Issued Patents All Time
Showing 101–125 of 146 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9088408 | Key agreement using a key derivation key | Daniel Richard L. Brown, Nevine Maurice Nassif Ebeid | 2015-07-21 |
| 9083509 | System and method of lawful access to secure communications | Michael Eoin Buckley, Gregory Marc Zaverucha | 2015-07-14 |
| 9065642 | Intercepting key sessions | Gregory Marc Zaverucha | 2015-06-23 |
| 9003181 | Incorporating data into cryptographic components of an ECQV certificate | Herbert A. Little, Scott A. Vanstone, Daniel Richard L. Brown | 2015-04-07 |
| 8972738 | Incorporating data into an ECDSA signature component | Herbert A. Little, Scott A. Vanstone, Daniel Richard L. Brown | 2015-03-03 |
| 8971528 | Modified elliptic curve signature algorithm for message recovery | — | 2015-03-03 |
| 8971851 | Key agreement for wireless communication | Daniel Richard L. Brown, Nevine Maurice Nassif Ebeid | 2015-03-03 |
| 8948386 | Authentication of a mobile device by a network and key generation | Robert John Lambert, Anthony Rosati | 2015-02-03 |
| 8891756 | Collision-resistant elliptic curve hash functions | Daniel Richard L. Brown, Marinus Struik | 2014-11-18 |
| 8756706 | Method for securing credentials in a remote repository | Avinash Chidambaram | 2014-06-17 |
| 8750593 | Substitute check incorporating encoded indication of security feature in original check | Judith D. Auslander, Robert A. Cordery, Cindy Mangiameli | 2014-06-10 |
| 8701169 | Using a single certificate request to generate credentials with multiple ECQV certificates | Robert John Lambert, James Robert Alfred | 2014-04-15 |
| 8700894 | Method and system for securing routing information of a communication using identity-based encryption scheme | Bradley R. Hammell, Bertrand Haas, Leon A. Pintsov, Frederick W. Ryan, Jr. | 2014-04-15 |
| 8675869 | Incorporating data into an ECDSA signature component | Herbert A. Little, Scott A. Vanstone, Daniel Richard L. Brown | 2014-03-18 |
| 8676715 | System and method for authenticating indicia using identity-based signature scheme | Robert A. Cordery, Bertrand Haas, Bradley R. Hammell, Leon A. Pintsov, Frederick W. Ryan, Jr. | 2014-03-18 |
| 8631247 | System and method for hardware based security | Daniel O'Loughlin, Keelan Smith, Jay Scott Fuller, Joseph Ku, William L. Lattin +3 more | 2014-01-14 |
| 8566911 | Method of obtaining authorization for accessing a service | Van Quy Tu, Herbert A. Little, Anthony Rosati | 2013-10-22 |
| 8560457 | Enhanced network server authentication using a physical out-of-band channel | Andrei Obrea, Arthur Parkos, Gary G. Hansen, George M. Macdonald | 2013-10-15 |
| 8554175 | Managing mobile device applications on a mobile device | Mark Pecen, Niels Peter Skov Andersen, Shalini Periyalwar | 2013-10-08 |
| 8554179 | Managing mobile device applications | Mark Pecen, Niels Peter Skov Andersen, Shalini Periyalwar | 2013-10-08 |
| 8447971 | Self-signed implicit certificates | Marinus Struik | 2013-05-21 |
| 8380587 | System and method for vendor managed subsidized supply pipeline for business continuity | — | 2013-02-19 |
| 8078293 | System and method for routing selection using statistical data | Bradley R. Hammell, Erik Monsen, Ronald Reichman, Frederick W. Ryan, Jr., Michael P. Swenson +1 more | 2011-12-13 |
| 7975919 | Secure vote by mail system and method | Bertrand Haas | 2011-07-12 |
| 7922208 | Method and system for protecting privacy of signatures on mail ballots | Bertrand Haas, Douglas B. Quine, Bradley R. Hammell | 2011-04-12 |