Issued Patents All Time
Showing 51–75 of 139 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8935539 | System and method for revising boolean and arithmetic operations | Mathieu Ciet, Filip Toma Paun, Jean-Francois Riendeau | 2015-01-13 |
| 8918768 | Methods and apparatus for correlation protected processing of data operations | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2014-12-23 |
| 8886947 | Optimized integrity verification procedures | Melanie Riendeau | 2014-11-11 |
| 8887140 | System and method for annotation-driven function inlining | Julien Lerouge, Nicholas Thomas Sullivan, Gideon M. Myles, Jon McLachlan | 2014-11-11 |
| 8886940 | Hash function using a card shuffling process | Benoit Chevallier-Mames, Mathieu Ciet | 2014-11-11 |
| 8881290 | Method and apparatus for computer code obfuscation and deobfuscation using boot installation | Mathieu Ciet, Julien Lerouge | 2014-11-04 |
| 8874928 | System and method for obfuscating constants in a computer program | Pierre Betouin, Mathieu Ciet | 2014-10-28 |
| 8862896 | Data protection using key translation | Gelareh Taban, Filip Toma Paun, Benoit Chevallier-Mames, Mathieu Ciet | 2014-10-14 |
| 8850206 | Client-server system with security for untrusted server | Gelareh Taban, Amine El Kamel, Gianpaolo Fasoli, Srinivas Vedula | 2014-09-30 |
| 8832450 | Methods and apparatus for data hashing based on non-linear operations | Mathieu Ciet, Thomas Icart | 2014-09-09 |
| 8775826 | Counteracting memory tracing on computing systems by code obfuscation | Mathieu Ciet, Pierre Betouin | 2014-07-08 |
| 8769675 | Clock roll forward detection | Pierre Betouin, Nicholas Thomas Sullivan | 2014-07-01 |
| 8755521 | Security method and system for media playback devices | Mathieu Ciet, Pierre Betouin | 2014-06-17 |
| 8756434 | System and method for executing an encrypted binary from a memory pool | Ganna Zaks, Pierre Betouin, Julien Lerouge, Jon McLachlan, Gideon M. Myles +1 more | 2014-06-17 |
| 8751823 | System and method for branch function based obfuscation | Gideon M. Myles, Julien Lerouge, Jon McLachlan, Ganna Zaks | 2014-06-10 |
| 8719947 | Protection of audio or video data in a playback device | Julien Lerouge, Gianpaolo Fasoli | 2014-05-06 |
| 8718280 | Securing keys of a cipher using properties of the cipher process | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart | 2014-05-06 |
| 8706638 | Method for on demand video and other content rental | Jeffrey L. Robbin, Hiro Mitsuji, Mihailo Despotovic, Colin Meldrum | 2014-04-22 |
| 8707053 | Performing boolean logic operations using arithmetic operations by code obfuscation | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart | 2014-04-22 |
| 8699702 | Securing cryptographic process keys using internal structures | Benoit Chevallier-Mames, Mathieu Ciet | 2014-04-15 |
| 8687803 | Operational mode for block ciphers | Benoit Chevallier-Mames, Melanie Riendeau, Mathieu Ciet, Thomas Icart | 2014-04-01 |
| 8681975 | Encryption method and apparatus using composition of ciphers | Nicholas Thomas Sullivan, Gianpaolo Fasoli, Mathieu Ciet | 2014-03-25 |
| 8675866 | Multiplicative splits to protect cipher keys | Benoit Chevallier-Mames, Bruno Kindarji, Mathieu Ciet, Thomas Icart | 2014-03-18 |
| 8667301 | Obfuscating transformations on data array content and addresses | Mathieu Ciet, Benoit Chevallier-Mames | 2014-03-04 |
| 8661549 | Method and apparatus for obfuscating program source codes | Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Bruno Kindarji | 2014-02-25 |