Issued Patents All Time
Showing 26–50 of 75 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10348489 | Internet of things (IOT) method for updating a master key | Alexander Medvinsky | 2019-07-09 |
| 10284374 | Code signing system with machine to machine interaction | Alexander Medvinsky, Alexey Shevchenko | 2019-05-07 |
| 10284376 | Code signing system with machine to machine interaction | Reshma T. Shahabuddin, Ting Yao, Alexander Medvinsky, Xin Qiu | 2019-05-07 |
| 10270742 | Cryptographic service with output redirection | Alexander Medvinsky, Ali Negahdar | 2019-04-23 |
| 9912771 | Real time key collection in device provisioning | Eric J. Sprunk, Xin Qiu, Jason A. Pasion, Oscar Jiang | 2018-03-06 |
| 9912485 | Method and apparatus for embedding secret information in digital certificates | Alexander Medvinsky, Eric J. Sprunk | 2018-03-06 |
| 9646332 | Secure large volume feature license provisioning system | Jinsong Zheng, Liqiang Chen, Greg N. Nakanishi, Jason A. Pasion, Xin Qiu +1 more | 2017-05-09 |
| 9503462 | Authenticating security parameters | Nadarajah Asokan, Govind Krishnamurthi | 2016-11-22 |
| 9485230 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | Madjid F. Nakhjiri, Alexander Medvinsky, Eric J. Sprunk | 2016-11-01 |
| 9460272 | Method and apparatus for group licensing of device features | Jinsong Zheng, David B. Prickett | 2016-10-04 |
| 9438584 | Provisioning DRM credentials on a client device using an update server | Alexander Medvinsky, Paul Moroney | 2016-09-06 |
| 9231759 | Internet key exchange protocol using security associations | Gabor Bajko | 2016-01-05 |
| 9210138 | Efficient key generator for distribution of sensitive material from multiple application service providers to a secure element such as a universal integrated circuit card (UICC) | Madjid F. Nakhjiri, Alexander Medvinsky, Eric J. Sprunk | 2015-12-08 |
| 9184917 | Method and system for registering a DRM client | Alexander Medvinsky, Paul Moroney, Rafie Shamsaasef, Madjid F. Nakhijiri | 2015-11-10 |
| 9178869 | Locating network resources for an entity based on its digital certificate | Madjid F. Nakhjiri | 2015-11-03 |
| 9160723 | Framework for provisioning devices with externally acquired component-based identity data | Ting Yao, Alexander Medvinsky, Xin Qiu | 2015-10-13 |
| 8997252 | Downloadable security based on certificate status | Alexander Medvinsky | 2015-03-31 |
| 8898469 | Software feature authorization through delegated agents | Paul D. Baker, Christopher P. Gardner, Mark E. Gregotski, Ted R. Michaud, Xin Qiu +1 more | 2014-11-25 |
| 8856509 | System and method for cognizant transport layer security (CTLS) | Madjid F. Nakhjiri, Alexander Medvinsky | 2014-10-07 |
| 8797150 | Method and system for power line networking for industrial process control applications | — | 2014-08-05 |
| 8589674 | Revocation list update for devices | Alexander Medvinsky, Eric J. Sprunk | 2013-11-19 |
| 8581743 | Method and system for automated power meter infrastructure | Elsa A. Chan | 2013-11-12 |
| 8484467 | Authentication in communications networks | Gabor Bajko | 2013-07-09 |
| 8385083 | Method and system for isolating local area networks over a co-axial wiring for energy management | Elsa A. Chan | 2013-02-26 |
| 8374338 | Transport packet decryption testing in a client device | Alexander Medvinsky, Stuart P. Moskovics, Jason A. Pasion, Xin Qiu | 2013-02-12 |