http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11057198-B2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_4aaeec7128b15408492b898c024ba91a
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-50
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q2220-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L2209-38
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3829
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-50
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0643
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0281
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3827
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-0894
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-085
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L9-3236
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06Q20-3823
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-0428
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-00
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-08
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06Q20-38
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L9-32
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
filingDate 2017-03-01-04:00^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 2021-07-06-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d5eaaad387cd9b479a88bef965b6cd72
publicationDate 2021-07-06-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber US-11057198-B2
titleOfInvention Utilization of a proxy technique in escrow encryption key usage
abstract In one or more embodiments, an encryption key of a device may be split into multiple segments. One of the segments may be retained by an owner of the device, and some of the segments may be distributed to multiple entities. For example, one of the segments may be provided to a service provider, and one of the segments may be provided to an escrow agent. The escrow agent may process its segment, provide information based on its segment to a public ledger, and destroy its segment. A proxy agent may retrieve, from the public ledger, the information based on the segment provided to the escrow agent and obtain compensation. When the proxy agent obtains the compensation, the public ledger exhibits information utilizable to obtain the segment provided to the escrow agent. With the segments provided to the escrow agent and the service provider, the encryption key may be obtained.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2020311678-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11405395-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2020313884-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2019173884-A1
priorityDate 2016-03-04-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID3013459
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID416217298

Total number of triples: 34.