| 11537699 |
Authentication techniques in response to attempts to access sensitive information |
Lucia E. Ballard, Deepti S. Prakash, Jan Cibulka, Ivan Krstic |
2022-12-27 |
| 11468199 |
Authenticated debug for computing systems |
Mukesh Kataria |
2022-10-11 |
| 11438322 |
Modifying security state with secured range detection |
Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John J. Iarocci, Michael Brouwer +2 more |
2022-09-06 |
| 11374926 |
Pre-personalization of eSIMs to support large-scale eSIM delivery |
Li Li, Yousuf H. Vaid, Christopher Sharp, Arun G. Mathias, David T. Haggerty |
2022-06-28 |
| 11265929 |
Methods and architectures for secure ranging |
Alejandro J. Marquez, Timothy R. Paaske, Indranil S. Sen, Herve Sibert, Yannick L. Sierra +1 more |
2022-03-01 |
| 11250118 |
Remote interaction with a device using secure range detection |
Alexander R. Ledwith, Wade Benson, Marc J. Krochmal, John J. Iarocci, Michael Brouwer +4 more |
2022-02-15 |
| 11228421 |
Secure secrets to mitigate against attacks on cryptographic systems |
Arthur Mesh, Pierre-Olivier J. Martel, Wade Benson, Oren M. Elrad |
2022-01-18 |