loadpatents
name:-0.025918960571289
name:-0.025842905044556
name:-0.009343147277832
Icart; Thomas Patent Filings

Icart; Thomas

Patent Applications and Registrations

Patent applications and USPTO patent grants for Icart; Thomas.The latest application filed is for "methods and architectures for secure ranging".

Company Profile
4.55.48
  • Icart; Thomas - Paris FR
  • Icart; Thomas - Cedex FR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Methods and architectures for secure ranging
Grant 11,405,185 - Sierra , et al. August 2, 2
2022-08-02
Indirect branch predictor security protection
Grant 11,321,095 - Myers , et al. May 3, 2
2022-05-03
Device-to-device messaging protocol
Grant 11,177,955 - Jacobs , et al. November 16, 2
2021-11-16
Cloud messaging system
Grant 11,025,596 - Chevallier-Mames , et al. June 1, 2
2021-06-01
Methods And Architectures For Secure Ranging
App 20200336303 - Sierra; Yannick L. ;   et al.
2020-10-22
Device-to-device Messaging Protocol
App 20200235929 - Jacobs; Frederic ;   et al.
2020-07-23
Indirect Branch Predictor Security Protection
App 20200192673 - Myers; Steven A. ;   et al.
2020-06-18
Permutation composition based hash function
Grant 10,164,772 - Ciet , et al. Dec
2018-12-25
Cryptography on an elliptical curve
Grant 10,027,483 - Icart , et al. July 17, 2
2018-07-17
Cryptography on a simplified elliptical curve
Grant 9,866,371 - Icart January 9, 2
2018-01-09
Cryptography On An Elliptical Curve
App 20170359176 - Icart; Thomas ;   et al.
2017-12-14
Computing key-schedules of the AES for use in white boxes
Grant 9,774,443 - Chevallier-Mames , et al. September 26, 2
2017-09-26
Cryptography On A Simplified Elliptical Curve
App 20170214527 - Icart; Thomas
2017-07-27
Precomputing internal AES states in counter mode to protect keys used in AES computations
Grant 9,716,586 - Chevallier-Mames , et al. July 25, 2
2017-07-25
Cryptography On An Elliptical Curve
App 20170207918 - Icart; Thomas ;   et al.
2017-07-20
Using state reordering to protect against white box attacks
Grant 9,692,592 - Kindarji , et al. June 27, 2
2017-06-27
Protecting software through a fake cryptographic layer
Grant 9,639,673 - Betouin , et al. May 2, 2
2017-05-02
Protecting cryptographic operations using conjugacy class functions
Grant 9,565,018 - Farrugia , et al. February 7, 2
2017-02-07
Using State Reordering To Protect Against White Box Attacks
App 20160359618 - Kindarji; Bruno ;   et al.
2016-12-08
Multi-block cryptographic operation
Grant 9,515,818 - Kindarji , et al. December 6, 2
2016-12-06
Computing Key-schedules Of The Aes For Use In White Boxes
App 20160261405 - Chevallier-Mames; Benoit ;   et al.
2016-09-08
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations
App 20160211972 - Chevallier-Mames; Benoit ;   et al.
2016-07-21
Method and apparatus for dynamic obfuscation of static data
Grant 9,336,370 - Chevallier-Mames , et al. May 10, 2
2016-05-10
Permutation Composition Based Hash Function
App 20160119133 - Ciet; Mathieu ;   et al.
2016-04-28
Multi-Block Cryptographic Operation
App 20160080143 - Kindarji; Bruno ;   et al.
2016-03-17
Precomputing internal AES states in counter mode to protect keys used in AES computations
Grant 9,264,222 - Chevallier-Mames , et al. February 16, 2
2016-02-16
Secure authentication of identification for computing devices
Grant 9,264,234 - Farrugia , et al. February 16, 2
2016-02-16
Protecting Software Through A Fake Cryptographic Layer
App 20150363580 - Betouin; Pierre ;   et al.
2015-12-17
Protecting Cryptographic Operations Using Conjugacy Class Functions
App 20150349951 - Farrugia; Augustin J. ;   et al.
2015-12-03
Protecting look up tables by mixing code and operations
Grant 9,189,425 - Farrugia , et al. November 17, 2
2015-11-17
Protecting against white box attacks using column rotation
Grant 9,143,317 - Chevallier-Mames , et al. September 22, 2
2015-09-22
Methods and apparatus for correlation protected processing of cryptographic operations
Grant 8,976,960 - Ciet , et al. March 10, 2
2015-03-10
Securing the implementation of a cryptographic process using key expansion
Grant 8,966,279 - Farrugia , et al. February 24, 2
2015-02-24
Methods and apparatus for correlation protected processing of data operations
Grant 8,918,768 - Chevallier-Mames , et al. December 23, 2
2014-12-23
Protecting Against White Box Attacks Using Column Rotation
App 20140348323 - Chevallier-Mames; Benoit ;   et al.
2014-11-27
Cryptography On An Elliptical Curve
App 20140314230 - Icart; Thomas ;   et al.
2014-10-23
Cryptography On A Simplified Elliptical Curve
App 20140314229 - Icart; Thomas
2014-10-23
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations
App 20140301546 - Chevallier-Mames; Benoit ;   et al.
2014-10-09
Methods and apparatus for data hashing based on non-linear operations
Grant 8,832,450 - Ciet , et al. September 9, 2
2014-09-09
Cryptography by parameterizing on elliptic curve
Grant 8,824,670 - Icart , et al. September 2, 2
2014-09-02
Methods And Apparatus For Correlation Protected Processing Of Data Operations
App 20140165030 - Chevallier-Mames; Benoit ;   et al.
2014-06-12
Method And Apparatus For Dynamic Obfuscation Of Static Data
App 20140165208 - Chevallier-Mames; Benoit ;   et al.
2014-06-12
Cryptography on a elliptical curve
Grant 8,718,276 - Icart , et al. May 6, 2
2014-05-06
Securing keys of a cipher using properties of the cipher process
Grant 8,718,280 - Farrugia , et al. May 6, 2
2014-05-06
Cryptography on a simplified elliptical curve
Grant 8,712,038 - Icart April 29, 2
2014-04-29
Performing boolean logic operations using arithmetic operations by code obfuscation
Grant 8,707,053 - Farrugia , et al. April 22, 2
2014-04-22
Operational mode for block ciphers
Grant 8,687,803 - Farrugia , et al. April 1, 2
2014-04-01
Method of executing a cryptographic calculation
Grant 8,681,972 - Chabanne , et al. March 25, 2
2014-03-25
Multiplicative splits to protect cipher keys
Grant 8,675,866 - Farrugia , et al. March 18, 2
2014-03-18
Encoding points of an elliptic curve
Grant 8,666,066 - Icart March 4, 2
2014-03-04
Method and apparatus for obfuscating program source codes
Grant 8,661,549 - Chevallier-Mames , et al. February 25, 2
2014-02-25
Apparatus and method for block cipher process for insecure environments
Grant 8,644,500 - Farrugia , et al. February 4, 2
2014-02-04
Control of an entity to be controlled by a control entity
Grant 8,638,940 - Chabanne , et al. January 28, 2
2014-01-28
Cryptographic process execution protecting an input value against attacks
Grant 8,605,894 - Farrugia , et al. December 10, 2
2013-12-10
Methods And Apparatus For Data Hashing Based On Non-linear Operations
App 20130326230 - Ciet; Mathieu ;   et al.
2013-12-05
Methods And Apparatus For Correlation Protected Processing Of Cryptographic Operations
App 20130259226 - Ciet; Mathieu ;   et al.
2013-10-03
Method And Apparatus For Obfuscating Program Source Codes
App 20130232578 - Chevallier-Mames; Benoit ;   et al.
2013-09-05
Protecting states of a cryptographic process using group automorphisms
Grant 8,504,845 - Farrugia , et al. August 6, 2
2013-08-06
System And Method For A Collatz Based Hash Function
App 20130108038 - Ciet; Mathieu ;   et al.
2013-05-02
Securing Implementation Of Cryptographic Algorithms Using Additional Rounds
App 20130067212 - FARRUGIA; Augustin J. ;   et al.
2013-03-14
Operational Mode For Block Ciphers
App 20130067211 - FARRUGIA; Augustin J. ;   et al.
2013-03-14
Protecting Look Up Tables By Mixing Code And Operations
App 20130061061 - FARRUGIA; Augustin J. ;   et al.
2013-03-07
Cryptographic Process Execution Protecting An Input Value Against Attacks
App 20130016836 - FARRUGIA; Augustin J. ;   et al.
2013-01-17
Multiplicative Splits To Protect Cipher Keys
App 20130010963 - FARRUGIA; Augustin J. ;   et al.
2013-01-10
Secure Authentication Of Identification For Computing Devices
App 20120311338 - FARRUGIA; Augustin J. ;   et al.
2012-12-06
Protecting States Of A Cryptographic Process Using Group Automorphisms
App 20120254625 - FARRUGIA; Augustin J. ;   et al.
2012-10-04
Performing Boolean Logic Operations Using Arithmetic Operations By Code Obfuscation
App 20120204038 - FARRUGIA; Augustin J. ;   et al.
2012-08-09
Securing Keys Of A Cipher Using Properties Of The Cipher Process
App 20120155638 - FARRUGIA; Augustin J. ;   et al.
2012-06-21
Securing The Implementation Of A Cryptographic Process Using Key Expansion
App 20120159186 - FARRUGIA; Augustin J. ;   et al.
2012-06-21
Cryptography By Parameterizing On Elliptic Curve
App 20120134493 - Icart; Thomas ;   et al.
2012-05-31
Cryptography On A Simplified Elliptical Curve
App 20120093309 - Icart; Thomas
2012-04-19
Cryptography On A Elliptical Curve
App 20120082307 - Icart; Thomas ;   et al.
2012-04-05
Apparatus and method for block cipher process for insecure environments
App 20120045050 - Farrugia; Augustin J. ;   et al.
2012-02-23
Encoding Points Of An Elliptic Curve
App 20110274269 - Icart; Thomas
2011-11-10
Method Of Executing A Cryptographic Calculation
App 20110213972 - Chabanne; Herve ;   et al.
2011-09-01
Control of an Entity to be Controlled by a Control Entity
App 20100284538 - Chabanne; Herve ;   et al.
2010-11-11

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed