Issued Patents All Time
Showing 51–70 of 70 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7743252 | Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates | Zulfikar Ramzan, Bernhard Bruhn | 2010-06-22 |
| 7730319 | Provisional signature schemes | Zulfikar Ramzan, David T. Molnar | 2010-06-01 |
| 7721089 | Broadcast encryption using RSA | Zulfikar Ramzan | 2010-05-18 |
| 7664957 | Digital signatures including identity-based aggregate signatures | Zulfikar Ramzan | 2010-02-16 |
| 7657748 | Certificate-based encryption and public key infrastructure | — | 2010-02-02 |
| 7653817 | Signature schemes using bilinear mappings | — | 2010-01-26 |
| 7620606 | Method and apparatus for secure and small credits for verifiable service provider metering | Zulfikar Ramzan | 2009-11-17 |
| 7620625 | Method and apparatus for communication efficient private information retrieval and oblivious transfer | Zulfikar Ramzan | 2009-11-17 |
| 7590854 | Hierarchical identity-based encryption and signature schemes | Alice Silverberg | 2009-09-15 |
| 7533270 | Signature schemes using bilinear mappings | — | 2009-05-12 |
| 7523304 | Generation of set coverings with free riders, and generation of ordered sets of meeting points, in systems which include, but are not limited to, systems for broadcast encryption and systems for certificate revocation | Zulfikar Ramzan, David P. Woodruff | 2009-04-21 |
| 7443980 | Hierarchical identity-based encryption and signature schemes | Alice Silverberg | 2008-10-28 |
| 7363496 | Authenticated ID-based cryptosystem with no key escrow | Alice Silverberg | 2008-04-22 |
| 7353395 | Authenticated ID-based cryptosystem with no key escrow | Alice Silverberg | 2008-04-01 |
| 7349538 | Hierarchical identity-based encryption and signature schemes | Alice Silverberg | 2008-03-25 |
| 7337322 | Hierarchical identity-based encryption and signature schemes | Alice Silverberg | 2008-02-26 |
| 7315941 | Multi-certificate revocation using encrypted proof data for proving certificate's validity or invalidity | Zulfikar Ramzan, Bernhard Bruhn | 2008-01-01 |
| 7266692 | Use of modular roots to perform authentication including, but not limited to, authentication of validity of digital certificates | Zulfikar Ramzan, Bernhard Bruhn | 2007-09-04 |
| 7246231 | Location privacy through IP address space scrambling | Muhammad Mukarram Tariq, James Kempf, Ravi Jain, Toshiro Kawahara | 2007-07-17 |
| 7221762 | Authenticated ID-based cryptosystem with no key escrow | Alice Silverberg | 2007-05-22 |