Issued Patents All Time
Showing 26–50 of 68 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7676840 | Use of hashing in a secure boot loader | Dinarte R. Morais, Jon Lange, Daniel R. Simon, Ling Tony Chen | 2010-03-09 |
| 7634661 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2009-12-15 |
| 7624277 | Content alteration for prevention of unauthorized scripts | Patrice Y. Simard, Richard Szeliski, Iulian D. Calinov, Julien Couvreur | 2009-11-24 |
| 7613302 | Systems and methods for compression of key sets having multiple keys | — | 2009-11-03 |
| 7606915 | Prevention of unauthorized scripts | Iulian D. Calinov, Danpo Zhang, Jonathan Wilkins, Julien Couvreur | 2009-10-20 |
| 7602910 | Password protection | Jesper Johansson | 2009-10-13 |
| 7603343 | Quality of web search results using a game | Luis von Ahn Arellano | 2009-10-13 |
| 7577839 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2009-08-18 |
| 7577840 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2009-08-18 |
| 7571327 | Exclusive encryption | John R. Douceur, Gideon A. Yuval, Atul Adya | 2009-08-04 |
| 7555656 | Exclusive encryption | John R. Douceur, Gideon A. Yuval, Atul Adya | 2009-06-30 |
| 7552341 | Licensing the use of software on a particular CPU | Ling Tony Chen | 2009-06-23 |
| 7549063 | Methods and systems of protecting digital content | Andrew D. Rosen, Gideon A. Yuval | 2009-06-16 |
| 7536016 | Encrypted content data structure package and generation thereof | — | 2009-05-19 |
| 7533419 | Human interactive proof service | Ismail Cem Paya, Raja Pazhanivel Perumal, Trevin Chow, Erren Dusan Lester, Jeffrey E. Steinbok +1 more | 2009-05-12 |
| 7478110 | Game-powered search engine | Luis von Ahn Arellano, Eric D. Brill, John C. Platt | 2009-01-13 |
| 7475258 | Exclusive encryption | John R. Douceur, Gideon A. Yuval, Atul Adya | 2009-01-06 |
| 7437771 | Rendering protected digital content within a network of computing devices or the like | James M. Alkove, Clifford P. Van Dyke, Eduardo P. Oliveira, Troy Batterberry | 2008-10-14 |
| 7382883 | Deriving a symmetric key from an asymmetric key for file encryption or decryption | David B. Cross, Jianrong Gu, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway | 2008-06-03 |
| 7337324 | System and method for non-interactive human answerable challenges | Ismail Cem Paya | 2008-02-26 |
| 7305553 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2007-12-04 |
| 7257707 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2007-08-14 |
| 7243230 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Daniel R. Simon | 2007-07-10 |
| 7243237 | Secure communication with a keyboard or related device | Marcus Peinado | 2007-07-10 |
| 7181016 | Deriving a symmetric key from an asymmetric key for file encryption or decryption | David B. Cross, Jianrong Gu, Thomas C. Jones, Paul J. Leach, Glenn D. Pittaway | 2007-02-20 |