loadpatents
Patent applications and USPTO patent grants for Leach; Paul J..The latest application filed is for "pass-thru for client authentication".
Patent | Date |
---|---|
Pass-thru for client authentication Grant 9,819,666 - Mowers , et al. November 14, 2 | 2017-11-14 |
Pass-thru for client authentication Grant 9,407,617 - Mowers , et al. August 2, 2 | 2016-08-02 |
Pass-Thru for Client Authentication App 20160182488 - Mowers; David R. ;   et al. | 2016-06-23 |
Transformation of sequential access control lists utilizing certificates Grant 9,253,195 - Ellison , et al. February 2, 2 | 2016-02-02 |
Back-end constrained delegation model Grant 9,118,672 - Novak , et al. August 25, 2 | 2015-08-25 |
Distributed computer systems with time-dependent credentials Grant 9,058,467 - Novak , et al. June 16, 2 | 2015-06-16 |
Distributed computer systems with time-dependent credentials Grant 9,032,492 - Novak , et al. May 12, 2 | 2015-05-12 |
Unobtrusive assurance of authentic user intent Grant 8,996,866 - Cowan , et al. March 31, 2 | 2015-03-31 |
Resource access based on multiple scope levels Grant 8,984,624 - Perumal , et al. March 17, 2 | 2015-03-17 |
Pass-Thru for Client Authentication App 20140189823 - Mowers; David R. ;   et al. | 2014-07-03 |
File system operation and digital rights management (DRM) Grant 8,640,256 - Cross , et al. January 28, 2 | 2014-01-28 |
Distributed computer systems with time-dependent credentials Grant 8,640,210 - Novak , et al. January 28, 2 | 2014-01-28 |
PassThru for client authentication Grant 8,627,440 - Mowers , et al. January 7, 2 | 2014-01-07 |
Selective authorization based on authentication input attributes Grant 8,621,561 - Cross , et al. December 31, 2 | 2013-12-31 |
Transformation of Sequential Access Control Lists Utilizing Certificates App 20130283342 - Ellison; Carl M. ;   et al. | 2013-10-24 |
Resource Access Based On Multiple Scope Levels App 20130269025 - Perumal; Raja P. ;   et al. | 2013-10-10 |
Fast-reconnection of negotiable authentication network clients Grant 8,555,069 - Zhu , et al. October 8, 2 | 2013-10-08 |
Transformation of sequential access control lists utilizing certificates Grant 8,468,579 - Ellison , et al. June 18, 2 | 2013-06-18 |
Resource access based on multiple scope levels Grant 8,464,319 - Perumal , et al. June 11, 2 | 2013-06-11 |
Distributed Computer Systems With Time-dependent Credentials App 20130061299 - Novak; Mark ;   et al. | 2013-03-07 |
Distributed Computer Systems With Time-dependent Credentials App 20130061301 - Novak; Mark ;   et al. | 2013-03-07 |
Distributed Computer Systems With Time-dependent Credentials App 20130061300 - Novak; Mark ;   et al. | 2013-03-07 |
Translating role-based access control policy to resource authorization policy Grant 8,381,306 - McPherson , et al. February 19, 2 | 2013-02-19 |
Virtual distributed security system Grant 8,302,149 - Della-Libera , et al. October 30, 2 | 2012-10-30 |
Predictive HTTP authentication mode negotiation Grant 8,266,680 - James , et al. September 11, 2 | 2012-09-11 |
Method and system for controlling access privileges for trusted network nodes Grant 8,230,485 - Reasor , et al. July 24, 2 | 2012-07-24 |
Licensing protected content to application sets Grant 8,225,390 - Ray , et al. July 17, 2 | 2012-07-17 |
File access in multi-protocol environment Grant 8,214,641 - Field , et al. July 3, 2 | 2012-07-03 |
Back-end Constrained Delegation Model App 20120131661 - Novak; Mark Fishel ;   et al. | 2012-05-24 |
File System Operation And Digital Rights Management (drm) App 20120117662 - Cross; David B. ;   et al. | 2012-05-10 |
Kerberos ticket virtualization for network load balancers Grant 8,132,246 - Ilac , et al. March 6, 2 | 2012-03-06 |
File system operation and digital rights management (DRM) Grant 8,117,666 - Cross , et al. February 14, 2 | 2012-02-14 |
Domain ID service Grant 8,006,295 - Ellison , et al. August 23, 2 | 2011-08-23 |
Resource Access Based On Multiple Scope Levels App 20110173679 - Perumal; Raja P. ;   et al. | 2011-07-14 |
System and methods providing enhanced security model Grant 7,971,230 - Agarwal , et al. June 28, 2 | 2011-06-28 |
Unobtrusive Assurance Of Authentic User Intent App 20110154505 - Cowan; Crispin ;   et al. | 2011-06-23 |
Policy driven, credential delegation for single sign on and secure access to network resources Grant 7,913,084 - Medvinsky , et al. March 22, 2 | 2011-03-22 |
Enhanced computer intrusion detection methods and systems Grant 7,900,257 - Pandit , et al. March 1, 2 | 2011-03-01 |
Abstracting security policy from, and transforming to, native representations of access check mechanisms Grant 7,882,539 - Paramasivam , et al. February 1, 2 | 2011-02-01 |
Virtual distributed security system Grant 7,809,938 - Della-Libera , et al. October 5, 2 | 2010-10-05 |
Controlling execution of computer applications Grant 7,810,153 - Perlin , et al. October 5, 2 | 2010-10-05 |
Predictive HTTP Authentication Mode Negotiation App 20100251338 - James; Rick ;   et al. | 2010-09-30 |
Biometric credential verification framework App 20100242102 - Cross; David B. ;   et al. | 2010-09-23 |
Controlling computer applications' access to data Grant 7,802,294 - Perlin , et al. September 21, 2 | 2010-09-21 |
Fast-reconnection Of Negotiable Authentication Network Clients App 20100228982 - Zhu; Liqiang ;   et al. | 2010-09-09 |
Access control list inheritance thru object(s) Grant 7,779,265 - Dubhashi , et al. August 17, 2 | 2010-08-17 |
Privilege restriction enforcement in a distributed system Grant 7,757,281 - Field , et al. July 13, 2 | 2010-07-13 |
One time password integration with Kerberos Grant 7,757,275 - Crall , et al. July 13, 2 | 2010-07-13 |
Virtual distributed security system Grant 7,752,442 - Della-Libera , et al. July 6, 2 | 2010-07-06 |
Virtual distributed security system Grant 7,752,431 - Della-Libera , et al. July 6, 2 | 2010-07-06 |
PassThru for Client Authentication App 20100100953 - Mowers; David R. ;   et al. | 2010-04-22 |
Schema-based services for identity-based data access Grant 7,664,724 - Lucovsky , et al. February 16, 2 | 2010-02-16 |
Pass-thru for client authentication Grant 7,644,275 - Mowers , et al. January 5, 2 | 2010-01-05 |
Licensing Protected Content To Application Sets App 20090328134 - Ray; Kenneth D. ;   et al. | 2009-12-31 |
Authentication and authorization across autonomous network systems Grant 7,617,522 - Schmidt , et al. November 10, 2 | 2009-11-10 |
Dynamic self-configuration for ad hoc peer networking Grant 7,602,756 - Gu , et al. October 13, 2 | 2009-10-13 |
Enhanced Computer Intrusion Detection Methods And Systems App 20090241193 - Pandit; Bhalchandra S. ;   et al. | 2009-09-24 |
Kerberos Ticket Virtualization For Network Load Balancers App 20090217029 - Ilac; Cristian ;   et al. | 2009-08-27 |
Method and system for resource management with independent real-time applications on a common set of machines Grant 7,571,438 - Jones , et al. August 4, 2 | 2009-08-04 |
Selective Authorization Based On Authentication Input Attributes App 20090178129 - Cross; David B. ;   et al. | 2009-07-09 |
Dynamic self-configuration for ad hoc peer networking Grant 7,558,846 - Gu , et al. July 7, 2 | 2009-07-07 |
Enhanced computer intrusion detection methods and systems Grant 7,543,333 - Pandit , et al. June 2, 2 | 2009-06-02 |
File Access In Multi-protocol Environment App 20090055921 - Field; Scott A. ;   et al. | 2009-02-26 |
Dynamic self-configuration for AD HOC peer networking Grant 7,487,230 - Gu , et al. February 3, 2 | 2009-02-03 |
Domain Id Service App 20090007247 - Ellison; Carl M. ;   et al. | 2009-01-01 |
Transformation Of Sequential Access Control Lists Utilizing Certificates App 20080313712 - Ellison; Carl Melvin ;   et al. | 2008-12-18 |
Entity Based Access Management App 20080307486 - Ellison; Carl Melvin ;   et al. | 2008-12-11 |
Access Control Negation Using Negative Groups App 20080301780 - Ellison; Carl Melvin ;   et al. | 2008-12-04 |
XML-based template language for devices and services Grant 7,441,019 - Zintel , et al. October 21, 2 | 2008-10-21 |
XML-based template language for devices and services Grant 7,437,434 - Zintel , et al. October 14, 2 | 2008-10-14 |
User mapping information extension for protocols Grant 7,434,253 - Crall , et al. October 7, 2 | 2008-10-07 |
Model-based Access Control App 20080244736 - Lampson; Butler ;   et al. | 2008-10-02 |
File System Operation and Digital Rights Management (DRM) App 20080235807 - Cross; David B. ;   et al. | 2008-09-25 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,382,883 - Cross , et al. June 3, 2 | 2008-06-03 |
File system operation and digital rights management (DRM) Grant 7,383,586 - Cross , et al. June 3, 2 | 2008-06-03 |
System And Methods Providing Enhanced Security Model App 20080022358 - Agarwal; Sameet H. ;   et al. | 2008-01-24 |
Privilege restriction enforcement in a distributed system App 20080022368 - Field; Scott A. ;   et al. | 2008-01-24 |
System and method for managing and authenticating services via service principal names Grant 7,308,709 - Brezak, Jr. , et al. December 11, 2 | 2007-12-11 |
Translating role-based access control policy to resource authorization policy App 20070283443 - McPherson; Dave ;   et al. | 2007-12-06 |
Abstracting security policy from, and transforming to, native representations of access check mechanisms App 20070283411 - Paramasivam; Muthukrishnan ;   et al. | 2007-12-06 |
Using atomic messaging to increase the security of transferring data across a network Grant 7,305,548 - Pierce , et al. December 4, 2 | 2007-12-04 |
Policy driven, credential delegation for single sign on and secure access to network resources App 20070277231 - Medvinsky; Gennady ;   et al. | 2007-11-29 |
Schema-based services for identity-based data access Grant 7,302,634 - Lucovsky , et al. November 27, 2 | 2007-11-27 |
Authorizing a requesting entity to operate upon data structures Grant 7,284,271 - Lucovsky , et al. October 16, 2 | 2007-10-16 |
Controlling execution of computer applications App 20070186112 - Perlin; Eric C. ;   et al. | 2007-08-09 |
System and methods providing enhanced security model Grant 7,251,822 - Agarwal , et al. July 31, 2 | 2007-07-31 |
Access control list inheritance thru object(s) App 20070136578 - Dubhashi; Kedarnath A. ;   et al. | 2007-06-14 |
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption App 20070088947 - Cross; David B. ;   et al. | 2007-04-19 |
Authentication and authorization across autonomous network systems Grant 7,185,359 - Schmidt , et al. February 27, 2 | 2007-02-27 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption Grant 7,181,016 - Cross , et al. February 20, 2 | 2007-02-20 |
User mapping information extension for protocols App 20070016782 - Crall; Christopher J. ;   et al. | 2007-01-18 |
Dynamic self-configuration for ad hoc peer networking App 20060291434 - Gu; Ye ;   et al. | 2006-12-28 |
One time password integration with Kerberos App 20060288230 - Crall; Christopher J. ;   et al. | 2006-12-21 |
Accessing heterogeneous data in a standardized manner Grant 7,136,859 - Lucovsky , et al. November 14, 2 | 2006-11-14 |
Virtual distributed security system App 20060253700 - Della-Libera; Giovanni M. ;   et al. | 2006-11-09 |
Virtual distributed security system App 20060253699 - Della-Libera; Giovanni M. ;   et al. | 2006-11-09 |
XML-based language description for controlled devices Grant 7,130,895 - Zintel , et al. October 31, 2 | 2006-10-31 |
Authentication and Authorization Across Autonomous Network Systems App 20060184646 - Schmidt; Donald E. ;   et al. | 2006-08-17 |
Controlling computer applications' access to data App 20060174334 - Perlin; Eric C. ;   et al. | 2006-08-03 |
Schema-Based Services For Identity-Based Data Access App 20060161554 - Lucovsky; Mark H. ;   et al. | 2006-07-20 |
Using state information in a distributed environment Grant 7,062,539 - Leach , et al. June 13, 2 | 2006-06-13 |
Content provider for pull based intelligent caching system Grant 7,046,689 - Burns , et al. May 16, 2 | 2006-05-16 |
Method and system for controlling access privileges for trusted network nodes App 20060059359 - Reasor; Sterling M. ;   et al. | 2006-03-16 |
Virtual distributed security system App 20060041929 - Della-Libera; Giovanni M. ;   et al. | 2006-02-23 |
Virtual distributed security system App 20060041743 - Della-Libera; Giovanni M. ;   et al. | 2006-02-23 |
Messaging infrastructure for identity-centric data access Grant 6,985,958 - Lucovsky , et al. January 10, 2 | 2006-01-10 |
Dynamic self-configuration for ad hoc peer networking App 20050240665 - Gu, Ye ;   et al. | 2005-10-27 |
XML-based template language for devices and services Grant 6,910,068 - Zintel , et al. June 21, 2 | 2005-06-21 |
Dynamic self-configuration for ad hoc peer networking using mark-up language formated description messages Grant 6,892,230 - Gu , et al. May 10, 2 | 2005-05-10 |
XML-based template language for devices and services App 20050097503 - Zintel, William M. ;   et al. | 2005-05-05 |
System and methods providing enhanced security model App 20050091518 - Agarwal, Sameet H. ;   et al. | 2005-04-28 |
Using state information in a distributed environment App 20050080865 - Leach, Paul J. ;   et al. | 2005-04-14 |
XML-based template language for devices and services App 20050074018 - Zintel, William M. ;   et al. | 2005-04-07 |
Dynamic self-configuration for ad hoc peer networking App 20040260800 - Gu, Ye ;   et al. | 2004-12-23 |
Using state information in requests that are transmitted in a distributed network environment Grant 6,823,369 - Leach , et al. November 23, 2 | 2004-11-23 |
Pass-thru for client authentication App 20040210756 - Mowers, David R. ;   et al. | 2004-10-21 |
Deriving a symmetric key from an asymmetric key for file encryption or decryption App 20040146015 - Cross, David B. ;   et al. | 2004-07-29 |
File system operation and digital rights management (DRM) App 20040143736 - Cross, David B. ;   et al. | 2004-07-22 |
Mapping from a single sign-in service to a directory service App 20040098615 - Mowers, David R. ;   et al. | 2004-05-20 |
Enhanced computer intrusion detection methods and systems App 20030191953 - Pandit, Bhalchandra S. ;   et al. | 2003-10-09 |
Schema-based services for identity-based data access App 20030131073 - Lucovsky, Mark H. ;   et al. | 2003-07-10 |
Authentication and authorization across autonomous network systems App 20030120948 - Schmidt, Donald E. ;   et al. | 2003-06-26 |
Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider Grant 6,584,489 - Jones , et al. June 24, 2 | 2003-06-24 |
Using atomic messaging to increase the security of transferring data across a network App 20030084292 - Pierce, Shaun D. ;   et al. | 2003-05-01 |
Virtual distributed security system App 20030074579 - Della-Libera, Giovanni M. ;   et al. | 2003-04-17 |
Accessing heterogeneous data in a standardized manner App 20020184214 - Lucovsky, Mark ;   et al. | 2002-12-05 |
Authorizing a requesting entity to operate upon data structures App 20020184521 - Lucovsky, Mark ;   et al. | 2002-12-05 |
Messaging infrastructure for identity-centric data access App 20020174125 - Lucovsky, Mark ;   et al. | 2002-11-21 |
Using state information in a distributed environment App 20020138566 - Leach, Paul J. ;   et al. | 2002-09-26 |
Identity-centric data access App 20020133535 - Lucovsky, Mark ;   et al. | 2002-09-19 |
System and method of user logon in combination with user authentication for network access Grant 6,427,209 - Brezak, Jr. , et al. July 30, 2 | 2002-07-30 |
Efficient inter-process object and interface pinging Grant 6,405,262 - Vogel , et al. June 11, 2 | 2002-06-11 |
System and method of user logon in combination with user authentication for network access Grant 6,401,211 - Brezak, Jr. , et al. June 4, 2 | 2002-06-04 |
Document object print interface App 20020040410 - Leach, Paul J. ;   et al. | 2002-04-04 |
XML-based language description for controlled devices App 20020035621 - Zintel, William Michael ;   et al. | 2002-03-21 |
XML-based template language for devices and services App 20020029256 - Zintel, William M. ;   et al. | 2002-03-07 |
Method and system for resource management with independent real-time applications on a common set of machines App 20020007389 - Jones, Michael B. ;   et al. | 2002-01-17 |
Pull based, intelligent caching system and method Grant 6,324,182 - Burns , et al. November 27, 2 | 2001-11-27 |
Local service provider for pull based intelligent caching system Grant 6,298,373 - Burns , et al. October 2, 2 | 2001-10-02 |
Method and system for resource management with independent real-time applications on a common set of machines Grant 6,282,561 - Jones , et al. August 28, 2 | 2001-08-28 |
Content provider for pull based intelligent caching system App 20010014103 - Burns, Gregory ;   et al. | 2001-08-16 |
Content provider for pull based intelligent caching system Grant 6,275,496 - Burns , et al. August 14, 2 | 2001-08-14 |
Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider Grant 6,003,061 - Jones , et al. December 14, 1 | 1999-12-14 |
Pull based, intelligent caching system and method for delivering data over a network Grant 5,991,306 - Burns , et al. November 23, 1 | 1999-11-23 |
Method and apparatus for representing and applying network topological data Grant 5,968,121 - Logan , et al. October 19, 1 | 1999-10-19 |
Method and system for scheduling the execution of threads using optional time-specific scheduling constraints Grant 5,812,844 - Jones , et al. September 22, 1 | 1998-09-22 |
Heterogenous software configuration management apparatus Grant 5,339,435 - Lubkin , et al. August 16, 1 | 1994-08-16 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.