Cupertino, California
United States
125
2021-04-29
The entities that hold a legal rights for patent applications filed by inventor FARRUGIA Augustin J.:
Augustin J. FARRUGIA from Cupertino, US has applied for patents for these inventions. The list has both pending applications and granted patents:
Methods of authenticating a user
#2 | 2019-09-26METHOD AND APPARATUS FOR ON DEMAND VIDEO AND OTHER CONTENT RENTAL
#3 | 2016-12-08Using state reordering to protect against white box attacks
#4 | 2016-09-15Method and apparatus for on demand video and other content rental
#5 | 2016-09-08Computing key-schedules of the AES for use in white boxes
#6 | 2016-07-14Media storage structures for storing content, devices for using such structures, systems for distributing such structures
#7 | 2016-03-17Multi-block cryptographic operation
#8 | 2015-12-03Protecting cryptographic operations using conjugacy class functions
#9 | 2015-10-15Biometric Image in Online Commerce
#10 | 2015-03-12Use of a Biometric Image in Online Commerce
#11 | 2014-10-02Method and apparatus for on demand video and other content rental
#12 | 2014-07-03Obfuscating Transformations on Data Array Content and Addresses
#13 | 2014-04-17Data protection using key translation
#14 | 2014-04-10Code tampering protection for insecure environments
#15 | 2014-03-13Media storage structures for storing content, devices for using such structures, systems for distributing such structures
#16 | 2013-08-08Zero-knowledge based authentication method, system, and apparatus
#17 | 2013-07-18System and method for key space division and sub-key derivation for mixed media digital rights management content
#18 | 2013-06-20System and method for asset lease management
#19 | 2013-06-06Optimized integrity verification procedures
#20 | 2013-05-16Client-server version control system for software applications
#21 | 2013-05-16Client-server system with security for untrusted server
#22 | 2013-05-02SYSTEM AND METHOD FOR A COLLATZ BASED HASH FUNCTION
#23 | 2013-03-21Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System
#24 | 2013-03-14Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System
#25 | 2013-03-14SECURING IMPLEMENTATION OF CRYPTOGRAPHIC ALGORITHMS USING ADDITIONAL ROUNDS
#26 | 2013-03-14Operational mode for block ciphers
#27 | 2013-03-14Use of media storage structure with multiple pieces of content in a content-distribution system
#28 | 2013-03-07Protecting look up tables by mixing code and operations
#29 | 2013-02-07System and method for branch function based obfuscation
#30 | 2013-01-17Cryptographic process execution protecting an input value against attacks
#31 | 2013-01-10COMPUTER PROTOCOL GENERATION AND OBFUSCATION
#32 | 2013-01-10Multiplicative splits to protect cipher keys
#33 | 2013-01-03Device-independent management of cryptographic information
#34 | 2013-01-03Method and apparatus for key distribution with implicit offline authorization
#35 | 2012-12-06Secure authentication of identification for computing devices
#36 | 2012-11-08System and method for blurring instructions and data via binary obfuscation
#37 | 2012-11-08Protection of audio or video data in a playback device
#38 | 2012-10-11SYSTEM AND METHOD FOR BINARY LAYOUT RANDOMIZATION
#39 | 2012-10-11System and method for executing an encrypted binary from a memory pool
#40 | 2012-10-04Protecting states of a cryptographic process using group automorphisms
#41 | 2012-08-30Method and apparatus for computer code obfuscation and deobfuscation using boot installation
#42 | 2012-08-16System and method for revising boolean and arithmetic operations
#43 | 2012-08-09Counteracting memory tracing on computing systems by code obfuscation
#44 | 2012-08-09Performing boolean logic operations using arithmetic operations by code obfuscation
#45 | 2012-08-09Systems and methods for implementing block cipher algorithms on attacker-controlled systems
#46 | 2012-07-12Securing cryptographic process keys using internal structures
#47 | 2012-07-12Securing implementation of a cryptographic process having fixed or dynamic keys
#48 | 2012-07-12SYSTEM AND METHOD FOR ENFORCING SOFTWARE SECURITY THROUGH CPU STATISTICS GATHERED USING HARDWARE FEATURES
#49 | 2012-06-21Securing the implementation of a cryptographic process using key expansion
#50 | 2012-06-21Securing keys of a cipher using properties of the cipher process
#51 | 2012-05-17System and method for stream/block cipher with internal random states
#52 | 2012-05-17System and method for a derivation function for key per page
#53 | 2012-04-19APPLICATION USAGE POLICY ENFORCEMENT
#54 | 2012-03-29System and method for authentication using a shared table and sorting exponentiation
#55 | 2012-02-23Apparatus and method for block cipher process for insecure environments
#56 | 2011-12-29System and method for modulus obfuscation
#57 | 2011-12-15System and method for entropy pool verification
#58 | 2011-12-08HASH FUNCTION USING A REPEATED FUNCTION WITH SHIFTS
#59 | 2011-10-20Data transformation system using cyclic groups
#60 | 2011-10-06Obfuscating transformations on data array content and addresses
#61 | 2011-07-21System and method for annotation-driven function inlining
#62 | 2011-07-21HASH FUNCTION USING A QUASI-GROUP OPERATION
#63 | 2011-07-07System and method for obfuscation by common function and common function prototype
#64 | 2011-07-07SYSTEM AND METHOD FOR SOFTWARE DATA REFERENCE OBFUSCATION
#65 | 2011-05-19System and method for data obfuscation based on discrete logarithm properties
#66 | 2011-03-03System and method for annotation driven integrity verification
#67 | 2011-03-03HASH FUNCTION USING A DOMINO GAME PROCESS
#68 | 2011-03-03HASH FUNCTION BASED ON PAINTING TECHNIQUES
#69 | 2011-03-03Hash function using a heap modeling process
#70 | 2011-03-03Zero-knowledge based authentication method, system, and apparatus
#71 | 2011-03-03Encryption method and apparatus using composition of ciphers
#72 | 2011-02-24System and method for call path enforcement
#73 | 2011-02-17System and method for call replacement
#74 | 2011-02-17SPONGE AND HASH FUNCTIONS USING A RUBIK'S CUBE PUZZLE PROCESS
#75 | 2010-12-02Hash function using a card shuffling process
#76 | 2010-12-02Computer implemented masked representation of data tables
#77 | 2010-12-02HASH FUNCTION USING A ROULETTE GAME PROCESS
#78 | 2010-12-02Hash function using a cue sports game process
#79 | 2010-12-02HASH FUNCTION USING A CUE SPORTS GAME PROCESS
#80 | 2010-11-04Systems, methods, and computer-readable media for fertilizing machine-executable code
#81 | 2010-11-04Hash function based on polymorphic code
#82 | 2010-11-04Hash function using a piling-up process
#83 | 2010-06-17System and method for authentication using a shared table and sorting exponentiation
#84 | 2010-06-03SYSTEM AND METHOD FOR AUTHENTICATION BASED ON PARTICLE GUN EMISSIONS
#85 | 2010-05-06System and method for obfuscating constants in a computer program
#86 | 2010-05-06SYSTEM AND METHOD FOR DERIVATING DETERMINISTIC BINARY VALUES
#87 | 2010-05-06Hash functions using recurrency and arithmetic
#88 | 2010-05-06AGGREGATE AND PARALLELIZABLE HASH FUNCTION
#89 | 2010-04-22System and method for a derivation function for key per page
#90 | 2010-04-22System and method for stream/block cipher with internal random states
#91 | 2010-03-04System and method for revising boolean and arithmetic operations
#92 | 2010-03-04System and method for conditional expansion obfuscation
#93 | 2010-03-04System and method for branch extraction obfuscation
#94 | 2010-03-04SYSTEM AND METHOD FOR VIDEO INSERTION INTO MEDIA STREAM OR FILE
#95 | 2010-03-04Systems and methods for implementing block cipher algorithms on attacker-controlled systems
#96 | 2010-03-04System and method for modulus obfuscation
#97 | 2010-02-04METHOD AND APPARATUS FOR DATA PROTECTION SYSTEM USING GEOMETRY OF FRACTALS OR OTHER CHAOTIC SYSTEMS
#98 | 2009-12-24Discrete key generation method and apparatus
#99 | 2009-12-10System and method for array obfuscation
#100 | 2009-11-19Clock roll forward detection