Patent | Date |
---|
Heartbeats and consensus in verifiable outsourced ledgers Grant 11,403,631 - Setty , et al. August 2, 2 | 2022-08-02 |
Secure data processing on sensitive data using trusted hardware Grant 11,232,214 - Kaushik , et al. January 25, 2 | 2022-01-25 |
Blockchain system for leveraging member nodes to achieve consensus Grant 10,984,134 - Setty , et al. April 20, 2 | 2021-04-20 |
Data operations using a proxy encryption key Grant 10,917,394 - Manu , et al. February 9, 2 | 2021-02-09 |
Heartbeats And Consensus In Verifiable Outsourced Ledgers App 20200320528 - Setty; Srinath ;   et al. | 2020-10-08 |
Secure Data Processing On Sensitive Data Using Trusted Hardware App 20200272744 - Kaushik; Shriraghav ;   et al. | 2020-08-27 |
Verifiable Outsourced Ledgers App 20200259843 - A1 | 2020-08-13 |
Heartbeats and consensus in verifiable outsourced ledgers Grant 10,733,602 - Setty , et al. | 2020-08-04 |
Secure data processing on sensitive data using trusted hardware Grant 10,671,736 - Kaushik , et al. | 2020-06-02 |
Verifiable outsourced ledgers Grant 10,587,628 - Setty , et al. | 2020-03-10 |
Data Operations Using A Proxy Encryption Key App 20200067896 - Manu; Mitica ;   et al. | 2020-02-27 |
Homomorphic factorization encryption Grant 10,554,390 - Jain , et al. Fe | 2020-02-04 |
Homomorphic data analysis Grant 10,491,373 - Jain , et al. Nov | 2019-11-26 |
Data operations using a proxy encryption key Grant 10,484,352 - Manu , et al. Nov | 2019-11-19 |
Formatting data by example Grant 10,409,892 - Rothschiller , et al. Sept | 2019-09-10 |
Policy-based key recovery Grant 10,263,775 - Setty , et al. | 2019-04-16 |
Blockchain App 20190018984 - SETTY; Srinath ;   et al. | 2019-01-17 |
Policy-Based Key Recovery App 20180375653 - SETTY; Srinath Tumkur Venkatacha ;   et al. | 2018-12-27 |
Homomorphic Factorization Encryption App 20180359084 - Jain; Prateek ;   et al. | 2018-12-13 |
Homomorphic Data Analysis App 20180359078 - Jain; Prateek ;   et al. | 2018-12-13 |
Data Operations Using A Proxy Encryption Key App 20180288020 - MANU; Mitica ;   et al. | 2018-10-04 |
Heartbeats And Consensus In Verifiable Outsourced Ledgers App 20180089683 - Setty; Srinath ;   et al. | 2018-03-29 |
Verifiable Outsourced Ledgers App 20180091524 - Setty; Srinath ;   et al. | 2018-03-29 |
Secure Data Processing On Sensitive Data Using Trusted Hardware App 20180046812 - Kaushik; Shriraghav ;   et al. | 2018-02-15 |
Integrated data deduplication and encryption Grant 9,495,552 - El-Shimi , et al. November 15, 2 | 2016-11-15 |
Virtualization for diversified tamper resistance Grant 9,459,893 - Anckaert , et al. October 4, 2 | 2016-10-04 |
Secure cloud database platform with encrypted database queries Grant 9,213,867 - Ramamurthy , et al. December 15, 2 | 2015-12-15 |
Data location obfuscation Grant 9,117,094 - Anckaert , et al. August 25, 2 | 2015-08-25 |
Secure cloud computing platform Grant 9,053,348 - Venkatesan , et al. June 9, 2 | 2015-06-09 |
Automated secure pairing for wireless devices Grant 8,989,706 - Ananthanarayanan , et al. March 24, 2 | 2015-03-24 |
Secure Data Processing On Sensitive Data Using Trusted Hardware App 20140281511 - Kaushik; Shriraghav ;   et al. | 2014-09-18 |
Integrated Data Deduplication and Encryption App 20140189348 - El-Shimi; Ahmed Moustafa ;   et al. | 2014-07-03 |
Secure Cloud Database Platform App 20140164758 - Ramamurthy; Ravishankar ;   et al. | 2014-06-12 |
Visualization for Diversified Tamper Resistance App 20140068580 - Anckaert; Bertrand ;   et al. | 2014-03-06 |
Randomized signal transforms and their applications Grant 8,595,276 - Venkatesan , et al. November 26, 2 | 2013-11-26 |
Virtualization for diversified tamper resistance Grant 8,584,109 - Anckaert , et al. November 12, 2 | 2013-11-12 |
Secure Cloud Computing Platform App 20130254841 - Venkatesan; Ramarathnam ;   et al. | 2013-09-26 |
Program analysis as constraint solving Grant 8,402,439 - Gulwani , et al. March 19, 2 | 2013-03-19 |
Resilient classification of data Grant 8,364,617 - Laxman , et al. January 29, 2 | 2013-01-29 |
Template based approach to discovering disjunctive and quantified invariants over predicate abstraction Grant 8,271,404 - Gulwani , et al. September 18, 2 | 2012-09-18 |
Formatting Data By Example App 20120192051 - Rothschiller; Chad ;   et al. | 2012-07-26 |
Universal secure token for obfuscation and tamper resistance Grant 8,171,306 - Venkatesan , et al. May 1, 2 | 2012-05-01 |
Function matching in binaries Grant 8,166,466 - Mohanan , et al. April 24, 2 | 2012-04-24 |
Automated Secure Pairing for Wireless Devices App 20120094635 - Ananthanarayanan; Ganesh ;   et al. | 2012-04-19 |
Automated secure pairing for wireless devices Grant 8,103,247 - Ananthanarayanan , et al. January 24, 2 | 2012-01-24 |
Systems and methods for embedding media forensic identification markings Grant 8,032,754 - Mihcak , et al. October 4, 2 | 2011-10-04 |
Software protection using data structures Grant 7,975,149 - Venkatesan , et al. July 5, 2 | 2011-07-05 |
Low dimensional spectral concentration codes and direct list decoding Grant 7,941,726 - Venkatesan , et al. May 10, 2 | 2011-05-10 |
Primitives for fast secure hash functions and stream ciphers Grant 7,933,404 - Venkatesan , et al. April 26, 2 | 2011-04-26 |
Combining resilient classifiers Grant 7,873,583 - Laxman , et al. January 18, 2 | 2011-01-18 |
Watermark-based goods authentication Grant 7,844,073 - Kesal , et al. November 30, 2 | 2010-11-30 |
Digital goods representation based upon matrix invariances Grant 7,831,832 - Kozat , et al. November 9, 2 | 2010-11-09 |
Randomized Signal Transforms and Their Applications App 20100228809 - Venkatesan; Ramarathnam ;   et al. | 2010-09-09 |
Randomized signal transforms and their applications Grant 7,770,014 - Venkatesan , et al. August 3, 2 | 2010-08-03 |
Software protection using oblivious data structures Grant 7,770,029 - Venkatesan , et al. August 3, 2 | 2010-08-03 |
Semi-public white-box cipher Grant 7,769,165 - Jakubowski , et al. August 3, 2 | 2010-08-03 |
Cryptosystem based on a Jacobian of a curve Grant 7,730,315 - Lauter , et al. June 1, 2 | 2010-06-01 |
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer Grant 7,716,487 - Venkatesan , et al. May 11, 2 | 2010-05-11 |
Universal Secure Token For Obfuscation And Tamper Resistance App 20100115260 - Venkatesan; Ramarathnam ;   et al. | 2010-05-06 |
Tamper-tolerant Programs App 20100107245 - Jakubowski; Mariusz H. ;   et al. | 2010-04-29 |
Data Location Obfuscation App 20100106920 - Anckaert; Bertrand Raphael ;   et al. | 2010-04-29 |
Recognizer of content of digital signals Grant 7,707,425 - Mihcak , et al. April 27, 2 | 2010-04-27 |
Using Constraint Solving to Discovering Disjunctive and Quantified Invariants Over Predicate Abstraction App 20100088548 - Gulwani; Sumit ;   et al. | 2010-04-08 |
Minimum delta generator for program binaries Grant 7,685,590 - Venkatesan , et al. March 23, 2 | 2010-03-23 |
Minimum delta generator for program binaries Grant 7,681,190 - Venkatesan , et al. March 16, 2 | 2010-03-16 |
Randomized sparse formats for efficient and secure computation on elliptic curves Grant 7,664,258 - Venkatesan , et al. February 16, 2 | 2010-02-16 |
Digital signal watermaker Grant 7,657,752 - Mihcak , et al. February 2, 2 | 2010-02-02 |
Efficient code constructions via cryptographic assumptions Grant 7,643,637 - Venkatesan , et al. January 5, 2 | 2010-01-05 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context Grant 7,644,440 - Sinha , et al. January 5, 2 | 2010-01-05 |
Program Analysis As Constraint Solving App 20090326907 - Gulwani; Sumit ;   et al. | 2009-12-31 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,636,849 - Mihcak , et al. December 22, 2 | 2009-12-22 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,634,660 - Mihcak , et al. December 15, 2 | 2009-12-15 |
Systems and methods for generation and validation of isogeny-based signatures Grant 7,617,397 - Jao , et al. November 10, 2 | 2009-11-10 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,617,398 - Mihcak , et al. November 10, 2 | 2009-11-10 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context Grant 7,610,623 - Sinha , et al. October 27, 2 | 2009-10-27 |
Cryptographic pairing-based short signature generation and verification Grant 7,587,605 - Venkatesan , et al. September 8, 2 | 2009-09-08 |
Methods for comparing versions of a program Grant 7,571,427 - Wang , et al. August 4, 2 | 2009-08-04 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,568,103 - Mihcak , et al. July 28, 2 | 2009-07-28 |
Strengthening secure hash functions Grant 7,546,461 - Yuval , et al. June 9, 2 | 2009-06-09 |
Media watermarking by biasing randomized statistics Grant 7,539,870 - Kesal , et al. May 26, 2 | 2009-05-26 |
Image comparison by metric embeddings Grant 7,536,064 - Venkatesan , et al. May 19, 2 | 2009-05-19 |
Generation and validation of short digital signatures with implicit message embedding Grant 7,512,232 - Venkatesan , et al. March 31, 2 | 2009-03-31 |
Stream cipher design with revolving buffers Grant 7,505,588 - Mironov , et al. March 17, 2 | 2009-03-17 |
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed Grant 7,506,167 - Venkatesan , et al. March 17, 2 | 2009-03-17 |
Use of isogenies for design of cryptosystems Grant 7,499,544 - Jao , et al. March 3, 2 | 2009-03-03 |
Primitives For Fast Secure Hash Functions And Stream Ciphers App 20090022308 - Venkatesan; Ramarathnam ;   et al. | 2009-01-22 |
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer Grant 7,480,802 - Venkatesan , et al. January 20, 2 | 2009-01-20 |
Function Matching In Binaries App 20080320056 - Mohanan; Harish ;   et al. | 2008-12-25 |
Protecting digital goods using oblivious checking Grant 7,447,912 - Jakubowski , et al. November 4, 2 | 2008-11-04 |
Software Tamper Resistance Via Integrity-Checking Expressions App 20080235802 - Venkatesan; Ramarathnam ;   et al. | 2008-09-25 |
System and method for hashing digital images Grant 7,421,128 - Venkatesan , et al. September 2, 2 | 2008-09-02 |
User Authentication Via Biometric Hashing App 20080209226 - Venkatesan; Ramarathnam ;   et al. | 2008-08-28 |
User Authentication Via Biometric Hashing App 20080209227 - Venkatesan; Ramarathnam ;   et al. | 2008-08-28 |
Producing a new black box for a digital rights management (DRM) system App 20080195871 - Peinado; Marcus ;   et al. | 2008-08-14 |
Encrypting a digital object on a key ID selected therefor Grant 7,412,061 - Peinado , et al. August 12, 2 | 2008-08-12 |
Graph-Based Tamper Resistance Modeling For Software Protection App 20080184041 - Jakubowski; Mariusz H. ;   et al. | 2008-07-31 |
Robust recognizer of perceptually similar content Grant 7,406,195 - Mihcak , et al. July 29, 2 | 2008-07-29 |
Combining Resilient Classifiers App 20080177684 - Laxman; Srivatsan ;   et al. | 2008-07-24 |
Resilient Classification Of Data App 20080177680 - Laxman; Srivatsan ;   et al. | 2008-07-24 |
Correlative assessment between scanned and original digital images Grant 7,391,884 - Kesal , et al. June 24, 2 | 2008-06-24 |
Desynchronized fingerprinting method and system for digital multimedia data Grant 7,382,905 - Venkatesan , et al. June 3, 2 | 2008-06-03 |
Virtualization For Diversified Tamper Resistance App 20080127125 - Anckaert; Bertrand ;   et al. | 2008-05-29 |
Low Dimensional Spectral Concentration Codes And Direct List Decoding App 20080126910 - Venkatesan; Ramarathnam ;   et al. | 2008-05-29 |
Automated Secure Pairing for Wireless Devices App 20080102793 - Ananthanarayanan; Ganesh ;   et al. | 2008-05-01 |
Recognizer of text-based work Grant 7,356,188 - Venkatesan , et al. April 8, 2 | 2008-04-08 |
Class of symmetric lattices for quantization and data embedding Grant 7,356,161 - Jain , et al. April 8, 2 | 2008-04-08 |
Integrity ordainment and ascertainment of computer-executable instructions Grant 7,346,780 - Sinha , et al. March 18, 2 | 2008-03-18 |
Software Protection Using Data Structures App 20080022102 - Venkatesan; Ramarathnam ;   et al. | 2008-01-24 |
Producing a new black box for a digital rights management (DRM) system Grant 7,319,759 - Peinado , et al. January 15, 2 | 2008-01-15 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,318,157 - Mihcak , et al. January 8, 2 | 2008-01-08 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,318,158 - Mihcak , et al. January 8, 2 | 2008-01-08 |
Software Protection Using Oblivious Data Structures App 20080005476 - Venkatesan; Ramarathnam ;   et al. | 2008-01-03 |
Watermark-based Goods Authentication App 20070300071 - Kesal; Mustafa ;   et al. | 2007-12-27 |
Stealthy secret key encoding and decoding Grant 7,302,079 - Kesal , et al. November 27, 2 | 2007-11-27 |
Primitives for fast secure hash functions and stream ciphers Grant 7,289,629 - Venkatesan , et al. October 30, 2 | 2007-10-30 |
Method and system for using a portion of a digital good as a substitution box Grant 7,277,541 - Jakubowski , et al. October 2, 2 | 2007-10-02 |
Robust recognizer of perceptually similar content Grant 7,266,244 - Mihcak , et al. September 4, 2 | 2007-09-04 |
Minimum delta generator for program binaries Grant 7,263,531 - Venkatesan , et al. August 28, 2 | 2007-08-28 |
Randomized Sparse Formats for Efficient and Secure Computation on Elliptic Curves App 20070189511 - Venkatesan; Ramarathnam ;   et al. | 2007-08-16 |
Cryptosystem Based on a Jacobian of a Curve App 20070192397 - Lauter; Kristin E. ;   et al. | 2007-08-16 |
Watermark-based goods authentication Grant 7,257,234 - Kesal , et al. August 14, 2 | 2007-08-14 |
Secure and opaque type library providing secure data protection of variables Grant 7,254,586 - Chen , et al. August 7, 2 | 2007-08-07 |
BORE-resistant digital goods configuration and distribution methods and arrangements Grant 7,249,105 - Peinado , et al. July 24, 2 | 2007-07-24 |
Hash value computer of content of digital signals Grant 7,240,210 - Mihcak , et al. July 3, 2 | 2007-07-03 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context Grant 7,228,426 - Sinha , et al. June 5, 2 | 2007-06-05 |
License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer Grant 7,222,232 - Venkatesan , et al. May 22, 2 | 2007-05-22 |
Semi-public white-box cipher App 20070086586 - Jakubowski; Mariusz H. ;   et al. | 2007-04-19 |
Cryptosystem Based on a Jacobian of a Curve App 20070058802 - Lauter; Kristin E. ;   et al. | 2007-03-15 |
A License-Based Cryptographic Technique, Particularly Suited For Use In A Digital Rights Management System, For Controlling Access And Use Of Bore Resistant Software Objects In A Client Computer App 20070061580 - Venkatesan; Ramarathnam ;   et al. | 2007-03-15 |
Categorizer of content in digital signals Grant 7,188,065 - Mihcak , et al. March 6, 2 | 2007-03-06 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,188,249 - Mihcak , et al. March 6, 2 | 2007-03-06 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,181,622 - Mihcak , et al. February 20, 2 | 2007-02-20 |
Strengthening secure hash functions App 20060294386 - Yuval; Gideon A. ;   et al. | 2006-12-28 |
Content-recognition facilitator Grant 7,152,163 - Mihcak , et al. December 19, 2 | 2006-12-19 |
Image comparison by metric embeddings App 20060269167 - Venkatesan; Ramarathnam ;   et al. | 2006-11-30 |
Content recognizer via probabilistic mirror distribution Grant 7,136,535 - Venkatesan , et al. November 14, 2 | 2006-11-14 |
Systems and methods for generation and validation of isogeny-based signatures App 20060248338 - Jao; David Y. ;   et al. | 2006-11-02 |
Watermarking via quantization of statistics of overlapping regions Grant 7,095,873 - Venkatesan , et al. August 22, 2 | 2006-08-22 |
Protecting digital goods using oblivious checking Grant 7,080,257 - Jakubowski , et al. July 18, 2 | 2006-07-18 |
Code integrity verification that includes one or more cycles Grant 7,080,249 - Jakubowski , et al. July 18, 2 | 2006-07-18 |
Minimum Delta Generator for Program Binaries App 20060145895 - Venkatesan; Ramarathnam ;   et al. | 2006-07-06 |
Minimum Delta Generator for Program Binaries App 20060145896 - Venkatesan; Ramarathnam ;   et al. | 2006-07-06 |
Robust and stealthy video watermarking into regions of successive frames Grant 7,072,493 - Venkatesan , et al. July 4, 2 | 2006-07-04 |
Protecting Digital Goods Using Oblivious Checking App 20060136750 - Jakubowski; Mariusz H. ;   et al. | 2006-06-22 |
Minimum delta generator for program binaries Grant 7,058,941 - Venkatesan , et al. June 6, 2 | 2006-06-06 |
System and method for protecting digital goods using random and automatic code obfuscation Grant 7,054,443 - Jakubowski , et al. May 30, 2 | 2006-05-30 |
Content Recognizer via Probabilistic Mirror Distribution App 20060110006 - Venkatesan; Ramarathnam ;   et al. | 2006-05-25 |
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed Grant 7,051,208 - Venkatesan , et al. May 23, 2 | 2006-05-23 |
Integrity Ordainment and Ascertainment of Computer-Executable Instructions with Consideration for Execution Context App 20060080531 - Sinha; Saurabh ;   et al. | 2006-04-13 |
Integrity Ordainment and Ascertainment of Computer-Executable Instructions with Consideration for Execution Context App 20060080530 - Sinha; Saurabh ;   et al. | 2006-04-13 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,028,189 - Mihcak , et al. April 11, 2 | 2006-04-11 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20060069919 - Mihcak; M. Kivanc ;   et al. | 2006-03-30 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,020,777 - Mihcak , et al. March 28, 2 | 2006-03-28 |
Derivation and quantization of robust non-local characteristics for blind watermarking Grant 7,020,775 - Mihcak , et al. March 28, 2 | 2006-03-28 |
Cryptosystem based on a Jacobian of a curve Grant 7,020,776 - Lauter , et al. March 28, 2 | 2006-03-28 |
Encrypting a digital object on a key ID selected therefor Grant 7,016,498 - Peinado , et al. March 21, 2 | 2006-03-21 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20060059356 - Mihcak; M. Kivanc ;   et al. | 2006-03-16 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20060059353 - Mihcak; M. Kivanc ;   et al. | 2006-03-16 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20060059354 - Mihcak; M. Kivanc ;   et al. | 2006-03-16 |
Content recognizer via probabilistic mirror distribution Grant 7,006,703 - Venkatesan , et al. February 28, 2 | 2006-02-28 |
Robust recognizer of perceptually similar content Grant 6,996,273 - Mihcak , et al. February 7, 2 | 2006-02-07 |
Robust and stealthy video watermarking into regions of successive frames Grant 6,975,743 - Venkatesan , et al. December 13, 2 | 2005-12-13 |
Robust recognizer of perceptually similar content App 20050273617 - Mihcak, M. Kivanc ;   et al. | 2005-12-08 |
Recognizer of audio-content in digital signals Grant 6,973,574 - Mihcak , et al. December 6, 2 | 2005-12-06 |
Class of symmetric lattices for quantization and data embedding App 20050265575 - Jain, Kamal ;   et al. | 2005-12-01 |
Recognizer of content of digital signals Grant 6,971,013 - Mihcak , et al. November 29, 2 | 2005-11-29 |
Randomized signal transforms and their applications App 20050257060 - Venkatesan, Ramarathnam ;   et al. | 2005-11-17 |
Methods for comparing versions of a program Grant 6,954,747 - Wang , et al. October 11, 2 | 2005-10-11 |
Stream cipher design with revolving buffers App 20050220302 - Mironov, Ilya ;   et al. | 2005-10-06 |
Unimodular matrix-based message authentication codes (MAC) App 20050210260 - Venkatesan, Ramarathnam ;   et al. | 2005-09-22 |
Primitives for fast secure hash functions and stream ciphers App 20050175176 - Venkatesan, Ramarathnam ;   et al. | 2005-08-11 |
Efficient code constructions via cryptographic assumptions App 20050175180 - Venkatesan, Ramarathnam ;   et al. | 2005-08-11 |
Media watermarking by biasing randomized statistics App 20050175179 - Kesal, Mustafa ;   et al. | 2005-08-11 |
Desynchronized fingerprinting method and system for digital multimedia data App 20050175224 - Venkatesan, Ramarathnam ;   et al. | 2005-08-11 |
Watermarking via quantization of rational statistics of regions App 20050165690 - Liu, Tie ;   et al. | 2005-07-28 |
Systems and methods for embedding media forensic identification markings App 20050154892 - Mihcak, Mehmet Kivanc ;   et al. | 2005-07-14 |
Digital goods representation based upon matrix invariances App 20050149727 - Kozat, S. Serdar ;   et al. | 2005-07-07 |
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed App 20050144458 - Venkatesan, Ramarathnam ;   et al. | 2005-06-30 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050125671 - Mihcak, M. Kivanc ;   et al. | 2005-06-09 |
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer Grant 6,898,706 - Venkatesan , et al. May 24, 2 | 2005-05-24 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050108544 - Mihcak, M. Kivanc ;   et al. | 2005-05-19 |
Correlative assessment between scanned and original digital images App 20050105824 - Kesal, Mustafa ;   et al. | 2005-05-19 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050105733 - Mihcak, M. Kivanc ;   et al. | 2005-05-19 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050108543 - Mihcak, M. Kivanc ;   et al. | 2005-05-19 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050108545 - Mihcak, M. Kivanc ;   et al. | 2005-05-19 |
Recognizer of content of digital signals App 20050097312 - Mihcak, M. Kivanc ;   et al. | 2005-05-05 |
Use of isogenies for design of cryptosystems App 20050094806 - Jao, David Y. ;   et al. | 2005-05-05 |
Robust and stealthy video watermarking Grant 6,888,952 - Venkatesan , et al. May 3, 2 | 2005-05-03 |
Encrypting a digital object on a key ID selected therefor App 20050086478 - Peinado, Marcus ;   et al. | 2005-04-21 |
Recognizer of content of digital signals App 20050084103 - Mihcak, M. Kivanc ;   et al. | 2005-04-21 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20050086489 - Mihcak, M. Kivanc ;   et al. | 2005-04-21 |
License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer App 20050081042 - Venkatesan, Ramarathnam ;   et al. | 2005-04-14 |
Recognizer of digital signal content App 20050076229 - Mihcak, M. Kivanc ;   et al. | 2005-04-07 |
Digital signal watermarker App 20050071377 - Mihcak, M. Kivanc ;   et al. | 2005-03-31 |
Categorizer of content in digital signals App 20050066176 - Mihcak, M. Kivanc ;   et al. | 2005-03-24 |
Content-recognition facilitator App 20050066177 - Mihcak, M. Kivanc ;   et al. | 2005-03-24 |
Encrypting a digital object on a key ID selected therefor App 20050066187 - Peinado, Marcus ;   et al. | 2005-03-24 |
Hash value computer of content of digital signals App 20050065974 - Mihcak, M. Kivanc ;   et al. | 2005-03-24 |
Watermark-based goods authentication App 20050044374 - Kesal, Mustafa ;   et al. | 2005-02-24 |
Generation and validation of short digital signatures with implicit message embedding App 20050036621 - Venkatesan, Ramarathnam ;   et al. | 2005-02-17 |
Watermark-based goods authentication App 20050036652 - Kesal, Mustafa ;   et al. | 2005-02-17 |
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer App 20050039022 - Venkatesan, Ramarathnam ;   et al. | 2005-02-17 |
Robust recognizer of perceptually similar content App 20050022004 - Mihcak, M. Kivanc ;   et al. | 2005-01-27 |
Methods and apparatuses for providing blind digital signatures using curve-based cryptography App 20050018851 - Venkatesan, Ramarathnam ;   et al. | 2005-01-27 |
Methods and apparatuses for providing short digital signatures using curve-based cryptography App 20050018850 - Venkatesan, Ramarathnam ;   et al. | 2005-01-27 |
Recognizer of text-based work App 20040268220 - Venkatesan, Ramarathnam ;   et al. | 2004-12-30 |
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed App 20040255132 - Venkatesan, Ramarathnam ;   et al. | 2004-12-16 |
Technique for producing, through watermarking, highly tamper-resistant executable code and resulting "watermarked" code so formed Grant 6,829,710 - Venkatesan , et al. December 7, 2 | 2004-12-07 |
Robust and stealthy video watermarking App 20040234099 - Venkatesan, Ramarathnam ;   et al. | 2004-11-25 |
Methods for comparing versions of a program App 20040230957 - Wang, Zheng ;   et al. | 2004-11-18 |
Minimum delta generator for program binaries App 20040225996 - Venkatesan, Ramarathnam ;   et al. | 2004-11-11 |
Encrypting a digital object based on a key ID selected therefor Grant 6,816,596 - Peinado , et al. November 9, 2 | 2004-11-09 |
Methods for comparing versions of a program App 20040210885 - Wang, Zheng ;   et al. | 2004-10-21 |
Passive and active software objects containing bore resistant watermarking Grant 6,801,999 - Venkatesan , et al. October 5, 2 | 2004-10-05 |
System and method for hashing digital images App 20040025025 - Venkatesan, Ramarathnam ;   et al. | 2004-02-05 |
Content recognizer via probabilistic mirror distribution App 20040005097 - Venkatesan, Ramarathnam ;   et al. | 2004-01-08 |
Secure and opaque type library providing secure data protection of variables App 20040003278 - Chen, Yuqun ;   et al. | 2004-01-01 |
Watermarking via quantization of statistics of overlapping regions App 20040001605 - Venkatesan, Ramarathnam ;   et al. | 2004-01-01 |
System and method for hashing digital images Grant 6,671,407 - Venkatesan , et al. December 30, 2 | 2003-12-30 |
Integrity ordainment and ascertainment of computer-executable instructions App 20030191942 - Sinha, Saurabh ;   et al. | 2003-10-09 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context App 20030191940 - Sinha, Saurabh ;   et al. | 2003-10-09 |
Technique for watermarking an image and a resulting watermarked image Grant 6,574,348 - Venkatesan , et al. June 3, 2 | 2003-06-03 |
Simple technique for implementing a cryptographic primitive using elementary register operations Grant 6,570,988 - Venkatesan , et al. May 27, 2 | 2003-05-27 |
Technique for detecting a watermark in a marked image Grant 6,546,114 - Venkatesan , et al. April 8, 2 | 2003-04-08 |
Robust recognizer of perceptually similar content App 20020196976 - Mihcak, M. Kivanc ;   et al. | 2002-12-26 |
Recognizer of audio-content in digital signals App 20020184505 - Mihcak, M. Kivanc ;   et al. | 2002-12-05 |
Robust and stealthy video watermarking App 20020172394 - Venkatesan, Ramarathnam ;   et al. | 2002-11-21 |
Recognizer of text-based work App 20020172425 - Venkatesan, Ramarathnam ;   et al. | 2002-11-21 |
Derivation and quantization of robust non-local characteristics for blind watermarking App 20020154778 - Mihcak, M. Kivanc ;   et al. | 2002-10-24 |
Technique For Producing A Parameter, Such As A Checksum, Through A Primitive That Uses Elementary Register Operations App 20020110239 - VENKATESAN, RAMARATHNAM ;   et al. | 2002-08-15 |
Cryptosystem based on a jacobian of a curve App 20020018560 - Lauter, Kristin E. ;   et al. | 2002-02-14 |
Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message Grant 6,226,742 - Jakubowski , et al. May 1, 2 | 2001-05-01 |
Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key Grant 6,128,737 - Jakubowski , et al. October 3, 2 | 2000-10-03 |
Cryptographically secure pseudo-random bit generator for fast and secure encryption Grant 6,104,811 - Aiello , et al. August 15, 2 | 2000-08-15 |
Accelerating public-key cryptography by precomputing randomly generated pairs Grant 6,091,819 - Venkatesan , et al. July 18, 2 | 2000-07-18 |
Pseudo-random generator Grant 5,727,063 - Aiello , et al. March 10, 1 | 1998-03-10 |
Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions Grant 5,608,801 - Aiello , et al. March 4, 1 | 1997-03-04 |
Pseudo-random generator Grant 5,515,307 - Aiello , et al. May 7, 1 | 1996-05-07 |
Pseudo-random generator Grant 5,420,928 - Aiello , et al. May 30, 1 | 1995-05-30 |
Data compression Grant 5,384,568 - Grinberg , et al. January 24, 1 | 1995-01-24 |