1
M Greg Shanton: Distributed cryptographic object method. TECSEC Incorporated, Thomas M Champagne, Jon L Roberts, November 29, 1994: US05369702 (241 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


2
M Greg Shanton: Distributed cryptographic object method. TECSEC, Rabin Champagne & Lynt P C, October 21, 1997: US05680452 (115 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


3
M Greg Shanton: Distributed cryptographic object method. TECSEC, Rabin Champagne & Lynt P C, February 10, 1998: US05717755 (70 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


4
M Greg Shanton: Distributed cryptographic object method. TecSec Incorporated, Rabin & Champagne P C, April 27, 1999: US05898781 (67 worldwide citation)

A system for increasing the security of a computer system, while giving an individual user a large amount of flexibility and power. To give users the most power and flexibility, a standard object that has the capability to embed objects is used. To allow users even more flexibility, a standard objec ...


5
William L Jaeger Jr, M Greg Shanton: Method and apparatus for providing human readable signature with digital signature. American Management Systems, Staas & Halsey, June 7, 2005: US06904524 (18 worldwide citation)

Using know methods a digital signature, such as a one-way hash, of a document is produced. A digital representation of a signature is associated with the digital signature. The digital representation may be, for example, a digitized picture of the signature. Both the digital signature and the digita ...


6
Ray Berg, M Greg Shanton: Identity insurance transaction method. American International Group, Leydig Voit & Mayer, September 25, 2012: US08275636 (4 worldwide citation)

The instant invention relates to a system and method for ensuring and verifying the identity of all parties involved in an online marketplace transaction involving buyers, sellers, and third parties, such as a marketplace. Anonymous transactions are supported by the present invention. Verification i ...


7
Ray Berg, M Greg Shanton: Identity insurance transaction method. Proskauer Rose, December 12, 2002: US20020188481-A1

The instant invention relates to a system and method for ensuring and verifying the identity of all parties involved in an online marketplace transaction involving buyers, sellers, and third parties, such as a marketplace. Anonymous transactions are supported by the present invention. Verification i ...