| 11750576 |
Initialization encryption for streaming content |
Madhu Penugonda |
2023-09-05 |
| 11671279 |
Determining a session key using session data |
— |
2023-06-06 |
| 11552786 |
System and method for authenticating data while minimizing bandwidth |
Kenneth Miller, Christopher J. Bennett |
2023-01-10 |
| 11418364 |
Determining a session key using session data |
— |
2022-08-16 |
| 11418339 |
Preservation of encryption |
An Tonthat |
2022-08-16 |
| 11115201 |
Downloading of data to secure devices |
Douglas M. Petty, Michael T. Habrat |
2021-09-07 |
| 11108743 |
Initialization encryption for streaming content |
Madhu Penugonda |
2021-08-31 |
| 10944579 |
Device pairing and authentication |
Douglas M. Petty |
2021-03-09 |
| 10797864 |
System and method for authenticating data while minimizing bandwidth |
Kenneth Miller, Christopher J. Bennett |
2020-10-06 |
| 10375030 |
Initialization encryption for streaming content |
Madhu Penugonda |
2019-08-06 |
| 9930390 |
Control word and associated entitlement control message caching and reuse |
Madhu Penugonda, Kenneth Miller, Douglas M. Petty |
2018-03-27 |
| 9531778 |
Message rate mixing for bandwidth management |
Kenneth Miller |
2016-12-27 |
| 9473463 |
Control word and associated entitlement control message caching and reuse |
Madhu Penugonda, Kenneth Miller, Douglas M. Petty |
2016-10-18 |
| 8958550 |
Encryption operation with real data rounds, dummy data rounds, and delay periods |
An Tonthat |
2015-02-17 |
| 8792637 |
Downloading of data to secure devices |
Douglas M. Petty, Michael T. Habrat |
2014-07-29 |
| 8385555 |
Content delivery with segmented key list |
Eric Eugene Berry |
2013-02-26 |
| 8156560 |
Method and apparatus for providing a border guard between security domains |
John Okimoto, Bridget Kimball, Annie Chen, Michael T. Habrat, Douglas M. Petty +1 more |
2012-04-10 |
| 7929483 |
Method and apparatus for providing a secure system time |
Bridget Kimball, Michael T. Habrat, John Okimoto, Douglas M. Petty, Eric J. Sprunk |
2011-04-19 |
| 7764793 |
Method to leverage a secure device to grant trust and identity to a second device |
Xin Qiu, Bridget Kimball, Eric J. Sprunk |
2010-07-27 |
| 7305555 |
Smart card mating protocol |
John Okimoto, Eric J. Sprunk, Annie Chen, Bridget Kimball, Douglas M. Petty |
2007-12-04 |
| 7257227 |
System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems |
Annie Chen, Akiko Wakabayashi |
2007-08-14 |
| 7076661 |
System for denying access to content generated by a compromised off line encryption device and for conveying cryptographic keys from multiple conditional access systems |
Annie Chen, Akiko Wakabayashi |
2006-07-11 |
| 6978022 |
System for securing encryption renewal system and for registration and remote activation of encryption device |
John Okimoto |
2005-12-20 |
| 6804782 |
Countermeasure to power attack and timing attack on cryptographic operations |
Xin Qiu, Eric J. Sprunk, Daniel Z. Simon, Lawrence COOK |
2004-10-12 |
| 6711684 |
Variable security code download for an embedded processor |
Paul Moroney, Eric J. Sprunk, Adam Rappoport |
2004-03-23 |