Patents

CIS PATENTS


This is a partial list of patents (relating to cryptography and information security) that include members of the Cryptography and Information Security Group of MIT's Laboratory for Computer Science as inventors.

These patents, or the inventions on which they are based, were developed while at least one of the inventors was a member of the CIS group. This list attempts to be comprehensive, and includes patents that were developed independently of MIT, the CIS group, or the Laboratory for Computer Science, such as patents that were developed in a consulting relationship. Contact the assignee (or inventor, if no assignee) for further information. Patents are listed in reverse chronological order:

CIS members: Please add your patents here!

We can't help but give a link here to the wonderful IBM Patent Server. (Thanks, IBM!)

6269163 (7/31/2001; Rivest, Robshaw, Sidney, Yin)
Enhanced block ciphers with data-dependent rotations.

5835600 (11/20/1998; Rivest)
Block encryption algorithm with data-dependent rotations.

5812670 (9/22/1998; Micali)
Traceable anonymous transactions.

5793868 (8/11/1998; Micali)
Certificate revocation system.

5790665 (8/4/1998; Micali)
Anonymous information retrieval system (ARS).

5768388 (6/16/1998; Goldwasser, Bellare)
Time delayed key escrow.

5724428 (3/3/1998; Rivest)
Block encryption algorithm with data-dependent rotations.

5717759 (2/10/1998; Micali)
Method for certifying public keys in a digital signature scheme.

5717757 (2/10/1998; Micali)
Certificate issue lists.

5666420 (9/9/1997; Micali)
Simultaneous electronic transactions.

5666416 (9/9/1997; Micali)
Certificate revocation system.

5666413 (9/9/1997; Micali)
Guaranteed partial key-escrow.

5647000 (7/8/1997; Leighton)
Failsafe key escrow system.

5638447 (6/10/1997; Micali)
Compact digital signatures.

5629982 (5/13/1997; Micali)
Simultaneous electronic transactions with visible trusted parties.

5625692 (3/29/1997; Herzberg, Jarecki, Krawczyk, Yung)
Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing.

5615269 (3/25/1997; Micali)
Ideal electronic negotiations.

5610982 (3/11/1997; Micali)
Compact certification with threshold signatures.

5604804 (2/18/1997; Micali)
Method for certifying public keys in a digital signature scheme.

5553145 (9/3/1996; Micali)
Simultaneous electronic transactions with visible trusted parties.

5537475 (7/16/1996; Micali)
Efficient digital signature algorithm and use thereof technical field.

5519778 (5/21/1996; Leighton, Micali)
Method for enabling users of a cryptosystem to generate and use a private pair key for enciphering communications between the users.

5499296 (3/12/1996; Micali)
Natural input encryption and method of use.

5432852 (7/11/1995; Leighton, Micali)
Large provably fast and secure digital signature schemes based on secure hash functions.

5420927 (5/30/1995; Micali)
Method for certifying public keys in a digital signature scheme.

5351302 (9/27/1994; Micali)
Method for authenticating objects identified by images or other identifying information.

5315658 (5/24/1994; Micali)
Fair cryptosystems and methods of use.

5276737 (1/4/1994; Micali) (Reissued 5/26/1998 as: RE35808) Fair cryptosystems and methods of use.

5144667 (9/1/1992; Pogue, Rivest)
Method of secure remote access.

5016274 (5/14/1991; Micali, Goldreich, Even)
On-line/off-line digital signing.

4995081 (2/19/1991; Leighton, Micali)
Method and system for personal identification using proofs of legitimacy.

4944009 (7/24/1990; Micali, Schnorr)
Pseudo-random sequence generator.

4926479 (5/15/1990; Goldwasser, Kilian, Wigderson, Ben-Or)
Multiprover interactive verification system.

4879747 (11/7/1989; Leighton, Micali)
Method and system for personal identification.

4691299 (9/1/1987; Rivest, Shamir)
Method and apparatus for reusing non-erasable memory media.

4405829 (9/20/1983; Rivest, Shamir, Adleman)
Cryptographic communications system and method.

4376299 (3/8/1983; Rivest)
Data center for remote postage meter recharging system having physically secure encrypting apparatus and employing encrypted seed number signals.