Conditional access system
Conditional access system using messages with multiple encryptio
Configuration stream encryption
Consumer oriented smart card system and authentication technique
Controlled acceptance mail payment and evidencing system
Controlled authorization of descrambling of scrambled programs b
Controlled dissemination of digital information
Controlled modular cryptography apparatus and method
Controlled use of cryptographic keys via generating station esta
Controlling access to network resources
Controlling movement of owned parts
Conversion of television signal formats with retention of common
Copy protection of data
Cordless phone system capable of scrambling communication signal
Counterfeit proof ID card having a scrambled facial image
Counterfeit-proof identification card
Crypotographic key version control facility
Crypt key system
Cryptical control method for personal communication
Cryptographic accelerator