CRYPTOGRAPHIC

Brand Owner (click to sort) Address Description
(CE)2 Certicom Corp. 200 Matheson Boulevard West
Mississauga, Ontario L5R 3L7
CA
cryptographic and information security consulting, technology ...
CE Certicom Corp. 200 Matheson Boulevard West
Mississauga, Ontario L5R 3L7
CA
cryptographic and information security consulting, technology ...
CERTICOM CERTICOM CORP. 5520 Explorer Drive
4th Floor
Mississauga L4W 5L1
cryptographic and information security consulting; computer ...
CERTICOM ELLIPTIC CURVE ENGINE CERTICOM CORP. 5520 Explorer Drive
4th Floor
Mississauga L4W 5L1
CRYPTOGRAPHIC AND INFORMATION SECURITY CONSULTING; COMPUTER ...
CSS/CERTAINTY Certicom Corp. 200 Matheson Boulevard West
Mississauga, Ontario L5R 3L7
CA
cryptographic and information security consulting, technology ...
CSS/IDENTITY Certicom Corp. 200 Matheson Boulevard West
Mississauga, Ontario L5R 3L7
CA
cryptographic and information security consulting, technology ...
CSS/PRIVACY Certicom Corp. 200 Matheson Boulevard West
Mississauga, Ontario L5R 3L7
CA
cryptographic and information security consulting, technology ...
EPKI Certicom Corp. 200 Matheson Boulevard West. Suite 103
Mississauga Ontario
CA
cryptographic and information security consulting, computer ...
MOBILETRUST CERTICOM CORP. 200 Matheson Boulevard West
Suite 103
Mississauga, Ontario
CA
Cryptographic and information security consulting; technology ...
SECURITY BUILDER CERTICOM CORP. 5520 Explorer Drive
4th Floor
Mississauga L4W 5L1
cryptographic and information security consulting; computer ...
STAR TECHNOLOGIES DSCI P.O. Box 479
Eatontown NJ 07724
Engineering services, engineering for the federal ...
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. The invention is directed to a data-processing system comprising a processor, a second encrypted cryptographic key stored in a first persistent memory, and a cryptographic co-processor that comprises a first register and a second register. The cryptographic co-processor serves for decrypting in a decryption step the second encrypted cryptographic key, thereby generating therefrom a second unencrypted cryptographic key that is usable by the processor for executing an operation. For the decryption step the first register is loadable with the second encrypted cryptographic key and the second register is loadable with a first cryptographic key. The resulting second unencrypted cryptographic key is maintainable in one of the registers for being used by the cryptographic co-processor for decrypting encrypted information or encrypting unencrypted information for the operation.