loadpatents
name:-0.042932987213135
name:-0.035379886627197
name:-0.0043220520019531
Ebeid; Nevine Maurice Nassif Patent Filings

Ebeid; Nevine Maurice Nassif

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ebeid; Nevine Maurice Nassif.The latest application filed is for "securing method for lawful interception".

Company Profile
3.39.36
  • Ebeid; Nevine Maurice Nassif - Kitchener CA
  • Ebeid; Nevine Maurice Nassif - Waterloo CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and method for operating pseudorandom generators
Grant 11,310,033 - Lambert , et al. April 19, 2
2022-04-19
Securing Method for Lawful Interception
App 20210329039 - BUCKLEY; Michael Eoin ;   et al.
2021-10-21
Securing method for lawful interception
Grant 11,032,324 - Buckley , et al. June 8, 2
2021-06-08
System And Method For Operating Pseudorandom Generators
App 20200389293 - LAMBERT; Robert John ;   et al.
2020-12-10
Method for validating messages
Grant 10,812,273 - Buckley , et al. October 20, 2
2020-10-20
System and method for certificate selection in vehicle-to-vehicle applications to enhance privacy
Grant 10,484,351 - Romansky , et al. Nov
2019-11-19
Securing Method For Lawful Interception
App 20190312913 - BUCKLEY; Michael Eoin ;   et al.
2019-10-10
System and method for digital key sharing for access control
Grant 10,437,977 - Lambert , et al. O
2019-10-08
Method For Validating Messages
App 20190229928 - BUCKLEY; Michael Eoin ;   et al.
2019-07-25
Securing method for lawful interception
Grant 10,320,850 - Buckley , et al.
2019-06-11
Method for validating messages
Grant 10,284,377 - Buckley , et al.
2019-05-07
Key agreement for wireless communication
Grant 10,187,202 - Campagna , et al. Ja
2019-01-22
Key agreement for wireless communication
Grant 10,057,053 - Campagna , et al. August 21, 2
2018-08-21
Method For Validating Messages
App 20180109389 - BUCKLEY; Michael Eoin ;   et al.
2018-04-19
Key Agreement For Wireless Communication
App 20180109374 - Campagna; Matthew John ;   et al.
2018-04-19
Method for validating messages
Grant 9,866,396 - Buckley , et al. January 9, 2
2018-01-09
System and Method for Certificate Selection in Vehicle-to-Vehicle Applications to Enhance Privacy
App 20170222990 - ROMANSKY; Brian M. ;   et al.
2017-08-03
System and Method for Digital Key Sharing for Access Control
App 20170104589 - LAMBERT; Robert John ;   et al.
2017-04-13
Securing Method For Lawful Interception
App 20170013022 - BUCKLEY; Michael Eoin ;   et al.
2017-01-12
Method For Validating Messages
App 20160337130 - BUCKLEY; Michael Eoin ;   et al.
2016-11-17
Securing method for lawful interception
Grant 9,467,283 - Buckley , et al. October 11, 2
2016-10-11
Method for validating messages
Grant 9,407,444 - Buckley , et al. August 2, 2
2016-08-02
Method For Validating Messages
App 20150270975 - BUCKLEY; Michael Eoin ;   et al.
2015-09-24
Key agreement using a key derivation key
Grant 9,088,408 - Campagna , et al. July 21, 2
2015-07-21
Key Agreement For Wireless Communication
App 20150139424 - CAMPAGNA; Matthew John ;   et al.
2015-05-21
Key agreement for wireless communication
Grant 8,971,851 - Campagna , et al. March 3, 2
2015-03-03
Antenna shield for proximity-based communication devices
Grant 8,948,694 - Ebeid , et al. February 3, 2
2015-02-03
Securing Method For Lawful Interception
App 20140380056 - BUCKLEY; Michael Eoin ;   et al.
2014-12-25
Antenna Shield For Proximity-based Communication Devices
App 20140152417 - EBEID; Nevine Maurice Nassif ;   et al.
2014-06-05
Efficient implementation of hash algorithm on a processor
Grant 8,712,039 - Ebeid , et al. April 29, 2
2014-04-29
Power analysis attack countermeasure for the ECDSA
Grant 8,660,263 - Ebeid February 25, 2
2014-02-25
Power analysis countermeasure for the ECMQV key agreement algorithm
Grant 8,645,703 - Ebeid February 4, 2
2014-02-04
Key Agreement For Wireless Communication
App 20140004824 - Campagna; Matthew John ;   et al.
2014-01-02
Key Agreement Using A Key Derivation Key
App 20140006786 - Campagna; Matthew John ;   et al.
2014-01-02
Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
Grant 8,615,080 - Ebeid December 24, 2
2013-12-24
System and method for performing exponentiation in a cryptographic system
Grant 8,577,028 - Ebeid , et al. November 5, 2
2013-11-05
Combining interleaving with fixed-sequence windowing in an elliptic curve scalar multiplication
Grant 8,391,479 - Ebeid March 5, 2
2013-03-05
Method and apparatus for generating a public key in a manner that counters power analysis attacks
Grant 8,379,849 - Ebeid February 19, 2
2013-02-19
Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting
Grant 8,379,844 - Ebeid February 19, 2
2013-02-19
Power Analysis Attack Countermeasure For The Ecdsa
App 20130016830 - Ebeid; Nevine Maurice Nassif
2013-01-17
Power analysis attack countermeasure for the ECDSA
Grant 8,331,557 - Ebeid December 11, 2
2012-12-11
Method and Apparatus for Performing Elliptic Curve Scalar Multiplication in a Manner that Counters Power Analysis Attacks
App 20120275594 - Ebeid; Nevine Maurice Nassif
2012-11-01
Efficient Implementation of Hash Algorithm on a Processor
App 20120257742 - Ebeid; Nevine Maurice Nassif ;   et al.
2012-10-11
Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm
App 20120254620 - Ebeid; Nevine Maurice Nassif
2012-10-04
Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks
Grant 8,243,919 - Ebeid August 14, 2
2012-08-14
Power analysis countermeasure for the ECMQV key agreement algorithm
Grant 8,219,820 - Ebeid July 10, 2
2012-07-10
Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting
App 20120114117 - Ebeid; Nevine Maurice Nassif
2012-05-10
Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting
Grant 8,160,245 - Ebeid April 17, 2
2012-04-17
Method and Apparatus for Generating a Public Key in a Manner That Counters Power Analysis Attacks
App 20120033808 - Ebeid; Nevine Maurice Nassif
2012-02-09
Power Analysis Attack Countermeasure For The Ecdsa
App 20110314292 - Ebeid; Nevine Maurice Nassif
2011-12-22
Method and apparatus for generating a public key in a manner that counters power analysis attacks
Grant 8,050,403 - Ebeid November 1, 2
2011-11-01
Power analysis attack countermeasure for the ECDSA
Grant 8,027,466 - Ebeid September 27, 2
2011-09-27
System And Method For Performing Exponentiation In A Cryptographic System
App 20100223478 - Ebeid; Nevine Maurice Nassif ;   et al.
2010-09-02
Modular Squaring In Binary Field Arithmetic
App 20090157788 - EBEID; Nevine Maurice Nassif
2009-06-18
Modular Squaring In Binary Field Arithmetic
App 20090112962 - EBEID; Nevine Maurice Nassif
2009-04-30
Power Analysis Attack Countermeasure for the ECDSA
App 20080301458 - Ebeid; Nevine Maurice Nassif
2008-12-04
Power Analysis Countermeasure for the ECMQV Key Agreement Algorithm
App 20080301459 - Ebeid; Nevine Maurice Nassif
2008-12-04
Combining Interleaving with Fixed-Sequence Windowing in an Elliptic Curve Scalar Multiplication
App 20080273694 - Ebeid; Nevine Maurice Nassif
2008-11-06
Integer Division In A Manner That Counters A Power Analysis Attack
App 20080275932 - Ebeid; Nevine Maurice Nassif
2008-11-06
Method and Apparatus for Performing Elliptic Curve Scalar Multiplication in a Manner that Counters Power Analysis Attacks
App 20080219437 - Ebeid; Nevine Maurice Nassif
2008-09-11
Methods And Apparatus For Performing An Elliptic Curve Scalar Multiplication Operation Using Splitting
App 20080219450 - Ebeid; Nevine Maurice Nassif
2008-09-11
Method and Apparatus for Generating a Public Key in a Manner That Counters Power Analysis Attacks
App 20080219438 - Ebeid; Nevine Maurice Nassif
2008-09-11

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed