Issued Patents All Time
Showing 25 most recent of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12430042 | Memory buffer devices with modal encryption | Evan Lawrence Erickson, Helena Handschuh, Mark Evan Marson | 2025-09-30 |
| 12393679 | Protection of neural networks by obfuscation of neural network operations and architecture | Mark Evan Marson, Helena Handschuh | 2025-08-19 |
| 12393702 | Protecting cryptographic keys stored in non-volatile memory | Mark Evan Marson | 2025-08-19 |
| 12375109 | Integration of compression algorithms with error correction codes | Thomas Vogelsang, John Eric Linstadt, Evan Lawrence Erickson | 2025-07-29 |
| 12335365 | Protection of transformations by intermediate randomization in cryptographic operations | Helena Handschuh, Mark Evan Marson | 2025-06-17 |
| 12287874 | Efficient integrity monitoring of processing operations with multiple memory arrays | Winthrop John Wu | 2025-04-29 |
| 12284278 | System and method to generate prime numbers in cryptographic applications | Qinglai Xiao, Michael Tunstall | 2025-04-22 |
| 12231562 | System and method to optimize decryption operations in cryptographic applications | Michael Tunstall, Denis Alexandrovich Pochuev | 2025-02-18 |
| 12219056 | Masking of key generation operations with random matrices in cryptographic applications | — | 2025-02-04 |
| 12166878 | System and method to improve efficiency in multiplication_ladder-based cryptographic operations | — | 2024-12-10 |
| 12099622 | Protection of neural networks by obfuscation of activation functions | Mark Evan Marson, Helena Handschuh | 2024-09-24 |
| 12101393 | Providing access to a hardware resource based on a canary value | Megan Anneke Wachs | 2024-09-24 |
| 12056219 | Protection of neural networks by obfuscation of neural network architecture | Mark Evan Marson, Helena Handschuh | 2024-08-06 |
| 12050719 | Preemption of a container in a secure computation environment | Ambuj Kumar, William Craig Rawlings, Ronald Perez, Denis Alexandrovich Pochuev, Paul C. Kocher | 2024-07-30 |
| 11983280 | Protection of cryptographic operations by intermediate randomization | Michael Tunstall, Michael Hutter | 2024-05-14 |
| 11961420 | Efficient squaring with loop equalization in arithmetic logic units | — | 2024-04-16 |
| 11956345 | DPA-resistant key derivation function | Denis Alexandrovich Pochuev | 2024-04-09 |
| 11902432 | System and method to optimize generation of coprime numbers in cryptographic applications | Michael Tunstall, Qinglai Xiao | 2024-02-13 |
| 11895109 | Securely provisioning a target device | Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev | 2024-02-06 |
| 11777926 | Internet of things (IoT) device management | Denis Alexandrovich Pochuev, Pankaj Rohatgi, Amit Kapoor, Joel Patrick Wittenauer | 2023-10-03 |
| 11664970 | Providing access to a hardware resource based on a canary value | Megan Anneke Wachs | 2023-05-30 |
| 11418334 | Protecting modular inversion operation from external monitoring attacks | Michael Tunstall | 2022-08-16 |
| 11416625 | Protecting cryptographic keys stored in non-volatile memory | Mark Evan Marson | 2022-08-16 |
| 11310227 | Securely provisioning a target device | Benjamin Che-Ming Jun, Paul C. Kocher, Daniel O'Loughlin, Denis Alexandrovich Pochuev | 2022-04-19 |
| 11010494 | Preemption of a container in a secure computation environment | Ambuj Kumar, William Craig Rawlings, Ronald Perez, Denis Alexandrovich Pochuev, Paul C. Kocher | 2021-05-18 |