Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/277
Name: Cryptography > Key management
Description: Subject matter providing supervision or control of a signal necessary for encryption or decryption.

Sub-classes under this class:

Class Number Class Name Patents
380/44 Having particular key generator 1,724
380/278 Key distribution 1,332
380/286 Key escrow or recovery 461

Patents under this class:

Patent Number Title Of Patent Date Issued
8515076 Security system and method using automatic meter reading protocol Aug. 20, 2013
8515075 Method of and system for malicious software detection using critical address space protection Aug. 20, 2013
8515074 User key allocation method for broadcast encryption Aug. 20, 2013
8515073 Method and system for secure communication in near field communication network Aug. 20, 2013
8515072 Method and apparatus for providing secure communications for mobile communication devices Aug. 20, 2013
8515066 Method, apparatus and program for establishing encrypted communication channel between apparatuses Aug. 20, 2013
8515064 Method and an apparatus for key management in a communication network Aug. 20, 2013
8515057 Method and device for executing crytographic calculation Aug. 20, 2013
8510560 Efficient key establishment for wireless networks Aug. 13, 2013
8510554 Key management system, key management method, server apparatus and program Aug. 13, 2013
8510552 System and method for file-level data protection Aug. 13, 2013
8510335 Database and method for controlling access to a database Aug. 13, 2013
8509447 Method and system for distributing cryptographic keys in a hierarchized network Aug. 13, 2013
8509445 Duplication means for an electronically coded key and related method Aug. 13, 2013
8509444 Scramble key management unit, scramble key management information transmitting unit, method for scramble key output management, scramble key management program, license information management Aug. 13, 2013
8509443 Rekey index generation method and rekey index generation apparatus Aug. 13, 2013
8509442 Association, authentication, and security in a network Aug. 13, 2013
8509438 Key management in a wireless network using primary and secondary keys Aug. 13, 2013
8509435 Method and system for a transport single key change point for all package identifier channels Aug. 13, 2013
8509427 Hybrid mode cryptographic method and system with message authentication Aug. 13, 2013
8509101 Systems and methods for a configurable communication device Aug. 13, 2013
8504848 Encrypted communication device with limited number of encryption key retrievals from memory Aug. 6, 2013
8503681 Method and system to securely transport data encryption keys Aug. 6, 2013
8503680 Deriving encryption key selection from a data management retention period Aug. 6, 2013
8503674 Cryptographic key attack mitigation Aug. 6, 2013
8499357 Signing a library file to verify a callback function Jul. 30, 2013
8499157 Device-based password management Jul. 30, 2013
8498420 Symmetric key distribution framework for the internet Jul. 30, 2013
8498419 Wireless perimeter security device and network using same Jul. 30, 2013
8498418 Conversion of cryptographic key protection Jul. 30, 2013
8498417 Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located Jul. 30, 2013
8498412 Method of providing an encrypted data stream Jul. 30, 2013
8495380 Methods and systems for server-side key generation Jul. 23, 2013
8495372 Authentication methods and apparatus using pairing protocols and other techniques Jul. 23, 2013
8494969 Cryptographic server with provisions for interoperability between cryptographic systems Jul. 23, 2013
8494170 Redundant key server encryption environment Jul. 23, 2013
8494169 Validating encrypted archive keys Jul. 23, 2013
8494168 Locating cryptographic keys stored in a cache Jul. 23, 2013
8494167 Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores Jul. 23, 2013
8494166 Use of indirect data keys for encrypted tape cartridges Jul. 23, 2013
8493472 Image sensing apparatus for generating image data and authentication data of the image data Jul. 23, 2013
8489901 Methods and systems for secure encryption of data Jul. 16, 2013
8489893 Encryption key rotation messages written and observed by storage controllers via storage media Jul. 16, 2013
8488795 Method for providing a symmetric key for protecting a key management protocol Jul. 16, 2013
8488794 Method for access control to a scrambled content Jul. 16, 2013
8488793 Efficient rebinding of partitioned content encrypted using broadcast encryption Jul. 16, 2013
8483394 Secure multi-party communication with quantum key distribution managed by trusted authority Jul. 9, 2013
8483392 Methods and apparatus for compensation for corrupted user identification data in wireless networks Jul. 9, 2013
8479014 Symmetric key based secure microprocessor and its applications Jul. 2, 2013
8478266 Method and system for anonymous operation of a mobile node Jul. 2, 2013

  Recently Added Patents
Ejection station
Method of forming a semiconductor package
Position detection device, pointing device and input device
Automatic misalignment balancing scheme for multi-patterning technology
Dynamic reconstruction of a calibration state of an absorption spectrometer
Multi-channel memory system including error correction decoder architecture with efficient area utilization
Mobile advertising and compensation-verification system
  Randomly Featured Patents
CSP BGA test socket with insert
Biaxial core compression
Portable fiber optic workstation assembly
Removal of PCBS and other halogenated organic compounds from organic fluids
Neon sign power supply circuit with automatic power interruption
Kniphofia plant named `Red Rocket`
Method of making a personalized stuffed toy
Automobile body with a retractable hard top roof
Solid state force transducer, support and method of making same