Issued Patents All Time
Showing 1–25 of 26 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12407596 | Technologies for protocol execution with aggregation and caching | — | 2025-09-02 |
| 12255800 | Technologies for protocol execution with aggregation and caching | — | 2025-03-18 |
| 11750492 | Technologies for protocol execution with aggregation and caching | — | 2023-09-05 |
| 11121958 | Technologies for protocol execution with aggregation and caching | — | 2021-09-14 |
| 10644984 | Technologies for protocol execution with aggregation and caching | — | 2020-05-05 |
| 9860153 | Technologies for protocol execution with aggregation and caching | — | 2018-01-02 |
| 9768951 | Symmetric keying and chain of trust | Steffen Schulz | 2017-09-19 |
| 9348997 | Symmetric keying and chain of trust | Steffen Schulz | 2016-05-24 |
| 9250942 | Hardware emulation using on-the-fly virtualization | Martim Carbone, Bernhard Jansen, HariGovind V. Ramasamy, Axel Tanner, Diego M. Zamboni | 2016-02-02 |
| 9202080 | Method and system for policy driven data distribution | Ivan M. Milman, Charles D. Wolfson, Heather M. Hinton, Michael Waidner | 2015-12-01 |
| 9094457 | Automated network deployment of cloud services into a network | Klaus Julisch, Georg Ochs | 2015-07-28 |
| 9043342 | Method and system for policy driven data distribution | Ivan M. Milman, Charles D. Wolfson, Heather M. Hinton, Michael Waidner | 2015-05-26 |
| 8892900 | Privacy-protecting integrity attestation of a computing platform | Endre Bangerter, Michael Waidner, Jan L. Camenisch | 2014-11-18 |
| 8689007 | Integrity protection in data processing systems | Axel Tanner, Bernhard Jansen | 2014-04-01 |
| 8544092 | Integrity verification using a peripheral device | Reto Hermann, Klaus Julisch | 2013-09-24 |
| 8516564 | Secure user interaction using virtualization | Bernhard Jansen, Axel Tanner, Diego M. Zamboni | 2013-08-20 |
| 8312271 | Privacy-protecting integrity attestation of a computing platform | Endre Bangerter, Michael Waidner, Jan L. Camenisch | 2012-11-13 |
| 8276201 | Integrity protection in data processing systems | Axel Tanner, Bernhard Jansen | 2012-09-25 |
| 8108940 | Method for protecting data from unauthorised access | Daniel Manuel Dias, Michael Steiner | 2012-01-31 |
| 7962962 | Using an object model to improve handling of personally identifiable information | Steven B. Adler, Endre Felix Bangerter, Kathryn Ann Bohrer, Nigel Brown, Jan L. Camenisch +12 more | 2011-06-14 |
| 7941859 | Reducing access to sensitive information | Jan L. Camenisch, Birgit M. Pfitzmann, Michael Waidner | 2011-05-10 |
| 7770000 | Method and device for verifying the security of a computing platform | Jonathan A. Poritz, Michael Waidner, Elsie A. Van Herreweghen | 2010-08-03 |
| 7685300 | Method for access by server-side components using unsupported communication protocols through passthrough mechanism | Warwick Leslie Burrows, Guenter Karioth, Birgit M. Pfitzmann, Anthony Moran, Brian James Turner | 2010-03-23 |
| 7617393 | Implementation and use of PII data access control facility employing personally identifying information labels and purpose serving function sets | Linda N. Betz, John C. Dayka, Walter B. Farrell, Richard Henry Guski, Guenter Karjoth +3 more | 2009-11-10 |
| 7523200 | Dynamic access decision information module | Thomas R. Gross, Brook M. Lovatt, Anthony Moran | 2009-04-21 |