Issued Patents All Time
Showing 25 most recent of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12386984 | Data privacy enhancing technique selection | — | 2025-08-12 |
| 12326946 | Privacy-preserving data and process analytics | Cedric Hebert | 2025-06-10 |
| 12047393 | Computer system attack detection | Cedric Hebert, Slim Trabelsi | 2024-07-23 |
| 11816546 | Fairness and output authenticity for secure distributed machine learning | — | 2023-11-14 |
| 11575500 | Encrypted protection system for a trained neural network | Jose Marquez, Patrick Duverger | 2023-02-07 |
| 11507883 | Fairness and output authenticity for secure distributed machine learning | — | 2022-11-22 |
| 11087025 | Differential privacy processing of IoT streaming data using generative adversarial networks | Anderson Santana de Oliveira, Lorenzo Frigerio | 2021-08-10 |
| 10491578 | Mitigation of offline ciphertext-only attacks | Cedric Hebert, Jose Marquez | 2019-11-26 |
| 10038674 | Secure mobile data sharing | Cedric Hebert | 2018-07-31 |
| 10027718 | Automated security design for internet of things systems | Jose Marquez, Cedric Hebert | 2018-07-17 |
| 9894090 | Penetration test attack tree generator | Cedric Hebert | 2018-02-13 |
| 9491198 | Obligation enforcement for resource access control | Slim Trabelsi | 2016-11-08 |
| 9083750 | Method and system for authentication by defining a demanded level of security | Ivonne Scherfenberg | 2015-07-14 |
| 9047490 | Method and a system for secure execution of workflow tasks in a distributed workflow management system within a decentralized network system | Frederic Montagut, Cedric Hebert, Cedric Ulmer | 2015-06-02 |
| 8819131 | Tracing of collaborative workflows | Cedric Hebert, Frederic Montagut, Henrik Plate, Cedric Ulmer | 2014-08-26 |
| 8775127 | Trustworthiness assessment of sensor data processing | Cedric Hebert, Alessandro Sorniotti, Cedric Ulmer | 2014-07-08 |
| 8687805 | Context-aware based cryptography | — | 2014-04-01 |
| 8548627 | Method and system for automatically organizing and achieving a pre-given task by means of robot functionalities | Cedric Ulmer, Frederic Montagut, Cedric Hebert, Konrad Wrona | 2013-10-01 |
| 8539599 | Password protection using personal information | Slim Trabelsi, Aymen Mouelhi | 2013-09-17 |
| 8490154 | Method and system for authentication by defining a demanded level of security | Ivonne Thomas | 2013-07-16 |
| 8473962 | Service selection for composite services | Cedric Hebert, Frederic Montagut, Cedric Ulmer | 2013-06-25 |
| 8156537 | Method and system for access control using resource filters | Annett Laube | 2012-04-10 |
| 7945044 | Method and system for performing an untraceable secret matching | Alessandro Sorniotti, Frederic Montagut, Annett Laube, Refik Molva, Konrad Wrona | 2011-05-17 |
| 7673141 | Client authentication using a challenge provider | Roger Kilian-Kehr, Jochen Haller, Cedric Hebert | 2010-03-02 |
| 7386785 | Automatic electronic timesheet filler | Cedric Ulmer, Pascal Spadone, Cedric Hebert, Maarten Rits | 2008-06-10 |