Issued Patents All Time
Showing 76–100 of 141 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9009385 | Co-residency detection in a cloud-based system | Alina Oprea, Michael Kendrick Reiter, Yinqian Zhang | 2015-04-14 |
| 9008303 | Method and apparatus for generating forward secure pseudorandom numbers | Nikolaos Triandopoulos, Kevin D. Bowers | 2015-04-14 |
| 8994514 | Event indicator creation using first and second sets of values | Srdan Capkun, Davide Zanetti | 2015-03-31 |
| 8984609 | Methods and apparatus for embedding auxiliary information in one-time passcodes | Nikolaos Triandopoulos, Ronald L. Rivest, Marten Van Dijk | 2015-03-17 |
| 8984384 | Distributed storage system with efficient handling of file updates | Kevin D. Bowers, Alina Oprea | 2015-03-17 |
| 8984363 | Proof of retrievability for archived files | Burton S. Kaliski, Jr., Kevin D. Bowers, Alina Oprea | 2015-03-17 |
| 8977847 | Distributed challenge-response authentication | — | 2015-03-10 |
| 8954728 | Generation of exfiltration-resilient cryptographic keys | Nikolaos Triandopoulos | 2015-02-10 |
| 8938805 | Detection of tampering with software installed on a processing device | Catherine V. Hart | 2015-01-20 |
| 8934940 | Providing enhanced security for wireless telecommunications devices | — | 2015-01-13 |
| 8930549 | Method and apparatus for storing information in a browser storage area of a client device | Bjorn Markus Jakobsson | 2015-01-06 |
| 8886316 | Authentication of external devices to implantable medical devices using biometric measurements | — | 2014-11-11 |
| 8874904 | View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device | Kevin D. Bowers | 2014-10-28 |
| 8850609 | Conditional integration of a satellite device into an authentication process involving a primary device | — | 2014-09-30 |
| 8817988 | Variable epoch scheduler for proactive cryptography systems | Rachael Stockton, Robert D. Hopley, Marten Van Dijk, Nikolaos Triandopoulos | 2014-08-26 |
| 8813234 | Graph-based approach to deterring persistent security threats | Kevin D. Bowers, Marten Van Dijk, Alina Oprea, Ronald L. Rivest, Nikolaos Triandopoulos | 2014-08-19 |
| 8799334 | Remote verification of file protections for cloud data storage | Emil P. Stefanov, Marten Van Dijk, Alina Oprea | 2014-08-05 |
| 8792862 | Providing enhanced security for wireless telecommunications devices | — | 2014-07-29 |
| 8788817 | Methods and apparatus for secure and reliable transmission of messages over a silent alarm channel | Nikolaos Triandopoulos | 2014-07-22 |
| 8782752 | Apparatus and method for multi-plane threshold security | Nirav Bipinchandra Mehta | 2014-07-15 |
| 8774410 | Secret sharing in cryptographic devices via controlled release of plaintext information | — | 2014-07-08 |
| 8706701 | Scalable cloud file system with efficient integrity checks | Emil P. Stefanov, Marten Van Dijk, Alina Oprea | 2014-04-22 |
| 8699713 | Key update with compromise detection | Ronald L. Rivest | 2014-04-15 |
| 8700899 | Forward-secure key unlocking for cryptographic devices | — | 2014-04-15 |
| 8699715 | On-demand proactive epoch control for cryptographic devices | John Brainard, Robert D. Hopley | 2014-04-15 |