Patent Portfolio – Biometric Authentication Focus

HIGHLIGHTS

The portfolio comprises several patent families within the IT security and authentication space, across a variety of platforms. Notably, the portfolio has early priority dates (2006) and accurately forecasted where the market now stands. Many of the patents are agnostic to the authentication modality. The portfolio comprises 18 patents (3 from Taiwan) and two allowed applications, with all patent family lines open.

INVENTION USE CASES

The portfolio includes the following concepts and use cases:

  1. Ability to authenticate a person over a network or Internet and validate a payment or transaction.
  2. Encrypt data and regenerate encryption key from live biometrics.
  3. Secure messaging and target marketing.
  4. Enabling the Windows Biometric Framework across a network.
  5. Biometric (multi-modal) authentication in combination with traditional login credentials.

APPLICABLE MARKET

Mobile Wallets, Internet Payment Solutions, Identity Providers, Cloud Security, Encryption Companies, Security Device Makers, Handset Manufacturers, Venture Investors with Security Focus, Key Management Solutions

AUTHENTICATION FOCUS

Ceelox, previously based in Florida, was in the business of providing biometric controlled storage devices, similar to the products offered by IronKey, Vormetric, Kingston and others. They also offered secure email early on. Ceelox is no longer operating as a company in this space, and the IP has been transferred to the new Ceelox Patents LLC based in Kansas City.

Erise IP Intellectual Property Law represents the company and will be involved in all discussions and negotiations.

We seek a buyer of the entire portfolio but will consider partial portfolio purchases. This sizable portfolio, with open family lines and early priority dates, greatly enhances the valuation of any business with an IT Security focus. The portfolio also provides a strategically beneficial position to expand a company’s market share, including offensive and defensive use.

EVIDENCE OF USE

Products using the patented technology are in use or development by multiple Fortune 100 companies. Representative evidence-of-use charts available upon request under NDA.

PATENT PORTFOLIO

Authentication and validation of transactions, especially via biometrics, was not a significant impediment to market growth in 2006, the priority date for most of the portfolio. Since then, data breaches and transaction fraud are increasingly mainstream concerns by non-technical consumers and businesses. The portfolio was way ahead of its time, and the market is now catching up.

This portfolio Enables the Demise of the Password.

Derived credentials are the future!

The commercial impact to the new owner might be a significant increase in the valuation of the buyer, which is one reason we are sharing this portfolio with the investment/VC community for their portfolios. And because of usage in the market, there is the potential for infringement litigation against some of the biggest names in technology or defensive use with cross-licensing.

THE ACQUISITION PROCESS

In addition to this overview, TAG Holdings can provide a more detailed and comprehensive marketing presentation for your reference and research.

TAG Holdings, working in close coordination with Ceelox Patents, is shopping this portfolio to interested parties through September 2015 and will look to complete the transaction before December 2015. This gives interested parties time to complete due diligence for enforceability of the portfolio.

The portfolio sale will conclude with the execution of a formal patent purchase agreement to be negotiated by the seller and buyer. Preferred buyer terms will be provided to qualified parties.

TAG Holdings will be actively seeking purchasers for this portfolio. Interested parties are encouraged to make an offer as soon as possible. All formal offers will be reviewed and responded to within 5 business days.

TAG HOLDINGS

TAG Holdings is a venture capital firm dedicated to maximizing the value of our clients’ inventions. We leverage our global network and experience with technology and security to provide the highest value result.

CONTACT INFORMATION

Please direct all questions and interests to:

Fraser Verrusio
Email [email protected]
Phone (703) 247-5454
Download vCard

Country Status Description Publication# Filing Date Patent# Issued
USA Issued ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM FOR A WINDOWS BIOMETRIC FRAMEWORK 12/964,990 12/10/2010 8,566,904 10/22/2013
USA Issued ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM 14/058,451 10/21/2013 8,959,586 02/17/2015
USA Issued METHOD AND APPARATUS FOR INTERFACING WITH A RESTRICTED ACCESS COMPUTER SYSTEM 11/549,206 10/13/2006 7,818,395 10/19/2010
USA Issued COMPUTER PROGRAM AND METHOD FOR GRANTING MULTIPLE USERS ACCESS TO A SECURE REPOSITORY 12/906,826 10/18/2010 8,051,142 11/01/2011
USA Issued COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 13/285,641 10/31/2011 8,429,246 04/23/2013
USA Issued COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 13/867,832 04/22/2013 8,799,407 08/05/2014
USA Issued SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 11/380,810 04/28/2006 7,962,755 06/14/2011
USA Issued SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 13/153,906 06/06/2011 8,627,106 01/07/2014
USA Issued AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY 12/913,126 10/27/2010 8,225,384 07/17/2012
USA Issued SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER 11/538,867 10/05/2006 8,412,947 04/02/2013
USA Issued SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER 13/854,659 04/01/2013 8,793,493 07/29/2014
USA Issued SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION 11/618,208 12/29/2006 8,756,422 06/17/2014
USA Issued SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION 12/948,511 11/17/2010 7,945,520 05/17/2011
USA Issued SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION 13/108,758 05/16/2011 8,275,718 09/25/2012
USA Issued DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA 13/028,715 02/16/2011 8,745,405 06/03/2014
USA Allowed DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA 14/290,306 05/29/2014
USA Allowed COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 14/451,075 08/04/2014
USA Pending AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY 13/549,967 07/16/2012
USA Pending SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER 14/444,713 07/28/2014
USA Pending SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION 13/618,549 09/14/2012
Taiwan Pending SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER 096137240 10/04/2007
Taiwan Issued SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION 96114976 04/27/2007 I363978 05/11/2012
Taiwan Issued BIOMETRIC AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY 96118668 05/25/2007 I361611 04/01/2012
Taiwan Issued METHOD AND APPARATUS FOR INTERFACING WITH A RESTRICTED ACCESS COMPUTER SYSTEM 096137666 10/08/2007 I353522 12/01/2011