Patent application number | Description | Published |
20120002805 | Cryptographic Key Spilt Combiner Including a Biometric Input - A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split generators generates key splits from seed data. The key split generators may include a random split generator for generating a random key split based on reference data. Other key split generators may include a token split generator for generating a token key split based on label data, a console split generator for generating a console key split based on maintenance data, and a biometric split generator for generating a biometric key split based on biometric data. All splits may further be based on static data, which may be updated, for example by modifying a prime number divisor of the static data. The label data may be read from a storage medium, and may include user authorization data. The resulting cryptographic key may be, for example, a stream of symbols, at least one symbol block, or a key matrix. | 01-05-2012 |
20130177152 | Cryptographic Key Spilt Combiner - A cryptographic key split combiner includes a plurality of key split generators adapted to generate cryptographic key splits, a key split randomizer adapted to randomize the cryptographic key splits to produce a cryptographic key, and a digital signature generator. Each of the key split generators is adapted to generate key splits from seed data. The digital signature generator is adapted to generate a digital signature based on the cryptographic key. The digital signature generator can also be adapted to generate the digital signature based on a credential value. A process for forming cryptographic keys includes generating a plurality of cryptographic key splits from seed data. The cryptographic key splits are randomized to produce a cryptographic key. A digital signature is generated based on the cryptographic key. Generating a digital signature based on the cryptographic key can include generating the digital signature based on a credential value. | 07-11-2013 |
Patent application number | Description | Published |
20080310619 | Process of Encryption and Operational Control of Tagged Data Elements - A process of encrypting an object having an associated object tag includes generating a cryptographic key by binding an organization split, a maintenance split, a random split, and at least one label split ( | 12-18-2008 |
20100169651 | Electronically Signing a Document - An electronic signature device includes a processor, a memory, a user input device including a first biometric input device, and a device interface, all communicatively connected by at least one bus. A method of personalizing the electronic signature device to a user includes receiving a digitized biometric signature of the user via the first biometric input device. A cryptographic key is generated. A biometric electronic template is generated based on the digitized biometric signature. The cryptographic key and the biometric electronic template are stored in the memory. | 07-01-2010 |
20100235924 | Secure Personal Medical Process - A process of accessing and controlling medical information data by a Secure Process that includes two schemas—Medical Access Permission Schema (MAPS) information access system and encryption schema. In particular, the invention relates to a secure process for creating an access control and authentication methodology that identifies specific roles found in the medical field, applies these roles to content attributes, and binds those attributes to secret keys associated with an encryption schema. | 09-16-2010 |
20110116628 | Cryptographic key split binder for use with tagged data elements - A process of cryptographically securing a data object including one or more respectively tagged data elements includes selecting a tagged data element from among a plurality of tagged data elements, based on an associated data tag. A plurality of cryptographic key splits is generated from seed data. The cryptographic key splits are bound together to produce a first cryptographic key. A second cryptographic key is generated based on security requirements of the data object. The tagged data element is encrypted using the first cryptographic key. The data object encrypting using the second cryptographic key. At least one of the cryptographic key splits is based on the associated data tag. | 05-19-2011 |
20120066511 | Container Security - A container security device includes a housing, electronic circuitry, and cabling. The electronic circuitry is disposed within the housing, and includes first and second microprocessor functions and an interface for accepting and providing data. The cabling is removably coupled to the housing, provides the only communicative coupling between the first microprocessor function and the second microprocessor function, and is adapted to be attached to a container latch so as to break the communicative coupling if the latch is opened. The housing includes a port for the electronic circuitry interface. A method of providing container security includes closing a container using a latch device and removably coupling the cabling to the housing so that the communicative coupling is broken if the latch is opened., providing the only communicative coupling between the first microprocessor function and the second microprocessor function. | 03-15-2012 |
20150039881 | Triggering an Internet Packet Protocol Against Malware - A process of triggering an Internet packet protocol against malware includes providing protocol trigger mechanisms configured to affect network access and data object access against malware, denial of service attacks, and distributed denial of service attacks, A multi-level security system is established with a cryptographically secure network channel, or another equivalent encrypted channel, and a second object of an encrypted document or data message that uses the secure network channel. The equivalent encrypted channel can be a Virtual Private Network tunnel (VPN) including MPPE/PPTP/CIPE/Open VPN, Secure Socket Layer (SSL), or IPSec tunnel. | 02-05-2015 |
Patent application number | Description | Published |
20090124569 | INHIBITION AND TREATMENT OF PROSTATE CANCER METASTASIS - The present invention provides compounds and methods of inhibiting and treating metastatic prostate cancer. The compounds include MEK4 inhibitors. In another aspect the invention provides methods of identifying inhibitors of metastatic prostate cancer by screening for inhibitors of MEK4. | 05-14-2009 |
20100137425 | INHIBITION AND TREATMENT OF PROSTATE CANCER METASTASIS - The present invention provides compounds and methods of inhibiting and treating metastatic prostate cancer. The compounds include MEK4 inhibitors. In another aspect the invention provides methods of identifying inhibitors of metastatic prostate cancer by screening for inhibitors of MEK4. | 06-03-2010 |
20120283313 | INHIBITION AND TREATMENT OF PROSTATE CANCER METASTASIS - The present invention provides compounds and methods of inhibiting and treating metastatic prostate cancer. The compounds include MEK4 inhibitors. In another aspect the invention provides methods of identifying inhibitors of metastatic prostate cancer by screening for inhibitors of MEK4. | 11-08-2012 |
20130296582 | INHIBITION AND TREATMENT OF PROSTATE CANCER METASTASIS - The present invention provides compounds and methods of inhibiting and treating metastatic prostate cancer. The compounds include MEK4 inhibitors. In another aspect the invention provides methods of identifying inhibitors of metastatic prostate cancer by screening for inhibitors of MEK4. | 11-07-2013 |
20130317228 | AZOLIUM METAL-ORGANIC FRAMEWORKS - Disclosed herein are metal-organic frameworks comprising at least two azolium rings. The azolium groups are used as a strategy for controlling catenation and morphology in metal-organic frameworks. | 11-28-2013 |
20140206886 | Enantioselective N-heterocyclic carbene-catalyzed annulation reactions with imidazolidinones - Enantiomeric bicyclic lactone compounds as can be prepared via an N-heterocyclic carbene-catalyzed annulation reaction. | 07-24-2014 |
20150065703 | 7-MEMBERED FUSED HETEROCYCLES AND METHODS OF THEIR SYNTHESIS - Disclosed are a new method for synthesizing 7-membered fused heterocycles and compounds synthesized by the new method. The method involves a dual activation strategy using an N-heterocyclic carbene catalyst as a first Lewis base and another second Lewis base. Compounds synthesized by the disclosed method may include new benzoxopinone compounds, as well as benzoxepane compounds and benzoazepinone compounds that optionally may be derived from the disclosed benzoxopinone compounds. | 03-05-2015 |
20150315143 | N-Heterocyclic Carbene-Catalyzed Synthesis of 2-Aryl Indoles - Transition metal-free catalytic methods for access to 2-arylindole compounds. | 11-05-2015 |
20150315168 | Catalytic Enantioselective Synthesis of 2-Aryl Chromenes and Related Phosphoramidite Ligands and Catalyst Compounds - Methods to access 2-aryl chromene compounds via an asymmetric catalytic process. | 11-05-2015 |
20160002252 | SUBSTITUTED PYRROLO[2,3-d]PYRIMIDINES FOR THE TREATMENT OF CANCER AND PROLIFERATIVE DISORDERS - Disclosed are substituted pyrrolo[2,3-d]pyrimidine compounds. The disclosed compounds are shown to be useful in inhibiting the growth of cancer cell lines and treating cancer and cell proliferative disorders. | 01-07-2016 |
20160024120 | Azolium Metal-Organic Frameworks - Disclosed herein are metal-organic frameworks comprising at least two azolium rings. The azolium groups are used as a strategy for controlling catenation and morphology in metal-organic frameworks. | 01-28-2016 |
20160075728 | Chiral Imidazolium Salts for Asymmetric Catalysis - Planar chiral N-heterocyclic carbenes that incorporate an iron sandwich complex into the NHC framework are disclosed for use in organocatalytic and transition metal-catalyzed reactions. | 03-17-2016 |