Issued Patents All Time
Showing 25 most recent of 30 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11184149 | Computing range queries over encrypted data | Supriyo Chakraborty, Akshar Kaul | 2021-11-23 |
| 11165766 | Implementing authentication protocol for merging multiple server nodes with trusted platform modules utilizing provisioned node certificates to support concurrent node add and remove | Timothy R. Block, Elaine R. Palmer, Kenneth A. Goldman, William E. Hall, David D. Sanner +3 more | 2021-11-02 |
| 11115206 | Assymetric structured key recovering using oblivious pseudorandom function | Jason K. Resch | 2021-09-07 |
| 10924267 | Validating keys derived from an oblivious pseudorandom function | Jason K. Resch, Mark D. Seaborn | 2021-02-16 |
| 10887088 | Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) | Jason K. Resch, Martin Schmatz, Mark D. Seaborn, Patricia M. Sagmeister | 2021-01-05 |
| 10887293 | Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) | Jason K. Resch, Mark D. Seaborn, Nataraj Nagaratnam, Erlander Lo | 2021-01-05 |
| 10841081 | Threshold oblivious pseudorandom function in a key management system | Jason K. Resch, Patricia M. Sagmeister, Martin Schmatz, Mark D. Seaborn | 2020-11-17 |
| 10841080 | Oblivious pseudorandom function in a key management system | Jason K. Resch, Mark D. Seaborn | 2020-11-17 |
| 10833861 | Protection of confidentiality, privacy and ownership assurance in a blockchain based decentralized identity management system | Suresh N. Chari, Hasini Gunasinghe, Ashish Kundu, Kapil Kumar Singh, Dong Su | 2020-11-10 |
| 10700859 | Efficient computation of a threshold partially-oblivious pseudorandom function | Jason K. Resch | 2020-06-30 |
| 10089487 | Masking query data access pattern in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Marcel-Catalin Rosu, Michael Steiner | 2018-10-02 |
| 9852306 | Conjunctive search in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Marcel-Catalin Rosu, Michael Steiner | 2017-12-26 |
| 9742557 | Compressing encrypted data without the encryption key | Camit Hazay, Ashish Jagmohan, Demijan Klinc, Tal Rabin | 2017-08-22 |
| 9646166 | Masking query data access pattern in encrypted data | Charles D. Cash, Stanislaw Jarecki, Charanjit Singh Jutla, Marcel-Catalin Rosu, Michael Steiner | 2017-05-09 |
| 9584323 | Compressing encrypted data without the encryption key | Camit Hazay, Ashish Jagmohan, Demijan Klinc, Tal Rabin | 2017-02-28 |
| 9282082 | Compressing encrypted data without the encryption key | Camit Hazay, Ashish Jagmohan, Demijan Klinc, Tal Rabin | 2016-03-08 |
| 8934630 | Compressing block-cipher encrypted data | Camit Hazay, Ashish Jagmohan, Demijan Klinc, Tal Rabin | 2015-01-13 |
| 8646062 | Remote authentication based on challenge-response using digital certificates | Firas Bouz, Terry Dwain Escamilla, Tal Rabin | 2014-02-04 |
| 8522029 | Secret-key exchange for wireless and sensor networks | Dakshi Agrawal, Chatschik Bisdikian, Cagatay Capar, Rosario Gennaro, Tal Rabin +1 more | 2013-08-27 |
| 8422681 | Non-interactive hierarchical identity-based key-agreement | Rosario Gennaro, Shai Halevi, Tal Rabin | 2013-04-16 |
| 7747865 | Method and structure for challenge-response signatures and high-performance secure Diffie-Hellman protocols | — | 2010-06-29 |
| RE38375 | Method and system for the secured distribution of multimedia titles | Amir Herzberg, Shay Kutten, An V. Le, Stephen M. Matyas, Marcel Mordechay Yung | 2003-12-30 |
| 6292897 | Undeniable certificates for digital signature verification | Rosario Gennaro, Tal Rabin | 2001-09-18 |
| 6108783 | Chameleon hashing and signatures | Tal Rabin | 2000-08-22 |
| 5745678 | Method and system for the secured distribution of multimedia titles | Amir Herzberg, Shay Kutten, An V. Le, Stephen M. Matyas, Marcel Mordechay Yung | 1998-04-28 |