encryption key management structure and hierarchy, namely, computer software and hardware platforms for use in information security applications, namely, those involving encryption, decryption, validation, and authentication of sensitive data
Electrical and Scientific Apparatus