loadpatents
name:-0.039515972137451
name:-0.043528079986572
name:-0.0092179775238037
Halevi; Shai Patent Filings

Halevi; Shai

Patent Applications and Registrations

Patent applications and USPTO patent grants for Halevi; Shai.The latest application filed is for "secure matching and identification of patterns".

Company Profile
8.46.37
  • Halevi; Shai - Elmsford NY
  • Halevi; Shai - New York NY
  • Halevi; Shai - Hartsdale NY
  • Halevi; Shai - Heartsdale NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Secure Matching and Identification of Patterns
App 20220269717 - Pankanti; Sharathchandra ;   et al.
2022-08-25
Compressible (F)HE with applications to PIR
Grant 11,394,526 - Gentry , et al. July 19, 2
2022-07-19
Encrypted data model verification
Grant 11,354,539 - Halevi , et al. June 7, 2
2022-06-07
Secure multi-party learning and inferring insights based on encrypted data
Grant 11,343,068 - Nandakumar , et al. May 24, 2
2022-05-24
Secure matching and identification of patterns
Grant 11,321,382 - Pankanti , et al. May 3, 2
2022-05-03
Malware resistant computer
Grant 11,188,681 - Cohen , et al. November 30, 2
2021-11-30
Secure Matching and Identification of Patterns
App 20210248176 - Pankanti; Sharathchandra ;   et al.
2021-08-12
Learning and inferring insights from encrypted data
Grant 11,087,223 - Nandakumar , et al. August 10, 2
2021-08-10
Compressible (F)HE with applications to PIR
Grant 10,985,904 - Gentry , et al. April 20, 2
2021-04-20
Compressible (F)HE with Applications to PIR
App 20210111864 - Gentry; Craig B. ;   et al.
2021-04-15
Compressible (F)HE with Applications to PIR
App 20210111865 - Gentry; Craig B. ;   et al.
2021-04-15
Compressible (F)HE with applications to PIR
Grant 10,972,252 - Gentry , et al. April 6, 2
2021-04-06
Compressible (F)HE with Applications to PIR
App 20200403781 - Gentry; Craig B. ;   et al.
2020-12-24
Compressible (F)HE with Applications to PIR
App 20200403772 - Gentry; Craig B. ;   et al.
2020-12-24
Searching Over Encrypted Model and Encrypted Data Using Secure Single-and Multi-Party Learning Based on Encrypted Data
App 20200366459 - NANDAKUMAR; Karthik ;   et al.
2020-11-19
Malware Resistant Computer
App 20200320209 - Cohen; Guy M. ;   et al.
2020-10-08
Secure Multi-Party Learning and Inferring Insights Based on Encrypted Data
App 20200252198 - Kind Code
2020-08-06
Encrypted Data Model Verification
App 20200104636 - Halevi; Shai ;   et al.
2020-04-02
Learning And Inferring Insights From Encrypted Data
App 20200019867 - Nandakumar; Karthik ;   et al.
2020-01-16
Fast computation of a single coefficient in an inverse polynomial
Grant 10,177,905 - Gentry , et al. J
2019-01-08
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
Grant 10,057,057 - Gentry , et al. August 21, 2
2018-08-21
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management
App 20180109376 - Gentry; Craig B. ;   et al.
2018-04-19
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
Grant 9,742,566 - Gentry , et al. August 22, 2
2017-08-22
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
Grant 9,621,346 - Gentry , et al. April 11, 2
2017-04-11
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
Grant 9,608,817 - Gentry , et al. March 28, 2
2017-03-28
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management
App 20160164671 - Gentry; Craig B. ;   et al.
2016-06-09
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management
App 20160164670 - Gentry; Craig B. ;   et al.
2016-06-09
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management
App 20160164676 - Gentry; Craig B. ;   et al.
2016-06-09
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management
Grant 9,281,941 - Gentry , et al. March 8, 2
2016-03-08
Efficient homomorphic encryption scheme for bilinear forms
Grant 9,252,954 - Halevi , et al. February 2, 2
2016-02-02
Fast Computation of a Single Coefficient in an Inverse Polynomial
App 20150124962 - Gentry; Craig B. ;   et al.
2015-05-07
Fast computation of a single coefficient in an inverse polynomial
Grant 8,958,555 - Gentry , et al. February 17, 2
2015-02-17
Efficient Homomorphic Encryption Scheme for Bilinear Forms
App 20150033033 - Halevi; Shai ;   et al.
2015-01-29
Fast evaluation of many polynomials with small coefficients on the same point
Grant 8,903,083 - Gentry , et al. December 2, 2
2014-12-02
Efficient homomorphic encryption scheme for bilinear forms
Grant 8,861,716 - Halevi , et al. October 14, 2
2014-10-14
Use of indirect data keys for encrypted tape cartridges
Grant 8,656,186 - Greco , et al. February 18, 2
2014-02-18
Fast Computation Of A Single Coefficient In An Inverse Polynomial
App 20130315390 - Gentry; Craig B. ;   et al.
2013-11-28
Efficient implementation of fully homomorphic encryption
Grant 8,565,435 - Gentry , et al. October 22, 2
2013-10-22
Fast computation of a single coefficient in an inverse polynomial
Grant 8,532,289 - Gentry , et al. September 10, 2
2013-09-10
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management
App 20130216044 - Gentry; Craig B. ;   et al.
2013-08-22
Use of indirect data keys for encrypted tape cartridges
Grant 8,494,166 - Greco , et al. July 23, 2
2013-07-23
Non-interactive hierarchical identity-based key-agreement
Grant 8,422,681 - Gennaro , et al. April 16, 2
2013-04-16
Hash function with provable resistance to differential attacks
Grant 8,121,286 - Halevi , et al. February 21, 2
2012-02-21
Efficient Implementation Of Fully Homomorphic Encryption
App 20120039473 - Gentry; Craig B. ;   et al.
2012-02-16
Fast Computation Of A Single Coefficient In An Inverse Polynomial
App 20120039465 - Gentry; Craig B. ;   et al.
2012-02-16
Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point
App 20120039463 - Gentry; Craig B. ;   et al.
2012-02-16
Mitigating dictionary attacks on password-protected local storage
Grant 8,108,683 - Canetti , et al. January 31, 2
2012-01-31
Method of managing and mitigating security risks through planning
Grant 8,099,781 - Anderson , et al. January 17, 2
2012-01-17
Fuzzy multi-level security
Grant 8,087,090 - Cheng , et al. December 27, 2
2011-12-27
Efficient Homomorphic Encryption Scheme For Bilinear Forms
App 20110243320 - Halevi; Shai ;   et al.
2011-10-06
System and method for processing user data in an encryption pipeline
Grant 7,965,844 - Greco , et al. June 21, 2
2011-06-21
Verification of encryption key
Grant 7,921,294 - Greco , et al. April 5, 2
2011-04-05
Method of managing and mitigating security risks through planning
Grant 7,832,007 - Anderson , et al. November 9, 2
2010-11-09
Novel Hash Function With Provable Resistance To Differential Attacks
App 20100104095 - Halevi; Shai ;   et al.
2010-04-29
Method of Managing and Mitigating Security Risks Through Planning
App 20090282487 - Anderson; Kay S. ;   et al.
2009-11-12
Non-Interactive Hierarchical Identity-Based Key-Agreement
App 20090225986 - Gennaro; Rosario ;   et al.
2009-09-10
System and method for fuzzy multi-level security
Grant 7,530,110 - Cheng , et al. May 5, 2
2009-05-05
System, Method and Computer Program Product for Processing a Memory Page
App 20090031142 - Halevi; Shai ;   et al.
2009-01-29
Use of Indirect Data Keys for Encrypted Tape Cartridges
App 20080273696 - Greco; Paul M. ;   et al.
2008-11-06
Use of Indirect Data Keys for Encrypted Tape Cartridges
App 20080273697 - Greco; Paul M. ;   et al.
2008-11-06
System And Method For Fuzzy Multi-level Security
App 20080263662 - Cheng; Pau-Chen ;   et al.
2008-10-23
System And Method For Processing User Data In An Encryption Pipeline
App 20080253570 - Greco; Paul Merrill ;   et al.
2008-10-16
Verification Of Encryption Key
App 20080077797 - Greco; Paul Merrill ;   et al.
2008-03-27
Distributed key store
App 20080063209 - Jaquette; Glen A. ;   et al.
2008-03-13
Mitigating dictionary attacks on password-protected local storage
App 20080049939 - Canetti; Ran ;   et al.
2008-02-28
Method of managing and mitigating security risks through planning
App 20070162976 - Anderson; Kay W. ;   et al.
2007-07-12
Efficient stream cipher system and method
Grant 7,236,592 - Coppersmith , et al. June 26, 2
2007-06-26
System and method for fuzzy multi-level security
App 20060253709 - Cheng; Pau-Chen ;   et al.
2006-11-09
Efficient stream cipher system and method
App 20030152219 - Coppersmith, Don ;   et al.
2003-08-14
Secure hash-and-sign signatures
Grant 6,578,144 - Gennaro , et al. June 10, 2
2003-06-10
Biometric authentication system with encrypted models
Grant 6,317,834 - Gennaro , et al. November 13, 2
2001-11-13
Method and apparatus for advanced symmetric key block cipher with variable length key and block
Grant 6,243,470 - Coppersmith , et al. June 5, 2
2001-06-05
Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block
Grant 6,192,129 - Coppersmith , et al. February 20, 2
2001-02-20
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks
Grant 6,189,095 - Coppersmith , et al. February 13, 2
2001-02-13
Method and apparatus for a symmetric block cipher using multiple stages
Grant 6,185,304 - Coppersmith , et al. February 6, 2
2001-02-06
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks
Grant 6,185,679 - Coppersmith , et al. February 6, 2
2001-02-06

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed