loadpatents
name:-0.079239130020142
name:-0.072046041488647
name:-0.0086531639099121
Kerschbaum; Florian Patent Filings

Kerschbaum; Florian

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kerschbaum; Florian.The latest application filed is for "executing encrypted data using secure enclave".

Company Profile
10.91.85
  • Kerschbaum; Florian - Waterloo CA
  • Kerschbaum; Florian - Walldorf DE
  • Kerschbaum; Florian - Frankfurt am Main DE
  • Kerschbaum; Florian - Karlsruhe DE
  • Kerschbaum; Florian - Frankfurt DE
  • Kerschbaum; Florian - San Francisco CA
  • Kerschbaum; Florian - Karisruhe DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Differential privacy to prevent machine learning model membership inference
Grant 11,449,639 - Bernau , et al. September 20, 2
2022-09-20
Executing encrypted data using secure enclave
Grant 11,429,750 - Fischer , et al. August 30, 2
2022-08-30
Generation of optimal program variation
Grant 11,354,218 - Fischer , et al. June 7, 2
2022-06-07
Poly-logarithmic range queries on encrypted data
Grant 11,341,128 - Hahn , et al. May 24, 2
2022-05-24
Executing Encrypted Data Using Secure Enclave
App 20220067179 - FISCHER; Andreas ;   et al.
2022-03-03
Cloud-based secure computation of the median
Grant 11,250,140 - Tueno , et al. February 15, 2
2022-02-15
Secure sublinear time differentially private median computation
Grant 11,238,167 - Boehler , et al. February 1, 2
2022-02-01
Efficient cloud-based secure computation of the median using homomorphic encryption
Grant 11,218,290 - Tueno , et al. January 4, 2
2022-01-04
Generation Of Optimal Program Variation
App 20210349807 - Fischer; Andreas ;   et al.
2021-11-11
Secure Group File Sharing
App 20210266329 - Fuhry; Benny ;   et al.
2021-08-26
Secure database utilizing dictionary encoding
Grant 11,048,816 - Fuhry , et al. June 29, 2
2021-06-29
Secure Multiparty Differentially Private Median Computation
App 20210165906 - Boehler; Jonas ;   et al.
2021-06-03
Method and system for automated text anonymization
Grant 10,999,256 - Weggenmann , et al. May 4, 2
2021-05-04
Private Decision Tree Evaluation Using an Arithmetic Circuit
App 20210083841 - Tueno; Anselme Kemgne ;   et al.
2021-03-18
Non-Interactive Private Decision Tree Evaluation
App 20210081807 - Tueno; Anselme Kemgne ;   et al.
2021-03-18
Secure substring search to filter encrypted data
Grant 10,885,216 - Hahn , et al. January 5, 2
2021-01-05
Secure Sublinear Time Differentially Private Median Computation
App 20200394316 - Boehler; Jonas ;   et al.
2020-12-17
Differential Privacy to Prevent Machine Learning Model Membership Inference
App 20200394320 - Bernau; Daniel ;   et al.
2020-12-17
Secure data aggregation in databases using dynamic bucketization and grouping bucketization
Grant 10,839,087 - Hackenjos , et al. November 17, 2
2020-11-17
Leakage-free order-preserving encryption
Grant 10,833,841 - Kerschbaum November 10, 2
2020-11-10
Secure data aggregation in databases using static shifting and shifted bucketization
Grant 10,824,739 - Hackenjos , et al. November 3, 2
2020-11-03
Secure Database Utilizing Dictionary Encoding
App 20200320213 - Fuhry; Benny ;   et al.
2020-10-08
Join operations on encrypted database tables
Grant 10,769,295 - Loza , et al. Sep
2020-09-08
Efficient Cloud-Based Secure Computation of the Median Using Homomorphic Encryption
App 20200280430 - Tueno; Anselme Kemgne ;   et al.
2020-09-03
Cloud-Based Secure Computation of the Median
App 20200279045 - Tueno; Anselme Kemgne ;   et al.
2020-09-03
Privacy preserving smart metering
Grant 10,746,567 - Bernau , et al. A
2020-08-18
Secure Data Aggregation in Databases Using Dynamic Bucketization and Grouping Bucketization
App 20200034547 - HACKENJOS; TIMON ;   et al.
2020-01-30
Secure Data Aggregation in Databases Using Static Shifting and Shifted Bucketization
App 20200034546 - Hackenjos; Timon ;   et al.
2020-01-30
Differential privacy and outlier detection within a non-interactive model
Grant 10,445,527 - Boehler , et al. Oc
2019-10-15
Optimization of split queries
Grant 10,437,821 - Goerzig , et al. O
2019-10-08
Method and System for Automated Text Anonymization
App 20190238516 - Weggenmann; Benjamin ;   et al.
2019-08-01
Oblivious order-preserving encryption
Grant 10,360,390 - Tueno , et al.
2019-07-23
Join Operations on Encrypted Database Tables
App 20190220619 - Loza; Nicolas ;   et al.
2019-07-18
Secure Substring Search to Filter Encrypted Data
App 20190220620 - Hahn; Florian ;   et al.
2019-07-18
Local versus remote optimization in encrypted query processing
Grant 10,162,858 - Kerschbaum , et al. Dec
2018-12-25
Differential Privacy And Outlier Detection Within A Non-interactive Model
App 20180173894 - Boehler; Jonas ;   et al.
2018-06-21
Oblivious Order-preserving Encryption
App 20180165460 - Tueno; Anselme Kemgne ;   et al.
2018-06-14
Optimization Of Split Queries
App 20180113905 - Goerzig; Benny ;   et al.
2018-04-26
Leakage-Free Order-Preserving Encryption
App 20180019866 - Kerschbaum; Florian
2018-01-18
Encrypting data for analytical web applications
Grant 9,830,470 - Kerschbaum , et al. November 28, 2
2017-11-28
Frequency-hiding order-preserving encryption
Grant 9,800,558 - Kerschbaum October 24, 2
2017-10-24
Searchable encryption with secure and efficient updates
Grant 9,740,879 - Hahn , et al. August 22, 2
2017-08-22
Poly-Logarithmic Range Queries on Encrypted Data
App 20170139985 - Hahn; Florian ;   et al.
2017-05-18
Encrypting Data For Analytical Web Applications
App 20170103227 - Kerschbaum; Florian ;   et al.
2017-04-13
Frequency-hiding Order-preserving Encryption
App 20170099262 - Kerschbaum; Florian
2017-04-06
Optimal re-encryption strategy for joins in encrypted databases
Grant 9,607,161 - Haerterich , et al. March 28, 2
2017-03-28
Access control for encrypted query processing
Grant 9,547,720 - Hang , et al. January 17, 2
2017-01-17
Adjustable proxy re-encryption
Grant 9,537,838 - Hang , et al. January 3, 2
2017-01-03
Access Control For Encrypted Query Processing
App 20160357869 - Hang; Isabelle ;   et al.
2016-12-08
Searchable encryption for outsourcing data analytics
Grant 9,425,960 - Kerschbaum , et al. August 23, 2
2016-08-23
Adjustable Proxy Re-encryption
App 20160182467 - Hang; Isabelle ;   et al.
2016-06-23
Searchable encryption for infrequent queries in adjustable encrypted databases
Grant 9,342,707 - Kerschbaum , et al. May 17, 2
2016-05-17
Searchable Encryption For Infrequent Queries In Adjustable Encrypted Databases
App 20160132692 - Kerschbaum; Florian ;   et al.
2016-05-12
Searchable Encryption With Secure And Efficient Updates
App 20160125198 - Hahn; Florian ;   et al.
2016-05-05
Encrypted in-memory column-store
Grant 9,213,764 - Kerschbaum , et al. December 15, 2
2015-12-15
Systems and methods for implementing supply chain visibility policies
Grant 9,159,046 - Kerschbaum October 13, 2
2015-10-13
Expression rewriting for secure computation optimization
Grant 9,111,071 - Kerschbaum August 18, 2
2015-08-18
Optimal Re-Encryption Strategy for Joins in Encrypted Databases
App 20150178507 - Haerterich; Martin ;   et al.
2015-06-25
Real-time asset tracking using discovery services
Grant 9,064,229 - Chaves , et al. June 23, 2
2015-06-23
Average-complexity Ideal-security Order-preserving Encryption
App 20150149773 - KERSCHBAUM; FLORIAN ;   et al.
2015-05-28
Encrypted In-Memory Column-Store
App 20150149427 - KERSCHBAUM; FLORIAN ;   et al.
2015-05-28
Average-complexity ideal-security order-preserving encryption
Grant 9,037,860 - Kerschbaum , et al. May 19, 2
2015-05-19
Input validation, user and data authentication on potentially compromised mobile devices
Grant 9,025,834 - Hang , et al. May 5, 2
2015-05-05
Optimal re-encryption strategy for joins in encrypted databases
Grant 9,003,204 - Haerterich , et al. April 7, 2
2015-04-07
Local Versus Remote Optimization in Encrypted Query Processing
App 20150039586 - Kerschbaum; Florian ;   et al.
2015-02-05
Optimal Re-Encryption Strategy for Joins in Encrypted Databases
App 20150019879 - Haerterich; Martin ;   et al.
2015-01-15
Automatic Protocol Selection in Mixed-Protocol Secure Computation
App 20140372769 - Kerschbaum; Florian ;   et al.
2014-12-18
Input Validation, User And Data Authentication On Potentially Compromised Mobile Devices
App 20140359730 - Hang; Isabelle ;   et al.
2014-12-04
Fault-tolerant privacy-preserving statistics
Grant 8,880,867 - Jawurek , et al. November 4, 2
2014-11-04
Type-system for mixed protocol secure computation
Grant 8,839,410 - Kerschbaum September 16, 2
2014-09-16
System And Method For Inserting Security Mechanisms Into A Software Program
App 20140237622 - Chang; Hoi ;   et al.
2014-08-21
Secure sharing of item level data in the cloud
Grant 8,811,620 - Chaves , et al. August 19, 2
2014-08-19
Type-system For Mixed Protocol Secure Computation
App 20140143764 - Kerschbaum; Florian
2014-05-22
Zero knowledge proofs for arbitrary predicates over data
Grant 8,731,199 - Jawurek , et al. May 20, 2
2014-05-20
Expression Rewriting For Secure Computation Optimization
App 20140130173 - Kerschbaum; Florian
2014-05-08
Zero Knowledge Proofs For Arbitrary Predicates Over Data
App 20140093077 - Jawurek; Marek ;   et al.
2014-04-03
Securing communications sent by a first user to a second user
Grant 8,688,973 - Kerschbaum , et al. April 1, 2
2014-04-01
Enhanced cross-site attack prevention
Grant 8,584,232 - Kerschbaum November 12, 2
2013-11-12
Real-time Asset Tracking using Discovery Services
App 20130297929 - Chaves; Leonardo Weiss F. ;   et al.
2013-11-07
Collusion-resistant outsourcing of private set intersection
Grant 8,572,405 - Kerschbaum October 29, 2
2013-10-29
Fault-Tolerant Privacy-Preserving Statistics
App 20130275743 - Jawurek; Marek ;   et al.
2013-10-17
Secure dissemination of events in a publish/subscribe network
Grant 8,548,172 - Kerschbaum October 1, 2
2013-10-01
Collusion-Resistant Outsourcing of Private Set Intersection
App 20130246802 - Kerschbaum; Florian
2013-09-19
System for business monitoring in virtual organizations
Grant 8,538,799 - Haller , et al. September 17, 2
2013-09-17
Secure logical vector clocks
Grant 8,533,487 - Kerschbaum , et al. September 10, 2
2013-09-10
Public-key encrypted bloom filters with applications to private set intersection
Grant 8,526,603 - Kerschbaum September 3, 2
2013-09-03
System and method for inserting security mechanisms into a software program
Grant 8,510,571 - Chang , et al. August 13, 2
2013-08-13
System and method for comparing private data
Grant 8,473,741 - Kerschbaum June 25, 2
2013-06-25
Comprehensive security architecture for dynamic, web service based virtual organizations
Grant 8,365,298 - Kerschbaum , et al. January 29, 2
2013-01-29
Public-Key Encrypted Bloom Filters With Applications To Private Set Intersection
App 20130010950 - Kerschbaum; Florian
2013-01-10
Secure Dissemination Of Events In A Publish/subscribe Network
App 20130013922 - KERSCHBAUM; FLORIAN
2013-01-10
Implementations of secure computation protocols
Grant 8,321,666 - Kerschbaum November 27, 2
2012-11-27
Searchable encryption for outsourcing data analytics
Grant 8,291,509 - Kerschbaum , et al. October 16, 2
2012-10-16
Secure Sharing Of Item Level Data In The Cloud
App 20120210118 - Chaves; Leonardo Weiss F. ;   et al.
2012-08-16
Commutative Order-preserving Encryption
App 20120121080 - Kerschbaum; Florian
2012-05-17
Secure computation of private values
Grant 8,150,041 - Kerschbaum April 3, 2
2012-04-03
Distance-preserving anonymization of data
Grant 8,131,999 - Kerschbaum March 6, 2
2012-03-06
Privacy preserving social network analysis
Grant 8,130,947 - Kerschbaum , et al. March 6, 2
2012-03-06
Item tracing with supply chain secrecy using RFID tags and an identity-based encryption scheme
Grant 8,060,758 - Kerschbaum , et al. November 15, 2
2011-11-15
System and Method for Comparing Private Data
App 20110271107 - Kerschbaum; Florian
2011-11-03
System and method for comparison of private values
Grant 8,045,711 - Kerschbaum October 25, 2
2011-10-25
Privacy preserving artificial immune system
Grant 8,015,080 - Kerschbaum , et al. September 6, 2
2011-09-06
Method and system for mediated secure computation
Grant 8,010,782 - Kerschbaum August 30, 2
2011-08-30
Privacy-preserving concatenation of strings
Grant 7,995,750 - Kerschbaum , et al. August 9, 2
2011-08-09
Privacy-preserving substring creation
Grant 7,986,780 - Kerschbaum , et al. July 26, 2
2011-07-26
Privacy Preserving Artificial Immune System
App 20110137800 - Kerschbaum; Florian ;   et al.
2011-06-09
System and Method for Comparison of Private Values
App 20110085658 - Kerschbaum; Florian
2011-04-14
Secure Computation Of Private Values
App 20110075846 - Kerschbaum; Florian
2011-03-31
System and method for comparison of private values
Grant 7,869,598 - Kerschbaum January 11, 2
2011-01-11
Systems And Methods For Implementing Supply Chain Visibility Policies
App 20100329464 - Kerschbaum; Florian
2010-12-30
Methods and systems for multi-party sorting of private values
Grant 7,860,245 - Kerschbaum , et al. December 28, 2
2010-12-28
Secure computation of private values
Grant 7,860,244 - Kerschbaum December 28, 2
2010-12-28
Automatic derivation of access control policies from a choreography
Grant 7,836,483 - Kerschbaum , et al. November 16, 2
2010-11-16
Method and system for providing a trust-based reputation service for virtual organization formation
Grant 7,818,200 - Kerschbaum , et al. October 19, 2
2010-10-19
Securing Communications Sent By A First User To A Second User
App 20100235627 - Kerschbaum; Florian ;   et al.
2010-09-16
Searchable Encryption For Outsourcing Data Analytics
App 20100114964 - Kerschbaum; Florian ;   et al.
2010-05-06
Searchable Encryption For Outsourcing Data Analytics
App 20100106980 - Kerschbaum; Florian ;   et al.
2010-04-29
Secure Logical Vector Clocks
App 20100091984 - Kerschbaum; Florian ;   et al.
2010-04-15
Privacy Preserving Social Network Analysis
App 20100014657 - Kerschbaum; Florian ;   et al.
2010-01-21
Item Tracing With Supply Chain Secrecy Using Rfid Tags And An Identity-based Encryption Scheme
App 20090323928 - Kerschbaum; Florian ;   et al.
2009-12-31
Method And System For Mediated Secure Computation
App 20090187757 - Kerschbaum; Florian
2009-07-23
Automatic Peer Group Formation for Benchmarking
App 20090055382 - Kerschbaum; Florian
2009-02-26
Enhanced Cross-site Attack Prevention
App 20080263650 - Kerschbaum; Florian
2008-10-23
Distance-preserving Anonymization Of Data
App 20080215842 - Kerschbaum; Florian
2008-09-04
Secure computation of private values
App 20080144832 - Kerschbaum; Florian
2008-06-19
Comprehensive security architecture for dynamic, web service based virtual organizations
App 20080104708 - Kerschbaum; Florian ;   et al.
2008-05-01
Implementations of secure computation protocols
App 20080046865 - Kerschbaum; Florian
2008-02-21
Privacy-preserving substring creation
App 20080019510 - Kerschbaum; Florian ;   et al.
2008-01-24
Privacy-preserving concatenation of strings
App 20080010467 - Kerschbaum; Florian ;   et al.
2008-01-10
System for business monitoring in virtual organizations
App 20080004927 - Haller; Jochen ;   et al.
2008-01-03
Automatic derivation of access control policies from a choreography
App 20070256116 - Kerschbaum; Florian ;   et al.
2007-11-01
Methods and systems for multi-party sorting of private values
App 20070220094 - Kerschbaum; Florian ;   et al.
2007-09-20
Method and system for providing a trust-based reputation service for virtual organization formation
App 20070203781 - Kerschbaum; Florian ;   et al.
2007-08-30
System and method for comparison of private values
App 20070156586 - Kerschbaum; Florian
2007-07-05

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed