loadpatents
name:-0.020978927612305
name:-0.058504819869995
name:-0.0017759799957275
Hanna; Stephen R. Patent Filings

Hanna; Stephen R.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Hanna; Stephen R..The latest application filed is for "detecting past intrusions and attacks based on historical network traffic information".

Company Profile
0.45.12
  • Hanna; Stephen R. - Brighton MA
  • Hanna; Stephen R. - Bedford MA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Detecting Past Intrusions And Attacks Based On Historical Network Traffic Information
App 20180115571 - Kahn; Clifford E. ;   et al.
2018-04-26
Detecting past intrusions and attacks based on historical network traffic information
Grant 9,848,006 - Kahn , et al. December 19, 2
2017-12-19
Maintaining user identity associated with access to network resources using virtual machines
Grant 9,658,872 - Hanna May 23, 2
2017-05-23
Detecting Past Intrusions And Attacks Based On Historical Network Traffic Information
App 20170041334 - KAHN; Clifford E. ;   et al.
2017-02-09
Detecting past intrusions and attacks based on historical network traffic information
Grant 9,485,262 - Kahn , et al. November 1, 2
2016-11-01
Combining network endpoint policy results
Grant 9,479,538 - Chickering , et al. October 25, 2
2016-10-25
Combining Network Endpoint Policy Results
App 20140150053 - CHICKERING; Roger ;   et al.
2014-05-29
Policy evaluation in controlled environment
Grant 8,661,505 - Kougiouris , et al. February 25, 2
2014-02-25
Policy Evaluation In Controlled Environment
App 20130145421 - KOUGIOURIS; Panagiotis ;   et al.
2013-06-06
Verifying integrity of network devices for secure multicast communications
Grant 8,458,462 - Hanna June 4, 2
2013-06-04
Combining network endpoint policy results
Grant 8,369,224 - Chickering , et al. February 5, 2
2013-02-05
Policy evaluation in controlled environment
Grant 8,352,998 - Kougiouris , et al. January 8, 2
2013-01-08
Automatic hardware-based recovery of a compromised computer
Grant 8,103,909 - Hanna January 24, 2
2012-01-24
Exchange of network access control information using tightly-constrained network access control protocols
Grant 8,104,073 - Hanna January 24, 2
2012-01-24
Server-to-server Integrity Checking
App 20110258479 - HANNA; Stephen R.
2011-10-20
Server-to-server integrity checking
Grant 7,996,713 - Hanna August 9, 2
2011-08-09
Network policy evaluation
Grant 7,982,595 - Hanna , et al. July 19, 2
2011-07-19
Server-to-server Integrity Checking
App 20100153781 - HANNA; Stephen R.
2010-06-17
Automatic Hardware-based Recovery Of A Compromised Computer
App 20100070800 - Hanna; Stephen R.
2010-03-18
Network Policy Evaluation
App 20090313373 - HANNA; Stephen R. ;   et al.
2009-12-17
Network policy evaluation
Grant 7,592,906 - Hanna , et al. September 22, 2
2009-09-22
Exchange Of Network Access Control Information Using Tightly-constrained Network Access Control Protocols
App 20090041252 - Hanna; Stephen R.
2009-02-12
Method and apparatus for providing a key distribution center without storing long-term server secrets
Grant 7,395,549 - Perlman , et al. July 1, 2
2008-07-01
Method and system for proving membership in a nested group using chains of credentials
Grant 7,213,262 - Elley , et al. May 1, 2
2007-05-01
Method and apparatus for using non-secure file servers for secure information storage
Grant 7,178,021 - Hanna , et al. February 13, 2
2007-02-13
Trust ratings in group credentials
Grant 7,085,925 - Hanna , et al. August 1, 2
2006-08-01
Method ans system for pro-active credential refreshing
Grant 7,058,798 - Elley , et al. June 6, 2
2006-06-06
Replacing an email attachment with an address specifying where the attachment is stored
Grant 7,054,905 - Hanna , et al. May 30, 2
2006-05-30
Extensible system for building and evaluating credentials
Grant 7,010,690 - Hanna , et al. March 7, 2
2006-03-07
Data authentication system employing encrypted integrity blocks
Grant 6,996,712 - Perlman , et al. February 7, 2
2006-02-07
Inexpensive secure on-line certification authority system and method
Grant 6,973,569 - Anderson , et al. December 6, 2
2005-12-06
Method and apparatus for sending encrypted electronic mail through a distribution list exploder
Grant 6,912,656 - Perlman , et al. June 28, 2
2005-06-28
Method and system for dynamic issuance of group certificates
Grant 6,883,100 - Elley , et al. April 19, 2
2005-04-19
Method and apparatus for presenting anonymous group names
Grant 6,801,998 - Hanna , et al. October 5, 2
2004-10-05
Method and apparatus for using ranking to select repair nodes in formation of a dynamic tree for multicast repair
Grant 6,757,843 - Wesley , et al. June 29, 2
2004-06-29
Method and system for measuring reception characteristics in a multicast data distribution group
Grant 6,693,907 - Wesley , et al. February 17, 2
2004-02-17
Use of beacon message in a network for classifying and discarding messages
Grant 6,658,004 - Kadansky , et al. December 2, 2
2003-12-02
Content screening with end-to-end encryption
Grant 6,636,838 - Perlman , et al. October 21, 2
2003-10-21
System and method for facilitating operator authentication
App 20030115154 - Anderson, Anne H. ;   et al.
2003-06-19
Content screening with end-to-end encryption prior to reaching a destination
Grant 6,560,705 - Perlman , et al. May 6, 2
2003-05-06
Content screening with end-to-end encryption within a firewall
Grant 6,546,486 - Perlman , et al. April 8, 2
2003-04-08
Detecting congestion by comparing successive loss of packets in windows to provide congestion control in reliable multicast protocol
Grant 6,526,022 - Chiu , et al. February 25, 2
2003-02-25
Method and system for providing limited access privileges with an untrusted terminal
Grant 6,510,523 - Perlman , et al. January 21, 2
2003-01-21
Dynamic Optimization For Receivers Using Distance Between A Repair Head And A Member Station In A Repair Group For Receivers Having A Closely Knit Topological Arrangement To Locate Repair Heads Near The Member Stations Which They Serve In Tree Based Repair In Reliable Multicast Protocol
Grant 6,507,562 - Kadansky , et al. January 14, 2
2003-01-14
Multiple ACK windows providing congestion control in reliable multicast protocol
Grant 6,505,253 - Chiu , et al. January 7, 2
2003-01-07
Trust ratings in group credentials
App 20020144149 - Hanna, Stephen R. ;   et al.
2002-10-03
Method and apparatus for extinguishing ephemeral keys
App 20020136410 - Hanna, Stephen R.
2002-09-26
Method and apparatus for routing and congestion control in multicast networks
Grant 6,427,166 - Hurst , et al. July 30, 2
2002-07-30
Method and apparatus for multicast indication of group key change
Grant 6,295,361 - Kadansky , et al. September 25, 2
2001-09-25
Signed group criteria
Grant 6,263,434 - Hanna , et al. July 17, 2
2001-07-17
Determination of distance between nodes in a computer network
Grant 6,192,404 - Hurst , et al. February 20, 2
2001-02-20
Method and apparatus using ranking to select repair nodes in formation of a dynamic tree for multicast repair
Grant 6,185,698 - Wesley , et al. February 6, 2
2001-02-06
Methods and systems for establishing a shared secret using an authentication token
Grant 6,173,400 - Perlman , et al. January 9, 2
2001-01-09
Repair TTL computation and correction mechanism to perform localized repairs in a multicast data distribution setup/framework
Grant 6,104,695 - Wesley , et al. August 15, 2
2000-08-15

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed