loadpatents
name:-0.044431924819946
name:-0.029364109039307
name:-0.00040698051452637
Schunter; Matthias Patent Filings

Schunter; Matthias

Patent Applications and Registrations

Patent applications and USPTO patent grants for Schunter; Matthias.The latest application filed is for "technologies for protocol execution with aggregation and caching".

Company Profile
0.30.35
  • Schunter; Matthias - Seehein-Jugenheim DE
  • Schunter; Matthias - Seeheim-Jugenheim DE
  • Schunter; Matthias - Zurich N/A CH
  • Schunter; Matthias - US
  • Schunter; Matthias - Oldenburg DE
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Technologies For Protocol Execution With Aggregation And Caching
App 20210377145 - Schunter; Matthias
2021-12-02
Technologies for protocol execution with aggregation and caching
Grant 11,121,958 - Schunter September 14, 2
2021-09-14
Technologies For Protocol Execution With Aggregation And Caching
App 20200336402 - Schunter; Matthias
2020-10-22
Technologies for protocol execution with aggregation and caching
Grant 10,644,984 - Schunter
2020-05-05
Technologies For Protocol Execution With Aggregation And Caching
App 20180145898 - Schunter; Matthias
2018-05-24
Technologies for protocol execution with aggregation and caching
Grant 9,860,153 - Schunter January 2, 2
2018-01-02
Symmetric keying and chain of trust
Grant 9,768,951 - Schulz , et al. September 19, 2
2017-09-19
Symmetric Keying And Chain Of Trust
App 20170242998 - SCHULZ; STEFFEN ;   et al.
2017-08-24
Technologies For Protocol Execution With Aggregation And Caching
App 20160182343 - Schunter; Matthias
2016-06-23
Symmetric keying and chain of trust
Grant 9,348,997 - Schulz , et al. May 24, 2
2016-05-24
Hardware emulation using on-the-fly virtualization
Grant 9,250,942 - Carbone , et al. February 2, 2
2016-02-02
Method and system for policy driven data distribution
Grant 9,202,080 - Milman , et al. December 1, 2
2015-12-01
Symmetric Keying And Chain Of Trust
App 20150261950 - SCHULZ; STEFFEN ;   et al.
2015-09-17
Automated network deployment of cloud services into a network
Grant 9,094,457 - Julisch , et al. July 28, 2
2015-07-28
Method and system for policy driven data distribution
Grant 9,043,342 - Milman , et al. May 26, 2
2015-05-26
Privacy-protecting integrity attestation of a computing platform
Grant 8,892,900 - Bangerter , et al. November 18, 2
2014-11-18
Integrity protection in data processing systems
Grant 8,689,007 - Schunter , et al. April 1, 2
2014-04-01
Automated Network Deployment Of Cloud Services Into A Network
App 20140033268 - Julisch; Klaus ;   et al.
2014-01-30
Integrity verification using a peripheral device
Grant 8,544,092 - Hermann , et al. September 24, 2
2013-09-24
Secure user interaction using virtualization
Grant 8,516,564 - Jansen , et al. August 20, 2
2013-08-20
Resolving An Exchange Of Objects In A Communication Network
App 20130031182 - Gross; Thomas R. ;   et al.
2013-01-31
Privacy-protecting Integrity Attestation Of A Computing Platform
App 20120331285 - Bangerter; Endre ;   et al.
2012-12-27
Privacy-protecting integrity attestation of a computing platform
Grant 8,312,271 - Bangerter , et al. November 13, 2
2012-11-13
Integrity protection in data processing systems
Grant 8,276,201 - Schunter , et al. September 25, 2
2012-09-25
Method and System for Policy Driven Data Distribution
App 20120191731 - Milman; Ivan M. ;   et al.
2012-07-26
Method for protecting data from unauthorised access
Grant 8,108,940 - Dias , et al. January 31, 2
2012-01-31
Method and System for Policy Driven Data Distribution
App 20110161332 - Milman; Ivan M. ;   et al.
2011-06-30
Using an object model to improve handling of personally identifiable information
Grant 7,962,962 - Adler , et al. June 14, 2
2011-06-14
Reducing access to sensitive information
Grant 7,941,859 - Camenisch , et al. May 10, 2
2011-05-10
Integrity Verification Using a Peripheral Device
App 20100235912 - Hermann; Reto ;   et al.
2010-09-16
Method and device for verifying the security of a computing platform
Grant 7,770,000 - Schunter , et al. August 3, 2
2010-08-03
Method for access by server-side components using unsupported communication protocols through passthrough mechanism
Grant 7,685,300 - Burrows , et al. March 23, 2
2010-03-23
Secure User Interaction Using Virtualization
App 20100017866 - Jansen; Bernhard ;   et al.
2010-01-21
On-the-fly Creation Of Virtual Places In Virtual Worlds
App 20090315916 - Husemann; Dirk ;   et al.
2009-12-24
Protection And Security Provisioning Using On-the-fly Virtualization
App 20090300307 - Carbone; Martim ;   et al.
2009-12-03
Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets
Grant 7,617,393 - Betz , et al. November 10, 2
2009-11-10
Hardware Emulation Using On-the-fly Virtualization
App 20090192780 - Carbone; Martim ;   et al.
2009-07-30
Dynamic access decision information module
Grant 7,523,200 - Gross , et al. April 21, 2
2009-04-21
Creating a privacy policy from a process model and verifying the compliance
App 20080294480 - Backes; Michael ;   et al.
2008-11-27
Method And Device For Verifying The Security Of A Computing Platform
App 20080256595 - Schunter; Matthias ;   et al.
2008-10-16
Integrity Protection In Data Processing Systems
App 20080235793 - Schunter; Matthias ;   et al.
2008-09-25
Integrity Protection In Data Processing Systems
App 20080235534 - Schunter; Matthias ;   et al.
2008-09-25
Privacy-protecting integrity attestation of a computing platform
App 20080229097 - Bangerter; Endre ;   et al.
2008-09-18
Method For Protecting Data From Unauthorised Access
App 20080144825 - Dias; Daniel M. ;   et al.
2008-06-19
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
Grant 7,302,569 - Betz , et al. November 27, 2
2007-11-27
Implementation And Use Of Pii Data Access Control Facility Employing Personally Identifying Information Labels And Purpose Serving Function Sets
App 20070250913 - Betz; Linda ;   et al.
2007-10-25
Computer Program With Metadata Management Function
App 20070169065 - Janson; Philippe A. ;   et al.
2007-07-19
Creating a privacy policy from a process model and verifying the compliance
App 20060184995 - Backes; Michael ;   et al.
2006-08-17
Privacy-protecting integrity attestation of a computing platform
App 20060026423 - Bangerter; Endre ;   et al.
2006-02-02
Reducing access to sensitive information
App 20050289340 - Camenisch, Jan L. ;   et al.
2005-12-29
Method and device for verifying the security of a computing platform
App 20050251857 - Schunter, Matthias ;   et al.
2005-11-10
Conditionalized Access Control Based on Dynamic Content Analysis
App 20050086228 - Gross, Thomas R. ;   et al.
2005-04-21
Method for access by server-side components using unsupported communication protocols through passthrough mechanism
App 20050055434 - Burrows, Warwick Leslie ;   et al.
2005-03-10
Implementation and use of a PII data access control facility employing personally identifying information labels and purpose serving functions sets
App 20050044409 - Betz, Linda ;   et al.
2005-02-24
Dynamic access decision information module
App 20050004913 - Gross, Thomas ;   et al.
2005-01-06
Using an object model to improve handling of personally identifiable information
App 20030004734 - Adler, Steven B. ;   et al.
2003-01-02

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed