Today, April 16, 2019 IronClad Encryption Corporation is announcing that it received notice from the United States Patent and Trademark Office (USPTO) that seven more of its patent applications were granted. Each patent has a protected life-span of 20 years through December 2038 or January 2039. These seven patents are listed by number and title with a brief explanation:
US 10,154,021 B1 Securitization of Temporal Digital Communications with Authentication and Validation of User and Access Devices (December 11, 2018):
This patent provides for devices and access control systems that securitize data and data transmissions using authentication, validation, and encryption techniques. These techniques also provide security and encryption of and for essentially any and all databases utilized by multiple access and user devices including IOT (the internet of things) devices.
US 10,154,031 B1 User-wearable Secured Devices Provided Assuring Authentication and Validation of Data Storage and Transmission (December 11, 2018):
This patent provides for user-wearable devices utilizing encryption authentication techniques to ensure security of any data transmission to and from multiple devices, including those used for IOT (the internet of things). In order to provide privacy and security of user-wearable devices unique encryption technology is employed together with the use of biometrics. The devices establish communications with a counterpart communication device or system in order to provide an ability to perform secured transactions without sacrificing speed or resolution of communications. The biometric data transceivers are capable of reading a user's encrypted biometric data and then transmitting the encrypted data to a user identity validation.
US 10,154,016 B1 Devices for Transmitting and Communicating Randomized Data Utilizing Sub-channels (December 11, 2018):
This patent provides for implementing a transceiver with devices that utilize encrypters and decrypters having communication sources that provide secured transmission(s). One connector includes transmission(s) from communications sources that enter a first transceiver through the connector and travel to a randomized encrypted data sub-channels (REDS) encrypter that securely sends encrypted transmission(s) to a second transceiver. The encrypted transmission(s) enter a second transceiver and are sent to a randomized decrypted data sub-channels (RDDS) decrypter where the transmission(s) are decrypted.
US 10,154,015 B1 Executable Coded Cipher Keys (December 11, 2018):
This patent describes two or more devices that securitize transmission(s) transmitted to and received from the devices including at least one executable coded cipher key(s) with one or more executable coded encryption keys (ECEKs) devices that encrypt transmission(s) and also use executable cipher coded key(s). For decryption, there is at least one executable coded decryption key (ECDK) device that decrypts transmission(s) and also uses at least one executable coded cipher key(s). The transmission(s) are sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is encrypted and/or decrypted and the executable coded cipher key(s) remain in the computer memory just long enough to achieve encryption/decryption completion.
US 10,158,613 B1 - Combined Hidden Dynamic Random-Access Devices Utilizing Selectable Keys and Key Locators for Communicating Randomized Data together with Sub-Channels and Coded Encryption Keys (December 18, 2018):
This patent describes devices that conceal transmission(s) transmitted to and/or reveal transmission(s) received from these devices comprising at least one executable coded cipher key(s) at least one executable coded encryption key (ECEK) device that securitizes transmission(s) that uses executable cipher coded key(s), and at least one executable coded decryption key (ECDK) device that reveals transmission(s) such that a combined device is a RDDS/ECDK device that transmits randomized data with data sub-channels and with ECEKs; and that also utilizes at least one executable coded cipher key(s), such that transmission(s) sent to an encrypter/decrypter memory that stores transmission(s) while the transmission(s) is concealed and/or revealed.
When concealing/revealing operation(s) are completed the transmission(s) is sent to at least one transmitter such that the concealing/revealing operation of the transmission(s) is controlled and manipulated by the executable coded cipher key(s), wherein the executable coded cipher key(s) remain in the computer memory long enough to achieve securitization completion.
US 10,171,435 B1 - Devices that Utilize Random Tokens Which Direct Dynamic Random Access (January 1, 2019):
This patent describes one or more devices and associated system that securitize and conceal data transmitted to and/or data received from the devices that utilize one or more master keys comprising at least one device that conceals and reveals such that the data and/or associated data files utilize both master keys and one or more key selectors, wherein the master keys and key selectors produce a specific set of one or more keys that conceal the data and/or associated data files such that one or more key selectors coincide with at least one value that directly corresponds with created cipher data and/or cipher data files.
The key selectors can also be concealed and revealed as required. Produced concealed data and concealed data files can only be concealed and revealed with one or more master keys and one or more key selectors.
US 10,171,444 B1 - Securitization of Temporal Digital Communications via Authentication and Validation for Wireless User and Access Devices (January 1, 2019):
This patent describes an access control system that encrypts and decrypts signals between one or more secure databases for various user devices to ensure proper entrance or access into secure locations by approved personnel only. Specific methods and devices for securing (primarily digital and normally two-way) communications using applications that combine securing communications for wireless/cellular phones with personnel access card readers for entry into secure locations are also described. These combined communication and access devices require using specific encryption techniques impossible to corrupt and essential to denying fraudulent or otherwise unauthorized personnel the ability to enter or access security protected devices or locations.