| 12367725 |
Trajectory and intent prediction |
Sylvain Jacques Prevost, Jianbo Chen |
2025-07-22 |
| 12254732 |
Physical access control systems and methods |
Sylvain Jacques Prevost, Stephen Carney, Wayne Pak, Jianbo Chen |
2025-03-18 |
| 12094044 |
Method and system for generating an animation from a static image |
Neha Agarwal |
2024-09-17 |
| 11763551 |
Systems and methods for fine tuning image classification neural networks |
Sylvain Jacques Prevost |
2023-09-19 |
| 11687583 |
Information retrieval system and method of information retrieval |
Ruchika Saxena, Maneesh Jain, Arun Kumar Singh |
2023-06-27 |
| 10305728 |
Discovering, identifying, and configuring devices with opaque addresses in the internet of things environment |
Sylvain Jacques Prevost |
2019-05-28 |
| 10042990 |
Field revisions for a personal security device |
Philip Hoyer, Eric Le Saint, Sylvain Jacques Prevost |
2018-08-07 |
| 9401918 |
User to user delegation service in a federated identity management environment |
HongQian Karen Lu, Ksheerabdhi Krishna |
2016-07-26 |
| 9065823 |
System and method for using a portable security device to cryptograhically sign a document in response to signature requests from a relying party to a digital signature service |
HongQian Karen Lu |
2015-06-23 |
| 8713644 |
System and method for providing security in browser-based access to smart cards |
Ksheerabdhi Krishna, HongQian Karen Lu |
2014-04-29 |
| 8527757 |
Method of preventing web browser extensions from hijacking user information |
HongQian Karen Lu, Asad Ali |
2013-09-03 |
| 7926096 |
Enforcing time-based transaction policies on devices lacking independent clocks |
Asad Ali, Bertrand du Castel, Apostol Vassilev, Sylvain Jacques Prevost |
2011-04-12 |
| 7748609 |
System and method for browser based access to smart cards |
Ksheerabdhi Krishna |
2010-07-06 |
| 7698703 |
Imparting digital uniqueness to the types of a programming language using a unique digital sequence |
Sylvain Jacques Prevost |
2010-04-13 |
| 7665667 |
System and method for updating access control mechanisms |
Sylvain Jacques Prevost |
2010-02-23 |
| 7565536 |
Method for secure delegation of trust from a security device to a host computer application for enabling secure access to a resource on the web |
Apostol Vassilev |
2009-07-21 |