loadpatents
Patent applications and USPTO patent grants for Abadi; Martin.The latest application filed is for "encoding and reconstructing inputs using neural networks".
Patent | Date |
---|---|
Encoding and reconstructing inputs using neural networks Grant 11,308,385 - Abadi , et al. April 19, 2 | 2022-04-19 |
Encoding And Reconstructing Inputs Using Neural Networks App 20190171929 - Abadi; Martin ;   et al. | 2019-06-06 |
Authorization in a distributed system using access control lists and groups Grant 10,044,718 - Burrows , et al. August 7, 2 | 2018-08-07 |
Authorization In A Distributed System Using Access Control Lists And Groups App 20160352744 - Burrows; Michael ;   et al. | 2016-12-01 |
Host agnostic integration and interoperation system Grant 9,319,469 - Ruhlen , et al. April 19, 2 | 2016-04-19 |
Automatic detection of search results poisoning attacks Grant 8,997,220 - Yu , et al. March 31, 2 | 2015-03-31 |
Vouching for user account using social networking relationship Grant 8,745,738 - Xie , et al. June 3, 2 | 2014-06-03 |
Automatic identification of travel and non-travel network addresses Grant 8,615,605 - Yu , et al. December 24, 2 | 2013-12-24 |
Access control policy in a weakly-coherent distributed collection Grant 8,505,065 - Wobber , et al. August 6, 2 | 2013-08-06 |
Identifying malicious queries Grant 8,495,742 - Abadi , et al. July 23, 2 | 2013-07-23 |
Vouching For User Account Using Social Networking Relationship App 20130185791 - Xie; Yinglian ;   et al. | 2013-07-18 |
Using social graphs to combat malicious attacks Grant 8,434,150 - Xie , et al. April 30, 2 | 2013-04-30 |
Synchronizing split user-mode/kernel-mode device driver architecture Grant 8,434,098 - Lee , et al. April 30, 2 | 2013-04-30 |
Host Agnostic Integration and Interoperation System App 20130080785 - Ruhlen; Matthew James ;   et al. | 2013-03-28 |
Blocking malicious activity using blacklist Grant 8,387,145 - Xie , et al. February 26, 2 | 2013-02-26 |
Automatic Detection Of Search Results Poisoning Attacks App 20120304287 - Yu; Fang ;   et al. | 2012-11-29 |
Using Social Graphs To Combat Malicious Attacks App 20120246720 - Xie; Yinglian ;   et al. | 2012-09-27 |
Transactional memory compatibility management Grant 8,266,604 - Groff , et al. September 11, 2 | 2012-09-11 |
Access control based on program properties Grant 8,239,954 - Wobber , et al. August 7, 2 | 2012-08-07 |
Host accountability using unreliable identifiers Grant 8,185,613 - Xie , et al. May 22, 2 | 2012-05-22 |
Split user-mode/kernel-mode device driver architecture Grant 8,185,783 - Lee , et al. May 22, 2 | 2012-05-22 |
Memory conflict detection via mapping of the physical heap to control access permissions to the memory Grant 8,180,986 - Harris , et al. May 15, 2 | 2012-05-15 |
Automatic Identification Of Travel And Non-travel Network Addresses App 20120102169 - Yu; Fang ;   et al. | 2012-04-26 |
Architectural support for software-based protection Grant 8,136,091 - Erlingsson , et al. March 13, 2 | 2012-03-13 |
Verifiable integrity guarantees for machine code programs Grant 8,104,021 - Erlingsson , et al. January 24, 2 | 2012-01-24 |
Identifying Malicious Queries App 20110283360 - Abadi; Martin ;   et al. | 2011-11-17 |
Operating-system process construction Grant 8,020,141 - Hunt , et al. September 13, 2 | 2011-09-13 |
Transactional memory with dynamic separation Grant 7,908,265 - Abadi , et al. March 15, 2 | 2011-03-15 |
Operating system protection against side-channel attacks on secrecy Grant 7,870,336 - Erlingsson , et al. January 11, 2 | 2011-01-11 |
Access-control permissions with inter-process message-based communications Grant 7,865,934 - Wobber , et al. January 4, 2 | 2011-01-04 |
Host Accountability Using Unreliable Identifiers App 20100312877 - Xie; Yinglian ;   et al. | 2010-12-09 |
Blocking Malicious Activity Using Blacklist App 20100313264 - Xie; Yinglian ;   et al. | 2010-12-09 |
Operating system process identification Grant 7,788,637 - Hunt , et al. August 31, 2 | 2010-08-31 |
Transactional Memory Compatibility Management App 20100191930 - Groff; Dana ;   et al. | 2010-07-29 |
Implementations Of Program Runtime Checks App 20100192026 - Abadi; Martin ;   et al. | 2010-07-29 |
Searching for information utilizing a probabilistic detector Grant 7,730,058 - Sareen , et al. June 1, 2 | 2010-06-01 |
Systems and methods for pattern matching on principal names to control access to computing resources Grant 7,716,734 - Birrell , et al. May 11, 2 | 2010-05-11 |
Transactional Memory System App 20100070727 - Harris; Timothy ;   et al. | 2010-03-18 |
Inter-process communications employing bi-directional message conduits Grant 7,600,232 - Hunt , et al. October 6, 2 | 2009-10-06 |
Transactional Memory With Dynamic Separation App 20090210457 - Abadi; Martin ;   et al. | 2009-08-20 |
Software Isolated Device Driver Architecture App 20090210888 - Lee; Mingtzong ;   et al. | 2009-08-20 |
Software security based on control flow integrity Grant 7,577,992 - Abadi , et al. August 18, 2 | 2009-08-18 |
Synchronizing Split User-mode/kernel-mode Device Driver Architecture App 20090204978 - Lee; Mingtzong ;   et al. | 2009-08-13 |
Transactional Memory With Dynamic Separation App 20090204969 - Abadi; Martin ;   et al. | 2009-08-13 |
Split User-mode/kernel-mode Device Driver Architecture App 20090138625 - Lee; Mingtzong ;   et al. | 2009-05-28 |
Modal and linear techniques for access control logic App 20090083832 - Abadi; Martin ;   et al. | 2009-03-26 |
Access Control Policy In A Weakly-coherent Distributed Collection App 20080320299 - Wobber; Edward P. ;   et al. | 2008-12-25 |
Access Control Based On Program Properties App 20080282354 - Wobber; Edward P. ;   et al. | 2008-11-13 |
Architectural support for software-based protection App 20080184016 - Erlingsson; Ulfar ;   et al. | 2008-07-31 |
Operating system protection against side-channel attacks on secrecy App 20080109625 - Erlingsson; Ulfar ;   et al. | 2008-05-08 |
Software memory access control Grant 7,337,291 - Abadi , et al. February 26, 2 | 2008-02-26 |
Verifiable integrity guarantees for machine code programs App 20070285271 - Erlingsson; Ulfar ;   et al. | 2007-12-13 |
Access-Control Permissions with Inter-Process Message-Based Communications App 20070271594 - Wobber; Edward P. ;   et al. | 2007-11-22 |
Statically Verifiable Inter-Process-Communicative Isolated Processes App 20070094495 - Hunt; Galen C. ;   et al. | 2007-04-26 |
History based rights computation for managed code Grant 7,203,833 - Abadi , et al. April 10, 2 | 2007-04-10 |
Searching for information utilizing a probabilistic detector App 20070078827 - Sareen; Gaurav ;   et al. | 2007-04-05 |
Memory bound functions for spam deterrence and the like Grant 7,149,801 - Burrows , et al. December 12, 2 | 2006-12-12 |
Systems and methods for pattern matching on principal names to control access to computing resources App 20060265754 - Birrell; Andrew David ;   et al. | 2006-11-23 |
Systems and methods for identifying principals to control access to computing resources App 20060265759 - Birrell; Andrew David ;   et al. | 2006-11-23 |
Software memory access control App 20060174077 - Abadi; Martin ;   et al. | 2006-08-03 |
Software security based on control flow integrity App 20060161978 - Abadi; Martin ;   et al. | 2006-07-20 |
Inter-process interference elimination App 20060123430 - Hunt; Galen C. ;   et al. | 2006-06-08 |
Inter-process communications employing bi-directional message conduits App 20060123424 - Hunt; Galen C. ;   et al. | 2006-06-08 |
Operating-system process construction App 20060123417 - Hunt; Galen C. ;   et al. | 2006-06-08 |
Operating system process identification App 20060123418 - Hunt; Galen C. ;   et al. | 2006-06-08 |
Memory bound functions for spam deterrence and the like App 20040093371 - Burrows, Michael ;   et al. | 2004-05-13 |
Method for avoiding broadcast deadlocks in a mesh-connected network App 20020150056 - Abadi, Martin ;   et al. | 2002-10-17 |
Method and apparatus for annotating a computer program to facilitate subsequent processing of the program Grant 6,253,370 - Abadi , et al. June 26, 2 | 2001-06-26 |
Method for selectively restricting access to computer systems Grant 6,195,698 - Lillibridge , et al. February 27, 2 | 2001-02-27 |
System and method for generating unique passwords Grant 6,141,760 - Abadi , et al. October 31, 2 | 2000-10-31 |
Method and apparatus for strengthening passwords for protection of computer systems Grant 6,079,021 - Abadi , et al. June 20, 2 | 2000-06-20 |
Dynamic fine-grained dependency analysis for a functional language Grant 5,940,619 - Abadi , et al. August 17, 1 | 1999-08-17 |
Secure web tunnel Grant 5,805,803 - Birrell , et al. September 8, 1 | 1998-09-08 |
Compound principals in access control lists Grant 5,315,657 - Abadi , et al. May 24, 1 | 1994-05-24 |
Computer network with modified host-to-host encryption keys Grant 5,268,962 - Abadi , et al. December 7, 1 | 1993-12-07 |
Access control subsystem and method for distributed computer system using locally cached authentication credentials Grant 5,235,642 - Wobber , et al. August 10, 1 | 1993-08-10 |
Access control subsystem and method for distributed computer system using compound principals Grant 5,173,939 - Abadi , et al. December 22, 1 | 1992-12-22 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.