loadpatents
name:-0.073868989944458
name:-0.080009937286377
name:-0.00075888633728027
Ellison; Carl M. Patent Filings

Ellison; Carl M.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ellison; Carl M..The latest application filed is for "random number generation failure detection and entropy estimation".

Company Profile
0.80.52
  • Ellison; Carl M. - Seattle WA
  • Ellison; Carl M. - New York NY
  • Ellison; Carl M. - Medina WA US
  • Ellison; Carl M. - Portland OR
  • Ellison; Carl M. - Baltimore MD
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Entropy pools for virtual machines
Grant 9,495,190 - Ellison , et al. November 15, 2
2016-11-15
Integrity protected smart card transaction
Grant 9,305,156 - Thom , et al. April 5, 2
2016-04-05
Transformation of sequential access control lists utilizing certificates
Grant 9,253,195 - Ellison , et al. February 2, 2
2016-02-02
Distributed algorithm for changing a shared value
Grant 9,106,629 - Ellison , et al. August 11, 2
2015-08-11
Random Number Generation Failure Detection and Entropy Estimation
App 20150207632 - Ellison; Carl M.
2015-07-23
Integrity protected smart card transaction
Grant 9,075,980 - Thom , et al. July 7, 2
2015-07-07
Cryptographic key management
Grant 9,058,497 - Bharadwaj , et al. June 16, 2
2015-06-16
Integrity Protected Smart Card Transaction
App 20150149782 - Thom; Stefan ;   et al.
2015-05-28
Random number generation failure detection and entropy estimation
Grant 9,026,571 - Ellison May 5, 2
2015-05-05
Integrity protected smart card transaction
Grant 8,966,269 - Thom , et al. February 24, 2
2015-02-24
Communication channel claim dependent security precautions
Grant 8,914,874 - Ureche , et al. December 16, 2
2014-12-16
Resource access based on multiple credentials
Grant 8,904,509 - Barbour , et al. December 2, 2
2014-12-02
Constraining a login to a subset of access rights
Grant 8,875,258 - Michener , et al. October 28, 2
2014-10-28
Communication channel access based on channel identifier and use policy
Grant 8,838,981 - Ureche , et al. September 16, 2
2014-09-16
Cryptographic Key Management
App 20140108814 - Bharadwaj; Vijay G. ;   et al.
2014-04-17
Portable secure data files
Grant 8,689,015 - Jeffries , et al. April 1, 2
2014-04-01
Cryptographic key containers on a USB token
Grant 8,588,421 - Acar , et al. November 19, 2
2013-11-19
Integrity Protected Smart Card Transaction
App 20130290724 - Thom; Stefan ;   et al.
2013-10-31
Transformation of Sequential Access Control Lists Utilizing Certificates
App 20130283342 - Ellison; Carl M. ;   et al.
2013-10-24
Resource Access Based on Multiple Credentials
App 20130205382 - Barbour; Marc R. ;   et al.
2013-08-08
Integrity protected smart card transaction
Grant 8,504,838 - Thom , et al. August 6, 2
2013-08-06
Integrity protected smart card transaction
Grant 8,495,374 - Thom , et al. July 23, 2
2013-07-23
Constraining A Login To A Subset Of Access Rights
App 20130167205 - Michener; John R. ;   et al.
2013-06-27
Portable Secure Data Files
App 20130145178 - Jeffries; Charles G. ;   et al.
2013-06-06
Integrity protected smart card transaction
Grant 8,423,774 - Thom , et al. April 16, 2
2013-04-16
Resource access based on multiple credentials
Grant 8,418,237 - Barbour , et al. April 9, 2
2013-04-09
Constraining a login to a subset of access rights
Grant 8,381,279 - Michener , et al. February 19, 2
2013-02-19
Portable secure data files
Grant 8,364,984 - Jeffries , et al. January 29, 2
2013-01-29
Communication Channel Access Based On Channel Identifier And Use Policy
App 20130007463 - Ureche; Octavian T. ;   et al.
2013-01-03
Managing group keys
Grant 8,325,924 - Acar , et al. December 4, 2
2012-12-04
Communication channel access based on channel identifier and use policy
Grant 8,296,564 - Ureche , et al. October 23, 2
2012-10-23
Migration of computer secrets
Grant 8,208,637 - Ellison June 26, 2
2012-06-26
Storage device controlled access
Grant 8,046,593 - Ellison , et al. October 25, 2
2011-10-25
Domain ID service
Grant 8,006,295 - Ellison , et al. August 23, 2
2011-08-23
Integrity Protected Smart Card Transaction
App 20110176682 - Thom; Stefan ;   et al.
2011-07-21
Integrity Protected Smart Card Transaction
App 20110179283 - Thom; Stefan ;   et al.
2011-07-21
Integrity Protected Smart Card Transaction
App 20110179282 - Thom; Stefan ;   et al.
2011-07-21
Determining the reputation of a sender of communications
Grant 7,979,703 - Ellison , et al. July 12, 2
2011-07-12
Integrity protected smart card transaction
Grant 7,934,096 - Thom , et al. April 26, 2
2011-04-26
Resource Access Based On Multiple Credentials
App 20110093939 - Barbour; Marc R. ;   et al.
2011-04-21
Weighted entropy pool service
Grant 7,930,332 - Acar , et al. April 19, 2
2011-04-19
Entropy Pools for Virtual Machines
App 20110047545 - Ellison; Carl M. ;   et al.
2011-02-24
Distributed Algorithm For Changing A Shared Value
App 20110047202 - ELLISON; CARL M. ;   et al.
2011-02-24
Communication Channel Claim Dependent Security Precautions
App 20110019820 - Ureche; Octavian T. ;   et al.
2011-01-27
Public key media key block
Grant 7,845,015 - Ellison , et al. November 30, 2
2010-11-30
Portable Secure Data Files
App 20100235649 - Jeffries; Charles G. ;   et al.
2010-09-16
Communication Channel Access Based On Channel Identifier And Use Policy
App 20100211792 - Ureche; Octavian T. ;   et al.
2010-08-19
Managing Group Keys
App 20100208898 - Acar; Tolga ;   et al.
2010-08-19
Constraining A Login To A Subset Of Access Rights
App 20100212002 - Michener; John R. ;   et al.
2010-08-19
Random Number Generation Failure Detection And Entropy Estimation
App 20100106756 - Ellison; Carl M.
2010-04-29
Machine-readable End User License Agreement With Automated Acceptance
App 20090265180 - Ellison; Carl M. ;   et al.
2009-10-22
Conditional activation of security policies
Grant 7,591,002 - Shelest , et al. September 15, 2
2009-09-15
Migration Of Computer Secrets
App 20090154709 - Ellison; Carl M.
2009-06-18
Platform and method for establishing provable identities while maintaining privacy
Grant 7,516,330 - Ellison , et al. April 7, 2
2009-04-07
Integrity Protected Smart Card Transaction
App 20090031408 - Thom; Stefan ;   et al.
2009-01-29
Domain Id Service
App 20090007247 - Ellison; Carl M. ;   et al.
2009-01-01
Weighted Entropy Pool Service
App 20080256151 - Acar; Tolga ;   et al.
2008-10-16
Model-based Access Control
App 20080244736 - Lampson; Butler ;   et al.
2008-10-02
Cryptographic Key Containers On A Usb Token
App 20080181412 - Acar; Tolga ;   et al.
2008-07-31
Protecting software environment in isolated execution
Grant 7,380,278 - Ellison , et al. May 27, 2
2008-05-27
Public Key Media Key Block
App 20080075284 - Ellison; Carl M. ;   et al.
2008-03-27
Methods and apparatus to provide secure firmware storage and service access
Grant 7,328,340 - Zimmer , et al. February 5, 2
2008-02-05
Storage device controlled access
App 20080022132 - Ellison; Carl M. ;   et al.
2008-01-24
Public key media key block
Grant 7,305,711 - Ellison , et al. December 4, 2
2007-12-04
Platform and method for remote attestation of a platform
Grant 7,254,707 - Herbert , et al. August 7, 2
2007-08-07
Time varying presentation of items based on a key hash
Grant 7,246,235 - Ellison , et al. July 17, 2
2007-07-17
Sensory verification of shared data
Grant 7,243,231 - Ellison , et al. July 10, 2
2007-07-10
Human interactive proof with authentication
App 20070101010 - Ellison; Carl M. ;   et al.
2007-05-03
Determining the reputation of a sender of communications
App 20070086592 - Ellison; Carl M. ;   et al.
2007-04-19
Attestation key memory device and bus
Grant 7,194,634 - Ellison , et al. March 20, 2
2007-03-20
Stream cipher having a combiner function with storage based shuffle unit
Grant 7,190,787 - Graunke , et al. March 13, 2
2007-03-13
Conditional activation of security policies
App 20060282876 - Shelest; Art ;   et al.
2006-12-14
Signature set content matching
App 20060259498 - Ellison; Carl M. ;   et al.
2006-11-16
Generating isolated bus cycles for isolated execution
Grant 7,111,176 - Ellison , et al. September 19, 2
2006-09-19
Protecting software environment in isolated execution
App 20060206943 - Ellison; Carl M. ;   et al.
2006-09-14
Attestation Key Memory Device And Bus
App 20060200680 - Ellison; Carl M. ;   et al.
2006-09-07
File checking using remote signing authority via a network
Grant 7,096,497 - Ellison , et al. August 22, 2
2006-08-22
Managing accesses in a processor for isolated execution
Grant 7,089,418 - Ellison , et al. August 8, 2
2006-08-08
Managing a secure environment using a chipset in isolated execution mode
Grant 7,085,935 - Ellison , et al. August 1, 2
2006-08-01
Protecting software environment in isolated execution
Grant 7,082,615 - Ellison , et al. July 25, 2
2006-07-25
Platform and method for generating and utilizing a protected audit log
Grant 7,073,071 - Ellison , et al. July 4, 2
2006-07-04
Platform and method for establishing provable identities while maintaining privacy
App 20060080528 - Ellison; Carl M. ;   et al.
2006-04-13
Managing a secure environment using a chipset in isolated execution mode
Grant 7,013,484 - Ellison , et al. March 14, 2
2006-03-14
Attestation key memory device and bus
Grant 7,013,481 - Ellison , et al. March 14, 2
2006-03-14
Platform and method for issuing and certifying a hardware-protected attestation key
Grant 6,996,710 - Ellison , et al. February 7, 2
2006-02-07
Platform and method for remote attestation of a platform
Grant 6,990,579 - Herbert , et al. January 24, 2
2006-01-24
Platform and method for remote attestation of a platform
App 20060015719 - Herbert; Howard C. ;   et al.
2006-01-19
Platform and method for establishing provable identities while maintaining privacy
Grant 6,976,162 - Ellison , et al. December 13, 2
2005-12-13
Managing a secure platform using a hierarchical executive architecture in isolated execution mode
Grant 6,957,332 - Ellison , et al. October 18, 2
2005-10-18
Managing a secure platform using a hierarchical executive architecture in isolated execution mode
Grant 6,941,458 - Ellison , et al. September 6, 2
2005-09-06
Managing a secure platform using a hierarchical executive architecture in isolated execution mode
App 20050188198 - Ellison, Carl M. ;   et al.
2005-08-25
Controlling access to multiple memory zones in an isolated execution environment
Grant 6,934,817 - Ellison , et al. August 23, 2
2005-08-23
Integrating a device into a secure network
App 20050076217 - Lord, Christopher J. ;   et al.
2005-04-07
Liveness protocol
App 20050021737 - Ellison, Carl M. ;   et al.
2005-01-27
Methods and apparatus to provide secure firmware storage and service access
App 20040268141 - Zimmer, Vincent J. ;   et al.
2004-12-30
Controlling accesses to isolated memory using a memory controller for isolated execution
Grant 6,795,905 - Ellison , et al. September 21, 2
2004-09-21
Resetting a processor in an isolated execution environment
Grant 6,769,058 - Ellison , et al. July 27, 2
2004-07-27
Generating a key hieararchy for use in an isolated execution environment
Grant 6,760,441 - Ellison , et al. July 6, 2
2004-07-06
Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set
Grant 6,754,815 - Ellison , et al. June 22, 2
2004-06-22
Public key media key block
App 20040109569 - Ellison, Carl M. ;   et al.
2004-06-10
System for protecting anonymity of parties involved in a person-to-person electronic commerce transaction
Grant 6,748,366 - Hurwitz , et al. June 8, 2
2004-06-08
Controlling access to multiple memory zones in an isolated execution environment
App 20040078590 - Ellison, Carl M. ;   et al.
2004-04-22
Sensory verification of shared data
App 20040025017 - Ellison, Carl M. ;   et al.
2004-02-05
Controlling access to multiple isolated memories in an isolated execution environment
Grant 6,678,825 - Ellison , et al. January 13, 2
2004-01-13
Controlling access to multiple memory zones in an isolated execution environment
Grant 6,633,963 - Ellison , et al. October 14, 2
2003-10-14
Authenticated public key transmission
App 20030061485 - Smith, Ned M. ;   et al.
2003-03-27
Time varying presentation of items based on a key hash
App 20030014637 - Ellison, Carl M. ;   et al.
2003-01-16
Executing isolated mode instructions in a secure system running in privilege rings
Grant 6,507,904 - Ellison , et al. January 14, 2
2003-01-14
Method and apparatus for authenticating people using business cards
App 20030005298 - Smith, Ned M. ;   et al.
2003-01-02
Method of enforcing authorization in shared processes using electronic contracts
App 20020157004 - Smith, Ned M. ;   et al.
2002-10-24
File checking using remote signing authority via a network
App 20020144140 - Ellison, Carl M. ;   et al.
2002-10-03
Checking file integrity using signature generated in isolated execution
App 20020144121 - Ellison, Carl M. ;   et al.
2002-10-03
System and method for data recovery
Grant 5,991,406 - Lipner , et al. November 23, 1
1999-11-23
System and method for access field verification
Grant 5,956,403 - Lipner , et al. September 21, 1
1999-09-21
System and method for controlling access to a user secret
Grant 5,745,573 - Lipner , et al. April 28, 1
1998-04-28
System and method for access field verification
Grant 5,640,454 - Lipner , et al. June 17, 1
1997-06-17
System and method for key escrow encryption
Grant 5,557,346 - Lipner , et al. September 17, 1
1996-09-17
System and method for data recovery
Grant 5,557,765 - Lipner , et al. September 17, 1
1996-09-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed