loadpatents
name:-0.043380975723267
name:-0.043388843536377
name:-0.0022997856140137
Abadi; Martin Patent Filings

Abadi; Martin

Patent Applications and Registrations

Patent applications and USPTO patent grants for Abadi; Martin.The latest application filed is for "encoding and reconstructing inputs using neural networks".

Company Profile
2.49.39
  • Abadi; Martin - Mountain View CA
  • Abadi; Martin - Palo Alto CA
  • Abadi; Martin - Redmond WA
  • Abadi; Martin - California CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Encoding and reconstructing inputs using neural networks
Grant 11,308,385 - Abadi , et al. April 19, 2
2022-04-19
Encoding And Reconstructing Inputs Using Neural Networks
App 20190171929 - Abadi; Martin ;   et al.
2019-06-06
Authorization in a distributed system using access control lists and groups
Grant 10,044,718 - Burrows , et al. August 7, 2
2018-08-07
Authorization In A Distributed System Using Access Control Lists And Groups
App 20160352744 - Burrows; Michael ;   et al.
2016-12-01
Host agnostic integration and interoperation system
Grant 9,319,469 - Ruhlen , et al. April 19, 2
2016-04-19
Automatic detection of search results poisoning attacks
Grant 8,997,220 - Yu , et al. March 31, 2
2015-03-31
Vouching for user account using social networking relationship
Grant 8,745,738 - Xie , et al. June 3, 2
2014-06-03
Automatic identification of travel and non-travel network addresses
Grant 8,615,605 - Yu , et al. December 24, 2
2013-12-24
Access control policy in a weakly-coherent distributed collection
Grant 8,505,065 - Wobber , et al. August 6, 2
2013-08-06
Identifying malicious queries
Grant 8,495,742 - Abadi , et al. July 23, 2
2013-07-23
Vouching For User Account Using Social Networking Relationship
App 20130185791 - Xie; Yinglian ;   et al.
2013-07-18
Using social graphs to combat malicious attacks
Grant 8,434,150 - Xie , et al. April 30, 2
2013-04-30
Synchronizing split user-mode/kernel-mode device driver architecture
Grant 8,434,098 - Lee , et al. April 30, 2
2013-04-30
Host Agnostic Integration and Interoperation System
App 20130080785 - Ruhlen; Matthew James ;   et al.
2013-03-28
Blocking malicious activity using blacklist
Grant 8,387,145 - Xie , et al. February 26, 2
2013-02-26
Automatic Detection Of Search Results Poisoning Attacks
App 20120304287 - Yu; Fang ;   et al.
2012-11-29
Using Social Graphs To Combat Malicious Attacks
App 20120246720 - Xie; Yinglian ;   et al.
2012-09-27
Transactional memory compatibility management
Grant 8,266,604 - Groff , et al. September 11, 2
2012-09-11
Access control based on program properties
Grant 8,239,954 - Wobber , et al. August 7, 2
2012-08-07
Host accountability using unreliable identifiers
Grant 8,185,613 - Xie , et al. May 22, 2
2012-05-22
Split user-mode/kernel-mode device driver architecture
Grant 8,185,783 - Lee , et al. May 22, 2
2012-05-22
Memory conflict detection via mapping of the physical heap to control access permissions to the memory
Grant 8,180,986 - Harris , et al. May 15, 2
2012-05-15
Automatic Identification Of Travel And Non-travel Network Addresses
App 20120102169 - Yu; Fang ;   et al.
2012-04-26
Architectural support for software-based protection
Grant 8,136,091 - Erlingsson , et al. March 13, 2
2012-03-13
Verifiable integrity guarantees for machine code programs
Grant 8,104,021 - Erlingsson , et al. January 24, 2
2012-01-24
Identifying Malicious Queries
App 20110283360 - Abadi; Martin ;   et al.
2011-11-17
Operating-system process construction
Grant 8,020,141 - Hunt , et al. September 13, 2
2011-09-13
Transactional memory with dynamic separation
Grant 7,908,265 - Abadi , et al. March 15, 2
2011-03-15
Operating system protection against side-channel attacks on secrecy
Grant 7,870,336 - Erlingsson , et al. January 11, 2
2011-01-11
Access-control permissions with inter-process message-based communications
Grant 7,865,934 - Wobber , et al. January 4, 2
2011-01-04
Host Accountability Using Unreliable Identifiers
App 20100312877 - Xie; Yinglian ;   et al.
2010-12-09
Blocking Malicious Activity Using Blacklist
App 20100313264 - Xie; Yinglian ;   et al.
2010-12-09
Operating system process identification
Grant 7,788,637 - Hunt , et al. August 31, 2
2010-08-31
Transactional Memory Compatibility Management
App 20100191930 - Groff; Dana ;   et al.
2010-07-29
Implementations Of Program Runtime Checks
App 20100192026 - Abadi; Martin ;   et al.
2010-07-29
Searching for information utilizing a probabilistic detector
Grant 7,730,058 - Sareen , et al. June 1, 2
2010-06-01
Systems and methods for pattern matching on principal names to control access to computing resources
Grant 7,716,734 - Birrell , et al. May 11, 2
2010-05-11
Transactional Memory System
App 20100070727 - Harris; Timothy ;   et al.
2010-03-18
Inter-process communications employing bi-directional message conduits
Grant 7,600,232 - Hunt , et al. October 6, 2
2009-10-06
Transactional Memory With Dynamic Separation
App 20090210457 - Abadi; Martin ;   et al.
2009-08-20
Software Isolated Device Driver Architecture
App 20090210888 - Lee; Mingtzong ;   et al.
2009-08-20
Software security based on control flow integrity
Grant 7,577,992 - Abadi , et al. August 18, 2
2009-08-18
Synchronizing Split User-mode/kernel-mode Device Driver Architecture
App 20090204978 - Lee; Mingtzong ;   et al.
2009-08-13
Transactional Memory With Dynamic Separation
App 20090204969 - Abadi; Martin ;   et al.
2009-08-13
Split User-mode/kernel-mode Device Driver Architecture
App 20090138625 - Lee; Mingtzong ;   et al.
2009-05-28
Modal and linear techniques for access control logic
App 20090083832 - Abadi; Martin ;   et al.
2009-03-26
Access Control Policy In A Weakly-coherent Distributed Collection
App 20080320299 - Wobber; Edward P. ;   et al.
2008-12-25
Access Control Based On Program Properties
App 20080282354 - Wobber; Edward P. ;   et al.
2008-11-13
Architectural support for software-based protection
App 20080184016 - Erlingsson; Ulfar ;   et al.
2008-07-31
Operating system protection against side-channel attacks on secrecy
App 20080109625 - Erlingsson; Ulfar ;   et al.
2008-05-08
Software memory access control
Grant 7,337,291 - Abadi , et al. February 26, 2
2008-02-26
Verifiable integrity guarantees for machine code programs
App 20070285271 - Erlingsson; Ulfar ;   et al.
2007-12-13
Access-Control Permissions with Inter-Process Message-Based Communications
App 20070271594 - Wobber; Edward P. ;   et al.
2007-11-22
Statically Verifiable Inter-Process-Communicative Isolated Processes
App 20070094495 - Hunt; Galen C. ;   et al.
2007-04-26
History based rights computation for managed code
Grant 7,203,833 - Abadi , et al. April 10, 2
2007-04-10
Searching for information utilizing a probabilistic detector
App 20070078827 - Sareen; Gaurav ;   et al.
2007-04-05
Memory bound functions for spam deterrence and the like
Grant 7,149,801 - Burrows , et al. December 12, 2
2006-12-12
Systems and methods for pattern matching on principal names to control access to computing resources
App 20060265754 - Birrell; Andrew David ;   et al.
2006-11-23
Systems and methods for identifying principals to control access to computing resources
App 20060265759 - Birrell; Andrew David ;   et al.
2006-11-23
Software memory access control
App 20060174077 - Abadi; Martin ;   et al.
2006-08-03
Software security based on control flow integrity
App 20060161978 - Abadi; Martin ;   et al.
2006-07-20
Inter-process interference elimination
App 20060123430 - Hunt; Galen C. ;   et al.
2006-06-08
Inter-process communications employing bi-directional message conduits
App 20060123424 - Hunt; Galen C. ;   et al.
2006-06-08
Operating-system process construction
App 20060123417 - Hunt; Galen C. ;   et al.
2006-06-08
Operating system process identification
App 20060123418 - Hunt; Galen C. ;   et al.
2006-06-08
Memory bound functions for spam deterrence and the like
App 20040093371 - Burrows, Michael ;   et al.
2004-05-13
Method for avoiding broadcast deadlocks in a mesh-connected network
App 20020150056 - Abadi, Martin ;   et al.
2002-10-17
Method and apparatus for annotating a computer program to facilitate subsequent processing of the program
Grant 6,253,370 - Abadi , et al. June 26, 2
2001-06-26
Method for selectively restricting access to computer systems
Grant 6,195,698 - Lillibridge , et al. February 27, 2
2001-02-27
System and method for generating unique passwords
Grant 6,141,760 - Abadi , et al. October 31, 2
2000-10-31
Method and apparatus for strengthening passwords for protection of computer systems
Grant 6,079,021 - Abadi , et al. June 20, 2
2000-06-20
Dynamic fine-grained dependency analysis for a functional language
Grant 5,940,619 - Abadi , et al. August 17, 1
1999-08-17
Secure web tunnel
Grant 5,805,803 - Birrell , et al. September 8, 1
1998-09-08
Compound principals in access control lists
Grant 5,315,657 - Abadi , et al. May 24, 1
1994-05-24
Computer network with modified host-to-host encryption keys
Grant 5,268,962 - Abadi , et al. December 7, 1
1993-12-07
Access control subsystem and method for distributed computer system using locally cached authentication credentials
Grant 5,235,642 - Wobber , et al. August 10, 1
1993-08-10
Access control subsystem and method for distributed computer system using compound principals
Grant 5,173,939 - Abadi , et al. December 22, 1
1992-12-22

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed