| 11139953 |
Methods and apparatus for secure and efficient implementation of block ciphers |
Xiaoyong Bai, Long Wen |
2021-10-05 |
| 10816950 |
Method, device and storage medium for evaluating physical potential of demand response for feeder line |
Ke Wang, Taiyou Yong, Jianguo Yao, Shengchun Yang, Yijun Yu +7 more |
2020-10-27 |
| 9230129 |
Software trusted computing base |
Haibo Chen, Jun Li, Jingcheng Zhang |
2016-01-05 |
| 9104863 |
Method and apparatus to harden a software execution in random access memory |
Ziye Yang |
2015-08-11 |
| 8732702 |
File system for storage area network |
Lei Chang, Ziye Yang, Ying He, Junping Du |
2014-05-20 |
| 8689000 |
Use of certified secrets in communication |
Liqun Chen, Caroline Belrose, Graeme John Proudler |
2014-04-01 |
| 8407092 |
Metering in a data processing system |
Liqun Chen |
2013-03-26 |
| 8176336 |
Software trusted computing base |
Haibo Chen, Jun Li, Jingcheng Zhang |
2012-05-08 |
| 6952476 |
Verification of the private components of a public-key cryptographic system |
— |
2005-10-04 |
| 6912535 |
System and method for automatically registering articles on a database via networks |
— |
2005-06-28 |
| 6836843 |
Access control through secure channel using personal identification system |
Gadiel Seroussi, Kenneth Graham Paterson, Mark Smith |
2004-12-28 |
| 6438691 |
Transmitting messages over a network |
— |
2002-08-20 |
| 6119227 |
Methods and apparatus for authenticating an originator of a message |
— |
2000-09-12 |