loadpatents
name:-0.050726890563965
name:-0.032608985900879
name:-0.0045580863952637
Boneh; Dan Patent Filings

Boneh; Dan

Patent Applications and Registrations

Patent applications and USPTO patent grants for Boneh; Dan.The latest application filed is for "blockchain system for confidential and anonymous smart contracts".

Company Profile
4.28.31
  • Boneh; Dan - Stanford CA
  • Boneh; Dan - San Francisco CA
  • Boneh; Dan - Palo Alto CA
  • Boneh; Dan - Palo Alo CA
  • Boneh, Dan - US
  • Boneh; Dan - Chatham NJ
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Blockchain System For Confidential And Anonymous Smart Contracts
App 20220129884 - Agrawal; Shashank ;   et al.
2022-04-28
Blockchain system for confidential and anonymous smart contracts
Grant 11,257,077 - Agrawal , et al. February 22, 2
2022-02-22
Consensus Layer Architecture For Maintaining Security With Reduced Processing Power Dependency In Untrusted Decentralized Computing Platforms
App 20220045860 - Boneh; Dan ;   et al.
2022-02-10
Consensus Layer Architecture For Maintaining Security With Reduced Processing Power Dependency In Untrusted Decentralized Computing Platforms
App 20220029811 - Boneh; Dan ;   et al.
2022-01-27
Consensus layer architecture for maintaining security with reduced processing power dependency in untrusted decentralized computing platforms
Grant 11,165,582 - Boneh , et al. November 2, 2
2021-11-02
Consensus Layer Architecture For Maintaining Security With Reduced Processing Power Dependency In Untrusted Decentralized Computing Platforms
App 20200389312 - Boneh; Dan ;   et al.
2020-12-10
Blockchain System For Confidential And Anonymous Smart Contracts
App 20190164153 - Agrawal; Shashank ;   et al.
2019-05-30
Cryptographic multi-shadowing with integrity verification
Grant 10,169,253 - Chen , et al. J
2019-01-01
Cryptographic Multi-shadowing With Integrity Verification
App 20170344496 - CHEN; Xiaoxin ;   et al.
2017-11-30
Cryptographic multi-shadowing with integrity verification
Grant 9,740,637 - Chen , et al. August 22, 2
2017-08-22
Cryptographic Multi-shadowing With Integrity Verification
App 20170185531 - CHEN; Xiaoxin ;   et al.
2017-06-29
Splicing resistant homomorphic passcode encryption
Grant 9,646,306 - Quigley , et al. May 9, 2
2017-05-09
Systems and methods for identity-based encryption and related cryptographic techniques
Grant 9,356,779 - Boneh , et al. May 31, 2
2016-05-31
Cryptographic Multi-shadowing With Integrity Verification
App 20150100791 - CHEN; Xiaoxin ;   et al.
2015-04-09
System for analyzing mobile browser energy consumption
Grant 8,971,819 - Nicoara , et al. March 3, 2
2015-03-03
Activation and security of software
Grant 8,839,451 - Lam , et al. September 16, 2
2014-09-16
Cryptographic multi-shadowing with integrity verification
Grant 8,555,081 - Chen , et al. October 8, 2
2013-10-08
Method and apparatus for using navigation signal information for geoencryption to enhance security
Grant 8,391,488 - Qiu , et al. March 5, 2
2013-03-05
System For Analyzing Mobile Browser Energy Consumption
App 20120322387 - Nicoara; Angela ;   et al.
2012-12-20
Identity-based-encryption system
Grant 8,320,559 - Boneh , et al. November 27, 2
2012-11-27
Geosecurity methods and devices using geotags derived from noisy location data from multiple sources
Grant 8,315,389 - Qiu , et al. November 20, 2
2012-11-20
Method and System for Communication Between Devices
App 20120159604 - Bojinov; Hristo ;   et al.
2012-06-21
Systems and Methods for Identity-Based Encryption and Related Cryptographic Techniques
App 20120159188 - Boneh; Dan ;   et al.
2012-06-21
Systems and methods for identity-based encryption and related cryptographic techniques
Grant 8,130,964 - Boneh , et al. March 6, 2
2012-03-06
Method and system for deriving location information from utility lines
Grant 8,120,533 - Lo , et al. February 21, 2
2012-02-21
Geosecurity methods and devices using geotags derived from noisy location data from multiple sources
App 20110181470 - Qiu; Di ;   et al.
2011-07-28
Method and apparatus for tracing the source of decryption keys used by a decoder
Grant 7,970,141 - Boneh , et al. June 28, 2
2011-06-28
Systems and methods for identity-based encryption and related cryptographic techniques
App 20100208895 - Boneh; Dan ;   et al.
2010-08-19
Method and apparatus for transparent encryption
Grant 7,757,278 - Boneh , et al. July 13, 2
2010-07-13
Method And Apparatus For Using Navigation Signal Information For Geoencryption To Enhance Security
App 20090316900 - QIU; Di ;   et al.
2009-12-24
Systems and methods for identity-based encryption and related cryptographic techniques
Grant 7,634,087 - Boneh , et al. December 15, 2
2009-12-15
Identity-based-encryption system
Grant 7,590,236 - Boneh , et al. September 15, 2
2009-09-15
Cryptographic pairing-based short signature generation and verification
Grant 7,587,605 - Venkatesan , et al. September 8, 2
2009-09-08
Cryptographic Multi-shadowing With Integrity Verification
App 20090113216 - CHEN; Xiaoxin ;   et al.
2009-04-30
Systems and methods for identity-based encryption and related cryptographic techniques
App 20090034714 - Boneh; Dan ;   et al.
2009-02-05
Secure Network Switching Infrastructure
App 20080189769 - Casado; Martin ;   et al.
2008-08-07
Delegation system for decryption rights
App 20080170701 - Matsuo; Toshihiko ;   et al.
2008-07-17
Method And System For Deriving Location Information From Utility Lines
App 20080079631 - Lo; Sherman Chih ;   et al.
2008-04-03
Method And Apparatus For Tracing The Source Of Decryption Keys Used By A Decoder
App 20080075287 - Boneh; Dan ;   et al.
2008-03-27
Systems and methods for identity-based encryption and related cryptographic techniques
App 20070041583 - Boneh; Dan ;   et al.
2007-02-22
Method and system for caching secure web content
Grant 7,137,143 - Chawla , et al. November 14, 2
2006-11-14
Systems and methods for identity-based encryption and related cryptographic techniques
Grant 7,113,594 - Boneh , et al. September 26, 2
2006-09-26
Method of using transient faults to verify the security of a cryptosystem
Grant 6,965,673 - Boneh , et al. November 15, 2
2005-11-15
Methods and apparatuses for providing blind digital signatures using curve-based cryptography
App 20050018851 - Venkatesan, Ramarathnam ;   et al.
2005-01-27
Methods and apparatuses for providing short digital signatures using curve-based cryptography
App 20050018850 - Venkatesan, Ramarathnam ;   et al.
2005-01-27
Client-side inspection and processing of secure content
App 20040015725 - Boneh, Dan ;   et al.
2004-01-22
Systems and methods for identity-based encryption and related cryptographic techniques
App 20030081785 - Boneh, Dan ;   et al.
2003-05-01
Method and apparatus for transparent encryption
App 20020112167 - Boneh, Dan ;   et al.
2002-08-15
Method and apparatus for enhancing network security protection server performance
App 20020087884 - Shacham, Hovav ;   et al.
2002-07-04
Method and apparatus for batched network security protection server performance
App 20020039420 - Shacham, Hovav ;   et al.
2002-04-04
Method and system for caching secure web content
App 20020016911 - Chawla, Rajeev ;   et al.
2002-02-07
Lightweight Word-oriented Technique For Generating A Pseudo-random Sequence For Use In A Keystream Of A Stream Cipher
App 20020006195 - VENKATESAN, RAMARATHNAM R. ;   et al.
2002-01-17
Method for revoking computer backup files using cryptographic techniques
Grant 6,134,660 - Boneh , et al. October 17, 2
2000-10-17
Company Registrations

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed