loadpatents
Patent applications and USPTO patent grants for Ellison; Carl M..The latest application filed is for "random number generation failure detection and entropy estimation".
Patent | Date |
---|---|
Entropy pools for virtual machines Grant 9,495,190 - Ellison , et al. November 15, 2 | 2016-11-15 |
Integrity protected smart card transaction Grant 9,305,156 - Thom , et al. April 5, 2 | 2016-04-05 |
Transformation of sequential access control lists utilizing certificates Grant 9,253,195 - Ellison , et al. February 2, 2 | 2016-02-02 |
Distributed algorithm for changing a shared value Grant 9,106,629 - Ellison , et al. August 11, 2 | 2015-08-11 |
Random Number Generation Failure Detection and Entropy Estimation App 20150207632 - Ellison; Carl M. | 2015-07-23 |
Integrity protected smart card transaction Grant 9,075,980 - Thom , et al. July 7, 2 | 2015-07-07 |
Cryptographic key management Grant 9,058,497 - Bharadwaj , et al. June 16, 2 | 2015-06-16 |
Integrity Protected Smart Card Transaction App 20150149782 - Thom; Stefan ;   et al. | 2015-05-28 |
Random number generation failure detection and entropy estimation Grant 9,026,571 - Ellison May 5, 2 | 2015-05-05 |
Integrity protected smart card transaction Grant 8,966,269 - Thom , et al. February 24, 2 | 2015-02-24 |
Communication channel claim dependent security precautions Grant 8,914,874 - Ureche , et al. December 16, 2 | 2014-12-16 |
Resource access based on multiple credentials Grant 8,904,509 - Barbour , et al. December 2, 2 | 2014-12-02 |
Constraining a login to a subset of access rights Grant 8,875,258 - Michener , et al. October 28, 2 | 2014-10-28 |
Communication channel access based on channel identifier and use policy Grant 8,838,981 - Ureche , et al. September 16, 2 | 2014-09-16 |
Cryptographic Key Management App 20140108814 - Bharadwaj; Vijay G. ;   et al. | 2014-04-17 |
Portable secure data files Grant 8,689,015 - Jeffries , et al. April 1, 2 | 2014-04-01 |
Cryptographic key containers on a USB token Grant 8,588,421 - Acar , et al. November 19, 2 | 2013-11-19 |
Integrity Protected Smart Card Transaction App 20130290724 - Thom; Stefan ;   et al. | 2013-10-31 |
Transformation of Sequential Access Control Lists Utilizing Certificates App 20130283342 - Ellison; Carl M. ;   et al. | 2013-10-24 |
Resource Access Based on Multiple Credentials App 20130205382 - Barbour; Marc R. ;   et al. | 2013-08-08 |
Integrity protected smart card transaction Grant 8,504,838 - Thom , et al. August 6, 2 | 2013-08-06 |
Integrity protected smart card transaction Grant 8,495,374 - Thom , et al. July 23, 2 | 2013-07-23 |
Constraining A Login To A Subset Of Access Rights App 20130167205 - Michener; John R. ;   et al. | 2013-06-27 |
Portable Secure Data Files App 20130145178 - Jeffries; Charles G. ;   et al. | 2013-06-06 |
Integrity protected smart card transaction Grant 8,423,774 - Thom , et al. April 16, 2 | 2013-04-16 |
Resource access based on multiple credentials Grant 8,418,237 - Barbour , et al. April 9, 2 | 2013-04-09 |
Constraining a login to a subset of access rights Grant 8,381,279 - Michener , et al. February 19, 2 | 2013-02-19 |
Portable secure data files Grant 8,364,984 - Jeffries , et al. January 29, 2 | 2013-01-29 |
Communication Channel Access Based On Channel Identifier And Use Policy App 20130007463 - Ureche; Octavian T. ;   et al. | 2013-01-03 |
Managing group keys Grant 8,325,924 - Acar , et al. December 4, 2 | 2012-12-04 |
Communication channel access based on channel identifier and use policy Grant 8,296,564 - Ureche , et al. October 23, 2 | 2012-10-23 |
Migration of computer secrets Grant 8,208,637 - Ellison June 26, 2 | 2012-06-26 |
Storage device controlled access Grant 8,046,593 - Ellison , et al. October 25, 2 | 2011-10-25 |
Domain ID service Grant 8,006,295 - Ellison , et al. August 23, 2 | 2011-08-23 |
Integrity Protected Smart Card Transaction App 20110176682 - Thom; Stefan ;   et al. | 2011-07-21 |
Integrity Protected Smart Card Transaction App 20110179283 - Thom; Stefan ;   et al. | 2011-07-21 |
Integrity Protected Smart Card Transaction App 20110179282 - Thom; Stefan ;   et al. | 2011-07-21 |
Determining the reputation of a sender of communications Grant 7,979,703 - Ellison , et al. July 12, 2 | 2011-07-12 |
Integrity protected smart card transaction Grant 7,934,096 - Thom , et al. April 26, 2 | 2011-04-26 |
Resource Access Based On Multiple Credentials App 20110093939 - Barbour; Marc R. ;   et al. | 2011-04-21 |
Weighted entropy pool service Grant 7,930,332 - Acar , et al. April 19, 2 | 2011-04-19 |
Distributed Algorithm For Changing A Shared Value App 20110047202 - ELLISON; CARL M. ;   et al. | 2011-02-24 |
Entropy Pools for Virtual Machines App 20110047545 - Ellison; Carl M. ;   et al. | 2011-02-24 |
Communication Channel Claim Dependent Security Precautions App 20110019820 - Ureche; Octavian T. ;   et al. | 2011-01-27 |
Public key media key block Grant 7,845,015 - Ellison , et al. November 30, 2 | 2010-11-30 |
Portable Secure Data Files App 20100235649 - Jeffries; Charles G. ;   et al. | 2010-09-16 |
Communication Channel Access Based On Channel Identifier And Use Policy App 20100211792 - Ureche; Octavian T. ;   et al. | 2010-08-19 |
Managing Group Keys App 20100208898 - Acar; Tolga ;   et al. | 2010-08-19 |
Constraining A Login To A Subset Of Access Rights App 20100212002 - Michener; John R. ;   et al. | 2010-08-19 |
Random Number Generation Failure Detection And Entropy Estimation App 20100106756 - Ellison; Carl M. | 2010-04-29 |
Machine-readable End User License Agreement With Automated Acceptance App 20090265180 - Ellison; Carl M. ;   et al. | 2009-10-22 |
Conditional activation of security policies Grant 7,591,002 - Shelest , et al. September 15, 2 | 2009-09-15 |
Migration Of Computer Secrets App 20090154709 - Ellison; Carl M. | 2009-06-18 |
Platform and method for establishing provable identities while maintaining privacy Grant 7,516,330 - Ellison , et al. April 7, 2 | 2009-04-07 |
Integrity Protected Smart Card Transaction App 20090031408 - Thom; Stefan ;   et al. | 2009-01-29 |
Domain Id Service App 20090007247 - Ellison; Carl M. ;   et al. | 2009-01-01 |
Weighted Entropy Pool Service App 20080256151 - Acar; Tolga ;   et al. | 2008-10-16 |
Model-based Access Control App 20080244736 - Lampson; Butler ;   et al. | 2008-10-02 |
Cryptographic Key Containers On A Usb Token App 20080181412 - Acar; Tolga ;   et al. | 2008-07-31 |
Protecting software environment in isolated execution Grant 7,380,278 - Ellison , et al. May 27, 2 | 2008-05-27 |
Public Key Media Key Block App 20080075284 - Ellison; Carl M. ;   et al. | 2008-03-27 |
Methods and apparatus to provide secure firmware storage and service access Grant 7,328,340 - Zimmer , et al. February 5, 2 | 2008-02-05 |
Storage device controlled access App 20080022132 - Ellison; Carl M. ;   et al. | 2008-01-24 |
Public key media key block Grant 7,305,711 - Ellison , et al. December 4, 2 | 2007-12-04 |
Platform and method for remote attestation of a platform Grant 7,254,707 - Herbert , et al. August 7, 2 | 2007-08-07 |
Time varying presentation of items based on a key hash Grant 7,246,235 - Ellison , et al. July 17, 2 | 2007-07-17 |
Sensory verification of shared data Grant 7,243,231 - Ellison , et al. July 10, 2 | 2007-07-10 |
Human interactive proof with authentication App 20070101010 - Ellison; Carl M. ;   et al. | 2007-05-03 |
Determining the reputation of a sender of communications App 20070086592 - Ellison; Carl M. ;   et al. | 2007-04-19 |
Attestation key memory device and bus Grant 7,194,634 - Ellison , et al. March 20, 2 | 2007-03-20 |
Stream cipher having a combiner function with storage based shuffle unit Grant 7,190,787 - Graunke , et al. March 13, 2 | 2007-03-13 |
Conditional activation of security policies App 20060282876 - Shelest; Art ;   et al. | 2006-12-14 |
Signature set content matching App 20060259498 - Ellison; Carl M. ;   et al. | 2006-11-16 |
Generating isolated bus cycles for isolated execution Grant 7,111,176 - Ellison , et al. September 19, 2 | 2006-09-19 |
Protecting software environment in isolated execution App 20060206943 - Ellison; Carl M. ;   et al. | 2006-09-14 |
Attestation Key Memory Device And Bus App 20060200680 - Ellison; Carl M. ;   et al. | 2006-09-07 |
File checking using remote signing authority via a network Grant 7,096,497 - Ellison , et al. August 22, 2 | 2006-08-22 |
Managing accesses in a processor for isolated execution Grant 7,089,418 - Ellison , et al. August 8, 2 | 2006-08-08 |
Managing a secure environment using a chipset in isolated execution mode Grant 7,085,935 - Ellison , et al. August 1, 2 | 2006-08-01 |
Protecting software environment in isolated execution Grant 7,082,615 - Ellison , et al. July 25, 2 | 2006-07-25 |
Platform and method for generating and utilizing a protected audit log Grant 7,073,071 - Ellison , et al. July 4, 2 | 2006-07-04 |
Platform and method for establishing provable identities while maintaining privacy App 20060080528 - Ellison; Carl M. ;   et al. | 2006-04-13 |
Managing a secure environment using a chipset in isolated execution mode Grant 7,013,484 - Ellison , et al. March 14, 2 | 2006-03-14 |
Attestation key memory device and bus Grant 7,013,481 - Ellison , et al. March 14, 2 | 2006-03-14 |
Platform and method for issuing and certifying a hardware-protected attestation key Grant 6,996,710 - Ellison , et al. February 7, 2 | 2006-02-07 |
Platform and method for remote attestation of a platform Grant 6,990,579 - Herbert , et al. January 24, 2 | 2006-01-24 |
Platform and method for remote attestation of a platform App 20060015719 - Herbert; Howard C. ;   et al. | 2006-01-19 |
Platform and method for establishing provable identities while maintaining privacy Grant 6,976,162 - Ellison , et al. December 13, 2 | 2005-12-13 |
Managing a secure platform using a hierarchical executive architecture in isolated execution mode Grant 6,957,332 - Ellison , et al. October 18, 2 | 2005-10-18 |
Managing a secure platform using a hierarchical executive architecture in isolated execution mode Grant 6,941,458 - Ellison , et al. September 6, 2 | 2005-09-06 |
Managing a secure platform using a hierarchical executive architecture in isolated execution mode App 20050188198 - Ellison, Carl M. ;   et al. | 2005-08-25 |
Controlling access to multiple memory zones in an isolated execution environment Grant 6,934,817 - Ellison , et al. August 23, 2 | 2005-08-23 |
Integrating a device into a secure network App 20050076217 - Lord, Christopher J. ;   et al. | 2005-04-07 |
Liveness protocol App 20050021737 - Ellison, Carl M. ;   et al. | 2005-01-27 |
Methods and apparatus to provide secure firmware storage and service access App 20040268141 - Zimmer, Vincent J. ;   et al. | 2004-12-30 |
Controlling accesses to isolated memory using a memory controller for isolated execution Grant 6,795,905 - Ellison , et al. September 21, 2 | 2004-09-21 |
Resetting a processor in an isolated execution environment Grant 6,769,058 - Ellison , et al. July 27, 2 | 2004-07-27 |
Generating a key hieararchy for use in an isolated execution environment Grant 6,760,441 - Ellison , et al. July 6, 2 | 2004-07-06 |
Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set Grant 6,754,815 - Ellison , et al. June 22, 2 | 2004-06-22 |
Public key media key block App 20040109569 - Ellison, Carl M. ;   et al. | 2004-06-10 |
System for protecting anonymity of parties involved in a person-to-person electronic commerce transaction Grant 6,748,366 - Hurwitz , et al. June 8, 2 | 2004-06-08 |
Controlling access to multiple memory zones in an isolated execution environment App 20040078590 - Ellison, Carl M. ;   et al. | 2004-04-22 |
Sensory verification of shared data App 20040025017 - Ellison, Carl M. ;   et al. | 2004-02-05 |
Controlling access to multiple isolated memories in an isolated execution environment Grant 6,678,825 - Ellison , et al. January 13, 2 | 2004-01-13 |
Controlling access to multiple memory zones in an isolated execution environment Grant 6,633,963 - Ellison , et al. October 14, 2 | 2003-10-14 |
Authenticated public key transmission App 20030061485 - Smith, Ned M. ;   et al. | 2003-03-27 |
Time varying presentation of items based on a key hash App 20030014637 - Ellison, Carl M. ;   et al. | 2003-01-16 |
Executing isolated mode instructions in a secure system running in privilege rings Grant 6,507,904 - Ellison , et al. January 14, 2 | 2003-01-14 |
Method and apparatus for authenticating people using business cards App 20030005298 - Smith, Ned M. ;   et al. | 2003-01-02 |
Method of enforcing authorization in shared processes using electronic contracts App 20020157004 - Smith, Ned M. ;   et al. | 2002-10-24 |
Checking file integrity using signature generated in isolated execution App 20020144121 - Ellison, Carl M. ;   et al. | 2002-10-03 |
File checking using remote signing authority via a network App 20020144140 - Ellison, Carl M. ;   et al. | 2002-10-03 |
System and method for data recovery Grant 5,991,406 - Lipner , et al. November 23, 1 | 1999-11-23 |
System and method for access field verification Grant 5,956,403 - Lipner , et al. September 21, 1 | 1999-09-21 |
System and method for controlling access to a user secret Grant 5,745,573 - Lipner , et al. April 28, 1 | 1998-04-28 |
System and method for access field verification Grant 5,640,454 - Lipner , et al. June 17, 1 | 1997-06-17 |
System and method for data recovery Grant 5,557,765 - Lipner , et al. September 17, 1 | 1996-09-17 |
System and method for key escrow encryption Grant 5,557,346 - Lipner , et al. September 17, 1 | 1996-09-17 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.