Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/277
Name: Cryptography > Key management
Description: Subject matter providing supervision or control of a signal necessary for encryption or decryption.

Sub-classes under this class:

Class Number Class Name Patents
380/44 Having particular key generator 1,724
380/278 Key distribution 1,332
380/286 Key escrow or recovery 461

Patents under this class:

Patent Number Title Of Patent Date Issued
8515076 Security system and method using automatic meter reading protocol Aug. 20, 2013
8515075 Method of and system for malicious software detection using critical address space protection Aug. 20, 2013
8515074 User key allocation method for broadcast encryption Aug. 20, 2013
8515073 Method and system for secure communication in near field communication network Aug. 20, 2013
8515072 Method and apparatus for providing secure communications for mobile communication devices Aug. 20, 2013
8515066 Method, apparatus and program for establishing encrypted communication channel between apparatuses Aug. 20, 2013
8515064 Method and an apparatus for key management in a communication network Aug. 20, 2013
8515057 Method and device for executing crytographic calculation Aug. 20, 2013
8510560 Efficient key establishment for wireless networks Aug. 13, 2013
8510554 Key management system, key management method, server apparatus and program Aug. 13, 2013
8510552 System and method for file-level data protection Aug. 13, 2013
8510335 Database and method for controlling access to a database Aug. 13, 2013
8509447 Method and system for distributing cryptographic keys in a hierarchized network Aug. 13, 2013
8509445 Duplication means for an electronically coded key and related method Aug. 13, 2013
8509444 Scramble key management unit, scramble key management information transmitting unit, method for scramble key output management, scramble key management program, license information management Aug. 13, 2013
8509443 Rekey index generation method and rekey index generation apparatus Aug. 13, 2013
8509442 Association, authentication, and security in a network Aug. 13, 2013
8509438 Key management in a wireless network using primary and secondary keys Aug. 13, 2013
8509435 Method and system for a transport single key change point for all package identifier channels Aug. 13, 2013
8509427 Hybrid mode cryptographic method and system with message authentication Aug. 13, 2013
8509101 Systems and methods for a configurable communication device Aug. 13, 2013
8504848 Encrypted communication device with limited number of encryption key retrievals from memory Aug. 6, 2013
8503681 Method and system to securely transport data encryption keys Aug. 6, 2013
8503680 Deriving encryption key selection from a data management retention period Aug. 6, 2013
8503674 Cryptographic key attack mitigation Aug. 6, 2013
8499357 Signing a library file to verify a callback function Jul. 30, 2013
8499157 Device-based password management Jul. 30, 2013
8498420 Symmetric key distribution framework for the internet Jul. 30, 2013
8498419 Wireless perimeter security device and network using same Jul. 30, 2013
8498418 Conversion of cryptographic key protection Jul. 30, 2013
8498417 Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located Jul. 30, 2013
8498412 Method of providing an encrypted data stream Jul. 30, 2013
8495380 Methods and systems for server-side key generation Jul. 23, 2013
8495372 Authentication methods and apparatus using pairing protocols and other techniques Jul. 23, 2013
8494969 Cryptographic server with provisions for interoperability between cryptographic systems Jul. 23, 2013
8494170 Redundant key server encryption environment Jul. 23, 2013
8494169 Validating encrypted archive keys Jul. 23, 2013
8494168 Locating cryptographic keys stored in a cache Jul. 23, 2013
8494167 Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores Jul. 23, 2013
8494166 Use of indirect data keys for encrypted tape cartridges Jul. 23, 2013
8493472 Image sensing apparatus for generating image data and authentication data of the image data Jul. 23, 2013
8489901 Methods and systems for secure encryption of data Jul. 16, 2013
8489893 Encryption key rotation messages written and observed by storage controllers via storage media Jul. 16, 2013
8488795 Method for providing a symmetric key for protecting a key management protocol Jul. 16, 2013
8488794 Method for access control to a scrambled content Jul. 16, 2013
8488793 Efficient rebinding of partitioned content encrypted using broadcast encryption Jul. 16, 2013
8483394 Secure multi-party communication with quantum key distribution managed by trusted authority Jul. 9, 2013
8483392 Methods and apparatus for compensation for corrupted user identification data in wireless networks Jul. 9, 2013
8479014 Symmetric key based secure microprocessor and its applications Jul. 2, 2013
8478266 Method and system for anonymous operation of a mobile node Jul. 2, 2013

  Recently Added Patents
Orthogonal tunable antenna array for wireless communication devices
Identifying a characteristic of an individual utilizing facial recognition and providing a display for the individual
Bezel-less electronic display
Semiconductor memory device, test circuit, and test operation method thereof
Method for generating optical codes for a print-context
Digital-to-analog converter and performing method thereof
Automatic image-content based adjustment of printer printing procedures
  Randomly Featured Patents
Laser therapeutic apparatus
Method for implementing Iu-Flex based MBMS
Airless sprayer
Aqueous correction fluids
System for dispensing drugs
Fabric attaching clip
Photographic films
System and method for graphics culling
Clip for securing hairpiece to natural hair
Electrically operated seat slide apparatus