1
Craig Allen
Craig Allen Long, William Robert Worger, Bradley Robert Schaefer: Method and apparatus for seamless crypto rekey system. Motorola, Frank J Bogacz, August 17, 1999: US05940508 (9 worldwide citation)

Equipment (10, 20) for facilitating point-to-point cryptographic data communication systems is disclosed. The seamless rekey cryptosystem permits changing of the crypto key (70, 80) with no down time. The cryptosystem will facilitate seamless key installation to eliminate data loss or reduce storage ...


2
Olivier Benoit
Christophe Clavier, Olivier Benoit: Countermeasure method in an electronic component using a secret key cryptographic algorithm. GEMPLUS, Buchanan Ingersoll PC, August 1, 2006: US07085378 (2 worldwide citation)

The invention concerns a countermeasure method in an electronic component using a secret key K cryptographic algorithm with sixteen computing cycles to supply an encrypted message (C) from an input message (M), each cycle using first means TC0 to supply an output information from an input informatio ...


3
Olivier Benoit
Eric Brier, Jacques Fournier, Pascal Moitrel, Olivier Benoit, Philippe Proust: Secure data transmission between two modules. Gemalto, Buchanan Ingersoll & Rooney PC, December 21, 2010: US07856099 (1 worldwide citation)

The invention relates to a method for secure data transmission in connections between two functional modules of an electronic unit. A first module of a message of k bits in a word code of n bits is injection coded with a constant Hamming weight of w. The word of code is transmitted to a second modul ...


4
Sagy Pundak Mintz
Sagy P Mintz, Alexander D Deitz: Distribution of electronic market data. Trading Technologies International, McDonnell Boehnen Hulbert & Berghoff, December 30, 2014: US08924286

A system and method are provided that, among other things, can reduce the burden on receiving computers, increase data throughput, reduce system failure, and provide components of a scalable and flexible network architecture. Specifically, the system and method provide a multichannel-multicast netwo ...


5
Bahman Qawami
Oktay Rasizade, Bahman Qawami, Fabrice Jogand Coulomb, Robert C Chang, Farshid Sabet Sharghi: Method for managing keys and/or rights objects. SanDisk Technologies, Brinks Gilson & Lione, December 16, 2014: US08913750

One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file ...


6
Bahman Qawami
Oktay Rasizade, Bahman Qawami, Fabrice Jogand Coulomb, Robert C Chang, Farshid Sabet Sharghi: Method for managing keys and/or rights objects. SanDisk Technologies, Brinks Hofer Gilson & Lione, January 8, 2013: US08351609

One or more rights objects (RO) files may be used for storing RO's preferably in the protected area available only to authenticated users. A RO navigation file is stored preferably in an unprotected public area containing status bits, where each status bit identifies whether a location in a RO file ...


7
Robert Deng
Arcot Desai Narasimhalu, Huijie Deng, Weiguo Wang: Computationally efficient method for trusted and dynamic digital objects dissemination. Kent Ridge Digital Labs, May 2, 2000: US06058383 (54 worldwide citation)

A computationally efficient method for trusted and dynamic dissemination of digital objects. Related digital objects of various types are grouped, based on their usage and functionality, by an information provider into distribution packages. Trustworthiness of objects contained in a distribution pac ...


8
Robert Deng
Feng Bao, Huijie Robert Deng: Method and apparatus for encrypting and decrypting data. Kent Ridge Digital Labs, Conley Rose P C, September 19, 2006: US07110539 (10 worldwide citation)

A method and apparatus for encrypting and decrypting data is disclosed which employs two or more cryptographic algorithms to achieve high throughput without compromizing security. The invention is especially useful for software implementation to protect large amounts of multimedia data over high-spe ...


9
Robert Deng
Feng Bao, Huijie Deng: Method of exchanging digital data. Kent Ridge Digital Labs, Greenblum & Bernstein, January 30, 2007: US07171559 (5 worldwide citation)

Party A encrypts unique first digital data and generates an authentication certificate authenticating that the encrypted first data is an encryption of the first data. Party B verifies the encrypted first data using the authentication certificate. When the encrypted first data is verified by B, A ve ...


10
Robert Deng
Bao Feng, Robert Deng Huijie, Feng Peirong: Private retrieval of digital objects. Agency for Science Technology and Research, Morrison & Foerster, June 12, 2007: US07231047

A database (104) maintains one or more groups (106) of digital objects (202). A user (102) wishes to retrieve one or more digital objects (202) from the database (104), without the database (104) being able to determine which particular digital objects (202) have been retrieved. In addition, the dat ...



Click the thumbnails below to visualize the patent trend.