US Patent No: 4,424,414

Number of patents in Portfolio can not be more than 2000

Exponentiation cryptographic apparatus and method

1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITYPALO ALTO, CA2999

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hellman, Martin E Stanford, CA 12 2554
Pohlig, Stephen C Acton, MA 1 326

Cited Art Landscape

  • No Cited Art to Display

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
WISTARIA TRADING, INC. (43)
5,613,004 Steganographic method and device 699 1995
5,822,432 Method for human-assisted random key generation and application for digital watermark system 311 1996
7,362,775 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 52 1996
5,889,868 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 419 1996
5,687,236 Steganographic method and device 482 1996
7,568,100 Steganographic method and device 52 1997
6,598,162 Method for combining transfer functions with predetermined key creation 109 1998
5,905,800 Method and system for digital watermarking 436 1998
6,205,249 Multiple transform utilization and applications for secure digital watermarking 207 1998
6,522,767 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 139 1999
7,007,166 Method and system for digital watermarking 109 2000
7,107,451 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 70 2001
7,095,874 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 56 2003
7,152,162 Z-transform implementation of digital watermarks 48 2004
7,761,712 Steganographic method and device 42 2005
7,343,492 Method and system for digital watermarking 51 2005
7,409,073 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 48 2006
7,457,962 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 47 2006
7,730,317 Linear predictive coding implementation of digital watermarks 5 2006
7,930,545 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 1 2006
7,647,502 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 43 2006
7,779,261 Method and system for digital watermarking 43 2007
8,046,841 Steganographic method and device 2 2007
7,870,393 Steganographic method and device 3 2007
7,664,958 Optimization methods for the insertion, protection and detection of digital watermarks in digital data 6 2007
7,822,197 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2007
7,647,503 Optimization methods for the insertion, projection, and detection of digital watermarks in digital data 44 2007
7,770,017 Method and system for digital watermarking 3 2007
7,830,915 Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments 4 2008
7,844,074 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 6 2008
7,987,371 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2008
8,238,553 Steganographic method and device 1 2009
7,953,981 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 2 2009
7,877,609 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
8,281,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
8,225,099 Linear predictive coding implementation of digital watermarks 0 2010
8,467,525 Steganographic method and device 0 2010
8,307,213 Method and system for digital watermarking 5 2010
8,161,286 Method and system for digital watermarking 5 2010
8,774,216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 0 2010
8,121,343 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 5 2010
8,549,305 Steganographic method and device 0 2010
8,175,330 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 2 2011
 
MICROSOFT CORPORATION (35)
7,606,898 System and method for distributed management of shared computers 7 2000
7,636,917 Network load balancing with host status information 14 2003
7,613,822 Network load balancing with session information 13 2003
7,590,736 Flexible network load balancing 17 2003
7,606,929 Network load balancing with connection manipulation 4 2003
7,567,504 Network load balancing with traffic routing 26 2003
8,122,106 Integrating design, deployment, and management phases for systems 5 2003
7,890,543 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 16 2003
7,809,767 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 0 2003
7,289,629 Primitives for fast secure hash functions and stream ciphers 1 2004
7,778,422 Security associations for devices 2 2004
7,497,379 Counterfeit and tamper resistant labels with randomly occurring features 24 2004
7,886,041 Design time validation of systems 40 2004
7,577,844 Systems and methods for encoding randomly distributed features in an object 15 2004
7,669,235 Secure domain join for computing devices 4 2004
7,305,549 Filters to isolate untrusted ports of switches 28 2004
7,305,561 Establishing computing trust with a staging area 34 2004
7,336,806 Iris-based biometric identification 16 2004
7,711,121 System and method for distributed management of shared computers 0 2004
7,739,380 System and method for distributed management of shared computers 0 2004
7,792,931 Model-based system provisioning 3 2005
8,489,728 Model-based system monitoring 2 2005
7,802,144 Model-based system monitoring 23 2005
7,797,147 Model-based system monitoring 3 2005
8,549,513 Model-based virtual system provisioning 2 2005
7,890,951 Model-based provisioning of test environments 17 2005
7,684,964 Model and system state synchronization 2 2005
7,565,275 Model and system state synchronization 0 2005
7,941,309 Modeling IT operations/policies 2 2005
7,630,877 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 35 2005
7,574,343 System and method for logical modeling of distributed computer systems 6 2006
7,689,676 Model-based policy application 8 2007
8,127,133 Labeling of data objects to apply and enforce policies 0 2007
7,444,007 Iris-based biometric identification 8 2007
7,878,398 Counterfeit and tamper resistant labels with randomly occurring features 2 2009
 
FIRST DATA CORPORATION (34)
6,820,202 Account authority digital signature (AADS) system 85 1998
8,620,814 Three party account authority digital signature (AADS) system 0 2001
7,558,965 Entity authentication in electronic communications by providing verification status of device 31 2001
7,552,333 Trusted authentication digital signature (tads) system 19 2001
7,500,272 Manufacturing unique devices that generate digital signatures 11 2001
7,200,749 Method and system for using electronic communications for an electronic contract 20 2001
7,047,416 Account-based digital signature (ABDS) system 18 2001
6,983,368 Linking public key of device to information during manufacture 10 2001
6,978,369 Person-centric account-based digital signature system 88 2001
6,981,154 Account authority digital signature (AADS) accounts 11 2001
6,820,199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 24 2002
7,010,691 ABDS system utilizing security information in authenticating entity access 19 2003
6,950,940 ABDS method utilizing security information in authenticating entity access 35 2003
6,938,156 ABDS system and verification status for authenticating entity access 70 2003
6,851,054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource 54 2003
7,096,354 Central key authority database in an ABDS system 49 2003
7,082,533 Gauging risk in electronic communications regarding accounts in ABDS system 9 2003
7,047,414 Managing database for reliably identifying information of device generating digital signatures 36 2003
7,028,185 Managing database for identifying to recipients security features of devices generating digital signatures 22 2003
6,959,381 Central key authority (CKA) database for user accounts in ABDS system 24 2003
6,957,336 Establishing initial PuK-linked account database 12 2003
6,952,773 Requesting execution of instructions on accounts in ABDS system 10 2003
6,915,430 Reliably identifying information of device generating digital signatures 14 2003
6,892,302 Incorporating security certificate during manufacture of device generating digital signatures 15 2003
6,789,189 Managing account database in ABDS system 36 2003
7,257,228 Account authority digital signature (AADS) system using encoded information 8 2004
7,549,050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system 0 2004
7,519,821 Account authority digital signature (AADS) system 1 2004
7,936,869 Verifying digital signature based on shared knowledge 0 2005
7,869,593 Software for providing based on shared knowledge public keys having same private key 3 2005
7,693,277 Generating digital signatures using ephemeral cryptographic key 0 2005
7,593,527 Providing digital signature and public key based on shared knowledge 5 2005
7,490,239 Facilitating digital signature based on ephemeral private key 4 2005
7,784,106 Manufacturing unique devices that generate digital signatures 1 2009
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (17)
4,736,423 Technique for reducing RSA Crypto variable storage 51 1986
5,163,096 Storage protection utilizing public storage key control 77 1991
5,926,551 System and method for certifying content of hard-copy documents 21 1995
5,737,425 Cryptosystem employing worst-case difficult-to solve lattice problem 4 1996
5,953,420 Method and apparatus for establishing an authenticated shared secret value between a pair of users 74 1996
6,560,337 Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key 8 1998
6,363,154 Decentralized systems methods and computer program products for sending secure messages among a group of nodes 63 1998
7,269,564 Method and apparatus to indicate an encoding status for digital content 26 1998
6,345,256 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content 488 1998
6,959,288 Digital content preparation system 94 1999
6,834,110 Multi-tier digital TV programming for content distribution 98 1999
7,213,005 Digital content distribution using web broadcasting services 108 2000
6,978,375 System and method for secure authentication of external software modules provided by third parties 3 2000
7,500,109 System and method for secure authentication of external software modules provided by third parties 0 2005
7,487,128 Updating usage conditions in lieu of download digital rights management protected content 16 2005
7,277,870 Digital content distribution using web broadcasting services 71 2005
7,590,866 Super-distribution of protected digital content 9 2005
 
BLUE SPIKE, INC. (14)
8,538,011 Systems, methods and devices for trusted transactions 1 2006
8,271,795 Security based on subliminal and supraliminal channels for data objects 2006
7,664,264 Utilizing data reduction in steganographic and cryptographic systems 4 2006
7,532,725 Systems and methods for permitting open access to data objects and for securing data within the data objects 43 2006
8,171,561 Secure personal content server 6 2008
7,813,506 System and methods for permitting open access to data objects and for securing data within the data objects 0 2009
8,160,249 Utilizing data reduction in steganographic and cryptographic system 1 2009
8,265,278 System and methods for permitting open access to data objects and for securing data within the data objects 6 2010
8,739,295 Secure personal content server 0 2012
8,526,611 Utilizing data reduction in steganographic and cryptographic systems 1 2012
8,767,962 System and methods for permitting open access to data objects and for securing data within the data objects 0 2012
8,798,268 System and methods for permitting open access to data objects and for securing data within the data objects 0 2013
8,789,201 Secure personal content server 0 2013
8,781,121 Utilizing data reduction in steganographic and cryptographic systems 0 2013
 
DIGITAL RIVER, INC. (12)
5,903,647 Self-launching encrypted digital information distribution system 61 1995
5,883,954 Self-launching encrypted try before you buy software distribution system 59 1995
5,883,955 On-line try before you buy software distribution system 132 1995
5,870,543 System for preventing unauthorized copying of active software 62 1997
5,907,617 Try before you buy software distribution and marketing system 90 1997
5,887,060 Central database system for automatic software program sales 35 1997
7,058,597 Apparatus and method for adaptive fraud screening for electronic commerce transactions 11 1999
7,617,124 Apparatus and method for secure downloading of files 4 2000
7,165,051 Electronic commerce system and method for detecting fraud 60 2005
8,271,396 Electronic commerce system and method for detecting fraud 1 2006
7,881,972 Electronic commerce system and method for detecting fraud 1 2006
8,050,980 Secure downloading of a file from a network system and method 1 2009
 
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS (12)
8,184,803 Hash functions using elliptic curve cryptography 0 2008
8,139,765 Elliptical polynomial-based message authentication code 3 2008
8,165,287 Cryptographic hash functions using elliptic polynomial cryptography 1 2008
8,170,203 Message authentication code with elliptic polynomial hopping 2 2008
8,189,771 Hash functions with elliptic polynomial hopping 1 2009
8,385,541 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping 0 2010
8,351,601 Elliptic polynomial cryptography with secret key embedding 0 2010
8,331,558 Method of cipher block chaining using elliptic curve cryptography 0 2010
8,332,651 Method of generating a password protocol using elliptic polynomial cryptography 0 2010
8,189,775 Method of performing cipher block chaining using elliptic polynomial cryptography 0 2010
8,509,426 XZ-elliptic curve cryptography system and method 0 2010
8,705,740 Elliptic curve-based message authentication code system and method 0 2012
 
TECSEC, INCORPORATED (10)
5,369,707 Secure network method and apparatus 182 1993
5,369,702 Distributed cryptographic object method 235 1993
5,717,755 Distributed cryptographic object method 63 1994
5,680,452 Distributed cryptographic object method 112 1995
5,898,781 Distributed cryptographic object method 61 1997
6,694,433 XML encryption scheme 13 1999
7,095,852 Cryptographic key split binder for use with tagged data elements 34 2001
7,079,653 Cryptographic key split binding process and apparatus 10 2002
8,077,870 Cryptographic key split binder for use with tagged data elements 1 2010
8,712,046 Cryptographic key split combiner 0 2012
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (8)
5,568,554 Method for improving the processing and storage performance of digital signature schemes 66 1995
5,675,649 Process for cryptographic key generation and safekeeping 63 1995
5,999,624 Remote financial transaction system 231 1996
5,848,159 Public key cryptographic apparatus and method 52 1997
7,231,040 Multiprime RSA public key cryptosystem 2 1998
RE40530 Public key cryptographic apparatus and method 0 2000
7,120,248 Multiple prime number generation using a parallel prime number search algorithm 3 2001
7,016,494 Multiple cryptographic key precompute and store 6 2001
 
LEVEL 3 COMMUNICATIONS, LLC (8)
6,226,618 Electronic content delivery system 1086 1998
6,263,313 Method and apparatus to create encoded digital content 367 1998
6,587,837 Method for delivering electronic content from an online store 352 1998
6,398,245 Key management system for digital content player 222 1998
7,206,748 Multimedia player toolkit for electronic content delivery 59 1998
6,418,421 Multimedia player for an electronic content delivery system 358 1998
7,110,984 Updating usage conditions in lieu of download digital rights management protected content 59 2000
6,859,791 Method for determining internet users geographic region 78 2000
 
BLUE SPIKE LLC (7)
5,745,569 Method for stega-cipher protection of computer code 370 1996
7,346,472 Method and device for monitoring and analyzing signals 87 2000
7,660,700 Method and device for monitoring and analyzing signals 33 2007
7,949,494 Method and device for monitoring and analyzing signals 28 2009
8,214,175 Method and device for monitoring and analyzing signals 34 2011
8,612,765 Security based on subliminal and supraliminal channels for data objects 0 2012
8,712,728 Method and device for monitoring and analyzing signals 0 2013
 
LEAR CORPORATION EEDS AND INTERIORS (7)
5,377,270 Cryptographic authentication of transmitted messages using pseudorandom numbers 48 1993
5,363,448 Pseudorandom number generation and cryptographic authentication 149 1993
5,398,284 Cryptographic encoding process 29 1993
5,369,706 Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code 70 1993
5,757,923 Method of generating secret identification numbers 143 1996
RE36181 Pseudorandom number generation and crytographic authentication 22 1996
RE36752 Cryptographic authentication of transmitted messages using pseudorandom numbers 9 1996
 
VERIZON PATENT AND LICENSING INC. (7)
5,557,678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 146 1994
5,588,061 System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 49 1994
5,535,276 Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography 338 1994
5,748,735 Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography 102 1996
5,737,419 Computer system for securing communications using split private key asymmetric cryptography 94 1996
5,838,792 Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 75 1996
5,905,799 Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 25 1996
 
EMC CORPORATION (5)
7,716,484 System and method for increasing the security of encrypted secrets and authentication 13 2001
7,359,507 Server-assisted regeneration of a strong secret from a weak secret 111 2001
8,060,750 Secure seed provisioning 1 2007
8,059,814 Techniques for carrying out seed or key derivation 2 2007
8,307,210 Method and apparatus for secure validation of tokens 1 2008
 
WISTRON CORPORATION (5)
6,574,609 Secure electronic content management system 275 1998
6,389,538 System for tracking end-user electronic content usage 459 1998
6,611,812 Secure electronic content distribution on CDS and DVDs 243 1999
6,389,403 Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system 173 1999
6,983,371 Super-distribution of protected digital content 125 2000
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (4)
5,124,117 Cryptographic key distribution method and system 86 1991
5,272,755 Public key cryptosystem with an elliptic curve 101 1992
5,351,297 Method of privacy communication using elliptic curves 46 1993
5,442,707 Method for generating and verifying electronic signatures and privacy communication using elliptic curves 90 1993
 
COMCAST CABLE COMMUNICATIONS, LLC (3)
5,787,172 Apparatus and method for establishing a cryptographic link between elements of a system 199 1994
6,148,400 Apparatus and method for establishing a crytographic link between elements of a system 27 1998
6,456,716 Apparatus and method for establishing a crytographic link between elements of a system 12 2000
 
FRAUD CONTROL SYSTEMS.COM CORPORATION (3)
8,630,942 Method of billing a purchase made over a computer network 0 2008
8,229,844 Method of billing a purchase made over a computer network 3 2008
8,190,513 Method of billing a purchase made over a computer network 2 2008
 
GILBARCO INC. (3)
5,228,084 Security apparatus and system for retail environments 38 1991
5,384,850 Security apparatus and system for retail environments 20 1992
5,448,638 Security apparatus and system for retail environments 30 1994
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (3)
4,759,063 Blind signature systems 189 1983
4,991,210 Unpredictable blind signature systems 76 1989
4,996,711 Selected-exponent signature systems 117 1989
 
CHANG, CHUNG NAN (2)
5,583,939 Secure, swift cryptographic key exchange 28 1995
5,835,592 Secure, swift cryptographic key exchange 51 1995
 
CONTENTGUARD HOLDINGS, INC. (2)
8,275,716 Method and system for subscription digital rights management 0 2002
8,468,098 Method and system for subscription digital rights management 0 2012
 
GENERAL ELECTRIC COMPANY (2)
5,204,901 Public key cryptographic mechanism 18 1991
5,239,584 Method and apparatus for encryption/authentication of data in energy metering applications 55 1991
 
MOTOROLA MOBILITY LLC (2)
6,078,593 Method and apparatus for reliable operation of universal voice grade cards 12 1997
6,574,333 State machine based universal voice grade cards 8 1999
 
NCR CORPORATION (2)
4,944,007 Public key diversification method 32 1989
4,935,962 Method and system for authentication 150 1989
 
NEXT SOFTWARE, INC. (2)
5,159,632 Method and apparatus for public key exchange in a cryptographic system 121 1991
5,271,061 Method and apparatus for public key exchange in a cryptographic system 84 1992
 
PROTEGRITY CORPORATION (2)
8,443,426 Method and system for preventing impersonation of a computer system user 1 2008
8,402,281 Data security system for a database 3 2010
 
SAFENET, INC. (2)
4,891,781 Modulo arithmetic processor chip 32 1988
5,210,710 Modulo arithmetic processor chip 28 1990
 
STEVEN M. HOFFBERG 2004-1 GRAT (2)
8,369,967 Alarm system controller and a method for controlling an alarm system 7 2011
8,364,136 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system 5 2011
 
SUN MICROSYSTEMS, INC. (2)
5,371,794 Method and apparatus for privacy and authentication in wireless networks 333 1993
RE36946 Method and apparatus for privacy and authentication in wireless networks 74 1996
 
TELLABS DENMARK A/S (2)
6,422,461 Method and system for ensuring connection of a module to an electronic apparatus 0 1999
6,739,504 Method and system for ensuring connection of a module to an electronic apparatus 0 2002
 
UNIKEN INC. (2)
7,949,867 Secure communications 2 2006
7,949,869 Establishing relative identity 1 2010
 
UT AUTOMOTIVE DEARBORN, INC. (2)
5,646,996 Automatic resynchronization of transmitter in the event of corrupted memory 12 1995
5,696,828 Random number generating system and process based on chaos 100 1995
 
ALGORITHMIC RESEARCH LTD. (1)
4,964,164 RSA computation method for efficient batch processing 37 1989
 
AT&T Bell Laboratories (1)
5,353,351 Secure teleconferencing 72 1992
 
AT&T CORP. (1)
6,058,187 Secure telecommunications data transmission 47 1997
 
CHRYSLER GROUP LLC (1)
5,787,367 Flash reprogramming security for vehicle computer 49 1996
 
CROWLEY, JOHN J. (1)
5,375,169 Cryptographic key management method and apparatus 118 1993
 
DE LA RUE CARTES ET SYSTEMES SAS (1)
5,761,310 Communication system for messages enciphered according to an RSA-type procedure 7 1996
 
E-CONTACT TECHNOLOGIES LLC (1)
5,189,700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents 99 1991
 
ENERGY, UNITED STATES DEPARTMENT OF (1)
5,299,262 Method for exponentiating in cryptographic systems 34 1992
 
ENTEGRITY SOLUTIONS CORPORATION (1)
5,745,574 Security infrastructure for electronic transactions 218 1995
 
ERICSSON INC. (1)
5,499,295 Method and apparatus for feature authorization and software copy protection in RF communications devices 146 1993
 
FUJITSU LIMITED (1)
5,313,521 Key distribution protocol for file transfer in the local area network 101 1992
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
5,323,146 Method for authenticating the user of a data station connected to a computer system 44 1992
 
GENWORTH HOLDINGS, INC. (1)
7,155,578 Method and system for transferring files using file transfer protocol 2 2002
 
GOOGLE INC. (1)
7,320,073 Secure method for roaming keys and certificates 5 2003
 
GRUMMAN CORPORATION (1)
5,054,066 Error correcting public key cryptographic method and program 57 1988
 
HELLMAN, MARTIN (1)
5,872,917 Authentication using random challenges 55 1997
 
INTEL CORPORATION (1)
6,253,323 Object-based digital signatures 27 1996
 
JPMORGAN CHASE BANK, N.A. (1)
7,899,753 Systems and methods for time variable financial authentication 5 2003
 
KEYBYTE TECHNOLOGIES, INC. (1)
6,011,847 Cryptographic access and labeling system 70 1995
 
KILE GOEKJIAN REED & MCMANUS (1)
6,243,466 Auto-escrowable and auto-certifiable cryptosystems with fast key generation 8 1997
 
KING FAHD UNIVERSITY (1)
8,699,701 Method of performing XZ-elliptic curve cryptography for use with network security protocols 0 2010
 
MAXIM INTEGRATED PRODUCTS, INC. (1)
6,064,740 Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 43 1997
 
MICRON TECHNOLOGY, INC. (1)
4,658,094 Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer 30 1985
 
MOTOROLA, INC. (1)
4,827,507 Duplex analog scrambler 20 1987
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
6,097,307 Security system with randomized synchronization code 5 1997
 
NEOPOST TECHNOLOGIES (1)
6,041,317 Postal security device incorporating periodic and automatic self implementation of public/private key pair 23 1997
 
OMNET ASSOCIATES A CA PARTNERSHIP (1)
4,567,600 Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission 59 1982
 
PHILIPS ELECTRONICS NORTH AMERICA CORPORATION (1)
6,141,422 Secure cryptographic multi-exponentiation method and coprocessor subsystem 13 1997
 
PREMINOS CORPORATION (1)
5,812,669 Method and system for providing secure EDI over an open network 92 1995
 
PREVIEW SOFTWARE (1)
4,658,093 Software distribution system 765 1983
 
RIVERWOOD INTERNATIONAL CORPORATION (1)
7,143,284 ABDS method and verification status for authenticating entity access 11 2003
 
SCHLAGE LOCK COMPANY (1)
4,837,822 Cryptographic based electronic lock system and method of operation 46 1986
 
SMARTFLASH LLC (1)
8,794,516 Data storage and access systems 0 2012
 
The United States of America as represented by the Secretary of Commerce (1)
5,231,668 Digital signature algorithm 159 1991
 
THOMSON LICENSING (1)
7,545,932 Secure authenticated channel 4 2004
 
UNIVERSITY OF SOUTHERN CALIFORNIA (1)
7,280,663 Encryption system based on crossed inverse quasigroups 2 2000
 
UPONUS TECHNOLOGIES, LLC. (1)
7,382,878 System and method for data encryption 3 2001
 
VERIDIAN INFORMATION SOLUTIONS, INC. (1)
5,414,771 System and method for the creation of random sequences and for the cryptographic protection of communications 25 1993
 
Wisteria Trading, Inc. (1)
7,991,188 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 1 2007
 
Other [Check patent profile for assignment information] (21)
4,703,503 Cryptographic system using pseudocomplements of vector Boolean algebra 7 1986
5,987,130 Simiplified secure swift cryptographic key exchange 7 1997
6,202,150 Auto-escrowable and auto-certifiable cryptosystems 19 1997
6,122,742 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys 14 1997
6,389,136 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys 26 1997
6,282,295 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers 55 1997
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 25 1998
7,035,409 Multiple transform utilization and applications for secure digital watermarking 43 2000
7,287,275 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 46 2003
7,664,263 Method for combining transfer functions with predetermined key creation 43 2003
7,738,659 Multiple transform utilization and application for secure digital watermarking 4 2006
8,224,705 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2007
7,530,102 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 53 2007
8,104,079 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2009
8,265,276 Method for combining transfer functions and predetermined key creation 0 2009
8,542,831 Multiple transform utilization and application for secure digital watermarking 0 2010
8,473,746 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2011
RE44307 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
RE44222 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,706,570 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,892,495 Adaptive pattern recognition based controller apparatus and method and human-interface therefore 0 2013