loadpatents
name:-0.072504997253418
name:-0.068924903869629
name:-0.023252964019775
Tateishi; Takaaki Patent Filings

Tateishi; Takaaki

Patent Applications and Registrations

Patent applications and USPTO patent grants for Tateishi; Takaaki.The latest application filed is for "certifying authenticity of data modifications".

Company Profile
26.92.82
  • Tateishi; Takaaki - Yamato-shi JP
  • Tateishi; Takaaki - Yamato JP
  • Tateishi; Takaaki - Kanagawa-ken JP
  • Tateishi; Takaaki - Yamamoto JP
  • Tateishi; Takaaki - Tokyo JP
  • Tateishi; Takaaki - Yamato-Shi/Kanagawa-ken JP
  • Tateishi; Takaaki - Kanagawa JP
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Certifying Authenticity Of Data Modifications
App 20220278848 - Nakamura; Hiroaki ;   et al.
2022-09-01
Automatically extracting feature engineering knowledge from execution traces
Grant 11,422,780 - Tateishi August 23, 2
2022-08-23
Snapshot restoration
Grant 11,379,316 - Kamijoh , et al. July 5, 2
2022-07-05
Blockchain Notification Board Storing Blockchain Resources
App 20220209948 - Iwama; Futoshi ;   et al.
2022-06-30
Certifying authenticity of data modifications
Grant 11,374,762 - Nakamura , et al. June 28, 2
2022-06-28
Blockchain notification board storing blockchain resources
Grant 11,303,442 - Iwama , et al. April 12, 2
2022-04-12
Automatically Extracting Feature Engineering Knowledge From Execution Traces
App 20210232936 - Tateishi; Takaaki
2021-07-29
Blockchain notification board storing blockchain resources
Grant 10,997,159 - Iwama , et al. May 4, 2
2021-05-04
Certifying authenticity of data modifications
Grant 10,992,456 - Nakamura , et al. April 27, 2
2021-04-27
Smart contract input mapping
Grant 10,901,955 - Sato , et al. January 26, 2
2021-01-26
Composition operators for smart contract
Grant 10,896,149 - Sato , et al. January 19, 2
2021-01-19
Automatic generation of smart contracts
Grant 10,896,195 - Sato , et al. January 19, 2
2021-01-19
Snapshot Restoration
App 20200387432 - Kamijoh; Kohichi ;   et al.
2020-12-10
Static Analysis Of Smart Contract Determinism
App 20200287708 - Iwama; Futoshi ;   et al.
2020-09-10
Program Synthesis Using Annotations Based On Enumeration Patterns
App 20200272935 - Iwama; Futoshi ;   et al.
2020-08-27
System and method for static detection and categorization of information-flow downgraders
Grant 10,742,666 - Haviv , et al. A
2020-08-11
Data Processing Using External Information
App 20200151266 - Takeuchi; Hironori ;   et al.
2020-05-14
Proof-carrying Smart Contract
App 20200143496 - Saito; Shin ;   et al.
2020-05-07
Blockchain Notification Board Storing Blockchain Resources
App 20200110824 - Iwama; Futoshi ;   et al.
2020-04-09
Certifying Authenticity Of Data Modifications
App 20200112437 - Nakamura; Hiroaki ;   et al.
2020-04-09
Certifying Authenticity Of Data Modifications
App 20200112440 - Nakamura; Hiroaki ;   et al.
2020-04-09
Blockchain Notification Board Storing Blockchain Resources
App 20200112432 - Iwama; Futoshi ;   et al.
2020-04-09
Certifying Authenticity Of Data Modifications
App 20200112427 - Nakamura; Hiroaki ;   et al.
2020-04-09
Blockchain Notification Board Storing Blockchain Resources
App 20200110825 - Iwama; Futoshi ;   et al.
2020-04-09
Automatic program synthesis using monadic second-order logic
Grant 10,572,228 - Tateishi Feb
2020-02-25
Information Processing Apparatus, Information Processing Method And Program
App 20200057635 - Iwama; Futoshi ;   et al.
2020-02-20
Smart Contract Input Mapping
App 20200034453 - Sato; Naoto ;   et al.
2020-01-30
Automatic Generation Of Smart Contracts
App 20200034469 - Sato; Naoto ;   et al.
2020-01-30
Composition Operators For Smart Contract
App 20200034448 - Sato; Naoto ;   et al.
2020-01-30
Interactive Analysis Of A Security Specification
App 20190361788 - Pistoia; Marco ;   et al.
2019-11-28
Information processing apparatus, information processing method and program
Grant 10,489,149 - Iwama , et al. Nov
2019-11-26
Interactive analysis of a security specification
Grant 10,387,288 - Pistoia , et al. A
2019-08-20
Enhanced string analysis that improves accuracy of static analysis
Grant 10,372,582 - Guarnieri , et al.
2019-08-06
Formal specification generation using examples
Grant 10,331,415 - Hatsutori , et al.
2019-06-25
Automatic Program Synthesis Using Monadic Second-order Logic
App 20180349104 - Tateishi; Takaaki
2018-12-06
Automatic program synthesis using monadic second-order logic
Grant 10,095,484 - Tateishi October 9, 2
2018-10-09
Formal Specification Generation Using Examples
App 20180129478 - Hatsutori; Yoichi ;   et al.
2018-05-10
System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision
Grant 9,858,419 - Dolby , et al. January 2, 2
2018-01-02
Automatic Program Synthesis Using Monadic Second-order Logic
App 20170168780 - Tateishi; Takaaki
2017-06-15
Sending messages by oblivious transfer
Grant 9,571,271 - Tateishi , et al. February 14, 2
2017-02-14
Parallel program analysis and branch prediction
Grant 9,454,375 - Kushida , et al. September 27, 2
2016-09-27
Enhanced String Analysis that Improves Accuracy of Static Analysis
App 20160210217 - Guarnieri; Salvatore A. ;   et al.
2016-07-21
Authenticating acceptance of a string using an automaton
Grant 9,397,986 - Tateishi , et al. July 19, 2
2016-07-19
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20160156650 - Haviv; Yinnon ;   et al.
2016-06-02
Enhanced string analysis that improves accuracy of static analysis
Grant 9,336,120 - Guarnieri , et al. May 10, 2
2016-05-10
System and method for static detection and categorization of information-flow downgraders
Grant 9,275,246 - Haviv , et al. March 1, 2
2016-03-01
System for detecting whether client state matches predetermined state
Grant 9,178,779 - Tateishi , et al. November 3, 2
2015-11-03
Authentication method, authentication system and authentication program
Grant 9,173,076 - Tateishi , et al. October 27, 2
2015-10-27
Global Variable Security Analysis
App 20150220739 - Artzi; Shay ;   et al.
2015-08-06
Static analysis of validator routines
Grant 9,098,623 - Berg , et al. August 4, 2
2015-08-04
System for determining whether or not automaton satisfies context-free grammar
Grant 9,100,372 - Tateishi , et al. August 4, 2
2015-08-04
Using a heuristically-generated policy to dynamically select string analysis algorithms for client queries
Grant 9,092,723 - Pistoia , et al. July 28, 2
2015-07-28
Global variable security analysis
Grant 9,075,997 - Artzi , et al. July 7, 2
2015-07-07
Parallel Program Analysis And Branch Prediction
App 20150186146 - KUSHIDA; TAKAYUKI ;   et al.
2015-07-02
Sending Messages By Oblivious Transfer
App 20150143102 - Tateishi; Takaaki ;   et al.
2015-05-21
Parallel program analysis and branch prediction
Grant 8,997,060 - Kushida , et al. March 31, 2
2015-03-31
Enhanced string analysis that improves accuracy of static analysis
Grant 8,984,495 - Guarnieri , et al. March 17, 2
2015-03-17
Sending messages by oblivious transfer
Grant 8,977,841 - Tateishi , et al. March 10, 2
2015-03-10
Parallel Program Analysis And Branch Prediction
App 20150040108 - Kushida; Takayuki ;   et al.
2015-02-05
System For Determining Whether Character String Has Been Accepted By Automaton
App 20150033018 - Tateishi; Takaaki ;   et al.
2015-01-29
Efficient extraction of software dependencies from program code
Grant 8,930,884 - Joukov , et al. January 6, 2
2015-01-06
Interactive Analysis Of A Security Specification
App 20140366146 - Pistoia; Marco ;   et al.
2014-12-11
String analysis based on three-valued logic
Grant 8,898,188 - Pistoia , et al. November 25, 2
2014-11-25
Authentication Method, Authentication System And Authentication Program
App 20140342701 - Tateishi; Takaaki ;   et al.
2014-11-20
System for checking acceptance of string by automaton
Grant 8,891,760 - Tateishi , et al. November 18, 2
2014-11-18
Automated detection of flaws and incompatibility problems in information flow downgraders
Grant 8,881,300 - Pistoia , et al. November 4, 2
2014-11-04
Interactive analysis of a security specification
Grant 8,875,297 - Pistoia , et al. October 28, 2
2014-10-28
Interactive analysis of a security specification
Grant 8,863,292 - Pistoia , et al. October 14, 2
2014-10-14
Information Processing Apparatus, Information Processing Method And Program
App 20140289178 - Iwama; Futoshi ;   et al.
2014-09-25
Enhanced String Analysis That Improves Accuracy Of Static Analysis
App 20140189657 - Guarnieri; Salvatore A. ;   et al.
2014-07-03
Enhanced String Analysis That Improves Accuracy Of Static Analysis
App 20140189658 - Guarnieri; Salvatore A. ;   et al.
2014-07-03
Automated detection of flaws and incompatibility problems in information flow downgraders
Grant 8,769,696 - Pistoia , et al. July 1, 2
2014-07-01
Using a heuristically-generated policy to dynamically select string analysis algorithms for client queries
Grant 8,751,422 - Pistoia , et al. June 10, 2
2014-06-10
Global Variable Security Analysis
App 20140143880 - Artzi; Shay ;   et al.
2014-05-22
Static analysis of validator routines
Grant 8,726,246 - Berg , et al. May 13, 2
2014-05-13
Formal analysis of the quality and conformance of information flow downgraders
Grant 8,701,186 - Berg , et al. April 15, 2
2014-04-15
Formal analysis of the quality and conformance of information flow downgraders
Grant 8,667,584 - Berg , et al. March 4, 2
2014-03-04
Static Analysis Of Validator Routines
App 20140053140 - Berg; Ryan ;   et al.
2014-02-20
Global variable security analysis
Grant 8,656,496 - Artzi , et al. February 18, 2
2014-02-18
Static analysis based on observed string values during execution of a computer-based software application
Grant 8,650,546 - Pistoia , et al. February 11, 2
2014-02-11
Method for model based verification of security policies for web service composition
Grant 8,650,608 - Ono , et al. February 11, 2
2014-02-11
System, Method, and Apparatus for Modular, String-Sensitive, Access Rights Analysis with Demand-Driven Precision
App 20140026185 - Dolby; Julian Timothy ;   et al.
2014-01-23
Verification of information-flow downgraders
Grant 8,635,602 - Haviv , et al. January 21, 2
2014-01-21
Automatic inference of whitelist-based validation as part of static analysis for security
Grant 8,627,465 - Guy , et al. January 7, 2
2014-01-07
System for Determining Whether or Not Automaton Satisfies Context-free Grammar
App 20130332731 - Tateishi; Takaaki ;   et al.
2013-12-12
Eliminating false reports of security vulnerabilities when testing computer software
Grant 8,584,246 - Haviv , et al. November 12, 2
2013-11-12
Efficient Extraction Of Software Dependencies From Program Code
App 20130290937 - Joukov; Nikolai A. ;   et al.
2013-10-31
Policy-driven detection and verification of methods such as sanitizers and validators
Grant 8,572,747 - Berg , et al. October 29, 2
2013-10-29
Label-based taint analysis
Grant 8,572,748 - Pistoia , et al. October 29, 2
2013-10-29
System, method, and apparatus for modular, string-sensitive, access rights analysis with demand-driven precision
Grant 8,572,674 - Dolby , et al. October 29, 2
2013-10-29
Method and system to discover possible program variable values by connecting program value extraction with external data sources
Grant 8,561,035 - Chicherin , et al. October 15, 2
2013-10-15
Efficient extraction of software dependencies from program code
Grant 8,533,659 - Joukov , et al. September 10, 2
2013-09-10
Identification of read/write chains during static analysis of computer software
Grant 8,533,694 - Pistoia , et al. September 10, 2
2013-09-10
Injection context based static analysis of computer software applications
Grant 8,528,095 - Haviv , et al. September 3, 2
2013-09-03
Formal Analysis of the Quality and Conformance of Information Flow Downgraders
App 20130205391 - Berg; Ryan J. ;   et al.
2013-08-08
Automated Detection of Flaws and Incompatibility Problems in Information Flow Downgraders
App 20130179978 - Pistoia; Marco ;   et al.
2013-07-11
System For Detecting Whether Client State Matches Predetermined State
App 20130173787 - Tateishi; Takaaki ;   et al.
2013-07-04
System For Checking Acceptance Of String By Automaton
App 20130170638 - Tateishi; Takaaki ;   et al.
2013-07-04
Automatic optimization of string allocations in a computer program
Grant 8,473,899 - Centonze , et al. June 25, 2
2013-06-25
Sending Messages By Oblivious Transfer
App 20130159696 - Tateishi; Takaaki ;   et al.
2013-06-20
Identifying security vulnerability in computer software
Grant 8,468,605 - Haviv , et al. June 18, 2
2013-06-18
Interactive Analysis Of A Security Specification
App 20130152204 - PISTOIA; MARCO ;   et al.
2013-06-13
Interactive Analysis Of A Security Specification
App 20130152205 - PISTOIA; MARCO ;   et al.
2013-06-13
Using A Heuristically-generated Policy To Dynamically Select String Analysis Algorithms For Client Queries
App 20130091082 - PISTOIA; MARCO ;   et al.
2013-04-11
Using A Heuristically-generated Policy To Dynamically Select String Analysis Algorithms For Client Queries
App 20130091079 - Pistoia; Marco ;   et al.
2013-04-11
Automated Detection of Flaws and Incompatibility Problems in Information Flow Downgraders
App 20130086686 - Pistoia; Marco ;   et al.
2013-04-04
Modular and/or demand-driven string analysis of a computer program
Grant 8,381,199 - Tateishi , et al. February 19, 2
2013-02-19
System, method, and program for determining validity of string
Grant 8,365,280 - Haviv , et al. January 29, 2
2013-01-29
Determining whether method of computer program is a validator
Grant 8,365,281 - Tateishi , et al. January 29, 2
2013-01-29
Static Analysis Based On Observed String Values During Execution Of A Computer-based Software Application
App 20130007529 - PISTOIA; MARCO ;   et al.
2013-01-03
String Analysis Based On Three-valued Logic
App 20120317143 - Pistoia; Marco ;   et al.
2012-12-13
Static Analysis Of Validator Routines
App 20120297372 - Berg; Ryan ;   et al.
2012-11-22
Crawling of object model using transformation graph
Grant 8,296,722 - Yoshihama , et al. October 23, 2
2012-10-23
Automatic Inference Of Whitelist-Based Validation As Part Of Static Analysis For Security
App 20120266247 - Guy; Lotem ;   et al.
2012-10-18
Web Crawling Using Static Analysis
App 20120215757 - Weisman; Omri ;   et al.
2012-08-23
Label-based Taint Analysis
App 20120210432 - Pistoia; Marco ;   et al.
2012-08-16
Computer program testing after source code modification using execution conditions
Grant 8,209,671 - Tateishi , et al. June 26, 2
2012-06-26
Formal Analysis of the Quality and Conformance of Information Flow Downgraders
App 20120159619 - Berg; Ryan J. ;   et al.
2012-06-21
Global Variable Security Analysis
App 20120131670 - Artzi; Shay ;   et al.
2012-05-24
Policy-Driven Detection And Verification Of Methods Such As Sanitizers And Validators
App 20120131668 - Berg; Ryan ;   et al.
2012-05-24
Determining whether method of computer program is a validator
App 20120131669 - Tateishi; Takaaki ;   et al.
2012-05-24
Modular and/or demand-driven string analysis of a computer program
App 20120096440 - Tateishi; Takaaki ;   et al.
2012-04-19
Verification of Information-Flow Downgraders
App 20120023486 - Haviv; Yinnon A. ;   et al.
2012-01-26
Injection Context Based Static Analysis Of Computer Software Applications
App 20110321016 - HAVIV; YINNON A. ;   et al.
2011-12-29
Automatic Optimization of String Allocations in a Computer Program
App 20110145785 - Centonze; Paolina ;   et al.
2011-06-16
Identifying Security Vulnerability In Computer Software
App 20110131656 - HAVIV; Yinnon A. ;   et al.
2011-06-02
Eliminating False Reports of Security Vulnerabilities when Testing Computer Software
App 20110087892 - HAVIV; Yinnon Avraham ;   et al.
2011-04-14
System And Method For Static Detection And Categorization Of Information-flow Downgraders
App 20110088023 - HAVIV; YINNON ;   et al.
2011-04-14
Method And System To Discover Possible Program Variable Values By Connecting Program Value Extraction With External Data Sources
App 20110055806 - Chicherin; Sergej ;   et al.
2011-03-03
Efficient Extraction Of Software Dependencies From Program Code
App 20110029946 - Joukov; Nikolai A. ;   et al.
2011-02-03
System, Method, And Program For Determining Validity Of String
App 20100333201 - Haviv; Yinnon A. ;   et al.
2010-12-30
System for determining whether screen displayed by program satisfies specification
Grant 7,849,404 - Tateishi , et al. December 7, 2
2010-12-07
Performance computer program testing after source code modification using execution conditions
Grant 7,844,955 - Tateishi , et al. November 30, 2
2010-11-30
Crawling of object model using transformation graph
App 20100088668 - Yoshihama; Sachiko ;   et al.
2010-04-08
System, Method, and Apparatus for Modular, String-Sensitive, Access Rights Analysis with Demand-Driven Precision
App 20100043048 - Dolby; Julian Timothy ;   et al.
2010-02-18
Identification Of Read/write Chains During Static Analysis Of Computer Software
App 20090300266 - Pistoia; Marco ;   et al.
2009-12-03
Systems, methods and computer program products for string analysis with security labels for vulnerability detection
Grant 7,530,107 - Ono , et al. May 5, 2
2009-05-05
Computer program testing after source code modification using execution conditions
App 20080270993 - Tateishi; Takaaki ;   et al.
2008-10-30
System For Determining Whether Screen Displayed By Program Satisfies Specification
App 20080195926 - Tateishi; Takaaki ;   et al.
2008-08-14
Method For Model Based Verification Of Security Policies For Web Service Composition
App 20080172714 - Ono; Kouichi ;   et al.
2008-07-17
System For Determining Whether Screen Displayed By Program Satisfies Specification
App 20070233737 - Tateishi; Takaaki ;   et al.
2007-10-04
Performance computer program testing after source code modification using execution conditions
App 20070150869 - Tateishi; Takaaki ;   et al.
2007-06-28

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed