MUIR, JAMES

USPTO Trademark & Patent Filings

Muir James

Trademark applications and grants for Muir, James. Muir, James has 7 trademark applications. The latest application filed is for "DOGTOWN"

Company Profile
    Company Aliases
  • Muir, James
  • james muir
  • Muir; James - Ottawa CA
  • Muir; James - Kanata CA
  • MUIR; James - Ottawa CA
Entity Type INDIVIDUAL
Address 2567 WALNUT AVENUE VENICE, CALIFORNIA UNITED STATES 90291

*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Trademarks Patents
Patent Applications
Patent ApplicationDate
CHANGE-TOLERANT METHOD OF GENERATING AN IDENTIFIER FOR A COLLECTION OF ASSETS IN A COMPUTING ENVIRONMENT USING A SECRET SHARING SCHEME
20190108349 - 16/185564 Eisen; Phillip Alan ;   et al.
2019-04-11
METHOD AND SYSTEM FOR MEDIA PATH SECURITY
20160050069 - 14/780118 Griffin; Andy ;   et al.
2016-02-18
SYSTEM AND METHOD FOR GENERATING AND PROTECTING CRYPTOGRAPHIC KEYS
20150333906 - 14/377499 RAHMAN; SK MD Mizanur ;   et al.
2015-11-19
Method and System for Protecting Execution of Cryptographic Hash Functions
20140019771 - 14/008359 Emmett; Jonathan ;   et al.
2014-01-16
Change-Tolerant Method of Generating an Identifier for a Collection of Assets in a Computing Environment Using a Secret Sharing Scheme
20140007252 - 14/004979 Eisen; Philip Alan ;   et al.
2014-01-02
Change-tolerant method of generating an identifier for a collection of assets in a computing environment using a secret sharing scheme
10,599,855 - 16/185,564 Eisen , et al.
2020-03-24
System and method for generating and protecting cryptographic keys
9,503,259 - 14/377,499 Rahman , et al. November 22, 2
2016-11-22
System and method for generating and protecting cryptographic keys
9,503,259 - 14/377,499 Rahman , et al. November 22, 2
2016-11-22
Method and system for protecting execution of cryptographic hash functions
9,443,091 - 14/008,359 Emmett , et al. September 13, 2
2016-09-13
Method and system for protecting execution of cryptographic hash functions
9,443,091 - 14/008,359 Emmett , et al. September 13, 2
2016-09-13
Patent Grants & Applications
Company Registrations

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed