Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/277
Name: Cryptography > Key management
Description: Subject matter providing supervision or control of a signal necessary for encryption or decryption.

Sub-classes under this class:

Class Number Class Name Patents
380/44 Having particular key generator 1,724
380/278 Key distribution 1,332
380/286 Key escrow or recovery 461

Patents under this class:

Patent Number Title Of Patent Date Issued
8549585 Method and apparatus to implement secured, layered logout from a computer system Oct. 1, 2013
8548171 Pair-wise keying for tunneled virtual private networks Oct. 1, 2013
8543837 Method of randomly and dynamically checking configuration integrity of a gaming system Sep. 24, 2013
8542837 Key selection vector, mobile device and method for processing the key selection vector, digital content output device, and revocation list Sep. 24, 2013
8542834 System and method for securely pairing a wireless peripheral to a host Sep. 24, 2013
8542827 Shared encryption key generation via accelerometer digitization Sep. 24, 2013
8542824 System and method for processing messages with encryptable message parts Sep. 24, 2013
8542103 Radio frequency identification reading by using error correcting codes on sets of tags Sep. 24, 2013
8539610 Software security Sep. 17, 2013
8539564 IP multimedia security Sep. 17, 2013
8539252 Method and system for protecting data Sep. 17, 2013
8539233 Binding content licenses to portable storage devices Sep. 17, 2013
8538919 System, method, and computer program for real time remote recovery of virtual computing machines Sep. 17, 2013
8538027 Storage of keyID in customer data area Sep. 17, 2013
8538017 Encryption device Sep. 17, 2013
8533801 System and method for binding a subscription-based computing system to an internet service Sep. 10, 2013
8533786 Method and apparatus for protecting against attacks from outside content Sep. 10, 2013
8533489 Searchable symmetric encryption with dynamic updating Sep. 10, 2013
8533484 Password-protected physical transfer of password-protected devices Sep. 10, 2013
8533474 Generating session keys Sep. 10, 2013
8533451 Method of encrypted communication with limited number of stored encryption key retrievals Sep. 10, 2013
8532303 Symmetric key distribution framework for the internet Sep. 10, 2013
8532300 Symmetric is encryption key management Sep. 10, 2013
8532299 Method for producing two-dimensional code and reader for reading the two-dimensional code Sep. 10, 2013
8532289 Fast computation of a single coefficient in an inverse polynomial Sep. 10, 2013
8528109 Optimizing amount of data passed during software license activation Sep. 3, 2013
8528060 Method and system for password protocols in the bounded retrieval mode with security dictionary attacks and intrusions Sep. 3, 2013
8528055 Processing performance of repeated device compliance update messages Sep. 3, 2013
8527768 Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework Sep. 3, 2013
8527767 System and method for processing encoded messages for exchange with a mobile data communication device Sep. 3, 2013
8526621 Method and apparatus for time-lapse cryptography Sep. 3, 2013
8526620 Method and system for secure data collection and distribution Sep. 3, 2013
8526619 System and method of restricting recording of contents using device key of content playback device Sep. 3, 2013
8526617 Method of handling security configuration in wireless communications system and related communication device Sep. 3, 2013
8526614 Method to manage members of at least one group of decoders having access to broadcast data Sep. 3, 2013
8526607 Identity authentication and shared key generation method Sep. 3, 2013
8526605 Data encryption to provide data security and memory cell bit wear leveling Sep. 3, 2013
8522324 Control of access to a secondary system Aug. 27, 2013
8522037 Motion-detecting device user authentication Aug. 27, 2013
8522028 Method for secure data exchange between two devices Aug. 27, 2013
8522011 Computer implemented method for authenticating a user Aug. 27, 2013
8522007 Dual cryptographic keying Aug. 27, 2013
8521150 Systems and method for media transfer Aug. 27, 2013
8520856 Controlling the validity period of a decryption key Aug. 27, 2013
8520855 Encapsulation and decapsulation for data disintegration Aug. 27, 2013
8520854 Sharing a secret using polynomials over polynomials Aug. 27, 2013
8520670 Automated operation and security system for virtual private networks Aug. 27, 2013
8516565 IC chip, information processing apparatus, system, method, and program Aug. 20, 2013
8516256 Route optimization in mobile IP networks Aug. 20, 2013
8515079 Hybrid rekey distribution in a virtual private network environment Aug. 20, 2013

  Recently Added Patents
Resistor and manufacturing method thereof
Integrated projector system
Amplitude-shift-keying (ASK) envelope detector and demodulation circuits
Transmission apparatus and network protection method
Universal handle extension for unloading butterfly valve for tank trailer or other vehicle
Mobile communication device
Method and system for modeling a common-language speech recognition, by a computer, under the influence of a plurality of dialects
  Randomly Featured Patents
Polymeric microbeads and methods of preparation
Sealant applicator and method for an automatic fastener machine
Laser processing apparatus and laser processing process
Quaternary compounds having anti-microbial activity
Real-time remote image capture system
Direct AC to AC power conversion apparatus for controlling power delivered to a load
Patio pond
Pipe resistance butt welding apparatus
Golf putter
Holograms embossed into metal surfaces