loadpatents
name:-0.022641897201538
name:-0.020208120346069
name:-0.0018241405487061
Kindarji; Bruno Patent Filings

Kindarji; Bruno

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kindarji; Bruno.The latest application filed is for "using state reordering to protect against white box attacks".

Company Profile
1.26.23
  • Kindarji; Bruno - Paris FR
  • Kindarji; Bruno - Cedex FR
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Establishing and verifying identity using biometrics while protecting user privacy
Grant 10,868,672 - Farrugia , et al. December 15, 2
2020-12-15
Computing key-schedules of the AES for use in white boxes
Grant 9,774,443 - Chevallier-Mames , et al. September 26, 2
2017-09-26
Precomputing internal AES states in counter mode to protect keys used in AES computations
Grant 9,716,586 - Chevallier-Mames , et al. July 25, 2
2017-07-25
Using state reordering to protect against white box attacks
Grant 9,692,592 - Kindarji , et al. June 27, 2
2017-06-27
Protecting software through a fake cryptographic layer
Grant 9,639,673 - Betouin , et al. May 2, 2
2017-05-02
Protecting cryptographic operations using conjugacy class functions
Grant 9,565,018 - Farrugia , et al. February 7, 2
2017-02-07
Using State Reordering To Protect Against White Box Attacks
App 20160359618 - Kindarji; Bruno ;   et al.
2016-12-08
Multi-block cryptographic operation
Grant 9,515,818 - Kindarji , et al. December 6, 2
2016-12-06
Computing Key-schedules Of The Aes For Use In White Boxes
App 20160261405 - Chevallier-Mames; Benoit ;   et al.
2016-09-08
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations
App 20160211972 - Chevallier-Mames; Benoit ;   et al.
2016-07-21
Multi-Block Cryptographic Operation
App 20160080143 - Kindarji; Bruno ;   et al.
2016-03-17
Precomputing internal AES states in counter mode to protect keys used in AES computations
Grant 9,264,222 - Chevallier-Mames , et al. February 16, 2
2016-02-16
Protecting Software Through A Fake Cryptographic Layer
App 20150363580 - Betouin; Pierre ;   et al.
2015-12-17
Protecting Cryptographic Operations Using Conjugacy Class Functions
App 20150349951 - Farrugia; Augustin J. ;   et al.
2015-12-03
Protecting look up tables by mixing code and operations
Grant 9,189,425 - Farrugia , et al. November 17, 2
2015-11-17
Protecting against white box attacks using column rotation
Grant 9,143,317 - Chevallier-Mames , et al. September 22, 2
2015-09-22
Methods and apparatus for correlation protected processing of cryptographic operations
Grant 8,976,960 - Ciet , et al. March 10, 2
2015-03-10
Method of identification or authorization, and associated system and secure module
Grant 8,972,727 - Kindarji , et al. March 3, 2
2015-03-03
Securing the implementation of a cryptographic process using key expansion
Grant 8,966,279 - Farrugia , et al. February 24, 2
2015-02-24
Methods and apparatus for correlation protected processing of data operations
Grant 8,918,768 - Chevallier-Mames , et al. December 23, 2
2014-12-23
Protecting Against White Box Attacks Using Column Rotation
App 20140348323 - Chevallier-Mames; Benoit ;   et al.
2014-11-27
Precomputing Internal Aes States In Counter Mode To Protect Keys Used In Aes Computations
App 20140301546 - Chevallier-Mames; Benoit ;   et al.
2014-10-09
Methods And Apparatus For Correlation Protected Processing Of Data Operations
App 20140165030 - Chevallier-Mames; Benoit ;   et al.
2014-06-12
Identification based on encrypted biometric data
Grant 8,700,912 - Kindarji , et al. April 15, 2
2014-04-15
Multiplicative splits to protect cipher keys
Grant 8,675,866 - Farrugia , et al. March 18, 2
2014-03-18
Method and apparatus for obfuscating program source codes
Grant 8,661,549 - Chevallier-Mames , et al. February 25, 2
2014-02-25
Cryptographic process execution protecting an input value against attacks
Grant 8,605,894 - Farrugia , et al. December 10, 2
2013-12-10
Methods And Apparatus For Correlation Protected Processing Of Cryptographic Operations
App 20130259226 - Ciet; Mathieu ;   et al.
2013-10-03
Method And Apparatus For Obfuscating Program Source Codes
App 20130232578 - Chevallier-Mames; Benoit ;   et al.
2013-09-05
Securing Implementation Of Cryptographic Algorithms Using Additional Rounds
App 20130067212 - FARRUGIA; Augustin J. ;   et al.
2013-03-14
Protecting Look Up Tables By Mixing Code And Operations
App 20130061061 - FARRUGIA; Augustin J. ;   et al.
2013-03-07
Cryptographic Process Execution Protecting An Input Value Against Attacks
App 20130016836 - FARRUGIA; Augustin J. ;   et al.
2013-01-17
Multiplicative Splits To Protect Cipher Keys
App 20130010963 - FARRUGIA; Augustin J. ;   et al.
2013-01-10
Securing The Implementation Of A Cryptographic Process Using Key Expansion
App 20120159186 - FARRUGIA; Augustin J. ;   et al.
2012-06-21
Method of Identification or Authorization, and Associated System and Secure Module
App 20110231667 - Kindarji; Bruno ;   et al.
2011-09-22
Identification Based on Encrypted Biometric Data
App 20100281269 - Kindarji; Bruno ;   et al.
2010-11-04

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed