| 11522691 |
Techniques for virtual cryptographic key ceremonies |
Christopher Pylypko, William K. Johnson, III |
2022-12-06 |
| 11522686 |
Securing data using key agreement |
Prasad Peddada, Taher Elgamal, Ryan Guest |
2022-12-06 |
| 11368292 |
Securing data with symmetric keys generated using inaccessible private keys |
Prasad Peddada, Taher Elgamal, Ryan Guest |
2022-06-21 |
| 11361312 |
System and methods for point to point encryption and tokenization using a mobile device |
Christopher John Gerber, Gerald Duane Corson, III, Charles Alan Watts |
2022-06-14 |
| 11265156 |
Secrets management using key agreement |
Prasad Peddada, Taher Elgamal |
2022-03-01 |
| 11178115 |
System and methods for point to point encryption and tokenization |
Christopher John Gerber, Gerald Duane Corson, III, Charles Alan Watts |
2021-11-16 |
| 11115397 |
System and methods for point to point encryption and tokenization in a hosted environment |
Christopher John Gerber, Gerald Duane Corson, III, Charles Alan Watts |
2021-09-07 |
| 10904221 |
Systems and methods for flexibly securing data |
Ralph Grayson Hull, IV, Daniel David Manning, Jason Todd, Tim Webb |
2021-01-26 |
| 10313309 |
Systems and methods for flexibly securing data |
Ralph Grayson Hull, IV, Daniel David Manning, Jason Todd, Timothy Webb |
2019-06-04 |