1
Yuval Rakavy, Eli Barkat: Method and apparatus for transmitting and displaying information between a remote network and a local computer. Backweb, Skadden Arps et al, June 15, 1999: US05913040 (693 worldwide citation)

Methods and apparatus are provided for selecting advertisements and other information from a computer network database based on user defined preferences and transmitting the selected advertisement in background mode over a communications link between the computer network and a local computer with mi ...


2
Bruce Schneier, John M Kelsey: Event auditing system. Counterpane Internet Security, Joseph Yang, Skadden Arps et al, November 2, 1999: US05978475 (265 worldwide citation)

In many computer applications, sensitive information must be kept on an untrusted machine. Such information must be protected against attackers, as well as against partially trusted entities to be given partial, but not total, access to the stored information. This invention provides a method, appar ...


3
Paul C Kocher, Joshua M Jaffe, Benjamin C Jun: Using unpredictable information to minimize leakage from smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, December 4, 2001: US06327661 (102 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. This is generally accomplished by incorporating unpredictable information into the cryptographic pro ...


4
Paul C Kocher: Apparatus and method for confirming, timestamping, and archiving printer and telecopier transmissions. Cryptography Research, Joseph Yang, Robert B Beyers, Skadden Arps et al, February 13, 2001: US06188766 (90 worldwide citation)

The present invention provides an apparatus and method for confirming, timestamping, and archiving documents using telecopiers (e.g., facsimile machines). A user sends a document to a timestamping service via facsimile, which archives the transmission with a timestamp. A submission receipt, containi ...


5
Paul C Kocher, Joshua M Jaffe: Secure modular exponentiation with leak minimization for smartcards and other cryptosystems. Cryptography Research, Joseph Yang, Thomas R Lane, Skadden Arps et al, October 2, 2001: US06298442 (62 worldwide citation)

Methods and apparatuses are disclosed for securing cryptosystems against external monitoring attacks by reducing the amount (and signal to noise ratio) of useful information leaked during processing. In general, this is accomplished by implementing critical operations using “branchless” or fixed exe ...


6
Balas Natarajan Kausik: Method and apparatus for cryptographically camouflaged cryptographic key storage, certification and use. Arcot Systems, Joseph Yang, Skadden Arps et al, January 2, 2001: US06170058 (62 worldwide citation)

A digital wallet stores an cryptographically camouflaged access-controlled datum, e.g., a private key encrypted under the user's PIN. Entry of the correct PIN will correctly decrypt the stored key. Entry of certain pseudo-valid PINs will also decrypt the stored key, but improperly so, resulting ...


7
Douglas Hoover: Method and apparatus for secure entry of access codes in a computer environment. Arcot Systems, Joseph Yang, Robert B Beyers, Skadden Arps et al, March 27, 2001: US06209102 (40 worldwide citation)

A user inputting his access code (e.g., PIN or password) into an computing environment to access a transaction is at risk of losing the access code to an attacker who has physical or electronic access to the computing environment. To minimize this risk, the access code can be entered via a plurality ...


8
Chris J Ryan, Donald R Gentner: Method and system for generating improved progress indicators. Sun Microsystems, Joseph Skadden Arps et al Yang, August 15, 2000: US06104397 (39 worldwide citation)

A method and system for generating improved command progress indicator including the steps of establishing at a location of a display at least one computer-generated graphic indicator associated with at least one computer executable operation in a first-state appearance, the graphic indicator having ...