| 12430042 |
Memory buffer devices with modal encryption |
Evan Lawrence Erickson, Michael Alexander Hamburg, Helena Handschuh |
2025-09-30 |
| 12417141 |
Generating a target data based on a function associated with a physical variation of a device |
Scott C. Best, Helena Handschuh, Winthrop John Wu |
2025-09-16 |
| 12393679 |
Protection of neural networks by obfuscation of neural network operations and architecture |
Michael Alexander Hamburg, Helena Handschuh |
2025-08-19 |
| 12393702 |
Protecting cryptographic keys stored in non-volatile memory |
Michael Alexander Hamburg |
2025-08-19 |
| 12362948 |
Authentication using an ephemeral asymmetric keypair |
Scott C. Best |
2025-07-15 |
| 12335365 |
Protection of transformations by intermediate randomization in cryptographic operations |
Michael Alexander Hamburg, Helena Handschuh |
2025-06-17 |
| 12326823 |
Application authentication and data encryption without stored pre-shared keys |
Scott C. Best, Winthrop John Wu, Matthew Evan Orzen, Helena Handschuh |
2025-06-10 |