US7921288B1
(en)
|
2001-12-12 |
2011-04-05 |
Hildebrand Hal S |
System and method for providing different levels of key security for controlling access to secured items
|
US10033700B2
(en)
|
2001-12-12 |
2018-07-24 |
Intellectual Ventures I Llc |
Dynamic evaluation of access rights
|
US10360545B2
(en)
|
2001-12-12 |
2019-07-23 |
Guardian Data Storage, Llc |
Method and apparatus for accessing secured electronic data off-line
|
US7178033B1
(en)
|
2001-12-12 |
2007-02-13 |
Pss Systems, Inc. |
Method and apparatus for securing digital assets
|
US7260555B2
(en)
|
2001-12-12 |
2007-08-21 |
Guardian Data Storage, Llc |
Method and architecture for providing pervasive security to digital assets
|
US7380120B1
(en)
|
2001-12-12 |
2008-05-27 |
Guardian Data Storage, Llc |
Secured data format for access control
|
US7921284B1
(en)
|
2001-12-12 |
2011-04-05 |
Gary Mark Kinghorn |
Method and system for protecting electronic data in enterprise environment
|
US7921450B1
(en)
*
|
2001-12-12 |
2011-04-05 |
Klimenty Vainstein |
Security system using indirect key generation from access rules and methods therefor
|
US7565683B1
(en)
|
2001-12-12 |
2009-07-21 |
Weiqing Huang |
Method and system for implementing changes to security policies in a distributed security system
|
US8006280B1
(en)
|
2001-12-12 |
2011-08-23 |
Hildebrand Hal S |
Security system for generating keys from access rules in a decentralized manner and methods therefor
|
US7930756B1
(en)
|
2001-12-12 |
2011-04-19 |
Crocker Steven Toye |
Multi-level cryptographic transformations for securing digital assets
|
US8065713B1
(en)
|
2001-12-12 |
2011-11-22 |
Klimenty Vainstein |
System and method for providing multi-location access management to secured items
|
US7950066B1
(en)
|
2001-12-21 |
2011-05-24 |
Guardian Data Storage, Llc |
Method and system for restricting use of a clipboard application
|
US8176334B2
(en)
|
2002-09-30 |
2012-05-08 |
Guardian Data Storage, Llc |
Document security system that permits external users to gain access to secured files
|
US7003117B2
(en)
*
|
2003-02-05 |
2006-02-21 |
Voltage Security, Inc. |
Identity-based encryption system for secure data distribution
|
US7380138B2
(en)
*
|
2003-04-23 |
2008-05-27 |
Hewlett-Packard Development Company, L.P. |
Cryptographic method and apparatus
|
DE602004001273T2
(en)
*
|
2003-04-23 |
2007-05-31 |
Hewlett-Packard Development Co., L.P., Houston |
Method and device for identification-based encryption
|
US20050021973A1
(en)
*
|
2003-04-23 |
2005-01-27 |
Liqun Chen |
Cryptographic method and apparatus
|
US8707034B1
(en)
|
2003-05-30 |
2014-04-22 |
Intellectual Ventures I Llc |
Method and system for using remote headers to secure electronic files
|
US8127366B2
(en)
|
2003-09-30 |
2012-02-28 |
Guardian Data Storage, Llc |
Method and apparatus for transitioning between states of security policies used to secure electronic documents
|
US7703140B2
(en)
|
2003-09-30 |
2010-04-20 |
Guardian Data Storage, Llc |
Method and system for securing digital assets using process-driven security policies
|
US9240884B2
(en)
*
|
2003-10-28 |
2016-01-19 |
Certicom Corp. |
Method and apparatus for verifiable generation of public keys
|
JP4059321B2
(en)
*
|
2003-10-30 |
2008-03-12 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
Personal information management system, information processing system, personal information management method, program, and recording medium
|
US8176127B2
(en)
*
|
2004-07-30 |
2012-05-08 |
Pivot Solutions, Inc. |
System and method for processing securities trading instructions and communicating order status via a messaging interface
|
WO2006034428A2
(en)
*
|
2004-09-20 |
2006-03-30 |
Pgp Corporation |
Apparatus and method for identity-based encryption within a conventional public-key infrastructure
|
US20060129820A1
(en)
*
|
2004-12-09 |
2006-06-15 |
International Business Machines Corporation |
Object oriented program communication system with an object for sending a certification of the existence of events justifying response actions
|
CN1262087C
(en)
*
|
2005-01-14 |
2006-06-28 |
南相浩 |
Method and apparatus for cipher key generation based on identification
|
US7804959B2
(en)
*
|
2005-02-01 |
2010-09-28 |
Panasonic Corporation |
Digital cable television broadcasting receiver
|
US7634085B1
(en)
*
|
2005-03-25 |
2009-12-15 |
Voltage Security, Inc. |
Identity-based-encryption system with partial attribute matching
|
US20060238304A1
(en)
*
|
2005-04-21 |
2006-10-26 |
Sean Loving |
System and method for adapting an FRID tag reader to its environment
|
US7659819B2
(en)
*
|
2005-04-21 |
2010-02-09 |
Skyetek, Inc. |
RFID reader operating system and associated architecture
|
US7826619B2
(en)
*
|
2005-08-23 |
2010-11-02 |
Ntt Docomo, Inc. |
Key-updating method, encryption processing method, key-insulated cryptosystem and terminal device
|
US20070206786A1
(en)
*
|
2005-08-31 |
2007-09-06 |
Skyetek, Inc. |
Rfid security system
|
US20070071243A1
(en)
*
|
2005-09-23 |
2007-03-29 |
Microsoft Corporation |
Key validation service
|
US20070206797A1
(en)
*
|
2006-03-01 |
2007-09-06 |
Skyetek, Inc. |
Seamless rfid tag security system
|
US8510204B2
(en)
*
|
2006-02-02 |
2013-08-13 |
Privatemarkets, Inc. |
System, method, and apparatus for trading in a decentralized market
|
US8412947B2
(en)
*
|
2006-10-05 |
2013-04-02 |
Ceelox Patents, LLC |
System and method of secure encryption for electronic data transfer
|
US8200967B2
(en)
*
|
2006-10-18 |
2012-06-12 |
Rockstar Bidco Lp |
Method of configuring a node, related node and configuration server
|
US20080141372A1
(en)
*
|
2006-12-12 |
2008-06-12 |
Privacy Networks, Inc. |
Electronic Data Integrity Checking and Validation
|
US8627211B2
(en)
|
2007-03-30 |
2014-01-07 |
Uranus International Limited |
Method, apparatus, system, medium, and signals for supporting pointer display in a multiple-party communication
|
US7765261B2
(en)
*
|
2007-03-30 |
2010-07-27 |
Uranus International Limited |
Method, apparatus, system, medium and signals for supporting a multiple-party communication on a plurality of computer servers
|
US7765266B2
(en)
|
2007-03-30 |
2010-07-27 |
Uranus International Limited |
Method, apparatus, system, medium, and signals for publishing content created during a communication
|
US8060887B2
(en)
|
2007-03-30 |
2011-11-15 |
Uranus International Limited |
Method, apparatus, system, and medium for supporting multiple-party communications
|
US8702505B2
(en)
|
2007-03-30 |
2014-04-22 |
Uranus International Limited |
Method, apparatus, system, medium, and signals for supporting game piece movement in a multiple-party communication
|
US7950046B2
(en)
|
2007-03-30 |
2011-05-24 |
Uranus International Limited |
Method, apparatus, system, medium, and signals for intercepting a multiple-party communication
|
US20080263361A1
(en)
*
|
2007-04-20 |
2008-10-23 |
Microsoft Corporation |
Cryptographically strong key derivation using password, audio-visual and mental means
|
KR101490687B1
(en)
*
|
2007-08-20 |
2015-02-06 |
삼성전자주식회사 |
Method and apparatus for sharing secret information between devices in home network
|
US8700894B2
(en)
*
|
2007-10-17 |
2014-04-15 |
Pitney Bowes Inc. |
Method and system for securing routing information of a communication using identity-based encryption scheme
|
US8656177B2
(en)
*
|
2008-06-23 |
2014-02-18 |
Voltage Security, Inc. |
Identity-based-encryption system
|
US20090327735A1
(en)
*
|
2008-06-26 |
2009-12-31 |
Microsoft Corporation |
Unidirectional multi-use proxy re-signature process
|
US20110131409A1
(en)
*
|
2008-08-14 |
2011-06-02 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
|
US8850044B2
(en)
|
2008-08-14 |
2014-09-30 |
The Invention Science Fund I, Llc |
Obfuscating identity of a source entity affiliated with a communique in accordance with conditional directive provided by a receiving entity
|
US20100318595A1
(en)
*
|
2008-08-14 |
2010-12-16 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
System and method for conditionally transmitting one or more locum tenentes
|
US20110093806A1
(en)
*
|
2008-08-14 |
2011-04-21 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
Obfuscating reception of communiqué affiliated with a source entity
|
US20110110518A1
(en)
*
|
2008-08-14 |
2011-05-12 |
Searete Llc |
Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
|
US9659188B2
(en)
*
|
2008-08-14 |
2017-05-23 |
Invention Science Fund I, Llc |
Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving use
|
US8224907B2
(en)
*
|
2008-08-14 |
2012-07-17 |
The Invention Science Fund I, Llc |
System and method for transmitting illusory identification characteristics
|
US20110041185A1
(en)
*
|
2008-08-14 |
2011-02-17 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
Obfuscating identity of a source entity affiliated with a communiqué directed to a receiving user and in accordance with conditional directive provided by the receiving user
|
US20110166973A1
(en)
*
|
2008-08-14 |
2011-07-07 |
Searete Llc |
Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
|
US8730836B2
(en)
*
|
2008-08-14 |
2014-05-20 |
The Invention Science Fund I, Llc |
Conditionally intercepting data indicating one or more aspects of a communiqué to obfuscate the one or more aspects of the communiqué
|
US8929208B2
(en)
*
|
2008-08-14 |
2015-01-06 |
The Invention Science Fund I, Llc |
Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
|
US8583553B2
(en)
*
|
2008-08-14 |
2013-11-12 |
The Invention Science Fund I, Llc |
Conditionally obfuscating one or more secret entities with respect to one or more billing statements related to one or more communiqués addressed to the one or more secret entities
|
US20110161217A1
(en)
*
|
2008-08-14 |
2011-06-30 |
Searete Llc |
Conditionally obfuscating one or more secret entities with respect to one or more billing statements
|
US20110166972A1
(en)
*
|
2008-08-14 |
2011-07-07 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
Conditionally obfuscating one or more secret entities with respect to one or more billing statements
|
US8626848B2
(en)
*
|
2008-08-14 |
2014-01-07 |
The Invention Science Fund I, Llc |
Obfuscating identity of a source entity affiliated with a communiqué in accordance with conditional directive provided by a receiving entity
|
US20110107427A1
(en)
*
|
2008-08-14 |
2011-05-05 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
Obfuscating reception of communiqué affiliated with a source entity in response to receiving information indicating reception of the communiqué
|
US20100042667A1
(en)
*
|
2008-08-14 |
2010-02-18 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
System and method for transmitting illusory identification characteristics
|
US9641537B2
(en)
*
|
2008-08-14 |
2017-05-02 |
Invention Science Fund I, Llc |
Conditionally releasing a communiqué determined to be affiliated with a particular source entity in response to detecting occurrence of one or more environmental aspects
|
US20100039218A1
(en)
*
|
2008-08-14 |
2010-02-18 |
Searete Llc, A Limited Liability Corporation Of The State Of Delaware |
System and method for transmitting illusory and non-illusory identification characteristics
|
US20100043049A1
(en)
*
|
2008-08-15 |
2010-02-18 |
Carter Stephen R |
Identity and policy enabled collaboration
|
US8260865B2
(en)
|
2008-09-30 |
2012-09-04 |
Pivot Solutions, Inc. |
System and method for processing instant messages
|
US8510558B2
(en)
|
2009-02-17 |
2013-08-13 |
Alcatel Lucent |
Identity based authenticated key agreement protocol
|
US20100215033A1
(en)
*
|
2009-02-20 |
2010-08-26 |
Avaya Inc. |
Preferential routing of secured calls
|
US8837718B2
(en)
*
|
2009-03-27 |
2014-09-16 |
Microsoft Corporation |
User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store
|
US8510835B1
(en)
|
2009-09-18 |
2013-08-13 |
Trend Micro Incorporated |
Techniques for protecting data in cloud computing environments
|
US8826013B1
(en)
|
2009-09-23 |
2014-09-02 |
Trend Micro Incorporated |
Protection of customer data in cloud virtual machines using a central management server
|
US8488783B2
(en)
*
|
2010-02-19 |
2013-07-16 |
Nokia |
Method and apparatus for applying recipient criteria in identity-based encryption
|
US9025767B2
(en)
*
|
2010-03-24 |
2015-05-05 |
Nokia Corporation |
Method and apparatus for querying content protected by identity-based encryption
|
US8423764B2
(en)
*
|
2010-06-23 |
2013-04-16 |
Motorola Solutions, Inc. |
Method and apparatus for key revocation in an attribute-based encryption scheme
|
US8631460B2
(en)
*
|
2011-03-23 |
2014-01-14 |
CipherPoint Software, Inc. |
Systems and methods for implementing transparent encryption
|
TWI444030B
(en)
|
2011-06-21 |
2014-07-01 |
Univ Nat Chiao Tung |
Method for keys generation, member authentication and security communication in a dynamic group
|
US8892875B1
(en)
|
2011-07-29 |
2014-11-18 |
Trend Micro Incorporated |
Methods and apparatus for controlling access to encrypted computer files
|
CN102307096B
(en)
*
|
2011-08-26 |
2013-10-16 |
武汉理工大学 |
Data cryption system for Pseudo-Rivest, Shamir and Adleman (RSA)-key-based recently public key cryptography algorithm
|
EP2761804B1
(en)
|
2011-09-30 |
2019-07-24 |
eBay Inc. |
Differential client-side encryption of information originating from a client
|
CN107959732B
(en)
*
|
2011-11-11 |
2021-08-27 |
柏思科技有限公司 |
Method and system for allowing domain name to be used in enforcing network policy
|
US9065637B2
(en)
*
|
2012-01-25 |
2015-06-23 |
CertiVox Ltd. |
System and method for securing private keys issued from distributed private key generator (D-PKG) nodes
|
JP2013198123A
(en)
*
|
2012-03-22 |
2013-09-30 |
Toshiba Corp |
Access control system
|
KR101301609B1
(en)
*
|
2012-05-31 |
2013-08-29 |
서울대학교산학협력단 |
Apparatus and method for generating secret key, and recording medium storing program for executing method of the same in computer
|
US8959337B2
(en)
|
2012-06-25 |
2015-02-17 |
International Business Machines Corporation |
Digital certificate issuer-correlated digital signature verification
|
US9143383B2
(en)
*
|
2012-11-01 |
2015-09-22 |
Miiicasa Taiwan Inc. |
Method and system for managing device identification
|
US8763085B1
(en)
|
2012-12-19 |
2014-06-24 |
Trend Micro Incorporated |
Protection of remotely managed virtual machines
|
CN103078743B
(en)
*
|
2013-01-15 |
2015-07-08 |
武汉理工大学 |
E-mail IBE (Internet Booking Engine) encryption realizing method
|
US9020151B1
(en)
|
2013-03-04 |
2015-04-28 |
Trend Micro Incorporated |
Secure real-time data replication with disk encryption and key management system
|
IN2013CH01202A
(en)
*
|
2013-03-20 |
2015-08-14 |
Infosys Ltd |
|
US10666771B2
(en)
|
2013-08-05 |
2020-05-26 |
Pismo Labs Technology Limited |
Method and system for allowing the use of domain name based network policies stored in a second device in enforcing network policy at a first device
|
US9197419B1
(en)
|
2013-10-14 |
2015-11-24 |
Trend Micro Incorporated |
Security system for data stored in the cloud
|
US9275242B1
(en)
|
2013-10-14 |
2016-03-01 |
Trend Micro Incorporated |
Security system for cloud-based emails
|
US10631162B2
(en)
*
|
2013-10-30 |
2020-04-21 |
Samsung Electronics Co., Ltd. |
Method and apparatus to perform device to device communication in wireless communication network
|
CN104065483B
(en)
*
|
2014-06-06 |
2017-05-10 |
武汉理工大学 |
Identity-based cryptograph (IBC) classified using method of electronic communication identities
|
US9923719B2
(en)
*
|
2014-12-09 |
2018-03-20 |
Cryptography Research, Inc. |
Location aware cryptography
|
JP2018518854A
(en)
*
|
2015-03-16 |
2018-07-12 |
コンヴィーダ ワイヤレス, エルエルシー |
End-to-end authentication at the service layer using a public key mechanism
|
CN104869000B
(en)
*
|
2015-05-18 |
2018-02-23 |
深圳奥联信息安全技术有限公司 |
One kind is based on the cross-domain safety communicating method of id password and system
|
CN107592281B
(en)
|
2016-07-06 |
2022-04-05 |
华为技术有限公司 |
Protection system, method and device for transmission data
|
US11463267B2
(en)
*
|
2016-09-08 |
2022-10-04 |
Nec Corporation |
Network function virtualization system and verifying method
|
US10636089B2
(en)
|
2016-09-30 |
2020-04-28 |
Chicago Mercantile Exchange Inc. |
Context based messaging
|
US11551208B2
(en)
|
2018-10-04 |
2023-01-10 |
Verifone, Inc. |
Systems and methods for point-to-point encryption compliance
|
US11128454B2
(en)
|
2019-05-30 |
2021-09-21 |
Bong Mann Kim |
Quantum safe cryptography and advanced encryption and key exchange (AEKE) method for symmetric key encryption/exchange
|
CN113347211B
(en)
*
|
2021-08-04 |
2021-11-23 |
北京微芯感知科技有限公司 |
Identity hierarchical encryption method, device, system, computer equipment and storage medium
|