cryptosystems 19 1997
6,122,742 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys 13 1997
6,389,136 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys 25 1997
6,282,295 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers 54 1997
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 25 1998
7,035,409 Multiple transform utilization and applications for secure digital watermarking 35 2000
7,287,275 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 38 2003
7,664,263 Method for combining transfer functions with predetermined key creation 35 2003
7,738,659 Multiple transform utilization and application for secure digital watermarking 4 2006
8,224,705 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2007
7,530,102 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 45 2007
8,104,079 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2009
8,265,276 Method for combining transfer functions and predetermined key creation 0 2009
8,542,831 Multiple transform utilization and application for secure digital watermarking 0 2010
8,699,701 Method of performing XZ-elliptic curve cryptography for use with network security protocols 0 2010
8,473,746 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2011
RE44307 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
RE44222 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012