loadpatents
name:-0.05270791053772
name:-0.043876171112061
name:-0.01616096496582
Rohatgi; Pankaj Patent Filings

Rohatgi; Pankaj

Patent Applications and Registrations

Patent applications and USPTO patent grants for Rohatgi; Pankaj.The latest application filed is for "security chip with resistance to external monitoring attacks".

Company Profile
13.43.42
  • Rohatgi; Pankaj - Los Altos CA
  • Rohatgi; Pankaj - New Rochelle NY US
  • Rohatgi; Pankaj - Hartsdale NY
  • Rohatgi, Pankaj - Hartsdalen NY
  • Rohatgi; Pankaj - Yorktown Heights NY
  • Rohatgi; Pankaj - Los Angeles CA
  • Rohatgi; Pankaj - Sunnyvale CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Security Chip With Resistance To External Monitoring Attacks
App 20220083665 - Kocher; Paul C. ;   et al.
2022-03-17
Configuring a device based on a DPA countermeasure
Grant 11,228,422 - Gori , et al. January 18, 2
2022-01-18
Generating a pseudorandom number based on a portion of shares used in a cryptographic operation
Grant 11,101,981 - Rohatgi , et al. August 24, 2
2021-08-24
Apparatus with anticounterfeiting measures
Grant 11,074,349 - Kocher , et al. July 27, 2
2021-07-27
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks
App 20210218546 - Saab; Sami James ;   et al.
2021-07-15
Enhancements To Improve Side Channel Resistance
App 20210026956 - Saab; Sami ;   et al.
2021-01-28
Performing cryptographic data processing operations in a manner resistant to external monitoring attacks
Grant 10,897,344 - Saab , et al. January 19, 2
2021-01-19
Enhancements to improve side channel resistance
Grant 10,789,358 - Saab , et al. September 29, 2
2020-09-29
Configuring A Device Based On A Dpa Countermeasure
App 20200228306 - Gori; Christopher ;   et al.
2020-07-16
Enhancements To Improve Side Channel Resistance
App 20200175162 - Saab; Sami James ;   et al.
2020-06-04
Internet Of Things (iot) Device Management
App 20200145409 - POCHUEV; Denis Alexandrovich ;   et al.
2020-05-07
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks
App 20200021426 - Saab; Sami James ;   et al.
2020-01-16
Configuring a device based on a DPA countermeasure
Grant 10,530,566 - Gori , et al. J
2020-01-07
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20190377879 - Kocher; Paul C. ;   et al.
2019-12-12
Generating A Pseudorandom Number Based On A Portion Of Shares Used In A Cryptographic Operation
App 20190372757 - Rohatgi; Pankaj ;   et al.
2019-12-05
Programmable Block Cipher With Masked Inputs
App 20190349187 - do Canto; Rodrigo Portella ;   et al.
2019-11-14
Performing cryptographic data processing operations in a manner resistant to external monitoring attacks
Grant 10,382,193 - Saab , et al. A
2019-08-13
Generating a pseudorandom number based on a portion of shares used in a cryptographic operation
Grant 10,333,699 - Rohatgi , et al.
2019-06-25
Secure processor with resistance to external monitoring attacks
Grant 10,262,141 - Kocher , et al.
2019-04-16
System and method for secure authentication
Grant 9,940,463 - Kocher , et al. April 10, 2
2018-04-10
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20180004957 - Kocher; Paul ;   et al.
2018-01-04
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20170177874 - Kocher; Paul C. ;   et al.
2017-06-22
Performing Cryptographic Data Processing Operations In A Manner Resistant To External Monitoring Attacks
App 20170085368 - Saab; Sami James ;   et al.
2017-03-23
Risk adaptive information flow based access control
Grant 9,582,674 - Cheng , et al. February 28, 2
2017-02-28
Detection of data tampering of encrypted data
Grant 9,576,133 - Kocher , et al. February 21, 2
2017-02-21
Secure boot with resistance to differential power analysis and other external monitoring attacks
Grant 9,569,623 - Kocher , et al. February 14, 2
2017-02-14
Configuring A Device Based On A Dpa Countermeasure
App 20160315760 - Gori; Christopher ;   et al.
2016-10-27
Bitstream confirmation for configuration of a programmable logic device
Grant 9,367,693 - Kocher , et al. June 14, 2
2016-06-14
Secure Boot With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20160048684 - Kocher; Paul C. ;   et al.
2016-02-18
Bitstream Confirmation For Configuration Of A Programmable Logic Device
App 20160026826 - Kocher; Paul C. ;   et al.
2016-01-28
Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20150280907 - Kocher; Paul C. ;   et al.
2015-10-01
Programmable logic device with resistance to external monitoring attacks
Grant 8,977,864 - Kocher , et al. March 10, 2
2015-03-10
Cryptographic Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20140247944 - Kocher; Paul C. ;   et al.
2014-09-04
Cryptographic device with resistance to differential power analysis and other external monitoring attacks
Grant 8,707,052 - Kocher , et al. April 22, 2
2014-04-22
Risk Adaptive Information Flow Based Access Control
App 20140101753 - Cheng; Pau-Chen ;   et al.
2014-04-10
Risk adaptive information flow based access control
Grant 8,650,623 - Cheng , et al. February 11, 2
2014-02-11
Policy evolution with machine learning
Grant 8,606,724 - Cheng , et al. December 10, 2
2013-12-10
Cryptographic Device With Resistance To Differential Power Analysis And Other External Monitoring Attacks
App 20130173928 - Kocher; Paul C. ;   et al.
2013-07-04
Verifiable, leak-resistant encryption and decryption
Grant 8,386,800 - Kocher , et al. February 26, 2
2013-02-26
System and method for security planning with hard security constraints
Grant 8,276,192 - Anderson , et al. September 25, 2
2012-09-25
Method, apparatus and system for resistance to side channel attacks on random number generators
Grant 8,135,766 - Chari , et al. March 13, 2
2012-03-13
System and method for security planning with soft security constraints
Grant 8,132,259 - Anderson , et al. March 6, 2
2012-03-06
Method of managing and mitigating security risks through planning
Grant 8,099,781 - Anderson , et al. January 17, 2
2012-01-17
Fuzzy multi-level security
Grant 8,087,090 - Cheng , et al. December 27, 2
2011-12-27
Access control method and a system for privacy protection
Grant 8,032,924 - Chen , et al. October 4, 2
2011-10-04
Access control method and a system for privacy protection
Grant 8,020,213 - Chen , et al. September 13, 2
2011-09-13
Risk Adaptive Information Flow Based Access Control
App 20110173084 - Cheng; Pau-Chen ;   et al.
2011-07-14
Verifiable, Leak-Resistant Encryption and Decryption
App 20110138192 - KOCHER; Paul C. ;   et al.
2011-06-09
Policy Evolution With Machine Learning
App 20100332422 - Cheng; Pau-Chen ;   et al.
2010-12-30
Method of managing and mitigating security risks through planning
Grant 7,832,007 - Anderson , et al. November 9, 2
2010-11-09
Method of Managing and Mitigating Security Risks Through Planning
App 20090282487 - Anderson; Kay S. ;   et al.
2009-11-12
System and method for fuzzy multi-level security
Grant 7,530,110 - Cheng , et al. May 5, 2
2009-05-05
Access Control Method And A System For Privacy Protection
App 20090064343 - Chen; Weifeng ;   et al.
2009-03-05
Method, apparatus and system for resistance to side channel attacks on random number generators
Grant 7,496,616 - Chari , et al. February 24, 2
2009-02-24
Method, Apparatus And System For Resistance To Side Channel Attacks On Random Number Generators
App 20090049111 - Chari; Suresh Narayana ;   et al.
2009-02-19
System And Method For Fuzzy Multi-level Security
App 20080263662 - Cheng; Pau-Chen ;   et al.
2008-10-23
System And Method For Security Planning With Soft Security Constraints
App 20080168529 - Anderson; Kay Schwendimann ;   et al.
2008-07-10
Access control method and a system for privacy protection
App 20080034439 - Chen; Weifeng ;   et al.
2008-02-07
System and method for security planning with hard security constraints
App 20080016547 - Anderson; Kay Schwendimann ;   et al.
2008-01-17
Method of managing and mitigating security risks through planning
App 20070162976 - Anderson; Kay W. ;   et al.
2007-07-12
Space-efficient, side-channel attack resistant table lookups
Grant 7,142,670 - Chari , et al. November 28, 2
2006-11-28
System and method for fuzzy multi-level security
App 20060253709 - Cheng; Pau-Chen ;   et al.
2006-11-09
Intrusion detection system
App 20060161982 - Chari; Suresh N. ;   et al.
2006-07-20
Method, apparatus and system for resistance to side channel attacks on random number generators
App 20060104443 - Chari; Suresh Narayana ;   et al.
2006-05-18
System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems
Grant 6,978,446 - Archambeault , et al. December 20, 2
2005-12-20
Cost effective incident response
App 20050257269 - Chari, Suresh N. ;   et al.
2005-11-17
System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems
Grant 6,870,090 - Agrawal , et al. March 22, 2
2005-03-22
Commitments in signatures
Grant 6,826,687 - Rohatgi November 30, 2
2004-11-30
Processing Galois Field arithmetic
Grant 6,766,344 - Dubey , et al. July 20, 2
2004-07-20
Efficient hybrid public key signature scheme
Grant 6,701,434 - Rohatgi March 2, 2
2004-03-02
System for protecting against leakage of sensitive information from compromising electromagnetic emissions from computing systems
App 20030081400 - Agrawal, Dakshi ;   et al.
2003-05-01
System and method for protecting against leakage of sensitive information from compromising electromagnetic emanations from computing systems
App 20030084333 - Archambeault, Bruce Roy ;   et al.
2003-05-01
System and method for evaluating electromagnetic emanation vulnerabilities of computing systems
App 20030083831 - Agrawal, Dakshi ;   et al.
2003-05-01
Processing galois field arithmetic
App 20030055858 - Dubey, Pradeep K. ;   et al.
2003-03-20
Space-efficient, side-channel attack resistant table lookups
App 20030044003 - Chari, Suresh N. ;   et al.
2003-03-06
Method and apparatus for securing communication utilizing a security processor
Grant 6,311,270 - Challener , et al. October 30, 2
2001-10-30
How to sign digital streams
Grant 6,311,271 - Gennaro , et al. October 30, 2
2001-10-30
Method And Apparatus For Collecting Information Associated With Movement Between Locations
App 20010011227 - ASHERY, LAWRENCE E. ;   et al.
2001-08-02
How to sign digital streams
Grant 6,009,176 - Gennaro , et al. December 28, 1
1999-12-28
Method for compressing and decompressing data files
Grant 5,841,953 - Rohatgi November 24, 1
1998-11-24
Apparatus and method for authenticating transmitting applications in an interactive TV system
Grant 5,625,693 - Rohatgi , et al. April 29, 1
1997-04-29

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed