1
Burton S Kaliski Jr: Client/server protocol for proving authenticity. RSA Security, Testa Hurwitz & Thibeault, July 4, 2000: US06085320 (472 worldwide citation)

A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a ...


2
Burton S Kaliski Jr: Client/server protocol for proving authenticity. RSA Security, Testa Hurwitz & Thibeault, February 13, 2001: US06189098 (388 worldwide citation)

A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a ...


3
Kaliski Burton S Jr: Client/server protocol for proving authenticity. Rsa Data Security, November 19, 1997: EP0807911-A2 (47 worldwide citation)

A protocol for establishing the authenticity of a client to a server in an electronic transaction by encrypting a certificate with a key known only to the client and the server. The trust of the server, if necessary, can be established by a public key protocol. The client generates and sends over a ...


4
William M Duane: Powering security devices. EMC IP Holding Company, Krishnendu Gupta, Jason A Reyes, June 13, 2017: US09678548

A method is used in powering security devices. Power is derived from ambient energy in the vicinity of a mobile security device. The power is caused to be used for security based computing tasks within the mobile security device.