| 9514028 |
System and method for determining correct execution of software based on baseline and real time trace events |
David W. Grawrock |
2016-12-06 |
| 9485102 |
Techniques for user-validated close-range mutual authentication |
Michelle X. Gong |
2016-11-01 |
| 9448950 |
Using authenticated manifests to enable external certification of multi-processor platforms |
Vincent R. Scarlata, Simon P. Johnson, Vladimir Beker, Carlos V. Rozas, Amy L. Santoni +4 more |
2016-09-20 |
| 9407435 |
Cryptographic key generation based on multiple biometrics |
Jiangtao Li |
2016-08-02 |
| 9378352 |
Barcode authentication for resource requests |
Gyan Prakash, Venkatesh Ramamurthy, Hong Li |
2016-06-28 |
| 9380457 |
Method and system of secured direct link set-up (DLS) for wireless networks |
Shlomo Ovadia, Suman Sharma |
2016-06-28 |
| 9344284 |
Method of anonymous entity authentication using group-based anonymous signatures |
Jiangtao Li |
2016-05-17 |
| 9344889 |
Methods, systems and apparatus to pair medical devices to an in-body network |
Steven A. Mancini, Hong Li, Igor Tatourian, Robert L. Vaughn, Tobias M. Kohlenberg +3 more |
2016-05-17 |
| 9307409 |
Apparatus, system and method of protecting domains of a multimode wireless radio transceiver |
Farhana Sheikh, Patrick Koeberl, Hossein Alavi, Men Long, Ram Krishnamurthy +1 more |
2016-04-05 |
| 9282232 |
Collaborative image control |
Michelle X. Gong, Roy Want, Horst W. Haussecker, Sai P. Balasundaram |
2016-03-08 |
| 9246679 |
Apparatus and method for negotiating pairwise master key for securing peer links in wireless mesh networks |
Meiyuan Zhao |
2016-01-26 |
| 9231760 |
Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications |
Emily H. Qi, Robert J. Stacey, Herbert Liondas, Marc Jalfon |
2016-01-05 |