loadpatents
name:-0.031732082366943
name:-0.029444932937622
name:-0.0009920597076416
Cross; David B. Patent Filings

Cross; David B.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Cross; David B..The latest application filed is for "digital identity management".

Company Profile
1.43.34
  • Cross; David B. - Redmond WA
  • Cross; David B. - Chappaqua NY US
  • Cross; David B. - Caesarea N/A IL
  • Cross; David B. - Los Angeles CA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Digital Identity Management
App 20190123913 - Cross; David B. ;   et al.
2019-04-25
Digital Identity Management
App 20170012784 - Cross; David B. ;   et al.
2017-01-12
Digital identity management
Grant 9,477,832 - Cross , et al. October 25, 2
2016-10-25
Supplement composition for supporting telomere maintenance and protection and method of use
Grant 9,345,733 - Giampapa , et al. May 24, 2
2016-05-24
Vulnerability detection based on aggregated primitives
Grant 9,231,964 - Cross , et al. January 5, 2
2016-01-05
Software image distribution
Grant 8,918,782 - Robinson , et al. December 23, 2
2014-12-23
Digital Identity Management
App 20140366108 - Cross; David B. ;   et al.
2014-12-11
Executable code validation in a web browser
Grant 8,875,285 - Cross , et al. October 28, 2
2014-10-28
Digital identity management
Grant 8,819,797 - Cross , et al. August 26, 2
2014-08-26
Systems and methods for managing multiple keys for file encryption and decryption
Grant 8,798,272 - Cross , et al. August 5, 2
2014-08-05
Denial of service attack resistant input port
Grant 8,739,250 - Holmes , et al. May 27, 2
2014-05-27
Selecting security offerings
Grant 8,707,439 - Holostov , et al. April 22, 2
2014-04-22
File system operation and digital rights management (DRM)
Grant 8,640,256 - Cross , et al. January 28, 2
2014-01-28
Selective authorization based on authentication input attributes
Grant 8,621,561 - Cross , et al. December 31, 2
2013-12-31
Software authorization utilizing software reputation
Grant 8,615,801 - Cross , et al. December 24, 2
2013-12-24
Operating system experience states
Grant 8,495,355 - Cross , et al. July 23, 2
2013-07-23
Denial Of Service Attack Resistant Input Port
App 20130145428 - HOLMES; Lee ;   et al.
2013-06-06
Software Image Distribution
App 20120304167 - Robinson; Ian W. ;   et al.
2012-11-29
Operating System Experience States
App 20120221844 - Cross; David B. ;   et al.
2012-08-30
Digital Identity Management
App 20120174200 - Cross; David B. ;   et al.
2012-07-05
File System Operation And Digital Rights Management (drm)
App 20120117662 - Cross; David B. ;   et al.
2012-05-10
Digital identity management
Grant 8,151,332 - Cross , et al. April 3, 2
2012-04-03
Labeling of data objects to apply and enforce policies
Grant 8,127,133 - Cross , et al. February 28, 2
2012-02-28
File system operation and digital rights management (DRM)
Grant 8,117,666 - Cross , et al. February 14, 2
2012-02-14
Multi-factor content protection
Grant 8,059,820 - Malaviarachchi , et al. November 15, 2
2011-11-15
Systems and methods for managing multiple keys for file encryption and decryption
Grant 8,045,714 - Cross , et al. October 25, 2
2011-10-25
Executable Code Validation In A Web Browser
App 20110239288 - Cross; David B. ;   et al.
2011-09-29
Credential roaming in electronic computing systems
Grant 7,984,488 - Cross , et al. July 19, 2
2011-07-19
Systems And Methods For Managing Multiple Keys For File Encryption And Decryption
App 20110085664 - Cross; David B. ;   et al.
2011-04-14
Efficient retrieval of cryptographic evidence
Grant 7,818,575 - Cross , et al. October 19, 2
2010-10-19
Vulnerability Detection Based On Aggregated Primitives
App 20100263049 - Cross; David B. ;   et al.
2010-10-14
Biometric credential verification framework
App 20100242102 - Cross; David B. ;   et al.
2010-09-23
Organizing scenario-related information and controlling access thereto
Grant 7,797,311 - Kurien , et al. September 14, 2
2010-09-14
Selecting Security Offerings
App 20100162346 - Holostov; Vladimir ;   et al.
2010-06-24
Digital identity management
Grant 7,703,128 - Cross , et al. April 20, 2
2010-04-20
System and method for protected operating system boot using state validation
Grant 7,694,121 - Willman , et al. April 6, 2
2010-04-06
Automatically Distributed Network Protection
App 20100011432 - Edery; Yigal ;   et al.
2010-01-14
Selective Authorization Based On Authentication Input Attributes
App 20090178129 - Cross; David B. ;   et al.
2009-07-09
Multi-factor Content Protection
App 20090097660 - Malaviarachchi; Rushmi U. ;   et al.
2009-04-16
User mapping information extension for protocols
Grant 7,434,253 - Crall , et al. October 7, 2
2008-10-07
Organizing Scenario-related Information And Controlling Access Thereto
App 20080235229 - Kurien; Thekkthalackal Varugis ;   et al.
2008-09-25
File System Operation and Digital Rights Management (DRM)
App 20080235807 - Cross; David B. ;   et al.
2008-09-25
Labeling Of Data Objects To Apply And Enforce Policies
App 20080184329 - Cross; David B. ;   et al.
2008-07-31
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,382,883 - Cross , et al. June 3, 2
2008-06-03
File system operation and digital rights management (DRM)
Grant 7,383,586 - Cross , et al. June 3, 2
2008-06-03
BIOS integrated encryption
Grant 7,376,968 - Ritz , et al. May 20, 2
2008-05-20
Software authorization utilizing software reputation
App 20080072049 - Cross; David B. ;   et al.
2008-03-20
Encryption of system paging file
Grant 7,325,115 - Leis , et al. January 29, 2
2008-01-29
System, method, and computer program product for file encryption, decryption and transfer
Grant 7,280,956 - Cross , et al. October 9, 2
2007-10-09
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption
App 20070088947 - Cross; David B. ;   et al.
2007-04-19
Digital Identity Management
App 20070055887 - Cross; David B. ;   et al.
2007-03-08
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,181,016 - Cross , et al. February 20, 2
2007-02-20
User mapping information extension for protocols
App 20070016782 - Crall; Christopher J. ;   et al.
2007-01-18
Efficient retrieval of cryptographic evidence
App 20060294576 - Cross; David B. ;   et al.
2006-12-28
Systems and methods for managing multiple keys for file encryption and decryption
App 20060179309 - Cross; David B. ;   et al.
2006-08-10
System and method for protected operating system boot using state validation
App 20060005034 - Willman; Bryan Mark ;   et al.
2006-01-05
Credential roaming
App 20050257072 - Cross, David B. ;   et al.
2005-11-17
BIOS integrated encryption
App 20050111664 - Ritz, Andrew J. ;   et al.
2005-05-26
Encryption of system paging file
App 20050114688 - Leis, Benjamin A. ;   et al.
2005-05-26
System, method, and computer program product for file encrypton, decryption and transfer
App 20050091487 - Cross, David B. ;   et al.
2005-04-28
Digital identity management
App 20040162786 - Cross, David B. ;   et al.
2004-08-19
Deriving a symmetric key from an asymmetric key for file encryption or decryption
App 20040146015 - Cross, David B. ;   et al.
2004-07-29
File system operation and digital rights management (DRM)
App 20040143736 - Cross, David B. ;   et al.
2004-07-22
Off-axis application of concave spherical reflectors as condensing and collecting optics
Grant 4,757,431 - Cross , et al. July 12, 1
1988-07-12

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed