PR

Pankaj Rohatgi

IBM: 22 patents #4,909 of 70,183Top 7%
CR Cryptography Research: 21 patents #8 of 64Top 15%
TE Thomson Consumer Electronics: 2 patents #159 of 436Top 40%
Overall (All Time): #65,233 of 4,157,543Top 2%
45
Patents All Time

Issued Patents All Time

Showing 25 most recent of 45 patents

Patent #TitleCo-InventorsDate
11797683 Security chip with resistance to external monitoring attacks Paul C. Kocher, Joshua M. Jaffe 2023-10-24
11777926 Internet of things (IoT) device management Denis Alexandrovich Pochuev, Michael Alexander Hamburg, Amit Kapoor, Joel Patrick Wittenauer 2023-10-03
11757617 Performing cryptographic data processing operations in a manner resistant to external monitoring attacks Sami James Saab, Craig E. Hampel 2023-09-12
11507659 Enhancements to improve side channel resistance Sami James Saab, Elke De Mulder, Craig E. Hampel, Jeremy R. Cooper, Winthrop John Wu 2022-11-22
11463236 Programmable block cipher with masked inputs Rodrigo Portella do Canto, Elke De Mulder, Matthew Pond Baker 2022-10-04
11228422 Configuring a device based on a DPA countermeasure Christopher Gori 2022-01-18
11101981 Generating a pseudorandom number based on a portion of shares used in a cryptographic operation Elke De Mulder, Michael Hutter 2021-08-24
11074349 Apparatus with anticounterfeiting measures Paul C. Kocher, Joshua M. Jaffe 2021-07-27
10897344 Performing cryptographic data processing operations in a manner resistant to external monitoring attacks Sami James Saab, Craig E. Hampel 2021-01-19
10789358 Enhancements to improve side channel resistance Sami James Saab, Elke De Mulder, Craig E. Hampel, Jeremy R. Cooper, Winthrop John Wu 2020-09-29
10530566 Configuring a device based on a DPA countermeasure Christopher Gori 2020-01-07
10382193 Performing cryptographic data processing operations in a manner resistant to external monitoring attacks Sami James Saab, Craig E. Hampel 2019-08-13
10333699 Generating a pseudorandom number based on a portion of shares used in a cryptographic operation Elke De Mulder, Michael Hutter 2019-06-25
10262141 Secure processor with resistance to external monitoring attacks Paul C. Kocher, Joshua M. Jaffe 2019-04-16
9940463 System and method for secure authentication Paul C. Kocher, Joshua M. Jaffe 2018-04-10
9582674 Risk adaptive information flow based access control Pau-Chen Cheng, Claudia Keser, Josyula R. Rao 2017-02-28
9576133 Detection of data tampering of encrypted data Paul C. Kocher, Joshua M. Jaffe 2017-02-21
9569623 Secure boot with resistance to differential power analysis and other external monitoring attacks Paul C. Kocher, Joshua M. Jaffe 2017-02-14
9367693 Bitstream confirmation for configuration of a programmable logic device Paul C. Kocher, Joshua M. Jaffe 2016-06-14
8977864 Programmable logic device with resistance to external monitoring attacks Paul C. Kocher, Joshua M. Jaffe 2015-03-10
8707052 Cryptographic device with resistance to differential power analysis and other external monitoring attacks Paul C. Kocher, Joshua M. Jaffe 2014-04-22
8650623 Risk adaptive information flow based access control Pau-Chen Cheng, Claudia Keser, Josyula R. Rao 2014-02-11
8606724 Policy evolution with machine learning Pau-Chen Cheng, John Andrew Clark, Yow Tzu Lim 2013-12-10
8386800 Verifiable, leak-resistant encryption and decryption Paul C. Kocher, Joshua M. Jaffe 2013-02-26
8276192 System and method for security planning with hard security constraints Kay S. Anderson, Pau-Chen Cheng, Genady Grabarnik, Paul A. Karger, Marc Lelarge +4 more 2012-09-25