Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/30
Name: Cryptography > Particular algorithmic function encoding > Public key
Description: Subject matter including an encryption algorithm which is computationally infeasible to invert, and having distinct encryption and decryption keys.

Patents under this class:

Patent Number Title Of Patent Date Issued
8713653 Data processing apparatus, activation control method, and computer-readable storage medium Apr. 29, 2014
8713329 Authenticated secret sharing Apr. 29, 2014
8712038 Cryptography on a simplified elliptical curve Apr. 29, 2014
8711843 Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol Apr. 29, 2014
8707452 Secure data management device Apr. 22, 2014
8707038 Method for the encrypted data exchange and communication system Apr. 22, 2014
8705735 Implicit certificate scheme Apr. 22, 2014
8693684 Method and apparatus for computing a shared secret key Apr. 8, 2014
8688991 Media player embodiments and secure playlist packaging Apr. 1, 2014
8683605 Long-term validation of a digital signature status indicator Mar. 25, 2014
8677140 Delivery point validation system Mar. 18, 2014
8677126 Method and system for digital rights management of documents Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8675869 Incorporating data into an ECDSA signature component Mar. 18, 2014
8670557 Cryptographic system with modular randomization of exponentiation Mar. 11, 2014
8667576 Method for preventing data in a computer system from being accessed by unauthorized user Mar. 4, 2014
8666070 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8666063 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8661260 Methods and systems for indicating trustworthiness of secure communications Feb. 25, 2014
8660264 Method and apparatus for minimizing differential power attacks on processors Feb. 25, 2014
8660261 System and apparatus for integrated video/image encoding/decoding and encryption/decryption Feb. 25, 2014
8656175 Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit Feb. 18, 2014
8656166 Storage and authentication of data transactions Feb. 18, 2014
8649521 Obfuscation of sequenced encoded data slices Feb. 11, 2014
8649509 Systems and computer program products for generating and verifying randomized hash values Feb. 11, 2014
8649508 System and method for implementing elliptic curve scalar multiplication in cryptography Feb. 11, 2014
8645699 Use of certificate authority to control a device's access to services Feb. 4, 2014
8639931 Acceleration of key agreement protocols Jan. 28, 2014
8638944 Security countermeasures for power analysis attacks Jan. 28, 2014
8635352 System and method for symmetric receive-side scaling (RSS) Jan. 21, 2014
8634563 Attribute based encryption using lattices Jan. 21, 2014
8631241 Secure configuration of computing device Jan. 14, 2014
8627406 Device for protection of the data and executable codes of a computer system Jan. 7, 2014
8627107 System and method of securing private health information Jan. 7, 2014
8625783 Method and apparatus for providing privacy of user identity and characteristics in a communication system Jan. 7, 2014
8625780 Reduction of side-channel information by interacting crypto blocks Jan. 7, 2014
8621639 Using fuzzy classification models to perform matching operations in a web application security scanner Dec. 31, 2013
8621602 One-time authentication system Dec. 31, 2013
8621239 Method for strengthening the implementation of ECDSA against power analysis Dec. 31, 2013
8621200 Key delivery method and apparatus in a communications system Dec. 31, 2013
8619978 Multiple account authentication Dec. 31, 2013
8619977 Representation change of a point on an elliptic curve Dec. 31, 2013
8619972 Method and system for atomicity for elliptic curve cryptosystems Dec. 31, 2013
8615080 Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks Dec. 24, 2013
8613057 Identity management facilitating minimum disclosure of user data Dec. 17, 2013
8612763 Digital signature verification processes, methods and systems Dec. 17, 2013
8612750 Creating and using secure communications channels for virtual universes Dec. 17, 2013
8605895 Computing the root of a number using a variant of the RSA algorithm (for even e's) Dec. 10, 2013
8601265 Method and system for improving storage security in a cloud computing environment Dec. 3, 2013
8600048 Format-translating encryption systems Dec. 3, 2013

  Recently Added Patents
Timing controller capable of removing surge signal and display apparatus including the same
Lightweight multicast method and apparatus for data distribution service
Sporting goal practice screen
Permutational memory cells
Processes for producing polyunsaturated fatty acids in transgenic organisms
Television apparatus
Recovery of a hot-pluggable serial communication link
  Randomly Featured Patents
Dynamic output buffer
Sofa, love seat, sectional or modular furniture arrangement with glider/rocker recliner
Digital broadcasting receiver
Updating floor-specific information
Method for providing a one step ultrasonically coated substrate
Printed lenticules for lenticular printing
Cylinder filling oxygen concentrator
Method for introduction of an impurity dopant in SiC, a semiconductor device formed by the method and a use of highly doped amorphous layer as a source for dopant diffusion into SiC
Power management in a printer system
Multi-segment compressor casing assembly