CRYPTOGRAPHY

Brand Owner (click to sort) Address Description
DISTRIBUTED FRAGMENTS CRYPTOGRAPHY Akeyless Security Ltd. Yigal Alon 94 St. Alon Towers (South) Tel Aviv 6789139 Israel CRYPTOGRAPHY;Providing temporary use of a feature of on-line non-downloadable computer software for automated management of digital authentication credentials and encryption keys using only fragments of an encryption key without ever combining the encryption key fragments;
DYNAMIC KEY INFRASTRUCTURE DANG, Kim-Thibault 7381 Santa Valera Buena Park CA 90620 Cryptography, public key cryptography, private key cryptography, electronic security applications, electronic security management, communication security, transaction security, security protocols, security signature, document security, notary security, digital certificate, secure time stamping, secure notarization, digital certificate creation and management systems, digital certificate privilege management systems, and communication ; Security infrastructure consisting of computer hardware, namely web server, and tokens with biometric ; Server and consentment client providing by personnal biometric token to create digital certificate and digital signature for secure Intranet and Internet communication, electronic signature, notarization and access control ; Business services, namely providing an infrastructure for access control and the electronic signature of messages to permit strong authentication, verification and notarization of the contents of such messages ; Software and hardware for generating and authenticating digital signatures; for encrypting and decrypting information; for authorizing access to network resources; for validation of transactions, for managing digital certificates and privileges, and manuals associated therewith; biometric sensors and reading devices, including fingerprint, voice recognition, face and retinal scanners; biometrics enabled systems; computer software for security and verification of identity and credentials; tokens for security and verification of identity and credentials; Computer software used to secure access to various software applications using biometric and verification technologies; and electronic publications ; Computer hardware and computer software in the field of privilege management and data security on the global information network and on corporate intranets; computers software programs for use in information security applications ;;
PUBLIC KEY CRYPTOGRAPHY STANDARDS RSA Data Security, Inc. 2955 Campus Drive, Suite 400 San Mateo CA 944032507 published set of data processing standards for programmers working with cryptography;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Apparatuses and methods are provided for interface logic that is configurable to operatively couple cryptography support logic and cryptography providing logic. The interface logic provides at least one management function to the cryptography providing logic. The management function includes at least one of the following four management functions: an identity management function, a file management function, a container management function, and a cryptography management function.