BK

Bruno Kindarji

Apple: 17 patents #1,913 of 18,612Top 15%
MO Morpho: 2 patents #53 of 161Top 35%
Overall (All Time): #229,468 of 4,157,543Top 6%
19
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
12277205 User interfaces for digital identification Pablo Pons Bordes, Gianpaolo Fasoli, Tyler GENTLES, Petr Kostka, Rohit Narula +3 more 2025-04-15
10868672 Establishing and verifying identity using biometrics while protecting user privacy Augustin J. Farrugia, Ritwik K. Kumar, Gianpaolo Fasoli, Mathieu Ciet, Eric D. Friedman +2 more 2020-12-15
9774443 Computing key-schedules of the AES for use in white boxes Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia, Mathieu Ciet 2017-09-26
9716586 Precomputing internal AES states in counter mode to protect keys used in AES computations Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia 2017-07-25
9692592 Using state reordering to protect against white box attacks Benoit Chevallier-Mames, Mathieu Ciet, Augustin J. Farrugia, Thomas Icart 2017-06-27
9639673 Protecting software through a fake cryptographic layer Pierre Betouin, Augustin J. Farrugia, Benoit Chevallier-Mames, Cédric Tessier, Jean-Baptiste Aviat +2 more 2017-05-02
9565018 Protecting cryptographic operations using conjugacy class functions Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart 2017-02-07
9515818 Multi-block cryptographic operation Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia 2016-12-06
9264222 Precomputing internal AES states in counter mode to protect keys used in AES computations Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia 2016-02-16
9189425 Protecting look up tables by mixing code and operations Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart 2015-11-17
9143317 Protecting against white box attacks using column rotation Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia 2015-09-22
8976960 Methods and apparatus for correlation protected processing of cryptographic operations Mathieu Ciet, Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia 2015-03-10
8972727 Method of identification or authorization, and associated system and secure module Herve Chabanne, Julien Bringer 2015-03-03
8966279 Securing the implementation of a cryptographic process using key expansion Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart 2015-02-24
8918768 Methods and apparatus for correlation protected processing of data operations Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia 2014-12-23
8700912 Identification based on encrypted biometric data Herve Chabanne, Julien Bringer 2014-04-15
8675866 Multiplicative splits to protect cipher keys Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart 2014-03-18
8661549 Method and apparatus for obfuscating program source codes Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart, Augustin J. Farrugia 2014-02-25
8605894 Cryptographic process execution protecting an input value against attacks Augustin J. Farrugia, Benoit Chevallier-Mames, Mathieu Ciet, Thomas Icart 2013-12-10