Resources Contact Us Home
Browse by Category: Main > Information Technology
Class Information
Number: 380/277
Name: Cryptography > Key management
Description: Subject matter providing supervision or control of a signal necessary for encryption or decryption.

Sub-classes under this class:

Class Number Class Name Patents
380/44 Having particular key generator 1,724
380/278 Key distribution 1,332
380/286 Key escrow or recovery 461

Patents under this class:

Patent Number Title Of Patent Date Issued
8434138 One time password Apr. 30, 2013
8429421 Server-side encrypted pattern matching Apr. 23, 2013
8429414 Apparatus and method of generating and detecting prevention and control data for verifying validity of data Apr. 23, 2013
8429405 System and method for human assisted secure information exchange Apr. 23, 2013
8429402 Method and arrangement for authenticating a control unit and transmitting authentication information messages to the control unit Apr. 23, 2013
8429389 ROM BIOS based trusted encrypted operating system Apr. 23, 2013
8428554 Method for authenticating a mobile unit attached to a femtocell that operates according to code division multiple access Apr. 23, 2013
8428266 Method and terminal for implementing hot-plug of smart card Apr. 23, 2013
8428265 Method and apparatus of securely processing data for file backup, de-duplication, and restoration Apr. 23, 2013
8423795 Storage controller comprising encryption function, data encryption method, and storage system Apr. 16, 2013
8423788 Secure memory card with life cycle phases Apr. 16, 2013
8423780 Encryption based security system for network storage Apr. 16, 2013
8422685 Method for elliptic curve scalar multiplication Apr. 16, 2013
8422684 Security classes in a media key block Apr. 16, 2013
8422683 Appraising systems with zero knowledge proofs Apr. 16, 2013
8422682 Method and system of generating immutable audit logs Apr. 16, 2013
8422681 Non-interactive hierarchical identity-based key-agreement Apr. 16, 2013
8422680 Method for validating encrypted communications via selection and comparison of source transmitter and destination receiver associated encryption keys Apr. 16, 2013
8417968 Secure repository with layers of tamper resistance and system and method for providing same Apr. 9, 2013
8417967 Storage device data encryption using a binary large object (BLOB) Apr. 9, 2013
8417951 Roaming authentication method based on WAPI Apr. 9, 2013
8417934 Method and apparatus for integrating precise time protocol and media access control security in network elements Apr. 9, 2013
8417933 Inter-entity coupling method, apparatus and system for service protection Apr. 9, 2013
8416955 Method for determining functions applied to signals Apr. 9, 2013
8416954 Systems and methods for accessing storage or network based replicas of encrypted volumes with no additional key management Apr. 9, 2013
8416953 Data protection system that protects data by encrypting the data Apr. 9, 2013
8416949 Actor node, sensor node, coverage block change method, parameter change method, program, and information processing system Apr. 9, 2013
8412936 Binding content licenses to portable storage devices Apr. 2, 2013
8411864 Method of modifying secrets included in a cryptographic module, notably in an unprotected environment Apr. 2, 2013
8411863 Full volume encryption in a clustered environment Apr. 2, 2013
8411760 System, method, and apparatus for displaying pictures Apr. 2, 2013
8411129 Video conference system and method using multicast and unicast transmissions Apr. 2, 2013
8407782 Data copyright management Mar. 26, 2013
8407484 Flash memory distribution of digital content Mar. 26, 2013
8407475 Augmented single factor split key asymmetric cryptography-key generation and distributor Mar. 26, 2013
8402277 Secure mailbox printing system with authentication on both host and device Mar. 19, 2013
8401195 Method of automatically populating a list of managed secure communications group members Mar. 19, 2013
8401191 Efficient broadcast entitlement management message delivery mechanism using a scheduled delivery window Mar. 19, 2013
8401184 Device to generate a machine specific identification key Mar. 19, 2013
8401182 Method of and device for updating group key Mar. 19, 2013
8397083 System and method for efficiently deleting a file from secure storage served by a storage system Mar. 12, 2013
8397058 System and method for communication between smart cards Mar. 12, 2013
8396221 Secure broadcasting and multicasting Mar. 12, 2013
8396208 Memory system with in stream data encryption/decryption and error correction Mar. 12, 2013
8392961 Dynamic access control in a content-based publish/subscribe system with delivery guarantees Mar. 5, 2013
8392716 Communication apparatus, digital signature issuance method and apparatus, and digital signature transmission method Mar. 5, 2013
8392703 Electronic signature verification method implemented by secret key infrastructure Mar. 5, 2013
8392702 Token-based management system for PKI personalization process Mar. 5, 2013
8391884 System and method for managing created location contexts in a location server Mar. 5, 2013
8391495 Secure shell used to open a user's encrypted file system keystore Mar. 5, 2013

  Recently Added Patents
Systems and methods for synchronizing and controlling multiple image sensors
Resin composition and display device using the same
Magnetic memory element, driving method for same, and nonvolatile storage device
Low latency interrupt collector
Socket type MEMS device with stand-off portion
Mirror drift compensation in an optical circuit switch
Fabrication of thin pellicle beam splitters
  Randomly Featured Patents
Video disc player apparatus for establishing electrical connection between a stylus electrode and a signal processing circuit
Portable wireless telephone
Butterfly bow package decoration
Cache coherence directory eviction mechanisms in multiprocessor systems which maintain transaction ordering
Spring assembly for upholstered seats
Oversubscribed packet stream-based interconnect protocol
Packet data support node and method of activating packet flow contexts during handover
System for allocating worm optical medium file storage in groups of fixed size addressable areas while tracking unrecorded areas and end of volume
Method of calibrating a rollover sensor
Merging images to form a panoramic image