Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 380/277
Name: Cryptography > Key management
Description: Subject matter providing supervision or control of a signal necessary for encryption or decryption.










Sub-classes under this class:

Class Number Class Name Patents
380/44 Having particular key generator 1,724
380/278 Key distribution 1,332
380/286 Key escrow or recovery 461


Patents under this class:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next

Patent Number Title Of Patent Date Issued
8204225 Method and apparatus for providing security in a radio frequency identification system Jun. 19, 2012
8201262 Contents distribution system, contents distribution method, terminal apparatus, and recording medium on which program thereof is recorded Jun. 12, 2012
8201261 Secure data storage system and method Jun. 12, 2012
8201233 Secure extended authentication bypass Jun. 12, 2012
8200986 Computer enabled secure status return Jun. 12, 2012
8200973 Method and apparatus for encrypted authentication Jun. 12, 2012
8200967 Method of configuring a node, related node and configuration server Jun. 12, 2012
8199912 Security storage of electronic keys within volatile memories Jun. 12, 2012
8196189 Simple, secure login with multiple authentication providers Jun. 5, 2012
8195956 Re-keying data in place Jun. 5, 2012
8195933 Method and system for computing digital certificate trust paths using transitive closures Jun. 5, 2012
8194858 Chaotic cipher system and method for secure communication Jun. 5, 2012
8191159 Data security for digital data storage May. 29, 2012
8191144 Network infrastructure validation of network management frames May. 29, 2012
8191131 Obscuring authentication data of remote user May. 29, 2012
8190895 Authenticated key exchange with derived ephemeral keys May. 29, 2012
8190887 Cable network system and method for controlling security in cable network encrypted dynamic multicast session May. 29, 2012
8189862 Visible authentication patterns for printed document May. 29, 2012
8189794 System and method for effectively performing data restore/migration procedures May. 29, 2012
8189793 Key terminal apparatus, crypto-processing LSI, unique key generation method, and content system May. 29, 2012
8189790 Developing initial and subsequent keyID information from a unique mediaID value May. 29, 2012
8189786 Encryption system May. 29, 2012
8189779 Quantum program concealing device and quantum program concealing method May. 29, 2012
8185947 System, method and apparatus for securely exchanging security keys and monitoring links in a IP communications network May. 22, 2012
8185935 Method and apparatus for dynamic home address assignment by home agent in multiple network interworking May. 22, 2012
8185752 Method and system for providing data field encryption and storage May. 22, 2012
8185478 Systems and methods for conducting transactions and communications using a trusted third party May. 22, 2012
8184989 Communication system and timing control method May. 22, 2012
8184813 Encryption key generation device May. 22, 2012
8184808 Chaotic asymmetric encryption process for data security May. 22, 2012
8184807 Content distribution/browsing system, content distribution apparatus, content browsing apparatus and program May. 22, 2012
8181223 Electronic apparatus conducting two-port authentication, method of authenticating and receiving job data, an recording medium containing job data authentication-reception program May. 15, 2012
8181222 Locally adaptable central security management in a heterogeneous network environment May. 15, 2012
8181028 Method for secure system shutdown May. 15, 2012
8181018 Master key trust grants and revocations for minor keys May. 15, 2012
8180708 Watermarking system that executes received watermarking instructions to embed a watermark May. 15, 2012
8180060 Telemedical system May. 15, 2012
8180059 Management apparatus, terminal apparatus, and copyright protection system May. 15, 2012
8180049 Signature schemes using bilinear mappings May. 15, 2012
8180047 Trapdoor pairings May. 15, 2012
8176328 Authentication of access points in wireless local area networks May. 8, 2012
8176249 Methods for embedding session secrets, within application instances May. 8, 2012
8175276 Encryption apparatus with diverse key retention schemes May. 8, 2012
8175269 System and method for enterprise security including symmetric key protection May. 8, 2012
8171560 Secure content pre-distribution to designated systems May. 1, 2012
8171542 Advanced encryption standard to provide hardware key interface May. 1, 2012
8171531 Universal authentication token May. 1, 2012
8171525 Enabling users to select between secure service providers using a central trusted service manager May. 1, 2012
8171289 Method and apparatus to provide authentication and privacy with low complexity devices May. 1, 2012
8171275 ROM BIOS based trusted encrypted operating system May. 1, 2012

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next










 
 
  Recently Added Patents
Dynamic allocation of access channels based on access channel occupancy in a cellular wireless communication system
(4935
Antimony and germanium complexes useful for CVD/ALD of metal thin films
Secure Flash-based memory system with fast wipe feature
Plants and seeds of hybrid corn variety CH979678
RFID device using single antenna for multiple resonant frequency ranges
Ranging method and apparatus in passive optical network
  Randomly Featured Patents
Unsaturated urethanized polyester resins, a process for their production and their use for the production of coatings
Method of fabricating shallow trench isolation (STI)
Network address conversion system for enabling access to a node having a private IP address, a method therefor, and a recording medium for recording the method
Production method for a lateral electro-optical modulator on silicon with auto-aligned implanted zones
Optical system for endoscopes
Semiconductor memory controller for reducing pass through current
Method and apparatus for stacking flat articles into a cartridge
Memory protected against attacks by error injection in memory cells selection signals
Activated work and method of forming same
Drum head with sound attenuating center coating