loadpatents
name:-0.034873008728027
name:-0.11472392082214
name:-0.020817995071411
Roth; Gregory B. Patent Filings

Roth; Gregory B.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Roth; Gregory B..The latest application filed is for "provisioning a device to be an authentication device".

Company Profile
23.130.34
  • Roth; Gregory B. - Seattle WA
  • Roth; Gregory B - Seattle WA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Hierarchical data access techniques using derived cryptographic material
Grant 11,146,541 - Roth , et al. October 12, 2
2021-10-12
Techniques for delegation of access privileges
Grant 11,102,189 - O'Neill , et al. August 24, 2
2021-08-24
Provisioning A Device To Be An Authentication Device
App 20210211419 - Roth; Gregory B. ;   et al.
2021-07-08
Authentication through a secret holding proxy
Grant 10,931,442 - Roth , et al. February 23, 2
2021-02-23
Use of metadata for computing resource access
Grant 10,911,428 - Roth , et al. February 2, 2
2021-02-02
Protection from data security threats
Grant 10,904,233 - Roth , et al. January 26, 2
2021-01-26
Flexibly configurable data modification services
Grant 10,834,139 - Roth , et al. November 10, 2
2020-11-10
Provisioning a device to be an authentication device
Grant 10,826,892 - Roth , et al. November 3, 2
2020-11-03
Adaptive timeouts for security credentials
Grant 10,652,232 - Roth , et al.
2020-05-12
Finite life instances
Grant 10,635,997 - Roth , et al.
2020-04-28
Virtual requests
Grant 10,623,399 - Allen , et al.
2020-04-14
Hierarchical Data Access Techniques
App 20200112550 - Roth; Gregory B. ;   et al.
2020-04-09
Client Account Versioning Metadata Manager For Cloud Computing Environments
App 20200067791 - Roth; Gregory B. ;   et al.
2020-02-27
Performing operations on intelligent storage with hardened interfaces
Grant 10,503,917 - Roth , et al. Dec
2019-12-10
Client account versioning metadata manager for cloud computing environments
Grant 10,469,330 - Roth , et al. No
2019-11-05
Multiple authority key derivation
Grant 10,425,223 - Roth , et al. Sept
2019-09-24
Data access control utilizing key restriction
Grant 10,356,062 - Roth , et al. July 16, 2
2019-07-16
Multi-user secret decay
Grant 10,341,359 - Roth , et al.
2019-07-02
Browser security module
Grant 10,313,112 - Fitch , et al.
2019-06-04
Techniques for data security in a multi-tenant environment
Grant 10,270,781 - Roth , et al.
2019-04-23
Authorized delegation of permissions
Grant 10,263,994 - Roth , et al.
2019-04-16
Performing Operations On Intelligent Storage With Hardened Interfaces
App 20190080099 - Roth; Gregory B. ;   et al.
2019-03-14
Flexibly Configurable Data Modification Services
App 20190036973 - Roth; Gregory B. ;   et al.
2019-01-31
Automatic privilege determination
Grant 10,158,670 - Roth , et al. Dec
2018-12-18
Entity to authorize delegation of permissions
Grant 10,110,587 - Roth , et al. October 23, 2
2018-10-23
Stateless and secure authentication
Grant 10,110,579 - Fitch , et al. October 23, 2
2018-10-23
Authentication through a secret holding proxy
Grant 10,103,875 - Roth , et al. October 16, 2
2018-10-16
Flexibly configurable data modification services
Grant 10,084,818 - Roth , et al. September 25, 2
2018-09-25
Multiple Authority Key Derivation
App 20180270051 - Roth; Gregory B. ;   et al.
2018-09-20
Multiple authority key derivation
Grant 10,044,503 - Roth , et al. August 7, 2
2018-08-07
Techniques for administrating finite life instances
Grant 9,928,469 - Roth , et al. March 27, 2
2018-03-27
Securing a remote database
Grant 9,898,618 - Roth , et al. February 20, 2
2018-02-20
Source identification for unauthorized copies of content
Grant 9,872,067 - Roth , et al. January 16, 2
2018-01-16
Browser Security Module
App 20170373840 - Fitch; Nathan R. ;   et al.
2017-12-28
Protection From Data Security Threats
App 20170331808 - Roth; Gregory B. ;   et al.
2017-11-16
Entity To Authorize Delegation Of Permissions
App 20170272423 - Roth; Gregory B. ;   et al.
2017-09-21
Portable access to auditing information
Grant 9,756,031 - Roth , et al. September 5, 2
2017-09-05
Securing a remote database
Grant 9,727,743 - Roth , et al. August 8, 2
2017-08-08
Provisioning A Device To Be An Authentication Device
App 20170223014 - Roth; Gregory B. ;   et al.
2017-08-03
Browser Security Module
App 20170187521 - Fitch; Nathan R. ;   et al.
2017-06-29
Entity to authorize delegation of permissions
Grant 9,686,261 - Roth , et al. June 20, 2
2017-06-20
Protection from data security threats
Grant 9,660,972 - Roth , et al. May 23, 2
2017-05-23
Adaptive Timeouts For Security Credentials
App 20170134367 - Roth; Gregory B. ;   et al.
2017-05-11
Securing multifactor authentication
Grant 9,639,825 - Roth , et al. May 2, 2
2017-05-02
Provisioning a device to be an authentication device
Grant 9,628,875 - Roth , et al. April 18, 2
2017-04-18
Implementation of secure communications in a support system
Grant 9,607,162 - Roth , et al. March 28, 2
2017-03-28
Adaptive timeouts for security credentials
Grant 9,571,488 - Roth , et al. February 14, 2
2017-02-14
Once only distribution of secrets
Grant 9,571,481 - Baer , et al. February 14, 2
2017-02-14
Account state simulation service for cloud computing environments
Grant 9,565,260 - Roth , et al. February 7, 2
2017-02-07
Virtual requests
Grant 9,450,758 - Allen , et al. September 20, 2
2016-09-20
Techniques For Data Security In A Multi-tenant Environment
App 20160205110 - Roth; Gregory B. ;   et al.
2016-07-14
Source Identification For Unauthorized Copies Of Content
App 20160191993 - Roth; Gregory B. ;   et al.
2016-06-30
Source identification for unauthorized copies of content
Grant 9,305,177 - Roth , et al. April 5, 2
2016-04-05
Managing autocorrect actions
Grant 9,292,621 - Roth March 22, 2
2016-03-22
Techniques for data security in a multi-tenant environment
Grant 9,294,507 - Roth , et al. March 22, 2
2016-03-22
Adaptive Timeouts For Security Credentials
App 20160080367 - Roth; Gregory B. ;   et al.
2016-03-17
Hierarchical Data Access Techniques
App 20160065549 - Roth; Gregory B. ;   et al.
2016-03-03
Automatic privilege determination
Grant 9,264,449 - Roth , et al. February 16, 2
2016-02-16
Decentralized verification in a distributed system
Grant 9,258,118 - Roth , et al. February 9, 2
2016-02-09
Securing a remote database
Grant 9,256,762 - Roth , et al. February 9, 2
2016-02-09
Authentication adaptation
Grant 9,240,886 - Allen , et al. January 19, 2
2016-01-19
Browser security module
Grant 9,225,690 - Fitch , et al. December 29, 2
2015-12-29
Constrained credentialed impersonation
Grant 9,225,744 - Behm , et al. December 29, 2
2015-12-29
Stateless And Secure Authentication
App 20150365394 - FITCH; NATHAN R. ;   et al.
2015-12-17
Key generation for hierarchical data access
Grant 9,215,076 - Roth , et al. December 15, 2
2015-12-15
Mixed-mode authorization metadata manager for cloud computing environments
Grant 9,210,178 - Roth , et al. December 8, 2
2015-12-08
Implementation Of Secure Communications In A Support System
App 20150347763 - Roth; Gregory B. ;   et al.
2015-12-03
Multi-user Secret Decay
App 20150350226 - Roth; Gregory B. ;   et al.
2015-12-03
Adaptive timeouts for security credentials
Grant 9,203,818 - Roth , et al. December 1, 2
2015-12-01
Techniques for client constructed sessions
Grant 9,203,613 - Roth , et al. December 1, 2
2015-12-01
Authorized Delegation Of Permissions
App 20150341368 - Roth; Gregory B. ;   et al.
2015-11-26
Key derivation techniques
Grant 9,197,409 - Roth , et al. November 24, 2
2015-11-24
Parameter based key derivation
Grant 9,178,701 - Roth , et al. November 3, 2
2015-11-03
Account State Simulation Service For Cloud Computing Environments
App 20150312356 - ROTH; GREGORY B. ;   et al.
2015-10-29
Entity To Authorize Delegation Of Permissions
App 20150304294 - Roth; Gregory B. ;   et al.
2015-10-22
Stateless and secure authentication
Grant 9,117,062 - Fitch , et al. August 25, 2
2015-08-25
Multi-user secret decay
Grant 9,106,405 - Roth , et al. August 11, 2
2015-08-11
Authorized delegation of permissions
Grant 9,098,675 - Roth , et al. August 4, 2
2015-08-04
Account state simulation service for cloud computing environments
Grant 9,075,788 - Roth , et al. July 7, 2
2015-07-07
Filtering communications
Grant 9,053,297 - Fitch , et al. June 9, 2
2015-06-09
Implementation of secure communications in a support system
Grant 9,037,511 - Roth , et al. May 19, 2
2015-05-19
Secret variation for network sessions
Grant 9,038,148 - Roth , et al. May 19, 2
2015-05-19
Tolerance factor-based secret decay
Grant 8,996,860 - Roth , et al. March 31, 2
2015-03-31
Use of metadata for computing resource access
Grant 8,973,108 - Roth , et al. March 3, 2
2015-03-03
Entity to authorize delegation of permissions
Grant 8,966,570 - Roth , et al. February 24, 2
2015-02-24
Impersonation authorizations
Grant 8,955,149 - Baer , et al. February 10, 2
2015-02-10
Dynamic data loss prevention in a multi-tenant environment
Grant 8,938,775 - Roth , et al. January 20, 2
2015-01-20
Multiple authority key derivation
Grant 8,892,865 - Roth , et al. November 18, 2
2014-11-18
Portable access to auditing information
Grant 8,881,256 - Roth , et al. November 4, 2
2014-11-04
Techniques For Delegation Of Access Privileges
App 20140310769 - O'Neill; Kevin Ross ;   et al.
2014-10-16
Account cloning service for cloud computing environments
Grant 8,856,077 - Roth , et al. October 7, 2
2014-10-07
Federated identity broker
Grant 8,856,957 - Roth , et al. October 7, 2
2014-10-07
Source Identification For Unauthorized Copies Of Content
App 20140258732 - Roth; Gregory B. ;   et al.
2014-09-11
Client-specified schema extensions in cloud computing environments
Grant 8,805,971 - Roth , et al. August 12, 2
2014-08-12
Secure proxying using network intermediaries
Grant 8,799,641 - Seidenberg , et al. August 5, 2
2014-08-05
Techniques for delegation of access privileges
Grant 8,769,642 - O'Neill , et al. July 1, 2
2014-07-01
Policy compliance-based secure data access
Grant 8,756,651 - Baer , et al. June 17, 2
2014-06-17
Automated secret renegotiation
Grant 8,745,710 - Roth , et al. June 3, 2
2014-06-03
Source identification for unauthorized copies of content
Grant 8,739,308 - Roth , et al. May 27, 2
2014-05-27
Key management in a distributed system
Grant 8,724,815 - Roth , et al. May 13, 2
2014-05-13
Allocating financial risk and reward in a multi-tenant environment
Grant 8,719,131 - Roth , et al. May 6, 2
2014-05-06
Virtual requests
Grant 8,656,471 - Allen , et al. February 18, 2
2014-02-18
Authored injections of context that are resolved at authentication time
Grant 8,640,200 - Roth , et al. January 28, 2
2014-01-28
System and method for recognizing malicious credential guessing attacks
Grant 8,490,162 - Popoveniuc , et al. July 16, 2
2013-07-16
Techniques For Client Contructed Sessions
App 20130086661 - Roth; Gregory B. ;   et al.
2013-04-04
Implementation Of Secure Communications In A Support System
App 20130085880 - Roth; Gregory B. ;   et al.
2013-04-04
Key Derivation Techniques
App 20130086663 - Roth; Gregory B. ;   et al.
2013-04-04
Parameter Based Key Derivation
App 20130086662 - Roth; Gregory B. ;   et al.
2013-04-04
Policy Compliance-based Secure Data Access
App 20130081101 - Baer; Graeme D. ;   et al.
2013-03-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed