loadpatents
name:-0.024392127990723
name:-0.019191026687622
name:-0.0084271430969238
Krawczyk; Hugo M. Patent Filings

Krawczyk; Hugo M.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Krawczyk; Hugo M..The latest application filed is for "efficient computation of a threshold partially-oblivious pseudorandom function".

Company Profile
15.27.21
  • Krawczyk; Hugo M. - Tarrytown NY
  • Krawczyk; Hugo M. - Yorktown Heights NY US
  • Krawczyk; Hugo M - Tarrytown NY US
  • Krawczyk; Hugo M. - Riverdale NY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove
Grant 11,165,766 - Block , et al. November 2, 2
2021-11-02
Assymetric structured key recovering using oblivious pseudorandom function
Grant 11,115,206 - Resch , et al. September 7, 2
2021-09-07
Validating keys derived from an oblivious pseudorandom function
Grant 10,924,267 - Resch , et al. February 16, 2
2021-02-16
Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF)
Grant 10,887,088 - Resch , et al. January 5, 2
2021-01-05
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS)
Grant 10,887,293 - Resch , et al. January 5, 2
2021-01-05
Oblivious pseudorandom function in a key management system
Grant 10,841,080 - Resch , et al. November 17, 2
2020-11-17
Threshold oblivious pseudorandom function in a key management system
Grant 10,841,081 - Resch , et al. November 17, 2
2020-11-17
Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system
Grant 10,833,861 - Chari , et al. November 10, 2
2020-11-10
Efficient computation of a threshold partially-oblivious pseudorandom function
Grant 10,700,859 - Resch , et al.
2020-06-30
Efficient Computation Of A Threshold Partially-oblivious Pseudorandom Function
App 20200092094 - Resch; Jason K. ;   et al.
2020-03-19
Implementing Authentication Protocol For Merging Multiple Server Nodes With Trusted Platform Modules Utilizing Provisioned Node
App 20200067912 - Block; Timothy R. ;   et al.
2020-02-27
Assymetric Structured Key Recovering Using Oblivious Pseudorandom Function
App 20200067707 - Resch; Jason K. ;   et al.
2020-02-27
Validating Keys Derived From An Oblivious Pseudorandom Function
App 20200067699 - Resch; Jason K. ;   et al.
2020-02-27
Threshold Oblivious Pseudorandom Function In A Key Management System
App 20190356475 - Resch; Jason K. ;   et al.
2019-11-21
Key Identifiers In An Obliviousness Pseudorandom Function (oprf)-based Key Management Service (kms)
App 20190297064 - Resch; Jason K. ;   et al.
2019-09-26
Virtualizing A Key Hierarchy Using A Partially-oblivious Pseudorandom Function (p-oprf)
App 20190296897 - Resch; Jason K. ;   et al.
2019-09-26
Oblivious Pseudorandom Function In A Key Management System
App 20190296896 - Resch; Jason K. ;   et al.
2019-09-26
Protection Of Confidentiality, Privacy And Ownership Assurance In A Blockchain Based Decentralized Identity Management System
App 20190165943 - CHARI; SURESH ;   et al.
2019-05-30
Masking query data access pattern in encrypted data
Grant 10,089,487 - Cash , et al. October 2, 2
2018-10-02
Conjunctive search in encrypted data
Grant 9,852,306 - Cash , et al. December 26, 2
2017-12-26
Masking Query Data Access Pattern In Encrypted Data
App 20170242924 - Cash; Charles D. ;   et al.
2017-08-24
Compressing encrypted data without the encryption key
Grant 9,742,557 - Hazay , et al. August 22, 2
2017-08-22
Compressing Encrypted Data Without The Encryption Key
App 20170155504 - Hazay; Camit ;   et al.
2017-06-01
Masking query data access pattern in encrypted data
Grant 9,646,166 - Cash , et al. May 9, 2
2017-05-09
Compressing encrypted data without the encryption key
Grant 9,584,323 - Hazay , et al. February 28, 2
2017-02-28
Compressing Encrypted Data Without The Encryption Key
App 20160127130 - Hazay; Camit ;   et al.
2016-05-05
Compressing encrypted data without the encryption key
Grant 9,282,082 - Hazay , et al. March 8, 2
2016-03-08
Compressing Encrypted Data Without The Encryption Key
App 20150156178 - Hazay; Camit ;   et al.
2015-06-04
Conjunctive Search In Encrypted Data
App 20150039885 - Cash; Charles D. ;   et al.
2015-02-05
Masking Query Data Access Pattern In Encrypted Data
App 20150039903 - Cash; Charles D. ;   et al.
2015-02-05
Compressing block-cipher encrypted data
Grant 8,934,630 - Hazay , et al. January 13, 2
2015-01-13
Remote authentication based on challenge-response using digital certificates
Grant 8,646,062 - Bouz , et al. February 4, 2
2014-02-04
Secret-key exchange for wireless and sensor networks
Grant 8,522,029 - Agrawal , et al. August 27, 2
2013-08-27
Non-interactive hierarchical identity-based key-agreement
Grant 8,422,681 - Gennaro , et al. April 16, 2
2013-04-16
Remote Authentication Based On Challenge-response Using Digital Certificates
App 20120117639 - Bouz; Firas ;   et al.
2012-05-10
Secret-Key Exchange for Wireless and Sensor Networks
App 20120036362 - Agrawal; Dakshi ;   et al.
2012-02-09
Compressing Encrypted Data Without The Encryption Key
App 20110103580 - Hazay; Camit ;   et al.
2011-05-05
Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols
Grant 7,747,865 - Krawczyk June 29, 2
2010-06-29
Non-Interactive Hierarchical Identity-Based Key-Agreement
App 20090225986 - Gennaro; Rosario ;   et al.
2009-09-10
Method And System Of Network Communication Privacy Between Network Devices
App 20080281966 - Jennings, III; Raymond B. ;   et al.
2008-11-13
Method and structure for challenge-response signatures and high-performance secure diffie-hellman protocols
App 20060179319 - Krawczyk; Hugo M.
2006-08-10
Method and system for a public key cryptosystem having proactive, robust, and recoverable distributed threshold secret sharing
Grant 5,625,692 - Herzberg , et al. April 29, 1
1997-04-29
Distributed fingerprints for information integrity verification
Grant 5,530,757 - Krawczyk June 25, 1
1996-06-25
Secure message authentication for binary additive stream cipher systems
Grant 5,345,507 - Herzberg , et al. September 6, 1
1994-09-06

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed