1
Sheue Ling Chang, James Gosling: Method and apparatus for enhancing software security and distributing software. Sun Microsystems, Ronald S Laurie Esq, Joseph Yang, McCutchen Doyle Brown & Enersen, March 3, 1998: US05724425 (329 worldwide citation)

Source code to be protected, a software application writer's private key, along with an application writer's license provided to the first computer. The application writer's license includes identifying information such as the application writer's name as well as the application writer's public key. ...


2
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Method and apparatus for preventing piracy of digital content. Crypotography Research, Joseph Yang, Thomas R Lane, Skadden Arps, September 11, 2001: US06289455 (324 worldwide citation)

A secure cryptographic rights unit for cryptographically regulating access to digital content includes an interface control processor and a specialized cryptographic unit that protects access to a memory. Rights keys, which allow access to content, are added by the cryptographic unit by transforming ...


3
Bruce Schneier, John M Kelsey: Event auditing system. Counterpane Internet Security, Joseph Yang, Skadden Arps et al, November 2, 1999: US05978475 (265 worldwide citation)

In many computer applications, sensitive information must be kept on an untrusted machine. Such information must be protected against attackers, as well as against partially trusted entities to be given partial, but not total, access to the stored information. This invention provides a method, appar ...


4
Balas Natarajan Kausik, Rammohan Varadarajan: Method and apparatus for secure distribution of authentication credentials to roaming users. Arcot Systems, Joseph Yang, Skadden Arps Slate Meagher & Flom, July 17, 2001: US06263446 (223 worldwide citation)

A roaming user needing an his authentication credential (e.g., private key) to access a computer server to perform an electronic transaction may obtain the authentication credential in an on-demand fashion from a credential server accessible to the user over a computer network. In this way, the user ...


5
Stephen J Purpura: Method and system for authentication and single sign on using cryptographically assured cookies in a distributed computer environment. First Data Corporation, Robert B Beyers, Joseph Yang, Skadden Arps, July 16, 2002: US06421768 (159 worldwide citation)

Cryptographically assured data structures are created to enable a single sign on and/or authentication method for securely transferring user authentication information from a first computer to a second computer to allow the user to seamlessly interact with the second computer without necessarily re- ...


6
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Des and other cryptographic, processes with leak minimization for smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, August 21, 2001: US06278783 (147 worldwide citation)

Methods and apparatuses are disclosed for improving DES and other cryptographic protocols against external monitoring attacks by reducing the amount (and signal-to-noise ratio) of useful information leaked during processing. An improved DES implementation of the invention instead uses two 56-bit key ...


7
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Digital content protection method and apparatus. Cryptography Research, Joseph Yang, Skadden Arps, October 28, 2003: US06640305 (140 worldwide citation)

Before use, a population of tamper-resistant cryptographic enforcement devices is partitioned into groups and issued one or more group keys. Each tamper-resistant device contains multiple computational units to control access to digital content. One of the computational units within each tamper-resi ...


8
Paul C Kocher, Joshua M Jaffe: Leak-resistant cryptographic method and apparatus. Cryptography Research, Joseph Yang, Skadden Arps Slate Meagher & Flom, October 16, 2001: US06304658 (113 worldwide citation)

The present invention provides a method and apparatus for securing cryptographic devices against attacks involving external monitoring and analysis. A “self-healing” property is introduced, enabling security to be continually re-established following partial compromises. In addition to producing use ...


9
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Using unpredictable information to minimize leakage from smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, December 4, 2001: US06327661 (102 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. This is generally accomplished by incorporating unpredictable information into the cryptographic pro ...


10
Paul C Kocher: Leak-resistant cryptographic indexed key update. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps, March 25, 2003: US06539092 (95 worldwide citation)

Methods and apparatuses for increasing the leak-resistance of cryptographic systems using an indexed key update technique are disclosed. In one embodiment, a cryptographic client device maintains a secret key value as part of its state. The client can update its secret value at any time, for example ...