CE

Carl M. Ellison

Microsoft: 36 patents #611 of 40,388Top 2%
IN Intel: 32 patents #1,134 of 30,777Top 4%
IS Information Systems: 4 patents #2 of 11Top 20%
CY Cybercash: 1 patents #8 of 11Top 75%
ME Metawork: 1 patents #26 of 97Top 30%
SC Stratus Computer: 1 patents #26 of 72Top 40%
Overall (All Time): #25,116 of 4,157,543Top 1%
76
Patents All Time

Issued Patents All Time

Showing 25 most recent of 76 patents

Patent #TitleCo-InventorsDate
9495190 Entropy pools for virtual machines Scott A. Field, Brandon S. Baker 2016-11-15
9305156 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2016-04-05
9253195 Transformation of sequential access control lists utilizing certificates Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman 2016-02-02
9106629 Distributed algorithm for changing a shared value Larry Zhu, Tore Sundelin, Gleb Kholodov 2015-08-11
9075980 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2015-07-07
9058497 Cryptographic key management Vijay G. Bharadwaj, Niels T. Ferguson, Magnus Bo Gustaf Nyström, Dayi Zhou, Denis Issoupov +3 more 2015-06-16
9037620 File system active symbolic link Charles G. Jeffries 2015-05-19
9026571 Random number generation failure detection and entropy estimation 2015-05-05
8966269 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2015-02-24
8914874 Communication channel claim dependent security precautions Octavian T. Ureche, Alex M. Semenko, Sai Vinayak 2014-12-16
8904509 Resource access based on multiple credentials Marc R. Barbour, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman 2014-12-02
8875258 Constraining a login to a subset of access rights John R. Michener, Niels T. Ferguson, Josh Benaloh, Brian A. LaMacchia 2014-10-28
8838981 Communication channel access based on channel identifier and use policy Octavian T. Ureche, Alex M. Semenko, Sai Vinayak 2014-09-16
8689015 Portable secure data files Charles G. Jeffries, Vijay G. Bharadwaj, Michael Grass, Matthew C. Setzer, Gaurav Sinha 2014-04-01
8588421 Cryptographic key containers on a USB token Tolga Acar 2013-11-19
8504838 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2013-08-06
8495374 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2013-07-23
8468579 Transformation of sequential access control lists utilizing certificates Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman 2013-06-18
8423774 Integrity protected smart card transaction Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays 2013-04-16
8418237 Resource access based on multiple credentials Marc R. Barbour, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman 2013-04-09
8381279 Constraining a login to a subset of access rights John R. Michener, Niels T. Ferguson, Josh Benaloh, Brian A. LaMacchia 2013-02-19
8364984 Portable secure data files Charles G. Jeffries, Vijay G. Bharadwaj, Michael Grass, Matthew C. Setzer, Gaurav Sinha 2013-01-29
8325924 Managing group keys Tolga Acar, Josh Benaloh, Niels T. Ferguson, Mira Belenkiy, Duy Lan Nguyen 2012-12-04
8296564 Communication channel access based on channel identifier and use policy Octavian T. Ureche, Alex M. Semenko, Sai Vinayak 2012-10-23
8208637 Migration of computer secrets 2012-06-26