Issued Patents All Time
Showing 25 most recent of 68 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10977384 | Hardware protection for differential privacy | Harsha Prasad Nori, Janardhan Dattatreya KULKARNI, Joshua Stanley Allen, Jacob R. Lorch, Melissa E. Chase +4 more | 2021-04-13 |
| 10855665 | Simple protocol for tangible security | Yuqun Chen, Michael J. Sinclair | 2020-12-01 |
| 10165441 | Simple protocol for tangible security | Yuqun Chen, Michael J. Sinclair | 2018-12-25 |
| 9503431 | Simple protocol for tangible security | Yuqun Chen, Michael J. Sinclair | 2016-11-22 |
| 9185109 | Simple protocol for tangible security | Yuqun Chen, Michael J. Sinclair | 2015-11-10 |
| 8984293 | Secure software product identifier for product validation and activation | Thomas J. Layson, Caglar Gunyakti, Tarik Soulami, Kalin Toshev, Jeffrey Paul Harker | 2015-03-17 |
| 8875258 | Constraining a login to a subset of access rights | John R. Michener, Niels T. Ferguson, Carl M. Ellison, Brian A. LaMacchia | 2014-10-28 |
| 8837718 | User-specified sharing of data via policy and/or inference from a hierarchical cryptographic store | Kristin E. Lauter, Mihir Bellare, Melissa E. Chase, Erik J. Horvitz, Chris Demetrios Karkanias | 2014-09-16 |
| 8775797 | Reliable software product validation and activation with redundant security | Thomas J. Layson, Caglar Gunyakti, Tarik Soulami, Kalin Toshev, Jeffrey Paul Harker | 2014-07-08 |
| 8621592 | Authentication ticket validation | Ismail Cem Paya | 2013-12-31 |
| 8381279 | Constraining a login to a subset of access rights | John R. Michener, Niels T. Ferguson, Carl M. Ellison, Brian A. LaMacchia | 2013-02-19 |
| 8325924 | Managing group keys | Tolga Acar, Niels T. Ferguson, Carl M. Ellison, Mira Belenkiy, Duy Lan Nguyen | 2012-12-04 |
| 8239927 | Authentication ticket validation | Ismail Cem Paya | 2012-08-07 |
| 8230231 | One time password key ring for mobile computing device | Trevor W. Freeman, K John Biccum, Atul Kumar Shah | 2012-07-24 |
| 8224754 | Generation, distribution and verification of tokens using a secure hash algorithm | Andrzej Pastusiak, Arun Sacheti, Ting Cai, Deuane J. Martin, Rajesh Kuppuswamy | 2012-07-17 |
| 8140855 | Security-enhanced log in | Bin Zhu, Min Feng, Aimin Pan, Yuan Kong, Nathan C. Sherman +2 more | 2012-03-20 |
| 8090954 | Prevention of unauthorized forwarding and authentication of signatures | Cem Paya | 2012-01-03 |
| 7937586 | Defending against denial of service attacks | Douglas Robert de la Torre, Aidan T. Hughes | 2011-05-03 |
| 7929689 | Call signs | Christian Huitema, Kim Cameron | 2011-04-19 |
| 7904517 | Challenge response systems | Nina Kang, Joshua T. Goodman, Robert L. Rounthwaite, Elissa E. S. Murphy, Manav Mishra +3 more | 2011-03-08 |
| 7890643 | System and method for providing program credentials | Dean Justus, Nathan Fink, Michael W. Howard, Daniel R. Simon, Matthew W. Thomlinson | 2011-02-15 |
| 7822200 | Method and system for asymmetric key security | Kim Cameron, Arun K. Nanda, John P. Shewchuk, Daniel R. Simon, Andrew Bortz | 2010-10-26 |
| 7788484 | Using hierarchical identity based cryptography for authenticating outbound mail | Cem Paya | 2010-08-31 |
| 7770023 | Exclusive encryption | John R. Douceur, Atul Adya, Gideon A. Yuval | 2010-08-03 |
| 7685415 | Exclusive encryption | John R. Douceur, Gideon A. Yuval, Atul Adya | 2010-03-23 |