| 10601585 |
Methods and apparatus for blockchain encryption |
Eric Young |
2020-03-24 |
| 10237306 |
Communicating service encryption key to interceptor for monitoring encrypted communications |
— |
2019-03-19 |
| 10127376 |
Graphical password generation |
— |
2018-11-13 |
| 10116693 |
Server using proof-of-work technique for hardening against denial of service attacks |
Eric Young |
2018-10-30 |
| 10084596 |
Proactivized threshold password-based secret sharing with flexible key rotation |
Nikolaos Triandopoulos, Salah Machani |
2018-09-25 |
| 9703965 |
Secure containers for flexible credential protection in devices |
Nikolaos Triandopoulos |
2017-07-11 |
| 9648012 |
Automatic propagation of password updates on multiple devices |
Salah Machani |
2017-05-09 |
| 9594918 |
Computer data protection using tunable key derivation function |
Sean Parkinson, Eric Young |
2017-03-14 |
| 9455973 |
Secure storage and retrieval of data in a database with multiple data classes and multiple data identifiers |
Nikolaos Triandopoulos, David Alistair Healy |
2016-09-27 |
| 9292671 |
Multi-server authentication using personalized proactivization |
Eric Young, Jaimee Brown, Koji Onishi, Jacob Matthew Evans, Katherine Watts |
2016-03-22 |
| 9288049 |
Cryptographically linking data and authentication identifiers without explicit storage of linkage |
David Alistair Healy, Nikolaos Triandopoulos |
2016-03-15 |
| 9240988 |
Computer system employing dual-band authentication |
— |
2016-01-19 |
| 9230075 |
Multi-server authentication using proactivization journaling |
Jaimee Brown, Eric Young |
2016-01-05 |
| 9118487 |
Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period |
— |
2015-08-25 |
| 8930687 |
Secure distributed deduplication in encrypted data storage |
Eric Young |
2015-01-06 |
| 8856531 |
Message bus key agreement scheme |
Kanchan Kaur, Sean Parkinson |
2014-10-07 |
| 8739257 |
Managing authentication of virtual clients |
— |
2014-05-27 |
| 8707050 |
Integrity self-check of secure code within a VM environment using native VM code |
Stefan Pingel, Jaimee Brown, Geetu Preet Sandhu |
2014-04-22 |
| 8601544 |
Computer system employing dual-band authentication using file operations by trusted and untrusted mechanisms |
Eric Young, Michael Foley |
2013-12-03 |
| 8498411 |
Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables |
Sean Parkinson, Mark Hibberd, David Paul Makepeace |
2013-07-30 |
| 8428252 |
Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables |
David Paul Makepeace, Sean Parkinson, Mark Hibberd |
2013-04-23 |
| 8411855 |
Size optimization for large elliptic curve cryptography scalar multiplication acceleration tables |
David Paul Makepeace, Sean Parkinson, Mark Hibberd |
2013-04-02 |
| 8345864 |
Elliptic curve cryptography scalar multiplication with on demand acceleration table generation |
David Paul Makepeace, Jaimee Brown |
2013-01-01 |