MS

Matthias Schunter

IBM: 18 patents #6,125 of 70,183Top 9%
IN Intel: 8 patents #4,870 of 30,777Top 20%
Overall (All Time): #149,726 of 4,157,543Top 4%
26
Patents All Time

Issued Patents All Time

Showing 1–25 of 26 patents

Patent #TitleCo-InventorsDate
12407596 Technologies for protocol execution with aggregation and caching 2025-09-02
12255800 Technologies for protocol execution with aggregation and caching 2025-03-18
11750492 Technologies for protocol execution with aggregation and caching 2023-09-05
11121958 Technologies for protocol execution with aggregation and caching 2021-09-14
10644984 Technologies for protocol execution with aggregation and caching 2020-05-05
9860153 Technologies for protocol execution with aggregation and caching 2018-01-02
9768951 Symmetric keying and chain of trust Steffen Schulz 2017-09-19
9348997 Symmetric keying and chain of trust Steffen Schulz 2016-05-24
9250942 Hardware emulation using on-the-fly virtualization Martim Carbone, Bernhard Jansen, HariGovind V. Ramasamy, Axel Tanner, Diego M. Zamboni 2016-02-02
9202080 Method and system for policy driven data distribution Ivan M. Milman, Charles D. Wolfson, Heather M. Hinton, Michael Waidner 2015-12-01
9094457 Automated network deployment of cloud services into a network Klaus Julisch, Georg Ochs 2015-07-28
9043342 Method and system for policy driven data distribution Ivan M. Milman, Charles D. Wolfson, Heather M. Hinton, Michael Waidner 2015-05-26
8892900 Privacy-protecting integrity attestation of a computing platform Endre Bangerter, Michael Waidner, Jan L. Camenisch 2014-11-18
8689007 Integrity protection in data processing systems Axel Tanner, Bernhard Jansen 2014-04-01
8544092 Integrity verification using a peripheral device Reto Hermann, Klaus Julisch 2013-09-24
8516564 Secure user interaction using virtualization Bernhard Jansen, Axel Tanner, Diego M. Zamboni 2013-08-20
8312271 Privacy-protecting integrity attestation of a computing platform Endre Bangerter, Michael Waidner, Jan L. Camenisch 2012-11-13
8276201 Integrity protection in data processing systems Axel Tanner, Bernhard Jansen 2012-09-25
8108940 Method for protecting data from unauthorised access Daniel Manuel Dias, Michael Steiner 2012-01-31
7962962 Using an object model to improve handling of personally identifiable information Steven B. Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, Nigel Brown, Jan L. Camenisch +12 more 2011-06-14
7941859 Reducing access to sensitive information Jan L. Camenisch, Birgit M. Pfitzmann, Michael Waidner 2011-05-10
7770000 Method and device for verifying the security of a computing platform Jonathan A. Poritz, Michael Waidner, Elsie A. Van Herreweghen 2010-08-03
7685300 Method for access by server-side components using unsupported communication protocols through passthrough mechanism Warwick Leslie Burrows, Guenter Karioth, Birgit M. Pfitzmann, Anthony Moran, Brian James Turner 2010-03-23
7617393 Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets Linda N. Betz, John C. Dayka, Walter B. Farrell, Richard Henry Guski, Guenter Karjoth +3 more 2009-11-10
7523200 Dynamic access decision information module Thomas R. Gross, Brook M. Lovatt, Anthony Moran 2009-04-21