LT

Lawrence Tang

GI General Instrument: 9 patents #41 of 950Top 5%
Overall (All Time): #161,453 of 4,157,543Top 4%
25
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
11750576 Initialization encryption for streaming content Madhu Penugonda 2023-09-05
11671279 Determining a session key using session data 2023-06-06
11552786 System and method for authenticating data while minimizing bandwidth Kenneth Miller, Christopher J. Bennett 2023-01-10
11418364 Determining a session key using session data 2022-08-16
11418339 Preservation of encryption An Tonthat 2022-08-16
11115201 Downloading of data to secure devices Douglas M. Petty, Michael T. Habrat 2021-09-07
11108743 Initialization encryption for streaming content Madhu Penugonda 2021-08-31
10944579 Device pairing and authentication Douglas M. Petty 2021-03-09
10797864 System and method for authenticating data while minimizing bandwidth Kenneth Miller, Christopher J. Bennett 2020-10-06
10375030 Initialization encryption for streaming content Madhu Penugonda 2019-08-06
9930390 Control word and associated entitlement control message caching and reuse Madhu Penugonda, Kenneth Miller, Douglas M. Petty 2018-03-27
9531778 Message rate mixing for bandwidth management Kenneth Miller 2016-12-27
9473463 Control word and associated entitlement control message caching and reuse Madhu Penugonda, Kenneth Miller, Douglas M. Petty 2016-10-18
8958550 Encryption operation with real data rounds, dummy data rounds, and delay periods An Tonthat 2015-02-17
8792637 Downloading of data to secure devices Douglas M. Petty, Michael T. Habrat 2014-07-29
8385555 Content delivery with segmented key list Eric Eugene Berry 2013-02-26
8156560 Method and apparatus for providing a border guard between security domains John Okimoto, Bridget Kimball, Annie Chen, Michael T. Habrat, Douglas M. Petty +1 more 2012-04-10
7929483 Method and apparatus for providing a secure system time Bridget Kimball, Michael T. Habrat, John Okimoto, Douglas M. Petty, Eric J. Sprunk 2011-04-19
7764793 Method to leverage a secure device to grant trust and identity to a second device Xin Qiu, Bridget Kimball, Eric J. Sprunk 2010-07-27
7305555 Smart card mating protocol John Okimoto, Eric J. Sprunk, Annie Chen, Bridget Kimball, Douglas M. Petty 2007-12-04
7257227 System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems Annie Chen, Akiko Wakabayashi 2007-08-14
7076661 System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems Annie Chen, Akiko Wakabayashi 2006-07-11
6978022 System for securing encryption renewal system and for registration and remote activation of encryption device John Okimoto 2005-12-20
6804782 Countermeasure to power attack and timing attack on cryptographic operations Xin Qiu, Eric J. Sprunk, Daniel Z. Simon, Lawrence COOK 2004-10-12
6711684 Variable security code download for an embedded processor Paul Moroney, Eric J. Sprunk, Adam Rappoport 2004-03-23