US Patent No: 4,424,414

Number of patents in Portfolio can not be more than 2000

Exponentiation cryptographic apparatus and method

2 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITYPALO ALTO, CA2189

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hellman, Martin E Stanford, CA 10 2732
Pohlig, Stephen C Acton, MA 1 337

Cited Art Landscape

  • No Cited Art to Display

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (11)
* 4,703,503 Cryptographic system using pseudocomplements of vector Boolean algebra 9 1986
* 5,987,130 Simiplified secure swift cryptographic key exchange 7 1997
* 6,122,742 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys 15 1997
* 2002/0032,860 Account authority digital signature 22 2001
* 2002/0184,511 Secure accounting and operational control reporting system 2 2002
* 2003/0212,992 Apparatus and method for using application signatures for the identification of files 54 2003
* 2006/0095,792 Super-distribution of protected digital content 86 2005
* 2007/0180,240 Data security system for a database 1 2006
* 2008/0005,571 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 51 2007
9,151,633 Mobile communication device for delivering targeted advertisements 0 2014
9,258,116 System and methods for permitting open access to data objects and for securing data within the data objects 0 2014
 
CRYPTOPEAK SOLUTIONS, LLC (5)
6,202,150 Auto-escrowable and auto-certifiable cryptosystems 22 1997
6,243,466 Auto-escrowable and auto-certifiable cryptosystems with fast key generation 9 1997
6,389,136 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys 28 1997
6,282,295 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers 56 1997
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 32 1998
 
SMARTFLASH LLC (1)
8,794,516 Data storage and access systems 1 2012
 
SONY CORPORATION (1)
* 2005/0005,148 Contents processing system 5 2004
 
LEVEL 3 COMMUNICATIONS, LLC (8)
6,226,618 Electronic content delivery system 1204 1998
6,263,313 Method and apparatus to create encoded digital content 405 1998
6,587,837 Method for delivering electronic content from an online store 385 1998
6,398,245 Key management system for digital content player 239 1998
7,206,748 Multimedia player toolkit for electronic content delivery 67 1998
6,418,421 Multimedia player for an electronic content delivery system 401 1998
7,110,984 Updating usage conditions in lieu of download digital rights management protected content 67 2000
6,859,791 Method for determining internet users geographic region 91 2000
 
GOVERNMENT OF THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE, THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (1)
* 5,231,668 Digital signature algorithm 170 1991
 
RIVERWOOD INTERNATIONAL CORPORATION (2)
7,143,284 ABDS method and verification status for authenticating entity access 13 2003
* 2003/0126,437 ABDS Method and Verification Status for Authenticating Entity Access 18 2003
 
DE LA RUE CARTES ET SYSTEMES SAS (1)
* 5,761,310 Communication system for messages enciphered according to an RSA-type procedure 7 1996
 
VERIDIAN INFORMATION SOLUTIONS, INC. (1)
* 5,414,771 System and method for the creation of random sequences and for the cryptographic protection of communications 25 1993
 
GOOGLE TECHNOLOGY HOLDINGS LLC (2)
* 6,078,593 Method and apparatus for reliable operation of universal voice grade cards 13 1997
6,574,333 State machine based universal voice grade cards 8 1999
 
GILBARCO INC. (3)
* 5,228,084 Security apparatus and system for retail environments 39 1991
* 5,384,850 Security apparatus and system for retail environments 20 1992
* 5,448,638 Security apparatus and system for retail environments 33 1994
 
FCA US LLC (1)
* 5,787,367 Flash reprogramming security for vehicle computer 50 1996
 
PROTEGRITY CORPORATION (3)
* 2007/0067,637 Method and a system for preventing impersonation of a database user 12 2006
8,443,426 Method and system for preventing impersonation of a computer system user 1 2008
8,402,281 Data security system for a database 3 2010
 
ENERGY, UNITED STATES DEPARTMENT OF (1)
* 5,299,262 Method for exponentiating in cryptographic systems 34 1992
 
SCHLAGE LOCK COMPANY (1)
* 4,837,822 Cryptographic based electronic lock system and method of operation 48 1986
 
CHANG, CHUNG NAN (2)
* 5,583,939 Secure, swift cryptographic key exchange 28 1995
* 5,835,592 Secure, swift cryptographic key exchange 54 1995
 
Uponus Technologies, LLC (2)
7,382,878 System and method for data encryption 4 2001
* 2003/0016,820 System and method for data encryption 3 2001
 
Scott A. Moskowitz (1)
* 2007/0011,458 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 26 2006
 
CANON KABUSHIKI KAISHA (1)
* 2002/0083,114 Obtaining temporary exclusive control of a printing device 9 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (21)
* 4,736,423 Technique for reducing RSA Crypto variable storage 51 1986
* 5,163,096 Storage protection utilizing public storage key control 89 1991
* 5,926,551 System and method for certifying content of hard-copy documents 21 1995
* 5,737,425 Cryptosystem employing worst-case difficult-to solve lattice problem 4 1996
* 5,953,420 Method and apparatus for establishing an authenticated shared secret value between a pair of users 81 1996
6,560,337 Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key 8 1998
6,363,154 Decentralized systems methods and computer program products for sending secure messages among a group of nodes 64 1998
7,269,564 Method and apparatus to indicate an encoding status for digital content 28 1998
6,345,256 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content 516 1998
6,959,288 Digital content preparation system 109 1999
6,834,110 Multi-tier digital TV programming for content distribution 107 1999
7,213,005 Digital content distribution using web broadcasting services 127 2000
* 2003/0135,464 Digital content distribution using web broadcasting services 100 2000
6,978,375 System and method for secure authentication of external software modules provided by third parties 3 2000
7,500,109 System and method for secure authentication of external software modules provided by third parties 0 2005
* 2005/0216,422 System and method for secure authentication of external software modules provided by third parties 1 2005
7,487,128 Updating usage conditions in lieu of download digital rights management protected content 20 2005
* 2006/0089,912 Updating usage conditions in lieu of download digital rights management protected content 54 2005
7,277,870 Digital content distribution using web broadcasting services 84 2005
* 2006/0053,077 Digital content distribution using web broadcasting services 31 2005
7,590,866 Super-distribution of protected digital content 11 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (3)
* 5,568,554 Method for improving the processing and storage performance of digital signature schemes 66 1995
* 5,999,624 Remote financial transaction system 262 1996
* 5,848,159 Public key cryptographic apparatus and method 58 1997
 
LEAR CORPORATION EEDS AND INTERIORS (7)
* 5,377,270 Cryptographic authentication of transmitted messages using pseudorandom numbers 49 1993
* 5,363,448 Pseudorandom number generation and cryptographic authentication 159 1993
* 5,398,284 Cryptographic encoding process 30 1993
* 5,369,706 Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code 71 1993
* 5,757,923 Method of generating secret identification numbers 155 1996
* RE36181 Pseudorandom number generation and crytographic authentication 23 1996
* RE36752 Cryptographic authentication of transmitted messages using pseudorandom numbers 11 1996
 
WISTARIA TRADING LTD (98)
* 5,613,004 Steganographic method and device 732 1995
* 5,822,432 Method for human-assisted random key generation and application for digital watermark system 337 1996
7,362,775 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 60 1996
* 5,889,868 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 447 1996
* 5,687,236 Steganographic method and device 514 1996
7,568,100 Steganographic method and device 60 1997
6,598,162 Method for combining transfer functions with predetermined key creation 128 1998
* 5,905,800 Method and system for digital watermarking 469 1998
6,205,249 Multiple transform utilization and applications for secure digital watermarking 223 1998
6,522,767 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 213 1999
7,007,166 Method and system for digital watermarking 136 2000
7,035,409 Multiple transform utilization and applications for secure digital watermarking 51 2000
7,107,451 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 80 2001
* 2001/0029,580 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 28 2001
7,095,874 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 72 2003
7,287,275 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 59 2003
* 2003/0200,439 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 17 2003
7,664,263 Method for combining transfer functions with predetermined key creation 51 2003
* 2004/0243,540 Method and device for monitoring and analyzing signals 61 2004
7,152,162 Z-transform implementation of digital watermarks 57 2004
* 2005/0135,615 Z-transform implementation of digital watermarks 25 2004
7,761,712 Steganographic method and device 50 2005
7,343,492 Method and system for digital watermarking 62 2005
* 2006/0101,269 Method and system for digital watermarking 29 2005
7,738,659 Multiple transform utilization and application for secure digital watermarking 6 2006
* 2006/0140,403 Multiple transform utilization and application for secure digital watermarking 51 2006
7,409,073 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 59 2006
* 2006/0285,722 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 27 2006
7,457,962 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 55 2006
8,538,011 Systems, methods and devices for trusted transactions 2 2006
* 2007/0028,113 Systems, methods and devices for trusted transactions 63 2006
8,271,795 Security based on subliminal and supraliminal channels for data objects 0 2006
* 2008/0028,222 Security based on subliminal and supraliminal channels for data objects 51 2006
7,664,264 Utilizing data reduction in steganographic and cryptographic systems 5 2006
* 2007/0064,940 Utilizing data reduction in steganographic and cryptographic systems 59 2006
7,730,317 Linear predictive coding implementation of digital watermarks 5 2006
7,930,545 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 2 2006
7,647,502 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 51 2006
7,532,725 Systems and methods for permitting open access to data objects and for securing data within the data objects 51 2006
7,779,261 Method and system for digital watermarking 52 2007
8,046,841 Steganographic method and device 4 2007
7,870,393 Steganographic method and device 4 2007
9,104,842 Data protection method and device 0 2007
* 2008/0016,365 Data protection method and device 53 2007
7,664,958 Optimization methods for the insertion, protection and detection of digital watermarks in digital data 6 2007
7,822,197 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2007
7,647,503 Optimization methods for the insertion, projection, and detection of digital watermarks in digital data 52 2007
8,224,705 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2007
7,530,102 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 65 2007
7,770,017 Method and system for digital watermarking 4 2007
7,830,915 Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments 4 2008
* 2008/0151,934 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 49 2008
7,844,074 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 11 2008
7,987,371 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2008
8,171,561 Secure personal content server 7 2008
8,104,079 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2009
* 2009/0210,711 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 54 2009
8,238,553 Steganographic method and device 1 2009
7,813,506 System and methods for permitting open access to data objects and for securing data within the data objects 0 2009
* 2009/0220,074 Steganographic method and device 49 2009
7,953,981 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2009
* 2010/0005,308 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 48 2009
7,877,609 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
8,281,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 2 2009
8,265,276 Method for combining transfer functions and predetermined key creation 0 2009
8,160,249 Utilizing data reduction in steganographic and cryptographic system 2 2009
* 2010/0153,734 Utilizing data reduction in steganographic and cryptographic system 49 2009
* 2010/0098,251 Method for combining transfer functions and predetermined key creation 47 2009
8,225,099 Linear predictive coding implementation of digital watermarks 0 2010
* 2010/0202,607 Linear predictive coding implementation of digital watermarks 46 2010
8,542,831 Multiple transform utilization and application for secure digital watermarking 0 2010
8,467,525 Steganographic method and device 2 2010
8,307,213 Method and system for digital watermarking 14 2010
8,161,286 Method and system for digital watermarking 14 2010
* 2011/0010,555 Method and system for digital watermarking 2 2010
8,265,278 System and methods for permitting open access to data objects and for securing data within the data objects 14 2010
8,774,216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 0 2010
* 2011/0019,691 EXCHANGE MECHANISMS FOR DIGITAL INFORMATION PACKAGES WITH BANDWIDTH SECURITIZATION, MULTICHANNEL DIGITAL WATERMARKS, AND KEY MANAGEMENT 13 2010
8,121,343 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 13 2010
8,549,305 Steganographic method and device 0 2010
8,175,330 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 2 2011
8,473,746 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2011
8,739,295 Secure personal content server 0 2012
8,526,611 Utilizing data reduction in steganographic and cryptographic systems 1 2012
8,612,765 Security based on subliminal and supraliminal channels for data objects 0 2012
RE44307 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
RE44222 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,706,570 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,930,719 Data protection method and device 1 2012
8,767,962 System and methods for permitting open access to data objects and for securing data within the data objects 0 2012
9,021,602 Data protection method and device 0 2013
8,798,268 System and methods for permitting open access to data objects and for securing data within the data objects 0 2013
9,070,151 Systems, methods and devices for trusted transactions 0 2013
8,789,201 Secure personal content server 0 2013
8,781,121 Utilizing data reduction in steganographic and cryptographic systems 0 2013
9,191,205 Multiple transform utilization and application for secure digital watermarking 0 2014
9,191,206 Multiple transform utilization and application for secure digital watermarking 0 2014
9,171,136 Data protection method and device 0 2014
 
FUJITSU LIMITED (1)
* 5,313,521 Key distribution protocol for file transfer in the local area network 104 1992
 
SUN MICROSYSTEMS, INC. (2)
* 5,371,794 Method and apparatus for privacy and authentication in wireless networks 370 1993
* RE36946 Method and apparatus for privacy and authentication in wireless networks 80 1996
 
MOTOROLA, INC. (1)
* 4,827,507 Duplex analog scrambler 20 1987
 
FIRST DATA CORPORATION (61)
6,820,202 Account authority digital signature (AADS) system 91 1998
8,620,814 Three party account authority digital signature (AADS) system 0 2001
* 2002/0112,160 Three Party Account Authority Digital Signature (AADS) System 25 2001
7,558,965 Entity authentication in electronic communications by providing verification status of device 37 2001
7,552,333 Trusted authentication digital signature (tads) system 24 2001
7,500,272 Manufacturing unique devices that generate digital signatures 14 2001
7,200,749 Method and system for using electronic communications for an electronic contract 26 2001
7,047,416 Account-based digital signature (ABDS) system 21 2001
6,983,368 Linking public key of device to information during manufacture 10 2001
6,978,369 Person-centric account-based digital signature system 99 2001
* 2002/0023,217 Manufacturing unique devices that generate digital signatures 33 2001
* 2002/0016,913 Modifying message data and generating random number digital signature within computer chip 34 2001
6,981,154 Account authority digital signature (AADS) accounts 11 2001
6,820,199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 24 2002
* 2003/0177,361 Method and system for using electronic communications for an electronic contract 17 2002
7,010,691 ABDS system utilizing security information in authenticating entity access 21 2003
6,950,940 ABDS method utilizing security information in authenticating entity access 40 2003
6,938,156 ABDS system and verification status for authenticating entity access 81 2003
6,851,054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource 62 2003
* 2003/0131,235 ABDS Method Utilizing Security Information in Authenticating Entity Access 4 2003
* 2003/0131,234 Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource 0 2003
* 2003/0126,439 ABDS System Utilizing Security Information in Authenticating Entity Access 0 2003
7,096,354 Central key authority database in an ABDS system 60 2003
7,082,533 Gauging risk in electronic communications regarding accounts in ABDS system 9 2003
7,047,414 Managing database for reliably identifying information of device generating digital signatures 39 2003
7,028,185 Managing database for identifying to recipients security features of devices generating digital signatures 23 2003
6,959,381 Central key authority (CKA) database for user accounts in ABDS system 25 2003
6,957,336 Establishing initial PuK-linked account database 13 2003
6,952,773 Requesting execution of instructions on accounts in ABDS system 11 2003
6,915,430 Reliably identifying information of device generating digital signatures 16 2003
6,892,302 Incorporating security certificate during manufacture of device generating digital signatures 16 2003
6,789,189 Managing account database in ABDS system 36 2003
* 2003/0115,463 Requesting Execution of Instructions on Accounts in ABDS System 3 2003
* 2003/0097,562 Managing Database for Reliably Identifying Information of Device Generating Digital Signatures 2 2003
* 2003/0097,561 Gauging Risk in Electronic Communications Regarding Accounts in ABDS System 0 2003
* 2003/0097,573 Central Key Authority Database in an ABDS System 6 2003
* 2004/0128,508 Method and apparatus for access authentication entity 31 2003
* 2004/0030,901 Linking public key of device to information during manufacture 8 2003
* 2004/0005,051 Entity authentication in eletronic communications by providing verification status of device 35 2003
* 2003/0115,151 Person-centric account-based digital signature system 14 2003
7,257,228 Account authority digital signature (AADS) system using encoded information 10 2004
* 2005/0044,373 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM USING ENCODED INFORMATION 1 2004
7,549,050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system 1 2004
7,519,821 Account authority digital signature (AADS) system 1 2004
* 2005/0005,123 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM 10 2004
7,936,869 Verifying digital signature based on shared knowledge 1 2005
7,869,593 Software for providing based on shared knowledge public keys having same private key 3 2005
7,693,277 Generating digital signatures using ephemeral cryptographic key 0 2005
7,593,527 Providing digital signature and public key based on shared knowledge 7 2005
7,490,239 Facilitating digital signature based on ephemeral private key 4 2005
* 2006/0156,013 DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM 2 2005
* 2006/0156,012 FACILITATING DIGITAL SIGNATURE BASED ON EPHEMERAL PRIVATE KEY 1 2005
* 2006/0153,370 GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA 10 2005
* 2006/0153,366 VERIFYING DIGITAL SIGNATURE BASED ON SHARED KNOWLEDGE 3 2005
* 2006/0153,371 GENERATING DIGITAL SIGNATURES USING EPHEMERAL CRYPTOGRAPHIC KEY 3 2005
* 2006/0153,365 PROVIDING DIGITAL SIGNATURE AND PUBLIC KEY BASED ON SHARED KNOWLEDGE 2 2005
* 2006/0153,368 SOFTWARE FOR PROVIDING BASED ON SHARED KNOWLEDGE PUBLIC KEYS HAVING SAME PRIVATE KEY 19 2005
* 2006/0153,364 ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGE 10 2005
* 2006/0153,367 DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGE 2 2005
7,784,106 Manufacturing unique devices that generate digital signatures 3 2009
* 2009/0158,029 MANUFACTURING UNIQUE DEVICES THAT GENERATE DIGITAL SIGNATURES 4 2009
 
MAXIM INTEGRATED PRODUCTS, INC. (1)
* 6,064,740 Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 47 1997
 
OMNET ASSOCIATES A CA PARTNERSHIP (1)
* 4,567,600 Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission 61 1982
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
* 6,097,307 Security system with randomized synchronization code 7 1997
 
EMC CORPORATION (7)
7,716,484 System and method for increasing the security of encrypted secrets and authentication 21 2001
* 2010/0100,724 SYSTEM AND METHOD FOR INCREASING THE SECURITY OF ENCRYPTED SECRETS AND AUTHENTICATION 34 2001
7,359,507 Server-assisted regeneration of a strong secret from a weak secret 133 2001
8,060,750 Secure seed provisioning 2 2007
* 2009/0006,858 Secure seed provisioning 3 2007
8,059,814 Techniques for carrying out seed or key derivation 6 2007
8,307,210 Method and apparatus for secure validation of tokens 2 2008
 
KOREA INFORMATION SECURITY AGENT (1)
* 2003/0012,386 Forward-secure commercial key escrow systems and escrowing methods thereof 33 2001
 
INTEL CORPORATION (1)
6,253,323 Object-based digital signatures 31 1996
 
Sync Up Technologies Corporation (1)
9,002,018 Encryption key exchange system and method 1 2011
 
BLUE SPIKE LLC (8)
* 5,745,569 Method for stega-cipher protection of computer code 383 1996
7,346,472 Method and device for monitoring and analyzing signals 131 2000
7,660,700 Method and device for monitoring and analyzing signals 66 2007
* 2008/0109,417 Method and device for monitoring and analyzing signals 50 2007
7,949,494 Method and device for monitoring and analyzing signals 61 2009
* 2010/0106,736 Method and device for monitoring and analyzing signals 46 2009
8,214,175 Method and device for monitoring and analyzing signals 75 2011
8,712,728 Method and device for monitoring and analyzing signals 0 2013
 
GRUMMAN CORPORATION (1)
* 5,054,066 Error correcting public key cryptographic method and program 61 1988
 
UT AUTOMOTIVE DEARBORN, INC. (2)
* 5,646,996 Automatic resynchronization of transmitter in the event of corrupted memory 12 1995
* 5,696,828 Random number generating system and process based on chaos 109 1995
 
MICROSOFT CORPORATION (2)
7,809,767 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 0 2003
7,565,275 Model and system state synchronization 0 2005
 
ALGORITHMIC RESEARCH LTD. (1)
* 4,964,164 RSA computation method for efficient batch processing 37 1989
 
GENWORTH HOLDINGS, INC. (1)
7,155,578 Method and system for transferring files using file transfer protocol 2 2002
 
NCR CORPORATION (2)
* 4,944,007 Public key diversification method 32 1989
* 4,935,962 Method and system for authentication 154 1989
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (7)
* 5,675,649 Process for cryptographic key generation and safekeeping 63 1995
7,231,040 Multiprime RSA public key cryptosystem 2 1998
* RE40530 Public key cryptographic apparatus and method 0 2000
7,120,248 Multiple prime number generation using a parallel prime number search algorithm 3 2001
7,016,494 Multiple cryptographic key precompute and store 6 2001
* 2005/0190,912 MULTIPLE CRYPTOGRAPHIC KEY PRECOMPUTE AND STORE 15 2001
* 2002/0186,837 Multiple prime number generation using a parallel prime number search algorithm 1 2001
 
MICRON TECHNOLOGY, INC. (1)
* 4,658,094 Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer 31 1985
 
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS (15)
8,184,803 Hash functions using elliptic curve cryptography 1 2008
8,139,765 Elliptical polynomial-based message authentication code 5 2008
* 2010/0166,176 Elliptical polynomial-based message authentication code 7 2008
8,165,287 Cryptographic hash functions using elliptic polynomial cryptography 1 2008
8,170,203 Message authentication code with elliptic polynomial hopping 2 2008
* 2010/0169,644 Message authentication code with elliptic polynomial hopping 8 2008
8,189,771 Hash functions with elliptic polynomial hopping 1 2009
8,385,541 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping 0 2010
8,351,601 Elliptic polynomial cryptography with secret key embedding 0 2010
8,331,558 Method of cipher block chaining using elliptic curve cryptography 0 2010
8,332,651 Method of generating a password protocol using elliptic polynomial cryptography 0 2010
8,189,775 Method of performing cipher block chaining using elliptic polynomial cryptography 0 2010
* 2011/0200,187 Elliptic polynomial cryptography with secret key embedding 6 2010
8,509,426 XZ-elliptic curve cryptography system and method 0 2010
8,705,740 Elliptic curve-based message authentication code system and method 0 2012
 
NEOPOST TECHNOLOGIES (1)
* 6,041,317 Postal security device incorporating periodic and automatic self implementation of public/private key pair 25 1997
 
FRAUD CONTROL SYSTEMS.COM CORPORATION (6)
8,630,942 Method of billing a purchase made over a computer network 0 2008
8,229,844 Method of billing a purchase made over a computer network 4 2008
8,190,513 Method of billing a purchase made over a computer network 3 2008
* 2009/0055,315 Method Of Billing A Purchase Made Over A Computer Network 13 2008
* 2009/0048,975 Method Of Billing A Purchase Made Over A Computer Network 12 2008
* 2009/0049,529 Method Of Billing A Purchase Made Over A Computer Network 12 2008
 
KING FAHD UNIVERSITY (1)
8,699,701 Method of performing XZ-elliptic curve cryptography for use with network security protocols 0 2010
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (3)
* 4,759,063 Blind signature systems 193 1983
* 4,991,210 Unpredictable blind signature systems 80 1989
* 4,996,711 Selected-exponent signature systems 118 1989
 
CONTENTGUARD HOLDINGS, INC. (4)
* 8,275,716 Method and system for subscription digital rights management 2 2002
* 2002/0198,846 Method and system for subscription digital rights management 47 2002
8,468,098 Method and system for subscription digital rights management 0 2012
* 2012/0317,654 METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT 0 2012
 
AT&T Bell Laboratories (1)
* 5,353,351 Secure teleconferencing 75 1992
 
ENTEGRITY SOLUTIONS CORPORATION (1)
* 5,745,574 Security infrastructure for electronic transactions 222 1995
 
HELLMAN, MARTIN (1)
* 5,872,917 Authentication using random challenges 61 1997
 
JPMORGAN CHASE BANK, N.A. (2)
7,899,753 Systems and methods for time variable financial authentication 7 2003
9,240,089 Systems and methods for time variable financial authentication 0 2009
 
MICROSOFT TECHNOLOGY LICENSING, LLC (51)
7,606,898 System and method for distributed management of shared computers 9 2000
* 2004/0210,623 Virtual network topology generation 70 2003
7,636,917 Network load balancing with host status information 19 2003
7,613,822 Network load balancing with session information 24 2003
7,590,736 Flexible network load balancing 27 2003
* 2004/0267,920 Flexible network load balancing 98 2003
* 2004/0268,358 Network load balancing with host status information 146 2003
7,606,929 Network load balancing with connection manipulation 5 2003
7,567,504 Network load balancing with traffic routing 38 2003
* 2005/0055,435 Network load balancing with connection manipulation 82 2003
8,122,106 Integrating design, deployment, and management phases for systems 6 2003
7,890,543 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 21 2003
7,289,629 Primitives for fast secure hash functions and stream ciphers 1 2004
* 2005/0175,176 Primitives for fast secure hash functions and stream ciphers 1 2004
* 7,778,422 Security associations for devices 5 2004
7,497,379 Counterfeit and tamper resistant labels with randomly occurring features 27 2004
* 2005/0190,914 Counterfeit and tamper resistant labels with randomly occurring features 23 2004
7,886,041 Design time validation of systems 41 2004
* 2004/0193,388 Design time validation of systems 48 2004
7,577,844 Systems and methods for encoding randomly distributed features in an object 18 2004
7,669,235 Secure domain join for computing devices 4 2004
7,305,549 Filters to isolate untrusted ports of switches 29 2004
7,305,561 Establishing computing trust with a staging area 37 2004
7,336,806 Iris-based biometric identification 18 2004
7,711,121 System and method for distributed management of shared computers 0 2004
* 2005/0091,078 System and method for distributed management of shared computers 28 2004
7,739,380 System and method for distributed management of shared computers 0 2004
* 2005/0097,097 System and method for distributed management of shared computers 30 2004
* 2005/0125,212 System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model 46 2004
7,792,931 Model-based system provisioning 6 2005
8,489,728 Model-based system monitoring 3 2005
7,802,144 Model-based system monitoring 26 2005
7,797,147 Model-based system monitoring 4 2005
8,549,513 Model-based virtual system provisioning 5 2005
7,890,951 Model-based provisioning of test environments 29 2005
* 2007/0016,393 Model-based propagation of attributes 3 2005
* 2007/0006,218 Model-based virtual system provisioning 31 2005
* 2006/0037,002 Model-based provisioning of test environments 36 2005
* 2006/0025,985 Model-Based system management 99 2005
7,684,964 Model and system state synchronization 4 2005
7,941,309 Modeling IT operations/policies 2 2005
7,630,877 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 48 2005
* 2006/0271,341 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 52 2005
7,574,343 System and method for logical modeling of distributed computer systems 6 2006
7,689,676 Model-based policy application 15 2007
* 2008/0059,214 Model-Based Policy Application 37 2007
8,127,133 Labeling of data objects to apply and enforce policies 0 2007
* 2008/0184,329 LABELING OF DATA OBJECTS TO APPLY AND ENFORCE POLICIES 4 2007
* 2008/0288,622 Managing Server Farms 2 2007
7,444,007 Iris-based biometric identification 8 2007
7,878,398 Counterfeit and tamper resistant labels with randomly occurring features 3 2009
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
* 5,323,146 Method for authenticating the user of a data station connected to a computer system 46 1992
 
Wisteria Trading, Inc. (1)
7,991,188 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 2 2007
 
GOOGLE INC. (2)
7,320,073 Secure method for roaming keys and certificates 10 2003
* 2004/0199,774 Secure method for roaming keys and certificates 2 2003
 
PRINCETON UNIVERSITY (1)
* 2004/0250,073 Protocol for hybrid authenticated key establishment 6 2003
 
GENWORTH FINANCIAL, INC. (1)
* 2004/0133,699 System and method for performing data transfer 1 2002
 
CROWLEY, JOHN J. (1)
* 5,375,169 Cryptographic key management method and apparatus 122 1993
 
KEYBYTE TECHNOLOGIES, INC. (1)
* 6,011,847 Cryptographic access and labeling system 77 1995
 
GENERAL ELECTRIC COMPANY (2)
* 5,204,901 Public key cryptographic mechanism 20 1991
* 5,239,584 Method and apparatus for encryption/authentication of data in energy metering applications 60 1991
 
VERIZON PATENT AND LICENSING INC. (7)
* 5,557,678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 148 1994
* 5,588,061 System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 50 1994
* 5,535,276 Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography 355 1994
* 5,748,735 Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography 122 1996
* 5,737,419 Computer system for securing communications using split private key asymmetric cryptography 104 1996
* 5,838,792 Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 81 1996
* 5,905,799 Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 25 1996
 
PREMINOS CORPORATION (1)
* 5,812,669 Method and system for providing secure EDI over an open network 97 1995
 
THOMSON LICENSING (2)
* 7,545,932 Secure authenticated channel 4 2004
* 2006/0093,138 Secure authenticated channel 18 2004
 
COMCAST CABLE COMMUNICATIONS, LLC (3)
* 5,787,172 Apparatus and method for establishing a cryptographic link between elements of a system 218 1994
* 6,148,400 Apparatus and method for establishing a crytographic link between elements of a system 36 1998
6,456,716 Apparatus and method for establishing a crytographic link between elements of a system 16 2000
 
ERICSSON INC. (1)
* 5,499,295 Method and apparatus for feature authorization and software copy protection in RF communications devices 147 1993
 
DIGITAL RIVER, INC. (14)
* 5,903,647 Self-launching encrypted digital information distribution system 61 1995
* 5,883,954 Self-launching encrypted try before you buy software distribution system 59 1995
* 5,883,955 On-line try before you buy software distribution system 134 1995
* 5,870,543 System for preventing unauthorized copying of active software 82 1997
* 5,907,617 Try before you buy software distribution and marketing system 92 1997
* 5,887,060 Central database system for automatic software program sales 35 1997
7,058,597 Apparatus and method for adaptive fraud screening for electronic commerce transactions 14 1999
7,617,124 Apparatus and method for secure downloading of files 4 2000
7,165,051 Electronic commerce system and method for detecting fraud 75 2005
* 2005/0154,676 Electronic commerce system method for detecting fraud 16 2005
8,271,396 Electronic commerce system and method for detecting fraud 2 2006
7,881,972 Electronic commerce system and method for detecting fraud 1 2006
8,050,980 Secure downloading of a file from a network system and method 1 2009
* 2010/0017,417 Secure Downloading of a File from a Network System and Method 1 2009
 
UNIKEN INC. (3)
7,949,867 Secure communications 4 2006
7,949,869 Establishing relative identity 3 2010
* 2010/0119,063 Establishing Relative Identity 1 2010
 
CORIANT OY (2)
* 6,422,461 Method and system for ensuring connection of a module to an electronic apparatus 0 1999
* 6,739,504 Method and system for ensuring connection of a module to an electronic apparatus 0 2002
 
PREVIEW SOFTWARE (1)
* 4,658,093 Software distribution system 824 1983
 
Next Software, Inc. (2)
* 5,159,632 Method and apparatus for public key exchange in a cryptographic system 126 1991
* 5,271,061 Method and apparatus for public key exchange in a cryptographic system 86 1992
 
WISTRON CORPORATION (5)
6,574,609 Secure electronic content management system 306 1998
6,389,538 System for tracking end-user electronic content usage 508 1998
6,611,812 Secure electronic content distribution on CDS and DVDs 271 1999
6,389,403 Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system 189 1999
6,983,371 Super-distribution of protected digital content 145 2000
 
TecSec, Inc. (12)
* 5,369,707 Secure network method and apparatus 195 1993
* 5,369,702 Distributed cryptographic object method 241 1993
* 5,717,755 Distributed cryptographic object method 68 1994
* 5,680,452 Distributed cryptographic object method 116 1995
* 5,898,781 Distributed cryptographic object method 64 1997
6,694,433 XML encryption scheme 16 1999
7,095,852 Cryptographic key split binder for use with tagged data elements 52 2001
* 2004/0208,316 Cryptographic key split binder for use with tagged data elements 3 2001
7,079,653 Cryptographic key split binding process and apparatus 14 2002
* 2003/0039,358 Cryptographic key split binding process and apparatus 5 2002
8,077,870 Cryptographic key split binder for use with tagged data elements 5 2010
8,712,046 Cryptographic key split combiner 0 2012
 
E-CONTACT TECHNOLOGIES LLC (1)
* 5,189,700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents 106 1991
 
SAFENET, INC. (2)
* 4,891,781 Modulo arithmetic processor chip 32 1988
* 5,210,710 Modulo arithmetic processor chip 31 1990
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (4)
* 5,124,117 Cryptographic key distribution method and system 88 1991
* 5,272,755 Public key cryptosystem with an elliptic curve 103 1992
* 5,351,297 Method of privacy communication using elliptic curves 48 1993
* 5,442,707 Method for generating and verifying electronic signatures and privacy communication using elliptic curves 95 1993
 
STEVEN M. HOFFBERG 2004-1 GRAT (3)
8,369,967 Alarm system controller and a method for controlling an alarm system 10 2011
8,364,136 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system 15 2011
8,892,495 Adaptive pattern recognition based controller apparatus and method and human-interface therefore 0 2013
 
UNIVERSITY OF SOUTHERN CALIFORNIA (1)
* 7,280,663 Encryption system based on crossed inverse quasigroups 2 2000
 
PHILIPS ELECTRONICS NORTH AMERICA CORPORATION (1)
* 6,141,422 Secure cryptographic multi-exponentiation method and coprocessor subsystem 13 1997
 
AT&T CORP. (1)
* 6,058,187 Secure telecommunications data transmission 54 1997
* Cited By Examiner