Patent | Date |
---|
Secure Matching and Identification of Patterns App 20220269717 - Pankanti; Sharathchandra ;   et al. | 2022-08-25 |
Compressible (F)HE with applications to PIR Grant 11,394,526 - Gentry , et al. July 19, 2 | 2022-07-19 |
Encrypted data model verification Grant 11,354,539 - Halevi , et al. June 7, 2 | 2022-06-07 |
Secure multi-party learning and inferring insights based on encrypted data Grant 11,343,068 - Nandakumar , et al. May 24, 2 | 2022-05-24 |
Secure matching and identification of patterns Grant 11,321,382 - Pankanti , et al. May 3, 2 | 2022-05-03 |
Malware resistant computer Grant 11,188,681 - Cohen , et al. November 30, 2 | 2021-11-30 |
Secure Matching and Identification of Patterns App 20210248176 - Pankanti; Sharathchandra ;   et al. | 2021-08-12 |
Learning and inferring insights from encrypted data Grant 11,087,223 - Nandakumar , et al. August 10, 2 | 2021-08-10 |
Compressible (F)HE with applications to PIR Grant 10,985,904 - Gentry , et al. April 20, 2 | 2021-04-20 |
Compressible (F)HE with Applications to PIR App 20210111864 - Gentry; Craig B. ;   et al. | 2021-04-15 |
Compressible (F)HE with Applications to PIR App 20210111865 - Gentry; Craig B. ;   et al. | 2021-04-15 |
Compressible (F)HE with applications to PIR Grant 10,972,252 - Gentry , et al. April 6, 2 | 2021-04-06 |
Compressible (F)HE with Applications to PIR App 20200403781 - Gentry; Craig B. ;   et al. | 2020-12-24 |
Compressible (F)HE with Applications to PIR App 20200403772 - Gentry; Craig B. ;   et al. | 2020-12-24 |
Searching Over Encrypted Model and Encrypted Data Using Secure Single-and Multi-Party Learning Based on Encrypted Data App 20200366459 - NANDAKUMAR; Karthik ;   et al. | 2020-11-19 |
Malware Resistant Computer App 20200320209 - Cohen; Guy M. ;   et al. | 2020-10-08 |
Secure Multi-Party Learning and Inferring Insights Based on Encrypted Data App 20200252198 - Kind Code | 2020-08-06 |
Encrypted Data Model Verification App 20200104636 - Halevi; Shai ;   et al. | 2020-04-02 |
Learning And Inferring Insights From Encrypted Data App 20200019867 - Nandakumar; Karthik ;   et al. | 2020-01-16 |
Fast computation of a single coefficient in an inverse polynomial Grant 10,177,905 - Gentry , et al. J | 2019-01-08 |
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management Grant 10,057,057 - Gentry , et al. August 21, 2 | 2018-08-21 |
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management App 20180109376 - Gentry; Craig B. ;   et al. | 2018-04-19 |
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management Grant 9,742,566 - Gentry , et al. August 22, 2 | 2017-08-22 |
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management Grant 9,621,346 - Gentry , et al. April 11, 2 | 2017-04-11 |
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management Grant 9,608,817 - Gentry , et al. March 28, 2 | 2017-03-28 |
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management App 20160164671 - Gentry; Craig B. ;   et al. | 2016-06-09 |
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management App 20160164670 - Gentry; Craig B. ;   et al. | 2016-06-09 |
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management App 20160164676 - Gentry; Craig B. ;   et al. | 2016-06-09 |
Homomorphic evaluation including key switching, modulus switching, and dynamic noise management Grant 9,281,941 - Gentry , et al. March 8, 2 | 2016-03-08 |
Efficient homomorphic encryption scheme for bilinear forms Grant 9,252,954 - Halevi , et al. February 2, 2 | 2016-02-02 |
Fast Computation of a Single Coefficient in an Inverse Polynomial App 20150124962 - Gentry; Craig B. ;   et al. | 2015-05-07 |
Fast computation of a single coefficient in an inverse polynomial Grant 8,958,555 - Gentry , et al. February 17, 2 | 2015-02-17 |
Efficient Homomorphic Encryption Scheme for Bilinear Forms App 20150033033 - Halevi; Shai ;   et al. | 2015-01-29 |
Fast evaluation of many polynomials with small coefficients on the same point Grant 8,903,083 - Gentry , et al. December 2, 2 | 2014-12-02 |
Efficient homomorphic encryption scheme for bilinear forms Grant 8,861,716 - Halevi , et al. October 14, 2 | 2014-10-14 |
Use of indirect data keys for encrypted tape cartridges Grant 8,656,186 - Greco , et al. February 18, 2 | 2014-02-18 |
Fast Computation Of A Single Coefficient In An Inverse Polynomial App 20130315390 - Gentry; Craig B. ;   et al. | 2013-11-28 |
Efficient implementation of fully homomorphic encryption Grant 8,565,435 - Gentry , et al. October 22, 2 | 2013-10-22 |
Fast computation of a single coefficient in an inverse polynomial Grant 8,532,289 - Gentry , et al. September 10, 2 | 2013-09-10 |
Homomorphic Evaluation Including Key Switching, Modulus Switching, And Dynamic Noise Management App 20130216044 - Gentry; Craig B. ;   et al. | 2013-08-22 |
Use of indirect data keys for encrypted tape cartridges Grant 8,494,166 - Greco , et al. July 23, 2 | 2013-07-23 |
Non-interactive hierarchical identity-based key-agreement Grant 8,422,681 - Gennaro , et al. April 16, 2 | 2013-04-16 |
Hash function with provable resistance to differential attacks Grant 8,121,286 - Halevi , et al. February 21, 2 | 2012-02-21 |
Efficient Implementation Of Fully Homomorphic Encryption App 20120039473 - Gentry; Craig B. ;   et al. | 2012-02-16 |
Fast Computation Of A Single Coefficient In An Inverse Polynomial App 20120039465 - Gentry; Craig B. ;   et al. | 2012-02-16 |
Fast Evaluation Of Many Polynomials With Small Coefficients On The Same Point App 20120039463 - Gentry; Craig B. ;   et al. | 2012-02-16 |
Mitigating dictionary attacks on password-protected local storage Grant 8,108,683 - Canetti , et al. January 31, 2 | 2012-01-31 |
Method of managing and mitigating security risks through planning Grant 8,099,781 - Anderson , et al. January 17, 2 | 2012-01-17 |
Fuzzy multi-level security Grant 8,087,090 - Cheng , et al. December 27, 2 | 2011-12-27 |
Efficient Homomorphic Encryption Scheme For Bilinear Forms App 20110243320 - Halevi; Shai ;   et al. | 2011-10-06 |
System and method for processing user data in an encryption pipeline Grant 7,965,844 - Greco , et al. June 21, 2 | 2011-06-21 |
Verification of encryption key Grant 7,921,294 - Greco , et al. April 5, 2 | 2011-04-05 |
Method of managing and mitigating security risks through planning Grant 7,832,007 - Anderson , et al. November 9, 2 | 2010-11-09 |
Novel Hash Function With Provable Resistance To Differential Attacks App 20100104095 - Halevi; Shai ;   et al. | 2010-04-29 |
Method of Managing and Mitigating Security Risks Through Planning App 20090282487 - Anderson; Kay S. ;   et al. | 2009-11-12 |
Non-Interactive Hierarchical Identity-Based Key-Agreement App 20090225986 - Gennaro; Rosario ;   et al. | 2009-09-10 |
System and method for fuzzy multi-level security Grant 7,530,110 - Cheng , et al. May 5, 2 | 2009-05-05 |
System, Method and Computer Program Product for Processing a Memory Page App 20090031142 - Halevi; Shai ;   et al. | 2009-01-29 |
Use of Indirect Data Keys for Encrypted Tape Cartridges App 20080273696 - Greco; Paul M. ;   et al. | 2008-11-06 |
Use of Indirect Data Keys for Encrypted Tape Cartridges App 20080273697 - Greco; Paul M. ;   et al. | 2008-11-06 |
System And Method For Fuzzy Multi-level Security App 20080263662 - Cheng; Pau-Chen ;   et al. | 2008-10-23 |
System And Method For Processing User Data In An Encryption Pipeline App 20080253570 - Greco; Paul Merrill ;   et al. | 2008-10-16 |
Verification Of Encryption Key App 20080077797 - Greco; Paul Merrill ;   et al. | 2008-03-27 |
Distributed key store App 20080063209 - Jaquette; Glen A. ;   et al. | 2008-03-13 |
Mitigating dictionary attacks on password-protected local storage App 20080049939 - Canetti; Ran ;   et al. | 2008-02-28 |
Method of managing and mitigating security risks through planning App 20070162976 - Anderson; Kay W. ;   et al. | 2007-07-12 |
Efficient stream cipher system and method Grant 7,236,592 - Coppersmith , et al. June 26, 2 | 2007-06-26 |
System and method for fuzzy multi-level security App 20060253709 - Cheng; Pau-Chen ;   et al. | 2006-11-09 |
Efficient stream cipher system and method App 20030152219 - Coppersmith, Don ;   et al. | 2003-08-14 |
Secure hash-and-sign signatures Grant 6,578,144 - Gennaro , et al. June 10, 2 | 2003-06-10 |
Biometric authentication system with encrypted models Grant 6,317,834 - Gennaro , et al. November 13, 2 | 2001-11-13 |
Method and apparatus for advanced symmetric key block cipher with variable length key and block Grant 6,243,470 - Coppersmith , et al. June 5, 2 | 2001-06-05 |
Method and apparatus for advanced byte-oriented symmetric key block cipher with variable length key and block Grant 6,192,129 - Coppersmith , et al. February 20, 2 | 2001-02-20 |
Symmetric block cipher using multiple stages with modified type-1 and type-3 feistel networks Grant 6,189,095 - Coppersmith , et al. February 13, 2 | 2001-02-13 |
Method and apparatus for a symmetric block cipher using multiple stages Grant 6,185,304 - Coppersmith , et al. February 6, 2 | 2001-02-06 |
Method and apparatus for a symmetric block cipher using multiple stages with type-1 and type-3 feistel networks Grant 6,185,679 - Coppersmith , et al. February 6, 2 | 2001-02-06 |