loadpatents
name:-0.00097513198852539
name:-0.019913911819458
name:-0.00097894668579102
Wilkins; John D. Patent Filings

Wilkins; John D.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Wilkins; John D..The latest application filed is for "secure cryptographic operations using control vectors generated inside a cryptographic facility".

Company Profile
0.19.0
  • Wilkins; John D. - Somerville VA
  • Wilkins; John D. - Kingston upon Thames GB2
  • Wilkins; John D. - Somnerville VA
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Secure cryptographic operations using control vectors generated inside a cryptographic facility
Grant 5,432,849 - Johnson , et al. July 11, 1
1995-07-11
Network security system and method using a parallel finite state machine adaptive active monitor and responder
Grant 5,414,833 - Hershey , et al. May 9, 1
1995-05-09
Method and system for multimedia access control enablement
Grant 5,319,705 - Halter , et al. June 7, 1
1994-06-07
Cryptographic facility environment backup/restore and replication in a public key cryptosystem
Grant 5,265,164 - Matyas , et al. * November 23, 1
1993-11-23
Method and apparatus for validating entry of cryptographic keys
Grant 5,214,698 - Smith, Sr. , et al. May 25, 1
1993-05-25
Method for generating public and private key pairs without using a passphrase
Grant 5,201,000 - Matyas , et al. April 6, 1
1993-04-06
Public key cryptosystem key management based on control vectors
Grant 5,200,999 - Matyas , et al. * April 6, 1
1993-04-06
Secure translation of usage-control values for cryptographic keys
Grant 5,177,791 - Yeh , et al. January 5, 1
1993-01-05
Method to establish and enforce a network cryptographic security policy in a public key cryptosystem
Grant 5,164,988 - Matyas , et al. November 17, 1
1992-11-17
Hybrid public key algorithm/data encryption algorithm key distribution method based on control vectors
Grant 5,142,578 - Matyas , et al. August 25, 1
1992-08-25
Secure management of keys using control vectors with multi-path checking
Grant 5,103,478 - Matyas , et al. April 7, 1
1992-04-07
Method and apparatus for controlling the use of a public key, based on the level of import integrity for the key
Grant 5,073,934 - Matyas , et al. December 17, 1
1991-12-17
Secure key management using programable control vector checking
Grant 5,007,089 - Matyas , et al. April 9, 1
1991-04-09
Secure key management using control vector translation
Grant 4,993,069 - Matyas , et al. February 12, 1
1991-02-12
Secure management of keys using control vectors
Grant 4,941,176 - Matyas , et al. July 10, 1
1990-07-10
Storage container and fastener assembly for cars
Grant 4,927,200 - Wilkins May 22, 1
1990-05-22
Secure management of keys using extended control vectors
Grant 4,924,515 - Matyas , et al. May 8, 1
1990-05-08
Personal identification number processing using control vectors
Grant 4,924,514 - Matyas , et al. May 8, 1
1990-05-08
Data cryptography operations using control vectors
Grant 4,918,728 - Matyas , et al. April 17, 1
1990-04-17

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2024 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed