1
Alexander G Dickinson, Roger S Davenport, Mark S Ohare, Philip W Clough, Mark D Rohrbach, Richard F Clayton, James G Zoccoli, Gregory H Stark, Rick L Orsini, Michelle Ferrante, Aaron A Brooks: Server-side implementation of a cryptographic system. Security First Corporation, Preston Gates Ellis & Rouvelas Meeds, March 6, 2007: US07187771 (67 worldwide citation)

The invention is a secure server, or trust engine, having server-centric keys, or in other words, storing cryptographic keys and user authentication data on a server. Users access cryptographic functionality through network access to the trust engine; however, the trust engine does not release actua ...


2
Dickinson Alexander G, Davenport Roger S, Ohare Mark S, Clough Philip W, Rohrbach Mark D, Clayton Richard F, Zoccoli James G, Stark Gregory H, Orsini Rick L, Ferrante Michelle, Brooks Aaron A: Server-side implementation of a cryptographic system. Ethentica, ALTMAN Daniel E, March 29, 2001: WO/2001/022650 (2 worldwide citation)

The invention is a secure server, or trust engine, having server-centric keys, or in other words, storing cryptographic keys and user authentication data on a server. Users access cryptographic functionality through network access to the trust engine; however, the trust engine does not release actua ...


3
Douglas Pelton, Waeed Sherzai, Catherine Li, Ruven Schwartz: Distributed cryptographic management for computer systems. Wells Fargo Bank N A, Merchant & Gould P C, April 25, 2017: US09634834

An administrator installs a key management agent on a previously approved client machine. The agent is started on the client machine, which posts requests for keys to a central key management service. The central key management service logs requests posted to it by clients, and checks for existing p ...