Issued Patents All Time
Showing 51–75 of 103 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9143944 | Secure peer-to-peer network setup | Michelle X. Gong, Roy Want, Horst W. Haussecker | 2015-09-22 |
| 9118639 | Trusted data processing in the public cloud | Vinay Phegade, Nilesh Jain | 2015-08-25 |
| 9049592 | Techniques for key derivation for secure communication in wireless mesh networks | Meiyuan Zhao | 2015-06-02 |
| 9003236 | System and method for correct execution of software based on baseline and real time information | David W. Grawrock, Yuriy Bulygin, Kirk D. Brannock, Matthew King | 2015-04-07 |
| 8955039 | Mobile platform with sensor data security | Gyan Prakash, Saurabh Dadu | 2015-02-10 |
| 8930580 | Network access control for many-core systems | Ned M. Smith, Kapil Sood | 2015-01-06 |
| 8903084 | Efficient key derivation for end-to-end network security with traffic visibility | Men Long, Karanvir S. Grewal | 2014-12-02 |
| 8855302 | Apparatus and method for Skein hashing | Farhana Sheikh, Sanu K. Mathew, Ram Krishnamurthy | 2014-10-07 |
| 8850204 | Multi-band/multi-link secure key generation and delivery protocol | Robert J. Stacey, Emily H. Qi | 2014-09-30 |
| 8812704 | Method, apparatus and system for platform identity binding in a network node | Kapil Sood | 2014-08-19 |
| 8799656 | Methods for anonymous authentication and key agreement | Ernest Brickell, Jiangtao Li | 2014-08-05 |
| 8755785 | Collaborative image control | Michelle X. Gong, Roy Want, Horst W. Haussecker, Sai P. Balasundaram | 2014-06-17 |
| 8707046 | Method of anonymous entity authentication using group-based anonymous signatures | Jiangtao Li | 2014-04-22 |
| 8630416 | Wireless device and method for rekeying with reduced packet loss for high-throughput wireless communications | Emily H. Qi, Robert J. Stacey, Herbert Liondas, Marc Jalfon | 2014-01-14 |
| 8489660 | Digital random number generator using partially entropic data | Howard C. Herbert, George W. Cox, Shay Gueron, Charles E. Dike, Stephen A. Fischer +7 more | 2013-07-16 |
| 8467527 | Efficient key derivation for end-to-end network security with traffic visibility | Men Long, Karanvir S. Grewal | 2013-06-18 |
| 8429404 | Method and system for secure communications on a managed network | Benjamin M. Greenstein | 2013-04-23 |
| 8345712 | Method, apparatus and system for maintaining mobility resistant IP tunnels using a mobile router | Kapil Sood, Tsung-Yuan C. Tai | 2013-01-01 |
| 8300599 | Apparatus, system and method capable of pre-allocating and communicating IP address information during wireless communication | Kapil Sood, Emily H. Qi | 2012-10-30 |
| 8281387 | Method and apparatus for supporting a virtual private network architecture on a partitioned platform | Ajay Gupta, Jeong-Hyon Yoon, Kapil Sood, Karanvir S. Grewal, Hormuzd M. Khosravi | 2012-10-02 |
| 8203984 | Power management for wireless networks | Xiaohong Gong | 2012-06-19 |
| 8180923 | Network access control for many-core systems | Ned M. Smith, Kapil Sood | 2012-05-15 |
| 8146142 | Device introduction and access control framework | Victor B. Lortz, Shriharsha Hegde, Amol Arvind Kulkarni, Tsung-Yuan C. Tai | 2012-03-27 |
| 8121146 | Method, apparatus and system for maintaining mobility resistant IP tunnels using a mobile router | Kapil Sood, Tsung-Yuan C. Tai | 2012-02-21 |
| 8099495 | Method, apparatus and system for platform identity binding in a network node | Kapil Sood | 2012-01-17 |