loadpatents
name:-0.0033950805664062
name:-0.054819822311401
name:-0.0038340091705322
Matyas; Stephen M. Patent Filings

Matyas; Stephen M.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Matyas; Stephen M..The latest application filed is for "time stamping method employing a separate ticket and stub".

Company Profile
0.44.1
  • Matyas; Stephen M. - Manassas VA
  • Matyas; Stephen M. - Poughkeepsie NY
  • Matyas; Stephen M. - Kingston NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Time Stamping Method Employing a Separate Ticket and Stub
App 20070294537 - Peyravian; Mohammad ;   et al.
2007-12-20
Method and system of marking a text document with a pattern of extra blanks for authentication
Grant 6,941,460 - Carro , et al. September 6, 2
2005-09-06
Authentication for secure devices with limited cryptography
Grant 6,505,302 - Matyas , et al. January 7, 2
2003-01-07
Authentication for secure devices with limited cryptography
Grant 6,243,812 - Matyas , et al. June 5, 2
2001-06-05
Authentication for secure devices with limited cryptography
Grant 6,161,180 - Matyas , et al. December 12, 2
2000-12-12
Encryption of low data content ATM cells
Grant 5,642,421 - Gray , et al. June 24, 1
1997-06-24
Secure cryptographic operations using control vectors generated inside a cryptographic facility
Grant 5,432,849 - Johnson , et al. July 11, 1
1995-07-11
Network security system and method using a parallel finite state machine adaptive active monitor and responder
Grant 5,414,833 - Hershey , et al. May 9, 1
1995-05-09
Commercial data masking
Grant 5,323,464 - Elander , et al. June 21, 1
1994-06-21
Method and system for multimedia access control enablement
Grant 5,319,705 - Halter , et al. June 7, 1
1994-06-07
User defined function facility
Grant 5,301,231 - Abraham , et al. April 5, 1
1994-04-05
Cryptographic facility environment backup/restore and replication in a public key cryptosystem
Grant 5,265,164 - Matyas , et al. * November 23, 1
1993-11-23
Cryptographic method for updating financial records
Grant 5,231,666 - Matyas July 27, 1
1993-07-27
Method and apparatus for validating entry of cryptographic keys
Grant 5,214,698 - Smith, Sr. , et al. May 25, 1
1993-05-25
Method for generating public and private key pairs without using a passphrase
Grant 5,201,000 - Matyas , et al. April 6, 1
1993-04-06
Public key cryptosystem key management based on control vectors
Grant 5,200,999 - Matyas , et al. * April 6, 1
1993-04-06
Secure translation of usage-control values for cryptographic keys
Grant 5,177,791 - Yeh , et al. January 5, 1
1993-01-05
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
Grant 5,164,988 - Matyas , et al. November 17, 1
1992-11-17
Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
Grant 5,142,578 - Matyas , et al. August 25, 1
1992-08-25
Secure management of keys using control vectors with multi-path checking
Grant 5,103,478 - Matyas , et al. April 7, 1
1992-04-07
Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
Grant 5,073,934 - Matyas , et al. December 17, 1
1991-12-17
Secure key management using programable control vector checking
Grant 5,007,089 - Matyas , et al. April 9, 1
1991-04-09
Secure key management using control vector translation
Grant 4,993,069 - Matyas , et al. February 12, 1
1991-02-12
Secure management of keys using control vectors
Grant 4,941,176 - Matyas , et al. July 10, 1
1990-07-10
Secure management of keys using extended control vectors
Grant 4,924,515 - Matyas , et al. May 8, 1
1990-05-08
Personal identification number processing using control vectors
Grant 4,924,514 - Matyas , et al. May 8, 1
1990-05-08
Data cryptography operations using control vectors
Grant 4,918,728 - Matyas , et al. April 17, 1
1990-04-17
Initialization of cryptographic variables in an EFT/POS network with a large number of terminals
Grant 4,771,461 - Matyas September 13, 1
1988-09-13
Code protection using cryptography
Grant 4,757,534 - Matyas , et al. July 12, 1
1988-07-12
Transaction security system
Grant 4,755,940 - Brachtl , et al. July 5, 1
1988-07-05
Transaction security system using time variant parameter
Grant 4,747,050 - Brachtl , et al. May 24, 1
1988-05-24
Technique for reducing RSA Crypto variable storage
Grant 4,736,423 - Matyas April 5, 1
1988-04-05
Offline PIN validation with DES
Grant 4,661,658 - Matyas April 28, 1
1987-04-28
Method for establishing user authenication with composite session keys among cryptographically communicating nodes
Grant 4,649,233 - Bass , et al. March 10, 1
1987-03-10
Cryptographic application for interbank verification
Grant 4,500,750 - Elander , et al. February 19, 1
1985-02-19
Method and apparatus incorporating a one-way sequence for transaction and identity verification
Grant 4,393,269 - Konheim , et al. July 12, 1
1983-07-12
Cryptographic communication and file security using terminals
Grant 4,386,234 - Ehrsam , et al. May 31, 1
1983-05-31
Cryptographic communication security for single domain networks
Grant 4,238,853 - Ehrsam , et al. December 9, 1
1980-12-09
Cryptographic file security for single domain networks
Grant 4,238,854 - Ehrsam , et al. December 9, 1
1980-12-09
Method and apparatus for enciphering blocks which succeed short blocks in a key-controlled block-cipher cryptographic system
Grant 4,229,818 - Matyas , et al. October 21, 1
1980-10-21
Cryptographic communication security for multiple domain networks
Grant 4,227,253 - Ehrsam , et al. October 7, 1
1980-10-07
Method for authenticating the identity of a user of an information system
Grant 4,218,738 - Matyas , et al. August 19, 1
1980-08-19
Digital signature system and apparatus
Grant 4,206,315 - Matyas , et al. June 3, 1
1980-06-03
Cryptographic file security for multiple domain networks
Grant 4,203,166 - Ehrsam , et al. May 13, 1
1980-05-13
Cryptographic verification of operational keys used in communication networks
Grant 4,193,131 - Lennon , et al. March 11, 1
1980-03-11

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed