|
US7581103B2
(en)
*
|
2001-06-13 |
2009-08-25 |
Intertrust Technologies Corporation |
Software self-checking systems and methods
|
|
GB2405958A
(en)
*
|
2003-08-20 |
2005-03-16 |
Macrovision Europ Ltd |
Code obfuscation and controlling a processor by emulation
|
|
US8752032B2
(en)
|
2007-02-23 |
2014-06-10 |
Irdeto Canada Corporation |
System and method of interlocking to protect software-mediated program and device behaviours
|
|
US8358703B2
(en)
|
2007-03-23 |
2013-01-22 |
Thomson Licensing |
Modifying a coded bitstream
|
|
US8588459B2
(en)
*
|
2007-06-14 |
2013-11-19 |
Thomson Licensing |
Modifying a coded bitstream
|
|
CN101911153B
(zh)
*
|
2008-01-21 |
2014-08-20 |
日本电信电话株式会社 |
秘密计算系统、秘密计算方法、秘密计算装置
|
|
US7890480B2
(en)
*
|
2008-02-11 |
2011-02-15 |
International Business Machines Corporation |
Processing of deterministic user-defined functions using multiple corresponding hash tables
|
|
US9081962B2
(en)
*
|
2008-04-30 |
2015-07-14 |
Graeme Harkness |
Anti-tamper techniques
|
|
US8800048B2
(en)
*
|
2008-05-20 |
2014-08-05 |
Microsoft Corporation |
Software protection through interdependent parameter cloud constrained software execution
|
|
US8429637B2
(en)
*
|
2008-09-02 |
2013-04-23 |
Apple Inc. |
System and method for conditional expansion obfuscation
|
|
US8020125B1
(en)
*
|
2008-09-10 |
2011-09-13 |
Cadence Design Systems, Inc. |
System, methods and apparatus for generation of simulation stimulus
|
|
US20100218037A1
(en)
*
|
2008-09-16 |
2010-08-26 |
File System Labs Llc |
Matrix-based Error Correction and Erasure Code Methods and Apparatus and Applications Thereof
|
|
US8484630B2
(en)
*
|
2008-12-23 |
2013-07-09 |
International Business Machines Corporation |
Code motion based on live ranges in an optimizing compiler
|
|
FR2942559B1
(fr)
*
|
2009-02-24 |
2016-05-20 |
European Aeronautic Defence And Space Company - Eads France |
Procede de protection du code source d'un programme d'ordinateur.
|
|
CN102449951B
(zh)
*
|
2009-03-31 |
2015-09-23 |
皇家飞利浦有限公司 |
用于在电子组件中执行密码任务的方法
|
|
CN102483790B
(zh)
*
|
2009-05-06 |
2016-01-20 |
爱迪德技术有限公司 |
利用白盒密码术的联锁二进制保护
|
|
US20100329448A1
(en)
*
|
2009-06-30 |
2010-12-30 |
Rane Shantanu D |
Method for Secure Evaluation of a Function Applied to Encrypted Signals
|
|
US8433925B2
(en)
*
|
2009-09-04 |
2013-04-30 |
Gradiant |
Cryptographic system for performing secure computations and signal processing directly on encrypted data in untrusted environments
|
|
US8972742B2
(en)
|
2009-09-04 |
2015-03-03 |
Gradiant |
System for secure image recognition
|
|
US8843762B2
(en)
*
|
2009-09-04 |
2014-09-23 |
Gradiant, Centro Tecnolóxico de Telecomunicacións de Galicia |
Cryptographic system for performing secure iterative computations and signal processing directly on encrypted data in untrusted environments
|
|
US8752029B2
(en)
*
|
2009-09-29 |
2014-06-10 |
Microsoft Corporation |
Computing a symbolic bound for a procedure
|
|
US9134977B2
(en)
*
|
2010-02-26 |
2015-09-15 |
Red Hat, Inc. |
Compiler operation for handling conditional statements
|
|
CN102939608A
(zh)
*
|
2010-03-25 |
2013-02-20 |
埃德图加拿大公司 |
抗边通道和重复调用攻击的动态、可变定时操作路径的系统和方法
|
|
EP2477110A1
(en)
*
|
2011-01-14 |
2012-07-18 |
Wibu-Systems AG |
Method for protecting an application program against reverse engineering and related computer program product
|
|
US8707053B2
(en)
*
|
2011-02-09 |
2014-04-22 |
Apple Inc. |
Performing boolean logic operations using arithmetic operations by code obfuscation
|
|
WO2012161763A1
(en)
*
|
2011-02-15 |
2012-11-29 |
Lewis James M |
Method and system for identifying counterfeit programmable devices
|
|
US8837715B2
(en)
|
2011-02-17 |
2014-09-16 |
Gradiant, Centro Tecnolóxico de Telecomunicacións de Galica |
Method and apparatus for secure iterative processing and adaptive filtering
|
|
JP2012173870A
(ja)
*
|
2011-02-18 |
2012-09-10 |
Toshiba Corp |
半導体装置及びメモリ保護方法
|
|
US8752027B2
(en)
*
|
2011-09-14 |
2014-06-10 |
Microsoft Corporation |
Injecting faults into program for testing software
|
|
US20130097431A1
(en)
*
|
2011-10-18 |
2013-04-18 |
Paul Marion Hriljac |
Systems and methods of source software code modification
|
|
EP2586959B2
(de)
*
|
2011-10-28 |
2016-09-14 |
Cedes AG |
Sicherungsvorrichtung, Schließvorrichtung und Auswerteeinheit
|
|
US9698973B2
(en)
|
2012-03-30 |
2017-07-04 |
Irdeto B.V. |
Securing accessible systems using dynamic data mangling
|
|
US8976960B2
(en)
|
2012-04-02 |
2015-03-10 |
Apple Inc. |
Methods and apparatus for correlation protected processing of cryptographic operations
|
|
US9015681B1
(en)
|
2012-08-10 |
2015-04-21 |
The Mathworks, Inc. |
Creating and using array creation routines or a family of routines separate from algorithmic code
|
|
US9146750B2
(en)
|
2012-08-10 |
2015-09-29 |
The Mathworks, Inc. |
Mechanism for replacing an array creation routine within code
|
|
US9244667B2
(en)
|
2012-08-10 |
2016-01-26 |
The Mathworks, Inc. |
Mechanism for transforming between type-independent and type-specific code
|
|
WO2014046974A2
(en)
|
2012-09-20 |
2014-03-27 |
Case Paul Sr |
Case secure computer architecture
|
|
WO2014051459A1
(en)
|
2012-09-28 |
2014-04-03 |
Intel Corporation |
Loop vectorization methods and apparatus
|
|
US9336370B2
(en)
|
2012-12-06 |
2016-05-10 |
Apple Inc. |
Method and apparatus for dynamic obfuscation of static data
|
|
US9262639B2
(en)
|
2013-01-09 |
2016-02-16 |
Cisco Technology Inc. |
Plaintext injection attack protection
|
|
EP2947642B1
(en)
*
|
2013-01-17 |
2017-09-06 |
Nippon Telegraph and Telephone Corporation |
Secret computation system, arithmetic unit, secret computation method and program
|
|
CN104919754B
(zh)
*
|
2013-01-17 |
2018-01-16 |
日本电信电话株式会社 |
篡改检测装置、篡改检测方法、以及程序
|
|
IL224743A0
(en)
|
2013-02-14 |
2013-06-27 |
Harel Cain |
A system for automatic obfuscation of computer programs
|
|
US11044076B2
(en)
*
|
2013-02-25 |
2021-06-22 |
Hecusys, LLC |
Encrypted data processing
|
|
US9721120B2
(en)
*
|
2013-05-14 |
2017-08-01 |
Apple Inc. |
Preventing unauthorized calls to a protected function
|
|
CN104182661A
(zh)
*
|
2013-05-24 |
2014-12-03 |
富泰华工业(深圳)有限公司 |
软件保护系统
|
|
US8881293B1
(en)
*
|
2013-07-01 |
2014-11-04 |
Sap Se |
Static application security testing
|
|
KR101328012B1
(ko)
*
|
2013-08-12 |
2013-11-13 |
숭실대학교산학협력단 |
애플리케이션 코드 난독화 장치 및 그 방법
|
|
US9021606B1
(en)
*
|
2013-09-27 |
2015-04-28 |
Amazon Technologies, Inc. |
Systems and methods providing format data
|
|
US9361379B1
(en)
|
2013-09-27 |
2016-06-07 |
Amazon Technologies, Inc. |
Systems and methods providing recommendation data
|
|
US9218437B1
(en)
*
|
2013-09-27 |
2015-12-22 |
Amazon Technologies, Inc. |
Systems and methods providing event data
|
|
JP6046870B1
(ja)
*
|
2013-12-05 |
2016-12-21 |
コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. |
テーブルネットワークの繰り返し適用のための計算装置
|
|
GB201400992D0
(en)
*
|
2014-01-21 |
2014-03-05 |
Metaforic Ltd |
Method of protecting dynamic cryptographic keys
|
|
CN103793248B
(zh)
*
|
2014-01-23 |
2017-02-01 |
北京奇虎科技有限公司 |
一种应用程序升级的方法及装置
|
|
EP2913772A1
(de)
*
|
2014-02-28 |
2015-09-02 |
Wibu-Systems AG |
Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung
|
|
US9425952B2
(en)
*
|
2014-03-27 |
2016-08-23 |
Samsung Israel Research Corporation |
Algebraic manipulation detection codes from algebraic curves
|
|
EP3127269B1
(en)
*
|
2014-03-31 |
2018-07-11 |
Irdeto B.V. |
Protecting an item of software
|
|
GB201405754D0
(en)
|
2014-03-31 |
2014-05-14 |
Irdeto Bv |
Protecting an item of software comprising conditional code
|
|
US9858440B1
(en)
*
|
2014-05-23 |
2018-01-02 |
Shape Security, Inc. |
Encoding of sensitive data
|
|
FR3024007B1
(fr)
*
|
2014-07-16 |
2016-08-26 |
Viaccess Sa |
Procede d'acces a un contenu multimedia protege par un terminal
|
|
EP2983156B1
(fr)
*
|
2014-08-06 |
2019-07-24 |
Secure-IC SAS |
Système et procédé de protection de circuit
|
|
US9824214B2
(en)
*
|
2014-08-15 |
2017-11-21 |
Securisea, Inc. |
High performance software vulnerabilities detection system and methods
|
|
US9454659B1
(en)
*
|
2014-08-15 |
2016-09-27 |
Securisea, Inc. |
Software vulnerabilities detection system and methods
|
|
US10599852B2
(en)
|
2014-08-15 |
2020-03-24 |
Securisea, Inc. |
High performance software vulnerabilities detection system and methods
|
|
SG10201405852QA
(en)
|
2014-09-18 |
2016-04-28 |
Huawei Internat Pte Ltd |
Encryption function and decryption function generating method, encryption and decryption method and related apparatuses
|
|
US10496372B2
(en)
|
2014-09-30 |
2019-12-03 |
Koninklijke Philips N.V. |
Electronic calculating device for performing obfuscated arithmetic
|
|
RU2710310C2
(ru)
|
2014-12-12 |
2019-12-25 |
Конинклейке Филипс Н.В. |
Электронное устройство формирования
|
|
CN107005403A
(zh)
*
|
2014-12-22 |
2017-08-01 |
皇家飞利浦有限公司 |
电子计算设备
|
|
CN107580765B
(zh)
*
|
2015-01-27 |
2021-10-26 |
艾锐势有限责任公司 |
用于保护流媒体和其它数据流的混淆
|
|
US20160328539A1
(en)
*
|
2015-05-05 |
2016-11-10 |
Nxp B.V. |
Obscuring Software Code With Split Variables
|
|
US10068070B2
(en)
*
|
2015-05-05 |
2018-09-04 |
Nxp B.V. |
White-box elliptic curve point multiplication
|
|
US9712472B2
(en)
|
2015-07-02 |
2017-07-18 |
Microsoft Technology Licensing, Llc |
Application spawning responsive to communication
|
|
US9785484B2
(en)
|
2015-07-02 |
2017-10-10 |
Microsoft Technology Licensing, Llc |
Distributed application interfacing across different hardware
|
|
US9733915B2
(en)
|
2015-07-02 |
2017-08-15 |
Microsoft Technology Licensing, Llc |
Building of compound application chain applications
|
|
US9733993B2
(en)
|
2015-07-02 |
2017-08-15 |
Microsoft Technology Licensing, Llc |
Application sharing using endpoint interface entities
|
|
US10198252B2
(en)
|
2015-07-02 |
2019-02-05 |
Microsoft Technology Licensing, Llc |
Transformation chain application splitting
|
|
US9658836B2
(en)
*
|
2015-07-02 |
2017-05-23 |
Microsoft Technology Licensing, Llc |
Automated generation of transformation chain compatible class
|
|
US9860145B2
(en)
|
2015-07-02 |
2018-01-02 |
Microsoft Technology Licensing, Llc |
Recording of inter-application data flow
|
|
US10261985B2
(en)
|
2015-07-02 |
2019-04-16 |
Microsoft Technology Licensing, Llc |
Output rendering in dynamic redefining application
|
|
US9626181B2
(en)
*
|
2015-07-06 |
2017-04-18 |
Dell Products L.P. |
Systems and methods to securely inject binary images and code into firmware
|
|
US10198405B2
(en)
|
2015-07-08 |
2019-02-05 |
Microsoft Technology Licensing, Llc |
Rule-based layout of changing information
|
|
US10031724B2
(en)
|
2015-07-08 |
2018-07-24 |
Microsoft Technology Licensing, Llc |
Application operation responsive to object spatial status
|
|
US10277582B2
(en)
|
2015-08-27 |
2019-04-30 |
Microsoft Technology Licensing, Llc |
Application service architecture
|
|
US9946853B1
(en)
*
|
2015-09-17 |
2018-04-17 |
Symantec Corporation |
Techniques for application code obfuscation
|
|
FR3047373B1
(fr)
*
|
2016-01-28 |
2018-01-05 |
Morpho |
Procede de calcul securise multipartite protege contre une partie malveillante
|
|
EP3217307B1
(en)
*
|
2016-02-22 |
2018-11-07 |
Eshard |
Method of testing the resistance of a circuit to a side channel analysis of second order or more
|
|
US10235218B2
(en)
|
2016-05-03 |
2019-03-19 |
International Business Machines Corporation |
Automatic correction of cryptographic application program interfaces
|
|
US10243937B2
(en)
*
|
2016-07-08 |
2019-03-26 |
Nxp B.V. |
Equality check implemented with secret sharing
|
|
US9760349B1
(en)
*
|
2016-11-09 |
2017-09-12 |
Red Hat, Inc. |
Managing different software dependencies associated with source code
|
|
EP3555785A1
(en)
|
2016-12-15 |
2019-10-23 |
Irdeto B.V. |
Software integrity verification
|
|
WO2018120233A1
(zh)
*
|
2016-12-30 |
2018-07-05 |
华为技术有限公司 |
一种事务处理方法及装置
|
|
US11934945B2
(en)
|
2017-02-23 |
2024-03-19 |
Cerebras Systems Inc. |
Accelerated deep learning
|
|
CN106934260B
(zh)
*
|
2017-03-14 |
2020-03-17 |
北京深思数盾科技股份有限公司 |
代码保护方法、装置、服务器及存储介质
|
|
EP3385735B1
(en)
|
2017-04-04 |
2019-12-04 |
Secure-IC SAS |
Device and method for detecting points of failures
|
|
WO2018189728A1
(en)
|
2017-04-14 |
2018-10-18 |
Cerebras Systems Inc. |
Floating-point unit stochastic rounding for accelerated deep learning
|
|
US11488004B2
(en)
|
2017-04-17 |
2022-11-01 |
Cerebras Systems Inc. |
Neuron smearing for accelerated deep learning
|
|
CA3060969C
(en)
|
2017-04-17 |
2020-12-29 |
Cerebras Systems Inc. |
Neuron smearing for accelerated deep learning
|
|
WO2018193380A1
(en)
|
2017-04-17 |
2018-10-25 |
Cerebras Systems Inc. |
Fabric vectors for deep learning acceleration
|
|
CN108809619B
(zh)
*
|
2017-04-27 |
2022-11-29 |
郑珂威 |
用于完全同态加密的精度控制及累计误差消除方法
|
|
CN107194212B
(zh)
*
|
2017-06-21 |
2020-04-17 |
株洲中车时代电气股份有限公司 |
一种显示器源代码中协议内容的保护方法
|
|
US10097538B1
(en)
*
|
2017-08-12 |
2018-10-09 |
Growpath, Inc. |
User authentication systems and methods
|
|
US10489585B2
(en)
|
2017-08-29 |
2019-11-26 |
Red Hat, Inc. |
Generation of a random value for a child process
|
|
CN109697451B
(zh)
*
|
2017-10-23 |
2022-01-07 |
北京京东尚科信息技术有限公司 |
相似图像聚类方法及装置、存储介质、电子设备
|
|
EP3534253A1
(en)
*
|
2018-02-28 |
2019-09-04 |
Koninklijke Philips N.V. |
Compiling device and method
|
|
US10810077B1
(en)
*
|
2018-06-11 |
2020-10-20 |
Ambarella International Lp |
Rapid soft-error detection
|
|
EP3591550A1
(en)
|
2018-07-06 |
2020-01-08 |
Koninklijke Philips N.V. |
A compiler device with masking function
|
|
US10521613B1
(en)
|
2018-08-08 |
2019-12-31 |
Carlos Manuel Gonzalez |
Adaptive standalone secure software
|
|
US10762179B2
(en)
|
2018-08-08 |
2020-09-01 |
Irdeto B.V. |
System and method for watermarking software
|
|
WO2020044208A1
(en)
*
|
2018-08-29 |
2020-03-05 |
Cerebras Systems Inc. |
Isa enhancements for accelerated deep learning
|
|
US20200104127A1
(en)
*
|
2018-09-28 |
2020-04-02 |
Carnegie Mellon University |
Coded computation strategies for distributed matrix-matrix and matrix-vector products
|
|
US11822704B2
(en)
*
|
2018-10-29 |
2023-11-21 |
Cryptography Research, Inc. |
Constant time secure arithmetic-to-Boolean mask conversion
|
|
US11764940B2
(en)
|
2019-01-10 |
2023-09-19 |
Duality Technologies, Inc. |
Secure search of secret data in a semi-trusted environment using homomorphic encryption
|
|
US11269762B2
(en)
*
|
2019-03-25 |
2022-03-08 |
Aurora Labs Ltd. |
Using line-of-code behavior and relation models to anticipate impact of hardware changes
|
|
US11263316B2
(en)
*
|
2019-08-20 |
2022-03-01 |
Irdeto B.V. |
Securing software routines
|
|
US12177133B2
(en)
|
2019-10-16 |
2024-12-24 |
Cerebras Systems Inc. |
Dynamic routing for accelerated deep learning
|
|
US12169771B2
(en)
|
2019-10-16 |
2024-12-17 |
Cerebras Systems Inc. |
Basic wavelet filtering for accelerated deep learning
|
|
US11574045B2
(en)
|
2019-12-10 |
2023-02-07 |
Winkk, Inc. |
Automated ID proofing using a random multitude of real-time behavioral biometric samplings
|
|
US12388799B1
(en)
|
2019-12-13 |
2025-08-12 |
Selfiie Corporation |
Systems and methods for providing a split inference approach to protect data and model
|
|
US11531782B1
(en)
*
|
2022-05-13 |
2022-12-20 |
TripleBlind, Inc. |
Systems and methods for finding a value in a combined list of private values
|
|
US12088565B2
(en)
|
2019-12-13 |
2024-09-10 |
Triplelind Holdings, Inc. |
Systems and methods for privacy preserving training and inference of decentralized recommendation systems from decentralized data
|
|
US11599671B1
(en)
|
2019-12-13 |
2023-03-07 |
TripleBlind, Inc. |
Systems and methods for finding a value in a combined list of private values
|
|
US12149510B1
(en)
|
2019-12-13 |
2024-11-19 |
Tripleblind Holdings, Inc. |
Systems and methods for providing a private multi-modal artificial intelligence platform
|
|
CN111176610B
(zh)
*
|
2019-12-27 |
2022-03-25 |
北京百度网讯科技有限公司 |
量子随机数生成方法、装置、电子设备及存储介质
|
|
US12099997B1
(en)
|
2020-01-31 |
2024-09-24 |
Steven Mark Hoffberg |
Tokenized fungible liabilities
|
|
US11188316B2
(en)
*
|
2020-03-09 |
2021-11-30 |
International Business Machines Corporation |
Performance optimization of class instance comparisons
|
|
US11204985B2
(en)
*
|
2020-03-31 |
2021-12-21 |
Irdeto Canada Corporation |
Systems, methods, and storage media for creating secured computer code having entangled transformations
|
|
US11669613B2
(en)
*
|
2020-05-29 |
2023-06-06 |
EnSoft Corp. |
Method for analyzing and verifying software for safety and security
|
|
KR102803025B1
(ko)
*
|
2020-06-11 |
2025-05-07 |
라인플러스 주식회사 |
클래스 분산 및 순차적 메모리 적재를 이용한 파일 보호 방법 및 시스템
|
|
US11347500B2
(en)
|
2020-06-17 |
2022-05-31 |
Bank Of America Corporation |
Software code converter for resolving conflicts during code development
|
|
US11573775B2
(en)
|
2020-06-17 |
2023-02-07 |
Bank Of America Corporation |
Software code converter for resolving redundancy during code development
|
|
US11782685B2
(en)
|
2020-06-17 |
2023-10-10 |
Bank Of America Corporation |
Software code vectorization converter
|
|
CN111881462A
(zh)
*
|
2020-07-17 |
2020-11-03 |
张睿 |
一种商用密码应用加密有效性的在线分析技术
|
|
US11621837B2
(en)
|
2020-09-03 |
2023-04-04 |
Theon Technology Llc |
Secure encryption of data using partial-key cryptography
|
|
US11310042B2
(en)
|
2020-09-11 |
2022-04-19 |
Crown Sterling Limited, LLC |
Methods of storing and distributing large keys
|
|
US11528136B2
(en)
|
2020-11-24 |
2022-12-13 |
Crown Sterling Limited, LLC |
Decryption of encrypted data missing a private key
|
|
EP4033381A1
(en)
*
|
2021-01-25 |
2022-07-27 |
Thales Dis Cpl Usa, Inc. |
Software obfuscation method using an opaque predicate based on multiplying mixed boolean-arithmetic expressions
|
|
US11687440B2
(en)
*
|
2021-02-02 |
2023-06-27 |
Thales Dis Cpl Usa, Inc. |
Method and device of protecting a first software application to generate a protected software application
|
|
US11438314B2
(en)
*
|
2021-02-10 |
2022-09-06 |
Yahoo Assets Llc |
Automatic privacy-aware machine learning method and apparatus
|
|
CN113158184B
(zh)
*
|
2021-03-03 |
2023-05-19 |
中国人民解放军战略支援部队信息工程大学 |
基于有限状态自动机的攻击脚本生成方法及相关装置
|
|
US12190131B2
(en)
*
|
2021-03-25 |
2025-01-07 |
Tata Consultancy Services Limited |
Method and system for function call and variable access based relaxed backward slicing
|
|
CN113014439B
(zh)
*
|
2021-04-19 |
2021-10-26 |
广州大一互联网络科技有限公司 |
一种数据中心带宽的虚拟弹性管理方法
|
|
CN113268455B
(zh)
*
|
2021-04-26 |
2022-07-26 |
卡斯柯信号(成都)有限公司 |
基于布尔逻辑的联锁数据自动配置方法及系统
|
|
WO2023287437A1
(en)
*
|
2021-07-16 |
2023-01-19 |
Lattice Semiconductor Corporation |
Communication systems and methods
|
|
CN113626841B
(zh)
*
|
2021-08-10 |
2024-10-29 |
萨思数字科技(北京)有限公司 |
基于多方安全计算的选择问题处理方法
|
|
US11755772B2
(en)
|
2021-09-20 |
2023-09-12 |
Crown Sterling Limited, LLC |
Securing data in a blockchain with a one-time pad
|
|
WO2023081222A1
(en)
*
|
2021-11-03 |
2023-05-11 |
Arris Enterprises Llc |
White-box processing for encoding with large integer values
|
|
US11791988B2
(en)
|
2021-11-22 |
2023-10-17 |
Theon Technology Llc |
Use of random entropy in cryptography
|
|
US11943336B2
(en)
|
2021-11-22 |
2024-03-26 |
Theon Technology Llc |
Use of gradient decent function in cryptography
|
|
US11902420B2
(en)
|
2021-11-23 |
2024-02-13 |
Theon Technology Llc |
Partial cryptographic key transport using one-time pad encryption
|
|
US11762762B1
(en)
*
|
2022-03-24 |
2023-09-19 |
Xilinx, Inc. |
Static and automatic inference of inter-basic block burst transfers for high-level synthesis
|
|
US12395353B2
(en)
|
2022-09-21 |
2025-08-19 |
Winkk, Inc. |
Authentication process with an exposed and unregistered public certificate
|
|
US12261952B2
(en)
|
2022-11-04 |
2025-03-25 |
Crown Sterling Limited, LLC |
Multiple vector one-time key pad
|
|
US12488166B2
(en)
|
2022-11-28 |
2025-12-02 |
Xilinx, Inc. |
Implementing burst transfers for predicated memory accesses in loop bodies for high-level synthesis
|
|
US12250310B2
(en)
|
2023-01-09 |
2025-03-11 |
Crown Sterling Limited, LLC |
Use of irrational numbers in elliptic curve cryptography
|
|
US12210644B2
(en)
*
|
2023-06-09 |
2025-01-28 |
Content Square SAS |
Obfuscation
|
|
EP4524785A1
(en)
*
|
2023-09-13 |
2025-03-19 |
Thales Dis France Sas |
Method to secure a software code
|
|
EP4575846A1
(en)
*
|
2023-12-21 |
2025-06-25 |
Nagravision Sàrl |
Method and device for obfuscating code control flow
|
|
CN119011628B
(zh)
*
|
2024-09-06 |
2025-07-04 |
桂林理工大学 |
一种物联网中多维数据的聚合方法、系统、设备及介质
|