Patent applications and USPTO patent grants for Kumar; Ambuj.The latest application filed is for "confidential computing workflows".
Patent | Date |
---|---|
Confidential Computing Workflows App 20220277107 - Beekman; Jethro Gideon ;   et al. | 2022-09-01 |
Managing privileges of different entities for an integrated circuit Grant 11,403,014 - Jun , et al. August 2, 2 | 2022-08-02 |
Runtime encryption plugin for a key management system Grant 11,349,822 - Kashyap , et al. May 31, 2 | 2022-05-31 |
Secure Search Service App 20220060451 - Kashyap; Anand ;   et al. | 2022-02-24 |
Secure computation environment Grant 11,250,134 - Kumar February 15, 2 | 2022-02-15 |
Location Aware Cryptography App 20220021534 - Kumar; Ambuj ;   et al. | 2022-01-20 |
Diversifying A Base Symmetric Key Based On A Public Key App 20220012186 - Kumar; Ambuj | 2022-01-13 |
Device with multiple roots of trust Grant 11,216,389 - Kumar , et al. January 4, 2 | 2022-01-04 |
Preemption Of A Container In A Secure Computation Environment App 20210357532 - Kumar; Ambuj ;   et al. | 2021-11-18 |
Generating A Device Identification Key From A Base Key For Authentication With A Network App 20210344657 - Martineau; Philippe Alain ;   et al. | 2021-11-04 |
Geo-fencing Of An Application For A Secure Cryptographic Environment App 20210312016 - Kashyap; Anand ;   et al. | 2021-10-07 |
Secure Computation Of Multiparty Data App 20210273921 - Kumar; Ambuj ;   et al. | 2021-09-02 |
Providing attributes of a network service Grant 11,095,684 - Kumar , et al. August 17, 2 | 2021-08-17 |
Location aware cryptography Grant 11,082,224 - Kumar , et al. August 3, 2 | 2021-08-03 |
Diversifying a base symmetric key based on a public key Grant 11,042,488 - Kumar June 22, 2 | 2021-06-22 |
Managing Privileges Of Different Entities For An Integrated Circuit App 20210173576 - JUN; Benjamin Che-Ming ;   et al. | 2021-06-10 |
Cryptographic Management Of Lifecycle States App 20210160063 - KUMAR; Ambuj ;   et al. | 2021-05-27 |
Preemption of a container in a secure computation environment Grant 11,010,494 - Kumar , et al. May 18, 2 | 2021-05-18 |
Generating a device identification key from a base key for authentication with a network Grant 10,999,264 - Martineau , et al. May 4, 2 | 2021-05-04 |
Management of and persistent storage for nodes in a secure cluster Grant 10,911,538 - Kumar , et al. February 2, 2 | 2021-02-02 |
Cryptographic management of lifecycle states Grant 10,897,352 - Kumar , et al. January 19, 2 | 2021-01-19 |
Virtual one-time programmable memory management Grant 10,884,673 - Kumar , et al. January 5, 2 | 2021-01-05 |
Managing privileges of different entities for an integrated circuit Grant 10,860,229 - Jun , et al. December 8, 2 | 2020-12-08 |
Outputting A Key Based On An Authorized Sequence Of Operations App 20200304287 - Wachs; Megan Anneke ;   et al. | 2020-09-24 |
Providing Attributes Of A Network Service App 20200220898 - Kumar; Ambuj ;   et al. | 2020-07-09 |
Self-encrypting Key Management System App 20200204530 - KUMAR; Ambuj ;   et al. | 2020-06-25 |
Secure Data Provisioning App 20200120077 - Kumar; Ambuj ;   et al. | 2020-04-16 |
Preemption Of A Container In A Secure Computation Environmen App 20200104531 - Kumar; Ambuj ;   et al. | 2020-04-02 |
Self-encrypting key management system Grant 10,609,006 - Kumar , et al. | 2020-03-31 |
Outputting a key based on an authorized sequence of operations Grant 10,560,260 - Wachs , et al. Feb | 2020-02-11 |
Virtual One-time Programmable Memory Management App 20200026474 - Kumar; Ambuj ;   et al. | 2020-01-23 |
Location Aware Cryptography App 20200007328 - Kumar; Ambuj ;   et al. | 2020-01-02 |
Secure data provisioning Grant 10,440,000 - Kumar , et al. O | 2019-10-08 |
Preemption of a container in a secure computation environment Grant 10,417,453 - Kumar , et al. Sept | 2019-09-17 |
Outputting A Key Based On An Authorized Sequence Of Operations App 20190273604 - Wachs; Megan Anneke ;   et al. | 2019-09-05 |
Virtual one-time programmable memory management Grant 10,379,785 - Kumar , et al. A | 2019-08-13 |
Location aware cryptography Grant 10,341,106 - Kumar , et al. | 2019-07-02 |
Runtime Encryption Plugin For A Key Management System App 20190158474 - Kashyap; Anand ;   et al. | 2019-05-23 |
Outputting a key based on an authorized sequence of operations Grant 10,218,496 - Wachs , et al. Feb | 2019-02-26 |
Device With Multiple Roots Of Trust App 20180357183 - KUMAR; Ambuj ;   et al. | 2018-12-13 |
Management Of And Persistent Storage For Nodes In A Secure Cluster App 20180295115 - Kumar; Ambuj ;   et al. | 2018-10-11 |
Cryptographic Management Of Lifecycle States App 20180248688 - KUMAR; Ambuj ;   et al. | 2018-08-30 |
Self-encrypting Key Management System App 20180205711 - KUMAR; Ambuj ;   et al. | 2018-07-19 |
Location Aware Cryptography App 20180183593 - Kumar; Ambuj ;   et al. | 2018-06-28 |
Secure Computation Environment App 20180181760 - KUMAR; Ambuj | 2018-06-28 |
Location aware cryptography Grant 9,923,719 - Kumar , et al. March 20, 2 | 2018-03-20 |
Hardware chip select training for memory using read commands Grant 9,824,772 - Malladi , et al. November 21, 2 | 2017-11-21 |
Background voice recognition trainer Grant 9,792,911 - Veksler , et al. October 17, 2 | 2017-10-17 |
Generation and management of multiple base keys based on a device generated key Grant 9,768,957 - Kumar September 19, 2 | 2017-09-19 |
Generating A Device Identification Key From A Base Key For Authentication With A Network App 20170250967 - Martineau; Philippe Alain ;   et al. | 2017-08-31 |
Managing Privileges Of Different Entities For An Integrated Circuit App 20170249099 - JUN; Benjamin Che-Ming ;   et al. | 2017-08-31 |
Diversifying A Base Symmetric Key Based On A Public Key App 20170244679 - Kumar; Ambuj | 2017-08-24 |
Corrupting a hash value corresponding to a key based on a revocation of the key Grant 9,729,331 - Kumar , et al. August 8, 2 | 2017-08-08 |
Preemption Of A Container In A Secure Computation Environment App 20170169254 - Kumar; Ambuj ;   et al. | 2017-06-15 |
Secure Data Provisioning App 20170142083 - KUMAR; Ambuj ;   et al. | 2017-05-18 |
Hardware command training for memory using write leveling mechanism Grant 9,607,714 - Malladi , et al. March 28, 2 | 2017-03-28 |
Location Aware Cryptography App 20170070485 - Kumar; Ambuj ;   et al. | 2017-03-09 |
Outputting A Key Based On An Authorized Sequence Of Operations App 20170063814 - Wachs; Megan Anneke ;   et al. | 2017-03-02 |
Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure Grant 9,584,509 - Hamburg , et al. February 28, 2 | 2017-02-28 |
Generating a key based on a combination of keys Grant 9,553,722 - Jun , et al. January 24, 2 | 2017-01-24 |
Cryptographic Security For Mobile Payments App 20170011394 - Kumar; Ambuj ;   et al. | 2017-01-12 |
Virtual One-time Programmable Memory Management App 20160335196 - Kumar; Ambuj ;   et al. | 2016-11-17 |
Modular exponentiation optimization for cryptographic systems Grant 9,444,623 - Kocher , et al. September 13, 2 | 2016-09-13 |
Configurator for secure feature and key manager Grant 9,436,848 - Beitel , et al. September 6, 2 | 2016-09-06 |
Method and system for changing bus direction in memory systems Grant 9,378,169 - Kumar , et al. June 28, 2 | 2016-06-28 |
Hardware chip select training for memory using write leveling mechanism Grant 9,368,169 - Malladi , et al. June 14, 2 | 2016-06-14 |
Generating A Key Based On A Combination Of Keys App 20160013939 - Jun; Benjamin Che-Ming ;   et al. | 2016-01-14 |
Auditing And Permission Provisioning Mechanisms In A Distributed Secure Asset-management Infrastructure App 20150326541 - Hamburg; Michael ;   et al. | 2015-11-12 |
Corrupting A Hash Value Corresponding To A Key Based On A Revocation Of The Key App 20150312046 - Kumar; Ambuj ;   et al. | 2015-10-29 |
Generation And Management Of Multiple Base Keys Based On A Device Generated Key App 20150312036 - Kumar; Ambuj | 2015-10-29 |
Background Voice Recognition Trainer App 20150279355 - VEKSLER; ILYA ;   et al. | 2015-10-01 |
Modular Exponentiation Optimization For Cryptographic Systems App 20150180652 - Kocher; Paul C. ;   et al. | 2015-06-25 |
Configurator For Secure Feature And Key Manager App 20140359755 - Beitel; Daniel ;   et al. | 2014-12-04 |
Method And System For Changing Bus Direction In Memory Systems App 20140189180 - Kumar; Ambuj ;   et al. | 2014-07-03 |
Hardware Chip Select Training For Memory Using Write Leveling Mechanism App 20140181391 - Malladi; Venkata Ramana ;   et al. | 2014-06-26 |
Hardware Command Training For Memory Using Write Leveling Mechanism App 20140181451 - Malladi; Venkata Ramana ;   et al. | 2014-06-26 |
Multi-dimensional Hardware Data Training Between Memory Controller And Memory App 20140181429 - Malladi; Venkata Ramana ;   et al. | 2014-06-26 |
Hardware Command Training For Memory Using Read Commands App 20140181452 - Malladi; Venkata Ramana ;   et al. | 2014-06-26 |
Hardware Chip Select Training For Memory Using Read Commands App 20140181392 - Malladi; Venkata Ramana ;   et al. | 2014-06-26 |
Method and system for ordering posted packets and non-posted packets transfer Grant 8,687,639 - Kumar April 1, 2 | 2014-04-01 |
Method And System For Ordering Posted Packets And Non-posted Packets Transfer App 20100309918 - Kumar; Ambuj | 2010-12-09 |
Control data transfer rates for a serial ATA device by throttling values to control insertion of align primitives in data stream over serial ATA connection Grant 7,747,796 - Kumar , et al. June 29, 2 | 2010-06-29 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.