9 computer software for granular protection of data item stored in databases and transmission, including software and hardware encryption with alternate cryptographic standards and different type of keys//decoding and data authentication, including creating digital signatures, conducting online communication and reception of encrypted data