loadpatents
Patent applications and USPTO patent grants for Cross; David B..The latest application filed is for "digital identity management".
Patent | Date |
---|---|
Digital Identity Management App 20190123913 - Cross; David B. ;   et al. | 2019-04-25 |
Digital Identity Management App 20170012784 - Cross; David B. ;   et al. | 2017-01-12 |
Digital identity management Grant 9,477,832 - Cross , et al. October 25, 2 | 2016-10-25 |
Supplement composition for supporting telomere maintenance and protection and method of use Grant 9,345,733 - Giampapa , et al. May 24, 2 | 2016-05-24 |
Vulnerability detection based on aggregated primitives Grant 9,231,964 - Cross , et al. January 5, 2 | 2016-01-05 |
Software image distribution Grant 8,918,782 - Robinson , et al. December 23, 2 | 2014-12-23 |
Digital Identity Management App 20140366108 - Cross; David B. ;   et al. | 2014-12-11 |
Executable code validation in a web browser Grant 8,875,285 - Cross , et al. October 28, 2 | 2014-10-28 |
Digital identity management Grant 8,819,797 - Cross , et al. August 26, 2 | 2014-08-26 |
Systems and methods for managing multiple keys for file encryption and decryption Grant 8,798,272 - Cross , et al. August 5, 2 | 2014-08-05 |
Denial of service attack resistant input port Grant 8,739,250 - Holmes , et al. May 27, 2 | 2014-05-27 |
Selecting security offerings Grant 8,707,439 - Holostov , et al. April 22, 2 | 2014-04-22 |
File system operation and digital rights management (DRM) Grant 8,640,256 - Cross , et al. January 28, 2 | 2014-01-28 |
Selective authorization based on authentication input attributes Grant 8,621,561 - Cross , et al. December 31, 2 | 2013-12-31 |
Software authorization utilizing software reputation Grant 8,615,801 - Cross , et al. December 24, 2 | 2013-12-24 |
Operating system experience states Grant 8,495,355 - Cross , et al. July 23, 2 | 2013-07-23 |
Denial Of Service Attack Resistant Input Port App 20130145428 - HOLMES; Lee ;   et al. | 2013-06-06 |
Software Image Distribution App 20120304167 - Robinson; Ian W. ;   et al. | 2012-11-29 |
Operating System Experience States App 20120221844 - Cross; David B. ;   et al. | 2012-08-30 |
Digital Identity Management App 20120174200 - Cross; David B. ;   et al. | 2012-07-05 |
File System Operation And Digital Rights Management (drm) App 20120117662 - Cross; David B. ;   et al. | 2012-05-10 |
Digital identity management Grant 8,151,332 - Cross , et al. April 3, 2 | 2012-04-03 |
Labeling of data objects to apply and enforce policies Grant 8,127,133 - Cross , et al. February 28, 2 | 2012-02-28 |
File system operation and digital rights management (DRM) Grant 8,117,666 - Cross , et al. February 14, 2 | 2012-02-14 |
Multi-factor content protection Grant 8,059,820 - Malaviarachchi , et al. November 15, 2 | 2011-11-15 |
Systems and methods for managing multiple keys for file encryption and decryption Grant 8,045,714 - Cross , et al. October 25, 2 | 2011-10-25 |
Executable Code Validation In A Web Browser App 20110239288 - Cross; David B. ;   et al. | 2011-09-29 |
Credential roaming in electronic computing systems Grant 7,984,488 - Cross , et al. July 19, 2 | 2011-07-19 |
Systems And Methods For Managing Multiple Keys For File Encryption And Decryption App 20110085664 - Cross; David B. ;   et al. | 2011-04-14 |
Efficient retrieval of cryptographic evidence Grant 7,818,575 - Cross , et al. October 19, 2 | 2010-10-19 |
Vulnerability Detection Based On Aggregated Primitives App 20100263049 - Cross; David B. ;   et al. | 2010-10-14 |
Biometric credential verification framework App 20100242102 - Cross; David B. ;   et al. | 2010-09-23 |
Organizing scenario-related information and controlling access thereto Grant 7,797,311 - Kurien , et al. September 14, 2 | 2010-09-14 |
Selecting Security Offerings App 20100162346 - Holostov; Vladimir ;   et al. | 2010-06-24 |
Digital identity management Grant 7,703,128 - Cross , et al. April 20, 2 | 2010-04-20 |
System and method for protected operating system boot using state validation Grant 7,694,121 - Willman , et al. April 6, 2 | 2010-04-06 |
Automatically Distributed Network Protection App 20100011432 - Edery; Yigal ;   et al. | 2010-01-14 |
Selective Authorization Based On Authentication Input Attributes App 20090178129 - Cross; David B. ;   et al. | 2009-07-09 |
Multi-factor Content Protection App 20090097660 - Malaviarachchi; Rushmi U. ;   et al. | 2009-04-16 |
User mapping information extension for protocols Grant 7,434,253 - Crall , et al. October 7, 2 | 2008-10-07 |
Organizing Scenario-related Information And Controlling Access Thereto App 20080235229 - Kurien; Thekkthalackal Varugis ;   et al. | 2008-09-25 |
File System Operation and Digital Rights Management (DRM) App 20080235807 - Cross; David B. ;   et al. | 2008-09-25 |
Labeling Of Data Objects To Apply And Enforce Policies App 20080184329 - Cross; David B. ;   et al. | 2008-07-31 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,382,883 - Cross , et al. June 3, 2 | 2008-06-03 |
File system operation and digital rights management (DRM) Grant 7,383,586 - Cross , et al. June 3, 2 | 2008-06-03 |
BIOS integrated encryption Grant 7,376,968 - Ritz , et al. May 20, 2 | 2008-05-20 |
Software authorization utilizing software reputation App 20080072049 - Cross; David B. ;   et al. | 2008-03-20 |
Encryption of system paging file Grant 7,325,115 - Leis , et al. January 29, 2 | 2008-01-29 |
System, method, and computer program product for file encryption, decryption and transfer Grant 7,280,956 - Cross , et al. October 9, 2 | 2007-10-09 |
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption App 20070088947 - Cross; David B. ;   et al. | 2007-04-19 |
Digital Identity Management App 20070055887 - Cross; David B. ;   et al. | 2007-03-08 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,181,016 - Cross , et al. February 20, 2 | 2007-02-20 |
User mapping information extension for protocols App 20070016782 - Crall; Christopher J. ;   et al. | 2007-01-18 |
Efficient retrieval of cryptographic evidence App 20060294576 - Cross; David B. ;   et al. | 2006-12-28 |
Systems and methods for managing multiple keys for file encryption and decryption App 20060179309 - Cross; David B. ;   et al. | 2006-08-10 |
System and method for protected operating system boot using state validation App 20060005034 - Willman; Bryan Mark ;   et al. | 2006-01-05 |
Credential roaming App 20050257072 - Cross, David B. ;   et al. | 2005-11-17 |
BIOS integrated encryption App 20050111664 - Ritz, Andrew J. ;   et al. | 2005-05-26 |
Encryption of system paging file App 20050114688 - Leis, Benjamin A. ;   et al. | 2005-05-26 |
System, method, and computer program product for file encrypton, decryption and transfer App 20050091487 - Cross, David B. ;   et al. | 2005-04-28 |
Digital identity management App 20040162786 - Cross, David B. ;   et al. | 2004-08-19 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption App 20040146015 - Cross, David B. ;   et al. | 2004-07-29 |
File system operation and digital rights management (DRM) App 20040143736 - Cross, David B. ;   et al. | 2004-07-22 |
Off-axis application of concave spherical reflectors as condensing and collecting optics Grant 4,757,431 - Cross , et al. July 12, 1 | 1988-07-12 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.