Issued Patents All Time
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11750576 | Initialization encryption for streaming content | Madhu Penugonda | 2023-09-05 |
| 11671279 | Determining a session key using session data | — | 2023-06-06 |
| 11552786 | System and method for authenticating data while minimizing bandwidth | Kenneth Miller, Christopher J. Bennett | 2023-01-10 |
| 11418364 | Determining a session key using session data | — | 2022-08-16 |
| 11418339 | Preservation of encryption | An Tonthat | 2022-08-16 |
| 11115201 | Downloading of data to secure devices | Douglas M. Petty, Michael T. Habrat | 2021-09-07 |
| 11108743 | Initialization encryption for streaming content | Madhu Penugonda | 2021-08-31 |
| 10944579 | Device pairing and authentication | Douglas M. Petty | 2021-03-09 |
| 10797864 | System and method for authenticating data while minimizing bandwidth | Kenneth Miller, Christopher J. Bennett | 2020-10-06 |
| 10375030 | Initialization encryption for streaming content | Madhu Penugonda | 2019-08-06 |
| 9930390 | Control word and associated entitlement control message caching and reuse | Madhu Penugonda, Kenneth Miller, Douglas M. Petty | 2018-03-27 |
| 9531778 | Message rate mixing for bandwidth management | Kenneth Miller | 2016-12-27 |
| 9473463 | Control word and associated entitlement control message caching and reuse | Madhu Penugonda, Kenneth Miller, Douglas M. Petty | 2016-10-18 |
| 8958550 | Encryption operation with real data rounds, dummy data rounds, and delay periods | An Tonthat | 2015-02-17 |
| 8792637 | Downloading of data to secure devices | Douglas M. Petty, Michael T. Habrat | 2014-07-29 |
| 8385555 | Content delivery with segmented key list | Eric Eugene Berry | 2013-02-26 |
| 8156560 | Method and apparatus for providing a border guard between security domains | John Okimoto, Bridget Kimball, Annie Chen, Michael T. Habrat, Douglas M. Petty +1 more | 2012-04-10 |
| 7929483 | Method and apparatus for providing a secure system time | Bridget Kimball, Michael T. Habrat, John Okimoto, Douglas M. Petty, Eric J. Sprunk | 2011-04-19 |
| 7764793 | Method to leverage a secure device to grant trust and identity to a second device | Xin Qiu, Bridget Kimball, Eric J. Sprunk | 2010-07-27 |
| 7305555 | Smart card mating protocol | John Okimoto, Eric J. Sprunk, Annie Chen, Bridget Kimball, Douglas M. Petty | 2007-12-04 |
| 7257227 | System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems | Annie Chen, Akiko Wakabayashi | 2007-08-14 |
| 7076661 | System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems | Annie Chen, Akiko Wakabayashi | 2006-07-11 |
| 6978022 | System for securing encryption renewal system and for registration and remote activation of encryption device | John Okimoto | 2005-12-20 |
| 6804782 | Countermeasure to power attack and timing attack on cryptographic operations | Xin Qiu, Eric J. Sprunk, Daniel Z. Simon, Lawrence COOK | 2004-10-12 |
| 6711684 | Variable security code download for an embedded processor | Paul Moroney, Eric J. Sprunk, Adam Rappoport | 2004-03-23 |