Patent | Date |
---|
Time Stamping Method Employing a Separate Ticket and Stub App 20070294537 - Peyravian; Mohammad ;   et al. | 2007-12-20 |
Method and system of marking a text document with a pattern of extra blanks for authentication Grant 6,941,460 - Carro , et al. September 6, 2 | 2005-09-06 |
Authentication for secure devices with limited cryptography Grant 6,505,302 - Matyas , et al. January 7, 2 | 2003-01-07 |
Authentication for secure devices with limited cryptography Grant 6,243,812 - Matyas , et al. June 5, 2 | 2001-06-05 |
Authentication for secure devices with limited cryptography Grant 6,161,180 - Matyas , et al. December 12, 2 | 2000-12-12 |
Encryption of low data content ATM cells Grant 5,642,421 - Gray , et al. June 24, 1 | 1997-06-24 |
Secure cryptographic operations using control vectors generated inside a cryptographic facility Grant 5,432,849 - Johnson , et al. July 11, 1 | 1995-07-11 |
Network security system and method using a parallel finite state machine adaptive active monitor and responder Grant 5,414,833 - Hershey , et al. May 9, 1 | 1995-05-09 |
Commercial data masking Grant 5,323,464 - Elander , et al. June 21, 1 | 1994-06-21 |
Method and system for multimedia access control enablement Grant 5,319,705 - Halter , et al. June 7, 1 | 1994-06-07 |
User defined function facility Grant 5,301,231 - Abraham , et al. April 5, 1 | 1994-04-05 |
Cryptographic facility environment backup/restore and replication in a public key cryptosystem Grant 5,265,164 - Matyas , et al. * November 23, 1 | 1993-11-23 |
Cryptographic method for updating financial records Grant 5,231,666 - Matyas July 27, 1 | 1993-07-27 |
Method and apparatus for validating entry of cryptographic keys Grant 5,214,698 - Smith, Sr. , et al. May 25, 1 | 1993-05-25 |
Method for generating public and private key pairs without using a passphrase Grant 5,201,000 - Matyas , et al. April 6, 1 | 1993-04-06 |
Public key cryptosystem key management based on control vectors Grant 5,200,999 - Matyas , et al. * April 6, 1 | 1993-04-06 |
Secure translation of usage-control values for cryptographic keys Grant 5,177,791 - Yeh , et al. January 5, 1 | 1993-01-05 |
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem Grant 5,164,988 - Matyas , et al. November 17, 1 | 1992-11-17 |
Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors Grant 5,142,578 - Matyas , et al. August 25, 1 | 1992-08-25 |
Secure management of keys using control vectors with multi-path checking Grant 5,103,478 - Matyas , et al. April 7, 1 | 1992-04-07 |
Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key Grant 5,073,934 - Matyas , et al. December 17, 1 | 1991-12-17 |
Secure key management using programable control vector checking Grant 5,007,089 - Matyas , et al. April 9, 1 | 1991-04-09 |
Secure key management using control vector translation Grant 4,993,069 - Matyas , et al. February 12, 1 | 1991-02-12 |
Secure management of keys using control vectors Grant 4,941,176 - Matyas , et al. July 10, 1 | 1990-07-10 |
Secure management of keys using extended control vectors Grant 4,924,515 - Matyas , et al. May 8, 1 | 1990-05-08 |
Personal identification number processing using control vectors Grant 4,924,514 - Matyas , et al. May 8, 1 | 1990-05-08 |
Data cryptography operations using control vectors Grant 4,918,728 - Matyas , et al. April 17, 1 | 1990-04-17 |
Initialization of cryptographic variables in an EFT/POS network with a large number of terminals Grant 4,771,461 - Matyas September 13, 1 | 1988-09-13 |
Code protection using cryptography Grant 4,757,534 - Matyas , et al. July 12, 1 | 1988-07-12 |
Transaction security system Grant 4,755,940 - Brachtl , et al. July 5, 1 | 1988-07-05 |
Transaction security system using time variant parameter Grant 4,747,050 - Brachtl , et al. May 24, 1 | 1988-05-24 |
Technique for reducing RSA Crypto variable storage Grant 4,736,423 - Matyas April 5, 1 | 1988-04-05 |
Offline PIN validation with DES Grant 4,661,658 - Matyas April 28, 1 | 1987-04-28 |
Method for establishing user authenication with composite session keys among cryptographically communicating nodes Grant 4,649,233 - Bass , et al. March 10, 1 | 1987-03-10 |
Cryptographic application for interbank verification Grant 4,500,750 - Elander , et al. February 19, 1 | 1985-02-19 |
Method and apparatus incorporating a one-way sequence for transaction and identity verification Grant 4,393,269 - Konheim , et al. July 12, 1 | 1983-07-12 |
Cryptographic communication and file security using terminals Grant 4,386,234 - Ehrsam , et al. May 31, 1 | 1983-05-31 |
Cryptographic communication security for single domain networks Grant 4,238,853 - Ehrsam , et al. December 9, 1 | 1980-12-09 |
Cryptographic file security for single domain networks Grant 4,238,854 - Ehrsam , et al. December 9, 1 | 1980-12-09 |
Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system Grant 4,229,818 - Matyas , et al. October 21, 1 | 1980-10-21 |
Cryptographic communication security for multiple domain networks Grant 4,227,253 - Ehrsam , et al. October 7, 1 | 1980-10-07 |
Method for authenticating the identity of a user of an information system Grant 4,218,738 - Matyas , et al. August 19, 1 | 1980-08-19 |
Digital signature system and apparatus Grant 4,206,315 - Matyas , et al. June 3, 1 | 1980-06-03 |
Cryptographic file security for multiple domain networks Grant 4,203,166 - Ehrsam , et al. May 13, 1 | 1980-05-13 |
Cryptographic verification of operational keys used in communication networks Grant 4,193,131 - Lennon , et al. March 11, 1 | 1980-03-11 |