name:-0.056493997573853
name:-0.035032033920288
name:-0.022858858108521
Kumar; Ambuj Patent Filings

Kumar; Ambuj

Patent Applications and Registrations

Patent applications and USPTO patent grants for Kumar; Ambuj.The latest application filed is for "confidential computing workflows".

Company Profile
23.35.48
  • Kumar; Ambuj - Sunnyvale CA
  • Kumar; Ambuj - Farmington Hills MI
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Trademarks
Patent Activity
PatentDate
Confidential Computing Workflows
App 20220277107 - Beekman; Jethro Gideon ;   et al.
2022-09-01
Managing privileges of different entities for an integrated circuit
Grant 11,403,014 - Jun , et al. August 2, 2
2022-08-02
Runtime encryption plugin for a key management system
Grant 11,349,822 - Kashyap , et al. May 31, 2
2022-05-31
Secure Search Service
App 20220060451 - Kashyap; Anand ;   et al.
2022-02-24
Secure computation environment
Grant 11,250,134 - Kumar February 15, 2
2022-02-15
Location Aware Cryptography
App 20220021534 - Kumar; Ambuj ;   et al.
2022-01-20
Diversifying A Base Symmetric Key Based On A Public Key
App 20220012186 - Kumar; Ambuj
2022-01-13
Device with multiple roots of trust
Grant 11,216,389 - Kumar , et al. January 4, 2
2022-01-04
Preemption Of A Container In A Secure Computation Environment
App 20210357532 - Kumar; Ambuj ;   et al.
2021-11-18
Generating A Device Identification Key From A Base Key For Authentication With A Network
App 20210344657 - Martineau; Philippe Alain ;   et al.
2021-11-04
Geo-fencing Of An Application For A Secure Cryptographic Environment
App 20210312016 - Kashyap; Anand ;   et al.
2021-10-07
Secure Computation Of Multiparty Data
App 20210273921 - Kumar; Ambuj ;   et al.
2021-09-02
Providing attributes of a network service
Grant 11,095,684 - Kumar , et al. August 17, 2
2021-08-17
Location aware cryptography
Grant 11,082,224 - Kumar , et al. August 3, 2
2021-08-03
Diversifying a base symmetric key based on a public key
Grant 11,042,488 - Kumar June 22, 2
2021-06-22
Managing Privileges Of Different Entities For An Integrated Circuit
App 20210173576 - JUN; Benjamin Che-Ming ;   et al.
2021-06-10
Cryptographic Management Of Lifecycle States
App 20210160063 - KUMAR; Ambuj ;   et al.
2021-05-27
Preemption of a container in a secure computation environment
Grant 11,010,494 - Kumar , et al. May 18, 2
2021-05-18
Generating a device identification key from a base key for authentication with a network
Grant 10,999,264 - Martineau , et al. May 4, 2
2021-05-04
Management of and persistent storage for nodes in a secure cluster
Grant 10,911,538 - Kumar , et al. February 2, 2
2021-02-02
Cryptographic management of lifecycle states
Grant 10,897,352 - Kumar , et al. January 19, 2
2021-01-19
Virtual one-time programmable memory management
Grant 10,884,673 - Kumar , et al. January 5, 2
2021-01-05
Managing privileges of different entities for an integrated circuit
Grant 10,860,229 - Jun , et al. December 8, 2
2020-12-08
Outputting A Key Based On An Authorized Sequence Of Operations
App 20200304287 - Wachs; Megan Anneke ;   et al.
2020-09-24
Providing Attributes Of A Network Service
App 20200220898 - Kumar; Ambuj ;   et al.
2020-07-09
Self-encrypting Key Management System
App 20200204530 - KUMAR; Ambuj ;   et al.
2020-06-25
Secure Data Provisioning
App 20200120077 - Kumar; Ambuj ;   et al.
2020-04-16
Preemption Of A Container In A Secure Computation Environmen
App 20200104531 - Kumar; Ambuj ;   et al.
2020-04-02
Self-encrypting key management system
Grant 10,609,006 - Kumar , et al.
2020-03-31
Outputting a key based on an authorized sequence of operations
Grant 10,560,260 - Wachs , et al. Feb
2020-02-11
Virtual One-time Programmable Memory Management
App 20200026474 - Kumar; Ambuj ;   et al.
2020-01-23
Location Aware Cryptography
App 20200007328 - Kumar; Ambuj ;   et al.
2020-01-02
Secure data provisioning
Grant 10,440,000 - Kumar , et al. O
2019-10-08
Preemption of a container in a secure computation environment
Grant 10,417,453 - Kumar , et al. Sept
2019-09-17
Outputting A Key Based On An Authorized Sequence Of Operations
App 20190273604 - Wachs; Megan Anneke ;   et al.
2019-09-05
Virtual one-time programmable memory management
Grant 10,379,785 - Kumar , et al. A
2019-08-13
Location aware cryptography
Grant 10,341,106 - Kumar , et al.
2019-07-02
Runtime Encryption Plugin For A Key Management System
App 20190158474 - Kashyap; Anand ;   et al.
2019-05-23
Outputting a key based on an authorized sequence of operations
Grant 10,218,496 - Wachs , et al. Feb
2019-02-26
Device With Multiple Roots Of Trust
App 20180357183 - KUMAR; Ambuj ;   et al.
2018-12-13
Management Of And Persistent Storage For Nodes In A Secure Cluster
App 20180295115 - Kumar; Ambuj ;   et al.
2018-10-11
Cryptographic Management Of Lifecycle States
App 20180248688 - KUMAR; Ambuj ;   et al.
2018-08-30
Self-encrypting Key Management System
App 20180205711 - KUMAR; Ambuj ;   et al.
2018-07-19
Location Aware Cryptography
App 20180183593 - Kumar; Ambuj ;   et al.
2018-06-28
Secure Computation Environment
App 20180181760 - KUMAR; Ambuj
2018-06-28
Location aware cryptography
Grant 9,923,719 - Kumar , et al. March 20, 2
2018-03-20
Hardware chip select training for memory using read commands
Grant 9,824,772 - Malladi , et al. November 21, 2
2017-11-21
Background voice recognition trainer
Grant 9,792,911 - Veksler , et al. October 17, 2
2017-10-17
Generation and management of multiple base keys based on a device generated key
Grant 9,768,957 - Kumar September 19, 2
2017-09-19
Generating A Device Identification Key From A Base Key For Authentication With A Network
App 20170250967 - Martineau; Philippe Alain ;   et al.
2017-08-31
Managing Privileges Of Different Entities For An Integrated Circuit
App 20170249099 - JUN; Benjamin Che-Ming ;   et al.
2017-08-31
Diversifying A Base Symmetric Key Based On A Public Key
App 20170244679 - Kumar; Ambuj
2017-08-24
Corrupting a hash value corresponding to a key based on a revocation of the key
Grant 9,729,331 - Kumar , et al. August 8, 2
2017-08-08
Preemption Of A Container In A Secure Computation Environment
App 20170169254 - Kumar; Ambuj ;   et al.
2017-06-15
Secure Data Provisioning
App 20170142083 - KUMAR; Ambuj ;   et al.
2017-05-18
Hardware command training for memory using write leveling mechanism
Grant 9,607,714 - Malladi , et al. March 28, 2
2017-03-28
Location Aware Cryptography
App 20170070485 - Kumar; Ambuj ;   et al.
2017-03-09
Outputting A Key Based On An Authorized Sequence Of Operations
App 20170063814 - Wachs; Megan Anneke ;   et al.
2017-03-02
Auditing and permission provisioning mechanisms in a distributed secure asset-management infrastructure
Grant 9,584,509 - Hamburg , et al. February 28, 2
2017-02-28
Generating a key based on a combination of keys
Grant 9,553,722 - Jun , et al. January 24, 2
2017-01-24
Cryptographic Security For Mobile Payments
App 20170011394 - Kumar; Ambuj ;   et al.
2017-01-12
Virtual One-time Programmable Memory Management
App 20160335196 - Kumar; Ambuj ;   et al.
2016-11-17
Modular exponentiation optimization for cryptographic systems
Grant 9,444,623 - Kocher , et al. September 13, 2
2016-09-13
Configurator for secure feature and key manager
Grant 9,436,848 - Beitel , et al. September 6, 2
2016-09-06
Method and system for changing bus direction in memory systems
Grant 9,378,169 - Kumar , et al. June 28, 2
2016-06-28
Hardware chip select training for memory using write leveling mechanism
Grant 9,368,169 - Malladi , et al. June 14, 2
2016-06-14
Generating A Key Based On A Combination Of Keys
App 20160013939 - Jun; Benjamin Che-Ming ;   et al.
2016-01-14
Auditing And Permission Provisioning Mechanisms In A Distributed Secure Asset-management Infrastructure
App 20150326541 - Hamburg; Michael ;   et al.
2015-11-12
Corrupting A Hash Value Corresponding To A Key Based On A Revocation Of The Key
App 20150312046 - Kumar; Ambuj ;   et al.
2015-10-29
Generation And Management Of Multiple Base Keys Based On A Device Generated Key
App 20150312036 - Kumar; Ambuj
2015-10-29
Background Voice Recognition Trainer
App 20150279355 - VEKSLER; ILYA ;   et al.
2015-10-01
Modular Exponentiation Optimization For Cryptographic Systems
App 20150180652 - Kocher; Paul C. ;   et al.
2015-06-25
Configurator For Secure Feature And Key Manager
App 20140359755 - Beitel; Daniel ;   et al.
2014-12-04
Method And System For Changing Bus Direction In Memory Systems
App 20140189180 - Kumar; Ambuj ;   et al.
2014-07-03
Hardware Chip Select Training For Memory Using Write Leveling Mechanism
App 20140181391 - Malladi; Venkata Ramana ;   et al.
2014-06-26
Hardware Command Training For Memory Using Write Leveling Mechanism
App 20140181451 - Malladi; Venkata Ramana ;   et al.
2014-06-26
Multi-dimensional Hardware Data Training Between Memory Controller And Memory
App 20140181429 - Malladi; Venkata Ramana ;   et al.
2014-06-26
Hardware Command Training For Memory Using Read Commands
App 20140181452 - Malladi; Venkata Ramana ;   et al.
2014-06-26
Hardware Chip Select Training For Memory Using Read Commands
App 20140181392 - Malladi; Venkata Ramana ;   et al.
2014-06-26
Method and system for ordering posted packets and non-posted packets transfer
Grant 8,687,639 - Kumar April 1, 2
2014-04-01
Method And System For Ordering Posted Packets And Non-posted Packets Transfer
App 20100309918 - Kumar; Ambuj
2010-12-09
Control data transfer rates for a serial ATA device by throttling values to control insertion of align primitives in data stream over serial ATA connection
Grant 7,747,796 - Kumar , et al. June 29, 2
2010-06-29

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed