loadpatents
name:-0.092586040496826
name:-0.14046788215637
name:-0.00051307678222656
Leach; Paul J. Patent Filings

Leach; Paul J.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Leach; Paul J..The latest application filed is for "pass-thru for client authentication".

Company Profile
0.89.73
  • Leach; Paul J. - Seattle WA
  • Leach; Paul J - Seattle WA
  • Leach; Paul J. - Winchester MA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Pass-thru for client authentication
Grant 9,819,666 - Mowers , et al. November 14, 2
2017-11-14
Pass-thru for client authentication
Grant 9,407,617 - Mowers , et al. August 2, 2
2016-08-02
Pass-Thru for Client Authentication
App 20160182488 - Mowers; David R. ;   et al.
2016-06-23
Transformation of sequential access control lists utilizing certificates
Grant 9,253,195 - Ellison , et al. February 2, 2
2016-02-02
Back-end constrained delegation model
Grant 9,118,672 - Novak , et al. August 25, 2
2015-08-25
Distributed computer systems with time-dependent credentials
Grant 9,058,467 - Novak , et al. June 16, 2
2015-06-16
Distributed computer systems with time-dependent credentials
Grant 9,032,492 - Novak , et al. May 12, 2
2015-05-12
Unobtrusive assurance of authentic user intent
Grant 8,996,866 - Cowan , et al. March 31, 2
2015-03-31
Resource access based on multiple scope levels
Grant 8,984,624 - Perumal , et al. March 17, 2
2015-03-17
Pass-Thru for Client Authentication
App 20140189823 - Mowers; David R. ;   et al.
2014-07-03
File system operation and digital rights management (DRM)
Grant 8,640,256 - Cross , et al. January 28, 2
2014-01-28
Distributed computer systems with time-dependent credentials
Grant 8,640,210 - Novak , et al. January 28, 2
2014-01-28
PassThru for client authentication
Grant 8,627,440 - Mowers , et al. January 7, 2
2014-01-07
Selective authorization based on authentication input attributes
Grant 8,621,561 - Cross , et al. December 31, 2
2013-12-31
Transformation of Sequential Access Control Lists Utilizing Certificates
App 20130283342 - Ellison; Carl M. ;   et al.
2013-10-24
Resource Access Based On Multiple Scope Levels
App 20130269025 - Perumal; Raja P. ;   et al.
2013-10-10
Fast-reconnection of negotiable authentication network clients
Grant 8,555,069 - Zhu , et al. October 8, 2
2013-10-08
Transformation of sequential access control lists utilizing certificates
Grant 8,468,579 - Ellison , et al. June 18, 2
2013-06-18
Resource access based on multiple scope levels
Grant 8,464,319 - Perumal , et al. June 11, 2
2013-06-11
Distributed Computer Systems With Time-dependent Credentials
App 20130061299 - Novak; Mark ;   et al.
2013-03-07
Distributed Computer Systems With Time-dependent Credentials
App 20130061301 - Novak; Mark ;   et al.
2013-03-07
Distributed Computer Systems With Time-dependent Credentials
App 20130061300 - Novak; Mark ;   et al.
2013-03-07
Translating role-based access control policy to resource authorization policy
Grant 8,381,306 - McPherson , et al. February 19, 2
2013-02-19
Virtual distributed security system
Grant 8,302,149 - Della-Libera , et al. October 30, 2
2012-10-30
Predictive HTTP authentication mode negotiation
Grant 8,266,680 - James , et al. September 11, 2
2012-09-11
Method and system for controlling access privileges for trusted network nodes
Grant 8,230,485 - Reasor , et al. July 24, 2
2012-07-24
Licensing protected content to application sets
Grant 8,225,390 - Ray , et al. July 17, 2
2012-07-17
File access in multi-protocol environment
Grant 8,214,641 - Field , et al. July 3, 2
2012-07-03
Back-end Constrained Delegation Model
App 20120131661 - Novak; Mark Fishel ;   et al.
2012-05-24
File System Operation And Digital Rights Management (drm)
App 20120117662 - Cross; David B. ;   et al.
2012-05-10
Kerberos ticket virtualization for network load balancers
Grant 8,132,246 - Ilac , et al. March 6, 2
2012-03-06
File system operation and digital rights management (DRM)
Grant 8,117,666 - Cross , et al. February 14, 2
2012-02-14
Domain ID service
Grant 8,006,295 - Ellison , et al. August 23, 2
2011-08-23
Resource Access Based On Multiple Scope Levels
App 20110173679 - Perumal; Raja P. ;   et al.
2011-07-14
System and methods providing enhanced security model
Grant 7,971,230 - Agarwal , et al. June 28, 2
2011-06-28
Unobtrusive Assurance Of Authentic User Intent
App 20110154505 - Cowan; Crispin ;   et al.
2011-06-23
Policy driven, credential delegation for single sign on and secure access to network resources
Grant 7,913,084 - Medvinsky , et al. March 22, 2
2011-03-22
Enhanced computer intrusion detection methods and systems
Grant 7,900,257 - Pandit , et al. March 1, 2
2011-03-01
Abstracting security policy from, and transforming to, native representations of access check mechanisms
Grant 7,882,539 - Paramasivam , et al. February 1, 2
2011-02-01
Virtual distributed security system
Grant 7,809,938 - Della-Libera , et al. October 5, 2
2010-10-05
Controlling execution of computer applications
Grant 7,810,153 - Perlin , et al. October 5, 2
2010-10-05
Predictive HTTP Authentication Mode Negotiation
App 20100251338 - James; Rick ;   et al.
2010-09-30
Biometric credential verification framework
App 20100242102 - Cross; David B. ;   et al.
2010-09-23
Controlling computer applications' access to data
Grant 7,802,294 - Perlin , et al. September 21, 2
2010-09-21
Fast-reconnection Of Negotiable Authentication Network Clients
App 20100228982 - Zhu; Liqiang ;   et al.
2010-09-09
Access control list inheritance thru object(s)
Grant 7,779,265 - Dubhashi , et al. August 17, 2
2010-08-17
Privilege restriction enforcement in a distributed system
Grant 7,757,281 - Field , et al. July 13, 2
2010-07-13
One time password integration with Kerberos
Grant 7,757,275 - Crall , et al. July 13, 2
2010-07-13
Virtual distributed security system
Grant 7,752,442 - Della-Libera , et al. July 6, 2
2010-07-06
Virtual distributed security system
Grant 7,752,431 - Della-Libera , et al. July 6, 2
2010-07-06
PassThru for Client Authentication
App 20100100953 - Mowers; David R. ;   et al.
2010-04-22
Schema-based services for identity-based data access
Grant 7,664,724 - Lucovsky , et al. February 16, 2
2010-02-16
Pass-thru for client authentication
Grant 7,644,275 - Mowers , et al. January 5, 2
2010-01-05
Licensing Protected Content To Application Sets
App 20090328134 - Ray; Kenneth D. ;   et al.
2009-12-31
Authentication and authorization across autonomous network systems
Grant 7,617,522 - Schmidt , et al. November 10, 2
2009-11-10
Dynamic self-configuration for ad hoc peer networking
Grant 7,602,756 - Gu , et al. October 13, 2
2009-10-13
Enhanced Computer Intrusion Detection Methods And Systems
App 20090241193 - Pandit; Bhalchandra S. ;   et al.
2009-09-24
Kerberos Ticket Virtualization For Network Load Balancers
App 20090217029 - Ilac; Cristian ;   et al.
2009-08-27
Method and system for resource management with independent real-time applications on a common set of machines
Grant 7,571,438 - Jones , et al. August 4, 2
2009-08-04
Selective Authorization Based On Authentication Input Attributes
App 20090178129 - Cross; David B. ;   et al.
2009-07-09
Dynamic self-configuration for ad hoc peer networking
Grant 7,558,846 - Gu , et al. July 7, 2
2009-07-07
Enhanced computer intrusion detection methods and systems
Grant 7,543,333 - Pandit , et al. June 2, 2
2009-06-02
File Access In Multi-protocol Environment
App 20090055921 - Field; Scott A. ;   et al.
2009-02-26
Dynamic self-configuration for AD HOC peer networking
Grant 7,487,230 - Gu , et al. February 3, 2
2009-02-03
Domain Id Service
App 20090007247 - Ellison; Carl M. ;   et al.
2009-01-01
Transformation Of Sequential Access Control Lists Utilizing Certificates
App 20080313712 - Ellison; Carl Melvin ;   et al.
2008-12-18
Entity Based Access Management
App 20080307486 - Ellison; Carl Melvin ;   et al.
2008-12-11
Access Control Negation Using Negative Groups
App 20080301780 - Ellison; Carl Melvin ;   et al.
2008-12-04
XML-based template language for devices and services
Grant 7,441,019 - Zintel , et al. October 21, 2
2008-10-21
XML-based template language for devices and services
Grant 7,437,434 - Zintel , et al. October 14, 2
2008-10-14
User mapping information extension for protocols
Grant 7,434,253 - Crall , et al. October 7, 2
2008-10-07
Model-based Access Control
App 20080244736 - Lampson; Butler ;   et al.
2008-10-02
File System Operation and Digital Rights Management (DRM)
App 20080235807 - Cross; David B. ;   et al.
2008-09-25
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,382,883 - Cross , et al. June 3, 2
2008-06-03
File system operation and digital rights management (DRM)
Grant 7,383,586 - Cross , et al. June 3, 2
2008-06-03
System And Methods Providing Enhanced Security Model
App 20080022358 - Agarwal; Sameet H. ;   et al.
2008-01-24
Privilege restriction enforcement in a distributed system
App 20080022368 - Field; Scott A. ;   et al.
2008-01-24
System and method for managing and authenticating services via service principal names
Grant 7,308,709 - Brezak, Jr. , et al. December 11, 2
2007-12-11
Translating role-based access control policy to resource authorization policy
App 20070283443 - McPherson; Dave ;   et al.
2007-12-06
Abstracting security policy from, and transforming to, native representations of access check mechanisms
App 20070283411 - Paramasivam; Muthukrishnan ;   et al.
2007-12-06
Using atomic messaging to increase the security of transferring data across a network
Grant 7,305,548 - Pierce , et al. December 4, 2
2007-12-04
Policy driven, credential delegation for single sign on and secure access to network resources
App 20070277231 - Medvinsky; Gennady ;   et al.
2007-11-29
Schema-based services for identity-based data access
Grant 7,302,634 - Lucovsky , et al. November 27, 2
2007-11-27
Authorizing a requesting entity to operate upon data structures
Grant 7,284,271 - Lucovsky , et al. October 16, 2
2007-10-16
Controlling execution of computer applications
App 20070186112 - Perlin; Eric C. ;   et al.
2007-08-09
System and methods providing enhanced security model
Grant 7,251,822 - Agarwal , et al. July 31, 2
2007-07-31
Access control list inheritance thru object(s)
App 20070136578 - Dubhashi; Kedarnath A. ;   et al.
2007-06-14
Deriving a Symmetric Key from an Asymmetric Key for File Encryption or Decryption
App 20070088947 - Cross; David B. ;   et al.
2007-04-19
Authentication and authorization across autonomous network systems
Grant 7,185,359 - Schmidt , et al. February 27, 2
2007-02-27
Deriving a symmetric key from an asymmetric key for file encryption or decryption
Grant 7,181,016 - Cross , et al. February 20, 2
2007-02-20
User mapping information extension for protocols
App 20070016782 - Crall; Christopher J. ;   et al.
2007-01-18
Dynamic self-configuration for ad hoc peer networking
App 20060291434 - Gu; Ye ;   et al.
2006-12-28
One time password integration with Kerberos
App 20060288230 - Crall; Christopher J. ;   et al.
2006-12-21
Accessing heterogeneous data in a standardized manner
Grant 7,136,859 - Lucovsky , et al. November 14, 2
2006-11-14
Virtual distributed security system
App 20060253700 - Della-Libera; Giovanni M. ;   et al.
2006-11-09
Virtual distributed security system
App 20060253699 - Della-Libera; Giovanni M. ;   et al.
2006-11-09
XML-based language description for controlled devices
Grant 7,130,895 - Zintel , et al. October 31, 2
2006-10-31
Authentication and Authorization Across Autonomous Network Systems
App 20060184646 - Schmidt; Donald E. ;   et al.
2006-08-17
Controlling computer applications' access to data
App 20060174334 - Perlin; Eric C. ;   et al.
2006-08-03
Schema-Based Services For Identity-Based Data Access
App 20060161554 - Lucovsky; Mark H. ;   et al.
2006-07-20
Using state information in a distributed environment
Grant 7,062,539 - Leach , et al. June 13, 2
2006-06-13
Content provider for pull based intelligent caching system
Grant 7,046,689 - Burns , et al. May 16, 2
2006-05-16
Method and system for controlling access privileges for trusted network nodes
App 20060059359 - Reasor; Sterling M. ;   et al.
2006-03-16
Virtual distributed security system
App 20060041929 - Della-Libera; Giovanni M. ;   et al.
2006-02-23
Virtual distributed security system
App 20060041743 - Della-Libera; Giovanni M. ;   et al.
2006-02-23
Messaging infrastructure for identity-centric data access
Grant 6,985,958 - Lucovsky , et al. January 10, 2
2006-01-10
Dynamic self-configuration for ad hoc peer networking
App 20050240665 - Gu, Ye ;   et al.
2005-10-27
XML-based template language for devices and services
Grant 6,910,068 - Zintel , et al. June 21, 2
2005-06-21
Dynamic self-configuration for ad hoc peer networking using mark-up language formated description messages
Grant 6,892,230 - Gu , et al. May 10, 2
2005-05-10
XML-based template language for devices and services
App 20050097503 - Zintel, William M. ;   et al.
2005-05-05
System and methods providing enhanced security model
App 20050091518 - Agarwal, Sameet H. ;   et al.
2005-04-28
Using state information in a distributed environment
App 20050080865 - Leach, Paul J. ;   et al.
2005-04-14
XML-based template language for devices and services
App 20050074018 - Zintel, William M. ;   et al.
2005-04-07
Dynamic self-configuration for ad hoc peer networking
App 20040260800 - Gu, Ye ;   et al.
2004-12-23
Using state information in requests that are transmitted in a distributed network environment
Grant 6,823,369 - Leach , et al. November 23, 2
2004-11-23
Pass-thru for client authentication
App 20040210756 - Mowers, David R. ;   et al.
2004-10-21
Deriving a symmetric key from an asymmetric key for file encryption or decryption
App 20040146015 - Cross, David B. ;   et al.
2004-07-29
File system operation and digital rights management (DRM)
App 20040143736 - Cross, David B. ;   et al.
2004-07-22
Mapping from a single sign-in service to a directory service
App 20040098615 - Mowers, David R. ;   et al.
2004-05-20
Enhanced computer intrusion detection methods and systems
App 20030191953 - Pandit, Bhalchandra S. ;   et al.
2003-10-09
Schema-based services for identity-based data access
App 20030131073 - Lucovsky, Mark H. ;   et al.
2003-07-10
Authentication and authorization across autonomous network systems
App 20030120948 - Schmidt, Donald E. ;   et al.
2003-06-26
Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider
Grant 6,584,489 - Jones , et al. June 24, 2
2003-06-24
Using atomic messaging to increase the security of transferring data across a network
App 20030084292 - Pierce, Shaun D. ;   et al.
2003-05-01
Virtual distributed security system
App 20030074579 - Della-Libera, Giovanni M. ;   et al.
2003-04-17
Accessing heterogeneous data in a standardized manner
App 20020184214 - Lucovsky, Mark ;   et al.
2002-12-05
Authorizing a requesting entity to operate upon data structures
App 20020184521 - Lucovsky, Mark ;   et al.
2002-12-05
Messaging infrastructure for identity-centric data access
App 20020174125 - Lucovsky, Mark ;   et al.
2002-11-21
Using state information in a distributed environment
App 20020138566 - Leach, Paul J. ;   et al.
2002-09-26
Identity-centric data access
App 20020133535 - Lucovsky, Mark ;   et al.
2002-09-19
System and method of user logon in combination with user authentication for network access
Grant 6,427,209 - Brezak, Jr. , et al. July 30, 2
2002-07-30
Efficient inter-process object and interface pinging
Grant 6,405,262 - Vogel , et al. June 11, 2
2002-06-11
System and method of user logon in combination with user authentication for network access
Grant 6,401,211 - Brezak, Jr. , et al. June 4, 2
2002-06-04
Document object print interface
App 20020040410 - Leach, Paul J. ;   et al.
2002-04-04
XML-based language description for controlled devices
App 20020035621 - Zintel, William Michael ;   et al.
2002-03-21
XML-based template language for devices and services
App 20020029256 - Zintel, William M. ;   et al.
2002-03-07
Method and system for resource management with independent real-time applications on a common set of machines
App 20020007389 - Jones, Michael B. ;   et al.
2002-01-17
Pull based, intelligent caching system and method
Grant 6,324,182 - Burns , et al. November 27, 2
2001-11-27
Local service provider for pull based intelligent caching system
Grant 6,298,373 - Burns , et al. October 2, 2
2001-10-02
Method and system for resource management with independent real-time applications on a common set of machines
Grant 6,282,561 - Jones , et al. August 28, 2
2001-08-28
Content provider for pull based intelligent caching system
App 20010014103 - Burns, Gregory ;   et al.
2001-08-16
Content provider for pull based intelligent caching system
Grant 6,275,496 - Burns , et al. August 14, 2
2001-08-14
Method and system for scheduling the use of a computer system resource using a resource planner and a resource provider
Grant 6,003,061 - Jones , et al. December 14, 1
1999-12-14
Pull based, intelligent caching system and method for delivering data over a network
Grant 5,991,306 - Burns , et al. November 23, 1
1999-11-23
Method and apparatus for representing and applying network topological data
Grant 5,968,121 - Logan , et al. October 19, 1
1999-10-19
Method and system for scheduling the execution of threads using optional time-specific scheduling constraints
Grant 5,812,844 - Jones , et al. September 22, 1
1998-09-22
Heterogenous software configuration management apparatus
Grant 5,339,435 - Lubkin , et al. August 16, 1
1994-08-16

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed