1
Matyas Stephen Michael, Oseas Jonathan: Method of software protection.. Ibm, August 20, 1986: EP0191162-A2 (72 worldwide citation)

A cryptographic method for discouraging the copying and sharing of purchased software programs allows an encrypted program to be run on only a designated computer or, alternatively, to be run on any computer but only by the user possessing a designated smart card. Each program offering sold by the s ...


2

3

4
Lennon Richard Edward, Matyas Stephen Michael, Meyer Carl Heinz Wilhelm, Oseas Jonathan, Prentice Paul Norman, Tuchman Walter Leonard: A process for the verification of cryptographic operational keys used in data communication networks.. Ibm, June 27, 1979: EP0002580-A1 (8 worldwide citation)

This invention concerns a process and apparatus for the verification of cryptographic operational keys used in data communication networks. In a data communication network providing communication security for communication sessions between a first station and a second station where each station has ...


5

6

7
Oseas Jonathan, Matyas Stephen M: Methode de protection par codes cryptographiques, Code protection using cryptography. International Business Machines Corporation, SAUNDERS RAYMOND H, June 21, 1988: CA1238427

ABSTRACT A cryptographic method for discouraging the copying andsharing of purchased software programs allows an encryptedprogram to be run on only a designated computer or,alternatively, to be run on any computer but only by theuser possessing a designated smart card. Each programoffering sold by t ...


8
Bass Walter E, Oseas Jonathan, Matyas Stephen M: Methode dauthentification dutilisateurs au moyen de cles de session composites parmi les noeuds de communication cryptographique, Method for establishing user authentication with composite session keys among cryptographically communicating nodes. International Business Machines Corporation, KERR ALEXANDER, February 7, 1989: CA1249865

A METHOD FOR ESTABLISHING USER AUTHENTICATION WITH COMPOSITE SESSION KEYS AMONG CRYPTOGRAPHICALLY COMMUNICATING NODES Abstract of the Invention A method for authenticating nodes/users and inprotecting data flow between nodes. This is facilitatedby creating a dialogue involving authenticated encrypti ...


9
Elander Robert C, Ehrsam William F, Tuchman Walter L, Lennon Richard E, Matyas Stephen M, Meyer Carl Hw, Hollis Lloyd L, Oseas Jonathan: Systeme de securite cryptographique pour les communications dans les reseaux a domaines multiples, Cryptographic communication security for multiple domain networks. International Business Machines Corporation, KERR ALEXANDER, June 1, 1982: CA1124812

CRYPTOGRAPHIC COMMUNICATION SECURITY FOR MULTIPLE DOMAIN NETWORKS ABSTRACT A communication security system for data transmissionsbetween different domains of a multiple domain communicationnetwork where each domain includes a host system and its associatedresources of programs and communication term ...


10
Oseas Jonathan, Meyer Carl H W, Matyas Stephen M, Lennon Richard E, Prentice Paul N, Tuchman Walter L: Verification cryptographique des touches operationnelles utilisees dans les reseaux de communication, Cryptographic verification of operational keys used in communication networks. International Business Machines Corporation, KERR ALEXANDER, March 2, 1982: CA1119268

CRYPTOGRAPHIC VERIFICATION OF OPERATIONAL KEYS USED IN COMMUNICATION NETWORKS ABSTRACT In a data communication network providing communicationsecurity for communication session between a first stationand a second station where each station has cryptographicapparatus provided with an operational key ...



Click the thumbnails below to visualize the patent trend.