loadpatents
name:-0.1294949054718
name:-0.13656711578369
name:-0.0092198848724365
Venkatesan; Ramarathnam Patent Filings

Venkatesan; Ramarathnam

Patent Applications and Registrations

Patent applications and USPTO patent grants for Venkatesan; Ramarathnam.The latest application filed is for "heartbeats and consensus in verifiable outsourced ledgers".

Company Profile
10.133.116
  • Venkatesan; Ramarathnam - Redmond WA
  • Venkatesan; Ramarathnam - Morristown NJ
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Heartbeats and consensus in verifiable outsourced ledgers
Grant 11,403,631 - Setty , et al. August 2, 2
2022-08-02
Secure data processing on sensitive data using trusted hardware
Grant 11,232,214 - Kaushik , et al. January 25, 2
2022-01-25
Blockchain system for leveraging member nodes to achieve consensus
Grant 10,984,134 - Setty , et al. April 20, 2
2021-04-20
Data operations using a proxy encryption key
Grant 10,917,394 - Manu , et al. February 9, 2
2021-02-09
Heartbeats And Consensus In Verifiable Outsourced Ledgers
App 20200320528 - Setty; Srinath ;   et al.
2020-10-08
Secure Data Processing On Sensitive Data Using Trusted Hardware
App 20200272744 - Kaushik; Shriraghav ;   et al.
2020-08-27
Verifiable Outsourced Ledgers
App 20200259843 - A1
2020-08-13
Heartbeats and consensus in verifiable outsourced ledgers
Grant 10,733,602 - Setty , et al.
2020-08-04
Secure data processing on sensitive data using trusted hardware
Grant 10,671,736 - Kaushik , et al.
2020-06-02
Verifiable outsourced ledgers
Grant 10,587,628 - Setty , et al.
2020-03-10
Data Operations Using A Proxy Encryption Key
App 20200067896 - Manu; Mitica ;   et al.
2020-02-27
Homomorphic factorization encryption
Grant 10,554,390 - Jain , et al. Fe
2020-02-04
Homomorphic data analysis
Grant 10,491,373 - Jain , et al. Nov
2019-11-26
Data operations using a proxy encryption key
Grant 10,484,352 - Manu , et al. Nov
2019-11-19
Formatting data by example
Grant 10,409,892 - Rothschiller , et al. Sept
2019-09-10
Policy-based key recovery
Grant 10,263,775 - Setty , et al.
2019-04-16
Blockchain
App 20190018984 - SETTY; Srinath ;   et al.
2019-01-17
Policy-Based Key Recovery
App 20180375653 - SETTY; Srinath Tumkur Venkatacha ;   et al.
2018-12-27
Homomorphic Factorization Encryption
App 20180359084 - Jain; Prateek ;   et al.
2018-12-13
Homomorphic Data Analysis
App 20180359078 - Jain; Prateek ;   et al.
2018-12-13
Data Operations Using A Proxy Encryption Key
App 20180288020 - MANU; Mitica ;   et al.
2018-10-04
Heartbeats And Consensus In Verifiable Outsourced Ledgers
App 20180089683 - Setty; Srinath ;   et al.
2018-03-29
Verifiable Outsourced Ledgers
App 20180091524 - Setty; Srinath ;   et al.
2018-03-29
Secure Data Processing On Sensitive Data Using Trusted Hardware
App 20180046812 - Kaushik; Shriraghav ;   et al.
2018-02-15
Integrated data deduplication and encryption
Grant 9,495,552 - El-Shimi , et al. November 15, 2
2016-11-15
Virtualization for diversified tamper resistance
Grant 9,459,893 - Anckaert , et al. October 4, 2
2016-10-04
Secure cloud database platform with encrypted database queries
Grant 9,213,867 - Ramamurthy , et al. December 15, 2
2015-12-15
Data location obfuscation
Grant 9,117,094 - Anckaert , et al. August 25, 2
2015-08-25
Secure cloud computing platform
Grant 9,053,348 - Venkatesan , et al. June 9, 2
2015-06-09
Automated secure pairing for wireless devices
Grant 8,989,706 - Ananthanarayanan , et al. March 24, 2
2015-03-24
Secure Data Processing On Sensitive Data Using Trusted Hardware
App 20140281511 - Kaushik; Shriraghav ;   et al.
2014-09-18
Integrated Data Deduplication and Encryption
App 20140189348 - El-Shimi; Ahmed Moustafa ;   et al.
2014-07-03
Secure Cloud Database Platform
App 20140164758 - Ramamurthy; Ravishankar ;   et al.
2014-06-12
Visualization for Diversified Tamper Resistance
App 20140068580 - Anckaert; Bertrand ;   et al.
2014-03-06
Randomized signal transforms and their applications
Grant 8,595,276 - Venkatesan , et al. November 26, 2
2013-11-26
Virtualization for diversified tamper resistance
Grant 8,584,109 - Anckaert , et al. November 12, 2
2013-11-12
Secure Cloud Computing Platform
App 20130254841 - Venkatesan; Ramarathnam ;   et al.
2013-09-26
Program analysis as constraint solving
Grant 8,402,439 - Gulwani , et al. March 19, 2
2013-03-19
Resilient classification of data
Grant 8,364,617 - Laxman , et al. January 29, 2
2013-01-29
Template based approach to discovering disjunctive and quantified invariants over predicate abstraction
Grant 8,271,404 - Gulwani , et al. September 18, 2
2012-09-18
Formatting Data By Example
App 20120192051 - Rothschiller; Chad ;   et al.
2012-07-26
Universal secure token for obfuscation and tamper resistance
Grant 8,171,306 - Venkatesan , et al. May 1, 2
2012-05-01
Function matching in binaries
Grant 8,166,466 - Mohanan , et al. April 24, 2
2012-04-24
Automated Secure Pairing for Wireless Devices
App 20120094635 - Ananthanarayanan; Ganesh ;   et al.
2012-04-19
Automated secure pairing for wireless devices
Grant 8,103,247 - Ananthanarayanan , et al. January 24, 2
2012-01-24
Systems and methods for embedding media forensic identification markings
Grant 8,032,754 - Mihcak , et al. October 4, 2
2011-10-04
Software protection using data structures
Grant 7,975,149 - Venkatesan , et al. July 5, 2
2011-07-05
Low dimensional spectral concentration codes and direct list decoding
Grant 7,941,726 - Venkatesan , et al. May 10, 2
2011-05-10
Primitives for fast secure hash functions and stream ciphers
Grant 7,933,404 - Venkatesan , et al. April 26, 2
2011-04-26
Combining resilient classifiers
Grant 7,873,583 - Laxman , et al. January 18, 2
2011-01-18
Watermark-based goods authentication
Grant 7,844,073 - Kesal , et al. November 30, 2
2010-11-30
Digital goods representation based upon matrix invariances
Grant 7,831,832 - Kozat , et al. November 9, 2
2010-11-09
Randomized Signal Transforms and Their Applications
App 20100228809 - Venkatesan; Ramarathnam ;   et al.
2010-09-09
Randomized signal transforms and their applications
Grant 7,770,014 - Venkatesan , et al. August 3, 2
2010-08-03
Software protection using oblivious data structures
Grant 7,770,029 - Venkatesan , et al. August 3, 2
2010-08-03
Semi-public white-box cipher
Grant 7,769,165 - Jakubowski , et al. August 3, 2
2010-08-03
Cryptosystem based on a Jacobian of a curve
Grant 7,730,315 - Lauter , et al. June 1, 2
2010-06-01
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
Grant 7,716,487 - Venkatesan , et al. May 11, 2
2010-05-11
Universal Secure Token For Obfuscation And Tamper Resistance
App 20100115260 - Venkatesan; Ramarathnam ;   et al.
2010-05-06
Tamper-tolerant Programs
App 20100107245 - Jakubowski; Mariusz H. ;   et al.
2010-04-29
Data Location Obfuscation
App 20100106920 - Anckaert; Bertrand Raphael ;   et al.
2010-04-29
Recognizer of content of digital signals
Grant 7,707,425 - Mihcak , et al. April 27, 2
2010-04-27
Using Constraint Solving to Discovering Disjunctive and Quantified Invariants Over Predicate Abstraction
App 20100088548 - Gulwani; Sumit ;   et al.
2010-04-08
Minimum delta generator for program binaries
Grant 7,685,590 - Venkatesan , et al. March 23, 2
2010-03-23
Minimum delta generator for program binaries
Grant 7,681,190 - Venkatesan , et al. March 16, 2
2010-03-16
Randomized sparse formats for efficient and secure computation on elliptic curves
Grant 7,664,258 - Venkatesan , et al. February 16, 2
2010-02-16
Digital signal watermaker
Grant 7,657,752 - Mihcak , et al. February 2, 2
2010-02-02
Efficient code constructions via cryptographic assumptions
Grant 7,643,637 - Venkatesan , et al. January 5, 2
2010-01-05
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
Grant 7,644,440 - Sinha , et al. January 5, 2
2010-01-05
Program Analysis As Constraint Solving
App 20090326907 - Gulwani; Sumit ;   et al.
2009-12-31
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,636,849 - Mihcak , et al. December 22, 2
2009-12-22
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,634,660 - Mihcak , et al. December 15, 2
2009-12-15
Systems and methods for generation and validation of isogeny-based signatures
Grant 7,617,397 - Jao , et al. November 10, 2
2009-11-10
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,617,398 - Mihcak , et al. November 10, 2
2009-11-10
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
Grant 7,610,623 - Sinha , et al. October 27, 2
2009-10-27
Cryptographic pairing-based short signature generation and verification
Grant 7,587,605 - Venkatesan , et al. September 8, 2
2009-09-08
Methods for comparing versions of a program
Grant 7,571,427 - Wang , et al. August 4, 2
2009-08-04
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,568,103 - Mihcak , et al. July 28, 2
2009-07-28
Strengthening secure hash functions
Grant 7,546,461 - Yuval , et al. June 9, 2
2009-06-09
Media watermarking by biasing randomized statistics
Grant 7,539,870 - Kesal , et al. May 26, 2
2009-05-26
Image comparison by metric embeddings
Grant 7,536,064 - Venkatesan , et al. May 19, 2
2009-05-19
Generation and validation of short digital signatures with implicit message embedding
Grant 7,512,232 - Venkatesan , et al. March 31, 2
2009-03-31
Stream cipher design with revolving buffers
Grant 7,505,588 - Mironov , et al. March 17, 2
2009-03-17
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
Grant 7,506,167 - Venkatesan , et al. March 17, 2
2009-03-17
Use of isogenies for design of cryptosystems
Grant 7,499,544 - Jao , et al. March 3, 2
2009-03-03
Primitives For Fast Secure Hash Functions And Stream Ciphers
App 20090022308 - Venkatesan; Ramarathnam ;   et al.
2009-01-22
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
Grant 7,480,802 - Venkatesan , et al. January 20, 2
2009-01-20
Function Matching In Binaries
App 20080320056 - Mohanan; Harish ;   et al.
2008-12-25
Protecting digital goods using oblivious checking
Grant 7,447,912 - Jakubowski , et al. November 4, 2
2008-11-04
Software Tamper Resistance Via Integrity-Checking Expressions
App 20080235802 - Venkatesan; Ramarathnam ;   et al.
2008-09-25
System and method for hashing digital images
Grant 7,421,128 - Venkatesan , et al. September 2, 2
2008-09-02
User Authentication Via Biometric Hashing
App 20080209226 - Venkatesan; Ramarathnam ;   et al.
2008-08-28
User Authentication Via Biometric Hashing
App 20080209227 - Venkatesan; Ramarathnam ;   et al.
2008-08-28
Producing a new black box for a digital rights management (DRM) system
App 20080195871 - Peinado; Marcus ;   et al.
2008-08-14
Encrypting a digital object on a key ID selected therefor
Grant 7,412,061 - Peinado , et al. August 12, 2
2008-08-12
Graph-Based Tamper Resistance Modeling For Software Protection
App 20080184041 - Jakubowski; Mariusz H. ;   et al.
2008-07-31
Robust recognizer of perceptually similar content
Grant 7,406,195 - Mihcak , et al. July 29, 2
2008-07-29
Combining Resilient Classifiers
App 20080177684 - Laxman; Srivatsan ;   et al.
2008-07-24
Resilient Classification Of Data
App 20080177680 - Laxman; Srivatsan ;   et al.
2008-07-24
Correlative assessment between scanned and original digital images
Grant 7,391,884 - Kesal , et al. June 24, 2
2008-06-24
Desynchronized fingerprinting method and system for digital multimedia data
Grant 7,382,905 - Venkatesan , et al. June 3, 2
2008-06-03
Virtualization For Diversified Tamper Resistance
App 20080127125 - Anckaert; Bertrand ;   et al.
2008-05-29
Low Dimensional Spectral Concentration Codes And Direct List Decoding
App 20080126910 - Venkatesan; Ramarathnam ;   et al.
2008-05-29
Automated Secure Pairing for Wireless Devices
App 20080102793 - Ananthanarayanan; Ganesh ;   et al.
2008-05-01
Recognizer of text-based work
Grant 7,356,188 - Venkatesan , et al. April 8, 2
2008-04-08
Class of symmetric lattices for quantization and data embedding
Grant 7,356,161 - Jain , et al. April 8, 2
2008-04-08
Integrity ordainment and ascertainment of computer-executable instructions
Grant 7,346,780 - Sinha , et al. March 18, 2
2008-03-18
Software Protection Using Data Structures
App 20080022102 - Venkatesan; Ramarathnam ;   et al.
2008-01-24
Producing a new black box for a digital rights management (DRM) system
Grant 7,319,759 - Peinado , et al. January 15, 2
2008-01-15
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,318,157 - Mihcak , et al. January 8, 2
2008-01-08
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,318,158 - Mihcak , et al. January 8, 2
2008-01-08
Software Protection Using Oblivious Data Structures
App 20080005476 - Venkatesan; Ramarathnam ;   et al.
2008-01-03
Watermark-based Goods Authentication
App 20070300071 - Kesal; Mustafa ;   et al.
2007-12-27
Stealthy secret key encoding and decoding
Grant 7,302,079 - Kesal , et al. November 27, 2
2007-11-27
Primitives for fast secure hash functions and stream ciphers
Grant 7,289,629 - Venkatesan , et al. October 30, 2
2007-10-30
Method and system for using a portion of a digital good as a substitution box
Grant 7,277,541 - Jakubowski , et al. October 2, 2
2007-10-02
Robust recognizer of perceptually similar content
Grant 7,266,244 - Mihcak , et al. September 4, 2
2007-09-04
Minimum delta generator for program binaries
Grant 7,263,531 - Venkatesan , et al. August 28, 2
2007-08-28
Randomized Sparse Formats for Efficient and Secure Computation on Elliptic Curves
App 20070189511 - Venkatesan; Ramarathnam ;   et al.
2007-08-16
Cryptosystem Based on a Jacobian of a Curve
App 20070192397 - Lauter; Kristin E. ;   et al.
2007-08-16
Watermark-based goods authentication
Grant 7,257,234 - Kesal , et al. August 14, 2
2007-08-14
Secure and opaque type library providing secure data protection of variables
Grant 7,254,586 - Chen , et al. August 7, 2
2007-08-07
BORE-resistant digital goods configuration and distribution methods and arrangements
Grant 7,249,105 - Peinado , et al. July 24, 2
2007-07-24
Hash value computer of content of digital signals
Grant 7,240,210 - Mihcak , et al. July 3, 2
2007-07-03
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
Grant 7,228,426 - Sinha , et al. June 5, 2
2007-06-05
License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer
Grant 7,222,232 - Venkatesan , et al. May 22, 2
2007-05-22
Semi-public white-box cipher
App 20070086586 - Jakubowski; Mariusz H. ;   et al.
2007-04-19
Cryptosystem Based on a Jacobian of a Curve
App 20070058802 - Lauter; Kristin E. ;   et al.
2007-03-15
A License-Based Cryptographic Technique, Particularly Suited For Use In A Digital Rights Management System, For Controlling Access And Use Of Bore Resistant Software Objects In A Client Computer
App 20070061580 - Venkatesan; Ramarathnam ;   et al.
2007-03-15
Categorizer of content in digital signals
Grant 7,188,065 - Mihcak , et al. March 6, 2
2007-03-06
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,188,249 - Mihcak , et al. March 6, 2
2007-03-06
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,181,622 - Mihcak , et al. February 20, 2
2007-02-20
Strengthening secure hash functions
App 20060294386 - Yuval; Gideon A. ;   et al.
2006-12-28
Content-recognition facilitator
Grant 7,152,163 - Mihcak , et al. December 19, 2
2006-12-19
Image comparison by metric embeddings
App 20060269167 - Venkatesan; Ramarathnam ;   et al.
2006-11-30
Content recognizer via probabilistic mirror distribution
Grant 7,136,535 - Venkatesan , et al. November 14, 2
2006-11-14
Systems and methods for generation and validation of isogeny-based signatures
App 20060248338 - Jao; David Y. ;   et al.
2006-11-02
Watermarking via quantization of statistics of overlapping regions
Grant 7,095,873 - Venkatesan , et al. August 22, 2
2006-08-22
Protecting digital goods using oblivious checking
Grant 7,080,257 - Jakubowski , et al. July 18, 2
2006-07-18
Code integrity verification that includes one or more cycles
Grant 7,080,249 - Jakubowski , et al. July 18, 2
2006-07-18
Minimum Delta Generator for Program Binaries
App 20060145895 - Venkatesan; Ramarathnam ;   et al.
2006-07-06
Minimum Delta Generator for Program Binaries
App 20060145896 - Venkatesan; Ramarathnam ;   et al.
2006-07-06
Robust and stealthy video watermarking into regions of successive frames
Grant 7,072,493 - Venkatesan , et al. July 4, 2
2006-07-04
Protecting Digital Goods Using Oblivious Checking
App 20060136750 - Jakubowski; Mariusz H. ;   et al.
2006-06-22
Minimum delta generator for program binaries
Grant 7,058,941 - Venkatesan , et al. June 6, 2
2006-06-06
System and method for protecting digital goods using random and automatic code obfuscation
Grant 7,054,443 - Jakubowski , et al. May 30, 2
2006-05-30
Content Recognizer via Probabilistic Mirror Distribution
App 20060110006 - Venkatesan; Ramarathnam ;   et al.
2006-05-25
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
Grant 7,051,208 - Venkatesan , et al. May 23, 2
2006-05-23
Integrity Ordainment and Ascertainment of Computer-Executable Instructions with Consideration for Execution Context
App 20060080531 - Sinha; Saurabh ;   et al.
2006-04-13
Integrity Ordainment and Ascertainment of Computer-Executable Instructions with Consideration for Execution Context
App 20060080530 - Sinha; Saurabh ;   et al.
2006-04-13
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,028,189 - Mihcak , et al. April 11, 2
2006-04-11
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20060069919 - Mihcak; M. Kivanc ;   et al.
2006-03-30
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,020,777 - Mihcak , et al. March 28, 2
2006-03-28
Derivation and quantization of robust non-local characteristics for blind watermarking
Grant 7,020,775 - Mihcak , et al. March 28, 2
2006-03-28
Cryptosystem based on a Jacobian of a curve
Grant 7,020,776 - Lauter , et al. March 28, 2
2006-03-28
Encrypting a digital object on a key ID selected therefor
Grant 7,016,498 - Peinado , et al. March 21, 2
2006-03-21
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20060059356 - Mihcak; M. Kivanc ;   et al.
2006-03-16
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20060059353 - Mihcak; M. Kivanc ;   et al.
2006-03-16
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20060059354 - Mihcak; M. Kivanc ;   et al.
2006-03-16
Content recognizer via probabilistic mirror distribution
Grant 7,006,703 - Venkatesan , et al. February 28, 2
2006-02-28
Robust recognizer of perceptually similar content
Grant 6,996,273 - Mihcak , et al. February 7, 2
2006-02-07
Robust and stealthy video watermarking into regions of successive frames
Grant 6,975,743 - Venkatesan , et al. December 13, 2
2005-12-13
Robust recognizer of perceptually similar content
App 20050273617 - Mihcak, M. Kivanc ;   et al.
2005-12-08
Recognizer of audio-content in digital signals
Grant 6,973,574 - Mihcak , et al. December 6, 2
2005-12-06
Class of symmetric lattices for quantization and data embedding
App 20050265575 - Jain, Kamal ;   et al.
2005-12-01
Recognizer of content of digital signals
Grant 6,971,013 - Mihcak , et al. November 29, 2
2005-11-29
Randomized signal transforms and their applications
App 20050257060 - Venkatesan, Ramarathnam ;   et al.
2005-11-17
Methods for comparing versions of a program
Grant 6,954,747 - Wang , et al. October 11, 2
2005-10-11
Stream cipher design with revolving buffers
App 20050220302 - Mironov, Ilya ;   et al.
2005-10-06
Unimodular matrix-based message authentication codes (MAC)
App 20050210260 - Venkatesan, Ramarathnam ;   et al.
2005-09-22
Primitives for fast secure hash functions and stream ciphers
App 20050175176 - Venkatesan, Ramarathnam ;   et al.
2005-08-11
Efficient code constructions via cryptographic assumptions
App 20050175180 - Venkatesan, Ramarathnam ;   et al.
2005-08-11
Media watermarking by biasing randomized statistics
App 20050175179 - Kesal, Mustafa ;   et al.
2005-08-11
Desynchronized fingerprinting method and system for digital multimedia data
App 20050175224 - Venkatesan, Ramarathnam ;   et al.
2005-08-11
Watermarking via quantization of rational statistics of regions
App 20050165690 - Liu, Tie ;   et al.
2005-07-28
Systems and methods for embedding media forensic identification markings
App 20050154892 - Mihcak, Mehmet Kivanc ;   et al.
2005-07-14
Digital goods representation based upon matrix invariances
App 20050149727 - Kozat, S. Serdar ;   et al.
2005-07-07
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
App 20050144458 - Venkatesan, Ramarathnam ;   et al.
2005-06-30
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050125671 - Mihcak, M. Kivanc ;   et al.
2005-06-09
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
Grant 6,898,706 - Venkatesan , et al. May 24, 2
2005-05-24
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050108544 - Mihcak, M. Kivanc ;   et al.
2005-05-19
Correlative assessment between scanned and original digital images
App 20050105824 - Kesal, Mustafa ;   et al.
2005-05-19
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050105733 - Mihcak, M. Kivanc ;   et al.
2005-05-19
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050108543 - Mihcak, M. Kivanc ;   et al.
2005-05-19
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050108545 - Mihcak, M. Kivanc ;   et al.
2005-05-19
Recognizer of content of digital signals
App 20050097312 - Mihcak, M. Kivanc ;   et al.
2005-05-05
Use of isogenies for design of cryptosystems
App 20050094806 - Jao, David Y. ;   et al.
2005-05-05
Robust and stealthy video watermarking
Grant 6,888,952 - Venkatesan , et al. May 3, 2
2005-05-03
Encrypting a digital object on a key ID selected therefor
App 20050086478 - Peinado, Marcus ;   et al.
2005-04-21
Recognizer of content of digital signals
App 20050084103 - Mihcak, M. Kivanc ;   et al.
2005-04-21
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20050086489 - Mihcak, M. Kivanc ;   et al.
2005-04-21
License-based cryptographic technique particularly suited for use in a digital rights management system for controlling access and use of bore resistant software objects in a client computer
App 20050081042 - Venkatesan, Ramarathnam ;   et al.
2005-04-14
Recognizer of digital signal content
App 20050076229 - Mihcak, M. Kivanc ;   et al.
2005-04-07
Digital signal watermarker
App 20050071377 - Mihcak, M. Kivanc ;   et al.
2005-03-31
Categorizer of content in digital signals
App 20050066176 - Mihcak, M. Kivanc ;   et al.
2005-03-24
Content-recognition facilitator
App 20050066177 - Mihcak, M. Kivanc ;   et al.
2005-03-24
Encrypting a digital object on a key ID selected therefor
App 20050066187 - Peinado, Marcus ;   et al.
2005-03-24
Hash value computer of content of digital signals
App 20050065974 - Mihcak, M. Kivanc ;   et al.
2005-03-24
Watermark-based goods authentication
App 20050044374 - Kesal, Mustafa ;   et al.
2005-02-24
Generation and validation of short digital signatures with implicit message embedding
App 20050036621 - Venkatesan, Ramarathnam ;   et al.
2005-02-17
Watermark-based goods authentication
App 20050036652 - Kesal, Mustafa ;   et al.
2005-02-17
License-based cryptographic technique, particularly suited for use in a digital rights management system, for controlling access and use of bore resistant software objects in a client computer
App 20050039022 - Venkatesan, Ramarathnam ;   et al.
2005-02-17
Robust recognizer of perceptually similar content
App 20050022004 - Mihcak, M. Kivanc ;   et al.
2005-01-27
Methods and apparatuses for providing blind digital signatures using curve-based cryptography
App 20050018851 - Venkatesan, Ramarathnam ;   et al.
2005-01-27
Methods and apparatuses for providing short digital signatures using curve-based cryptography
App 20050018850 - Venkatesan, Ramarathnam ;   et al.
2005-01-27
Recognizer of text-based work
App 20040268220 - Venkatesan, Ramarathnam ;   et al.
2004-12-30
Technique for producing through watermarking highly tamper-resistant executable code and resulting "watermarked" code so formed
App 20040255132 - Venkatesan, Ramarathnam ;   et al.
2004-12-16
Technique for producing, through watermarking, highly tamper-resistant executable code and resulting "watermarked" code so formed
Grant 6,829,710 - Venkatesan , et al. December 7, 2
2004-12-07
Robust and stealthy video watermarking
App 20040234099 - Venkatesan, Ramarathnam ;   et al.
2004-11-25
Methods for comparing versions of a program
App 20040230957 - Wang, Zheng ;   et al.
2004-11-18
Minimum delta generator for program binaries
App 20040225996 - Venkatesan, Ramarathnam ;   et al.
2004-11-11
Encrypting a digital object based on a key ID selected therefor
Grant 6,816,596 - Peinado , et al. November 9, 2
2004-11-09
Methods for comparing versions of a program
App 20040210885 - Wang, Zheng ;   et al.
2004-10-21
Passive and active software objects containing bore resistant watermarking
Grant 6,801,999 - Venkatesan , et al. October 5, 2
2004-10-05
System and method for hashing digital images
App 20040025025 - Venkatesan, Ramarathnam ;   et al.
2004-02-05
Content recognizer via probabilistic mirror distribution
App 20040005097 - Venkatesan, Ramarathnam ;   et al.
2004-01-08
Secure and opaque type library providing secure data protection of variables
App 20040003278 - Chen, Yuqun ;   et al.
2004-01-01
Watermarking via quantization of statistics of overlapping regions
App 20040001605 - Venkatesan, Ramarathnam ;   et al.
2004-01-01
System and method for hashing digital images
Grant 6,671,407 - Venkatesan , et al. December 30, 2
2003-12-30
Integrity ordainment and ascertainment of computer-executable instructions
App 20030191942 - Sinha, Saurabh ;   et al.
2003-10-09
Integrity ordainment and ascertainment of computer-executable instructions with consideration for execution context
App 20030191940 - Sinha, Saurabh ;   et al.
2003-10-09
Technique for watermarking an image and a resulting watermarked image
Grant 6,574,348 - Venkatesan , et al. June 3, 2
2003-06-03
Simple technique for implementing a cryptographic primitive using elementary register operations
Grant 6,570,988 - Venkatesan , et al. May 27, 2
2003-05-27
Technique for detecting a watermark in a marked image
Grant 6,546,114 - Venkatesan , et al. April 8, 2
2003-04-08
Robust recognizer of perceptually similar content
App 20020196976 - Mihcak, M. Kivanc ;   et al.
2002-12-26
Recognizer of audio-content in digital signals
App 20020184505 - Mihcak, M. Kivanc ;   et al.
2002-12-05
Robust and stealthy video watermarking
App 20020172394 - Venkatesan, Ramarathnam ;   et al.
2002-11-21
Recognizer of text-based work
App 20020172425 - Venkatesan, Ramarathnam ;   et al.
2002-11-21
Derivation and quantization of robust non-local characteristics for blind watermarking
App 20020154778 - Mihcak, M. Kivanc ;   et al.
2002-10-24
Technique For Producing A Parameter, Such As A Checksum, Through A Primitive That Uses Elementary Register Operations
App 20020110239 - VENKATESAN, RAMARATHNAM ;   et al.
2002-08-15
Cryptosystem based on a jacobian of a curve
App 20020018560 - Lauter, Kristin E. ;   et al.
2002-02-14
Cryptographic technique that provides fast encryption and decryption and assures integrity of a ciphertext message through use of a message authentication code formed through cipher block chaining of the plaintext message
Grant 6,226,742 - Jakubowski , et al. May 1, 2
2001-05-01
Method and apparatus for producing a message authentication code in a cipher block chaining operation by using linear combinations of an encryption key
Grant 6,128,737 - Jakubowski , et al. October 3, 2
2000-10-03
Cryptographically secure pseudo-random bit generator for fast and secure encryption
Grant 6,104,811 - Aiello , et al. August 15, 2
2000-08-15
Accelerating public-key cryptography by precomputing randomly generated pairs
Grant 6,091,819 - Venkatesan , et al. July 18, 2
2000-07-18
Pseudo-random generator
Grant 5,727,063 - Aiello , et al. March 10, 1
1998-03-10
Efficient cryptographic hash functions and methods for amplifying the security of hash functions and pseudo-random functions
Grant 5,608,801 - Aiello , et al. March 4, 1
1997-03-04
Pseudo-random generator
Grant 5,515,307 - Aiello , et al. May 7, 1
1996-05-07
Pseudo-random generator
Grant 5,420,928 - Aiello , et al. May 30, 1
1995-05-30
Data compression
Grant 5,384,568 - Grinberg , et al. January 24, 1
1995-01-24

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed