Patent | Date |
---|
Security Chip With Resistance To External Monitoring Attacks App 20220083665 - Kocher; Paul C. ;   et al. | 2022-03-17 |
Configuring a device based on a DPA countermeasure Grant 11,228,422 - Gori , et al. January 18, 2 | 2022-01-18 |
Generating a pseudorandom number based on a portion of shares used in a cryptographic operation Grant 11,101,981 - Rohatgi , et al. August 24, 2 | 2021-08-24 |
Apparatus with anticounterfeiting measures Grant 11,074,349 - Kocher , et al. July 27, 2 | 2021-07-27 |
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks App 20210218546 - Saab; Sami James ;   et al. | 2021-07-15 |
Enhancements To Improve Side Channel Resistance App 20210026956 - Saab; Sami ;   et al. | 2021-01-28 |
Performing cryptographic data processing operations in a manner resistant to external monitoring attacks Grant 10,897,344 - Saab , et al. January 19, 2 | 2021-01-19 |
Enhancements to improve side channel resistance Grant 10,789,358 - Saab , et al. September 29, 2 | 2020-09-29 |
Configuring A Device Based On A Dpa Countermeasure App 20200228306 - Gori; Christopher ;   et al. | 2020-07-16 |
Enhancements To Improve Side Channel Resistance App 20200175162 - Saab; Sami James ;   et al. | 2020-06-04 |
Internet Of Things (iot) Device Management App 20200145409 - POCHUEV; Denis Alexandrovich ;   et al. | 2020-05-07 |
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks App 20200021426 - Saab; Sami James ;   et al. | 2020-01-16 |
Configuring a device based on a DPA countermeasure Grant 10,530,566 - Gori , et al. J | 2020-01-07 |
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20190377879 - Kocher; Paul C. ;   et al. | 2019-12-12 |
Generating A Pseudorandom Number Based On A Portion Of Shares Used In A Cryptographic Operation App 20190372757 - Rohatgi; Pankaj ;   et al. | 2019-12-05 |
Programmable Block Cipher With Masked Inputs App 20190349187 - do Canto; Rodrigo Portella ;   et al. | 2019-11-14 |
Performing cryptographic data processing operations in a manner resistant to external monitoring attacks Grant 10,382,193 - Saab , et al. A | 2019-08-13 |
Generating a pseudorandom number based on a portion of shares used in a cryptographic operation Grant 10,333,699 - Rohatgi , et al. | 2019-06-25 |
Secure processor with resistance to external monitoring attacks Grant 10,262,141 - Kocher , et al. | 2019-04-16 |
System and method for secure authentication Grant 9,940,463 - Kocher , et al. April 10, 2 | 2018-04-10 |
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20180004957 - Kocher; Paul ;   et al. | 2018-01-04 |
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20170177874 - Kocher; Paul C. ;   et al. | 2017-06-22 |
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks App 20170085368 - Saab; Sami James ;   et al. | 2017-03-23 |
Risk adaptive information flow based access control Grant 9,582,674 - Cheng , et al. February 28, 2 | 2017-02-28 |
Detection of data tampering of encrypted data Grant 9,576,133 - Kocher , et al. February 21, 2 | 2017-02-21 |
Secure boot with resistance to differential power analysis and other external monitoring attacks Grant 9,569,623 - Kocher , et al. February 14, 2 | 2017-02-14 |
Configuring A Device Based On A Dpa Countermeasure App 20160315760 - Gori; Christopher ;   et al. | 2016-10-27 |
Bitstream confirmation for configuration of a programmable logic device Grant 9,367,693 - Kocher , et al. June 14, 2 | 2016-06-14 |
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20160048684 - Kocher; Paul C. ;   et al. | 2016-02-18 |
Bitstream Confirmation For Configuration Of A Programmable Logic Device App 20160026826 - Kocher; Paul C. ;   et al. | 2016-01-28 |
Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20150280907 - Kocher; Paul C. ;   et al. | 2015-10-01 |
Programmable logic device with resistance to external monitoring attacks Grant 8,977,864 - Kocher , et al. March 10, 2 | 2015-03-10 |
Cryptographic Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20140247944 - Kocher; Paul C. ;   et al. | 2014-09-04 |
Cryptographic device with resistance to differential power analysis and other external monitoring attacks Grant 8,707,052 - Kocher , et al. April 22, 2 | 2014-04-22 |
Risk Adaptive Information Flow Based Access Control App 20140101753 - Cheng; Pau-Chen ;   et al. | 2014-04-10 |
Risk adaptive information flow based access control Grant 8,650,623 - Cheng , et al. February 11, 2 | 2014-02-11 |
Policy evolution with machine learning Grant 8,606,724 - Cheng , et al. December 10, 2 | 2013-12-10 |
Cryptographic Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks App 20130173928 - Kocher; Paul C. ;   et al. | 2013-07-04 |
Verifiable, leak-resistant encryption and decryption Grant 8,386,800 - Kocher , et al. February 26, 2 | 2013-02-26 |
System and method for security planning with hard security constraints Grant 8,276,192 - Anderson , et al. September 25, 2 | 2012-09-25 |
Method, apparatus and system for resistance to side channel attacks on random number generators Grant 8,135,766 - Chari , et al. March 13, 2 | 2012-03-13 |
System and method for security planning with soft security constraints Grant 8,132,259 - Anderson , et al. March 6, 2 | 2012-03-06 |
Method of managing and mitigating security risks through planning Grant 8,099,781 - Anderson , et al. January 17, 2 | 2012-01-17 |
Fuzzy multi-level security Grant 8,087,090 - Cheng , et al. December 27, 2 | 2011-12-27 |
Access control method and a system for privacy protection Grant 8,032,924 - Chen , et al. October 4, 2 | 2011-10-04 |
Access control method and a system for privacy protection Grant 8,020,213 - Chen , et al. September 13, 2 | 2011-09-13 |
Risk Adaptive Information Flow Based Access Control App 20110173084 - Cheng; Pau-Chen ;   et al. | 2011-07-14 |
Verifiable, Leak-Resistant Encryption and Decryption App 20110138192 - KOCHER; Paul C. ;   et al. | 2011-06-09 |
Policy Evolution With Machine Learning App 20100332422 - Cheng; Pau-Chen ;   et al. | 2010-12-30 |
Method of managing and mitigating security risks through planning Grant 7,832,007 - Anderson , et al. November 9, 2 | 2010-11-09 |
Method of Managing and Mitigating Security Risks Through Planning App 20090282487 - Anderson; Kay S. ;   et al. | 2009-11-12 |
System and method for fuzzy multi-level security Grant 7,530,110 - Cheng , et al. May 5, 2 | 2009-05-05 |
Access Control Method And A System For Privacy Protection App 20090064343 - Chen; Weifeng ;   et al. | 2009-03-05 |
Method, apparatus and system for resistance to side channel attacks on random number generators Grant 7,496,616 - Chari , et al. February 24, 2 | 2009-02-24 |
Method, Apparatus And System For Resistance To Side Channel Attacks On Random Number Generators App 20090049111 - Chari; Suresh Narayana ;   et al. | 2009-02-19 |
System And Method For Fuzzy Multi-level Security App 20080263662 - Cheng; Pau-Chen ;   et al. | 2008-10-23 |
System And Method For Security Planning With Soft Security Constraints App 20080168529 - Anderson; Kay Schwendimann ;   et al. | 2008-07-10 |
Access control method and a system for privacy protection App 20080034439 - Chen; Weifeng ;   et al. | 2008-02-07 |
System and method for security planning with hard security constraints App 20080016547 - Anderson; Kay Schwendimann ;   et al. | 2008-01-17 |
Method of managing and mitigating security risks through planning App 20070162976 - Anderson; Kay W. ;   et al. | 2007-07-12 |
Space-efficient, side-channel attack resistant table lookups Grant 7,142,670 - Chari , et al. November 28, 2 | 2006-11-28 |
System and method for fuzzy multi-level security App 20060253709 - Cheng; Pau-Chen ;   et al. | 2006-11-09 |
Intrusion detection system App 20060161982 - Chari; Suresh N. ;   et al. | 2006-07-20 |
Method, apparatus and system for resistance to side channel attacks on random number generators App 20060104443 - Chari; Suresh Narayana ;   et al. | 2006-05-18 |
System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems Grant 6,978,446 - Archambeault , et al. December 20, 2 | 2005-12-20 |
Cost effective incident response App 20050257269 - Chari, Suresh N. ;   et al. | 2005-11-17 |
System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems Grant 6,870,090 - Agrawal , et al. March 22, 2 | 2005-03-22 |
Commitments in signatures Grant 6,826,687 - Rohatgi November 30, 2 | 2004-11-30 |
Processing Galois Field arithmetic Grant 6,766,344 - Dubey , et al. July 20, 2 | 2004-07-20 |
Efficient hybrid public key signature scheme Grant 6,701,434 - Rohatgi March 2, 2 | 2004-03-02 |
System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems App 20030081400 - Agrawal, Dakshi ;   et al. | 2003-05-01 |
System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems App 20030084333 - Archambeault, Bruce Roy ;   et al. | 2003-05-01 |
System and method for evaluating electromagnetic emanation vulnerabilities of computing systems App 20030083831 - Agrawal, Dakshi ;   et al. | 2003-05-01 |
Processing galois field arithmetic App 20030055858 - Dubey, Pradeep K. ;   et al. | 2003-03-20 |
Space-efficient, side-channel attack resistant table lookups App 20030044003 - Chari, Suresh N. ;   et al. | 2003-03-06 |
Method and apparatus for securing communication utilizing a security processor Grant 6,311,270 - Challener , et al. October 30, 2 | 2001-10-30 |
How to sign digital streams Grant 6,311,271 - Gennaro , et al. October 30, 2 | 2001-10-30 |
Method And Apparatus For Collecting Information Associated With Movement Between Locations App 20010011227 - ASHERY, LAWRENCE E. ;   et al. | 2001-08-02 |
How to sign digital streams Grant 6,009,176 - Gennaro , et al. December 28, 1 | 1999-12-28 |
Method for compressing and decompressing data files Grant 5,841,953 - Rohatgi November 24, 1 | 1998-11-24 |
Apparatus and method for authenticating transmitting applications in an interactive TV system Grant 5,625,693 - Rohatgi , et al. April 29, 1 | 1997-04-29 |