Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/28
Name: Cryptography > Particular algorithmic function encoding
Description: Subject matter wherein an algorithmic operation is performed upon a signal in order to encrypt the information signal.

Sub-classes under this class:

Class Number Class Name Patents
380/29 Nbs/des algorithm 635
380/30 Public key 1,676

Patents under this class:

Patent Number Title Of Patent Date Issued
8713329 Authenticated secret sharing Apr. 29, 2014
8713315 Content distribution system, mobile communication terminal device, and computer readable medium Apr. 29, 2014
8712039 Efficient implementation of hash algorithm on a processor Apr. 29, 2014
8712038 Cryptography on a simplified elliptical curve Apr. 29, 2014
8712037 Data encoding and decoding apparatus and method thereof for verifying data integrity Apr. 29, 2014
8712036 System for encrypting and decrypting a plaintext message with authentication Apr. 29, 2014
8712035 Online data conversion technique using a sliding window Apr. 29, 2014
8711381 Image forming apparatus and job request control method instructed by authenticated users Apr. 29, 2014
8707038 Method for the encrypted data exchange and communication system Apr. 22, 2014
8705731 Selection of a lookup table with data masked with a combination of an additive and multiplicative mask Apr. 22, 2014
8705730 Elliptic curve cryptography with fragmented key processing and methods for use therewith Apr. 22, 2014
8705729 Audio content protection Apr. 22, 2014
8705348 Use of metadata for time based anti-replay Apr. 22, 2014
8694796 Secure data deletion in a database Apr. 8, 2014
8694789 System and method for generating a non-repudiatable record of a data stream Apr. 8, 2014
8693684 Method and apparatus for computing a shared secret key Apr. 8, 2014
8689339 Method, system and apparatus for game data transmission Apr. 1, 2014
8689003 System and method for secure password-based authentication Apr. 1, 2014
8687803 Operational mode for block ciphers Apr. 1, 2014
8687802 Method and system for accelerating the deterministic enciphering of data in a small domain Apr. 1, 2014
8687801 Method and apparatus for acquiring domain information and domain-related data Apr. 1, 2014
8687800 Encryption method for message authentication Apr. 1, 2014
8687799 Data processing circuit and control method therefor Apr. 1, 2014
8683225 Microprocessor that facilitates task switching between encrypted and unencrypted programs Mar. 25, 2014
8681974 Array encryption core Mar. 25, 2014
8681973 Methods, systems, and computer program products for performing homomorphic encryption and decryption on individual operations Mar. 25, 2014
8681972 Method of executing a cryptographic calculation Mar. 25, 2014
8677126 Method and system for digital rights management of documents Mar. 18, 2014
8677123 Method for accelerating security and management operations on data segments Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8675877 Sharing a secret via linear interpolation Mar. 18, 2014
8675869 Incorporating data into an ECDSA signature component Mar. 18, 2014
8675867 Key generation algorithm using secret polynomial over finite ring and transformation Mar. 18, 2014
8675866 Multiplicative splits to protect cipher keys Mar. 18, 2014
8675865 Method and apparatus for a high bandwidth stream cipher Mar. 18, 2014
8675864 Apparatus for encrypting data Mar. 18, 2014
8671285 Microprocessor that fetches and decrypts encrypted instructions in same time as plain text instructions Mar. 11, 2014
8671276 Method for passing selective encrypted attributes of specific versions of objects in a distributed system Mar. 11, 2014
8670562 Generation and use of a biometric key Mar. 11, 2014
8670560 Encryption method Mar. 11, 2014
8670559 White-box implementation Mar. 11, 2014
8670557 Cryptographic system with modular randomization of exponentiation Mar. 11, 2014
8667580 Secure boot scheme from external memory using internal memory Mar. 4, 2014
8667274 System and method for WORM data storage Mar. 4, 2014
8666070 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8666069 Cryptographic processing apparatus and cryptographic processing method, and computer program Mar. 4, 2014
8666068 Method for scrambling shaped data Mar. 4, 2014
8666067 Cryptographic countermeasure method by deriving a secret data Mar. 4, 2014
8666066 Encoding points of an elliptic curve Mar. 4, 2014
8666065 Real-time data encryption Mar. 4, 2014

  Recently Added Patents
Simplified algorithm for abnormal situation prevention in load following applications including plugged line diagnostics in a dynamic process
Compatibility check
Charging member, electrophotographic apparatus, and process cartridge
Semiconductor memory device, method of controlling read preamble signal thereof, and data transmission method
Integrated circuit testing with power collapsed
Produce container and lid assembly
Molecular sieve
  Randomly Featured Patents
Solar powered key chain display
Baby bedding assembly
Valving apparatus for downhole tools
System for controlling distribution of fluid to a system of air bags for use with vehicular trailers
Electrolytes for lithium sulfur cells
Data communication system and communication terminal equipment
Dynamic zoning for targeted ad insertion
Apparatus and mounting shell having retaining tongues formed by cuts
Method for continuous casting of metal and an apparatus therefor
Biodegradable disinfectant containing anhydrous alcohol and propylene glycol