3 patents
Utility
Data Protection and Recovery Systems and Methods
22 Dec 22
A system has a first non-transitory computer-readable medium storing a first program and a second non-transitory computer-readable medium storing a second program, the first program and second program including instructions that, when executed by one or more processors, execute a method of verifying a secure message tunnel during a communication session.
Joshua Freeman Adams, David Patrick Forster, Frank Barry Robertson
Filed: 17 Aug 22
Utility
Data Protection and Recovery Systems and Methods
5 May 22
A method of securely replacing a first data value with a second data value and related systems are disclosed.
Joshua Freeman Adams, David Patrick Forster, Frank Barry Robertson
Filed: 12 Jul 20
Utility
Security System and Related Methods
31 Mar 22
A method includes entropy hashing a hardened key; generating an asymmetric key pair from the hardened key; generating a keyspace chaincode from the hardened asymmetric key pair and the hardened key; and generating a verification key pair from the hardened asymmetric key pair.
Joshua Freeman Adams, David Patrick Forster, Frank Barry Robertson
Filed: 3 Feb 20
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first