| 12261955 |
System and computer program product for fair, secure n-party computation using at least one blockchain |
Ranjit Kumaresan, Srinivasan Raghuraman |
2025-03-25 |
| 12256009 |
Method, system, and computer program product for network bound proxy re-encryption and PIN translation |
Sivanarayana Gaddam, Gaven James Watson, Pratyay Mukherjee |
2025-03-18 |
| 12126725 |
Method, system, and computer program product for network bound proxy re-encryption and PIN translation |
Sivanarayana Gaddam, Atul Luykx, Gaven James Watson |
2024-10-22 |
| 12081677 |
System, method, and computer program product for secure real-time N-party computation |
Ranjit Kumaresan, Sivanarayana Gaddam, Mihai Christodorescu, Srinivasan Raghuraman |
2024-09-03 |
| 11995085 |
System, method, and computer program product for efficiently storing multi-threaded log data |
Shashwat Mishra |
2024-05-28 |
| 11921884 |
Techniques for preventing collusion using simultaneous key release |
Sivanarayana Gaddam, Ranjit Kumaresan |
2024-03-05 |
| 11848914 |
High-throughput data integrity via trusted computing |
Mihai Christodorescu |
2023-12-19 |
| 11811933 |
System and method for fair, secure n-party computation using at least one blockchain |
Ranjit Kumaresan, Srinivasan Raghuraman |
2023-11-07 |
| 11784826 |
System, method, and computer program product for secure real-time n-party computation |
Ranjit Kumaresan, Sivanarayana Gaddam, Mihai Christodorescu, Srinivasan Raghuraman |
2023-10-10 |
| 11757644 |
Method, system, and computer program product for network bound proxy re-encryption and PIN translation |
Sivanarayana Gaddam, Gaven James Watson, Atul Luykx |
2023-09-12 |
| 11736295 |
Method, system, and computer program product for network bound proxy re-encryption and PIN translation |
Sivanarayana Gaddam, Gaven James Watson, Pratyay Mukherjee |
2023-08-22 |
| 11729231 |
Secure multi-party random bit generation |
Ranjit Kumaresan, Sivanarayana Gaddam |
2023-08-15 |
| 11716200 |
Techniques for performing secure operations |
Sivanarayana Gaddam, Atul Luykx, Hao Yang |
2023-08-01 |
| 11502837 |
Techniques for performing secure operations |
Sivanarayana Gaddam, Atul Luykx, Hao Yang |
2022-11-15 |
| 11488152 |
Method, system, and computer program product for network bound proxy re-encryption and pin translation |
Sivanarayana Gaddam, Gaven James Watson, Atul Luykx |
2022-11-01 |
| 11379384 |
Oblivious filtering of data streams |
Abhinav Aggarwal, Mihai Christodorescu |
2022-07-05 |
| 11140134 |
High-throughput data integrity via trusted computing |
Mihai Christodorescu |
2021-10-05 |
| 11134112 |
Secure multi-party random bit generation |
Ranjit Kumaresan, Sivanarayana Gaddam |
2021-09-28 |
| 10430568 |
Device security utilizing continually changing QR codes |
Shyam Narayan, Naveen Aerrabotu |
2019-10-01 |
| 9967911 |
Device auto pairing without touch and tap |
Naveen Aerrabotu |
2018-05-08 |
| 9794253 |
Device security utilizing continually changing QR codes |
Shyam Narayan, Naveen Aerrabotu |
2017-10-17 |
| 9451649 |
Device auto pairing without touch and tap |
Naveen Aerrabotu |
2016-09-20 |
| 9159013 |
Mobile device with RFID capability and corresponding boot sequence |
Hong Zhao, Naveen Aerrabotu |
2015-10-13 |
| 9100943 |
Device auto pairing without touch and tap |
Naveen Aerrabotu |
2015-08-04 |
| 9066326 |
Automatic user notification, with quick response (QR) code generation following failed NFC device pairing |
Shyam Narayan, Naveen Aerrabotu |
2015-06-23 |