loadpatents
name:-0.022237062454224
name:-0.018457889556885
name:-0.0032808780670166
Kolesnikov; Vladimir Y. Patent Filings

Kolesnikov; Vladimir Y.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kolesnikov; Vladimir Y..The latest application filed is for "protecting against malicious modification in cryptographic operations".

Company Profile
1.26.24
  • Kolesnikov; Vladimir Y. - Jersey City NJ
  • Kolesnikov; Vladimir Y - Jersey City NJ US
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Tamper-resistant and scalable mutual authentication for machine-to-machine devices
Grant 11,349,675 - Kim , et al. May 31, 2
2022-05-31
Secure private database querying system with content hiding bloom filters
Grant 9,535,658 - Kolesnikov January 3, 2
2017-01-03
Protecting against malicious modification in cryptographic operations
Grant 9,509,665 - Kolesnikov , et al. November 29, 2
2016-11-29
Anonymization of streaming data
Grant 9,361,480 - Kolesnikov , et al. June 7, 2
2016-06-07
Protecting Against Malicious Modification In Cryptographic Operations
App 20160044031 - Kolesnikov; Vladimir Y. ;   et al.
2016-02-11
Input consistency verification for server assisted secure function evaluation
Grant 9,178,704 - Kolesnikov , et al. November 3, 2
2015-11-03
Anonymization of Streaming Data
App 20150278549 - Kolesnikov; Vladimir Y. ;   et al.
2015-10-01
Computation of garbled tables in garbled circuit
Grant 9,124,417 - Kolesnikov September 1, 2
2015-09-01
Method and apparatus for resilient end-to-end message protection for large-scale cyber-physical system communications
Grant 9,106,413 - Kim , et al. August 11, 2
2015-08-11
Tamper-resistant And Scalable Mutual Authentication For Machine-to-machine Devices
App 20150113275 - Kim; Young Jin ;   et al.
2015-04-23
Secure function evaluation for a covert client and a semi-honest server using string selection oblivious transfer
Grant 8,990,570 - Kolesnikov , et al. March 24, 2
2015-03-24
Secure function evaluation between semi-honest parties
Grant 8,977,855 - Kolesnikov , et al. March 10, 2
2015-03-10
Privacy-preserving database system
Grant 8,943,331 - Kolesnikov January 27, 2
2015-01-27
Input consistency verification for two-party secure function evaluation
Grant 8,891,766 - Kolesnikov November 18, 2
2014-11-18
Privacy-Preserving Database System
App 20140189364 - Kolesnikov; Vladimir Y.
2014-07-03
System and method for accessing private digital content
Grant 8,739,306 - Bosch , et al. May 27, 2
2014-05-27
Method And Apparatus For Resilient End-to-end Message Protection For Large-scale Cyber-physical System Communications
App 20140129838 - KIM; Young Jin ;   et al.
2014-05-08
Input Consistency Verification for Two-Party Secure Function Evaluation
App 20140105393 - Kolesnikov; Vladimir Y.
2014-04-17
Secure Private Database Querying System With Content Hiding Bloom Fiters
App 20140108435 - Kolesnikov; Vladimir Y.
2014-04-17
Light-weight security solution for host-based mobility and multihoming protocols
Grant 8,699,708 - Hampel , et al. April 15, 2
2014-04-15
Input Consistency Verification for Server Assisted Secure Function Evaluation
App 20140095861 - Kolesnikov; Vladimir Y. ;   et al.
2014-04-03
MAC Aggregation With Message Multiplicity For Use In A Multi-Node Data Network
App 20140056306 - Kolesnikov; Vladimir Y.
2014-02-27
Secure Function Evaluation For A Covert Client And A Semi-honest Server Using String Selection Oblivious Transfer
App 20140040614 - Kolesnikov; Vladimir Y. ;   et al.
2014-02-06
Secure Function Evaluation Between Semi-Honest Parties
App 20140040620 - Kolesnikov; Vladimir Y. ;   et al.
2014-02-06
MAC aggregation resilient to denial-of-service attacks for use in a multi-node data network
Grant 8,621,228 - Kolesnikov , et al. December 31, 2
2013-12-31
Securing two-party computation against malicious adversaries
Grant 8,488,791 - Baechler , et al. July 16, 2
2013-07-16
MAC Aggregation Resilient To Denial-Of-Service Attacks For Use In A Multi-Node Data Network
App 20120284523 - Kolesnikov; Vladimir Y. ;   et al.
2012-11-08
Secure multi-user identity module key exchange
Grant 8,296,836 - Kolesnikov October 23, 2
2012-10-23
System And Method For Accessing Private Digital Content
App 20120246743 - Bosch; Hendrikus G.P. ;   et al.
2012-09-27
Securing Two-Party Computation Against Malicious Adversaries
App 20120070000 - Baechler; Gilles ;   et al.
2012-03-22
Light-weight security solution for host-based mobility & multihoming protocols
App 20110320803 - Hampel; Karl Georg ;   et al.
2011-12-29
Computation of garbled tables in garbled circuit
App 20110216902 - Kolesnikov; Vladimir Y.
2011-09-08
Secure Multi-UIM aka key exchange
App 20110167272 - Kolesnikov; Vladimir Y.
2011-07-07

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed