Validity Report
Basic Report
US10452854B2 — Secure data parser method and system
Priority Date: 2005-11-18, Publication Date: 2019-10-22, Current Assignee: Security First Innovations LLCReport Generated: 2023-03-15

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
US7280658B2●●●●●Systems  methods  and computer program products for accelerated dynamic protection of dataGRANT2007-10-092001-06-01GreatInternational Business Machines CorpSnap Inc
US8171083B2●●●●●System for enhancing the transmission security of the e-mails in the internet networkGRANT2012-05-012003-11-27GreatInternational Business Machines CorpServiceNow Inc
US7934105B1●●●●●Data transfer deviceGRANT2011-04-262005-10-11GreatHewlett Packard Development Co LPHewlett Packard Enterprise Development LP
US6662299B1●●●●●Method and apparatus for reconstituting an encryption key based on multiple user responsesGRANT2003-12-091999-10-28GreatPGP CorpCA Inc
US6819766B1●●●●●Method and system for managing keys for encrypted dataGRANT2004-11-161999-03-30GreatInternational Business Machines CorpInternational Business Machines Corp
US6341164B1●●●●●Method and apparatus for correcting improper encryption and/or for reducing memory storageGRANT2002-01-221998-07-22GreatEntrust LtdEntrust Ltd
US7454021B2●●●●●Off-loading data re-encryption in encrypted data management systemsGRANT2008-11-182004-10-29GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
EP1387236B1●●●●●Key management system and method for secure data transmissionGRANT2007-05-302002-07-08GreatBroadcom CorpBroadcom Corp
US6363480B1●●●●●Ephemeral decryptabilityGRANT2002-03-261999-09-14GreatSun Microsystems IncOracle America Inc
US6085323A●●●●●Information processing system having function of securely protecting confidential informationGRANT2000-07-041996-04-15GreatToshiba CorpToshiba Corp
US7792300B1●●●●●Method and apparatus for re-encrypting data in a transaction-based secure storage systemGRANT2010-09-072003-09-30GreatOracle America IncOracle America Inc
EP1471680B1●●●●●Identifier-Based Encryption method and apparatusGRANT2006-06-212003-04-23GreatHewlett Packard Development Co LPHewlett Packard Development Co LP
US5081678A●●●●●METHOD FOR UTILIZING AN ENCRYPTED KEY AS A KEY IDENTIFIER IN A DATA PACKET IN A COMPUTER NETWORKGRANT1992-01-141989-06-28GreatDigital Equipment CorpHewlett Packard Development Co LP
US5751813A●●●●●Use of an encryption server for encrypting messagesGRANT1998-05-121996-04-29GreatMotorola IncGoogle Technology Holdings LLC
US5940507A●●●●●Secure file archive through encryption key managementGRANT1999-08-171997-02-11GreatConnected CorpMicro Focus LLC
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
8
  HARD
Art VolumeHIGH
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$4,350 — $4,800
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
611
Recommended Classes
153
Government Assigned Classes
7
CPC
Title
Score
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules●●●●●
H04L9/3231Biological data  e.g. fingerprint  voice or retina | network architectures or network communication protocols for supporting authentication of entities using biometrical features in a packet data network | (ref: H04L63/0861)●●●●●
H04L63/0428wherein the data content is protected  e.g. by encrypting or encapsulating the payload●●●●●
H04L63/061for key exchange  e.g. in peer-to-peer networks | cryptographic mechanisms or cryptographic arrangements for key agreement | (ref: H04L9/0838)●●●●●
H04L9/083involving central third party  e.g. key distribution center [KDC] or trusted third party [TTP]●●●●●
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine●●●●●
H04L63/029Firewall traversal  e.g. tunnelling or  creating pinholes●●●●●
H04L63/062for key distribution  e.g. centrally by trusted party | cryptographic mechanisms or cryptographic arrangements for key distribution involving a central third party | (ref: H04L9/0819)●●●●●
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database●●●●●
G06F11/1076Parity data used in redundant arrays of independent storages  e.g. in RAID systems●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.