1
Edward M Scheidt, Ersin L Domangue: Access control and authorization system. TecSec Incorporated, IP Strategies P C, December 3, 2002: US06490680 (244 worldwide citation)

A process of encrypting an object includes applying a hash algorithm to the object, generating a random number, combining a first plurality of splits including the random number to form a working split, encrypting the object using the working split, combining a second plurality of splits not includi ...


2
M Greg Shanton: Distributed cryptographic object method. TECSEC Incorporated, Thomas M Champagne, Jon L Roberts, November 29, 1994: US05369702 (241 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


3
Roy D Follendore III: Secure network method and apparatus. TECSEC Incorporated, Jon L Roberts, Thomas M Champagne, November 29, 1994: US05369707 (215 worldwide citation)

A method and apparatus for ensuring the security of messages communicated on a network. The system employs different levels of security to ensure that communication integrity is not breached. A user must first enter a valid password to clear the access control subsystem. The sending user must also p ...


4
Edward M Seheidt, John J Crowley: Cryptographic key management method and apparatus. TECSEC Incorporated, Roberts & Associates, December 20, 1994: US05375169 (124 worldwide citation)

A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematica ...


5
M Greg Shanton: Distributed cryptographic object method. TECSEC, Rabin Champagne & Lynt P C, October 21, 1997: US05680452 (115 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


6
Edward M Scheidt: Encryption process including a biometric unit. Tecsec, IP Strategies, September 19, 2006: US07111173 (99 worldwide citation)

A method of encrypting an object includes generating a cryptographic key, using the cryptographic key to initialize a cryptographic algorithm, and applying the algorithm to the object. Accordingly, an encrypted object is formed. The key is generated by combining key splits derived from different sou ...


7
Edward M Seheidt, John J Crowley: Cryptographic key management method and apparatus. TECSEC Incorporated, Rabin & Champagne P C, July 28, 1998: US05787173 (83 worldwide citation)

A system for the secure communication of a message from a transmitting user to a receiving user using a split key scheme. Each user generates a key component using a cryptographic engine. The key component is a pseudorandom sequence of bits with an appended error detection field which is mathematica ...


8
Edward M Scheidt, Charles E McCullough, C Jay Wack: Personal computer access control system. TECSEC Incorporated, Jon L Roberts, Thomas M Roberts & Associates Champagne, July 11, 1995: US05432851 (82 worldwide citation)

An access control system which uses a password token scheme for controlling user access to data within computer systems. The key component in the access control system is an optical token card that is capable of receiving optically encoded information directly from the CRT display of a standard pers ...


9
Edward M Scheidt, C Jay Wack: Cryptographic key split combiner. TecSec Incorporated, IP Strategies PC, April 1, 2003: US06542608 (76 worldwide citation)

A cryptographic key split combiner, which includes a number of key split generators for generating cryptographic key splits and a key split randomizer for randomizing the cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Each of the key split gene ...


10
C Jay Wack, Edward M Scheidt, James L Kolouch: Cryptographic key split binder for use with tagged data elements. Tecsec, IP Strategies, August 22, 2006: US07095852 (74 worldwide citation)

A cryptographic key split binder includes key split generators that generate cryptographic key splits from seed data and a key split randomizer for randomizing cryptographic key splits to produce a cryptographic key, and a process for forming cryptographic keys. Key split generators can include a ra ...