Issued Patents All Time
Showing 25 most recent of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12124562 | Labeled security for control flow inside executable program code | Adam Jackson | 2024-10-22 |
| 11886574 | Using a trusted execution environment for a cryptographic key wrapping scheme that verifies remote device capabilities | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2024-01-30 |
| 11784809 | Constrained key derivation in temporal space | Nathaniel McCallum | 2023-10-10 |
| 11520878 | Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-12-06 |
| 11438150 | Constrained key derivation in linear space | Nathaniel McCallum | 2022-09-06 |
| 11436352 | Proof-of-work key wrapping for restricting data execution based on device capabilities | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-09-06 |
| 11424920 | Proof-of-work key wrapping for cryptographically controlling data access | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-08-23 |
| 11411728 | Proof-of-work key wrapping with individual key fragments | Michael Hingston McLaughlin Bursell, Nathaniel McCallum, John Strunk | 2022-08-09 |
| 11411938 | Proof-of-work key wrapping with integrated key fragments | Michael Hingston McLaughlin Bursell, Nathaniel McCallum, John Strunk | 2022-08-09 |
| 11387997 | Constrained key derivation in geographical space | Nathaniel McCallum | 2022-07-12 |
| 11329812 | Constrained key derivation in miscellaneous dimensions | Nathaniel McCallum | 2022-05-10 |
| 11316839 | Proof-of-work key wrapping for temporally restricting data access | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-04-26 |
| 11303437 | Proof-of-work key wrapping with key thresholding | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-04-12 |
| 11271734 | Proof-of-work key wrapping for verifying device capabilities | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-03-08 |
| 11263310 | Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities | Michael Hingston McLaughlin Bursell, Nathaniel McCallum | 2022-03-01 |
| 11250123 | Labeled security for control flow inside executable program code | Adam Jackson | 2022-02-15 |
| 10929149 | Method and system for updating firmware | Adam Jackson | 2021-02-23 |
| 10524131 | Thwarting range extension attacks | Nathaniel McCallum | 2019-12-31 |
| 9720808 | Offline debugging using a replicated operating environment | Christopher E. Lumens | 2017-08-01 |
| 9721101 | System wide root of trust chaining via signed applications | Adam Jackson | 2017-08-01 |
| 9639375 | Generation of language bindings for libraries using data from compiler generated debug information | — | 2017-05-02 |
| 9325506 | Cryptographically enforcing strict separation of environments | David Lawrence Cantrell, Jr. | 2016-04-26 |
| 8624900 | Plug-in architecture for dynamic font rendering enablement | Maureen Emily Duffy | 2014-01-07 |
| 8504817 | Mechanism for adjusting system settings based on dynamic discovery of power usage | Adam Jackson | 2013-08-06 |
| 6784363 | EMI shielding gasket construction | — | 2004-08-31 |