| 10565400 |
Implementation of an integrity-protected secure storage |
Nadarajah Asokan, Jan-Erik Ekberg |
2020-02-18 |
| 9660810 |
Method and apparatus for providing secret delegation |
Jan-Erik Ekberg |
2017-05-23 |
| 9171187 |
Implementation of an integrity-protected secure storage |
Nadarajah Asokan, Jan-Erik Ekberg |
2015-10-27 |
| 9111097 |
Secure execution architecture |
Antti Kiiveri |
2015-08-18 |
| 8495383 |
Method for the secure storing of program state data in an electronic device |
Jan-Erik Ekberg |
2013-07-23 |
| 8301911 |
Key storage administration |
Piotr Cofta |
2012-10-30 |
| 8028164 |
Practical and secure storage encryption |
— |
2011-09-27 |
| 7930537 |
Architecture for encrypted application installation |
— |
2011-04-19 |
| 7702907 |
System and method for safe booting electronic devices |
Antti Vaha-Sipila, Matti Parnanen |
2010-04-20 |
| 7500098 |
Secure mode controlled memory |
— |
2009-03-03 |
| 7418593 |
Method and a system for performing testing in a device, and a device |
Antti Kiiveri |
2008-08-26 |
| 7366905 |
Method and system for user generated keys and certificates |
— |
2008-04-29 |
| 7178041 |
Method, system and computer program product for a trusted counter in an external security element for securing a personal communication device |
Nadarajah Asokan, Jan-Erik Ekberg |
2007-02-13 |
| 7162525 |
Method and system for visualizing a level of trust of network communication operations and connection of servers |
Piotr Cofta |
2007-01-09 |
| 7107616 |
Method of producing a response |
— |
2006-09-12 |
| 7093198 |
Skins for mobile communication devices |
Christian Lindholm |
2006-08-15 |