Resources Contact Us Home
Browse by: INVENTOR PATENT HOLDER PATENT NUMBER DATE
 
 
Browse by Category: Main > Information Technology
Class Information
Number: 380/286
Name: Cryptography > Key management > Key escrow or recovery
Description: Subject matter wherein the key is deposited or retrieved to or from a third party.










Patents under this class:
1 2 3 4 5 6 7 8 9 10

Patent Number Title Of Patent Date Issued
8707024 Methods and systems for managing identity management security domains Apr. 22, 2014
8707450 Digital rights management (DRM) locker Apr. 22, 2014
8694774 Method and system for encryption of messages in land mobile radio systems Apr. 8, 2014
8687814 Securing encrypted virtual hard disks Apr. 1, 2014
8688998 Resilent cryptographic scheme Apr. 1, 2014
8675863 Passive system for recovering cryptography keys Mar. 18, 2014
8656159 Versioning of modifiable encrypted documents Feb. 18, 2014
8644510 Discovery of security associations for key management relying on public keys Feb. 4, 2014
8645717 System and method for securely storing firmware Feb. 4, 2014
8638939 User authentication on an electronic device Jan. 28, 2014
8638944 Security countermeasures for power analysis attacks Jan. 28, 2014
8640210 Distributed computer systems with time-dependent credentials Jan. 28, 2014
8639949 Device with a secure virtual machine Jan. 28, 2014
8639928 System and method for mounting encrypted data based on availability of a key on a network Jan. 28, 2014
8634549 Ciphertext key chaining Jan. 21, 2014
8631227 Processing encrypted electronic documents Jan. 14, 2014
8625806 Data-processing apparatus and method for processing data Jan. 7, 2014
8621220 Systems and methods for identity encapsulated cryptography Dec. 31, 2013
8588425 Encryption key recovery in the event of storage management failure Nov. 19, 2013
8572693 Reception apparatus Oct. 29, 2013
8571210 Content protection apparatus and method using binding of additional information to encryption key Oct. 29, 2013
8568226 Master control program for a gaming device Oct. 29, 2013
8553878 Data transformation system using cyclic groups Oct. 8, 2013
8555357 Techniques for mitigating forgotten password attacks Oct. 8, 2013
8548171 Pair-wise keying for tunneled virtual private networks Oct. 1, 2013
8549321 IC chip, board, information processing equipment and storage medium Oct. 1, 2013
8539233 Binding content licenses to portable storage devices Sep. 17, 2013
8539231 Encryption key management Sep. 17, 2013
8538030 Use of graphics processors as parallel math co-processors for password recovery Sep. 17, 2013
8538029 Encryption key fragment distribution Sep. 17, 2013
8533462 Verifying cryptographic identity during media session initialization Sep. 10, 2013
8532289 Fast computation of a single coefficient in an inverse polynomial Sep. 10, 2013
8526614 Method to manage members of at least one group of decoders having access to broadcast data Sep. 3, 2013
8526620 Method and system for secure data collection and distribution Sep. 3, 2013
8520844 Methods and apparatus for providing secure two-party public key cryptosystem Aug. 27, 2013
8515078 Mass subscriber management Aug. 20, 2013
8515081 Approach for managing access to messages using encryption key management policies Aug. 20, 2013
8503681 Method and system to securely transport data encryption keys Aug. 6, 2013
8498418 Conversion of cryptographic key protection Jul. 30, 2013
8498417 Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located Jul. 30, 2013
8494169 Validating encrypted archive keys Jul. 23, 2013
8494170 Redundant key server encryption environment Jul. 23, 2013
8488788 Method for simulcrypting scrambled data to a plurality of conditional access devices Jul. 16, 2013
8490166 Identifying a user account in a social networking system Jul. 16, 2013
8483394 Secure multi-party communication with quantum key distribution managed by trusted authority Jul. 9, 2013
8479020 Method and apparatus for providing an asymmetric encrypted cookie for product data storage Jul. 2, 2013
8468579 Transformation of sequential access control lists utilizing certificates Jun. 18, 2013
8457317 Method for data privacy in a fixed content distributed data storage Jun. 4, 2013
8452012 Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel May. 28, 2013
8429400 VPN processing via service insertion architecture Apr. 23, 2013

1 2 3 4 5 6 7 8 9 10










 
 
  Recently Added Patents
Masking method and apparatus
LED lamp including heat dissipator
Cap
Voltage level shift circuits and methods
Selecting one of a plurality of print modes based on pixel coverage of a document
Digital photographing apparatus
Transaction finance processing system and approach
  Randomly Featured Patents
Flash memory with microcrystalline silicon carbide film floating gate
Lifting device
Process for the production of oryzanol enriched fraction from rice bran oil soapstock
Method for starting an electric starting motor adapted for starting an internal combustion engine
Raw mixture for producing refractory aluminous cement
Shower curtain hook
Interactive toy sprinkler
Steam generator
Apparatus and method for automatically performing channel change of television receiver using video cassette recorder
Variable stiffness fuel rail pulse damper having extended dynamic range