loadpatents
name:-0.06597900390625
name:-0.05370306968689
name:-0.0039670467376709
Benaloh; Josh D. Patent Filings

Benaloh; Josh D.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Benaloh; Josh D..The latest application filed is for "hardware protection for differential privacy".

Company Profile
3.51.53
  • Benaloh; Josh D. - Redmond WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Hardware protection for differential privacy
Grant 10,977,384 - Benaloh , et al. April 13, 2
2021-04-13
Simple protocol for tangible security
Grant 10,855,665 - Chen , et al. December 1, 2
2020-12-01
Hardware Protection For Differential Privacy
App 20190147188 - BENALOH; Josh D. ;   et al.
2019-05-16
Simple Protocol For Tangible Security
App 20190098500 - Chen; YuQun ;   et al.
2019-03-28
Simple protocol for tangible security
Grant 10,165,441 - Chen , et al. Dec
2018-12-25
Simple protocol for tangible security
App 20170013459 - Chen; YuQun ;   et al.
2017-01-12
Simple protocol for tangible security
Grant 9,503,431 - Chen , et al. November 22, 2
2016-11-22
Simple protocol for tangible security
App 20160065544 - Chen; YuQun ;   et al.
2016-03-03
Secure software product identifier for product validation and activation
Grant 8,984,293 - Layson , et al. March 17, 2
2015-03-17
Constraining a login to a subset of access rights
Grant 8,875,258 - Michener , et al. October 28, 2
2014-10-28
Reliable software product validation and activation with redundant security
Grant 8,775,797 - Layson , et al. July 8, 2
2014-07-08
Authentication ticket validation
Grant 8,621,592 - Benaloh , et al. December 31, 2
2013-12-31
Constraining A Login To A Subset Of Access Rights
App 20130167205 - Michener; John R. ;   et al.
2013-06-27
Authentication Ticket Validation
App 20120272306 - BENALOH; JOSH D. ;   et al.
2012-10-25
Authentication ticket validation
Grant 8,239,927 - Benaloh , et al. August 7, 2
2012-08-07
Generation, distribution and verification of tokens using a secure hash algorithm
Grant 8,224,754 - Pastusiak , et al. July 17, 2
2012-07-17
Reliable Software Product Validation And Activation With Redundant Security
App 20120131681 - Layson; Thomas J. ;   et al.
2012-05-24
Secure Software Product Identifier For Product Validation And Activation
App 20120131349 - Layson; Thomas J. ;   et al.
2012-05-24
Call signs
Grant 7,929,689 - Huitema , et al. April 19, 2
2011-04-19
System and method for providing program credentials
Grant 7,890,643 - Justus , et al. February 15, 2
2011-02-15
Method and system for asymmetric key security
Grant 7,822,200 - Cameron , et al. October 26, 2
2010-10-26
Using hierarchical identity based cryptography for authenticating outbound mail
Grant 7,788,484 - Paya , et al. August 31, 2
2010-08-31
Exclusive encryption
Grant 7,770,023 - Douceur , et al. August 3, 2
2010-08-03
Exclusive encryption
Grant 7,685,415 - Douceur , et al. March 23, 2
2010-03-23
Use of hashing in a secure boot loader
Grant 7,676,840 - Morais , et al. March 9, 2
2010-03-09
Manifest-based trusted agent management in a trusted operating system environment
Grant 7,634,661 - England , et al. December 15, 2
2009-12-15
Systems and methods for compression of key sets having multiple keys
Grant 7,613,302 - Benaloh November 3, 2
2009-11-03
Quality of web search results using a game
Grant 7,603,343 - von Ahn Arellano , et al. October 13, 2
2009-10-13
Password protection
Grant 7,602,910 - Johansson , et al. October 13, 2
2009-10-13
Authentication Ticket Validation
App 20090222900 - BENALOH; JOSH D. ;   et al.
2009-09-03
Transferring application secrets in a trusted operating system environment
Grant 7,577,840 - England , et al. August 18, 2
2009-08-18
Transferring application secrets in a trusted operating system environment
Grant 7,577,839 - England , et al. August 18, 2
2009-08-18
Exclusive encryption
Grant 7,571,327 - Douceur , et al. August 4, 2
2009-08-04
Exclusive encryption
Grant 7,555,656 - Douceur , et al. June 30, 2
2009-06-30
System And Method For Providing Program Credentials
App 20090164795 - Justus; Dean Jason ;   et al.
2009-06-25
Methods and systems of protecting digital content
Grant 7,549,063 - Benaloh , et al. June 16, 2
2009-06-16
Encrypted content data structure package and generation thereof
Grant 7,536,016 - Benaloh May 19, 2
2009-05-19
Human interactive proof service
Grant 7,533,419 - Paya , et al. May 12, 2
2009-05-12
Exclusive encryption
Grant 7,475,258 - Douceur , et al. January 6, 2
2009-01-06
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,382,883 - Cross , et al. June 3, 2
2008-06-03
Manifest-based trusted agent management in a trusted operating system environment
Grant 7,305,553 - England , et al. December 4, 2
2007-12-04
Manifest-based trusted agent management in a trusted operating system environment
Grant 7,257,707 - England , et al. August 14, 2
2007-08-14
Manifest-Based Trusted Agent Management in a Trusted Operating System Environment
App 20070174921 - England; Paul ;   et al.
2007-07-26
Transferring application secrets in a trusted operating system environment
Grant 7,243,230 - England , et al. July 10, 2
2007-07-10
Data Signal with a Database and a Compressed Key
App 20070143216 - Benaloh; Josh D.
2007-06-21
Using hierarchical identity based cryptography for authenticating outbound mail
App 20070124578 - Paya; Cem ;   et al.
2007-05-31
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption
App 20070088947 - Cross; David B. ;   et al.
2007-04-19
Exclusive Encryption
App 20070076881 - Douceur; John R. ;   et al.
2007-04-05
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,181,016 - Cross , et al. February 20, 2
2007-02-20
Key generation
Grant 7,158,639 - Benaloh January 2, 2
2007-01-02
Operating system upgrades in a trusted operating system environment
Grant 7,159,240 - England , et al. January 2, 2
2007-01-02
Manifest-based trusted agent management in a trusted operating system environment
Grant 7,137,004 - England , et al. November 14, 2
2006-11-14
Manifest-based trusted agent management in a trusted operating system environment
Grant 7,107,463 - England , et al. September 12, 2
2006-09-12
Method and system for asymmetric key security
App 20060198517 - Cameron; Kim ;   et al.
2006-09-07
Improving quality of web search results using a game
App 20060179053 - von Ahn Arellano; Luis ;   et al.
2006-08-10
Key compression
Grant 7,080,262 - Benaloh July 18, 2
2006-07-18
Systems and methods for compression of key sets having multiple keys
Grant 7,069,450 - Benaloh June 27, 2
2006-06-27
Encrypted content data structure package and generation thereof
App 20060137023 - Benaloh; Josh D.
2006-06-22
Methods and systems of protecting digital content
Grant 7,065,216 - Benaloh , et al. June 20, 2
2006-06-20
Generation, distribution and verification of tokens using a secure hash algorithm
App 20060129502 - Pastusiak; Andrzej ;   et al.
2006-06-15
Generation, distribution and verification of tokens using a secure hash algorithm
App 20060129501 - Pastusiak; Andrzej ;   et al.
2006-06-15
Exclusive Encryption
App 20060107048 - Douceur; John R. ;   et al.
2006-05-18
Password protection
App 20060104441 - Johansson; Jesper M. ;   et al.
2006-05-18
Exclusive encryption
Grant 7,047,420 - Douceur , et al. May 16, 2
2006-05-16
User access to a unique data subset of a database
Grant 7,047,422 - Benaloh May 16, 2
2006-05-16
Data signal with a database and a compressed key
Grant 7,047,421 - Benaloh May 16, 2
2006-05-16
Human interactive proof sevice
App 20060095578 - Paya; Ismail Cem ;   et al.
2006-05-04
Encrypted content data structure package and generation thereof
Grant 7,003,675 - Benaloh February 21, 2
2006-02-21
Manifest-based trusted agent management in a trusted operating system environment
App 20060005230 - England; Paul ;   et al.
2006-01-05
Call signs
App 20060005013 - Huitema; Christian Francois ;   et al.
2006-01-05
Manifest-based trusted agent management in a trusted operating system environment
App 20050289351 - England, Paul ;   et al.
2005-12-29
Manifest-based trusted agent management in a trusted operating system environment
App 20050278531 - England, Paul ;   et al.
2005-12-15
Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like
App 20050278253 - Meek, Christopher A. ;   et al.
2005-12-15
Manifest-based trusted agent management in a trusted operating system environment
App 20050278477 - England, Paul ;   et al.
2005-12-15
Manifest-based trusted agent management in a trusted operating system environment
App 20050278530 - England, Paul ;   et al.
2005-12-15
Methods and systems of protecting digital content
App 20050273862 - Benaloh, Josh D. ;   et al.
2005-12-08
Extraction of multiple single keys from a compressed key
Grant 6,956,947 - Benaloh October 18, 2
2005-10-18
Systems and methods for compression of key sets having multiple keys
App 20050193210 - Benaloh, Josh D.
2005-09-01
Transferring application secrets in a trusted operating system environment
App 20050144447 - England, Paul ;   et al.
2005-06-30
Transferring application secrets in a trusted operating system environment
App 20050144448 - England, Paul ;   et al.
2005-06-30
Use of hashing in a secure boot loader
App 20050138270 - Morais, Dinarte ;   et al.
2005-06-23
Use of hashing in a secure boot loader
Grant 6,907,522 - Morais , et al. June 14, 2
2005-06-14
Systems and methods for compression of key sets having multiple keys
App 20050117746 - Benaloh, Josh D.
2005-06-02
Key compression
App 20050094813 - Benaloh, Josh D.
2005-05-05
Extraction of multiple single keys from a compressed key
App 20050097063 - Benaloh, Josh D.
2005-05-05
Key generation
App 20050097062 - Benaloh, Josh D.
2005-05-05
Systems and methods for compression of key sets having multiple keys
Grant 6,886,098 - Benaloh April 26, 2
2005-04-26
User access to a unique data subset of a database
App 20050065889 - Benaloh, Josh D.
2005-03-24
Data signal with a database and a compressed key
App 20050065888 - Benaloh, Josh D.
2005-03-24
Encrypted content data stracture package and generation thereof
App 20050065890 - Benaloh, Josh D.
2005-03-24
Exclusive encryption
App 20050066185 - Douceur, John R. ;   et al.
2005-03-24
Exclusive encryption
App 20050066184 - Douceur, John R. ;   et al.
2005-03-24
Exclusive encryption
App 20050066183 - Douceur, John R. ;   et al.
2005-03-24
Deriving a symmetric key from an asymmetric key for file encryption or decryption
App 20040146015 - Cross, David B. ;   et al.
2004-07-29
System and method for providing program credentials
App 20040003081 - Justus, Dean Jason ;   et al.
2004-01-01
Selectively disclosable digital certificates
App 20030233542 - Benaloh, Josh D.
2003-12-18
Use of hashing in a secure boot loader
App 20030229777 - Morais, Dinarte ;   et al.
2003-12-11
Manifest-based trusted agent management in a trusted operating system environment
App 20030097579 - England, Paul ;   et al.
2003-05-22
Transferring application secrets in a trusted operating system environment
App 20030097558 - England, Paul ;   et al.
2003-05-22
Operating system upgrades in a trusted operating system environment
App 20030097578 - England, Paul ;   et al.
2003-05-22
Exclusive encryption
App 20020095590 - Douceur, John R. ;   et al.
2002-07-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed