Issued Patents All Time
Showing 26–50 of 139 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9774443 | Computing key-schedules of the AES for use in white boxes | Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart, Mathieu Ciet | 2017-09-26 |
| 9716586 | Precomputing internal AES states in counter mode to protect keys used in AES computations | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2017-07-25 |
| 9692592 | Using state reordering to protect against white box attacks | Bruno Kindarji, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart | 2017-06-27 |
| 9639673 | Protecting software through a fake cryptographic layer | Pierre Betouin, Benoit Chevallier-Mames, Bruno Kindarji, Cédric Tessier, Jean-Baptiste Aviat +2 more | 2017-05-02 |
| 9594605 | Client-server version control system for software applications | Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula | 2017-03-14 |
| 9565018 | Protecting cryptographic operations using conjugacy class functions | Benoit Chevallier-Mames, Bruno Kindarji, Mathieu Ciet, Thomas Icart | 2017-02-07 |
| 9530133 | Adaptive secondary authentication criteria based on account data | Jonathan G. McLachlan, Nicholas Thomas Sullivan | 2016-12-27 |
| 9515818 | Multi-block cryptographic operation | Bruno Kindarji, Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart | 2016-12-06 |
| 9424049 | Data protection for opaque data structures | Daniel F. Reynaud, Gianpaolo Fasoli, Jonathan G. McLachlan, Julien Lerouge | 2016-08-23 |
| 9374616 | Method and apparatus for on demand video and other content rental | Jeffrey L. Robbin, Hiro Mitsuji, Mihailo Despotovic, Colin Meldrum | 2016-06-21 |
| 9311492 | Media storage structures for storing content, devices for using such structures, systems for distributing such structures | Gianpaolo Fasoli, Bertrand Mollinier Toublet, Mathieu Ciet | 2016-04-12 |
| 9274976 | Code tampering protection for insecure environments | Mathieu Ciet, Pierre Betouin | 2016-03-01 |
| 9264234 | Secure authentication of identification for computing devices | David M'Raihi, Mathieu Ciet, Thomas Icart | 2016-02-16 |
| 9264222 | Precomputing internal AES states in counter mode to protect keys used in AES computations | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2016-02-16 |
| 9189425 | Protecting look up tables by mixing code and operations | Benoit Chevallier-Mames, Bruno Kindarji, Mathieu Ciet, Thomas Icart | 2015-11-17 |
| 9172683 | Method and apparatus for key distribution with implicit offline authorization | Gianpaolo Fasoli, Nicholas Thomas Sullivan | 2015-10-27 |
| 9143317 | Protecting against white box attacks using column rotation | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2015-09-22 |
| 9128722 | Systems, methods, and computer-readable media for fertilizing machine-executable code | Pierre Betouin, Mathieu Ciet | 2015-09-08 |
| 9043887 | Adaptive secondary authentication criteria based on account data | Jonathan G. McLachlan, Nicholas Thomas Sullivan | 2015-05-26 |
| 9031228 | Systems and methods for implementing block cipher algorithms on attacker-controlled systems | Mathieu Ciet, Filip Toma Paun | 2015-05-12 |
| 8976960 | Methods and apparatus for correlation protected processing of cryptographic operations | Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji | 2015-03-10 |
| 8966285 | Securing implementation of a cryptographic process having fixed or dynamic keys | Mathieu Ciet, Benoit Chevallier-Mames | 2015-02-24 |
| 8966279 | Securing the implementation of a cryptographic process using key expansion | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2015-02-24 |
| 8959605 | System and method for asset lease management | Justin Henzie, Amine El Kamel, William Luh | 2015-02-17 |
| 8949935 | Secure account creation | Thomas Alsina, Michael Kuohao Chu, Gianpaolo Fasoli, Sean B. Kelly, Delfin J. Rojas +2 more | 2015-02-03 |