Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/30
Name: Cryptography > Particular algorithmic function encoding > Public key
Description: Subject matter including an encryption algorithm which is computationally infeasible to invert, and having distinct encryption and decryption keys.

Patents under this class:

Patent Number Title Of Patent Date Issued
8713653 Data processing apparatus, activation control method, and computer-readable storage medium Apr. 29, 2014
8713329 Authenticated secret sharing Apr. 29, 2014
8712038 Cryptography on a simplified elliptical curve Apr. 29, 2014
8711843 Cryptographically generated addresses using backward key chain for secure route optimization in mobile internet protocol Apr. 29, 2014
8707452 Secure data management device Apr. 22, 2014
8707038 Method for the encrypted data exchange and communication system Apr. 22, 2014
8705735 Implicit certificate scheme Apr. 22, 2014
8693684 Method and apparatus for computing a shared secret key Apr. 8, 2014
8688991 Media player embodiments and secure playlist packaging Apr. 1, 2014
8683605 Long-term validation of a digital signature status indicator Mar. 25, 2014
8677140 Delivery point validation system Mar. 18, 2014
8677126 Method and system for digital rights management of documents Mar. 18, 2014
8676998 Reverse network authentication for nonstandard threat profiles Mar. 18, 2014
8675869 Incorporating data into an ECDSA signature component Mar. 18, 2014
8670557 Cryptographic system with modular randomization of exponentiation Mar. 11, 2014
8667576 Method for preventing data in a computer system from being accessed by unauthorized user Mar. 4, 2014
8666070 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8666063 Method and apparatus for minimizing differential power attacks on processors Mar. 4, 2014
8661260 Methods and systems for indicating trustworthiness of secure communications Feb. 25, 2014
8660264 Method and apparatus for minimizing differential power attacks on processors Feb. 25, 2014
8660261 System and apparatus for integrated video/image encoding/decoding and encryption/decryption Feb. 25, 2014
8656175 Secure processing device, secure processing method, encrypted confidential information embedding method, program, storage medium, and integrated circuit Feb. 18, 2014
8656166 Storage and authentication of data transactions Feb. 18, 2014
8649521 Obfuscation of sequenced encoded data slices Feb. 11, 2014
8649509 Systems and computer program products for generating and verifying randomized hash values Feb. 11, 2014
8649508 System and method for implementing elliptic curve scalar multiplication in cryptography Feb. 11, 2014
8645699 Use of certificate authority to control a device's access to services Feb. 4, 2014
8639931 Acceleration of key agreement protocols Jan. 28, 2014
8638944 Security countermeasures for power analysis attacks Jan. 28, 2014
8635352 System and method for symmetric receive-side scaling (RSS) Jan. 21, 2014
8634563 Attribute based encryption using lattices Jan. 21, 2014
8631241 Secure configuration of computing device Jan. 14, 2014
8627406 Device for protection of the data and executable codes of a computer system Jan. 7, 2014
8627107 System and method of securing private health information Jan. 7, 2014
8625783 Method and apparatus for providing privacy of user identity and characteristics in a communication system Jan. 7, 2014
8625780 Reduction of side-channel information by interacting crypto blocks Jan. 7, 2014
8621639 Using fuzzy classification models to perform matching operations in a web application security scanner Dec. 31, 2013
8621602 One-time authentication system Dec. 31, 2013
8621239 Method for strengthening the implementation of ECDSA against power analysis Dec. 31, 2013
8621200 Key delivery method and apparatus in a communications system Dec. 31, 2013
8619978 Multiple account authentication Dec. 31, 2013
8619977 Representation change of a point on an elliptic curve Dec. 31, 2013
8619972 Method and system for atomicity for elliptic curve cryptosystems Dec. 31, 2013
8615080 Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks Dec. 24, 2013
8613057 Identity management facilitating minimum disclosure of user data Dec. 17, 2013
8612763 Digital signature verification processes, methods and systems Dec. 17, 2013
8612750 Creating and using secure communications channels for virtual universes Dec. 17, 2013
8605895 Computing the root of a number using a variant of the RSA algorithm (for even e's) Dec. 10, 2013
8601265 Method and system for improving storage security in a cloud computing environment Dec. 3, 2013
8600048 Format-translating encryption systems Dec. 3, 2013

  Recently Added Patents
Methods of preventing and treating viral infections by inhibiting the deISGylation activity of OTU domain-containing viral proteins
Plural component proportioner
Semiconductor device including a clock generating circuit for generating an internal signal having a coarse delay line, a fine delay line and a selector circuit
Incrementally increasing deployment of gateways
Light emitting device power supply circuit, and light emitting device driver circuit and control method thereof
Method and system for an integrated host PCI I/O bridge and dual port gigabit ethernet controller
Method for releasing a locking in mobile terminal and mobile terminal using the same
  Randomly Featured Patents
Plasma treatment of glass surfaces to remove carbon
Muzzle loading firearm loading kit
Method for machining crankshaft, apparatus for machining crankshaft, control apparatus and program
Apparatus and method for simultaneously flushing multiple outboard boat motors
Endoscope cleaner/sterilizer
Network support for remote sign content update
Plasma processing apparatus
Subway broadcast method and apparatus
Compositions and methods for the modification of physiological responses in plants
Methods, systems, and computer-readable-mediums for managing rollover usage units of communication services