loadpatents
name:-0.056696176528931
name:-0.054178953170776
name:-0.00047087669372559
Ward; Richard B. Patent Filings

Ward; Richard B.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Ward; Richard B..The latest application filed is for "catalog-based software component management".

Company Profile
0.44.33
  • Ward; Richard B. - Redmond WA
  • Ward; Richard B - Redmond WA
  • Ward; Richard B. - Seattle WA
  • Ward; Richard B - Suffolk GB
  • Ward; Richard B. - Sunnyvale CA
  • Ward; Richard B. - Ipswich GB2
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Network zones
Grant 9,003,048 - Shelest , et al. April 7, 2
2015-04-07
Systems and methods for providing security through sessions
Grant 8,788,673 - Bernardi , et al. July 22, 2
2014-07-22
Mandatory integrity control
Grant 8,646,044 - Ward , et al. February 4, 2
2014-02-04
Catalog-Based Software Component Management
App 20130305239 - Traut; Eric P. ;   et al.
2013-11-14
Catalog-based software component management
Grant 8,495,621 - Traut , et al. July 23, 2
2013-07-23
Isolation of application-specific data within a user account
Grant 8,074,288 - Sambotin , et al. December 6, 2
2011-12-06
Systems and methods for providing security through sessions
Grant 8,005,959 - Bernardi , et al. August 23, 2
2011-08-23
System and methods providing enhanced security model
Grant 7,971,230 - Agarwal , et al. June 28, 2
2011-06-28
Enhanced computer intrusion detection methods and systems
Grant 7,900,257 - Pandit , et al. March 1, 2
2011-03-01
Catalog-based Software Component Management
App 20100318968 - Traut; Eric P. ;   et al.
2010-12-16
System and method of proxy authentication in a secured network
Grant 7,716,722 - Swift , et al. May 11, 2
2010-05-11
Methods and systems for controlling the scope of delegation of authentication credentials
Grant 7,698,381 - Brezak , et al. April 13, 2
2010-04-13
Creating secure process objects
Grant 7,665,143 - Havens , et al. February 16, 2
2010-02-16
Schema-based services for identity-based data access
Grant 7,664,724 - Lucovsky , et al. February 16, 2
2010-02-16
Small-scale secured computer network group without centralized management
Grant 7,640,324 - Sinclair , et al. December 29, 2
2009-12-29
Providing user on computer operating system with full privileges token and limited privileges token
Grant 7,636,851 - Hamblin , et al. December 22, 2
2009-12-22
Machine-readable End User License Agreement With Automated Acceptance
App 20090265180 - Ellison; Carl M. ;   et al.
2009-10-22
Desktop security
Grant 7,600,264 - Yamamoto , et al. October 6, 2
2009-10-06
Enhanced Computer Intrusion Detection Methods And Systems
App 20090241193 - Pandit; Bhalchandra S. ;   et al.
2009-09-24
Enhanced computer intrusion detection methods and systems
Grant 7,543,333 - Pandit , et al. June 2, 2
2009-06-02
System and methods for providing dynamic authorization in a computer system
Grant 7,434,257 - Garg , et al. October 7, 2
2008-10-07
Persistent authorization context based on external authentication
Grant 7,401,235 - Mowers , et al. July 15, 2
2008-07-15
Securely processing client credentials used for Web-based access to resources
Grant 7,360,096 - Bracewell , et al. April 15, 2
2008-04-15
System And Methods Providing Enhanced Security Model
App 20080022358 - Agarwal; Sameet H. ;   et al.
2008-01-24
System and method for managing and authenticating services via service principal names
Grant 7,308,709 - Brezak, Jr. , et al. December 11, 2
2007-12-11
Using atomic messaging to increase the security of transferring data across a network
Grant 7,305,548 - Pierce , et al. December 4, 2
2007-12-04
Methods and arrangements for controlling access to resources based on authentication method
Grant 7,305,701 - Brezak , et al. December 4, 2
2007-12-04
Schema-based services for identity-based data access
Grant 7,302,634 - Lucovsky , et al. November 27, 2
2007-11-27
Authorizing a requesting entity to operate upon data structures
Grant 7,284,271 - Lucovsky , et al. October 16, 2
2007-10-16
System and methods providing enhanced security model
Grant 7,251,822 - Agarwal , et al. July 31, 2
2007-07-31
Isolation of application-specific data within a user account
App 20070033638 - Sambotin; Dragos ;   et al.
2007-02-08
Desktop security
App 20070028294 - Yamamoto; Hirofumi ;   et al.
2007-02-01
Providing user on computer operating system with full privileges token and limited privileges token
App 20070005961 - Hamblin; Jeffrey B. ;   et al.
2007-01-04
Creating secure process objects
App 20060259487 - Havens; Darryl E. ;   et al.
2006-11-16
Accessing heterogeneous data in a standardized manner
Grant 7,136,859 - Lucovsky , et al. November 14, 2
2006-11-14
Mandatory integrity control
App 20060248585 - Ward; Richard B. ;   et al.
2006-11-02
System and Method of Proxy Authentication in a Secured Network
App 20060225132 - Swift; Michael M. ;   et al.
2006-10-05
System and method of proxy authentication in a secured network
Grant 7,113,994 - Swift , et al. September 26, 2
2006-09-26
System and methods for caching in connection with authorization in a computer system
Grant 7,096,367 - Garg , et al. August 22, 2
2006-08-22
Schema-Based Services For Identity-Based Data Access
App 20060161554 - Lucovsky; Mark H. ;   et al.
2006-07-20
Method and apparatus for automated software unit testing
Grant 7,062,753 - Ward , et al. June 13, 2
2006-06-13
Systems and methods for providing security through sessions
App 20060059335 - Bernardi; Ara ;   et al.
2006-03-16
Systems and methods for providing security through sessions
App 20060059529 - Bernardi; Ara ;   et al.
2006-03-16
Messaging infrastructure for identity-centric data access
Grant 6,985,958 - Lucovsky , et al. January 10, 2
2006-01-10
System and methods providing enhanced security model
App 20050091518 - Agarwal, Sameet H. ;   et al.
2005-04-28
Small-scale secured computer network group without centralized management
App 20040210767 - Sinclair, Andrew P. ;   et al.
2004-10-21
Network zones
App 20040199648 - Shelest, Art ;   et al.
2004-10-07
Securely processing client credentials used for Web-based access to resources
App 20040098609 - Bracewell, Shawn Derek ;   et al.
2004-05-20
Mapping from a single sign-in service to a directory service
App 20040098615 - Mowers, David R. ;   et al.
2004-05-20
Persistent authorization context based on external authentication
App 20030212806 - Mowers, David R. ;   et al.
2003-11-13
Enhanced computer intrusion detection methods and systems
App 20030191953 - Pandit, Bhalchandra S. ;   et al.
2003-10-09
Object type specific access control
Grant 6,625,603 - Garg , et al. September 23, 2
2003-09-23
Schema-based services for identity-based data access
App 20030131073 - Lucovsky, Mark H. ;   et al.
2003-07-10
Using atomic messaging to increase the security of transferring data across a network
App 20030084292 - Pierce, Shaun D. ;   et al.
2003-05-01
Methods and systems for controlling the scope of delegation of authentication credentials
App 20030018913 - Brezak, John E. ;   et al.
2003-01-23
Method and system for secure running of untrusted content
Grant 6,505,300 - Chan , et al. January 7, 2
2003-01-07
Authorizing a requesting entity to operate upon data structures
App 20020184521 - Lucovsky, Mark ;   et al.
2002-12-05
Accessing heterogeneous data in a standardized manner
App 20020184214 - Lucovsky, Mark ;   et al.
2002-12-05
Messaging infrastructure for identity-centric data access
App 20020174125 - Lucovsky, Mark ;   et al.
2002-11-21
System and methods for caching in connection with authorization in a computer system
App 20020166052 - Garg, Praerit ;   et al.
2002-11-07
Methods and arrangements for controlling access to resources based on authentication method
App 20020162030 - Brezak, John E. ;   et al.
2002-10-31
Methods and arrangements for protecting information in forwarded authentication messages
App 20020150253 - Brezak, John E. ;   et al.
2002-10-17
Identity-centric data access
App 20020133535 - Lucovsky, Mark ;   et al.
2002-09-19
System and method of user logon in combination with user authentication for network access
Grant 6,427,209 - Brezak, Jr. , et al. July 30, 2
2002-07-30
Extensible security system and method for controlling access to objects in a computing environment
Grant 6,412,070 - Van Dyke , et al. June 25, 2
2002-06-25
System and method of user logon in combination with user authentication for network access
Grant 6,401,211 - Brezak, Jr. , et al. June 4, 2
2002-06-04
Method And System For Secure Running Of Untrusted Content
App 20020019941 - CHAN, SHANNON ;   et al.
2002-02-14
System and methods for providing dynamic authorization in a computer system
App 20020002577 - Garg, Praerit ;   et al.
2002-01-03
Per property access control mechanism
Grant 6,289,458 - Garg , et al. September 11, 2
2001-09-11
Method and system for providing certificates holding authentication and authorization information for users/machines
Grant 5,999,711 - Misra , et al. December 7, 1
1999-12-07
Logon certification
Grant 5,757,920 - Misra , et al. May 26, 1
1998-05-26
Pattern recognition alignment system
Grant 5,621,813 - Brown , et al. April 15, 1
1997-04-15
Personal identification systems
Grant 5,606,614 - Brady , et al. February 25, 1
1997-02-25

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed