PL

Paul J. Leach

Microsoft: 92 patents #79 of 40,388Top 1%
HP HP: 1 patents #3,612 of 7,018Top 55%
Overall (All Time): #16,888 of 4,157,543Top 1%
93
Patents All Time

Issued Patents All Time

Showing 25 most recent of 93 patents

Patent #TitleCo-InventorsDate
9819666 Pass-thru for client authentication David R. Mowers, John A. Banes, Daniel R. Simon 2017-11-14
9407617 Pass-thru for client authentication David R. Mowers, John A. Banes, Daniel R. Simon 2016-08-02
9253195 Transformation of sequential access control lists utilizing certificates Carl M. Ellison, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman 2016-02-02
9208332 Scoped resource authorization policies David McPherson, Vishal Agarwal, Mark F. Novak, Ming Tang, Ramaswamy Ranganathan +4 more 2015-12-08
9118672 Back-end constrained delegation model Mark F. Novak, Liqiang Zhu, Paul J. Miller, Alexandru Hanganu, Yi Zeng +2 more 2015-08-25
9058467 Distributed computer systems with time-dependent credentials Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan 2015-06-16
9055107 Authentication delegation based on re-verification of cryptographic evidence Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, John Neystadt 2015-06-09
9032492 Distributed computer systems with time-dependent credentials Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan 2015-05-12
8996866 Unobtrusive assurance of authentic user intent Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John J. Lambert, Scott A. Field +1 more 2015-03-31
8984624 Resource access based on multiple scope levels Raja Pazhanivel Perumal, Jeffrey B. Hamblin 2015-03-17
8863291 Reputation checking of executable programs Daniel Oliver, Anshul Rawat, Xiang Zheng Tu, Ryan Colvin, James H. Dooley +7 more 2014-10-14
8813170 Testing access policies Mark F. Novak, Vishal Agarwal, David McPherson, Sunil P. Gottumukkala, Jignesh Shah +4 more 2014-08-19
8640210 Distributed computer systems with time-dependent credentials Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan 2014-01-28
8640256 File system operation and digital rights management (DRM) David B. Cross 2014-01-28
8627440 PassThru for client authentication David R. Mowers, Daniel R. Simon, John A. Banes 2014-01-07
8621561 Selective authorization based on authentication input attributes David B. Cross, Mark F. Novak, Oded Ye Shekel, Andreas K. Luther, Thomas C. Jones 2013-12-31
8555069 Fast-reconnection of negotiable authentication network clients Liqiang Zhu, Kevin Thomas Damour, David McPherson, Tanmoy Dutta 2013-10-08
8468579 Transformation of sequential access control lists utilizing certificates Carl M. Ellison, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman 2013-06-18
8464319 Resource access based on multiple scope levels Raja Pazhanivel Perumal, Jeffrey B. Hamblin 2013-06-11
8381306 Translating role-based access control policy to resource authorization policy Dave M. McPherson, Muthukrishnan Paramasivam 2013-02-19
8302149 Virtual distributed security system Giovanni M. Della-Libera, Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Bradford H. Lovering +4 more 2012-10-30
8266680 Predictive HTTP authentication mode negotiation Rick T. James, Jonathan A. Silvera, Matthew R. Cox, Anil K. Ruia, Anish Desai 2012-09-11
8230485 Method and system for controlling access privileges for trusted network nodes Sterling Reasor, Ramesh Chinta, John Brezak, Eric Flo 2012-07-24
8225390 Licensing protected content to application sets Kenneth D. Ray, Pankaj Mohan Kamat, Charles W. Kaufman, William R. Tipton, Andrew Herron +5 more 2012-07-17
8214641 File access in multi-protocol environment Scott A. Field, Roopesh C. Battepati, Michael C. Johnson 2012-07-03