loadpatents
name:-0.048993825912476
name:-0.032454967498779
name:-0.013842821121216
Dayka; John C. Patent Filings

Dayka; John C.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Dayka; John C..The latest application filed is for "batched execution of encryption operations".

Company Profile
15.38.42
  • Dayka; John C. - New Paltz NY
  • Dayka; John C. - Poughkeepsie NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Implementing a separation of duties for container security
Grant 11,095,652 - Lewis , et al. August 17, 2
2021-08-17
Secure processing environment for protecting sensitive information
Grant 10,904,226 - Boivie , et al. January 26, 2
2021-01-26
Batched execution of encryption operations
Grant 10,903,979 - Jordan , et al. January 26, 2
2021-01-26
Batched Execution Of Encryption Operations
App 20200177370 - Jordan; Michael J. ;   et al.
2020-06-04
Cross-site request forgery (CSRF) prevention
Grant 10,652,244 - Dayka , et al.
2020-05-12
Secure Processing Environment For Protecting Sensitive Information
App 20200092267 - Boivie; Richard H. ;   et al.
2020-03-19
Secure processing environment for protecting sensitive information
Grant 10,547,596 - Boivie , et al. Ja
2020-01-28
Secure processing environment for protecting sensitive information
Grant 10,523,640 - Boivie , et al. Dec
2019-12-31
Implementing A Separation Of Duties For Container Security
App 20190260753 - Lewis; Cecilia C. ;   et al.
2019-08-22
Implementing Policy-based Container-level Encryption
App 20190258813 - Lewis; Cecilia C. ;   et al.
2019-08-22
Multi-level security enforcement utilizing data typing
Grant 10,389,727 - Dayka , et al. A
2019-08-20
Multi-level security enforcement utilizing data typing
Grant 10,389,728 - Dayka , et al. A
2019-08-20
Secure Processing Environment For Protecting Sensitive Information
App 20190230069 - Boivie; Richard H. ;   et al.
2019-07-25
Secure processing environment for protecting sensitive information
Grant 10,298,545 - Boivie , et al.
2019-05-21
Secure Processing Environment For Protecting Sensitive Information
App 20190116164 - Boivie; Richard H. ;   et al.
2019-04-18
Establishing a chain of trust in a system log
Grant 10,229,151 - Dayka , et al.
2019-03-12
Secure processing environment for protecting sensitive information
Grant 10,158,607 - Boivie , et al. Dec
2018-12-18
Multi-level security enforcement utilizing data typing
Grant 10,110,611 - Dayka , et al. October 23, 2
2018-10-23
Multi-level Security Enforcement Utilizing Data Typing
App 20180227310 - DAYKA; John C. ;   et al.
2018-08-09
End-to end protection for shrouded virtual servers
Grant 9,998,459 - Alexander , et al. June 12, 2
2018-06-12
Multi-level Security Enforcement Utilizing Data Typing
App 20180152423 - DAYKA; John C. ;   et al.
2018-05-31
Multi-level security enforcement utilizing data typing
Grant 9,973,480 - Dayka , et al. May 15, 2
2018-05-15
Cross-site Request Forgery (csrf) Prevention
App 20180097813 - Dayka; John C. ;   et al.
2018-04-05
Establishing a chain of trust in a system log
Grant 9,922,069 - Dayka , et al. March 20, 2
2018-03-20
End-to-end Protection For Shrouded Virtual Servers
App 20180063136 - Alexander; Khary J. ;   et al.
2018-03-01
Cross-site request forgery (CSRF) prevention
Grant 9,906,531 - Dayka , et al. February 27, 2
2018-02-27
Cross-site request forgery (CSRF) prevention
Grant 9,906,517 - Dayka , et al. February 27, 2
2018-02-27
End-to-end protection for shrouded virtual servers
Grant 9,882,901 - Alexander , et al. January 30, 2
2018-01-30
Secure format-preserving encryption of data fields
Grant 9,858,436 - Arnold , et al. January 2, 2
2018-01-02
Secure format-preserving encryption of data fields
Grant 9,798,893 - Arnold , et al. October 24, 2
2017-10-24
Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services
Grant 9,729,327 - Dayka , et al. August 8, 2
2017-08-08
Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services
Grant 9,722,797 - Dayka , et al. August 1, 2
2017-08-01
End-to-end Protection For Shrouded Virtual Servers
App 20170171197 - Alexander; Khary J. ;   et al.
2017-06-15
Cross-site Request Forgery (csrf) Prevention
App 20170149768 - Dayka; John C. ;   et al.
2017-05-25
Cross-site Request Forgery (csrf) Prevention
App 20170149783 - Dayka; John C. ;   et al.
2017-05-25
Multi-level Security Enforcement Utilizing Data Typing
App 20170093818 - Dayka; John C. ;   et al.
2017-03-30
Multi-level Security Enforcement Utilizing Data Typing
App 20170093879 - Dayka; John C. ;   et al.
2017-03-30
Detection of deleted records in a secure record management environment
Grant 9,471,119 - Dayka , et al. October 18, 2
2016-10-18
Establishing A Chain Of Trust In A System Log
App 20160275129 - Dayka; John C. ;   et al.
2016-09-22
Establishing A Chain Of Trust In A System Log
App 20160275128 - Dayka; John C. ;   et al.
2016-09-22
Secure Format-preserving Encryption Of Data Fields
App 20160224802 - Arnold; Todd W. ;   et al.
2016-08-04
Secure Format-preserving Encryption Of Data Fields
App 20160224795 - Arnold; Todd W. ;   et al.
2016-08-04
Scalable precomputation system for host-opaque processing of encrypted databases
Grant 9,268,952 - Dayka , et al. February 23, 2
2016-02-23
High-frequency entropy extraction from timing jitter
Grant 9,268,974 - Dayka , et al. February 23, 2
2016-02-23
Scalable, highly available, dynamically reconfigurable cryptographic provider with quality-of-service control built from commodity backend providers
Grant 9,251,338 - Dayka , et al. February 2, 2
2016-02-02
Scalable precomputation system for host-opaque processing of encrypted databases
Grant 9,251,357 - Dayka , et al. February 2, 2
2016-02-02
Scalable, highly available, dynamically reconfigurable cryptographic provider with quality-of-service control built from commodity backend providers
Grant 9,251,337 - Dayka , et al. February 2, 2
2016-02-02
Secure Processing Environment For Protecting Sensitive Information
App 20160006703 - Boivie; Richard H. ;   et al.
2016-01-07
Detection Of Deleted Records In A Secure Record Management Environment
App 20150333913 - Dayka; John C. ;   et al.
2015-11-19
Encrypted tape access control via challenge-response protocol
Grant 9,141,819 - Bade , et al. September 22, 2
2015-09-22
Computer-based Optimization Of Digital Signature Generation For Records Based On Eventual Selection Criteria For Products And Services
App 20150121081 - Dayka; John C. ;   et al.
2015-04-30
Computer-based Optimization Of Digital Signature Generation For Records Based On Eventual Selection Criteria For Products And Services
App 20150121080 - Dayka; John C. ;   et al.
2015-04-30
Secure Processing Environment For Protecting Sensitive Information
App 20150074392 - Boivie; Richard H. ;   et al.
2015-03-12
Scalable Precomputation System For Host-opaque Processing Of Encrypted Databases
App 20150019877 - Dayka; John C. ;   et al.
2015-01-15
Scalable Precomputation System For Host-opaque Processing Of Encrypted Databases
App 20140237257 - Dayka; John C. ;   et al.
2014-08-21
Integrated key server
Grant 8,582,778 - Chencinski , et al. November 12, 2
2013-11-12
Secure Transport Of Domain-specific Cryptographic Structures Over General Purpose Application Program Interfaces
App 20130108052 - Dayka; John C. ;   et al.
2013-05-02
High-frequency Entropy Extraction From Timing Jitter
App 20130090903 - Dayka; John C. ;   et al.
2013-04-11
Scalable, Highly Available, Dynamically Reconfigurable Cryptographic Provider With Quality-of-service Control Built From Commodity Backend Providers
App 20130055295 - Dayka; John C. ;   et al.
2013-02-28
Integrated Key Server
App 20120308011 - Chencinski; Edward W. ;   et al.
2012-12-06
Scalable, Highly Available, Dynamically Reconfigurable Cryptographic Provider With Quality-of-service Control Built From Commodity Backend Providers
App 20120278820 - Dayka; John C. ;   et al.
2012-11-01
Secure Transport Of Domain-specific Cryptographic Structures Over General Purpose Application Program Interfaces
App 20120177202 - Dayka; John C. ;   et al.
2012-07-12
High-Frequency Entropy Extraction From Timing Jitter
App 20110144969 - Dayka; John C. ;   et al.
2011-06-16
Authenticated identity propagation and translation within a multiple computing unit environment
Grant 7,822,980 - Botz , et al. October 26, 2
2010-10-26
Method and Apparatus for Transitive Program Verification
App 20100037065 - Dayka; John C. ;   et al.
2010-02-11
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
Grant 7,617,393 - Betz , et al. November 10, 2
2009-11-10
Encrypted Tape Access Control via Challenge-Response Protocol
App 20080123863 - BADE; STEVEN A. ;   et al.
2008-05-29
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
Grant 7,302,569 - Betz , et al. November 27, 2
2007-11-27
Implementation And Use Of Pii Data Access Control Facility Employing Personally Identifying Information Labels And Purpose Serving Function Sets
App 20070250913 - Betz; Linda ;   et al.
2007-10-25
Authenticated Identity Propagation And Translation Within A Multiple Computing Unit Environment
App 20060288228 - Botz; Patrick S. ;   et al.
2006-12-21
Password exposure elimination for digital signature coupling with a host identity
Grant 7,143,285 - Gindin , et al. November 28, 2
2006-11-28
Password exposure elimination for digital signature coupling with a host identity
Grant 7,139,911 - Sweeny , et al. November 21, 2
2006-11-21
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
App 20050044409 - Betz, Linda ;   et al.
2005-02-24
Identifying users of network environments
App 20040250140 - Chavis, Ira L. ;   et al.
2004-12-09
Authenticated identity translation within a multiple computing unit environment
App 20030177388 - Botz, Patrick S. ;   et al.
2003-09-18
Password exposure elimination for digital signature coupling with a host identity
App 20030009662 - Gindin, Thomas L. ;   et al.
2003-01-09
Password exposure elimination for digital signature coupling with a host identity
App 20020144107 - Sweeny, James W. ;   et al.
2002-10-03

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed