| US5301247A (en)* | 1992-07-23 | 1994-04-05 | Crest Industries, Inc. | Method for ensuring secure communications |
| US5237611A (en)* | 1992-07-23 | 1993-08-17 | Crest Industries, Inc. | Encryption/decryption apparatus with non-accessible table of keys |
| US5222136A (en)* | 1992-07-23 | 1993-06-22 | Crest Industries, Inc. | Encrypted communication system |
| US5748735A (en)* | 1994-07-18 | 1998-05-05 | Bell Atlantic Network Services, Inc. | Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography |
| US5535276A (en)* | 1994-11-09 | 1996-07-09 | Bell Atlantic Network Services, Inc. | Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography |
| US5737419A (en)* | 1994-11-09 | 1998-04-07 | Bell Atlantic Network Services, Inc. | Computer system for securing communications using split private key asymmetric cryptography |
| US5784463A (en)* | 1996-12-04 | 1998-07-21 | V-One Corporation | Token distribution, registration, and dynamic configuration of user entitlement for an application level security system and method |
| US6075859A (en)* | 1997-03-11 | 2000-06-13 | Qualcomm Incorporated | Method and apparatus for encrypting data in a wireless communication system |
| EP0936805A1 (en)* | 1998-02-12 | 1999-08-18 | Hewlett-Packard Company | Document transfer systems |
| US7953671B2 (en)* | 1999-08-31 | 2011-05-31 | American Express Travel Related Services Company, Inc. | Methods and apparatus for conducting electronic transactions |
| US6636966B1 (en)* | 2000-04-03 | 2003-10-21 | Dphi Acquisitions, Inc. | Digital rights management within an embedded storage device |
| US7051211B1 (en)* | 2000-08-21 | 2006-05-23 | International Business Machines Corporation | Secure software distribution and installation |
| US7085744B2 (en)* | 2000-12-08 | 2006-08-01 | International Business Machines Corporation | Method and system for conducting a transaction over a network |
| US6978376B2 (en)* | 2000-12-15 | 2005-12-20 | Authentica, Inc. | Information security architecture for encrypting documents for remote access while maintaining access control |
| US7017041B2 (en)* | 2000-12-19 | 2006-03-21 | Tricipher, Inc. | Secure communications network with user control of authenticated personal information provided to network entities |
| US7069435B2 (en)* | 2000-12-19 | 2006-06-27 | Tricipher, Inc. | System and method for authentication in a crypto-system utilizing symmetric and asymmetric crypto-keys |
| US20030115452A1 (en)* | 2000-12-19 | 2003-06-19 | Ravi Sandhu | One time password entry to access multiple network sites |
| US7065642B2 (en)* | 2000-12-19 | 2006-06-20 | Tricipher, Inc. | System and method for generation and use of asymmetric crypto-keys each having a public portion and multiple private portions |
| US7711122B2 (en)* | 2001-03-09 | 2010-05-04 | Arcot Systems, Inc. | Method and apparatus for cryptographic key storage wherein key servers are authenticated by possession and secure distribution of stored keys |
| US7257844B2 (en)* | 2001-07-31 | 2007-08-14 | Marvell International Ltd. | System and method for enhanced piracy protection in a wireless personal communication device |
| US7187772B2 (en)* | 2001-08-31 | 2007-03-06 | Hewlett-Packard Development Company, L.P. | Anonymous transactions based on distributed processing |
| US7146009B2 (en)* | 2002-02-05 | 2006-12-05 | Surety, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption keys |
| US20030226029A1 (en)* | 2002-05-29 | 2003-12-04 | Porter Allen J.C. | System for protecting security registers and method thereof |
| EP1383265A1 (en)* | 2002-07-16 | 2004-01-21 | Nokia Corporation | Method for generating proxy signatures |
| EP3547599A1 (en)* | 2002-08-06 | 2019-10-02 | Apple Inc. | Methods for secure enrollment and backup of personal identity credentials into electronic devices |
| US7469340B2 (en)* | 2002-08-07 | 2008-12-23 | Kryptiq Corporation | Selective encryption of electronic messages and data |
| US20040030918A1 (en)* | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Enterprise based opaque message archives |
| US7299357B2 (en)* | 2002-08-07 | 2007-11-20 | Kryptiq Corporation | Opaque message archives |
| US20040030916A1 (en)* | 2002-08-07 | 2004-02-12 | Karamchedu Murali M. | Preemptive and interactive data solicitation for electronic messaging |
| US20040114766A1 (en)* | 2002-08-26 | 2004-06-17 | Hileman Mark H. | Three-party authentication method and system for e-commerce transactions |
| US10140596B2 (en)* | 2004-07-16 | 2018-11-27 | Bryan S. M. Chua | Third party authentication of an electronic transaction |
| US20060182283A1 (en)* | 2005-02-14 | 2006-08-17 | Tricipher, Inc. | Architecture for asymmetric crypto-key storage |
| WO2006078572A2 (en)* | 2005-01-18 | 2006-07-27 | Tricipher, Inc. | Asymmetric crypto-graphy with rolling key security |
| US7630493B2 (en)* | 2005-01-18 | 2009-12-08 | Tricipher, Inc. | Multiple factor private portion of an asymmetric key |
| JP4954979B2 (en)* | 2005-04-29 | 2012-06-20 | オラクル・インターナショナル・コーポレイション | Systems and methods for fraud monitoring, detection, and hierarchical user authentication |
| US7895437B2 (en)* | 2005-05-31 | 2011-02-22 | Vmware, Inc. | Augmented single factor split key asymmetric cryptography-key generation and distributor |
| US7814538B2 (en)* | 2005-12-13 | 2010-10-12 | Microsoft Corporation | Two-way authentication using a combined code |
| US20070150723A1 (en)* | 2005-12-23 | 2007-06-28 | Estable Luis P | Methods and apparatus for increasing security and control of voice communication sessions using digital certificates |
| CA2661922A1 (en)* | 2006-09-06 | 2008-03-13 | Sslnext, Inc. | Method and system for providing authentication service for internet users |
| US8271788B2 (en)* | 2006-10-17 | 2012-09-18 | Trend Micro Incorporated | Software registration system |
| US8332921B2 (en)* | 2007-01-12 | 2012-12-11 | Wmware, Inc. | Enhanced security for user instructions |
| US8958562B2 (en)* | 2007-01-16 | 2015-02-17 | Voltage Security, Inc. | Format-preserving cryptographic systems |
| JP4941737B2 (en)* | 2007-04-27 | 2012-05-30 | ソニー株式会社 | Recording apparatus and method, and program |
| US8423789B1 (en)* | 2007-05-22 | 2013-04-16 | Marvell International Ltd. | Key generation techniques |
| EP2186253A4 (en)* | 2007-09-04 | 2011-11-30 | Certicom Corp | Signatures with confidential message recovery |
| US8205795B2 (en)* | 2007-09-20 | 2012-06-26 | Felica Networks, Inc. | Communication device, remote server, terminal device, financial card issue system, financial card authentication system, and program |
| GB0805830D0 (en)* | 2008-03-31 | 2008-04-30 | British Telecomm | Keys for protecting user access to media |
| US8095800B2 (en)* | 2008-11-20 | 2012-01-10 | General Dynamics C4 System, Inc. | Secure configuration of programmable logic device |
| US8151333B2 (en)* | 2008-11-24 | 2012-04-03 | Microsoft Corporation | Distributed single sign on technologies including privacy protection and proactive updating |
| US8291239B2 (en)* | 2008-11-25 | 2012-10-16 | Pitney Bowes Inc. | Method and system for authenticating senders and recipients in a carrier system and providing receipt of specified content by a recipient |
| US20100192201A1 (en)* | 2009-01-29 | 2010-07-29 | Breach Security, Inc. | Method and Apparatus for Excessive Access Rate Detection |
| BRPI1013062A2 (en)* | 2009-05-19 | 2016-04-05 | Security First Corp | systems and methods to protect cloud data |
| US20100325431A1 (en)* | 2009-06-19 | 2010-12-23 | Joseph Martin Mordetsky | Feature-Specific Keys for Executable Code |
| US9113042B2 (en)* | 2009-08-28 | 2015-08-18 | Broadcom Corporation | Multi-wireless device channel communications |
| CN106230872A (en)* | 2009-11-25 | 2016-12-14 | 安全第公司 | To moving medial according to the system and method protected |
| CN103238305A (en)* | 2010-05-28 | 2013-08-07 | 安全第一公司 | Accelerator system for use with secure data storage |
| CA2808124A1 (en)* | 2010-08-12 | 2012-02-16 | Don Martin | Systems and methods for secure remote storage of data |
| EP2611061A4 (en)* | 2010-08-24 | 2017-07-19 | Mitsubishi Electric Corporation | Communication terminal, communication system, communication method and communication program |
| US8650654B2 (en)* | 2010-09-17 | 2014-02-11 | Kabushiki Kaisha Toshiba | Memory device, memory system, and authentication method |
| US9282085B2 (en)* | 2010-12-20 | 2016-03-08 | Duo Security, Inc. | System and method for digital user authentication |
| US8677148B2 (en)* | 2011-01-27 | 2014-03-18 | Security First Corp. | Systems and methods for securing data |
| US8627091B2 (en)* | 2011-04-01 | 2014-01-07 | Cleversafe, Inc. | Generating a secure signature utilizing a plurality of key shares |
| JP5624510B2 (en)* | 2011-04-08 | 2014-11-12 | 株式会社東芝 | Storage device, storage system, and authentication method |
| IL213662A0 (en)* | 2011-06-20 | 2011-11-30 | Eliphaz Hibshoosh | Key generation using multiple sets of secret shares |
| KR101620246B1 (en)* | 2011-10-24 | 2016-05-23 | 코닌클리즈케 케이피엔 엔.브이. | Secure distribution of content |
| US20130108045A1 (en)* | 2011-10-27 | 2013-05-02 | Architecture Technology, Inc. | Methods, networks and nodes for dynamically establishing encrypted communications |
| JP5454960B2 (en)* | 2011-11-09 | 2014-03-26 | 株式会社東芝 | Re-encryption system, re-encryption device, and program |
| US20130185214A1 (en)* | 2012-01-12 | 2013-07-18 | Firethorn Mobile Inc. | System and Method For Secure Offline Payment Transactions Using A Portable Computing Device |
| US20130226812A1 (en)* | 2012-02-24 | 2013-08-29 | Mads Landrok | Cloud proxy secured mobile payments |
| US9160535B2 (en)* | 2012-03-19 | 2015-10-13 | Dell Inc | Truly anonymous cloud key broker |
| US10515359B2 (en)* | 2012-04-02 | 2019-12-24 | Mastercard International Incorporated | Systems and methods for processing mobile payments by provisioning credentials to mobile devices without secure elements |
| US9572029B2 (en)* | 2012-04-10 | 2017-02-14 | Imprivata, Inc. | Quorum-based secure authentication |
| US9141647B2 (en)* | 2012-04-26 | 2015-09-22 | Sap Se | Configuration protection for providing security to configuration files |
| WO2013168255A1 (en)* | 2012-05-10 | 2013-11-14 | 三菱電機株式会社 | Application program execution device |
| CN103428172A (en)* | 2012-05-18 | 2013-12-04 | 袁斌 | Method for safely storing information and method for safely reading information |
| US8712044B2 (en)* | 2012-06-29 | 2014-04-29 | Dark Matter Labs Inc. | Key management system |
| US9536047B2 (en)* | 2012-09-14 | 2017-01-03 | Ecole Polytechnique Federale De Lausanne (Epfl) | Privacy-enhancing technologies for medical tests using genomic data |
| US9942750B2 (en)* | 2013-01-23 | 2018-04-10 | Qualcomm Incorporated | Providing an encrypted account credential from a first device to a second device |
| US9306742B1 (en)* | 2013-02-05 | 2016-04-05 | Google Inc. | Communicating a secret |
| US20150372770A1 (en)* | 2013-02-06 | 2015-12-24 | Koninklijke Philips N.V. | Body coupled communiication system |
| CN106462850A (en)* | 2014-04-16 | 2017-02-22 | 维萨国际服务协会 | Secure transmission of payment credentials |
| WO2015198098A1 (en)* | 2014-06-26 | 2015-12-30 | Telefonaktiebolaget L M Ericsson (Publ) | Privacy-preserving querying mechanism on privately encrypted data on semi-trusted cloud |
| US9455968B1 (en)* | 2014-12-19 | 2016-09-27 | Emc Corporation | Protection of a secret on a mobile device using a secret-splitting technique with a fixed user share |
| US9231925B1 (en)* | 2014-09-16 | 2016-01-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
| US9838205B2 (en)* | 2014-09-16 | 2017-12-05 | Keypasco Ab | Network authentication method for secure electronic transactions |
| US9524370B2 (en)* | 2014-11-03 | 2016-12-20 | Ecole Polytechnique Federale De Lausanne (Epfl) | Method for privacy-preserving medical risk test |
| US9489542B2 (en)* | 2014-11-12 | 2016-11-08 | Seagate Technology Llc | Split-key arrangement in a multi-device storage enclosure |