| 11645367 |
Digital watermarking system and method |
Adam Mellor |
2023-05-09 |
| 10943569 |
Adapter for a support device for a stringed instrument |
— |
2021-03-09 |
| 10944545 |
Obfuscated performance of a predetermined function |
— |
2021-03-09 |
| 10599855 |
Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme |
Phillip Alan Eisen, Grant Stewart Goodes, James Muir |
2020-03-24 |
| 10318271 |
Updating software components in a program |
Clifford Liem, Hongrui Dong, Sam Martin, Yuan Xiang Gu |
2019-06-11 |
| 10127390 |
Tamper resistant cryptographic algorithm implementation |
— |
2018-11-13 |
| 10026942 |
Bus bar assembly including integrated bus bar support |
Jason R. Davis, Robert G. Dickie, Kevin Martus, Michael Shenberger, David Allen |
2018-07-17 |
| 9965623 |
Securing accessible systems using base function encoding |
Harold Johnson, Yuan Xiang Gu, Yongxin Zhou |
2018-05-08 |
| 9906360 |
Securing accessible systems using variable dependent coding |
Harold Johnson, Yuan Xiang Gu, Yongxin Zhou |
2018-02-27 |
| 9698973 |
Securing accessible systems using dynamic data mangling |
Harold Johnson, Yuan Xiang Gu |
2017-07-04 |
| 8505018 |
Server consolidation based on minimum utilization |
David Kenneth Morgan, Anthony Francis Hutchings, Christopher Rice |
2013-08-06 |
| 6978017 |
Method and system for providing updated encryption key pairs and digital signature key pairs in a public key system |
Josanne Otway |
2005-12-20 |
| 6603857 |
Method and apparatus for controlling release of time sensitive information |
Mark Christopher Batten-Carew |
2003-08-05 |
| 6393565 |
Data management system and method for a limited capacity cryptographic storage unit |
Roland Thomas Lockhart |
2002-05-21 |
| 6363485 |
Multi-factor biometric authenticating device and method |
Carlisle Adams |
2002-03-26 |
| 6230272 |
System and method for protecting a multipurpose data string used for both decrypting data and for authenticating a user |
Roland Thomas Lockhart |
2001-05-08 |
| 6134550 |
Method and apparatus for use in determining validity of a certificate in a communication system employing trusted paths |
Paul C. Van Oorschot, Ian Curry |
2000-10-17 |
| 5949884 |
Design principles of the shade cipher |
Carlisle Adams |
1999-09-07 |
| 5850443 |
Key management system for mixed-trust environments |
Paul C. Van Oorschot |
1998-12-15 |
| 5825886 |
Construction symmetric ciphers using the cast design procedure |
Carlisle Adams, Roland Thomas Lockhart |
1998-10-20 |
| 5481613 |
Computer network cryptographic key distribution system |
Warwick Ford |
1996-01-02 |
| 5121431 |
Processor method of multiplying large numbers |
— |
1992-06-09 |