For nearly two decades, McCann Perkins has been conceiving, engineering, protecting, and transferring critical technologies — in cybersecurity, artificial intelligence, quantum systems, and hardware security.
"We don't consult on technology.
We create it, protect it,
and transfer it."
McCann Perkins was incorporated in Delaware in 2006 — a year before the first iPhone, five years before most enterprises had heard of cloud computing, nearly a decade before quantum computing became a boardroom conversation.
We have spent those years doing one thing with discipline: creating original technologies in critical domains, structuring them as defensible intellectual property, and transferring them to the markets and organizations that need them.
We are not a consultancy. Not an accelerator. Not a fund. We are an innovation engine — a technology company whose primary output is intellectual property and whose primary mission is to ensure that IP reaches the operators, ventures, and institutions that can deploy it.
McCann Perkins LLC is established in the United States with a mandate to develop and commercialize critical technologies — starting with cybersecurity infrastructure for emerging digital ecosystems.
As hardware security and artificial intelligence emerged as foundational domains, McCann Perkins extended its R&D mandate to cover hardware authentication, edge AI systems, and secure computing architectures.
Anticipating the quantum computing threat years ahead of mainstream awareness, we developed post-quantum cryptographic protocols and migration architectures now aligned with NIST PQC standards.
Cybersecurity, Artificial Intelligence, Quantum technologies, and Hardware security — four domains where McCann Perkins holds proprietary IP and actively creates, licenses, and transfers technology.
Our model is built on a single conviction: the most durable competitive advantage in critical technology is not who builds first — it is who owns the underlying intellectual property. Everything we do is structured around creating, protecting, and transferring IP that gives its holders a lasting edge.
We invent original technologies in critical domains — from first principles, not incremental improvement. Every architecture we design is structured for patent defensibility from the outset.
We license our portfolio to ventures, industrial operators, and institutions — with structures calibrated to deployment stage, exclusivity requirements, and long-term commercial realities.
Full or partial transfer of technology assets — including documentation, source material, know-how, and transition support — to acquirers, spinouts, or strategic partners.
Contracted research and development for organizations requiring original technology built to specification — with IP ownership and licensing rights structured from the mandate outset.
Technical advisory on system architecture for operators deploying critical technologies — covering security design, cryptographic implementation, and hardware authentication integration.
Independent evaluation of technology IP for investors, acquirers, and boards — patent defensibility, freedom-to-operate, commercial licensing potential, and market positioning.
From network perimeter defense to zero-trust architectures and sovereign security frameworks — McCann Perkins has been building cybersecurity IP since 2006, before most organizations understood the scale of what was coming.
AI engineered for critical environments — where auditability, adversarial robustness, and operational integrity are non-negotiable. Our AI IP covers secure inference, edge deployment, and governance-bound model architectures.
Post-quantum cryptography, quantum key distribution integration, and QRNG-based entropy generation. We anticipated the quantum computing threat years before it entered mainstream security discourse — and built accordingly.
Physical unclonable functions, secure enclaves, hardware root of trust, and supply chain integrity verification. Authentication that cannot be spoofed, cloned, or compromised at the software layer.
Nearly two decades of building critical technologies has given us a disciplined process — one that ensures every technology we create is defensible, deployable, and transferable. We don't iterate to viability. We design for it from the first step.
We scan the threat and technology landscape to identify unsolved problems of strategic significance — gaps where the absence of a solution carries real operational or security cost.
Original technical architectures designed from first principles. We deliberately map prior art before beginning, to ensure every design decision maximizes both technical performance and IP defensibility.
Before a prototype is built, the intellectual property framework is designed — filing strategy, trade secret decisions, licensing architecture — so the technology is defensible from inception, not as an afterthought.
Working proofs of concept that validate technical feasibility, demonstrate utility, and form the technical foundation for both patent applications and licensing conversations.
Licensing, co-development, or full transfer to the operators, ventures, or institutions best positioned to deploy the technology at scale — with ongoing technical support as required.
Founders building in cybersecurity, AI, quantum, or hardware security who need access to foundational IP they cannot create from scratch — and the technical credibility that comes with nearly two decades of R&D behind it.
Organizations deploying critical infrastructure who require proven, transferable technology rather than bespoke development — backed by the stability of a firm that has operated continuously since 2006.
Critical technology companies come and go. We have operated continuously since 2006 — through economic cycles, paradigm shifts, and the emergence of entirely new threat categories. Our IP portfolio reflects that continuity.
We began working on post-quantum cryptography before most security teams knew what a qubit was. We developed hardware authentication IP before supply chain attacks became front-page news. Foresight is not accidental — it is our method.
Every technology we create is structured for defensibility from the first design decision. We do not build and then protect — we protect as we build. This distinction separates durable IP from technology that competitors will eventually replicate freely.
We have maintained a deliberately limited number of active engagements since 2006. This is not a constraint — it is a commitment to depth over volume. Every technology we build receives our full attention. Every licensing relationship is one we intend to maintain.
If you are working on a problem in our domains and believe there is a basis for collaboration, we welcome a direct inquiry. We respond to every serious outreach.
Send an inquiry →