AL

An V. Le

IBM: 20 patents #5,451 of 70,183Top 8%
ET Emerson Climate Technologies: 1 patents #179 of 353Top 55%
NS National Semiconductor: 1 patents #1,247 of 2,238Top 60%
DI Digi International: 1 patents #51 of 95Top 55%
Lam Research: 1 patents #1,364 of 2,128Top 65%
VE Verizon: 1 patents #3,381 of 6,226Top 55%
UN Unisys: 1 patents #1,020 of 2,015Top 55%
Overall (All Time): #136,609 of 4,157,543Top 4%
28
Patents All Time

Issued Patents All Time

Showing 25 most recent of 28 patents

Patent #TitleCo-InventorsDate
12078090 Oil filter housing and assembly Danny Le 2024-09-03
11022330 Three-way heat exchangers for liquid desiccant air-conditioning systems and methods of manufacture Mark Allen, Scott N. Rowe, Shawn Montgomery, Mark D. Rosenblum, Peter Luttik +1 more 2021-06-01
9806902 Scalable framework for monitoring machine-to-machine (M2M) devices Ashok N. Srivastava, Kalyan Pamarthy, Santanu Das, Yunzhu CHEN, Xuepeng Sun 2017-10-31
8788825 Method and apparatus for key management for various device-server configurations Andrea Maria Mazzario, Elliot Schwartz 2014-07-22
RE38375 Method and system for the secured distribution of multimedia titles Amir Herzberg, Hugo M. Krawczyk, Shay Kutten, Stephen M. Matyas, Marcel Mordechay Yung 2003-12-30
6390374 System and method for installing/de-installing an application on a smart card Todd Alan Carper, David Hemmo 2002-05-21
6283143 System and method for providing an integrated gas stick Richard Adachi 2001-09-04
5883956 Dynamic configuration of a secure processing unit for operations in various environments William Sweet, Howard C. Herbert 1999-03-16
5745678 Method and system for the secured distribution of multimedia titles Amir Herzberg, Hugo M. Krawczyk, Shay Kutten, Stephen M. Matyas, Marcel Mordechay Yung 1998-04-28
5434870 Apparatus and method for verifying the authenticity of a circuit board Michael K. Benton 1995-07-18
5432849 Secure cryptographic operations using control vectors generated inside a cryptographic facility Donald B. Johnson, Stephen M. Matyas, Rostislaw Prymak, John D. Wilkins 1995-07-11
5414833 Network security system and method using a parallel finite state machine adaptive active monitor and responder Paul C. Hershey, Donald B. Johnson, Stephen M. Matyas, John G. Waclawsky, John D. Wilkins 1995-05-09
5323464 Commercial data masking Robert C. Elander, Christopher J. Holloway, Donald B. Johnson, Michael J. Kelly, Paul G. Lubold +2 more 1994-06-21
5319705 Method and system for multimedia access control enablement Bernard J. Halter, Alphonse M. Bracco, Donald B. Johnson, Stephen M. Matyas, Rostislaw Prymak +2 more 1994-06-07
5301231 User defined function facility Dennis G. Abraham, Daniela Henningsmeyer, John M. Hudson, Donald B. Johnson, Stephen M. Matyas +1 more 1994-04-05
5265164 Cryptographic facility environment backup/restore and replication in a public key cryptosystem Stephen M. Matyas, Donald B. Johnson, Rostislaw Prymak, William C. Martin, William S. Rohland +1 more 1993-11-23
5200999 Public key cryptosystem key management based on control vectors Stephen M. Matyas, Donald B. Johnson, Rostislaw Prymak, William C. Martin, William S. Rohland +1 more 1993-04-06
5201000 Method for generating public and private key pairs without using a passphrase Stephen M. Matyas, Donald B. Johnson, Rostislaw Prymak, John D. Wilkins 1993-04-06
5164988 Method to establish and enforce a network cryptographic security policy in a public key cryptosystem Stephen M. Matyas, Donald B. Johnson, Rostislaw Prymak, William C. Martin, William S. Rohland +1 more 1992-11-17
5142578 Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors Stephen M. Matyas, Donald B. Johnson, Rostislaw Prymak, John D. Wilkins, William C. Martin +1 more 1992-08-25
5103478 Secure management of keys using control vectors with multi-path checking Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, Patrick McCormack +2 more 1992-04-07
5073934 Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key Stephen M. Matyas, Donald B. Johnson, William C. Martin, Rostislaw Prymak, William S. Rohland +1 more 1991-12-17
5007089 Secure key management using programable control vector checking Stephen M. Matyas, Donald B. Johnson, William C. Martin, Rostislaw Prymak, John D. Wilkins 1991-04-09
4993069 Secure key management using control vector translation Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Rostislaw Prymak, John D. Wilkins +1 more 1991-02-12
4941176 Secure management of keys using control vectors Stephen M. Matyas, Dennis G. Abraham, Donald B. Johnson, Ramesh K. Karne, Rostislaw Prymak +3 more 1990-07-10