Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/28
Name: Cryptography > Particular algorithmic function encoding
Description: Subject matter wherein an algorithmic operation is performed upon a signal in order to encrypt the information signal.

Sub-classes under this class:

Class Number Class Name Patents
380/29 Nbs/des algorithm 635
380/30 Public key 1,676

Patents under this class:

Patent Number Title Of Patent Date Issued
8713329 Authenticated secret sharing Apr. 29, 2014
8713315 Content distribution system, mobile communication terminal device, and computer readable medium Apr. 29, 2014
8712039 Efficient implementation of hash algorithm on a processor Apr. 29, 2014
8712038 Cryptography on a simplified elliptical curve Apr. 29, 2014
8712037 Data encoding and decoding apparatus and method thereof for verifying data integrity Apr. 29, 2014
8712036 System for encrypting and decrypting a plaintext message with authentication Apr. 29, 2014
8712035 Online data conversion technique using a sliding window Apr. 29, 2014
8711381 Image forming apparatus and job request control method instructed by authenticated users Apr. 29, 2014
8707038 Method for the encrypted data exchange and communication system Apr. 22, 2014
8705731 Selection of a lookup table with data masked with a combination of an additive and multiplicative mask Apr. 22, 2014
8705730 Elliptic curve cryptography with fragmented key processing and methods for use therewith Apr. 22, 2014
8705729 Audio content protection Apr. 22, 2014
8705348 Use of metadata for time based anti-replay Apr. 22, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694789 System and method for generating a non-repudiatable record of a data stream Apr. 8, 2014
8693684 Method and apparatus for computing a shared secret key Apr. 8, 2014
8689339 Method, system and apparatus for game data transmission Apr. 1, 2014
8689003 System and method for secure password-based authentication Apr. 1, 2014
8687803 Operational mode for block ciphers Apr. 1, 2014
8687802 Method and system for accelerating the deterministic enciphering of data in a small domain Apr. 1, 2014
8687801 Method and apparatus for acquiring domain information and domain-related data Apr. 1, 2014
8687800 Encryption method for message authentication Apr. 1, 2014
8687799 Data processing circuit and control method therefor Apr. 1, 2014
8683225 Microprocessor that facilitates task switching between encrypted and unencrypted programs Mar. 25, 2014
8681974 Array encryption core Mar. 25, 2014
8681973 Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677126 Method and system for digital rights management of documents Mar. 18, 2014
8677123 Method for accelerating security and management operations on data segments Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8675877 Sharing a secret via linear interpolation Mar. 18, 2014
8675869 Incorporating data into an ECDSA signature component Mar. 18, 2014
8675867 Key generation algorithm using secret polynomial over finite ring and transformation Mar. 18, 2014
8675866 Multiplicative splits to protect cipher keys Mar. 18, 2014
8675865 Method and apparatus for a high bandwidth stream cipher Mar. 18, 2014
8675864 Apparatus for encrypting data Mar. 18, 2014
8671285 Microprocessor that fetches and decrypts encrypted instructions in same time as plain text instructions Mar. 11, 2014
8671276 Method for passing selective encrypted attributes of specific versions of objects in a distributed system Mar. 11, 2014
8670562 Generation and use of a biometric key Mar. 11, 2014
8670560 Encryption method Mar. 11, 2014
8670559 White-box implementation Mar. 11, 2014
8670557 Cryptographic system with modular randomization of exponentiation Mar. 11, 2014
8667580 Secure boot scheme from external memory using internal memory Mar. 4, 2014
8667274 System and method for WORM data storage Mar. 4, 2014
8666070 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8666069 Cryptographic processing apparatus and cryptographic processing method, and computer program Mar. 4, 2014
8666068 Method for scrambling shaped data Mar. 4, 2014
8666067 Cryptographic countermeasure method by deriving a secret data Mar. 4, 2014
8666066 Encoding points of an elliptic curve Mar. 4, 2014
8666065 Real-time data encryption Mar. 4, 2014

  Recently Added Patents
Process for shaping polymeric articles
Authenticated secret sharing
Plants and seeds of corn variety CV778791
Apparatus and method to reduce noise in magnetic resonance imaging systems
Integrated circuits with magnetic core inductors and methods of fabrications thereof
Communication terminal device, communication system, and communication control method
Methods, devices and computer program products providing for establishing a model for emulating a physical quantity which depends on at least one input parameter, and use thereof
  Randomly Featured Patents
Rubber stopper for waterproof connector
Fuel-feeding unit with improved fuel pump geometry
Electrographic copier with three development stations
Screw conveyor for the transport of goods hanging from hanger supports
Negative electrode for lithium secondary battery and lithium secondary battery
Mesh sponge holder/back scrubber
Gesture recognition
Structure with a micro-electronic component made of a semi-conductor material difficult to etch and with metallized holes
Mesh generation method for numerical simulation
Amusement device