loadpatents
name:-0.030807018280029
name:-0.019561052322388
name:-0.018357038497925
Seaborn; Mark D. Patent Filings

Seaborn; Mark D.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Seaborn; Mark D..The latest application filed is for "authorizing modification of resources".

Company Profile
18.19.23
  • Seaborn; Mark D. - Algonquin IL
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Authorizing modification of resources
Grant 11,163,458 - Lamba , et al. November 2, 2
2021-11-02
Authorizing modification of resources
Grant 11,163,457 - Lamba , et al. November 2, 2
2021-11-02
Isolating the introduction of software defects in a dispersed storage network
Grant 10,963,341 - Algie , et al. March 30, 2
2021-03-30
Validating keys derived from an oblivious pseudorandom function
Grant 10,924,267 - Resch , et al. February 16, 2
2021-02-16
Temporary enrollment in anonymously obtained credentials
Grant 10,915,253 - Resch , et al. February 9, 2
2021-02-09
Using a master encryption key to sanitize a dispersed storage network memory
Grant 10,901,650 - Frazier , et al. January 26, 2
2021-01-26
Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF)
Grant 10,887,088 - Resch , et al. January 5, 2
2021-01-05
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS)
Grant 10,887,293 - Resch , et al. January 5, 2
2021-01-05
Authorizing Modification Of Resources
App 20200401325 - Lamba; Amit H. ;   et al.
2020-12-24
Authorizing Modification Of Resources
App 20200401324 - Lamba; Amit H. ;   et al.
2020-12-24
Threshold oblivious pseudorandom function in a key management system
Grant 10,841,081 - Resch , et al. November 17, 2
2020-11-17
Oblivious pseudorandom function in a key management system
Grant 10,841,080 - Resch , et al. November 17, 2
2020-11-17
Use of key metadata during write and read operations in a dispersed storage network memory
Grant 10,693,640 - Gray , et al.
2020-06-23
Using dispersal techniques to securely store cryptographic resources and respond to attacks
Grant 10,581,807 - Resch , et al.
2020-03-03
Validating Keys Derived From An Oblivious Pseudorandom Function
App 20200067699 - Resch; Jason K. ;   et al.
2020-02-27
Slice-level keyed encryption with support for efficient rekeying
Grant 10,491,386 - Gray , et al. Nov
2019-11-26
Threshold Oblivious Pseudorandom Function In A Key Management System
App 20190356475 - Resch; Jason K. ;   et al.
2019-11-21
Using A Master Encryption Key To Sanitize A Dispersed Storage Network Memory
App 20190317689 - Frazier; Alan M. ;   et al.
2019-10-17
Key Identifiers In An Obliviousness Pseudorandom Function (oprf)-based Key Management Service (kms)
App 20190297064 - Resch; Jason K. ;   et al.
2019-09-26
Virtualizing A Key Hierarchy Using A Partially-oblivious Pseudorandom Function (p-oprf)
App 20190296897 - Resch; Jason K. ;   et al.
2019-09-26
Oblivious Pseudorandom Function In A Key Management System
App 20190296896 - Resch; Jason K. ;   et al.
2019-09-26
Using a master encryption key to sanitize a dispersed storage network memory
Grant 10,379,778 - Frazier , et al. A
2019-08-13
Asserting integrity with a verifiable codec
Grant 10,372,380 - Resch , et al.
2019-08-06
Verifiable keyed all-or-nothing transform
Grant 10,360,391 - Resch , et al.
2019-07-23
Efficient secret-key encrypted secure slice
Grant 10,326,740 - Resch , et al.
2019-06-18
Isolating The Introduction Of Software Defects In A Dispersed Storage Network
App 20190171524 - Algie; Teague S. ;   et al.
2019-06-06
Temporary Enrollment In Anonymously Obtained Credentials
App 20190171394 - Resch; Jason K. ;   et al.
2019-06-06
Isolating the introduction of software defects in a dispersed storage network
Grant 10,255,133 - Algie , et al.
2019-04-09
Temporary enrollment in anonymously obtained credentials
Grant 10,241,697 - Resch , et al.
2019-03-26
Slice-level Keyed Encryption With Support For Efficient Rekeying
App 20180351740 - Gray; Adam M. ;   et al.
2018-12-06
Verifiable Keyed All-or-nothing Transform
App 20180285582 - Resch; Jason K. ;   et al.
2018-10-04
Use Of Key Metadata During Write And Read Operations In A Dispersed Storage Network Memory
App 20180270060 - Gray; Adam M. ;   et al.
2018-09-20
Asserting Integrity With A Verifiable Codec
App 20180254784 - Resch; Jason K. ;   et al.
2018-09-06
Using Dispersal Techniques To Securely Store Cryptographic Resources And Respond To Attacks
App 20180063090 - Resch; Jason K. ;   et al.
2018-03-01
Using A Master Encryption Key To Sanitize A Dispersed Storage Network Memory
App 20180052636 - Frazier; Alan M. ;   et al.
2018-02-22
Isolating The Introduction Of Software Defects In A Dispersed Storage Network
App 20170286280 - Algie; Teague S. ;   et al.
2017-10-05
Temporary Enrollment In Anonymously Obtained Credentials
App 20170289173 - Resch; Jason K. ;   et al.
2017-10-05
Efficient Secret-key Encrypted Secure Slice
App 20170250965 - Resch; Jason K. ;   et al.
2017-08-31
Method And Apparatus For Enabling Secured Certificate Enrollment In A Hybrid Cloud Public Key Infrastructure
App 20160127353 - THOMAS; SHANTHI E. ;   et al.
2016-05-05
Method And Apparatus For Offering Cloud-based Hsm Services
App 20150134953 - SEABORN; MARK D. ;   et al.
2015-05-14
System And Method Of Provisioning Or Managing Device Certificates In A Communication Network
App 20120166796 - METKE; ANTHONY R. ;   et al.
2012-06-28
Selecting A Leader Node For An Ad Hoc Network Based On Services
App 20080062945 - Ahuja; Ramandeep ;   et al.
2008-03-13

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed