loadpatents
Patent applications and USPTO patent grants for Icart; Thomas.The latest application filed is for "methods and architectures for secure ranging".
Patent | Date |
---|---|
Methods and architectures for secure ranging Grant 11,405,185 - Sierra , et al. August 2, 2 | 2022-08-02 |
Indirect branch predictor security protection Grant 11,321,095 - Myers , et al. May 3, 2 | 2022-05-03 |
Device-to-device messaging protocol Grant 11,177,955 - Jacobs , et al. November 16, 2 | 2021-11-16 |
Cloud messaging system Grant 11,025,596 - Chevallier-Mames , et al. June 1, 2 | 2021-06-01 |
Methods And Architectures For Secure Ranging App 20200336303 - Sierra; Yannick L. ;   et al. | 2020-10-22 |
Device-to-device Messaging Protocol App 20200235929 - Jacobs; Frederic ;   et al. | 2020-07-23 |
Indirect Branch Predictor Security Protection App 20200192673 - Myers; Steven A. ;   et al. | 2020-06-18 |
Permutation composition based hash function Grant 10,164,772 - Ciet , et al. Dec | 2018-12-25 |
Cryptography on an elliptical curve Grant 10,027,483 - Icart , et al. July 17, 2 | 2018-07-17 |
Cryptography on a simplified elliptical curve Grant 9,866,371 - Icart January 9, 2 | 2018-01-09 |
Cryptography On An Elliptical Curve App 20170359176 - Icart; Thomas ;   et al. | 2017-12-14 |
Computing key-schedules of the AES for use in white boxes Grant 9,774,443 - Chevallier-Mames , et al. September 26, 2 | 2017-09-26 |
Cryptography On A Simplified Elliptical Curve App 20170214527 - Icart; Thomas | 2017-07-27 |
Precomputing internal AES states in counter mode to protect keys used in AES computations Grant 9,716,586 - Chevallier-Mames , et al. July 25, 2 | 2017-07-25 |
Cryptography On An Elliptical Curve App 20170207918 - Icart; Thomas ;   et al. | 2017-07-20 |
Using state reordering to protect against white box attacks Grant 9,692,592 - Kindarji , et al. June 27, 2 | 2017-06-27 |
Protecting software through a fake cryptographic layer Grant 9,639,673 - Betouin , et al. May 2, 2 | 2017-05-02 |
Protecting cryptographic operations using conjugacy class functions Grant 9,565,018 - Farrugia , et al. February 7, 2 | 2017-02-07 |
Using State Reordering To Protect Against White Box Attacks App 20160359618 - Kindarji; Bruno ;   et al. | 2016-12-08 |
Multi-block cryptographic operation Grant 9,515,818 - Kindarji , et al. December 6, 2 | 2016-12-06 |
Computing Key-schedules Of The Aes For Use In White Boxes App 20160261405 - Chevallier-Mames; Benoit ;   et al. | 2016-09-08 |
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations App 20160211972 - Chevallier-Mames; Benoit ;   et al. | 2016-07-21 |
Method and apparatus for dynamic obfuscation of static data Grant 9,336,370 - Chevallier-Mames , et al. May 10, 2 | 2016-05-10 |
Permutation Composition Based Hash Function App 20160119133 - Ciet; Mathieu ;   et al. | 2016-04-28 |
Multi-Block Cryptographic Operation App 20160080143 - Kindarji; Bruno ;   et al. | 2016-03-17 |
Precomputing internal AES states in counter mode to protect keys used in AES computations Grant 9,264,222 - Chevallier-Mames , et al. February 16, 2 | 2016-02-16 |
Secure authentication of identification for computing devices Grant 9,264,234 - Farrugia , et al. February 16, 2 | 2016-02-16 |
Protecting Software Through A Fake Cryptographic Layer App 20150363580 - Betouin; Pierre ;   et al. | 2015-12-17 |
Protecting Cryptographic Operations Using Conjugacy Class Functions App 20150349951 - Farrugia; Augustin J. ;   et al. | 2015-12-03 |
Protecting look up tables by mixing code and operations Grant 9,189,425 - Farrugia , et al. November 17, 2 | 2015-11-17 |
Protecting against white box attacks using column rotation Grant 9,143,317 - Chevallier-Mames , et al. September 22, 2 | 2015-09-22 |
Methods and apparatus for correlation protected processing of cryptographic operations Grant 8,976,960 - Ciet , et al. March 10, 2 | 2015-03-10 |
Securing the implementation of a cryptographic process using key expansion Grant 8,966,279 - Farrugia , et al. February 24, 2 | 2015-02-24 |
Methods and apparatus for correlation protected processing of data operations Grant 8,918,768 - Chevallier-Mames , et al. December 23, 2 | 2014-12-23 |
Protecting Against White Box Attacks Using Column Rotation App 20140348323 - Chevallier-Mames; Benoit ;   et al. | 2014-11-27 |
Cryptography On An Elliptical Curve App 20140314230 - Icart; Thomas ;   et al. | 2014-10-23 |
Cryptography On A Simplified Elliptical Curve App 20140314229 - Icart; Thomas | 2014-10-23 |
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations App 20140301546 - Chevallier-Mames; Benoit ;   et al. | 2014-10-09 |
Methods and apparatus for data hashing based on non-linear operations Grant 8,832,450 - Ciet , et al. September 9, 2 | 2014-09-09 |
Cryptography by parameterizing on elliptic curve Grant 8,824,670 - Icart , et al. September 2, 2 | 2014-09-02 |
Methods And Apparatus For Correlation Protected Processing Of Data Operations App 20140165030 - Chevallier-Mames; Benoit ;   et al. | 2014-06-12 |
Method And Apparatus For Dynamic Obfuscation Of Static Data App 20140165208 - Chevallier-Mames; Benoit ;   et al. | 2014-06-12 |
Cryptography on a elliptical curve Grant 8,718,276 - Icart , et al. May 6, 2 | 2014-05-06 |
Securing keys of a cipher using properties of the cipher process Grant 8,718,280 - Farrugia , et al. May 6, 2 | 2014-05-06 |
Cryptography on a simplified elliptical curve Grant 8,712,038 - Icart April 29, 2 | 2014-04-29 |
Performing boolean logic operations using arithmetic operations by code obfuscation Grant 8,707,053 - Farrugia , et al. April 22, 2 | 2014-04-22 |
Operational mode for block ciphers Grant 8,687,803 - Farrugia , et al. April 1, 2 | 2014-04-01 |
Method of executing a cryptographic calculation Grant 8,681,972 - Chabanne , et al. March 25, 2 | 2014-03-25 |
Multiplicative splits to protect cipher keys Grant 8,675,866 - Farrugia , et al. March 18, 2 | 2014-03-18 |
Encoding points of an elliptic curve Grant 8,666,066 - Icart March 4, 2 | 2014-03-04 |
Method and apparatus for obfuscating program source codes Grant 8,661,549 - Chevallier-Mames , et al. February 25, 2 | 2014-02-25 |
Apparatus and method for block cipher process for insecure environments Grant 8,644,500 - Farrugia , et al. February 4, 2 | 2014-02-04 |
Control of an entity to be controlled by a control entity Grant 8,638,940 - Chabanne , et al. January 28, 2 | 2014-01-28 |
Cryptographic process execution protecting an input value against attacks Grant 8,605,894 - Farrugia , et al. December 10, 2 | 2013-12-10 |
Methods And Apparatus For Data Hashing Based On Non-linear Operations App 20130326230 - Ciet; Mathieu ;   et al. | 2013-12-05 |
Methods And Apparatus For Correlation Protected Processing Of Cryptographic Operations App 20130259226 - Ciet; Mathieu ;   et al. | 2013-10-03 |
Method And Apparatus For Obfuscating Program Source Codes App 20130232578 - Chevallier-Mames; Benoit ;   et al. | 2013-09-05 |
Protecting states of a cryptographic process using group automorphisms Grant 8,504,845 - Farrugia , et al. August 6, 2 | 2013-08-06 |
System And Method For A Collatz Based Hash Function App 20130108038 - Ciet; Mathieu ;   et al. | 2013-05-02 |
Securing Implementation Of Cryptographic Algorithms Using Additional Rounds App 20130067212 - FARRUGIA; Augustin J. ;   et al. | 2013-03-14 |
Operational Mode For Block Ciphers App 20130067211 - FARRUGIA; Augustin J. ;   et al. | 2013-03-14 |
Protecting Look Up Tables By Mixing Code And Operations App 20130061061 - FARRUGIA; Augustin J. ;   et al. | 2013-03-07 |
Cryptographic Process Execution Protecting An Input Value Against Attacks App 20130016836 - FARRUGIA; Augustin J. ;   et al. | 2013-01-17 |
Multiplicative Splits To Protect Cipher Keys App 20130010963 - FARRUGIA; Augustin J. ;   et al. | 2013-01-10 |
Secure Authentication Of Identification For Computing Devices App 20120311338 - FARRUGIA; Augustin J. ;   et al. | 2012-12-06 |
Protecting States Of A Cryptographic Process Using Group Automorphisms App 20120254625 - FARRUGIA; Augustin J. ;   et al. | 2012-10-04 |
Performing Boolean Logic Operations Using Arithmetic Operations By Code Obfuscation App 20120204038 - FARRUGIA; Augustin J. ;   et al. | 2012-08-09 |
Securing Keys Of A Cipher Using Properties Of The Cipher Process App 20120155638 - FARRUGIA; Augustin J. ;   et al. | 2012-06-21 |
Securing The Implementation Of A Cryptographic Process Using Key Expansion App 20120159186 - FARRUGIA; Augustin J. ;   et al. | 2012-06-21 |
Cryptography By Parameterizing On Elliptic Curve App 20120134493 - Icart; Thomas ;   et al. | 2012-05-31 |
Cryptography On A Simplified Elliptical Curve App 20120093309 - Icart; Thomas | 2012-04-19 |
Cryptography On A Elliptical Curve App 20120082307 - Icart; Thomas ;   et al. | 2012-04-05 |
Apparatus and method for block cipher process for insecure environments App 20120045050 - Farrugia; Augustin J. ;   et al. | 2012-02-23 |
Encoding Points Of An Elliptic Curve App 20110274269 - Icart; Thomas | 2011-11-10 |
Method Of Executing A Cryptographic Calculation App 20110213972 - Chabanne; Herve ;   et al. | 2011-09-01 |
Control of an Entity to be Controlled by a Control Entity App 20100284538 - Chabanne; Herve ;   et al. | 2010-11-11 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.