loadpatents
Patent applications and USPTO patent grants for Roth; Gregory B..The latest application filed is for "provisioning a device to be an authentication device".
Patent | Date |
---|---|
Hierarchical data access techniques using derived cryptographic material Grant 11,146,541 - Roth , et al. October 12, 2 | 2021-10-12 |
Techniques for delegation of access privileges Grant 11,102,189 - O'Neill , et al. August 24, 2 | 2021-08-24 |
Provisioning A Device To Be An Authentication Device App 20210211419 - Roth; Gregory B. ;   et al. | 2021-07-08 |
Authentication through a secret holding proxy Grant 10,931,442 - Roth , et al. February 23, 2 | 2021-02-23 |
Use of metadata for computing resource access Grant 10,911,428 - Roth , et al. February 2, 2 | 2021-02-02 |
Protection from data security threats Grant 10,904,233 - Roth , et al. January 26, 2 | 2021-01-26 |
Flexibly configurable data modification services Grant 10,834,139 - Roth , et al. November 10, 2 | 2020-11-10 |
Provisioning a device to be an authentication device Grant 10,826,892 - Roth , et al. November 3, 2 | 2020-11-03 |
Adaptive timeouts for security credentials Grant 10,652,232 - Roth , et al. | 2020-05-12 |
Finite life instances Grant 10,635,997 - Roth , et al. | 2020-04-28 |
Virtual requests Grant 10,623,399 - Allen , et al. | 2020-04-14 |
Hierarchical Data Access Techniques App 20200112550 - Roth; Gregory B. ;   et al. | 2020-04-09 |
Client Account Versioning Metadata Manager For Cloud Computing Environments App 20200067791 - Roth; Gregory B. ;   et al. | 2020-02-27 |
Performing operations on intelligent storage with hardened interfaces Grant 10,503,917 - Roth , et al. Dec | 2019-12-10 |
Client account versioning metadata manager for cloud computing environments Grant 10,469,330 - Roth , et al. No | 2019-11-05 |
Multiple authority key derivation Grant 10,425,223 - Roth , et al. Sept | 2019-09-24 |
Data access control utilizing key restriction Grant 10,356,062 - Roth , et al. July 16, 2 | 2019-07-16 |
Multi-user secret decay Grant 10,341,359 - Roth , et al. | 2019-07-02 |
Browser security module Grant 10,313,112 - Fitch , et al. | 2019-06-04 |
Techniques for data security in a multi-tenant environment Grant 10,270,781 - Roth , et al. | 2019-04-23 |
Authorized delegation of permissions Grant 10,263,994 - Roth , et al. | 2019-04-16 |
Performing Operations On Intelligent Storage With Hardened Interfaces App 20190080099 - Roth; Gregory B. ;   et al. | 2019-03-14 |
Flexibly Configurable Data Modification Services App 20190036973 - Roth; Gregory B. ;   et al. | 2019-01-31 |
Automatic privilege determination Grant 10,158,670 - Roth , et al. Dec | 2018-12-18 |
Entity to authorize delegation of permissions Grant 10,110,587 - Roth , et al. October 23, 2 | 2018-10-23 |
Stateless and secure authentication Grant 10,110,579 - Fitch , et al. October 23, 2 | 2018-10-23 |
Authentication through a secret holding proxy Grant 10,103,875 - Roth , et al. October 16, 2 | 2018-10-16 |
Flexibly configurable data modification services Grant 10,084,818 - Roth , et al. September 25, 2 | 2018-09-25 |
Multiple Authority Key Derivation App 20180270051 - Roth; Gregory B. ;   et al. | 2018-09-20 |
Multiple authority key derivation Grant 10,044,503 - Roth , et al. August 7, 2 | 2018-08-07 |
Techniques for administrating finite life instances Grant 9,928,469 - Roth , et al. March 27, 2 | 2018-03-27 |
Securing a remote database Grant 9,898,618 - Roth , et al. February 20, 2 | 2018-02-20 |
Source identification for unauthorized copies of content Grant 9,872,067 - Roth , et al. January 16, 2 | 2018-01-16 |
Browser Security Module App 20170373840 - Fitch; Nathan R. ;   et al. | 2017-12-28 |
Protection From Data Security Threats App 20170331808 - Roth; Gregory B. ;   et al. | 2017-11-16 |
Entity To Authorize Delegation Of Permissions App 20170272423 - Roth; Gregory B. ;   et al. | 2017-09-21 |
Portable access to auditing information Grant 9,756,031 - Roth , et al. September 5, 2 | 2017-09-05 |
Securing a remote database Grant 9,727,743 - Roth , et al. August 8, 2 | 2017-08-08 |
Provisioning A Device To Be An Authentication Device App 20170223014 - Roth; Gregory B. ;   et al. | 2017-08-03 |
Browser Security Module App 20170187521 - Fitch; Nathan R. ;   et al. | 2017-06-29 |
Entity to authorize delegation of permissions Grant 9,686,261 - Roth , et al. June 20, 2 | 2017-06-20 |
Protection from data security threats Grant 9,660,972 - Roth , et al. May 23, 2 | 2017-05-23 |
Adaptive Timeouts For Security Credentials App 20170134367 - Roth; Gregory B. ;   et al. | 2017-05-11 |
Securing multifactor authentication Grant 9,639,825 - Roth , et al. May 2, 2 | 2017-05-02 |
Provisioning a device to be an authentication device Grant 9,628,875 - Roth , et al. April 18, 2 | 2017-04-18 |
Implementation of secure communications in a support system Grant 9,607,162 - Roth , et al. March 28, 2 | 2017-03-28 |
Adaptive timeouts for security credentials Grant 9,571,488 - Roth , et al. February 14, 2 | 2017-02-14 |
Once only distribution of secrets Grant 9,571,481 - Baer , et al. February 14, 2 | 2017-02-14 |
Account state simulation service for cloud computing environments Grant 9,565,260 - Roth , et al. February 7, 2 | 2017-02-07 |
Virtual requests Grant 9,450,758 - Allen , et al. September 20, 2 | 2016-09-20 |
Techniques For Data Security In A Multi-tenant Environment App 20160205110 - Roth; Gregory B. ;   et al. | 2016-07-14 |
Source Identification For Unauthorized Copies Of Content App 20160191993 - Roth; Gregory B. ;   et al. | 2016-06-30 |
Source identification for unauthorized copies of content Grant 9,305,177 - Roth , et al. April 5, 2 | 2016-04-05 |
Managing autocorrect actions Grant 9,292,621 - Roth March 22, 2 | 2016-03-22 |
Techniques for data security in a multi-tenant environment Grant 9,294,507 - Roth , et al. March 22, 2 | 2016-03-22 |
Adaptive Timeouts For Security Credentials App 20160080367 - Roth; Gregory B. ;   et al. | 2016-03-17 |
Hierarchical Data Access Techniques App 20160065549 - Roth; Gregory B. ;   et al. | 2016-03-03 |
Automatic privilege determination Grant 9,264,449 - Roth , et al. February 16, 2 | 2016-02-16 |
Decentralized verification in a distributed system Grant 9,258,118 - Roth , et al. February 9, 2 | 2016-02-09 |
Securing a remote database Grant 9,256,762 - Roth , et al. February 9, 2 | 2016-02-09 |
Authentication adaptation Grant 9,240,886 - Allen , et al. January 19, 2 | 2016-01-19 |
Browser security module Grant 9,225,690 - Fitch , et al. December 29, 2 | 2015-12-29 |
Constrained credentialed impersonation Grant 9,225,744 - Behm , et al. December 29, 2 | 2015-12-29 |
Stateless And Secure Authentication App 20150365394 - FITCH; NATHAN R. ;   et al. | 2015-12-17 |
Key generation for hierarchical data access Grant 9,215,076 - Roth , et al. December 15, 2 | 2015-12-15 |
Mixed-mode authorization metadata manager for cloud computing environments Grant 9,210,178 - Roth , et al. December 8, 2 | 2015-12-08 |
Implementation Of Secure Communications In A Support System App 20150347763 - Roth; Gregory B. ;   et al. | 2015-12-03 |
Multi-user Secret Decay App 20150350226 - Roth; Gregory B. ;   et al. | 2015-12-03 |
Adaptive timeouts for security credentials Grant 9,203,818 - Roth , et al. December 1, 2 | 2015-12-01 |
Techniques for client constructed sessions Grant 9,203,613 - Roth , et al. December 1, 2 | 2015-12-01 |
Authorized Delegation Of Permissions App 20150341368 - Roth; Gregory B. ;   et al. | 2015-11-26 |
Key derivation techniques Grant 9,197,409 - Roth , et al. November 24, 2 | 2015-11-24 |
Parameter based key derivation Grant 9,178,701 - Roth , et al. November 3, 2 | 2015-11-03 |
Account State Simulation Service For Cloud Computing Environments App 20150312356 - ROTH; GREGORY B. ;   et al. | 2015-10-29 |
Entity To Authorize Delegation Of Permissions App 20150304294 - Roth; Gregory B. ;   et al. | 2015-10-22 |
Stateless and secure authentication Grant 9,117,062 - Fitch , et al. August 25, 2 | 2015-08-25 |
Multi-user secret decay Grant 9,106,405 - Roth , et al. August 11, 2 | 2015-08-11 |
Authorized delegation of permissions Grant 9,098,675 - Roth , et al. August 4, 2 | 2015-08-04 |
Account state simulation service for cloud computing environments Grant 9,075,788 - Roth , et al. July 7, 2 | 2015-07-07 |
Filtering communications Grant 9,053,297 - Fitch , et al. June 9, 2 | 2015-06-09 |
Implementation of secure communications in a support system Grant 9,037,511 - Roth , et al. May 19, 2 | 2015-05-19 |
Secret variation for network sessions Grant 9,038,148 - Roth , et al. May 19, 2 | 2015-05-19 |
Tolerance factor-based secret decay Grant 8,996,860 - Roth , et al. March 31, 2 | 2015-03-31 |
Use of metadata for computing resource access Grant 8,973,108 - Roth , et al. March 3, 2 | 2015-03-03 |
Entity to authorize delegation of permissions Grant 8,966,570 - Roth , et al. February 24, 2 | 2015-02-24 |
Impersonation authorizations Grant 8,955,149 - Baer , et al. February 10, 2 | 2015-02-10 |
Dynamic data loss prevention in a multi-tenant environment Grant 8,938,775 - Roth , et al. January 20, 2 | 2015-01-20 |
Multiple authority key derivation Grant 8,892,865 - Roth , et al. November 18, 2 | 2014-11-18 |
Portable access to auditing information Grant 8,881,256 - Roth , et al. November 4, 2 | 2014-11-04 |
Techniques For Delegation Of Access Privileges App 20140310769 - O'Neill; Kevin Ross ;   et al. | 2014-10-16 |
Account cloning service for cloud computing environments Grant 8,856,077 - Roth , et al. October 7, 2 | 2014-10-07 |
Federated identity broker Grant 8,856,957 - Roth , et al. October 7, 2 | 2014-10-07 |
Source Identification For Unauthorized Copies Of Content App 20140258732 - Roth; Gregory B. ;   et al. | 2014-09-11 |
Client-specified schema extensions in cloud computing environments Grant 8,805,971 - Roth , et al. August 12, 2 | 2014-08-12 |
Secure proxying using network intermediaries Grant 8,799,641 - Seidenberg , et al. August 5, 2 | 2014-08-05 |
Techniques for delegation of access privileges Grant 8,769,642 - O'Neill , et al. July 1, 2 | 2014-07-01 |
Policy compliance-based secure data access Grant 8,756,651 - Baer , et al. June 17, 2 | 2014-06-17 |
Automated secret renegotiation Grant 8,745,710 - Roth , et al. June 3, 2 | 2014-06-03 |
Source identification for unauthorized copies of content Grant 8,739,308 - Roth , et al. May 27, 2 | 2014-05-27 |
Key management in a distributed system Grant 8,724,815 - Roth , et al. May 13, 2 | 2014-05-13 |
Allocating financial risk and reward in a multi-tenant environment Grant 8,719,131 - Roth , et al. May 6, 2 | 2014-05-06 |
Virtual requests Grant 8,656,471 - Allen , et al. February 18, 2 | 2014-02-18 |
Authored injections of context that are resolved at authentication time Grant 8,640,200 - Roth , et al. January 28, 2 | 2014-01-28 |
System and method for recognizing malicious credential guessing attacks Grant 8,490,162 - Popoveniuc , et al. July 16, 2 | 2013-07-16 |
Techniques For Client Contructed Sessions App 20130086661 - Roth; Gregory B. ;   et al. | 2013-04-04 |
Implementation Of Secure Communications In A Support System App 20130085880 - Roth; Gregory B. ;   et al. | 2013-04-04 |
Key Derivation Techniques App 20130086663 - Roth; Gregory B. ;   et al. | 2013-04-04 |
Parameter Based Key Derivation App 20130086662 - Roth; Gregory B. ;   et al. | 2013-04-04 |
Policy Compliance-based Secure Data Access App 20130081101 - Baer; Graeme D. ;   et al. | 2013-03-28 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.