JB

Josh Benaloh

Microsoft: 66 patents #182 of 40,388Top 1%
Overall (All Time): #31,135 of 4,157,543Top 1%
68
Patents All Time

Issued Patents All Time

Showing 25 most recent of 68 patents

Patent #TitleCo-InventorsDate
10977384 Hardware protection for differential privacy Harsha Prasad Nori, Janardhan Dattatreya KULKARNI, Joshua Stanley Allen, Jacob R. Lorch, Melissa E. Chase +4 more 2021-04-13
10855665 Simple protocol for tangible security Yuqun Chen, Michael J. Sinclair 2020-12-01
10165441 Simple protocol for tangible security Yuqun Chen, Michael J. Sinclair 2018-12-25
9503431 Simple protocol for tangible security Yuqun Chen, Michael J. Sinclair 2016-11-22
9185109 Simple protocol for tangible security Yuqun Chen, Michael J. Sinclair 2015-11-10
8984293 Secure software product identifier for product validation and activation Thomas J. Layson, Caglar Gunyakti, Tarik Soulami, Kalin Toshev, Jeffrey Paul Harker 2015-03-17
8875258 Constraining a login to a subset of access rights John R. Michener, Niels T. Ferguson, Carl M. Ellison, Brian A. LaMacchia 2014-10-28
8837718 User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store Kristin E. Lauter, Mihir Bellare, Melissa E. Chase, Erik J. Horvitz, Chris Demetrios Karkanias 2014-09-16
8775797 Reliable software product validation and activation with redundant security Thomas J. Layson, Caglar Gunyakti, Tarik Soulami, Kalin Toshev, Jeffrey Paul Harker 2014-07-08
8621592 Authentication ticket validation Ismail Cem Paya 2013-12-31
8381279 Constraining a login to a subset of access rights John R. Michener, Niels T. Ferguson, Carl M. Ellison, Brian A. LaMacchia 2013-02-19
8325924 Managing group keys Tolga Acar, Niels T. Ferguson, Carl M. Ellison, Mira Belenkiy, Duy Lan Nguyen 2012-12-04
8239927 Authentication ticket validation Ismail Cem Paya 2012-08-07
8230231 One time password key ring for mobile computing device Trevor W. Freeman, K John Biccum, Atul Kumar Shah 2012-07-24
8224754 Generation, distribution and verification of tokens using a secure hash algorithm Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane J. Martin, Rajesh Kuppuswamy 2012-07-17
8140855 Security-enhanced log in Bin Zhu, Min Feng, Aimin Pan, Yuan Kong, Nathan C. Sherman +2 more 2012-03-20
8090954 Prevention of unauthorized forwarding and authentication of signatures Cem Paya 2012-01-03
7937586 Defending against denial of service attacks Douglas Robert de la Torre, Aidan T. Hughes 2011-05-03
7929689 Call signs Christian Huitema, Kim Cameron 2011-04-19
7904517 Challenge response systems Nina Kang, Joshua T. Goodman, Robert L. Rounthwaite, Elissa E. S. Murphy, Manav Mishra +3 more 2011-03-08
7890643 System and method for providing program credentials Dean Justus, Nathan Fink, Michael W. Howard, Daniel R. Simon, Matthew W. Thomlinson 2011-02-15
7822200 Method and system for asymmetric key security Kim Cameron, Arun K. Nanda, John P. Shewchuk, Daniel R. Simon, Andrew Bortz 2010-10-26
7788484 Using hierarchical identity based cryptography for authenticating outbound mail Cem Paya 2010-08-31
7770023 Exclusive encryption John R. Douceur, Atul Adya, Gideon A. Yuval 2010-08-03
7685415 Exclusive encryption John R. Douceur, Gideon A. Yuval, Atul Adya 2010-03-23