C Hebert, L Gomez - US Patent 9,894,090, 2018 - Google Patents
Implementations of the present disclosure include methods, systems, and computer- readable storage mediums for receiving goal data and start-up information, the goal data …
L Gomez, C Hebert - US Patent 10,038,674, 2018 - Google Patents
Implementations of the present disclosure include methods, systems, and computer- readable storage mediums for providing secure mobile data sharing. Actions can include …
A Stiglic, D Robichaud, MA Ross, R Bruno - US Patent 9,674,156, 2017 - Google Patents
(57) ABSTRACT A future proof method and system for securely transferring digital data from a data owner to a data assignee through a third party involving securely registering the data …
LW Clark, PA Rosas, M Shafer, LG King… - US Patent …, 2019 - Google Patents
Methods and systems for rules-based data access are described. In some embodiments, a request for access to customer data by a requesting entity is received; the data is …
BR Chung - US Patent 8,495,158, 2013 - Google Patents
Disclosed herein is a method of delivering wills and mes sages, in which the death of an invitor is verified by one or more invitee (s)/verifier (s) close to the invitor, and then the will …
PC Wang, SF Yang, JB Shi, KL Kan - US Patent 9,135,411, 2015 - Google Patents
A digital rights management (DRM) apparatus and a DRM method are disclosed. The DRM apparatus includes a DRM packer, a DRM object database, a distribution manager, a …
TG Behbehani - US Patent 9,442,467, 2016 - Google Patents
Summary characteristics. The lockbox condition comprises a time or an event associated with the person. In an alternative embodiment, the personal information can be fully …
LW Clark, PA Rosas, M Shafer, LG King… - US Patent …, 2022 - Google Patents
Methods and systems for rules-based data access described. In some embodiments, a request for access to customer data by a requesting entity is received; the data is …
A Turner - US Patent 11,533,319, 2022 - Google Patents
For access policy enforcement, a method restricts access to a decryption key for private data on an electronic device. The private data is encrypted and includes group commu nications …