Issued Patents All Time
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12079374 | Secure software compilation and software verification | Dale Bowie, Narayana Aditya Madineni | 2024-09-03 |
| 11985239 | Forward secrecy in transport layer security (TLS) using ephemeral keys | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie +2 more | 2024-05-14 |
| 11892938 | Correlation and root cause analysis of trace data using an unsupervised autoencoder | Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean | 2024-02-06 |
| 11818208 | Adaptive data protocol for IoT devices | Jayachandu Bandlamudi, Narayana Aditya Madineni, Xinlin Wang | 2023-11-14 |
| 11757659 | Post-quantum certificate binding | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Peter T. Waltenberg | 2023-09-12 |
| 11720471 | Monitoring stack memory usage to optimize programs | Narayana Aditya Madineni, Michael W. Gray, Luvita Burgess | 2023-08-08 |
| 11716206 | Certificate based security using post quantum cryptography | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Peter T. Waltenberg | 2023-08-01 |
| 11683182 | Message embedment in random values | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Stephen J. McKenzie, Michael James Thomas | 2023-06-20 |
| 11632246 | Hybrid key derivation to secure data | Michael W. Gray, Simon D. McMahon, Narayana Aditya Madineni, Peter T. Waltenberg | 2023-04-18 |
| 11570153 | Virtual machine perfect forward secrecy | Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean | 2023-01-31 |
| 11550896 | Password strength | Leigh S. McLean, Narayana Aditya Madineni, Michael W. Gray | 2023-01-10 |
| 11463242 | Padding oracle elimination in RSA encryption | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean | 2022-10-04 |
| 11374975 | TLS integration of post quantum cryptographic algorithms | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Peter T. Waltenberg | 2022-06-28 |
| 11368316 | Applying PKI (public key infrastructure) to power of attorney documents | Narayana Aditya Madineni | 2022-06-21 |
| 11271968 | Zero round trip time transmission for anticipatory request messages | Narayana Aditya Madineni, Michael W. Gray, Luvita Burgess | 2022-03-08 |
| 11206135 | Forward secrecy in Transport Layer Security (TLS) using ephemeral keys | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Stephen J. McKenzie +2 more | 2021-12-21 |
| 11153299 | Secure data transport using trusted identities | Michael W. Gray, Narayana Aditya Madineni, Simon D. McMahon, Leigh S. McLean, Luvita Burgess +2 more | 2021-10-19 |
| 11138608 | Authorizing multiparty blockchain transactions via one-time passwords | — | 2021-10-05 |
| 10812267 | Secure password lock and recovery | Simon D. McMahon, Narayana Aditya Madineni, Michael W. Gray, Leigh S. McLean, Luvita Burgess +2 more | 2020-10-20 |
| 9449197 | Pooling entropy to facilitate mobile device-based true random number generation | Leigh S. McLean, Peter Theodore Waltenberg | 2016-09-20 |
| 8949814 | Providing a software upgrade risk map for a deployed customer system | Christopher J. Hockings, Trevor S. Norvill, Richard A. Speter | 2015-02-03 |