| Number | Name | Date | Kind |
|---|---|---|---|
| 5126728 | Hall | Jun 1992 | A |
| 5319776 | Hile et al. | Jun 1994 | A |
| 5511163 | Lerche et al. | Apr 1996 | A |
| 5550984 | Gelb | Aug 1996 | A |
| 5613012 | Hoffman et al. | Mar 1997 | A |
| 5623600 | Ji et al. | Apr 1997 | A |
| 5724425 | Chang et al. | Mar 1998 | A |
| 5764789 | Pare, Jr. et al. | Jun 1998 | A |
| 5771291 | Newton et al. | Jun 1998 | A |
| 5802178 | Holden et al. | Sep 1998 | A |
| 5815571 | Finley | Sep 1998 | A |
| 5832228 | Holden et al. | Nov 1998 | A |
| 5960177 | Tanno | Sep 1999 | A |
| 5991402 | Jia et al. | Nov 1999 | A |
| 6088804 | Hill | Jul 2000 | A |
| 6092194 | Touboul | Jul 2000 | A |
| 6115393 | Engel | Sep 2000 | A |
| H1944 | Cheswick et al. | Feb 2001 | H |
| Number | Date | Country |
|---|---|---|
| WO 9821683 | May 1998 | WO |
| Entry |
|---|
| Software Hooks Up Database, 1992, Open Systems Today, n 096.* |
| Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition; Subchapter 4.14 “Key Escrow” —pp. 97-100; Bruce Schneier; Published: Oct. 1995. |