loadpatents
name:-0.011761903762817
name:-0.016128063201904
name:-0.0004119873046875
Karger; Paul Ashley Patent Filings

Karger; Paul Ashley

Patent Applications and Registrations

Patent applications and USPTO patent grants for Karger; Paul Ashley.The latest application filed is for "method of managing and mitigating security risks through planning".

Company Profile
0.13.8
  • Karger; Paul Ashley - Chappaqua NY
  • Karger; Paul Ashley - Acton MA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
System and method for security planning with hard security constraints
Grant 8,276,192 - Anderson , et al. September 25, 2
2012-09-25
Method, apparatus and system for resistance to side channel attacks on random number generators
Grant 8,135,766 - Chari , et al. March 13, 2
2012-03-13
Method of managing and mitigating security risks through planning
Grant 8,099,781 - Anderson , et al. January 17, 2
2012-01-17
Fuzzy multi-level security
Grant 8,087,090 - Cheng , et al. December 27, 2
2011-12-27
Method of managing and mitigating security risks through planning
Grant 7,832,007 - Anderson , et al. November 9, 2
2010-11-09
Method of Managing and Mitigating Security Risks Through Planning
App 20090282487 - Anderson; Kay S. ;   et al.
2009-11-12
System and method for fuzzy multi-level security
Grant 7,530,110 - Cheng , et al. May 5, 2
2009-05-05
System And Method For Security Planning With Hard Security Constraints
App 20090055890 - Anderson; Kay Schwendimann ;   et al.
2009-02-26
Method, apparatus and system for resistance to side channel attacks on random number generators
Grant 7,496,616 - Chari , et al. February 24, 2
2009-02-24
Method, Apparatus And System For Resistance To Side Channel Attacks On Random Number Generators
App 20090049111 - Chari; Suresh Narayana ;   et al.
2009-02-19
System And Method For Fuzzy Multi-level Security
App 20080263662 - Cheng; Pau-Chen ;   et al.
2008-10-23
System and method for security planning with hard security constraints
App 20080016547 - Anderson; Kay Schwendimann ;   et al.
2008-01-17
Method of managing and mitigating security risks through planning
App 20070162976 - Anderson; Kay W. ;   et al.
2007-07-12
System and method for fuzzy multi-level security
App 20060253709 - Cheng; Pau-Chen ;   et al.
2006-11-09
Method, apparatus and system for resistance to side channel attacks on random number generators
App 20060104443 - Chari; Suresh Narayana ;   et al.
2006-05-18
Security policy for protection of files on a storage device
Grant 6,430,561 - Austel , et al. August 6, 2
2002-08-06
Interoperable cryptographic key recovery system with verification by comparison
Grant 6,052,469 - Johnson , et al. April 18, 2
2000-04-18
Two-phase cryptographic key recovery system
Grant 5,937,066 - Gennaro , et al. August 10, 1
1999-08-10
Method and apparatus for verifiably providing key recovery information in a cryptographic system
Grant 5,907,618 - Gennaro , et al. May 25, 1
1999-05-25
Cryptographic key recovery system
Grant 5,815,573 - Johnson , et al. September 29, 1
1998-09-29
Interoperable cryptographic key recovery system
Grant 5,796,830 - Johnson , et al. August 18, 1
1998-08-18

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed