US Patent No: 4,424,414

Number of patents in Portfolio can not be more than 2000

Exponentiation cryptographic apparatus and method

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITYPALO ALTO, CA2260

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Hellman, Martin E Stanford, CA 10 2798
Pohlig, Stephen C Acton, MA 1 339

Cited Art Landscape

  • No Cited Art to Display

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (10)
* 4,703,503 Cryptographic system using pseudocomplements of vector Boolean algebra 9 1986
* 5,987,130 Simiplified secure swift cryptographic key exchange 7 1997
* 6,122,742 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys 16 1997
* 2002/0032,860 Account authority digital signature 25 2001
* 2002/0184,511 Secure accounting and operational control reporting system 2 2002
* 2003/0212,992 Apparatus and method for using application signatures for the identification of files 56 2003
* 2006/0095,792 Super-distribution of protected digital content 94 2005
* 2007/0180,240 Data security system for a database 1 2006
* 2008/0005,571 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 52 2007
9,151,633 Mobile communication device for delivering targeted advertisements 0 2014
 
CRYPTOPEAK SOLUTIONS, LLC (5)
6,202,150 Auto-escrowable and auto-certifiable cryptosystems 22 1997
6,243,466 Auto-escrowable and auto-certifiable cryptosystems with fast key generation 9 1997
6,389,136 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys 28 1997
6,282,295 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers 56 1997
6,473,508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys 32 1998
 
SMARTFLASH LLC (1)
8,794,516 Data storage and access systems 1 2012
 
SONY CORPORATION (1)
* 2005/0005,148 Contents processing system 5 2004
 
LEVEL 3 COMMUNICATIONS, LLC (8)
6,226,618 Electronic content delivery system 1269 1998
6,263,313 Method and apparatus to create encoded digital content 419 1998
6,587,837 Method for delivering electronic content from an online store 406 1998
6,398,245 Key management system for digital content player 253 1998
7,206,748 Multimedia player toolkit for electronic content delivery 72 1998
6,418,421 Multimedia player for an electronic content delivery system 422 1998
7,110,984 Updating usage conditions in lieu of download digital rights management protected content 74 2000
6,859,791 Method for determining internet users geographic region 92 2000
 
GOVERNMENT OF THE UNITED STATES OF AMERICA, AS REPRESENTED BY THE SECRETARY OF COMMERCE, THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (1)
* 5,231,668 Digital signature algorithm 176 1991
 
RIVERWOOD INTERNATIONAL CORPORATION (2)
7,143,284 ABDS method and verification status for authenticating entity access 13 2003
* 2003/0126,437 ABDS Method and Verification Status for Authenticating Entity Access 30 2003
 
DE LA RUE CARTES ET SYSTEMES SAS (1)
* 5,761,310 Communication system for messages enciphered according to an RSA-type procedure 7 1996
 
VERIDIAN INFORMATION SOLUTIONS, INC. (1)
* 5,414,771 System and method for the creation of random sequences and for the cryptographic protection of communications 26 1993
 
GOOGLE TECHNOLOGY HOLDINGS LLC (2)
* 6,078,593 Method and apparatus for reliable operation of universal voice grade cards 13 1997
6,574,333 State machine based universal voice grade cards 8 1999
 
GILBARCO INC. (3)
* 5,228,084 Security apparatus and system for retail environments 41 1991
* 5,384,850 Security apparatus and system for retail environments 20 1992
* 5,448,638 Security apparatus and system for retail environments 34 1994
 
FCA US LLC (1)
* 5,787,367 Flash reprogramming security for vehicle computer 50 1996
 
PROTEGRITY CORPORATION (3)
* 2007/0067,637 Method and a system for preventing impersonation of a database user 13 2006
8,443,426 Method and system for preventing impersonation of a computer system user 1 2008
8,402,281 Data security system for a database 4 2010
 
U.S. DEPARTMENT OF ENERGY (1)
* 5,299,262 Method for exponentiating in cryptographic systems 34 1992
 
SCHLAGE LOCK COMPANY (1)
* 4,837,822 Cryptographic based electronic lock system and method of operation 49 1986
 
CHANG, CHUNG NAN (2)
* 5,583,939 Secure, swift cryptographic key exchange 28 1995
* 5,835,592 Secure, swift cryptographic key exchange 55 1995
 
Uponus Technologies, LLC (2)
7,382,878 System and method for data encryption 4 2001
* 2003/0016,820 System and method for data encryption 3 2001
 
Scott A. Moskowitz (1)
* 2007/0011,458 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 27 2006
 
CANON KABUSHIKI KAISHA (1)
* 2002/0083,114 Obtaining temporary exclusive control of a printing device 10 2000
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (21)
* 4,736,423 Technique for reducing RSA Crypto variable storage 51 1986
* 5,163,096 Storage protection utilizing public storage key control 95 1991
* 5,926,551 System and method for certifying content of hard-copy documents 24 1995
* 5,737,425 Cryptosystem employing worst-case difficult-to solve lattice problem 4 1996
* 5,953,420 Method and apparatus for establishing an authenticated shared secret value between a pair of users 83 1996
6,560,337 Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key 8 1998
6,363,154 Decentralized systems methods and computer program products for sending secure messages among a group of nodes 64 1998
7,269,564 Method and apparatus to indicate an encoding status for digital content 36 1998
6,345,256 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content 538 1998
6,959,288 Digital content preparation system 122 1999
6,834,110 Multi-tier digital TV programming for content distribution 121 1999
7,213,005 Digital content distribution using web broadcasting services 146 2000
* 2003/0135,464 Digital content distribution using web broadcasting services 117 2000
6,978,375 System and method for secure authentication of external software modules provided by third parties 3 2000
7,500,109 System and method for secure authentication of external software modules provided by third parties 0 2005
* 2005/0216,422 System and method for secure authentication of external software modules provided by third parties 2 2005
7,487,128 Updating usage conditions in lieu of download digital rights management protected content 22 2005
* 2006/0089,912 Updating usage conditions in lieu of download digital rights management protected content 59 2005
7,277,870 Digital content distribution using web broadcasting services 97 2005
* 2006/0053,077 Digital content distribution using web broadcasting services 43 2005
7,590,866 Super-distribution of protected digital content 13 2005
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (3)
* 5,568,554 Method for improving the processing and storage performance of digital signature schemes 66 1995
* 5,999,624 Remote financial transaction system 272 1996
* 5,848,159 Public key cryptographic apparatus and method 62 1997
 
LEAR CORPORATION EEDS AND INTERIORS (7)
* 5,377,270 Cryptographic authentication of transmitted messages using pseudorandom numbers 49 1993
* 5,363,448 Pseudorandom number generation and cryptographic authentication 160 1993
* 5,398,284 Cryptographic encoding process 30 1993
* 5,369,706 Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code 72 1993
* 5,757,923 Method of generating secret identification numbers 156 1996
* RE36181 Pseudorandom number generation and crytographic authentication 24 1996
* RE36752 Cryptographic authentication of transmitted messages using pseudorandom numbers 11 1996
 
WISTARIA TRADING LTD (114)
* 5,613,004 Steganographic method and device 745 1995
* 5,822,432 Method for human-assisted random key generation and application for digital watermark system 343 1996
7,362,775 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 61 1996
* 5,889,868 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 455 1996
* 5,687,236 Steganographic method and device 524 1996
7,568,100 Steganographic method and device 61 1997
6,598,162 Method for combining transfer functions with predetermined key creation 131 1998
* 5,905,800 Method and system for digital watermarking 481 1998
6,205,249 Multiple transform utilization and applications for secure digital watermarking 227 1998
6,522,767 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 216 1999
7,007,166 Method and system for digital watermarking 145 2000
7,035,409 Multiple transform utilization and applications for secure digital watermarking 52 2000
7,107,451 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 84 2001
* 2001/0029,580 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 31 2001
7,095,874 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 75 2003
7,287,275 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 80 2003
* 2003/0200,439 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 18 2003
7,664,263 Method for combining transfer functions with predetermined key creation 52 2003
* 2004/0086,119 Method for combining transfer functions with predetermined key creation 57 2003
* 2004/0243,540 Method and device for monitoring and analyzing signals 64 2004
7,152,162 Z-transform implementation of digital watermarks 58 2004
* 2005/0135,615 Z-transform implementation of digital watermarks 26 2004
7,761,712 Steganographic method and device 51 2005
* 2005/0177,727 Steganographic method and device 62 2005
7,343,492 Method and system for digital watermarking 66 2005
* 2006/0101,269 Method and system for digital watermarking 30 2005
7,738,659 Multiple transform utilization and application for secure digital watermarking 6 2006
* 2006/0140,403 Multiple transform utilization and application for secure digital watermarking 52 2006
7,409,073 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 62 2006
* 2006/0285,722 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 28 2006
7,457,962 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 57 2006
8,538,011 Systems, methods and devices for trusted transactions 2 2006
* 2007/0028,113 Systems, methods and devices for trusted transactions 64 2006
8,271,795 Security based on subliminal and supraliminal channels for data objects 0 2006
* 2008/0028,222 Security based on subliminal and supraliminal channels for data objects 52 2006
7,664,264 Utilizing data reduction in steganographic and cryptographic systems 5 2006
* 2007/0064,940 Utilizing data reduction in steganographic and cryptographic systems 60 2006
7,730,317 Linear predictive coding implementation of digital watermarks 5 2006
7,930,545 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 4 2006
7,647,502 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 52 2006
7,532,725 Systems and methods for permitting open access to data objects and for securing data within the data objects 52 2006
* 2007/0110,240 System and methods for permitting open access to data objects and for securing data within the data objects 60 2006
7,779,261 Method and system for digital watermarking 55 2007
* 2007/0113,094 Method and system for digital watermarking 58 2007
8,046,841 Steganographic method and device 4 2007
7,870,393 Steganographic method and device 7 2007
* 2007/0294,536 Steganographic method and device 51 2007
9,104,842 Data protection method and device 0 2007
* 2008/0016,365 Data protection method and device 54 2007
7,664,958 Optimization methods for the insertion, protection and detection of digital watermarks in digital data 6 2007
* 2008/0022,113 Optimization methods for the insertion, protection and detection of digital of digital watermarks in digital data 54 2007
7,822,197 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2007
7,647,503 Optimization methods for the insertion, projection, and detection of digital watermarks in digital data 53 2007
* 2008/0022,114 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 58 2007
8,224,705 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2007
7,530,102 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 67 2007
7,770,017 Method and system for digital watermarking 6 2007
7,830,915 Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments 4 2008
* 2008/0151,934 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 50 2008
7,844,074 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 12 2008
* 2010/0002,904 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 49 2008
7,987,371 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2008
* 2009/0037,740 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 51 2008
8,171,561 Secure personal content server 7 2008
8,104,079 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 1 2009
* 2009/0210,711 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 55 2009
8,238,553 Steganographic method and device 1 2009
7,813,506 System and methods for permitting open access to data objects and for securing data within the data objects 0 2009
* 2009/0220,074 Steganographic method and device 51 2009
* 2009/0190,754 System and methods for permitting open access to data objects and for securing data within the data objects 51 2009
7,953,981 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 3 2009
* 2010/0005,308 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 49 2009
7,877,609 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 0 2009
* 2010/0064,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 49 2009
8,281,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 4 2009
* 2010/0077,220 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 47 2009
8,265,276 Method for combining transfer functions and predetermined key creation 0 2009
8,160,249 Utilizing data reduction in steganographic and cryptographic system 2 2009
* 2010/0153,734 Utilizing data reduction in steganographic and cryptographic system 51 2009
* 2010/0098,251 Method for combining transfer functions and predetermined key creation 48 2009
8,225,099 Linear predictive coding implementation of digital watermarks 0 2010
* 2010/0202,607 Linear predictive coding implementation of digital watermarks 47 2010
8,542,831 Multiple transform utilization and application for secure digital watermarking 0 2010
* 2010/0220,861 Multiple transform utilization and application for secure digital watermarking 47 2010
8,467,525 Steganographic method and device 4 2010
8,307,213 Method and system for digital watermarking 17 2010
8,161,286 Method and system for digital watermarking 17 2010
* 2011/0010,555 Method and system for digital watermarking 2 2010
8,265,278 System and methods for permitting open access to data objects and for securing data within the data objects 15 2010
8,774,216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management 0 2010
* 2011/0019,691 EXCHANGE MECHANISMS FOR DIGITAL INFORMATION PACKAGES WITH BANDWIDTH SECURITIZATION, MULTICHANNEL DIGITAL WATERMARKS, AND KEY MANAGEMENT 14 2010
8,121,343 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 14 2010
8,549,305 Steganographic method and device 0 2010
* 2011/0069,864 STEGANOGRAPHIC METHOD AND DEVICE 14 2010
8,175,330 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data 2 2011
8,473,746 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2011
8,739,295 Secure personal content server 0 2012
8,526,611 Utilizing data reduction in steganographic and cryptographic systems 1 2012
8,612,765 Security based on subliminal and supraliminal channels for data objects 0 2012
RE44307 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
RE44222 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,706,570 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth 0 2012
8,930,719 Data protection method and device 1 2012
8,767,962 System and methods for permitting open access to data objects and for securing data within the data objects 0 2012
9,021,602 Data protection method and device 0 2013
8,798,268 System and methods for permitting open access to data objects and for securing data within the data objects 0 2013
9,070,151 Systems, methods and devices for trusted transactions 0 2013
8,789,201 Secure personal content server 0 2013
8,781,121 Utilizing data reduction in steganographic and cryptographic systems 0 2013
9,191,205 Multiple transform utilization and application for secure digital watermarking 0 2014
9,191,206 Multiple transform utilization and application for secure digital watermarking 0 2014
9,270,859 Utilizing data reduction in steganographic and cryptographic systems 0 2014
9,258,116 System and methods for permitting open access to data objects and for securing data within the data objects 0 2014
9,171,136 Data protection method and device 0 2014
 
FUJITSU LIMITED (1)
* 5,313,521 Key distribution protocol for file transfer in the local area network 104 1992
 
SUN MICROSYSTEMS, INC. (2)
* 5,371,794 Method and apparatus for privacy and authentication in wireless networks 379 1993
* RE36946 Method and apparatus for privacy and authentication in wireless networks 84 1996
 
MOTOROLA, INC. (1)
* 4,827,507 Duplex analog scrambler 20 1987
 
FIRST DATA CORPORATION (63)
6,820,202 Account authority digital signature (AADS) system 96 1998
8,620,814 Three party account authority digital signature (AADS) system 0 2001
* 2002/0112,160 Three Party Account Authority Digital Signature (AADS) System 26 2001
7,558,965 Entity authentication in electronic communications by providing verification status of device 41 2001
7,552,333 Trusted authentication digital signature (tads) system 26 2001
7,500,272 Manufacturing unique devices that generate digital signatures 14 2001
7,200,749 Method and system for using electronic communications for an electronic contract 27 2001
7,047,416 Account-based digital signature (ABDS) system 23 2001
6,983,368 Linking public key of device to information during manufacture 10 2001
6,978,369 Person-centric account-based digital signature system 102 2001
* 2002/0026,575 Account-based digital signature (ABDS) system 72 2001
* 2002/0023,217 Manufacturing unique devices that generate digital signatures 38 2001
* 2002/0016,913 Modifying message data and generating random number digital signature within computer chip 35 2001
6,981,154 Account authority digital signature (AADS) accounts 12 2001
6,820,199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system 25 2002
* 2003/0177,361 Method and system for using electronic communications for an electronic contract 18 2002
7,010,691 ABDS system utilizing security information in authenticating entity access 21 2003
6,950,940 ABDS method utilizing security information in authenticating entity access 40 2003
6,938,156 ABDS system and verification status for authenticating entity access 91 2003
6,851,054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource 72 2003
* 2003/0131,235 ABDS Method Utilizing Security Information in Authenticating Entity Access 4 2003
* 2003/0131,234 Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource 0 2003
* 2003/0126,439 ABDS System Utilizing Security Information in Authenticating Entity Access 1 2003
7,096,354 Central key authority database in an ABDS system 65 2003
7,082,533 Gauging risk in electronic communications regarding accounts in ABDS system 9 2003
7,047,414 Managing database for reliably identifying information of device generating digital signatures 39 2003
7,028,185 Managing database for identifying to recipients security features of devices generating digital signatures 23 2003
6,959,381 Central key authority (CKA) database for user accounts in ABDS system 25 2003
6,957,336 Establishing initial PuK-linked account database 13 2003
6,952,773 Requesting execution of instructions on accounts in ABDS system 11 2003
6,915,430 Reliably identifying information of device generating digital signatures 17 2003
6,892,302 Incorporating security certificate during manufacture of device generating digital signatures 17 2003
6,789,189 Managing account database in ABDS system 37 2003
* 2003/0115,463 Requesting Execution of Instructions on Accounts in ABDS System 4 2003
* 2003/0101,344 Establishing Initial PuK-Linked Account Database 15 2003
* 2003/0097,562 Managing Database for Reliably Identifying Information of Device Generating Digital Signatures 2 2003
* 2003/0097,561 Gauging Risk in Electronic Communications Regarding Accounts in ABDS System 1 2003
* 2003/0097,573 Central Key Authority Database in an ABDS System 8 2003
* 2004/0128,508 Method and apparatus for access authentication entity 32 2003
* 2004/0030,901 Linking public key of device to information during manufacture 8 2003
* 2004/0005,051 Entity authentication in eletronic communications by providing verification status of device 35 2003
* 2003/0115,151 Person-centric account-based digital signature system 16 2003
7,257,228 Account authority digital signature (AADS) system using encoded information 12 2004
* 2005/0044,373 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM USING ENCODED INFORMATION 1 2004
7,549,050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system 1 2004
7,519,821 Account authority digital signature (AADS) system 1 2004
* 2005/0005,123 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM 11 2004
7,936,869 Verifying digital signature based on shared knowledge 1 2005
7,869,593 Software for providing based on shared knowledge public keys having same private key 3 2005
7,693,277 Generating digital signatures using ephemeral cryptographic key 0 2005
7,593,527 Providing digital signature and public key based on shared knowledge 7 2005
7,490,239 Facilitating digital signature based on ephemeral private key 4 2005
* 2006/0156,013 DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM 2 2005
* 2006/0156,012 FACILITATING DIGITAL SIGNATURE BASED ON EPHEMERAL PRIVATE KEY 1 2005
* 2006/0153,370 GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA 10 2005
* 2006/0153,366 VERIFYING DIGITAL SIGNATURE BASED ON SHARED KNOWLEDGE 3 2005
* 2006/0153,371 GENERATING DIGITAL SIGNATURES USING EPHEMERAL CRYPTOGRAPHIC KEY 3 2005
* 2006/0153,365 PROVIDING DIGITAL SIGNATURE AND PUBLIC KEY BASED ON SHARED KNOWLEDGE 2 2005
* 2006/0153,368 SOFTWARE FOR PROVIDING BASED ON SHARED KNOWLEDGE PUBLIC KEYS HAVING SAME PRIVATE KEY 19 2005
* 2006/0153,364 ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGE 10 2005
* 2006/0153,367 DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGE 2 2005
7,784,106 Manufacturing unique devices that generate digital signatures 3 2009
* 2009/0158,029 MANUFACTURING UNIQUE DEVICES THAT GENERATE DIGITAL SIGNATURES 4 2009
 
MAXIM INTEGRATED PRODUCTS, INC. (1)
* 6,064,740 Method and apparatus for masking modulo exponentiation calculations in an integrated circuit 50 1997
 
OMNET ASSOCIATES A CA PARTNERSHIP (1)
* 4,567,600 Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission 62 1982
 
NATIONAL SEMICONDUCTOR CORPORATION (1)
* 6,097,307 Security system with randomized synchronization code 7 1997
 
EMC CORPORATION (7)
7,716,484 System and method for increasing the security of encrypted secrets and authentication 21 2001
* 2010/0100,724 SYSTEM AND METHOD FOR INCREASING THE SECURITY OF ENCRYPTED SECRETS AND AUTHENTICATION 38 2001
7,359,507 Server-assisted regeneration of a strong secret from a weak secret 146 2001
8,060,750 Secure seed provisioning 3 2007
* 2009/0006,858 Secure seed provisioning 4 2007
8,059,814 Techniques for carrying out seed or key derivation 8 2007
8,307,210 Method and apparatus for secure validation of tokens 2 2008
 
KOREA INFORMATION SECURITY AGENT (1)
* 2003/0012,386 Forward-secure commercial key escrow systems and escrowing methods thereof 34 2001
 
INTEL CORPORATION (1)
6,253,323 Object-based digital signatures 31 1996
 
Sync Up Technologies Corporation (1)
9,002,018 Encryption key exchange system and method 10 2011
 
Blue Spike, LLC (8)
* 5,745,569 Method for stega-cipher protection of computer code 387 1996
7,346,472 Method and device for monitoring and analyzing signals 148 2000
7,660,700 Method and device for monitoring and analyzing signals 77 2007
* 2008/0109,417 Method and device for monitoring and analyzing signals 51 2007
7,949,494 Method and device for monitoring and analyzing signals 72 2009
* 2010/0106,736 Method and device for monitoring and analyzing signals 47 2009
8,214,175 Method and device for monitoring and analyzing signals 87 2011
8,712,728 Method and device for monitoring and analyzing signals 0 2013
 
GRUMMAN CORPORATION (1)
* 5,054,066 Error correcting public key cryptographic method and program 61 1988
 
UT AUTOMOTIVE DEARBORN, INC. (2)
* 5,646,996 Automatic resynchronization of transmitter in the event of corrupted memory 12 1995
* 5,696,828 Random number generating system and process based on chaos 110 1995
 
MICROSOFT CORPORATION (2)
7,809,767 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 0 2003
7,565,275 Model and system state synchronization 0 2005
 
ALGORITHMIC RESEARCH LTD. (1)
* 4,964,164 RSA computation method for efficient batch processing 37 1989
 
GENWORTH HOLDINGS, INC. (1)
7,155,578 Method and system for transferring files using file transfer protocol 2 2002
 
NCR CORPORATION (2)
* 4,944,007 Public key diversification method 34 1989
* 4,935,962 Method and system for authentication 161 1989
 
HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP (7)
* 5,675,649 Process for cryptographic key generation and safekeeping 64 1995
7,231,040 Multiprime RSA public key cryptosystem 2 1998
* RE40530 Public key cryptographic apparatus and method 0 2000
7,120,248 Multiple prime number generation using a parallel prime number search algorithm 4 2001
7,016,494 Multiple cryptographic key precompute and store 6 2001
* 2005/0190,912 MULTIPLE CRYPTOGRAPHIC KEY PRECOMPUTE AND STORE 19 2001
* 2002/0186,837 Multiple prime number generation using a parallel prime number search algorithm 1 2001
 
Micron Technology, Inc. (1)
* 4,658,094 Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer 31 1985
 
KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS (19)
8,184,803 Hash functions using elliptic curve cryptography 2 2008
8,139,765 Elliptical polynomial-based message authentication code 6 2008
* 2010/0166,176 Elliptical polynomial-based message authentication code 7 2008
8,165,287 Cryptographic hash functions using elliptic polynomial cryptography 1 2008
* 2010/0169,658 Elliptic curve-based message authentication code 6 2008
* 2010/0166,175 Cryptographic hash functions using elliptic polynomial cryptography 9 2008
8,170,203 Message authentication code with elliptic polynomial hopping 2 2008
* 2010/0169,644 Message authentication code with elliptic polynomial hopping 8 2008
8,189,771 Hash functions with elliptic polynomial hopping 1 2009
8,385,541 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping 0 2010
8,351,601 Elliptic polynomial cryptography with secret key embedding 0 2010
8,331,558 Method of cipher block chaining using elliptic curve cryptography 0 2010
8,332,651 Method of generating a password protocol using elliptic polynomial cryptography 0 2010
8,189,775 Method of performing cipher block chaining using elliptic polynomial cryptography 0 2010
* 2011/0200,187 Elliptic polynomial cryptography with secret key embedding 6 2010
* 2011/0200,186 Method of cipher block chaining using elliptic curve cryptography 2 2010
* 2011/0200,185 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping 8 2010
8,509,426 XZ-elliptic curve cryptography system and method 0 2010
8,705,740 Elliptic curve-based message authentication code system and method 0 2012
 
NEOPOST TECHNOLOGIES (1)
* 6,041,317 Postal security device incorporating periodic and automatic self implementation of public/private key pair 27 1997
 
FRAUD CONTROL SYSTEMS.COM CORPORATION (6)
8,630,942 Method of billing a purchase made over a computer network 0 2008
8,229,844 Method of billing a purchase made over a computer network 5 2008
8,190,513 Method of billing a purchase made over a computer network 4 2008
* 2009/0055,315 Method Of Billing A Purchase Made Over A Computer Network 13 2008
* 2009/0048,975 Method Of Billing A Purchase Made Over A Computer Network 12 2008
* 2009/0049,529 Method Of Billing A Purchase Made Over A Computer Network 13 2008
 
King Fahd University (1)
8,699,701 Method of performing XZ-elliptic curve cryptography for use with network security protocols 0 2010
 
VAN DETSAN NETWORKS LIMITED LIABILITY COMPANY (3)
* 4,759,063 Blind signature systems 196 1983
* 4,991,210 Unpredictable blind signature systems 81 1989
* 4,996,711 Selected-exponent signature systems 118 1989
 
CONTENTGUARD HOLDINGS, INC. (4)
* 8,275,716 Method and system for subscription digital rights management 2 2002
* 2002/0198,846 Method and system for subscription digital rights management 52 2002
8,468,098 Method and system for subscription digital rights management 0 2012
* 2012/0317,654 METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT 0 2012
 
AT&T Bell Laboratories (1)
* 5,353,351 Secure teleconferencing 78 1992
 
ENTEGRITY SOLUTIONS CORPORATION (1)
* 5,745,574 Security infrastructure for electronic transactions 227 1995
 
HELLMAN, MARTIN (1)
* 5,872,917 Authentication using random challenges 62 1997
 
JPMORGAN CHASE BANK, N.A. (2)
7,899,753 Systems and methods for time variable financial authentication 7 2003
9,240,089 Systems and methods for time variable financial authentication 0 2009
 
MICROSOFT TECHNOLOGY LICENSING, LLC (54)
7,606,898 System and method for distributed management of shared computers 10 2000
* 2004/0210,623 Virtual network topology generation 74 2003
7,636,917 Network load balancing with host status information 23 2003
7,613,822 Network load balancing with session information 33 2003
7,590,736 Flexible network load balancing 34 2003
* 2004/0267,920 Flexible network load balancing 101 2003
* 2004/0268,358 Network load balancing with host status information 150 2003
7,606,929 Network load balancing with connection manipulation 7 2003
7,567,504 Network load balancing with traffic routing 42 2003
* 2005/0055,435 Network load balancing with connection manipulation 86 2003
8,122,106 Integrating design, deployment, and management phases for systems 6 2003
7,890,543 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 28 2003
7,289,629 Primitives for fast secure hash functions and stream ciphers 1 2004
* 2005/0175,176 Primitives for fast secure hash functions and stream ciphers 1 2004
* 7,778,422 Security associations for devices 6 2004
7,497,379 Counterfeit and tamper resistant labels with randomly occurring features 27 2004
* 2005/0190,914 Counterfeit and tamper resistant labels with randomly occurring features 24 2004
7,886,041 Design time validation of systems 42 2004
* 2004/0193,388 Design time validation of systems 50 2004
7,577,844 Systems and methods for encoding randomly distributed features in an object 19 2004
* 2005/0246,529 Isolated persistent identity storage for authentication of computing devies 47 2004
7,669,235 Secure domain join for computing devices 5 2004
7,305,549 Filters to isolate untrusted ports of switches 30 2004
7,305,561 Establishing computing trust with a staging area 38 2004
7,336,806 Iris-based biometric identification 22 2004
7,711,121 System and method for distributed management of shared computers 0 2004
* 2005/0091,078 System and method for distributed management of shared computers 29 2004
7,739,380 System and method for distributed management of shared computers 1 2004
* 2005/0097,097 System and method for distributed management of shared computers 33 2004
* 2005/0125,212 System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model 48 2004
7,792,931 Model-based system provisioning 6 2005
8,489,728 Model-based system monitoring 3 2005
7,802,144 Model-based system monitoring 28 2005
7,797,147 Model-based system monitoring 4 2005
8,549,513 Model-based virtual system provisioning 7 2005
7,890,951 Model-based provisioning of test environments 34 2005
* 2007/0016,393 Model-based propagation of attributes 3 2005
* 2007/0006,218 Model-based virtual system provisioning 33 2005
* 2006/0037,002 Model-based provisioning of test environments 38 2005
* 2006/0025,985 Model-Based system management 108 2005
7,684,964 Model and system state synchronization 4 2005
7,941,309 Modeling IT operations/policies 2 2005
7,630,877 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 55 2005
* 2006/0271,341 Architecture for distributed computing system and automated design, deployment, and management of distributed applications 55 2005
7,574,343 System and method for logical modeling of distributed computer systems 7 2006
7,689,676 Model-based policy application 17 2007
* 2008/0059,214 Model-Based Policy Application 38 2007
8,127,133 Labeling of data objects to apply and enforce policies 1 2007
* 2008/0184,329 LABELING OF DATA OBJECTS TO APPLY AND ENFORCE POLICIES 5 2007
* 2008/0288,622 Managing Server Farms 2 2007
7,444,007 Iris-based biometric identification 9 2007
* 2008/0025,575 Iris-Based Biometric Identification 7 2007
7,878,398 Counterfeit and tamper resistant labels with randomly occurring features 3 2009
9,317,270 Model-based virtual system provisioning 0 2013
 
FUJITSU SIEMENS COMPUTERS GMBH (1)
* 5,323,146 Method for authenticating the user of a data station connected to a computer system 46 1992
 
Wisteria Trading, Inc. (1)
7,991,188 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data 4 2007
 
GOOGLE INC. (2)
7,320,073 Secure method for roaming keys and certificates 12 2003
* 2004/0199,774 Secure method for roaming keys and certificates 2 2003
 
THE TRUSTEES OF PRINCETON UNIVERSITY (1)
* 2004/0250,073 Protocol for hybrid authenticated key establishment 7 2003
 
GENWORTH FINANCIAL, INC. (1)
* 2004/0133,699 System and method for performing data transfer 1 2002
 
CROWLEY, JOHN J. (1)
* 5,375,169 Cryptographic key management method and apparatus 123 1993
 
KEYBYTE TECHNOLOGIES, INC. (1)
* 6,011,847 Cryptographic access and labeling system 78 1995
 
GENERAL ELECTRIC COMPANY (2)
* 5,204,901 Public key cryptographic mechanism 22 1991
* 5,239,584 Method and apparatus for encryption/authentication of data in energy metering applications 60 1991
 
VERIZON PATENT AND LICENSING INC. (7)
* 5,557,678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 148 1994
* 5,588,061 System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 50 1994
* 5,535,276 Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography 362 1994
* 5,748,735 Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography 137 1996
* 5,737,419 Computer system for securing communications using split private key asymmetric cryptography 107 1996
* 5,838,792 Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem 85 1996
* 5,905,799 Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem 28 1996
 
PREMINOS CORPORATION (1)
* 5,812,669 Method and system for providing secure EDI over an open network 99 1995
 
THOMSON LICENSING (2)
* 7,545,932 Secure authenticated channel 4 2004
* 2006/0093,138 Secure authenticated channel 18 2004
 
COMCAST CABLE COMMUNICATIONS, LLC (3)
* 5,787,172 Apparatus and method for establishing a cryptographic link between elements of a system 229 1994
* 6,148,400 Apparatus and method for establishing a crytographic link between elements of a system 40 1998
6,456,716 Apparatus and method for establishing a crytographic link between elements of a system 19 2000
 
ERICSSON INC. (1)
* 5,499,295 Method and apparatus for feature authorization and software copy protection in RF communications devices 147 1993
 
DIGITAL RIVER, INC. (14)
* 5,903,647 Self-launching encrypted digital information distribution system 63 1995
* 5,883,954 Self-launching encrypted try before you buy software distribution system 60 1995
* 5,883,955 On-line try before you buy software distribution system 140 1995
* 5,870,543 System for preventing unauthorized copying of active software 88 1997
* 5,907,617 Try before you buy software distribution and marketing system 94 1997
* 5,887,060 Central database system for automatic software program sales 36 1997
7,058,597 Apparatus and method for adaptive fraud screening for electronic commerce transactions 14 1999
7,617,124 Apparatus and method for secure downloading of files 4 2000
7,165,051 Electronic commerce system and method for detecting fraud 79 2005
* 2005/0154,676 Electronic commerce system method for detecting fraud 17 2005
8,271,396 Electronic commerce system and method for detecting fraud 2 2006
7,881,972 Electronic commerce system and method for detecting fraud 1 2006
8,050,980 Secure downloading of a file from a network system and method 1 2009
* 2010/0017,417 Secure Downloading of a File from a Network System and Method 1 2009
 
UNIKEN INC. (4)
7,949,867 Secure communications 4 2006
* 2008/0022,091 Secure Communications 0 2006
7,949,869 Establishing relative identity 3 2010
* 2010/0119,063 Establishing Relative Identity 1 2010
 
CORIANT OY (2)
* 6,422,461 Method and system for ensuring connection of a module to an electronic apparatus 0 1999
* 6,739,504 Method and system for ensuring connection of a module to an electronic apparatus 0 2002
 
The Boeing Company (1)
* 2008/0304,669 RECIPIENT-SIGNED ENCRYPTION CERTIFICATES FOR A PUBLIC KEY INFRASTRUCTURE 7 2007
 
PREVIEW SOFTWARE (1)
* 4,658,093 Software distribution system 847 1983
 
NEXT SOFTWARE, INC. (2)
* 5,159,632 Method and apparatus for public key exchange in a cryptographic system 128 1991
* 5,271,061 Method and apparatus for public key exchange in a cryptographic system 87 1992
 
WISTRON CORPORATION (5)
6,574,609 Secure electronic content management system 322 1998
6,389,538 System for tracking end-user electronic content usage 527 1998
6,611,812 Secure electronic content distribution on CDS and DVDs 286 1999
6,389,403 Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system 198 1999
6,983,371 Super-distribution of protected digital content 161 2000
 
Tecsec, Inc. (12)
* 5,369,707 Secure network method and apparatus 200 1993
* 5,369,702 Distributed cryptographic object method 242 1993
* 5,717,755 Distributed cryptographic object method 69 1994
* 5,680,452 Distributed cryptographic object method 117 1995
* 5,898,781 Distributed cryptographic object method 65 1997
6,694,433 XML encryption scheme 18 1999
7,095,852 Cryptographic key split binder for use with tagged data elements 65 2001
* 2004/0208,316 Cryptographic key split binder for use with tagged data elements 5 2001
7,079,653 Cryptographic key split binding process and apparatus 16 2002
* 2003/0039,358 Cryptographic key split binding process and apparatus 5 2002
8,077,870 Cryptographic key split binder for use with tagged data elements 7 2010
8,712,046 Cryptographic key split combiner 0 2012
 
E-CONTACT TECHNOLOGIES LLC (1)
* 5,189,700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents 109 1991
 
SAFENET, INC. (2)
* 4,891,781 Modulo arithmetic processor chip 32 1988
* 5,210,710 Modulo arithmetic processor chip 32 1990
 
MATSUSHITA ELECTRIC INDUSTRIAL CO., LTD. (4)
* 5,124,117 Cryptographic key distribution method and system 90 1991
* 5,272,755 Public key cryptosystem with an elliptic curve 104 1992
* 5,351,297 Method of privacy communication using elliptic curves 48 1993
* 5,442,707 Method for generating and verifying electronic signatures and privacy communication using elliptic curves 95 1993
 
STEVEN M. HOFFBERG 2004-1 GRAT (3)
8,369,967 Alarm system controller and a method for controlling an alarm system 13 2011
8,364,136 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system 23 2011
8,892,495 Adaptive pattern recognition based controller apparatus and method and human-interface therefore 0 2013
 
UNIVERSITY OF SOUTHERN CALIFORNIA (1)
* 7,280,663 Encryption system based on crossed inverse quasigroups 3 2000
 
PHILIPS ELECTRONICS NORTH AMERICA CORPORATION (1)
* 6,141,422 Secure cryptographic multi-exponentiation method and coprocessor subsystem 13 1997
 
AT&T CORP. (1)
* 6,058,187 Secure telecommunications data transmission 59 1997
* Cited By Examiner