MC

Mathieu Ciet

Apple: 81 patents #260 of 18,612Top 2%
GS Gemalto Sa: 1 patents #192 of 462Top 45%
Overall (All Time): #21,631 of 4,157,543Top 1%
82
Patents All Time

Issued Patents All Time

Showing 25 most recent of 82 patents

Patent #TitleCo-InventorsDate
12001579 Cloud messaging system Benoit Chevallier-Mames, Thomas Icart, Oliver J. Hunt, Yannick L. Sierra, Gokul P. Thirumalai +1 more 2024-06-04
11494574 Identity document authentication Bruno Benteo, Michael Mouchous, Augustin J. Farrugia 2022-11-08
11025596 Cloud messaging system Benoit Chevallier-Mames, Thomas Icart, Oliver J. Hunt, Yannick L. Sierra, Gokul P. Thirumalai +1 more 2021-06-01
10868672 Establishing and verifying identity using biometrics while protecting user privacy Augustin J. Farrugia, Ritwik K. Kumar, Gianpaolo Fasoli, Bruno Kindarji, Eric D. Friedman +2 more 2020-12-15
10599873 Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved Lucas O. Winstrom, Eric D. Friedman, Ritwik K. Kumar, Jeremy M. Stober, Amol V. Pattekar +4 more 2020-03-24
10574458 Media storage structures for storing content, devices for using such structures, systems for distributing such structures Augustin J. Farrugia, Gianpaolo Fasoli, Bertrand Mollinier Toublet 2020-02-25
10164772 Permutation composition based hash function Augustin J. Farrugia, Thomas Icart 2018-12-25
10042989 Device activation Gianpaolo Fasoli, Augustin J. Farrugia, Jean-Francois Riendeau 2018-08-07
9774443 Computing key-schedules of the AES for use in white boxes Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart, Augustin J. Farrugia 2017-09-26
9716586 Precomputing internal AES states in counter mode to protect keys used in AES computations Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia 2017-07-25
9692592 Using state reordering to protect against white box attacks Bruno Kindarji, Benoit Chevallier-Mames, Augustin J. Farrugia, Thomas Icart 2017-06-27
9639673 Protecting software through a fake cryptographic layer Pierre Betouin, Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Cédric Tessier +2 more 2017-05-02
9565018 Protecting cryptographic operations using conjugacy class functions Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart 2017-02-07
9515818 Multi-block cryptographic operation Bruno Kindarji, Benoit Chevallier-Mames, Thomas Icart, Augustin J. Farrugia 2016-12-06
9336370 Method and apparatus for dynamic obfuscation of static data Benoit Chevallier-Mames, Daniel F. Reynaud, Jonathan G. McLachlan, Julien Lerouge, Thomas Icart 2016-05-10
9311492 Media storage structures for storing content, devices for using such structures, systems for distributing such structures Augustin J. Farrugia, Gianpaolo Fasoli, Bertrand Mollinier Toublet 2016-04-12
9274976 Code tampering protection for insecure environments Augustin J. Farrugia, Pierre Betouin 2016-03-01
9264234 Secure authentication of identification for computing devices Augustin J. Farrugia, David M'Raihi, Thomas Icart 2016-02-16
9264222 Precomputing internal AES states in counter mode to protect keys used in AES computations Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia 2016-02-16
9189425 Protecting look up tables by mixing code and operations Augustin J. Farrugia, Benoit Chevallier-Mames, Bruno Kindarji, Thomas Icart 2015-11-17
9143317 Protecting against white box attacks using column rotation Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia 2015-09-22
9128722 Systems, methods, and computer-readable media for fertilizing machine-executable code Pierre Betouin, Augustin J. Farrugia 2015-09-08
9031228 Systems and methods for implementing block cipher algorithms on attacker-controlled systems Augustin J. Farrugia, Filip Toma Paun 2015-05-12
8976960 Methods and apparatus for correlation protected processing of cryptographic operations Benoit Chevallier-Mames, Thomas Icart, Bruno Kindarji, Augustin J. Farrugia 2015-03-10
8966285 Securing implementation of a cryptographic process having fixed or dynamic keys Augustin J. Farrugia, Benoit Chevallier-Mames 2015-02-24