Issued Patents All Time
Showing 1–25 of 31 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11943262 | Securing method for lawful interception | Michael Eoin Buckley, Michael C. Hollatz, Robert John Lambert | 2024-03-26 |
| 11310033 | System and method for operating pseudorandom generators | Robert John Lambert, Daniel Richard L. Brown, Atsushi Yamada | 2022-04-19 |
| 11032324 | Securing method for lawful interception | Michael Eoin Buckley, Michael C. Hollatz, Robert John Lambert | 2021-06-08 |
| 10812273 | Method for validating messages | Michael Eoin Buckley, Robert John Lambert | 2020-10-20 |
| 10484351 | System and method for certificate selection in vehicle-to-vehicle applications to enhance privacy | Brian M. Romansky, Constantine Grantcharov | 2019-11-19 |
| 10437977 | System and method for digital key sharing for access control | Robert John Lambert, Jay Peter Gallant, Mark Elkins | 2019-10-08 |
| 10320850 | Securing method for lawful interception | Michael Eoin Buckley, Michael C. Hollatz, Robert John Lambert | 2019-06-11 |
| 10284377 | Method for validating messages | Michael Eoin Buckley, Robert John Lambert | 2019-05-07 |
| 10187202 | Key agreement for wireless communication | Matthew John Campagna, Daniel Richard L. Brown | 2019-01-22 |
| 10057053 | Key agreement for wireless communication | Matthew John Campagna, Daniel Richard L. Brown | 2018-08-21 |
| 9866396 | Method for validating messages | Michael Eoin Buckley, Robert John Lambert | 2018-01-09 |
| 9467283 | Securing method for lawful interception | Michael Eoin Buckley, Michael C. Hollatz, Robert John Lambert | 2016-10-11 |
| 9407444 | Method for validating messages | Michael Eoin Buckley, Robert John Lambert | 2016-08-02 |
| 9088408 | Key agreement using a key derivation key | Matthew John Campagna, Daniel Richard L. Brown | 2015-07-21 |
| 8971851 | Key agreement for wireless communication | Matthew John Campagna, Daniel Richard L. Brown | 2015-03-03 |
| 8948694 | Antenna shield for proximity-based communication devices | Yevgeny Bondar, Shirook M. Ali | 2015-02-03 |
| 8712039 | Efficient implementation of hash algorithm on a processor | Robert John Lambert | 2014-04-29 |
| 8660263 | Power analysis attack countermeasure for the ECDSA | — | 2014-02-25 |
| 8645703 | Power analysis countermeasure for the ECMQV key agreement algorithm | — | 2014-02-04 |
| 8615080 | Method and apparatus for performing elliptic curve scalar multiplication in a manner that counters power analysis attacks | — | 2013-12-24 |
| 8577028 | System and method for performing exponentiation in a cryptographic system | Robert John Lambert | 2013-11-05 |
| 8442216 | Fault detection in exponentiation and point multiplication operations using a montgomery ladder | Robert John Lambert | 2013-05-14 |
| 8391479 | Combining interleaving with fixed-sequence windowing in an elliptic curve scalar multiplication | — | 2013-03-05 |
| 8379844 | Methods and apparatus for performing an elliptic curve scalar multiplication operation using splitting | — | 2013-02-19 |
| 8379849 | Method and apparatus for generating a public key in a manner that counters power analysis attacks | — | 2013-02-19 |