DS

Daniel R. Simon

Microsoft: 67 patents #173 of 40,388Top 1%
AM Amazon: 3 patents #5,147 of 19,158Top 30%
📍 Kirkland, WA: #36 of 3,517 inventorsTop 2%
🗺 Washington: #575 of 76,902 inventorsTop 1%
Overall (All Time): #29,277 of 4,157,543Top 1%
70
Patents All Time

Issued Patents All Time

Showing 26–50 of 70 patents

Patent #TitleCo-InventorsDate
7694022 Method and system for filtering communications to prevent exploitation of a software vulnerability Jason Garms, Chuanxiong Guo, Jiahe Helen Wang, Alf Zugenmaier 2010-04-06
7676840 Use of hashing in a secure boot loader Dinarte R. Morais, Jon Lange, Ling Tony Chen, Josh Benaloh 2010-03-09
7669049 System and method for protecting privacy and anonymity of parties of network communications Yi-Min Wang, Qixiang Sun, Wilfred Russell 2010-02-23
7665126 Mesh networks with exclusion capability Paramvir Bahl, Helen Wang 2010-02-16
7644275 Pass-thru for client authentication David R. Mowers, John A. Banes, Paul J. Leach 2010-01-05
7640215 System and method for evaluating and enhancing source anonymity for encrypted web traffic Yi-Min Wang, Qixiang Sun, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan 2009-12-29
7634661 Manifest-based trusted agent management in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2009-12-15
7617322 Secure peer-to-peer cache sharing Khaja E. Ahmed 2009-11-10
7577839 Transferring application secrets in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2009-08-18
7577840 Transferring application secrets in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2009-08-18
7574603 Method of negotiating security parameters and authenticating users interconnected to a network Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield 2009-08-11
7549048 Efficient and secure authentication of computing systems Trevor W. Freeman, Timothy M. Moore, Bernard Aboba 2009-06-16
7549170 System and method of inkblot authentication Adam Stubblefield 2009-06-16
7529933 TLS tunneling Ashwin Palekar, Arun Ayyagari 2009-05-05
7489645 Mesh networks with end device recognition Paramvir Bahl, Helen Wang 2009-02-10
7464265 Methods for iteratively deriving security keys for communications sessions Arun Ayyagari, Bernard Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl 2008-12-09
7370196 Controlled-content recoverable blinded certificates 2008-05-06
7305553 Manifest-based trusted agent management in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2007-12-04
7299352 Controlled-content recoverable blinded certificates 2007-11-20
7299349 Secure end-to-end notification Josh Cohen, Michael Kramer, Bradley M. Hammond, Paul Roberts, Lee Butler +1 more 2007-11-20
7284271 Authorizing a requesting entity to operate upon data structures Mark Lucovsky, Shaun D. Pierce, Michael G. Burner, Richard B. Ward, Paul J. Leach +4 more 2007-10-16
7257707 Manifest-based trusted agent management in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2007-08-14
7246374 Enhancing computer system security via multiple user desktops Dirk Balfanz 2007-07-17
7243230 Transferring application secrets in a trusted operating system environment Paul England, Marcus Peinado, Josh Benaloh 2007-07-10
7200599 Automated generator of input-validation filters Valentin Nikolaev Razmov, Jonathan D. Pincus 2007-04-03