1
Martin E Hellman, Bailey W Diffie, Ralph C Merkle: Cryptographic apparatus and method. Stanford University, Flehr Hohbach Test, April 29, 1980: US04200770 (891 worldwide citation)

A cryptographic system transmits a computationally secure cryptogram over an insecure communication channel without prearrangement of a cipher key. A secure cipher key is generated by the conversers from transformations of exchanged transformed signals. The conversers each possess a secret signal an ...


2
Martin E Hellman, Ralph C Merkle: Public key cryptographic apparatus and method. The Board of Trustees of the Leland Stanford Junior University, August 19, 1980: US04218582 (520 worldwide citation)

A cryptographic system transmits a computationally secure cryptogram that is generated from a publicly known transformation of the message sent by the transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. T ...


3
Martin E Hellman, Stephen C Pohlig: Exponentiation cryptographic apparatus and method. Board of Trustees of the Leland Stanford Junior University, Flehr Hohbach Test Albritton & Herbert, January 3, 1984: US04424414 (324 worldwide citation)

A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent ...


4
Thomas Collins, Dale Hopkins, Susan Langford, Michael Sabin: Public key cryptographic apparatus and method. Tandem Computers Incorporated, Robert J Townsend & Townsend & Crew Bennett Esq, December 8, 1998: US05848159 (77 worldwide citation)

A method and apparatus are disclosed for improving public key encryption and decryption schemes that employ a composite number formed from three or more distinct primes. The encryption or decryption tasks may be broken down into sub-tasks to obtain encrypted or decrypted sub-parts that are then comb ...


5
John E Gaffney Jr: Software cryptographic apparatus and method. International Business Machines Corporation, John E Hoel, December 31, 1985: US04562305 (57 worldwide citation)

An improved software cryptographic apparatus and method are disclosed. The apparatus and method enables the encryption of the object code of a program so as to enable relocatable code operations. The apparatus and method will adapt program execution for a mixture of encrypted and nonencrypted code. ...


6
Soichi Furuya, Michael Roe: Cryptographic apparatus and method. Hitachi, Mattingly Stanger Malur & Brundidge P C, February 13, 2007: US07177424 (52 worldwide citation)

An encryption system comprises a pseudo-random number generator (KS) for generating a long pseudo-random sequence (S) from a shorter encryption key (K) and, if necessary, a nonce value (N), and a mixing function (MX) for combining the sequence with a plaintext message (P) on a block-by-block basis, ...


7
Furuya Soichi, Roe Michael: Cryptographic apparatus and method. Hitachi Europ, December 27, 2000: EP1063811-A1 (18 worldwide citation)

An encryption system comprises a pseudo-random number generator (KS) for generating a long pseudo-random sequence (S) from a shorter encryption key (K) and, if necessary, a nonce value (N), and a mixing function (MX) for combining the sequence with a plaintext message (P) on a block-by-block basis, ...


8
Steven M Hoffberg: System and method for determining contingent relevance. Steven M Hoffberg Esq, Ostrolenk Faber, November 14, 2017: US09818136 (5 worldwide citation)

A system and method providing for communication and resolution of utility functions between participants, wherein the utility function is evaluated based on local information at the recipient to determine a cost value thereof. A user interface having express representation of both information elemen ...


9
Shear Victor H, Sibert Olin W, Van Wie David M, Weber Robert P: Cryptographic apparatus and method for electronic rights management of storage media. Intertrust Tech, June 20, 2007: EP1798657-A2 (1 worldwide citation)

An electronic appliance (52; 62) is disclosed, the appliance comprising a disk drive (80; 80') configured to read protected information from a removable storage medium (100), an input (88) for receiving user requests, a protected processing environment (164) communicatively coupled to the disk drive ...


10
Charles L Dennis, Randall A Snyder, Michael F Buhrmann, Patrick J Boyle: System and method for mobile identity protection for online user authentication. Visa International Service Association, Kilpatrick Townsend & Stockton, December 5, 2017: US09838872

An automated system and method for authenticating entities or individuals attempting to access a computer application, network, system or device using a wireless device is provided. The system employs one or more short-range wireless interfaces (e.g. BLUETOOTH or Wi-Fi) or long-range wireless interf ...