| 11540137 |
Pairing devices based on distance |
Brent M. Ledvina, Kyle C. Brogle, Steven A. Myers |
2022-12-27 |
| 11522695 |
Sharing system access using a mobile device |
Sriram Hariharan, Frederic Jacobs |
2022-12-06 |
| 11449343 |
Indirect branch predictor storing encrypted branch information fields and security tag for security protection |
Jeffry E. Gonion, Ian D. Kountanis, Conrado Blasco, Steven A. Myers |
2022-09-20 |
| 11444766 |
Combined authorization process |
Mitchell D. Adler |
2022-09-13 |
| 11438322 |
Modifying security state with secured range detection |
Wade Benson, Marc J. Krochmal, Alexander R. Ledwith, John J. Iarocci, Jerrold V. Hauck +2 more |
2022-09-06 |
| 11405191 |
Guaranteed encryptor authenticity |
Vishnu Pillai Janardhanan Pillai, Rantao Chen, Gianpaolo Fasoli, Frederic Jacobs, Rupamay Saha +2 more |
2022-08-02 |
| 11405185 |
Methods and architectures for secure ranging |
Zhimin Chen, Thomas Icart |
2022-08-02 |
| 11329801 |
Initialization vector generation when performing encryption and authentication in wireless communications |
Dawei Zhang, Fangli Xu, Haijing Hu, Huarui Liang, Lijia Zhang +5 more |
2022-05-10 |
| 11321095 |
Indirect branch predictor security protection |
Steven A. Myers, Jeffry E. Gonion, Thomas Icart |
2022-05-03 |
| 11265929 |
Methods and architectures for secure ranging |
Jerrold V. Hauck, Alejandro J. Marquez, Timothy R. Paaske, Indranil S. Sen, Herve Sibert +1 more |
2022-03-01 |
| 11250118 |
Remote interaction with a device using secure range detection |
Alexander R. Ledwith, Wade Benson, Marc J. Krochmal, John J. Iarocci, Jerrold V. Hauck +4 more |
2022-02-15 |