2025
|
Invention
|
Ecdhe key exchange for server authentication and a key server.
A server can receive a device pub... |
2024
|
Invention
|
Key derivation for a module using an embedded universal integrated circuit card.
A module with a... |
|
Invention
|
Public key exchange with authenicated ecdhe and security against quantum computers.
Elliptic Cur... |
|
Invention
|
Ecdhe key exchange for server authentication and a key server. A server can receive a device publ... |
|
Invention
|
Embedded universal integrated circuit card supporting two-factor authentication.
A module with a... |
|
Invention
|
Device default wifi credentials for simplified and secure configuration of networked transducers.... |
|
Invention
|
Systems and methods for "machine-to-machine" (m2m) communications between modules, servers, and a... |
|
Invention
|
Set of servers for “machine-to-machine” communications using public key infrastructure. A set of ... |
|
Invention
|
Embedded universal integrated circuit card supporting two-factor authentication. A module with an... |
2023
|
Invention
|
Public key exchange with authenicated ecdhe and security against quantum computers. Elliptic Curv... |
|
Invention
|
Key derivation for a module using an embedded universal integrated circuit card. A module with an... |
|
Invention
|
Systems and methods for “machine-to-machine” (m2m) communications between modules, servers, and a... |
|
Invention
|
Configuration systems and methods for secure operation of networked transducers.
A device can in... |
2021
|
Invention
|
Secure firmware transfer for an integrated universal integrated circuit card (iuicc). A device ca... |
2020
|
Invention
|
Public key exchange with authenticated ecdhe and security against quantum computers. Elliptic Cur... |
2019
|
Invention
|
Network supporting two-factor authentication for modules with embedded universal integrated circu... |
|
Invention
|
Secure firmware transfer from a server to a primary platform.
A device can (i) operate a primary... |
|
Invention
|
Methods for using extracted features to perform an action associated with selected identified ima... |
|
Invention
|
Methods for using extracted features to perform an action. A computer system comprising one or mo... |
|
Invention
|
Configuration systems and methods for secure operation of networked transducers. A device can inc... |
|
Invention
|
Power management and security for wireless modules in “machine-to-machine” communications. th gen... |
2018
|
Invention
|
Secure pki communications for “machine-to-machine” modules, including key derivation by modules a... |
|
Invention
|
Methods for using extracted features to perform an action. A method that extracts features from f... |
|
Invention
|
Method for using extracted features to perform an action associated with selected identified imag... |
2017
|
Invention
|
System for using extracted feature vectors to perform an action associated with a work identifier... |