loadpatents
name:-0.015379905700684
name:-0.013351917266846
name:-0.011480093002319
McCallum; Nathaniel Philip Patent Filings

McCallum; Nathaniel Philip

Patent Applications and Registrations

Patent applications and USPTO patent grants for McCallum; Nathaniel Philip.The latest application filed is for "using a trusted execution environment for a cryptographic key wrapping scheme that verifies remote device capabilities".

Company Profile
14.11.14
  • McCallum; Nathaniel Philip - Raleigh NC
  • McCallum; Nathaniel Philip - Cary NC
  • McCallum; Nathaniel Philip - Nicholasville KY
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Proof-of-work key wrapping for restricting data execution based on device capabilities
Grant 11,436,352 - Bursell , et al. September 6, 2
2022-09-06
Proof-of-work key wrapping for cryptographically controlling data access
Grant 11,424,920 - Bursell , et al. August 23, 2
2022-08-23
Proof-of-work key wrapping with individual key fragments
Grant 11,411,728 - Bursell , et al. August 9, 2
2022-08-09
Using A Trusted Execution Environment For A Cryptographic Key Wrapping Scheme That Verifies Remote Device Capabilities
App 20220188405 - Bursell; Michael Hingston McLaughlin ;   et al.
2022-06-16
Proof-of-work key wrapping for temporally restricting data access
Grant 11,316,839 - Bursell , et al. April 26, 2
2022-04-26
Proof-of-work key wrapping with key thresholding
Grant 11,303,437 - Bursell , et al. April 12, 2
2022-04-12
Proof-of-work key wrapping for verifying device capabilities
Grant 11,271,734 - Bursell , et al. March 8, 2
2022-03-08
Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities
Grant 11,263,310 - Bursell , et al. March 1, 2
2022-03-01
Network Bound Encryption For Recovery Of Trusted Execution Environments
App 20220006620 - Bursell; Michael Hingston McLaughlin ;   et al.
2022-01-06
Network Bound Encryption For Orchestrating Workloads With Sensitive Data
App 20220006787 - Bursell; Michael Hingston McLaughlin ;   et al.
2022-01-06
Using emulation to improve startup time for just-in-time compilation
Grant 11,029,929 - McCallum June 8, 2
2021-06-08
Using A Trusted Execution Environment For A Proof-of-work Key Wrapping Scheme That Verifies Remote Device Capabilities
App 20210157904 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-05-27
Using A Trusted Execution Environment For A Proof-of-work Key Wrapping Scheme That Restricts Execution Based On Device Capabilities
App 20210157903 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-05-27
Copy-on-write (COW) rendering of graphical object models
Grant 11,017,748 - McCallum , et al. May 25, 2
2021-05-25
Proof-of-work Key Wrapping For Restricting Data Execution Based On Device Capabilities
App 20210056214 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping For Temporally Restricting Data Access
App 20210058378 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping With Integrated Key Fragments
App 20210058379 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping With Individual Key Fragments
App 20210058248 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping For Verifying Device Capabilities
App 20210058247 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping With Key Thresholding
App 20210058238 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Proof-of-work Key Wrapping For Crytographically Controlling Data Access
App 20210058245 - Bursell; Michael Hingston McLaughlin ;   et al.
2021-02-25
Using Emulation To Improve Startup Time For Just-in-time Compilation
App 20200241855 - McCallum; Nathaniel Philip
2020-07-30
Copy-on-write (COW) Rendering of graphical object models
App 20200058273 - McCallum; Nathaniel Philip ;   et al.
2020-02-20
Thwarting range extension attacks
Grant 10,524,131 - McCallum , et al. Dec
2019-12-31
Function attribute for dynamic stack allocation
Grant 9,250,878 - McCallum February 2, 2
2016-02-02

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed