| 8374343 |
DES hardware throughput for short operations |
Mark Lindemann, Ronald Perez |
2013-02-12 |
| 7831040 |
DES hardware throughput for short operations |
Mark Lindemann, Ronald Perez |
2010-11-09 |
| 7362863 |
DES hardware throughput for short operations |
Mark Lindemann, Ronald Perez |
2008-04-22 |
| 7194759 |
Used trusted co-servers to enhance security of web interaction |
David M. Chess, Joan Dyer, Naomaru Itoi, Jeff Kenneth Kravitz, Elaine R. Palmer +1 more |
2007-03-20 |
| 7188258 |
Method and apparatus for producing duplication- and imitation-resistant identifying marks on objects, and duplication- and duplication- and imitation-resistant objects |
Gaurav Aggarwal, Nabil M. Amer, Vernon Ralph Austel, Pradeep Kumar Dubey, Ashutosh Kulshreshtha +6 more |
2007-03-06 |
| 6505773 |
Authenticated electronic coupon issuing and redemption |
Charles Campbell Palmer, Elaine R. Palmer |
2003-01-14 |
| 6505302 |
Authentication for secure devices with limited cryptography |
Stephen M. Matyas |
2003-01-07 |
| 6505301 |
Authentication for secure devices with limited cryptography |
Stephen M. Matyas |
2003-01-07 |
| 6304970 |
Hardware access control locking |
Mario Bizzaro, Vincenzo Condorelli, Michel H. T. Hack, Jeffrey Kravitz, Mark Lindemann +3 more |
2001-10-16 |
| 6243812 |
Authentication for secure devices with limited cryptography |
Stephen M. Matyas |
2001-06-05 |
| 6233685 |
Establishing and employing the provable untampered state of a device |
Steve Weingart |
2001-05-15 |
| 6219788 |
Watchdog for trusted electronic content distributions |
Robert Alan Flavin, Perwaiz Nihal, Ronald Perez |
2001-04-17 |
| 6167521 |
Securely downloading and executing code from mutually suspicious authorities |
Steve Weingart |
2000-12-26 |
| 6161180 |
Authentication for secure devices with limited cryptography |
Stephen M. Matyas |
2000-12-12 |