Learn more

IRDETO CANADA CORP

Overview
  • Total Patents
    99
  • GoodIP Patent Rank
    197,613
  • Filing trend
    ⇩ 100.0%
About

IRDETO CANADA CORP has a total of 99 patent applications. It decreased the IP activity by 100.0%. Its first patent ever was published in 2004. It filed its patents most often in China, WIPO (World Intellectual Property Organization) and United States. Its main competitors in its focus markets computer technology, digital networks and audio-visual technology are SUNINFO INFORMATION TECH CO LTD, DROPBOX INC and YOTTAYOTTA INC.

Patent filings per year

Chart showing IRDETO CANADA CORPs patent filings per year from 1900 to 2020

Top inventors

# Name Total Patents
#1 Liem Clifford 32
#2 Gu Yuan Xiang 28
#3 Goodes Grant Stewart 17
#4 Wiener Michael 14
#5 Johnson Harold 13
#6 Muir James 12
#7 Eisen Philip Allan 12
#8 Murdock Daniel Elie 10
#9 Zhou Yongxin 9
#10 Adams Garney David 8

Latest patents

Publication Filing date Title
US2021034343A1 Systems, Methods and Storage Media for Producing Verifiable Protected Code
US2020313850A1 Method and apparatus for implementing a white-box cipher
US2020242217A1 Systems, methods, and storage media for obfuscating a computer program by representing the control flow of the computer program as data
CN104662549A Securing accessible systems using cross-linking
CN105378679A Method and system for media path security
WO2014153635A1 Method and system for platform and user application security on a device
CN104335220A Method and system for preventing and detecting security threats
CN104272319A Method for protecting data
CN104335522A Method and system for chain transformation
CN104396181A System and method for generating and protecting cryptographic keys
EP2751731A1 Method and system for enhancing content security
CN103875001A Method and system for protecting execution of cryptographic hash functions
WO2012129637A2 Method of securing memory against malicious attack
KR20130018642A System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
CA2761065A1 Interlocked binary protection using whitebox cryptography
CN102939587A Method for linking and loading to protect applications
CA2792782A1 A system and method for encapsulating and enabling protection through diverse variations in software libraries
CA2792787A1 System and method for protecting cryptographic assets from a white-box attack
EP2550622A1 System and method for dynamic, variably-timed operation paths as a resistance to side channel and repeated invocation attacks
WO2011116446A1 System and method for random algorithm selection to dynamically conceal the operation of software