Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 380/286
Name: Cryptography > Key management > Key escrow or recovery
Description: Subject matter wherein the key is deposited or retrieved to or from a third party.










Patents under this class:
1 2 3 4 5 6 7 8 9 10

Patent Number Title Of Patent Date Issued
8707024 Methods and systems for managing identity management security domains Apr. 22, 2014
8707450 Digital rights management (DRM) locker Apr. 22, 2014
8694774 Method and system for encryption of messages in land mobile radio systems Apr. 8, 2014
8687814 Securing encrypted virtual hard disks Apr. 1, 2014
8688998 Resilent cryptographic scheme Apr. 1, 2014
8675863 Passive system for recovering cryptography keys Mar. 18, 2014
8656159 Versioning of modifiable encrypted documents Feb. 18, 2014
8644510 Discovery of security associations for key management relying on public keys Feb. 4, 2014
8645717 System and method for securely storing firmware Feb. 4, 2014
8638939 User authentication on an electronic device Jan. 28, 2014
8638944 Security countermeasures for power analysis attacks Jan. 28, 2014
8640210 Distributed computer systems with time-dependent credentials Jan. 28, 2014
8639949 Device with a secure virtual machine Jan. 28, 2014
8639928 System and method for mounting encrypted data based on availability of a key on a network Jan. 28, 2014
8634549 Ciphertext key chaining Jan. 21, 2014
8631227 Processing encrypted electronic documents Jan. 14, 2014
8625806 Data-processing apparatus and method for processing data Jan. 7, 2014
8621220 Systems and methods for identity encapsulated cryptography Dec. 31, 2013
8588425 Encryption key recovery in the event of storage management failure Nov. 19, 2013
8572693 Reception apparatus Oct. 29, 2013
8571210 Content protection apparatus and method using binding of additional information to encryption key Oct. 29, 2013
8568226 Master control program for a gaming device Oct. 29, 2013
8553878 Data transformation system using cyclic groups Oct. 8, 2013
8555357 Techniques for mitigating forgotten password attacks Oct. 8, 2013
8548171 Pair-wise keying for tunneled virtual private networks Oct. 1, 2013
8549321 IC chip, board, information processing equipment and storage medium Oct. 1, 2013
8539233 Binding content licenses to portable storage devices Sep. 17, 2013
8539231 Encryption key management Sep. 17, 2013
8538030 Use of graphics processors as parallel math co-processors for password recovery Sep. 17, 2013
8538029 Encryption key fragment distribution Sep. 17, 2013
8533462 Verifying cryptographic identity during media session initialization Sep. 10, 2013
8532289 Fast computation of a single coefficient in an inverse polynomial Sep. 10, 2013
8526614 Method to manage members of at least one group of decoders having access to broadcast data Sep. 3, 2013
8526620 Method and system for secure data collection and distribution Sep. 3, 2013
8520844 Methods and apparatus for providing secure two-party public key cryptosystem Aug. 27, 2013
8515078 Mass subscriber management Aug. 20, 2013
8515081 Approach for managing access to messages using encryption key management policies Aug. 20, 2013
8503681 Method and system to securely transport data encryption keys Aug. 6, 2013
8498418 Conversion of cryptographic key protection Jul. 30, 2013
8498417 Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located Jul. 30, 2013
8494169 Validating encrypted archive keys Jul. 23, 2013
8494170 Redundant key server encryption environment Jul. 23, 2013
8488788 Method for simulcrypting scrambled data to a plurality of conditional access devices Jul. 16, 2013
8490166 Identifying a user account in a social networking system Jul. 16, 2013
8483394 Secure multi-party communication with quantum key distribution managed by trusted authority Jul. 9, 2013
8479020 Method and apparatus for providing an asymmetric encrypted cookie for product data storage Jul. 2, 2013
8468579 Transformation of sequential access control lists utilizing certificates Jun. 18, 2013
8457317 Method for data privacy in a fixed content distributed data storage Jun. 4, 2013
8452012 Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel May. 28, 2013
8429400 VPN processing via service insertion architecture Apr. 23, 2013

1 2 3 4 5 6 7 8 9 10










 
 
  Recently Added Patents
Mold for nanoimprinting, its production process, and processes for producing molded resin having fine concavo-convex structure on its surface and wire-grid polarizer
Packaging article
Image forming apparatus
Asymmetric switching rectifier
Compositions and processes for forming photovoltaic devices
Soybean cultivar CL0911610
Method and system for tracking mobile electronic devices while conserving cellular network resources
  Randomly Featured Patents
Input/output block and operation thereof
Gas-timing method for depositing oxynitride films by reactive R.F. magnetron sputtering
Square lip balm container
Foldable artist easel
Digitizer stylus with pressure transducer
Planetary gear train for automatic transmission
Tennis elbow splint
Animal harness
Persistence specification system and method for producing persistent and transient submaps in a management station for a data communication network
System and method for adaptive flow control