new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)


Cryptography Research Inc patents

Recent patent applications related to Cryptography Research Inc. Cryptography Research Inc is listed as an Agent/Assignee. Note: Cryptography Research Inc may have other listings under different names/spellings. We're not affiliated with Cryptography Research Inc, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Cryptography Research Inc-related inventors

Date Cryptography Research Inc patents (updated weekly) - BOOKMARK this page
03/23/17Performing cryptographic data processing operations in a manner resistant to external monitoring attacks
03/09/17Location aware cryptography
03/02/17Low overhead random pre-charge countermeasure for side-channel attacks
01/26/17System including hierarchical memory modules having different types of integrated circuit memory devices
01/12/17Cryptographic security for mobile payments
12/01/16Implementing access control by system-on-chip
11/17/16Virtual one-time programmable memory management
10/27/16Configuring a device based on a dpa countermeasure
09/22/16Multiplicative blinding for cryptographic operations
06/16/16Buffer access for side-channel attack resistance
05/19/16Energy analysis for differential power analysis resistance
05/12/16Signal transition analysis of a circuit
02/18/16Secure boot with resistance to differential power analysis and other external monitoring attacks
01/28/16Bitstream confirmation for configuration of a programmable logic device
01/28/16Secure feature and key management in integrated circuits
01/28/16Implementing access control by system-on-chip
01/14/16Generating a key based on a combination of keys
11/12/15Generating and distributing pre-computed data (pcd) assets to a target device
11/12/15Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
11/12/15Establishing an initial root of trust for individual components of a distributed security infrastructure
11/12/15Modules to securely provision an asset to a target device
10/29/15Generation and management of multiple base keys based on a device generated key
10/29/15Corrupting a hash value corresponding to a key based on a revocation of the key
10/08/15Methods and systems for glitch-resistant cryptographic signing
10/01/15Authentication of a device
10/01/15Device with resistance to differential power analysis and other external monitoring attacks
09/17/15Integrated circuit authentication
07/09/15Countermeasure to power analysis attacks through time-varying impedance of power delivery networks
06/25/15Protecting media items using a media security controller
06/25/15Modular exponentiation optimization for cryptographic systems
06/18/15Gate-level masking
02/19/15Differential power analysis - resistant cryptographic processing
12/04/14Configurator for secure feature and key manager
09/04/14Cryptographic device with resistance to differential power analysis and other external monitoring attacks
02/13/14Secure feature and key management in integrated circuits

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Cryptography Research Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Cryptography Research Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by