Issued Patents All Time
Showing 101–125 of 141 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8689282 | Security policy enforcement framework for cloud-based information processing systems | Alina Oprea, Yinqian Zhang, Vijay Ganti, John P. Field, Michael Kendrick Reiter | 2014-04-01 |
| 8683563 | Soft token posture assessment | Marten Van Dijk, Kevin D. Bowers, Samuel J. Curry, Sean Doyle, William M. Duane +3 more | 2014-03-25 |
| 8635465 | Counter-based encryption of stored data blocks | Alina Oprea | 2014-01-21 |
| 8627421 | Methods and apparatus for authenticating a user based on implicit user memory | Kevin D. Bowers, Tamara S. Denning | 2014-01-07 |
| 8618913 | Radio frequency identification enabled mobile device | Daniel V. Bailey, John Brainard, Kevin D. Bowers | 2013-12-31 |
| 8621649 | Providing a security-sensitive environment | Marten Van Dijk, Brian William Fitzgerald, George Matthews | 2013-12-31 |
| 8601552 | Personal identification pairs | Kevin D. Bowers | 2013-12-03 |
| 8533350 | Method and apparatus for storing information in a browser storage area of a client device | Bjorn Markus Jakobsson | 2013-09-10 |
| 8528085 | Method and system for preventing de-duplication side-channel attacks in cloud storage systems | — | 2013-09-03 |
| 8515070 | Access control for implanted medical devices | Daniel V. Bailey | 2013-08-20 |
| 8505097 | Refresh-and-rotation process for minimizing resource vulnerability to persistent security threats | Orran Krieger, Dennis Moreau | 2013-08-06 |
| 8499157 | Device-based password management | Daniel V. Bailey | 2013-07-30 |
| 8495372 | Authentication methods and apparatus using pairing protocols and other techniques | Daniel V. Bailey, John Brainard, Burton S. Kaliski, Jr. | 2013-07-23 |
| 8458483 | Techniques for message-passing using shared memory of an RF tag | Daniel V. Bailey, Marco Ciaffi, William M. Duane, John P. O'Brien | 2013-06-04 |
| 8438617 | User authentication based on voucher codes | John Brainard, Ronald L. Rivest, Michael Szydlo | 2013-05-07 |
| 8381062 | Proof of retrievability for archived files | Burton S. Kaliski, Jr., Kevin D. Bowers, Alina Oprea | 2013-02-19 |
| 8378786 | Security provision in standards-compliant RFID systems | Daniel V. Bailey | 2013-02-19 |
| 8346742 | Remote verification of file protections for cloud data storage | Marten Van Dijk, Alina Oprea, Ronald L. Rivest, Emil P. Stefanov | 2013-01-01 |
| 8132073 | Distributed storage system with enhanced security | Kevin D. Bowers, Alina Oprea | 2012-03-06 |
| 8031875 | Key distribution in unidirectional channels with applications to RFID | Bryan Jeffrey Parno | 2011-10-04 |
| 7920050 | Proxy device for enhanced privacy in an RFID system | Daniel V. Bailey, Paul Syverson | 2011-04-05 |
| 7848746 | Authentication methods and apparatus utilizing hash chains | — | 2010-12-07 |
| 7750793 | Methods and apparatus for RFID device authentication | — | 2010-07-06 |
| 7725730 | Cryptographic methods and apparatus for secure authentication | Burton S. Kaliski, Jr. | 2010-05-25 |
| 7602904 | Order invariant fuzzy commitment system | Madhu Sudan | 2009-10-13 |