| 9497688 |
Managing mobile device applications in a wireless network |
Mark Pecen, Niels Peter Skov Andersen, Shalini Periyalwar |
2016-11-15 |
| 9490979 |
System and method for providing credentials |
Herbert A. Little, Anthony Rosati, Scott A. Vanstone |
2016-11-08 |
| 9473309 |
System and method for providing a trust framework using a secondary network |
Sean Alexander Courtney, George Ross Staikos, Alexander Truskovsky |
2016-10-18 |
| 9455832 |
Signatures with confidential message recovery |
Daniel Richard L. Brown, Marinus Struik, Scott A. Vanstone |
2016-09-27 |
| 9455830 |
Method for securing credentials in a remote repository |
Avinash Chidambaram |
2016-09-27 |
| 9443108 |
Secure timestamping |
Gregory Branchek Roth |
2016-09-13 |
| 9438421 |
Supporting a fixed transaction rate with a variably-backed logical cryptographic key |
Gregory Branchek Roth, Benjamin Elias Seidenberg |
2016-09-06 |
| 9413530 |
System and method of lawful access to secure communications |
Michael Eoin Buckley, Gregory Marc Zaverucha |
2016-08-09 |
| 9407437 |
Secure initialization vector generation |
— |
2016-08-02 |
| 9405920 |
Data integrity verification |
Gregory Branchek Roth, Gregory Alan Rubin, Petr Praus |
2016-08-02 |
| 9397835 |
Web of trust management in a distributed system |
Gregory Branchek Roth |
2016-07-19 |
| 9286602 |
Secure financial transactions |
Anthony Rosati, Gregory Marc Zaverucha, Scott A. Vanstone |
2016-03-15 |
| 9264227 |
System and method of lawful access to secure communications |
Michael Eoin Buckley, Gregory Marc Zaverucha |
2016-02-16 |
| 9246900 |
Using a single certificate request to generate credentials with multiple ECQV certificates |
Robert John Lambert, James Robert Alfred |
2016-01-26 |