PJ

Peter M. Jones

IBM: 24 patents #4,429 of 70,183Top 7%
CH Chomerics: 6 patents #1 of 32Top 4%
PA Parker-Hannifin: 2 patents #393 of 1,656Top 25%
Overall (All Time): #106,258 of 4,157,543Top 3%
33
Patents All Time

Issued Patents All Time

Showing 25 most recent of 33 patents

Patent #TitleCo-InventorsDate
12124562 Labeled security for control flow inside executable program code Adam Jackson 2024-10-22
11886574 Using a trusted execution environment for a cryptographic key wrapping scheme that verifies remote device capabilities Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2024-01-30
11784809 Constrained key derivation in temporal space Nathaniel McCallum 2023-10-10
11520878 Using a trusted execution environment for a proof-of-work key wrapping scheme that restricts execution based on device capabilities Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-12-06
11438150 Constrained key derivation in linear space Nathaniel McCallum 2022-09-06
11436352 Proof-of-work key wrapping for restricting data execution based on device capabilities Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-09-06
11424920 Proof-of-work key wrapping for cryptographically controlling data access Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-08-23
11411728 Proof-of-work key wrapping with individual key fragments Michael Hingston McLaughlin Bursell, Nathaniel McCallum, John Strunk 2022-08-09
11411938 Proof-of-work key wrapping with integrated key fragments Michael Hingston McLaughlin Bursell, Nathaniel McCallum, John Strunk 2022-08-09
11387997 Constrained key derivation in geographical space Nathaniel McCallum 2022-07-12
11329812 Constrained key derivation in miscellaneous dimensions Nathaniel McCallum 2022-05-10
11316839 Proof-of-work key wrapping for temporally restricting data access Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-04-26
11303437 Proof-of-work key wrapping with key thresholding Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-04-12
11271734 Proof-of-work key wrapping for verifying device capabilities Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-03-08
11263310 Using a trusted execution environment for a proof-of-work key wrapping scheme that verifies remote device capabilities Michael Hingston McLaughlin Bursell, Nathaniel McCallum 2022-03-01
11250123 Labeled security for control flow inside executable program code Adam Jackson 2022-02-15
10929149 Method and system for updating firmware Adam Jackson 2021-02-23
10524131 Thwarting range extension attacks Nathaniel McCallum 2019-12-31
9720808 Offline debugging using a replicated operating environment Christopher E. Lumens 2017-08-01
9721101 System wide root of trust chaining via signed applications Adam Jackson 2017-08-01
9639375 Generation of language bindings for libraries using data from compiler generated debug information 2017-05-02
9325506 Cryptographically enforcing strict separation of environments David Lawrence Cantrell, Jr. 2016-04-26
8624900 Plug-in architecture for dynamic font rendering enablement Maureen Emily Duffy 2014-01-07
8504817 Mechanism for adjusting system settings based on dynamic discovery of power usage Adam Jackson 2013-08-06
6784363 EMI shielding gasket construction 2004-08-31