Application number | Title of the application | Filing Date | Status |
---|
Array
(
[id] => 4395853
[patent_doc_number] => 06304657
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-10-16
[patent_title] => 'Data encryption apparatus using odd number of shift-rotations and method'
[patent_app_type] => 1
[patent_app_number] => 9/474531
[patent_app_country] => US
[patent_app_date] => 1999-12-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 12
[patent_figures_cnt] => 15
[patent_no_of_words] => 10040
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 95
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/304/06304657.pdf
[firstpage_image] =>[orig_patent_app_number] => 474531
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/474531 | Data encryption apparatus using odd number of shift-rotations and method | Dec 28, 1999 | Issued |
Array
(
[id] => 4312651
[patent_doc_number] => 06237098
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-05-22
[patent_title] => 'System for protecting weight verification device private key'
[patent_app_type] => 1
[patent_app_number] => 9/256918
[patent_app_country] => US
[patent_app_date] => 1999-02-24
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 5988
[patent_no_of_claims] => 15
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 167
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/237/06237098.pdf
[firstpage_image] =>[orig_patent_app_number] => 256918
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/256918 | System for protecting weight verification device private key | Feb 23, 1999 | Issued |
09/250935 | DATA AUTHENTICATION SYSTEM ENCRYPTED INTEGRITY BLOCKS | Feb 17, 1999 | Abandoned |
09/215934 | CIRCUIT AND METHOD OF CRYPTOGRAPHIC MULTIPLICATION FOR COMPUTING THE RSA AND ECC ALGORITHMS | Dec 17, 1998 | Abandoned |
Array
(
[id] => 4273981
[patent_doc_number] => 06209094
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-03-27
[patent_title] => 'Robust watermark method and apparatus for digital signals'
[patent_app_type] => 1
[patent_app_number] => 9/172936
[patent_app_country] => US
[patent_app_date] => 1998-10-14
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 24
[patent_figures_cnt] => 26
[patent_no_of_words] => 15951
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 73
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/209/06209094.pdf
[firstpage_image] =>[orig_patent_app_number] => 172936
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/172936 | Robust watermark method and apparatus for digital signals | Oct 13, 1998 | Issued |
Array
(
[id] => 4320447
[patent_doc_number] => 06252960
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-06-26
[patent_title] => 'Compression and decompression of elliptic curve data points'
[patent_app_type] => 1
[patent_app_number] => 9/130209
[patent_app_country] => US
[patent_app_date] => 1998-08-04
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 4
[patent_figures_cnt] => 6
[patent_no_of_words] => 7523
[patent_no_of_claims] => 21
[patent_no_of_ind_claims] => 6
[patent_words_short_claim] => 146
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/252/06252960.pdf
[firstpage_image] =>[orig_patent_app_number] => 130209
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/130209 | Compression and decompression of elliptic curve data points | Aug 3, 1998 | Issued |
Array
(
[id] => 4330061
[patent_doc_number] => 06243467
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-06-05
[patent_title] => 'Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form'
[patent_app_type] => 1
[patent_app_number] => 9/120740
[patent_app_country] => US
[patent_app_date] => 1998-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 15
[patent_figures_cnt] => 15
[patent_no_of_words] => 10992
[patent_no_of_claims] => 30
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 241
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/243/06243467.pdf
[firstpage_image] =>[orig_patent_app_number] => 120740
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/120740 | Method of elliptic curve cryptographic digital signature generation and verification using reduced base tau expansion in non-adjacent form | Jul 22, 1998 | Issued |
Array
(
[id] => 4305149
[patent_doc_number] => 06212279
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-04-03
[patent_title] => 'Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form'
[patent_app_type] => 1
[patent_app_number] => 9/120800
[patent_app_country] => US
[patent_app_date] => 1998-07-23
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 6606
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/212/06212279.pdf
[firstpage_image] =>[orig_patent_app_number] => 120800
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/120800 | Method of elliptic curve cryptographic key exchange using reduced base tau expansion in non-adjacent form | Jul 22, 1998 | Issued |
Array
(
[id] => 4392182
[patent_doc_number] => 06289454
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-09-11
[patent_title] => 'Memory configuration which support multiple cryptographical algorithms'
[patent_app_type] => 1
[patent_app_number] => 9/107024
[patent_app_country] => US
[patent_app_date] => 1998-06-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 2832
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 170
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/289/06289454.pdf
[firstpage_image] =>[orig_patent_app_number] => 107024
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/107024 | Memory configuration which support multiple cryptographical algorithms | Jun 28, 1998 | Issued |
Array
(
[id] => 4344645
[patent_doc_number] => 06320966
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-11-20
[patent_title] => 'Cryptographic methods for demonstrating satisfiable formulas from propositional logic'
[patent_app_type] => 1
[patent_app_number] => 9/065051
[patent_app_country] => US
[patent_app_date] => 1998-06-16
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 20038
[patent_no_of_claims] => 34
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 192
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/320/06320966.pdf
[firstpage_image] =>[orig_patent_app_number] => 065051
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/065051 | Cryptographic methods for demonstrating satisfiable formulas from propositional logic | Jun 15, 1998 | Issued |
Array
(
[id] => 4421420
[patent_doc_number] => 06301362
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-10-09
[patent_title] => 'Method and apparatus for cryptographically transforming an input block into an output block'
[patent_app_type] => 1
[patent_app_number] => 9/096615
[patent_app_country] => US
[patent_app_date] => 1998-06-12
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 5
[patent_no_of_words] => 3263
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 303
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/301/06301362.pdf
[firstpage_image] =>[orig_patent_app_number] => 096615
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/096615 | Method and apparatus for cryptographically transforming an input block into an output block | Jun 11, 1998 | Issued |
Array
(
[id] => 4318069
[patent_doc_number] => 06185682
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-02-06
[patent_title] => 'Authentication system'
[patent_app_type] => 1
[patent_app_number] => 9/090101
[patent_app_country] => US
[patent_app_date] => 1998-06-03
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 2
[patent_figures_cnt] => 3
[patent_no_of_words] => 8240
[patent_no_of_claims] => 10
[patent_no_of_ind_claims] => 1
[patent_words_short_claim] => 174
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/185/06185682.pdf
[firstpage_image] =>[orig_patent_app_number] => 090101
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/090101 | Authentication system | Jun 2, 1998 | Issued |
Array
(
[id] => 1490197
[patent_doc_number] => 06367015
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2002-04-02
[patent_title] => 'User authentication using member with either holes or projections'
[patent_app_type] => B1
[patent_app_number] => 09/084323
[patent_app_country] => US
[patent_app_date] => 1998-05-26
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 31
[patent_figures_cnt] => 47
[patent_no_of_words] => 21659
[patent_no_of_claims] => 26
[patent_no_of_ind_claims] => 17
[patent_words_short_claim] => 35
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/367/06367015.pdf
[firstpage_image] =>[orig_patent_app_number] => 09084323
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/084323 | User authentication using member with either holes or projections | May 25, 1998 | Issued |
Array
(
[id] => 4347174
[patent_doc_number] => 06314189
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-11-06
[patent_title] => 'Method and apparatus for quantum communication'
[patent_app_type] => 1
[patent_app_number] => 9/082050
[patent_app_country] => US
[patent_app_date] => 1998-05-20
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 7401
[patent_no_of_claims] => 9
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 142
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/314/06314189.pdf
[firstpage_image] =>[orig_patent_app_number] => 082050
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/082050 | Method and apparatus for quantum communication | May 19, 1998 | Issued |
Array
(
[id] => 4148027
[patent_doc_number] => 06128738
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2000-10-03
[patent_title] => 'Certificate based security in SNA data flows'
[patent_app_type] => 1
[patent_app_number] => 9/064632
[patent_app_country] => US
[patent_app_date] => 1998-04-22
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 7
[patent_figures_cnt] => 7
[patent_no_of_words] => 3665
[patent_no_of_claims] => 5
[patent_no_of_ind_claims] => 3
[patent_words_short_claim] => 138
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/128/06128738.pdf
[firstpage_image] =>[orig_patent_app_number] => 064632
[rel_patent_id] =>[rel_patent_doc_number] =>) 09/064632 | Certificate based security in SNA data flows | Apr 21, 1998 | Issued |
Array
(
[id] => 4318190
[patent_doc_number] => 06185685
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-02-06
[patent_title] => 'Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same'
[patent_app_type] => 1
[patent_app_number] => 8/988850
[patent_app_country] => US
[patent_app_date] => 1997-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 8
[patent_figures_cnt] => 14
[patent_no_of_words] => 8310
[patent_no_of_claims] => 16
[patent_no_of_ind_claims] => 5
[patent_words_short_claim] => 34
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/185/06185685.pdf
[firstpage_image] =>[orig_patent_app_number] => 988850
[rel_patent_id] =>[rel_patent_doc_number] =>) 08/988850 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | Dec 10, 1997 | Issued |
Array
(
[id] => 4239437
[patent_doc_number] => 06088799
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2000-07-11
[patent_title] => 'Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same'
[patent_app_type] => 1
[patent_app_number] => 8/988880
[patent_app_country] => US
[patent_app_date] => 1997-12-11
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 6
[patent_no_of_words] => 4899
[patent_no_of_claims] => 18
[patent_no_of_ind_claims] => 4
[patent_words_short_claim] => 240
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/088/06088799.pdf
[firstpage_image] =>[orig_patent_app_number] => 988880
[rel_patent_id] =>[rel_patent_doc_number] =>) 08/988880 | Security method and system for persistent storage and communications on computer network systems and computer network systems employing the same | Dec 10, 1997 | Issued |
Array
(
[id] => 1565940
[patent_doc_number] => 06363148
[patent_country] => US
[patent_kind] => B1
[patent_issue_date] => 2002-03-26
[patent_title] => 'Method, apparatus and computer program for activating an alternate encryption using an identifier embedded in data'
[patent_app_type] => B1
[patent_app_number] => 08/969819
[patent_app_country] => US
[patent_app_date] => 1997-11-13
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 6
[patent_figures_cnt] => 7
[patent_no_of_words] => 4159
[patent_no_of_claims] => 36
[patent_no_of_ind_claims] => 9
[patent_words_short_claim] => 63
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/363/06363148.pdf
[firstpage_image] =>[orig_patent_app_number] => 08969819
[rel_patent_id] =>[rel_patent_doc_number] =>) 08/969819 | Method, apparatus and computer program for activating an alternate encryption using an identifier embedded in data | Nov 12, 1997 | Issued |
Array
(
[id] => 4330046
[patent_doc_number] => 06243466
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-06-05
[patent_title] => 'Auto-escrowable and auto-certifiable cryptosystems with fast key generation'
[patent_app_type] => 1
[patent_app_number] => 8/920504
[patent_app_country] => US
[patent_app_date] => 1997-08-29
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 5
[patent_figures_cnt] => 7
[patent_no_of_words] => 6088
[patent_no_of_claims] => 2
[patent_no_of_ind_claims] => 2
[patent_words_short_claim] => 169
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/243/06243466.pdf
[firstpage_image] =>[orig_patent_app_number] => 920504
[rel_patent_id] =>[rel_patent_doc_number] =>) 08/920504 | Auto-escrowable and auto-certifiable cryptosystems with fast key generation | Aug 28, 1997 | Issued |
Array
(
[id] => 4275769
[patent_doc_number] => 06259790
[patent_country] => US
[patent_kind] => NA
[patent_issue_date] => 2001-07-10
[patent_title] => 'Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion'
[patent_app_type] => 1
[patent_app_number] => 8/907852
[patent_app_country] => US
[patent_app_date] => 1997-08-08
[patent_effective_date] => 0000-00-00
[patent_drawing_sheets_cnt] => 40
[patent_figures_cnt] => 40
[patent_no_of_words] => 28098
[patent_no_of_claims] => 50
[patent_no_of_ind_claims] => 28
[patent_words_short_claim] => 125
[patent_maintenance] => 1
[patent_no_of_assignments] => 0
[patent_current_assignee] =>[type] => patent
[pdf_file] => patents/06/259/06259790.pdf
[firstpage_image] =>[orig_patent_app_number] => 907852
[rel_patent_id] =>[rel_patent_doc_number] =>) 08/907852 | Secret communication and authentication scheme based on public key cryptosystem using N-adic expansion | Aug 7, 1997 | Issued |