loadpatents
Patent applications and USPTO patent grants for Benaloh; Josh D..The latest application filed is for "hardware protection for differential privacy".
Patent | Date |
---|---|
Hardware protection for differential privacy Grant 10,977,384 - Benaloh , et al. April 13, 2 | 2021-04-13 |
Simple protocol for tangible security Grant 10,855,665 - Chen , et al. December 1, 2 | 2020-12-01 |
Hardware Protection For Differential Privacy App 20190147188 - BENALOH; Josh D. ;   et al. | 2019-05-16 |
Simple Protocol For Tangible Security App 20190098500 - Chen; YuQun ;   et al. | 2019-03-28 |
Simple protocol for tangible security Grant 10,165,441 - Chen , et al. Dec | 2018-12-25 |
Simple protocol for tangible security App 20170013459 - Chen; YuQun ;   et al. | 2017-01-12 |
Simple protocol for tangible security Grant 9,503,431 - Chen , et al. November 22, 2 | 2016-11-22 |
Simple protocol for tangible security App 20160065544 - Chen; YuQun ;   et al. | 2016-03-03 |
Secure software product identifier for product validation and activation Grant 8,984,293 - Layson , et al. March 17, 2 | 2015-03-17 |
Constraining a login to a subset of access rights Grant 8,875,258 - Michener , et al. October 28, 2 | 2014-10-28 |
Reliable software product validation and activation with redundant security Grant 8,775,797 - Layson , et al. July 8, 2 | 2014-07-08 |
Authentication ticket validation Grant 8,621,592 - Benaloh , et al. December 31, 2 | 2013-12-31 |
Constraining A Login To A Subset Of Access Rights App 20130167205 - Michener; John R. ;   et al. | 2013-06-27 |
Authentication Ticket Validation App 20120272306 - BENALOH; JOSH D. ;   et al. | 2012-10-25 |
Authentication ticket validation Grant 8,239,927 - Benaloh , et al. August 7, 2 | 2012-08-07 |
Generation, distribution and verification of tokens using a secure hash algorithm Grant 8,224,754 - Pastusiak , et al. July 17, 2 | 2012-07-17 |
Reliable Software Product Validation And Activation With Redundant Security App 20120131681 - Layson; Thomas J. ;   et al. | 2012-05-24 |
Secure Software Product Identifier For Product Validation And Activation App 20120131349 - Layson; Thomas J. ;   et al. | 2012-05-24 |
Call signs Grant 7,929,689 - Huitema , et al. April 19, 2 | 2011-04-19 |
System and method for providing program credentials Grant 7,890,643 - Justus , et al. February 15, 2 | 2011-02-15 |
Method and system for asymmetric key security Grant 7,822,200 - Cameron , et al. October 26, 2 | 2010-10-26 |
Using hierarchical identity based cryptography for authenticating outbound mail Grant 7,788,484 - Paya , et al. August 31, 2 | 2010-08-31 |
Exclusive encryption Grant 7,770,023 - Douceur , et al. August 3, 2 | 2010-08-03 |
Exclusive encryption Grant 7,685,415 - Douceur , et al. March 23, 2 | 2010-03-23 |
Use of hashing in a secure boot loader Grant 7,676,840 - Morais , et al. March 9, 2 | 2010-03-09 |
Manifest-based trusted agent management in a trusted operating system environment Grant 7,634,661 - England , et al. December 15, 2 | 2009-12-15 |
Systems and methods for compression of key sets having multiple keys Grant 7,613,302 - Benaloh November 3, 2 | 2009-11-03 |
Quality of web search results using a game Grant 7,603,343 - von Ahn Arellano , et al. October 13, 2 | 2009-10-13 |
Password protection Grant 7,602,910 - Johansson , et al. October 13, 2 | 2009-10-13 |
Authentication Ticket Validation App 20090222900 - BENALOH; JOSH D. ;   et al. | 2009-09-03 |
Transferring application secrets in a trusted operating system environment Grant 7,577,840 - England , et al. August 18, 2 | 2009-08-18 |
Transferring application secrets in a trusted operating system environment Grant 7,577,839 - England , et al. August 18, 2 | 2009-08-18 |
Exclusive encryption Grant 7,571,327 - Douceur , et al. August 4, 2 | 2009-08-04 |
Exclusive encryption Grant 7,555,656 - Douceur , et al. June 30, 2 | 2009-06-30 |
System And Method For Providing Program Credentials App 20090164795 - Justus; Dean Jason ;   et al. | 2009-06-25 |
Methods and systems of protecting digital content Grant 7,549,063 - Benaloh , et al. June 16, 2 | 2009-06-16 |
Encrypted content data structure package and generation thereof Grant 7,536,016 - Benaloh May 19, 2 | 2009-05-19 |
Human interactive proof service Grant 7,533,419 - Paya , et al. May 12, 2 | 2009-05-12 |
Exclusive encryption Grant 7,475,258 - Douceur , et al. January 6, 2 | 2009-01-06 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,382,883 - Cross , et al. June 3, 2 | 2008-06-03 |
Manifest-based trusted agent management in a trusted operating system environment Grant 7,305,553 - England , et al. December 4, 2 | 2007-12-04 |
Manifest-based trusted agent management in a trusted operating system environment Grant 7,257,707 - England , et al. August 14, 2 | 2007-08-14 |
Manifest-Based Trusted Agent Management in a Trusted Operating System Environment App 20070174921 - England; Paul ;   et al. | 2007-07-26 |
Transferring application secrets in a trusted operating system environment Grant 7,243,230 - England , et al. July 10, 2 | 2007-07-10 |
Data Signal with a Database and a Compressed Key App 20070143216 - Benaloh; Josh D. | 2007-06-21 |
Using hierarchical identity based cryptography for authenticating outbound mail App 20070124578 - Paya; Cem ;   et al. | 2007-05-31 |
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption App 20070088947 - Cross; David B. ;   et al. | 2007-04-19 |
Exclusive Encryption App 20070076881 - Douceur; John R. ;   et al. | 2007-04-05 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,181,016 - Cross , et al. February 20, 2 | 2007-02-20 |
Key generation Grant 7,158,639 - Benaloh January 2, 2 | 2007-01-02 |
Operating system upgrades in a trusted operating system environment Grant 7,159,240 - England , et al. January 2, 2 | 2007-01-02 |
Manifest-based trusted agent management in a trusted operating system environment Grant 7,137,004 - England , et al. November 14, 2 | 2006-11-14 |
Manifest-based trusted agent management in a trusted operating system environment Grant 7,107,463 - England , et al. September 12, 2 | 2006-09-12 |
Method and system for asymmetric key security App 20060198517 - Cameron; Kim ;   et al. | 2006-09-07 |
Improving quality of web search results using a game App 20060179053 - von Ahn Arellano; Luis ;   et al. | 2006-08-10 |
Key compression Grant 7,080,262 - Benaloh July 18, 2 | 2006-07-18 |
Systems and methods for compression of key sets having multiple keys Grant 7,069,450 - Benaloh June 27, 2 | 2006-06-27 |
Encrypted content data structure package and generation thereof App 20060137023 - Benaloh; Josh D. | 2006-06-22 |
Methods and systems of protecting digital content Grant 7,065,216 - Benaloh , et al. June 20, 2 | 2006-06-20 |
Generation, distribution and verification of tokens using a secure hash algorithm App 20060129502 - Pastusiak; Andrzej ;   et al. | 2006-06-15 |
Generation, distribution and verification of tokens using a secure hash algorithm App 20060129501 - Pastusiak; Andrzej ;   et al. | 2006-06-15 |
Exclusive Encryption App 20060107048 - Douceur; John R. ;   et al. | 2006-05-18 |
Password protection App 20060104441 - Johansson; Jesper M. ;   et al. | 2006-05-18 |
Exclusive encryption Grant 7,047,420 - Douceur , et al. May 16, 2 | 2006-05-16 |
User access to a unique data subset of a database Grant 7,047,422 - Benaloh May 16, 2 | 2006-05-16 |
Data signal with a database and a compressed key Grant 7,047,421 - Benaloh May 16, 2 | 2006-05-16 |
Human interactive proof sevice App 20060095578 - Paya; Ismail Cem ;   et al. | 2006-05-04 |
Encrypted content data structure package and generation thereof Grant 7,003,675 - Benaloh February 21, 2 | 2006-02-21 |
Manifest-based trusted agent management in a trusted operating system environment App 20060005230 - England; Paul ;   et al. | 2006-01-05 |
Call signs App 20060005013 - Huitema; Christian Francois ;   et al. | 2006-01-05 |
Manifest-based trusted agent management in a trusted operating system environment App 20050289351 - England, Paul ;   et al. | 2005-12-29 |
Manifest-based trusted agent management in a trusted operating system environment App 20050278531 - England, Paul ;   et al. | 2005-12-15 |
Verifying human interaction to a computer entity by way of a trusted component on a computing device or the like App 20050278253 - Meek, Christopher A. ;   et al. | 2005-12-15 |
Manifest-based trusted agent management in a trusted operating system environment App 20050278477 - England, Paul ;   et al. | 2005-12-15 |
Manifest-based trusted agent management in a trusted operating system environment App 20050278530 - England, Paul ;   et al. | 2005-12-15 |
Methods and systems of protecting digital content App 20050273862 - Benaloh, Josh D. ;   et al. | 2005-12-08 |
Extraction of multiple single keys from a compressed key Grant 6,956,947 - Benaloh October 18, 2 | 2005-10-18 |
Systems and methods for compression of key sets having multiple keys App 20050193210 - Benaloh, Josh D. | 2005-09-01 |
Transferring application secrets in a trusted operating system environment App 20050144447 - England, Paul ;   et al. | 2005-06-30 |
Transferring application secrets in a trusted operating system environment App 20050144448 - England, Paul ;   et al. | 2005-06-30 |
Use of hashing in a secure boot loader App 20050138270 - Morais, Dinarte ;   et al. | 2005-06-23 |
Use of hashing in a secure boot loader Grant 6,907,522 - Morais , et al. June 14, 2 | 2005-06-14 |
Systems and methods for compression of key sets having multiple keys App 20050117746 - Benaloh, Josh D. | 2005-06-02 |
Key compression App 20050094813 - Benaloh, Josh D. | 2005-05-05 |
Extraction of multiple single keys from a compressed key App 20050097063 - Benaloh, Josh D. | 2005-05-05 |
Key generation App 20050097062 - Benaloh, Josh D. | 2005-05-05 |
Systems and methods for compression of key sets having multiple keys Grant 6,886,098 - Benaloh April 26, 2 | 2005-04-26 |
User access to a unique data subset of a database App 20050065889 - Benaloh, Josh D. | 2005-03-24 |
Data signal with a database and a compressed key App 20050065888 - Benaloh, Josh D. | 2005-03-24 |
Encrypted content data stracture package and generation thereof App 20050065890 - Benaloh, Josh D. | 2005-03-24 |
Exclusive encryption App 20050066185 - Douceur, John R. ;   et al. | 2005-03-24 |
Exclusive encryption App 20050066184 - Douceur, John R. ;   et al. | 2005-03-24 |
Exclusive encryption App 20050066183 - Douceur, John R. ;   et al. | 2005-03-24 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption App 20040146015 - Cross, David B. ;   et al. | 2004-07-29 |
System and method for providing program credentials App 20040003081 - Justus, Dean Jason ;   et al. | 2004-01-01 |
Selectively disclosable digital certificates App 20030233542 - Benaloh, Josh D. | 2003-12-18 |
Use of hashing in a secure boot loader App 20030229777 - Morais, Dinarte ;   et al. | 2003-12-11 |
Manifest-based trusted agent management in a trusted operating system environment App 20030097579 - England, Paul ;   et al. | 2003-05-22 |
Transferring application secrets in a trusted operating system environment App 20030097558 - England, Paul ;   et al. | 2003-05-22 |
Operating system upgrades in a trusted operating system environment App 20030097578 - England, Paul ;   et al. | 2003-05-22 |
Exclusive encryption App 20020095590 - Douceur, John R. ;   et al. | 2002-07-18 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.