Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10601585 | Methods and apparatus for blockchain encryption | Eric Young | 2020-03-24 |
| 10237306 | Communicating service encryption key to interceptor for monitoring encrypted communications | — | 2019-03-19 |
| 10127376 | Graphical password generation | — | 2018-11-13 |
| 10116693 | Server using proof-of-work technique for hardening against denial of service attacks | Eric Young | 2018-10-30 |
| 10084596 | Proactivized threshold password-based secret sharing with flexible key rotation | Nikolaos Triandopoulos, Salah Machani | 2018-09-25 |
| 9703965 | Secure containers for flexible credential protection in devices | Nikolaos Triandopoulos | 2017-07-11 |
| 9648012 | Automatic propagation of password updates on multiple devices | Salah Machani | 2017-05-09 |
| 9594918 | Computer data protection using tunable key derivation function | Sean Parkinson, Eric Young | 2017-03-14 |
| 9455973 | Secure storage and retrieval of data in a database with multiple data classes and multiple data identifiers | Nikolaos Triandopoulos, David Alistair Healy | 2016-09-27 |
| 9292671 | Multi-server authentication using personalized proactivization | Eric Young, Jaimee Brown, Koji Onishi, Jacob Matthew Evans, Katherine Watts | 2016-03-22 |
| 9288049 | Cryptographically linking data and authentication identifiers without explicit storage of linkage | David Alistair Healy, Nikolaos Triandopoulos | 2016-03-15 |
| 9240988 | Computer system employing dual-band authentication | — | 2016-01-19 |
| 9230075 | Multi-server authentication using proactivization journaling | Jaimee Brown, Eric Young | 2016-01-05 |
| 9118487 | Asymmetric encryption scheme with expiring revocable certificates having a predefined validity period | — | 2015-08-25 |
| 8930687 | Secure distributed deduplication in encrypted data storage | Eric Young | 2015-01-06 |
| 8856531 | Message bus key agreement scheme | Kanchan Kaur, Sean Parkinson | 2014-10-07 |
| 8739257 | Managing authentication of virtual clients | — | 2014-05-27 |
| 8707050 | Integrity self-check of secure code within a VM environment using native VM code | Stefan Pingel, Jaimee Brown, Geetu Preet Sandhu | 2014-04-22 |
| 8601544 | Computer system employing dual-band authentication using file operations by trusted and untrusted mechanisms | Eric Young, Michael Foley | 2013-12-03 |
| 8498411 | Using multiples above two with running totals and reference values other than 0 and 2 (window size) in elliptic curve cryptography scalar multiplication acceleration tables | Sean Parkinson, Mark Hibberd, David Paul Makepeace | 2013-07-30 |
| 8428252 | Using multiples above two with running totals in elliptic curve cryptography scalar multiplication acceleration tables | David Paul Makepeace, Sean Parkinson, Mark Hibberd | 2013-04-23 |
| 8411855 | Size optimization for large elliptic curve cryptography scalar multiplication acceleration tables | David Paul Makepeace, Sean Parkinson, Mark Hibberd | 2013-04-02 |
| 8345864 | Elliptic curve cryptography scalar multiplication with on demand acceleration table generation | David Paul Makepeace, Jaimee Brown | 2013-01-01 |