Patent | Date |
---|
Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove Grant 11,165,766 - Block , et al. November 2, 2 | 2021-11-02 |
Assymetric structured key recovering using oblivious pseudorandom function Grant 11,115,206 - Resch , et al. September 7, 2 | 2021-09-07 |
Validating keys derived from an oblivious pseudorandom function Grant 10,924,267 - Resch , et al. February 16, 2 | 2021-02-16 |
Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) Grant 10,887,088 - Resch , et al. January 5, 2 | 2021-01-05 |
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) Grant 10,887,293 - Resch , et al. January 5, 2 | 2021-01-05 |
Oblivious pseudorandom function in a key management system Grant 10,841,080 - Resch , et al. November 17, 2 | 2020-11-17 |
Threshold oblivious pseudorandom function in a key management system Grant 10,841,081 - Resch , et al. November 17, 2 | 2020-11-17 |
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system Grant 10,833,861 - Chari , et al. November 10, 2 | 2020-11-10 |
Efficient computation of a threshold partially-oblivious pseudorandom function Grant 10,700,859 - Resch , et al. | 2020-06-30 |
Efficient Computation Of A Threshold Partially-oblivious Pseudorandom Function App 20200092094 - Resch; Jason K. ;   et al. | 2020-03-19 |
Implementing Authentication Protocol For Merging Multiple Server Nodes With Trusted Platform Modules Utilizing Provisioned Node App 20200067912 - Block; Timothy R. ;   et al. | 2020-02-27 |
Assymetric Structured Key Recovering Using Oblivious Pseudorandom Function App 20200067707 - Resch; Jason K. ;   et al. | 2020-02-27 |
Validating Keys Derived From An Oblivious Pseudorandom Function App 20200067699 - Resch; Jason K. ;   et al. | 2020-02-27 |
Threshold Oblivious Pseudorandom Function In A Key Management System App 20190356475 - Resch; Jason K. ;   et al. | 2019-11-21 |
Key Identifiers In An Obliviousness Pseudorandom Function (oprf)-based Key Management Service (kms) App 20190297064 - Resch; Jason K. ;   et al. | 2019-09-26 |
Virtualizing A Key Hierarchy Using A Partially-oblivious Pseudorandom Function (p-oprf) App 20190296897 - Resch; Jason K. ;   et al. | 2019-09-26 |
Oblivious Pseudorandom Function In A Key Management System App 20190296896 - Resch; Jason K. ;   et al. | 2019-09-26 |
Protection Of Confidentiality, Privacy And Ownership Assurance In A Blockchain Based Decentralized Identity Management System App 20190165943 - CHARI; SURESH ;   et al. | 2019-05-30 |
Masking query data access pattern in encrypted data Grant 10,089,487 - Cash , et al. October 2, 2 | 2018-10-02 |
Conjunctive search in encrypted data Grant 9,852,306 - Cash , et al. December 26, 2 | 2017-12-26 |
Masking Query Data Access Pattern In Encrypted Data App 20170242924 - Cash; Charles D. ;   et al. | 2017-08-24 |
Compressing encrypted data without the encryption key Grant 9,742,557 - Hazay , et al. August 22, 2 | 2017-08-22 |
Compressing Encrypted Data Without The Encryption Key App 20170155504 - Hazay; Camit ;   et al. | 2017-06-01 |
Masking query data access pattern in encrypted data Grant 9,646,166 - Cash , et al. May 9, 2 | 2017-05-09 |
Compressing encrypted data without the encryption key Grant 9,584,323 - Hazay , et al. February 28, 2 | 2017-02-28 |
Compressing Encrypted Data Without The Encryption Key App 20160127130 - Hazay; Camit ;   et al. | 2016-05-05 |
Compressing encrypted data without the encryption key Grant 9,282,082 - Hazay , et al. March 8, 2 | 2016-03-08 |
Compressing Encrypted Data Without The Encryption Key App 20150156178 - Hazay; Camit ;   et al. | 2015-06-04 |
Conjunctive Search In Encrypted Data App 20150039885 - Cash; Charles D. ;   et al. | 2015-02-05 |
Masking Query Data Access Pattern In Encrypted Data App 20150039903 - Cash; Charles D. ;   et al. | 2015-02-05 |
Compressing block-cipher encrypted data Grant 8,934,630 - Hazay , et al. January 13, 2 | 2015-01-13 |
Remote authentication based on challenge-response using digital certificates Grant 8,646,062 - Bouz , et al. February 4, 2 | 2014-02-04 |
Secret-key exchange for wireless and sensor networks Grant 8,522,029 - Agrawal , et al. August 27, 2 | 2013-08-27 |
Non-interactive hierarchical identity-based key-agreement Grant 8,422,681 - Gennaro , et al. April 16, 2 | 2013-04-16 |
Remote Authentication Based On Challenge-response Using Digital Certificates App 20120117639 - Bouz; Firas ;   et al. | 2012-05-10 |
Secret-Key Exchange for Wireless and Sensor Networks App 20120036362 - Agrawal; Dakshi ;   et al. | 2012-02-09 |
Compressing Encrypted Data Without The Encryption Key App 20110103580 - Hazay; Camit ;   et al. | 2011-05-05 |
Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols Grant 7,747,865 - Krawczyk June 29, 2 | 2010-06-29 |
Non-Interactive Hierarchical Identity-Based Key-Agreement App 20090225986 - Gennaro; Rosario ;   et al. | 2009-09-10 |
Method And System Of Network Communication Privacy Between Network Devices App 20080281966 - Jennings, III; Raymond B. ;   et al. | 2008-11-13 |
Method and structure for challenge-response signatures and high-performance secure diffie-hellman protocols App 20060179319 - Krawczyk; Hugo M. | 2006-08-10 |
Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing Grant 5,625,692 - Herzberg , et al. April 29, 1 | 1997-04-29 |
Distributed fingerprints for information integrity verification Grant 5,530,757 - Krawczyk June 25, 1 | 1996-06-25 |
Secure message authentication for binary additive stream cipher systems Grant 5,345,507 - Herzberg , et al. September 6, 1 | 1994-09-06 |