| 10936191 |
Access control for a computing system |
Sitaraman Suthamali Lakshminarayanan, Christopher M. Holtz, Li Zhao, David M'Raihi, Yu Tan |
2021-03-02 |
| 9530133 |
Adaptive secondary authentication criteria based on account data |
Augustin J. Farrugia, Nicholas Thomas Sullivan |
2016-12-27 |
| 9424049 |
Data protection for opaque data structures |
Augustin J. Farrugia, Daniel F. Reynaud, Gianpaolo Fasoli, Julien Lerouge |
2016-08-23 |
| 9336370 |
Method and apparatus for dynamic obfuscation of static data |
Benoit Chevallier-Mames, Daniel F. Reynaud, Julien Lerouge, Mathieu Ciet, Thomas Icart |
2016-05-10 |
| 9268677 |
Dynamic obfuscation of heap memory allocations |
Julien Lerouge, Daniel F. Reynaud |
2016-02-23 |
| 9069656 |
Obfuscating function resources while reducing stack consumption |
Julien Lerouge, Nicholas Thomas Sullivan |
2015-06-30 |
| 9047448 |
Branch auditing in a computer program |
Cédric Tessier, Daniel F. Reynaud, Jean-Baptiste Aviat, Julien Lerouge, Pierre Betouin |
2015-06-02 |
| 9043887 |
Adaptive secondary authentication criteria based on account data |
Augustin J. Farrugia, Nicholas Thomas Sullivan |
2015-05-26 |
| 8756435 |
Obfuscation of control flow of software |
Julien Lerouge, Daniel F. Reynaud |
2014-06-17 |