| 12112373 |
Secure and trustworthy crossing network for transferring assets outside of exchange |
Xander Dunn, Michael Edmond Kaplan, Bernard Wong, Emin Gun Sirer, David Wells +3 more |
2024-10-08 |
| 10922684 |
Mobile device security using wearable security tokens |
Gideon A. Yuval, Michael J. Sinclair |
2021-02-16 |
| 10855665 |
Simple protocol for tangible security |
Michael J. Sinclair, Josh Benaloh |
2020-12-01 |
| 10165441 |
Simple protocol for tangible security |
Michael J. Sinclair, Josh Benaloh |
2018-12-25 |
| 9805365 |
Mobile device security using wearable security tokens |
Gideon A. Yuval, Michael J. Sinclair |
2017-10-31 |
| 9503431 |
Simple protocol for tangible security |
Michael J. Sinclair, Josh Benaloh |
2016-11-22 |
| 9185109 |
Simple protocol for tangible security |
Michael J. Sinclair, Josh Benaloh |
2015-11-10 |
| 9135620 |
Mobile device security using wearable security tokens |
Gideon A. Yuval, Michael J. Sinclair |
2015-09-15 |
| 8146138 |
Access unit switching through physical mediation |
Marcus Peinado |
2012-03-27 |
| 8041338 |
Mobile wallet and digital payment |
Mohammed Moinuddin, Yacov Yacobi |
2011-10-18 |
| 7975117 |
Enforcing isolation among plural operating systems |
Marcus Peinado, Paul England, Bryan Willman, Andrew Thornton |
2011-07-05 |
| 7957532 |
Data protection for a mobile device |
Zicheng Liu, Mariusz H. Jakubowski, Yacov Yacobi |
2011-06-07 |
| 7900837 |
Optical fiber paper reader |
Michael J. Sinclair, Behrooz Chitsaz |
2011-03-08 |
| 7878398 |
Counterfeit and tamper resistant labels with randomly occurring features |
Darko Kirovski, Yacov Yacobi, Gideon A. Yuval |
2011-02-01 |
| 7818799 |
Tamper response mechanism |
Gang Tan |
2010-10-19 |
| 7664266 |
Compression of fiber-based certificate of authenticity data |
Mehmet Kivanc Mihcak, Darko Kirovski |
2010-02-16 |
| 7644440 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang |
2010-01-05 |
| 7631292 |
Code individualism and execution protection |
— |
2009-12-08 |
| 7620199 |
Input complexity adaptive quantization watermarking |
M. Kivanc Mihcak, Mariusz H. Jakubowski |
2009-11-17 |
| 7610623 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang |
2009-10-27 |
| 7497379 |
Counterfeit and tamper resistant labels with randomly occurring features |
Darko Kirovski, Yacov Yacobi, Gideon A. Yuval |
2009-03-03 |
| 7346780 |
Integrity ordainment and ascertainment of computer-executable instructions |
Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang |
2008-03-18 |
| 7254586 |
Secure and opaque type library providing secure data protection of variables |
Ramarathnam Venkatesan, Mariusz H. Jakubowski |
2007-08-07 |
| 7228426 |
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context |
Saurabh Sinha, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Matthew Cary, Ruoming Pang |
2007-06-05 |
| 6570623 |
Optical blending for multi-projector display wall systems |
Kai Li, Timothy Housel |
2003-05-27 |