1
George Robert Blakley, Rajat Datta, Oscar Mitchell, Kyle Stein: Ring arithmetic method, system, and apparatus. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, December 14, 2010: US07853014 (35 worldwide citation)

A data encryption method performed with ring arithmetic operations using a residue number multiplication process wherein a first conversion to a first basis is done using a mixed radix system and a second conversion to a second basis is done using a mixed radix system. In some embodiments, a modulus ...


2
Adrian Peck, Ian Harvey: Secure transmission of data within a distributed computer system. nCipher Corporation, Morgan & Finnegan, September 4, 2007: US07266705 (10 worldwide citation)

A method for the secure transmission of data from a distributor to a client over a computer network. The method includes encrypting the data using an encryption confidentiality key known to the client, but not the distributor. The method also includes storing the encrypted data at the distributor an ...


3
Rick Hall, Oscar R Mitchell: Encrypted packet inspection. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, March 1, 2011: US07900042 (9 worldwide citation)

A method, system, and device for encrypted packet inspection allowing an authorized third party device to monitor cryptographic handshaking information (full- duplex) between two other devices and together with the secret private key then transparently decrypt the bulk encrypted data stream. The sco ...


4
Oscar R Mitchell, Robert Bradford Cohen, Eleanor Coy, Rajat Datta, Randall Findley, James Garrett, Richard Goble, Greg North, Daniel Reents, Leslie Zsohar: Application-specific information-processing method, system, and apparatus. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, March 22, 2011: US07913261 (8 worldwide citation)

An information-processing method for application-specific processing of messages. A message is received. Whether the message is in a selected application format is ascertained. If not, the message is routed to a next location. If so, the message is routed to a selected application processor, process ...


5
Nicko Van Someren: Controlling access to a resource by a program using a digital signature. nCipher Corporation, Young & Basile, March 1, 2011: US07900239 (7 worldwide citation)

A computer system has a resource, a verification unit and an execution engine for running a body of program code having an associated signature. A cryptographic key is associated with the resource and when the code is to be loaded into the execution engine a verification operation is run on the sign ...


6
Ian Nigel Harvey: Data storage and retrieval. nCipher Corporation, Young Law Firm P C, December 16, 2003: US06665210 (7 worldwide citation)

The invention relates to a method of storing items of data in a memory device. The memory device has an array of a storage locations, each identified by an address corresponding to a unique multi-bit index value. The data items consist of a multi-bit identifier value and an information value. The me ...


7
Ian Nigel Harvey: Microprocessor cache consistency. nCipher Corporation, Young & Basile P C, October 24, 2000: US06138216 (4 worldwide citation)

A method is described of managing memory in a microprocessor system comprising two or more processors (40, 42). Each processor (40, 42) has a cache memory (44, 46) and the system has a system memory (48) divided into pages subdivided into blocks. The method is concerned with managing the system memo ...


8
Noll Landon Curt, Lockhart Robert Adrian: Method and system for identifying and managing encryption keys. Ncipher Corporation, Noll Landon Curt, Lockhart Robert Adrian, BONE Richard GA, October 23, 2008: WO/2008/128212 (3 worldwide citation)

A system and method for managing encryption keys, wherein one of more of they keys incorporates a disabled state, and wherein the system further incorporates a namespace.


9
Leslie Zsohar: System and method for small-area system data processing. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, February 5, 2008: US07328336 (2 worldwide citation)

A system and method for processing server-to-client and client-to-server data communications using data processing devices (DPDs) in a small-area system, such as a local area network or smaller system. The DPDs act as proxies for the servers to which the transmissions are directed. The DPDs are conn ...


10
William T Fischofer: TCP/IP proxy utilizing transparent acknowledgements. nCipher Corporation, John A Fortkort, Fortkort & Houston P C, February 1, 2011: US07882237 (1 worldwide citation)

A method is described herein for transmitting data from a first point (203) to a second point (205) on a network (201) via a proxy server (207). In accordance with the method, a first data packet is received from the first point at the proxy server without sending an acknowledgement packet to the fi ...