loadpatents
name:-0.023932218551636
name:-0.01879096031189
name:-0.0015418529510498
Kuehr-McLaren; David G. Patent Filings

Kuehr-McLaren; David G.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kuehr-McLaren; David G..The latest application filed is for "using social networking thresholds in access control decisions".

Company Profile
1.19.20
  • Kuehr-McLaren; David G. - Apex NC
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Using social networking thresholds in access control decisions
Grant 10,432,637 - Kuehr-McLaren , et al. O
2019-10-01
Method and apparatus for creating custom access control hierarchies
Grant 9,124,602 - Kuehr-McLaren , et al. September 1, 2
2015-09-01
Role engineering scoping and management
Grant 8,918,425 - Casco-Arias Sanchez , et al. December 23, 2
2014-12-23
Role engineering scoping and management
Grant 8,918,426 - Casco-Arias Sanchez , et al. December 23, 2
2014-12-23
Using Social Networking Thresholds In Access Control Decisions
App 20140325612 - Kuehr-McLaren; David G. ;   et al.
2014-10-30
Secure sharing of transport layer security session keys with trusted enforcement points
Grant 8,752,162 - Kuehr-McLaren , et al. June 10, 2
2014-06-10
Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions
Grant 8,577,806 - Kuehr-McLaren , et al. November 5, 2
2013-11-05
Automatic policy generation based on role entitlements and identity attributes
Grant 8,533,168 - Kuehr-McLaren , et al. September 10, 2
2013-09-10
Role Engineering Scoping and Management
App 20130198639 - Casco-Arias Sanchez; Luis B. ;   et al.
2013-08-01
Role Engineering Scoping and Management
App 20130104046 - Casco-Arias Sanchez; Luis B. ;   et al.
2013-04-25
Method, system and computer program product for selective data disclosure and contract negotiation in an E-marketplace based on predetermined preferences
Grant 8,260,673 - Arnold , et al. September 4, 2
2012-09-04
Secure Sharing Of Transport Layer Security Session Keys With Trusted Enforcement Points
App 20110239290 - Kuehr-McLaren; David G. ;   et al.
2011-09-29
Secure sharing of transport layer security session keys with trusted enforcement points
Grant 7,992,200 - Kuehr-McLaren , et al. August 2, 2
2011-08-02
Techniques for Securing Document Content in Print and Electronic Form
App 20090129591 - Hayes; Gregory A. ;   et al.
2009-05-21
Secure Sharing Of Transport Layer Security Session Keys With Trusted Enforcement Points
App 20090025078 - Kuehr-McLaren; David G. ;   et al.
2009-01-22
Method and Apparatus for Creating Custom Access Control Hierarchies
App 20080168530 - Kuehr-McLaren; David G. ;   et al.
2008-07-10
Method, System, And Program Product For Controlling Access To Personal Attributes Across Enterprise Domains
App 20080027939 - Chalasani; Nanchariah R. ;   et al.
2008-01-31
Automatic Policy Generation Based on Role Entitlements and Identity Attributes
App 20080016104 - Kuehr-McLaren; David G. ;   et al.
2008-01-17
Automatic policy generation based on role entitlements and identity attributes
Grant 7,284,000 - Kuehr-McLaren , et al. October 16, 2
2007-10-16
Method, system and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions
Grant 7,206,758 - Kuehr-McLaren , et al. April 17, 2
2007-04-17
Method, system and computer program product for protection of identity information in electronic transactions using attribute certificates
Grant 7,065,509 - Arnold , et al. June 20, 2
2006-06-20
Method and apparatus for managing session information in a data processing system
Grant 6,978,298 - Kuehr-McLaren December 20, 2
2005-12-20
Automatic role hierarchy generation and inheritance discovery
App 20050138420 - Sampathkumar, Govindaraj ;   et al.
2005-06-23
Automatic policy generation based on role entitlements and identity attributes
App 20050138061 - Kuehr-McLaren, David G. ;   et al.
2005-06-23
Automated role discovery
App 20050138419 - Gupta, Pratik ;   et al.
2005-06-23
Method, system, and computer program product for filtering participants in electronic transactions using privacy policies
App 20050102194 - Kuehr-McLaren, David G. ;   et al.
2005-05-12
Method, system, and computer program product for digital verification of collected privacy policies in electronic transactions
App 20050102155 - Kuehr-McLaren, David G. ;   et al.
2005-05-12
Method, system, and computer program product for identifying and implementing collected privacy policies as aggregate privacy policies in electronic transactions
App 20050102195 - Kuehr-McLaren, David G. ;   et al.
2005-05-12
Methods, systems and computer program products for communicating product status information
App 20050040220 - Kuehr-McLaren, David G. ;   et al.
2005-02-24
Method, system and computer program product for third-party verification of anonymous e-marketplace transactions using digital signatures
App 20040225616 - Arnold, Gordon K. ;   et al.
2004-11-11
Method, system and computer program product for selective data disclosure and contract negotiation in an E-marketplace based on predetermined preferences
App 20040225574 - Arnold, Gordon K. ;   et al.
2004-11-11
Method, system and computer program product for protection of identity information in electronic transactions using attribute certificates
App 20040225614 - Arnold, Gordon K. ;   et al.
2004-11-11
Extending SSL to a multi-tier environment using delegation of authentication and authority
Grant 6,367,009 - Davis , et al. April 2, 2
2002-04-02

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed