loadpatents
name:-0.027861833572388
name:-0.017588138580322
name:-0.01387882232666
Soriente; Claudio Patent Filings

Soriente; Claudio

Patent Applications and Registrations

Patent applications and USPTO patent grants for Soriente; Claudio.The latest application filed is for "clone application detection mechanism for securing trusted execution environments against a malicious operating system".

Company Profile
14.15.23
  • Soriente; Claudio - Madrid ES
  • Soriente; Claudio - Heidelberg DE
  • Soriente; Claudio - Villafranca del Castillo Madrid
  • Soriente; Claudio - Barcelona ES
  • Soriente; Claudio - Zurich CH
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Secure and auditable proxy technology using trusted execution environments
Grant 11,451,517 - Soriente , et al. September 20, 2
2022-09-20
Method and system for multi-authority controlled functional encryption
Grant 11,451,369 - Soriente , et al. September 20, 2
2022-09-20
Clone Application Detection Mechanism For Securing Trusted Execution Environments Against A Malicious Operating System
App 20220245237 - Briongos; Samira ;   et al.
2022-08-04
Method And System For Device Identification And Monitoring
App 20220217002 - KARAME; Ghassan ;   et al.
2022-07-07
Subversion resilient attestation for trusted execution environments
Grant 11,361,069 - Soriente , et al. June 14, 2
2022-06-14
Method and system for providing security in trusted execution environments
Grant 11,362,841 - Karame , et al. June 14, 2
2022-06-14
Method And System For Performing Remote Attestation With A Gateway In The Context Of A Trusted Execution Environment (tee)
App 20220156390 - Karame; Ghassan ;   et al.
2022-05-19
Password-authenticated public key establishment
Grant 11,296,875 - Soriente , et al. April 5, 2
2022-04-05
Trusted Service For Detecting Attacks On Trusted Execution Environments
App 20220067150 - Karame; Ghassan ;   et al.
2022-03-03
Secure And Auditable Proxy Technology Using Trusted Execution Environments
App 20210377224 - Soriente; Claudio ;   et al.
2021-12-02
Allowing remote attestation of trusted execution environment enclaves via proxy
Grant 11,157,598 - Soriente , et al. October 26, 2
2021-10-26
Replica trusted execution environment: enabling seamless replication of trusted execution environment (TEE)-based enclaves in the cloud
Grant 11,126,699 - Soriente , et al. September 21, 2
2021-09-21
Dynamic anonymous password-authenticated key exchange (APAKE)
Grant 11,070,366 - Soriente , et al. July 20, 2
2021-07-20
Autonomous Detection Of Cache-based Side-channel Attacks
App 20210192045 - Jiang; Jianyu ;   et al.
2021-06-24
Password-authenticated Public Key Establishment
App 20210167958 - Soriente; Claudio ;   et al.
2021-06-03
Secure Authentication Using Blockchain
App 20210067318 - Karame; Ghassan ;   et al.
2021-03-04
Method for performing user profiling from encrypted network traffic flows
Grant 10,885,466 - Gonzalez Sanchez , et al. January 5, 2
2021-01-05
Method For Storing A Data File
App 20200412529 - Karame; Ghassan ;   et al.
2020-12-31
Method for storing a data file
Grant 10,819,506 - Karame , et al. October 27, 2
2020-10-27
Method And System For Multi-authority Controlled Functional Encryption
App 20200336292 - Soriente; Claudio ;   et al.
2020-10-22
Communication apparatus, system, method, and non-transitory medium
Grant 10,649,847 - Sasaki , et al.
2020-05-12
Subversion Resilient Attestation For Trusted Execution Environments
App 20200097648 - Soriente; Claudio ;   et al.
2020-03-26
Communication apparatus, system, method, and non-transitory medium for securing network communication
Grant 10,601,632 - Sasaki , et al.
2020-03-24
Method And System For Providing Security In Trusted Execution Environments
App 20200014546 - Karame; Ghassan ;   et al.
2020-01-09
Dynamic Anonymous Password-authenticated Key Exchange (apake)
App 20190349191 - SORIENTE; Claudio ;   et al.
2019-11-14
Replica Trusted Execution Environment: Enabling Seamless Replication Of Trusted Execution Environment (tee)-based Enclaves In Th
App 20190243963 - Soriente; Claudio ;   et al.
2019-08-08
Allowing Remote Attestation Of Trusted Execution Environment Enclaves Via Proxy
App 20190243950 - Soriente; Claudio ;   et al.
2019-08-08
Trustworthy Review System And Method For Legitimizing A Review
App 20190164201 - Soriente; Claudio
2019-05-30
Method and system for encrypting data
Grant 10,291,392 - Karame , et al.
2019-05-14
Method For Storing A Data File
App 20180287782 - Karame; Ghassan ;   et al.
2018-10-04
Communication Apparatus, System, Method, And Non-transitory Medium
App 20180165156 - SASAKI; Takayuki ;   et al.
2018-06-14
Communication Apparatus, System, Method, And Non-transitory Medium
App 20180159716 - SASAKI; Takayuki ;   et al.
2018-06-07
Method And System For Encrypting Data
App 20180006805 - Karame; Ghassan ;   et al.
2018-01-04
Method For Performing User Profiling From Encrypted Network Traffic Flows
App 20170330107 - Gonzalez Sanchez; Roberto ;   et al.
2017-11-16
Method and system for encrypting data
Grant 9,787,469 - Karame , et al. October 10, 2
2017-10-10
Method and system for enforcing access control policies on data
Grant 9,735,959 - Karame , et al. August 15, 2
2017-08-15
Method And System For Encrypting Data
App 20160087790 - Karame; Ghassan ;   et al.
2016-03-24
Method And System For Enforcing Access Control Policies On Data
App 20160087793 - Karame; Ghassan ;   et al.
2016-03-24

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed