The portfolio comprises several patent families within the IT security and authentication space, across a variety of platforms. Notably, the portfolio has early priority dates (2006) and accurately forecasted where the market now stands. Many of the patents are agnostic to the authentication modality. The portfolio comprises 18 patents (3 from Taiwan) and two allowed applications, with all patent family lines open.
INVENTION USE CASES
The portfolio includes the following concepts and use cases:
- Ability to authenticate a person over a network or Internet and validate a payment or transaction.
- Encrypt data and regenerate encryption key from live biometrics.
- Secure messaging and target marketing.
- Enabling the Windows Biometric Framework across a network.
- Biometric (multi-modal) authentication in combination with traditional login credentials.
Mobile Wallets, Internet Payment Solutions, Identity Providers, Cloud Security, Encryption Companies, Security Device Makers, Handset Manufacturers, Venture Investors with Security Focus, Key Management Solutions
Ceelox, previously based in Florida, was in the business of providing biometric controlled storage devices, similar to the products offered by IronKey, Vormetric, Kingston and others. They also offered secure email early on. Ceelox is no longer operating as a company in this space, and the IP has been transferred to the new Ceelox Patents LLC based in Kansas City.
Erise IP Intellectual Property Law represents the company and will be involved in all discussions and negotiations.
We seek a buyer of the entire portfolio but will consider partial portfolio purchases. This sizable portfolio, with open family lines and early priority dates, greatly enhances the valuation of any business with an IT Security focus. The portfolio also provides a strategically beneficial position to expand a company’s market share, including offensive and defensive use.
EVIDENCE OF USE
Products using the patented technology are in use or development by multiple Fortune 100 companies. Representative evidence-of-use charts available upon request under NDA.
Authentication and validation of transactions, especially via biometrics, was not a significant impediment to market growth in 2006, the priority date for most of the portfolio. Since then, data breaches and transaction fraud are increasingly mainstream concerns by non-technical consumers and businesses. The portfolio was way ahead of its time, and the market is now catching up.
This portfolio Enables the Demise of the Password.
Derived credentials are the future!
The commercial impact to the new owner might be a significant increase in the valuation of the buyer, which is one reason we are sharing this portfolio with the investment/VC community for their portfolios. And because of usage in the market, there is the potential for infringement litigation against some of the biggest names in technology or defensive use with cross-licensing.
THE ACQUISITION PROCESS
In addition to this overview, TAG Holdings can provide a more detailed and comprehensive marketing presentation for your reference and research.
TAG Holdings, working in close coordination with Ceelox Patents, is shopping this portfolio to interested parties through September 2015 and will look to complete the transaction before December 2015. This gives interested parties time to complete due diligence for enforceability of the portfolio.
The portfolio sale will conclude with the execution of a formal patent purchase agreement to be negotiated by the seller and buyer. Preferred buyer terms will be provided to qualified parties.
TAG Holdings will be actively seeking purchasers for this portfolio. Interested parties are encouraged to make an offer as soon as possible. All formal offers will be reviewed and responded to within 5 business days.
TAG Holdings is a venture capital firm dedicated to maximizing the value of our clients’ inventions. We leverage our global network and experience with technology and security to provide the highest value result.
Please direct all questions and interests to:
|USA||Issued||ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM FOR A WINDOWS BIOMETRIC FRAMEWORK||12/964,990||12/10/2010||8,566,904||10/22/2013|
|USA||Issued||ENTERPRISE BIOMETRIC AUTHENTICATION SYSTEM||14/058,451||10/21/2013||8,959,586||02/17/2015|
|USA||Issued||METHOD AND APPARATUS FOR INTERFACING WITH A RESTRICTED ACCESS COMPUTER SYSTEM||11/549,206||10/13/2006||7,818,395||10/19/2010|
|USA||Issued||COMPUTER PROGRAM AND METHOD FOR GRANTING MULTIPLE USERS ACCESS TO A SECURE REPOSITORY||12/906,826||10/18/2010||8,051,142||11/01/2011|
|USA||Issued||COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||13/285,641||10/31/2011||8,429,246||04/23/2013|
|USA||Issued||COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||13/867,832||04/22/2013||8,799,407||08/05/2014|
|USA||Issued||SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||11/380,810||04/28/2006||7,962,755||06/14/2011|
|USA||Issued||SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||13/153,906||06/06/2011||8,627,106||01/07/2014|
|USA||Issued||AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY||12/913,126||10/27/2010||8,225,384||07/17/2012|
|USA||Issued||SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER||11/538,867||10/05/2006||8,412,947||04/02/2013|
|USA||Issued||SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER||13/854,659||04/01/2013||8,793,493||07/29/2014|
|USA||Issued||SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION||11/618,208||12/29/2006||8,756,422||06/17/2014|
|USA||Issued||SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION||12/948,511||11/17/2010||7,945,520||05/17/2011|
|USA||Issued||SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION||13/108,758||05/16/2011||8,275,718||09/25/2012|
|USA||Issued||DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA||13/028,715||02/16/2011||8,745,405||06/03/2014|
|USA||Allowed||DYNAMIC SEED AND KEY GENERATION FROM BIOMETRIC INDICIA||14/290,306||05/29/2014||—||—|
|USA||Allowed||COMPUTER PROGRAM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||14/451,075||08/04/2014||—||—|
|USA||Pending||AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY||13/549,967||07/16/2012||—||—|
|USA||Pending||SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER||14/444,713||07/28/2014||—||—|
|USA||Pending||SYSTEM AND METHOD FOR SECURE AND/OR INTERACTIVE DISSEMINATION OF INFORMATION||13/618,549||09/14/2012||—||—|
|Taiwan||Pending||SYSTEM AND METHOD OF SECURE ENCRYPTION FOR ELECTRONIC DATA TRANSFER||096137240||10/04/2007||—||—|
|Taiwan||Issued||SYSTEM AND METHOD FOR BIOMETRICALLY SECURED, TRANSPARENT ENCRYPTION AND DECRYPTION||96114976||04/27/2007||I363978||05/11/2012|
|Taiwan||Issued||BIOMETRIC AUTHENTICATION SYSTEM FOR ENHANCING NETWORK SECURITY||96118668||05/25/2007||I361611||04/01/2012|
|Taiwan||Issued||METHOD AND APPARATUS FOR INTERFACING WITH A RESTRICTED ACCESS COMPUTER SYSTEM||096137666||10/08/2007||I353522||12/01/2011|