| 12395327 |
Techniques for user account and data recovery |
Gokul P. Thirumalai, Alexandre Aybes, Dmitry Belov, Kalyan C. Gopavarapu, Sudhakar N. Mambakkam +7 more |
2025-08-19 |
| 11611541 |
Secure method to replicate on-premise secrets in a cloud environment |
Feng Huang |
2023-03-21 |
| 11544356 |
Systems and methods for dynamic flexible authentication in a cloud service |
Feng Huang |
2023-01-03 |
| 11258780 |
Securing a data connection for communicating between two end-points |
Julien Brouchier, Andrew David Cooper, Richard James Cooper, Ian Paul Wright, Christopher Morgan Mayers |
2022-02-22 |
| 11231878 |
Content modification control |
Brendan James Moran |
2022-01-25 |
| 10523658 |
Securing a data connection for communicating between two end-points |
Julien Brouchier, Andrew David Cooper, Richard James Cooper, Ian Paul Wright, Christopher Morgan Mayers |
2019-12-31 |
| 8490805 |
Method and machine for making a stopper for the neck of a container, and stopper as produced by this method |
Michel Luzzato, Jerome Mezerette, Fabien Flamand |
2013-07-23 |
| 8464328 |
Method for protecting personal data read in a terminal station by a server |
Pierre Girard |
2013-06-11 |
| 8280053 |
Authentication in a radiotelephony network |
Nathalie Boulet |
2012-10-02 |
| 7725942 |
Method for loading and customizing data and programmes loaded in a smart card |
— |
2010-05-25 |
| 7681029 |
Method and device for controlling a portable object life cycle, in particular a smart card |
Marc Birkner, Laurent Talvard |
2010-03-16 |
| 7434049 |
Method for making secure a session with data processing means under the control of several entities |
Pierre Girard |
2008-10-07 |
| 7434250 |
Dynamic management of access rights lists in a portable electronic object |
Pierre Girard |
2008-10-07 |
| 7360247 |
Method for protection against fraudulent modification of data sent to a secure electronic medium |
Pierre Girard |
2008-04-15 |
| 5463120 |
Method for the crystallization of methionine |
Daniel LeClaire |
1995-10-31 |