1
Bahman Qawami
Bahman Qawami, Farshid Sabet Sharghi, Robert C Chang: System, method, and device for playing back recorded audio, video or other content from non-volatile memory cards, compact disks or other media. SanDisk Corporation, Winston & Strawn, June 5, 2007: US07227952 (31 worldwide citation)

A secure software system for a portable device or computer that provides a simple interface to the device or computer and that retrieves and dynamically decrypts keys and content from a secure media while minimizing exposure of the keys and eliminating the need for manufacturers of the device or com ...


2
Olivier Benoit
Etienne Cambois, Olivier Benoit: Method of securely unlocking a mobile terminal. Gemalto, Buchanan Ingersoll & Rooney P C, December 28, 2010: US07860487 (1 worldwide citation)

A method of unlocking a mobile terminal after a period of use and ensuring that the first operator who sold the terminal receives adequate payment prior to the use thereof. The identity of the terminal is saved and a security algorithm, which is not known to the operator, is implemented in a securit ...


3
Olivier Benoit
Eric Brier, Jacques Fournier, Pascal Moitrel, Olivier Benoit, Philippe Proust: Secure data transmission between two modules. Gemalto, Buchanan Ingersoll & Rooney PC, December 21, 2010: US07856099 (1 worldwide citation)

The invention relates to a method for secure data transmission in connections between two functional modules of an electronic unit. A first module of a message of k bits in a word code of n bits is injection coded with a constant Hamming weight of w. The word of code is transmitted to a second modul ...


4
Robert Deng
Feng Bao, Jianying Zhou, Huijie Deng: Method of generating an authentication. Agency For Science Technology and Research, Greenblum & Berstein, June 19, 2007: US07233782 (19 worldwide citation)

A method of generating an authentication for updating a mobile communications device's 40 location to a second communications device 60 is disclosed herein. The mobile communications device 40 is registered to a home network 30 comprising a proxy server but roams to a foreign network 40 with a diffe ...


5
Ronald L Rivest, Adi Shamir, Leonard M Adleman: Cryptographic communications system and method. Massachusetts Institute of Technology, Arthur A Smith Jr, Robert J Horn Jr, September 20, 1983: US04405829 (1106 worldwide citation)

A cryptographic communications system and method. The system includes a communications channel coupled to at least one terminal having an encoding device and to at least one terminal having a decoding device. A message-to-be-transferred is enciphered to ciphertext at the encoding terminal by first e ...


6
David K Gifford: Digital active advertising. Open Market, Fish & Richardson P C, March 3, 1998: US05724424 (1013 worldwide citation)

A complete system for the purchasing of goods or information over a computer network is presented. Merchant computers on the network maintain databases of digital advertisements that are accessed by buyer computers. In response to user inquiries, buyer computers retrieve and display digital advertis ...


7
Victor H Shear: Database usage metering and protection system and method. Personal Library Software, Nixon & Vanderhye, May 2, 1989: US04827508 (1001 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databas ...


8
Jay S Walker, Bruce Schneier, James A Jorasch: Method and apparatus for a cryptographically-assisted commercial network system designed to facilitate and support expert-based commerce. Walker Asset Management Partnership, Jeffrey L Brandt, Morgan & Finnegan, January 19, 1999: US05862223 (916 worldwide citation)

The present invention is an expert matching method and apparatus for managing communications between an expert having particular qualifications and an end user seeking a solution to an expert request. In a preferred embodiment, the apparatus of the present invention includes a controller having a da ...


9
Gerald V Piosenka, Ronald V Chandos: Unforgeable personal identification system. Motorola, Frank J Bogacz, February 12, 1991: US04993068 (843 worldwide citation)

An unforgeable personal identification system for identifying users at remote access control sites. The unforgeable personal identification system generates one-way encrypted versions of physically immutable identification credentials (facial photo, retinal scan, voice and finger prints). These cred ...


10
Victor H Shear: Database usage metering and protection system and method. Electronic Publishing Resources, Nixon & Vanderhye, December 11, 1990: US04977594 (799 worldwide citation)

A "return on investment" digital database usage metering, billing, and security system includes a hardware device which is plugged into a computer system bus (or into a serial or other functionally adequate connector) and a software program system resident in the hardware device. One or more databas ...