|
2020
|
Invention
|
Data communication between a group of users. Systems and methods are described for implementing c... |
|
|
G/S
|
Computer software consultancy services in the field of customer security, identification and acce... |
|
|
G/S
|
Software in the field of customer security, identification and access management. Software consul... |
|
|
Invention
|
Systems and methods for quorum-based data processing. The present disclosure includes systems and... |
|
2019
|
Invention
|
Data verification. Systems and methods for user identity and transaction authentication are descr... |
|
|
Invention
|
Binding data to a person's identity. Methods and systems are described for creating irrefutable b... |
|
|
Invention
|
Ciphertext based quorum cryptosystem. Methods are described for constructing a secret key by mult... |
|
2018
|
Invention
|
Systems and methods for quorum-based data recovery. The present disclosure includes systems and m... |
|
|
Invention
|
Method and apparatus for time limited messages in packet communications. Systems and methods for ... |
|
2017
|
Invention
|
Controlled and verifiable information destruction. Digital data archival methods and systems are ... |
|
|
Invention
|
Stream cipher system.
A cipher encryption system and method, where the ciphertext that is produc... |
|
|
Invention
|
Public key cryptosystem based on partitioning of galois field elements.
A post-quantum, public k... |
|
|
Invention
|
Multiple secrets in quorum based data processing. Methods are described for constructing a secret... |
|
2016
|
G/S
|
(Based on 44(e)) (Based on Use in Commerce) Software in relation to data security and encryption ... |
|
|
G/S
|
Software used for data security and encryption Computer software consultancy |
|
|
G/S
|
Software for electronic data security and encryption Software consultancy |
|
|
G/S
|
Software, namely, software for data security and encryption. Software consulting, namely, consult... |
|
|
G/S
|
Software for data security and encryption (including software for the manipulation, authenticatio... |
|
|
G/S
|
Software. Software consultancy. |
|
2015
|
Invention
|
Binding a data transaction to a person's identity using biometrics. Methods and systems are descr... |
|
|
Invention
|
Methods, systems and apparatus for public key encryption using error correcting codes.
This inve... |
|
2014
|
Invention
|
System and method for management of persistent and irrefutable instant messages. The present disc... |
|
|
Invention
|
Method and apparatus for time limited messages in packet communications. Systems and methods are ... |
|
|
Invention
|
Binding a digital file to a person's identity using biometrics. A method and system are described... |
|
2013
|
Invention
|
Digital file authentication using biometrics. This invention provides a means of authenticating d... |
|
2011
|
Invention
|
Public key encryption system using error correcting codes. This invention provides improved secur... |
|
|
Invention
|
Public key cryptosystem based on goppa codes and puf based random generation. This invention prov... |