Issued Patents All Time
Showing 26–50 of 147 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11068883 | Apparatus and methods for secure element transactions and management of assets | David T. Haggerty, Ahmer A. Khan, Christopher Sharp, Joakim Linde, Kevin P. McLaughlin +2 more | 2021-07-20 |
| 11025418 | Cryptographic entropy tree | Kumar Saurav, Yannick L. Sierra, Charles E. Gray, Roberto G. Yepez, Samuel Gosselin +2 more | 2021-06-01 |
| 10977642 | Apparatuses and methods for operating a portable electronic device to conduct mobile payment transactions | Ahmer A. Khan, Gregory Novick, Saket R. Vora, Yehonatan Perez | 2021-04-13 |
| 10951419 | Secure device pairing | Tristan F. Schaap, Conrad Sauerwald, Craig A. Marciniak, Zachary F. Papilion, Jeffrey Lee | 2021-03-16 |
| 10929515 | Biometric authentication techniques | Deepti S. Prakash, Lucia E. Ballard, Feng Tang, Etai Littwin, Pavan Kumar Anasosalu Vasu +18 more | 2021-02-23 |
| 10872042 | Backup system with multiple recovery keys | Michael D. Ford, Matthew G. Watson, Mitchell D. Adler, Dallas B. De Atley, James Wilson | 2020-12-22 |
| 10856148 | Methods and apparatus for user authentication and human intent verification in mobile devices | Li Li, Xiangying Yang, Christopher Sharp, Yousuf H. Vaid, Arun G. Mathias +2 more | 2020-12-01 |
| 10839058 | Authentication techniques in response to attempts to access sensitive information | Lucia E. Ballard, Deepti S. Prakash, Jan Cibulka, Ivan Krstic | 2020-11-17 |
| 10831484 | Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection | Yannick L. Sierra, Jeffry E. Gonion, Thomas F. Roche | 2020-11-10 |
| 10824705 | Authentication techniques in response to attempts to access sensitive information | Lucia E. Ballard, Deepti S. Prakash, Jan Cibulka, Ivan Krstic | 2020-11-03 |
| 10785645 | Techniques for dynamically supporting different authentication algorithms | Li Li, Arun G. Mathias | 2020-09-22 |
| 10708049 | Secure escrow service | Dallas B. De Atley, Mitchell D. Adler | 2020-07-07 |
| 10699622 | Long-term history of display intensities | Ross Thompson, Guy Cote, Christopher P. Tann, Ian C. Hendry, Vanessa Cristina Heppolette +5 more | 2020-06-30 |
| 10645573 | Postponed carrier configuration | David Fleischman, Patrick L. Coffman, Jeremy Wyld, Gregory N. Christie, Audra Men-jhi Liu +10 more | 2020-05-05 |
| 10552830 | Deletion of credentials from an electronic device | Ahmer A. Khan, Joakim Linde, Christopher Sharp | 2020-02-04 |
| 10554487 | Pre-personalization of eSIMs to support large-scale eSIM delivery | Li Li, Yousuf H. Vaid, Christopher Sharp, Arun G. Mathias, David T. Haggerty | 2020-02-04 |
| 10546293 | Apparatuses and methods for using a random authorization number to provide enhanced security for a secure element | Ahmer A. Khan, George R. Dicker, Jeffrey Lee, Mitchell D. Adler, Wade Benson | 2020-01-28 |
| 10536271 | Silicon key attestation | Thomas P. Mensch, Conrad Sauerwald, Timothy R. Paaske, Zhimin Chen, Andrew R. Whalley | 2020-01-14 |
| 10523431 | Secure circuit for encryption key generation | Wade Benson, Libor Sykora, Vratislav Kuzela, Michael Brouwer, Andrew R. Whalley +2 more | 2019-12-31 |
| 10484172 | Secure circuit for encryption key generation | Libor Sykora, Wade Benson, Vratislav Kuzela, Michael Brouwer, Andrew R. Whalley +2 more | 2019-11-19 |
| 10453375 | Long-term history of display intensities | Paul S. Drzaic, Tae-Wook Koh, Ross Thompson, Guy Cote, Christopher P. Tann +5 more | 2019-10-22 |
| 10440034 | Network assisted fraud detection apparatus and methods | Li Li, Stephan V. Schell | 2019-10-08 |
| 10425818 | Enforcing service policies in embedded UICCs | Xiangying Yang, Li Li | 2019-09-24 |
| 10409600 | Return-oriented programming (ROP)/jump oriented programming (JOP) attack protection | Yannick L. Sierra, Jeffry E. Gonion, Thomas F. Roche | 2019-09-10 |
| 10410568 | Long-term history of display intensities | Paul S. Drzaic, Ross Thompson, Guy Cote, Christopher P. Tann, Yifan Zhang +5 more | 2019-09-10 |