1
Edward M Scheidt, Ersin L Domangue: Access control and authorization system. TecSec Incorporated, IP Strategies P C, December 3, 2002: US06490680 (244 worldwide citation)

A process of encrypting an object includes applying a hash algorithm to the object, generating a random number, combining a first plurality of splits including the random number to form a working split, encrypting the object using the working split, combining a second plurality of splits not includi ...


2
Edward Scheidt, James Kolouch, Ersin L Domangue, Mark A Odell, Wai Lin Tsang: Electronically signing a document. TecSec, IP Strategies, February 13, 2007: US07178030 (40 worldwide citation)

A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving ...


3
Gerald D Kimmel, Ersin L Domangue, Francis J Adamouski: Information-centric security. InfoAssure, Connolly Bove Lodge & Hutz, May 11, 2010: US07715565 (37 worldwide citation)

A system for encrypting a data encryption key includes a key encryption key generator configured to receive a public portion of a label, the label including an asymmetric key pair of the public portion and a private portion, the key encryption key generator being further configured to process the pu ...


4
Gerald D Kimmel, Ersin L Domangue: Cryptographic key construct. InfoAssure, Connolly Bove Lodge & Hutz, June 15, 2010: US07739501 (32 worldwide citation)

A computer program product, for producing a cryptographic key label for use in exchanging information between first and second organizations of members, resides on a computer-readable medium includes computer-readable instructions configured to cause a computer to: produce a read-write cryptographic ...


5
Gerald D Kimmel, Francis J Adamouski, Ersin L Domangue, Wayne R Kimmel, James G Lightburn, Leonard R Viola: Cryptographic key management. InfoAssure, Connolly Bove Lodge & Hutz, May 4, 2010: US07711120 (24 worldwide citation)

A cryptographic coalition administrator for managing information access across multiple organizations includes a communications interface configured to communicate electronically transmit and receive information, a memory configured to store pairs of public and private cryptographic keys associated ...


6
Edward M Scheidt, James L Kolouch, Ersin L Domangue, Mark A Odell, Wai Lin Tsang: Electronically signing a document. TecSec, IP Strategies, February 10, 2009: US07490240 (11 worldwide citation)

A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving ...


7
Gerald D Kimmel, Francis J Adamouski, Ersin L Domangue, Wayne R Kimmel, James G Lightburn, Leonard R Viola: Cryptographic key management. Mintz Levin Cohn Ferris Glovsky, And Popeo PC, October 26, 2006: US20060242407-A1

A cryptographic coalition administrator for managing information access across multiple organizations includes a communications interface configured to communicate electronically transmit and receive information, a memory configured to store pairs of public and private cryptographic keys associated ...


8
Edward M Scheidt, Ersin L Domangue: Access control and authorization system. Ip Strategies PC, September 11, 2003: US20030172280-A1

The invention uses symmetric key cryptography for secrecy. Role-based access controls are implemented with the use of labeled splits that are combined to generate the keys used in symmetric key cryptographic algorithms. Strong user authentication is realized with CKM technology in the form of user p ...


9
Edward Scheidt, James Kolouch, Ersin L Domangue, Mark A Odell, Wai Lin Tsang: Electronically signing a document. Thomas M Champagne, IP Strategies PC, October 17, 2002: US20020150241-A1

A method of electronically signing a document includes initializing a user, including generating an asymmetric key pair including a private signing key and a public signing key, and storing the private signing key and the public signing key; and providing an electronic signature, including receiving ...


10
Gerald D Kimmel, Ersin L Domangue, Francis J Adamouski: Information-centric security. Mintz Levin Cohn Ferris Glovsky, And Popeo PC, March 9, 2006: US20060050870-A1

A system for encrypting a data encryption key includes a key encryption key generator configured to receive a public portion of a label, the label including an asymmetric key pair of the public portion and a private portion, the key encryption key generator being further configured to process the pu ...