Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/28
Name: Cryptography > Particular algorithmic function encoding
Description: Subject matter wherein an algorithmic operation is performed upon a signal in order to encrypt the information signal.

Sub-classes under this class:

Class Number Class Name Patents
380/29 Nbs/des algorithm 635
380/30 Public key 1,676

Patents under this class:

Patent Number Title Of Patent Date Issued
8713329 Authenticated secret sharing Apr. 29, 2014
8713315 Content distribution system, mobile communication terminal device, and computer readable medium Apr. 29, 2014
8712039 Efficient implementation of hash algorithm on a processor Apr. 29, 2014
8712038 Cryptography on a simplified elliptical curve Apr. 29, 2014
8712037 Data encoding and decoding apparatus and method thereof for verifying data integrity Apr. 29, 2014
8712036 System for encrypting and decrypting a plaintext message with authentication Apr. 29, 2014
8712035 Online data conversion technique using a sliding window Apr. 29, 2014
8711381 Image forming apparatus and job request control method instructed by authenticated users Apr. 29, 2014
8707038 Method for the encrypted data exchange and communication system Apr. 22, 2014
8705731 Selection of a lookup table with data masked with a combination of an additive and multiplicative mask Apr. 22, 2014
8705730 Elliptic curve cryptography with fragmented key processing and methods for use therewith Apr. 22, 2014
8705729 Audio content protection Apr. 22, 2014
8705348 Use of metadata for time based anti-replay Apr. 22, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694789 System and method for generating a non-repudiatable record of a data stream Apr. 8, 2014
8693684 Method and apparatus for computing a shared secret key Apr. 8, 2014
8689339 Method, system and apparatus for game data transmission Apr. 1, 2014
8689003 System and method for secure password-based authentication Apr. 1, 2014
8687803 Operational mode for block ciphers Apr. 1, 2014
8687802 Method and system for accelerating the deterministic enciphering of data in a small domain Apr. 1, 2014
8687801 Method and apparatus for acquiring domain information and domain-related data Apr. 1, 2014
8687800 Encryption method for message authentication Apr. 1, 2014
8687799 Data processing circuit and control method therefor Apr. 1, 2014
8683225 Microprocessor that facilitates task switching between encrypted and unencrypted programs Mar. 25, 2014
8681974 Array encryption core Mar. 25, 2014
8681973 Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677126 Method and system for digital rights management of documents Mar. 18, 2014
8677123 Method for accelerating security and management operations on data segments Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8675877 Sharing a secret via linear interpolation Mar. 18, 2014
8675869 Incorporating data into an ECDSA signature component Mar. 18, 2014
8675867 Key generation algorithm using secret polynomial over finite ring and transformation Mar. 18, 2014
8675866 Multiplicative splits to protect cipher keys Mar. 18, 2014
8675865 Method and apparatus for a high bandwidth stream cipher Mar. 18, 2014
8675864 Apparatus for encrypting data Mar. 18, 2014
8671285 Microprocessor that fetches and decrypts encrypted instructions in same time as plain text instructions Mar. 11, 2014
8671276 Method for passing selective encrypted attributes of specific versions of objects in a distributed system Mar. 11, 2014
8670562 Generation and use of a biometric key Mar. 11, 2014
8670560 Encryption method Mar. 11, 2014
8670559 White-box implementation Mar. 11, 2014
8670557 Cryptographic system with modular randomization of exponentiation Mar. 11, 2014
8667580 Secure boot scheme from external memory using internal memory Mar. 4, 2014
8667274 System and method for WORM data storage Mar. 4, 2014
8666070 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8666069 Cryptographic processing apparatus and cryptographic processing method, and computer program Mar. 4, 2014
8666068 Method for scrambling shaped data Mar. 4, 2014
8666067 Cryptographic countermeasure method by deriving a secret data Mar. 4, 2014
8666066 Encoding points of an elliptic curve Mar. 4, 2014
8666065 Real-time data encryption Mar. 4, 2014

  Recently Added Patents
Device chip carriers, modules, and methods of forming thereof
System and methods for random parameter filtering
Device, information processing method, and computer-readable storage medium
Semiconductor device having a multilevel interconnect structure and method for fabricating the same
Active and progressive targeted advertising
Technique for skipping irrelevant portions of documents during streaming XPath evaluation
Thwarting keyloggers using proxies
  Randomly Featured Patents
Conductive contact holder and conductive contact unit
System and method for uncoded bit error rate equalization via interleaving
Tetrahydroquinoline derivatives and a process for preparing the same
Stock watering trough and stepped base therefor
Reduced puffing needle coke from coal tar
System and method for monitoring piezoelectric material performance
Termination of a fiber optic transmission member and method therefore
Process for producing tetrahydropyran-4-ol, intermediate therefor, and process for producing the same
Blended fluorosilicone release agent for polymeric fuser members
Self-cleaning assembly employing a gap filler for a guidance or runway rail on the ground