Exponentiation cryptographic apparatus and method
Number of patents in Portfolio can not be more than 2000
United States of America Patent
Stats
-
Jan 3, 1984
Grant Date -
N/A
app pub date -
May 1, 1978
filing date -
May 1, 1978
priority date (Note) -
Expired
status (Latency Note)
![]() |
A preliminary load of PAIR data current through [] has been loaded. Any more recent PAIR data will be loaded within twenty-four hours. |
PAIR data current through []
A preliminary load of cached data will be loaded soon.
Any more recent PAIR data will be loaded within twenty-four hours.
![]() |
Next PAIR Update Scheduled on [ ] |

Importance

US Family Size
|
Non-US Coverage
|
Patent Longevity
|
Forward Citations
|
Abstract
A cryptographic system transmits a computationally secure cryptogram that is generated from a secret transformation of the message sent by the authorized transmitter; the cryptogram is again transformed by the authorized receiver using a secret reciprocal transformation to reproduce the message sent. The secret transformations use secret cipher keys that are known only by the authorized transmitter and receiver. The transformations are performed with nonsecret operations, exponentiation, that are easily performed but extremely difficult to invert. It is computationally infeasible for an eavesdropper either to solve known plaintext-ciphertext pairs for the secret cipher keys, or to invert the nonsecret operations that are used to generate the cryptogram.

First Claim
Family

- 15 United States
- 10 France
- 8 Japan
- 7 China
- 5 Korea
- 2 Other
Patent Owner(s)
Patent Owner | Address | Total Patents |
---|---|---|
THE BOARD OF TRUSTEES OF THE LELAND STANFORD JUNIOR UNIVERSITY | PALO ALTO, CA | 2534 |
International Classification(s)
Inventor(s)
Inventor Name | Address | # of filed Patents | Total Citations |
---|---|---|---|
Hellman, Martin E | Stanford, CA | 10 | 2953 |
Pohlig, Stephen C | Acton, MA | 1 | 348 |
Cited Art Landscape
- No Cited Art to Display
Patent Citation Ranking
Forward Cite Landscape
Patent Info | (Count) | # Cites | Year |
---|---|---|---|
|
|||
* 4703503 Cryptographic system using pseudocomplements of vector Boolean algebra | 9 | 1986 | |
* 5987130 Simiplified secure swift cryptographic key exchange | 7 | 1997 | |
* 6122742 Auto-recoverable and auto-certifiable cryptosystem with unescrowed signing keys | 17 | 1997 | |
* 2002/0032,860 Account authority digital signature | 27 | 2001 | |
* 2002/0184,511 Secure accounting and operational control reporting system | 2 | 2002 | |
* 2006/0095,792 Super-distribution of protected digital content | 105 | 2005 | |
* 2007/0180,240 Data security system for a database | 3 | 2006 | |
* 2008/0005,571 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 56 | 2007 | |
9151633 Mobile communication device for delivering targeted advertisements | 2 | 2014 | |
9934408 Secure personal content server | 0 | 2017 | |
|
|||
8794516 Data storage and access systems | 1 | 2012 | |
|
|||
* 2005/0005,148 Contents processing system | 5 | 2004 | |
|
|||
7716484 System and method for increasing the security of encrypted secrets and authentication | 25 | 2001 | |
* 2010/0100,724 SYSTEM AND METHOD FOR INCREASING THE SECURITY OF ENCRYPTED SECRETS AND AUTHENTICATION | 45 | 2001 | |
7359507 Server-assisted regeneration of a strong secret from a weak secret | 179 | 2001 | |
8060750 Secure seed provisioning | 3 | 2007 | |
* 2009/0006,858 Secure seed provisioning | 6 | 2007 | |
8059814 Techniques for carrying out seed or key derivation | 10 | 2007 | |
8307210 Method and apparatus for secure validation of tokens | 8 | 2008 | |
|
|||
6226618 Electronic content delivery system | 1421 | 1998 | |
6263313 Method and apparatus to create encoded digital content | 445 | 1998 | |
6587837 Method for delivering electronic content from an online store | 443 | 1998 | |
6398245 Key management system for digital content player | 269 | 1998 | |
7206748 Multimedia player toolkit for electronic content delivery | 79 | 1998 | |
6418421 Multimedia player for an electronic content delivery system | 464 | 1998 | |
7110984 Updating usage conditions in lieu of download digital rights management protected content | 78 | 2000 | |
6859791 Method for determining internet users geographic region | 104 | 2000 | |
|
|||
* 5231668 Digital signature algorithm | 187 | 1991 | |
|
|||
7143284 ABDS method and verification status for authenticating entity access | 15 | 2003 | |
* 2003/0126,437 ABDS Method and Verification Status for Authenticating Entity Access | 40 | 2003 | |
|
|||
* 2003/0212,992 Apparatus and method for using application signatures for the identification of files | 63 | 2003 | |
|
|||
* 5761310 Communication system for messages enciphered according to an RSA-type procedure | 8 | 1996 | |
|
|||
* 5414771 System and method for the creation of random sequences and for the cryptographic protection of communications | 26 | 1993 | |
|
|||
* 6078593 Method and apparatus for reliable operation of universal voice grade cards | 13 | 1997 | |
6574333 State machine based universal voice grade cards | 8 | 1999 | |
|
|||
* 5228084 Security apparatus and system for retail environments | 44 | 1991 | |
* 5384850 Security apparatus and system for retail environments | 20 | 1992 | |
* 5448638 Security apparatus and system for retail environments | 36 | 1994 | |
|
|||
* 5787367 Flash reprogramming security for vehicle computer | 66 | 1996 | |
|
|||
* 2007/0174,271 Database system with second preprocessor and method for accessing a database | 9 | 2006 | |
* 2007/0067,637 Method and a system for preventing impersonation of a database user | 14 | 2006 | |
8443426 Method and system for preventing impersonation of a computer system user | 1 | 2008 | |
8402281 Data security system for a database | 9 | 2010 | |
|
|||
* 5299262 Method for exponentiating in cryptographic systems | 34 | 1992 | |
|
|||
* 4837822 Cryptographic based electronic lock system and method of operation | 54 | 1986 | |
|
|||
* 5583939 Secure, swift cryptographic key exchange | 28 | 1995 | |
* 5835592 Secure, swift cryptographic key exchange | 56 | 1995 | |
|
|||
7382878 System and method for data encryption | 4 | 2001 | |
* 2003/0016,820 System and method for data encryption | 4 | 2001 | |
|
|||
* 2007/0011,458 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 32 | 2006 | |
|
|||
* 2002/0083,114 Obtaining temporary exclusive control of a printing device | 13 | 2000 | |
|
|||
* 4736423 Technique for reducing RSA Crypto variable storage | 51 | 1986 | |
* 5163096 Storage protection utilizing public storage key control | 105 | 1991 | |
* 5926551 System and method for certifying content of hard-copy documents | 29 | 1995 | |
* 5737425 Cryptosystem employing worst-case difficult-to solve lattice problem | 4 | 1996 | |
* 5953420 Method and apparatus for establishing an authenticated shared secret value between a pair of users | 91 | 1996 | |
6560337 Systems, methods and computer program products for reducing effective key length of ciphers using one-way cryptographic functions and an initial key | 9 | 1998 | |
6363154 Decentralized systems methods and computer program products for sending secure messages among a group of nodes | 66 | 1998 | |
7269564 Method and apparatus to indicate an encoding status for digital content | 42 | 1998 | |
6345256 Automated method and apparatus to package digital content for electronic distribution using the identity of the source content | 577 | 1998 | |
6959288 Digital content preparation system | 152 | 1999 | |
6834110 Multi-tier digital TV programming for content distribution | 162 | 1999 | |
7213005 Digital content distribution using web broadcasting services | 200 | 2000 | |
* 2003/0135,464 Digital content distribution using web broadcasting services | 139 | 2000 | |
6978375 System and method for secure authentication of external software modules provided by third parties | 3 | 2000 | |
7500109 System and method for secure authentication of external software modules provided by third parties | 0 | 2005 | |
* 2005/0216,422 System and method for secure authentication of external software modules provided by third parties | 4 | 2005 | |
7487128 Updating usage conditions in lieu of download digital rights management protected content | 25 | 2005 | |
* 2006/0089,912 Updating usage conditions in lieu of download digital rights management protected content | 76 | 2005 | |
7277870 Digital content distribution using web broadcasting services | 140 | 2005 | |
* 2006/0053,077 Digital content distribution using web broadcasting services | 58 | 2005 | |
7590866 Super-distribution of protected digital content | 16 | 2005 | |
|
|||
9551582 Mobile communication device | 0 | 2015 | |
|
|||
* 5568554 Method for improving the processing and storage performance of digital signature schemes | 67 | 1995 | |
* 5999624 Remote financial transaction system | 301 | 1996 | |
* 5848159 Public key cryptographic apparatus and method | 78 | 1997 | |
|
|||
* 5377270 Cryptographic authentication of transmitted messages using pseudorandom numbers | 50 | 1993 | |
* 5363448 Pseudorandom number generation and cryptographic authentication | 167 | 1993 | |
* 5398284 Cryptographic encoding process | 30 | 1993 | |
* 5369706 Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code | 74 | 1993 | |
* 5757923 Method of generating secret identification numbers | 162 | 1996 | |
* RE36181 Pseudorandom number generation and crytographic authentication | 24 | 1996 | |
* RE36752 Cryptographic authentication of transmitted messages using pseudorandom numbers | 11 | 1996 | |
|
|||
* 5613004 Steganographic method and device | 773 | 1995 | |
* 5822432 Method for human-assisted random key generation and application for digital watermark system | 368 | 1996 | |
* 5745569 Method for stega-cipher protection of computer code | 403 | 1996 | |
7362775 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management | 68 | 1996 | |
* 5889868 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 486 | 1996 | |
* 5687236 Steganographic method and device | 547 | 1996 | |
7568100 Steganographic method and device | 68 | 1997 | |
6598162 Method for combining transfer functions with predetermined key creation | 145 | 1998 | |
* 5905800 Method and system for digital watermarking | 505 | 1998 | |
6205249 Multiple transform utilization and applications for secure digital watermarking | 246 | 1998 | |
6522767 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 231 | 1999 | |
7007166 Method and system for digital watermarking | 170 | 2000 | |
7035409 Multiple transform utilization and applications for secure digital watermarking | 57 | 2000 | |
7346472 Method and device for monitoring and analyzing signals | 198 | 2000 | |
7107451 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 91 | 2001 | |
* 2001/0029,580 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 40 | 2001 | |
7095874 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 82 | 2003 | |
* 2003/0219,143 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 43 | 2003 | |
7287275 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 140 | 2003 | |
* 2003/0200,439 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 28 | 2003 | |
7664263 Method for combining transfer functions with predetermined key creation | 58 | 2003 | |
* 2004/0086,119 Method for combining transfer functions with predetermined key creation | 63 | 2003 | |
* 2004/0243,540 Method and device for monitoring and analyzing signals | 86 | 2004 | |
7152162 Z-transform implementation of digital watermarks | 64 | 2004 | |
* 2005/0135,615 Z-transform implementation of digital watermarks | 31 | 2004 | |
7761712 Steganographic method and device | 56 | 2005 | |
* 2005/0177,727 Steganographic method and device | 68 | 2005 | |
7343492 Method and system for digital watermarking | 77 | 2005 | |
* 2006/0101,269 Method and system for digital watermarking | 42 | 2005 | |
7738659 Multiple transform utilization and application for secure digital watermarking | 8 | 2006 | |
* 2006/0140,403 Multiple transform utilization and application for secure digital watermarking | 57 | 2006 | |
7409073 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 68 | 2006 | |
* 2006/0285,722 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 34 | 2006 | |
7457962 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 62 | 2006 | |
8538011 Systems, methods and devices for trusted transactions | 2 | 2006 | |
* 2007/0028,113 Systems, methods and devices for trusted transactions | 70 | 2006 | |
8271795 Security based on subliminal and supraliminal channels for data objects | 0 | 2006 | |
* 2008/0028,222 Security based on subliminal and supraliminal channels for data objects | 57 | 2006 | |
7664264 Utilizing data reduction in steganographic and cryptographic systems | 5 | 2006 | |
* 2007/0064,940 Utilizing data reduction in steganographic and cryptographic systems | 68 | 2006 | |
7730317 Linear predictive coding implementation of digital watermarks | 5 | 2006 | |
7930545 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 5 | 2006 | |
7647502 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 57 | 2006 | |
7532725 Systems and methods for permitting open access to data objects and for securing data within the data objects | 57 | 2006 | |
* 2007/0110,240 System and methods for permitting open access to data objects and for securing data within the data objects | 67 | 2006 | |
7779261 Method and system for digital watermarking | 61 | 2007 | |
* 2007/0113,094 Method and system for digital watermarking | 64 | 2007 | |
8046841 Steganographic method and device | 5 | 2007 | |
7870393 Steganographic method and device | 8 | 2007 | |
* 2007/0294,536 Steganographic method and device | 56 | 2007 | |
9104842 Data protection method and device | 0 | 2007 | |
* 2008/0016,365 Data protection method and device | 60 | 2007 | |
7664958 Optimization methods for the insertion, protection and detection of digital watermarks in digital data | 7 | 2007 | |
* 2008/0022,113 Optimization methods for the insertion, protection and detection of digital of digital watermarks in digital data | 59 | 2007 | |
7822197 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 3 | 2007 | |
7647503 Optimization methods for the insertion, projection, and detection of digital watermarks in digital data | 58 | 2007 | |
* 2008/0022,114 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 66 | 2007 | |
8224705 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 1 | 2007 | |
7530102 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 73 | 2007 | |
7770017 Method and system for digital watermarking | 7 | 2007 | |
7660700 Method and device for monitoring and analyzing signals | 118 | 2007 | |
* 2008/0109,417 Method and device for monitoring and analyzing signals | 56 | 2007 | |
7830915 Methods and systems for managing and exchanging digital information packages with bandwidth securitization instruments | 4 | 2008 | |
* 2008/0151,934 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management | 55 | 2008 | |
7844074 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 22 | 2008 | |
* 2010/0002,904 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 53 | 2008 | |
7987371 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 0 | 2008 | |
* 2009/0037,740 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 57 | 2008 | |
8171561 Secure personal content server | 7 | 2008 | |
8104079 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 1 | 2009 | |
* 2009/0210,711 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 60 | 2009 | |
8238553 Steganographic method and device | 1 | 2009 | |
7813506 System and methods for permitting open access to data objects and for securing data within the data objects | 0 | 2009 | |
* 2009/0220,074 Steganographic method and device | 56 | 2009 | |
* 2009/0190,754 System and methods for permitting open access to data objects and for securing data within the data objects | 56 | 2009 | |
7953981 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 3 | 2009 | |
* 2010/0005,308 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 54 | 2009 | |
7877609 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 0 | 2009 | |
* 2010/0064,140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 54 | 2009 | |
8281140 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 6 | 2009 | |
* 2010/0077,220 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 52 | 2009 | |
8265276 Method for combining transfer functions and predetermined key creation | 0 | 2009 | |
8160249 Utilizing data reduction in steganographic and cryptographic system | 2 | 2009 | |
7949494 Method and device for monitoring and analyzing signals | 113 | 2009 | |
* 2010/0153,734 Utilizing data reduction in steganographic and cryptographic system | 56 | 2009 | |
* 2010/0106,736 Method and device for monitoring and analyzing signals | 52 | 2009 | |
* 2010/0098,251 Method for combining transfer functions and predetermined key creation | 53 | 2009 | |
8225099 Linear predictive coding implementation of digital watermarks | 1 | 2010 | |
* 2010/0202,607 Linear predictive coding implementation of digital watermarks | 52 | 2010 | |
8542831 Multiple transform utilization and application for secure digital watermarking | 0 | 2010 | |
* 2010/0220,861 Multiple transform utilization and application for secure digital watermarking | 52 | 2010 | |
8467525 Steganographic method and device | 5 | 2010 | |
8307213 Method and system for digital watermarking | 23 | 2010 | |
8161286 Method and system for digital watermarking | 23 | 2010 | |
* 2011/0010,555 Method and system for digital watermarking | 2 | 2010 | |
* 2010/0293,387 Method and system for digital watermarking | 0 | 2010 | |
8265278 System and methods for permitting open access to data objects and for securing data within the data objects | 20 | 2010 | |
8774216 Exchange mechanisms for digital information packages with bandwidth securitization, multichannel digital watermarks, and key management | 0 | 2010 | |
* 2011/0019,691 EXCHANGE MECHANISMS FOR DIGITAL INFORMATION PACKAGES WITH BANDWIDTH SECURITIZATION, MULTICHANNEL DIGITAL WATERMARKS, AND KEY MANAGEMENT | 19 | 2010 | |
8121343 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 19 | 2010 | |
8549305 Steganographic method and device | 2 | 2010 | |
* 2011/0069,864 STEGANOGRAPHIC METHOD AND DEVICE | 19 | 2010 | |
8214175 Method and device for monitoring and analyzing signals | 133 | 2011 | |
8175330 Optimization methods for the insertion, protection, and detection of digital watermarks in digitized data | 2 | 2011 | |
8473746 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 0 | 2011 | |
8739295 Secure personal content server | 0 | 2012 | |
8526611 Utilizing data reduction in steganographic and cryptographic systems | 1 | 2012 | |
RE44307 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 0 | 2012 | |
RE44222 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 0 | 2012 | |
8706570 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 0 | 2012 | |
8930719 Data protection method and device | 2 | 2012 | |
8767962 System and methods for permitting open access to data objects and for securing data within the data objects | 0 | 2012 | |
9021602 Data protection method and device | 0 | 2013 | |
8798268 System and methods for permitting open access to data objects and for securing data within the data objects | 0 | 2013 | |
9070151 Systems, methods and devices for trusted transactions | 4 | 2013 | |
8789201 Secure personal content server | 0 | 2013 | |
8781121 Utilizing data reduction in steganographic and cryptographic systems | 0 | 2013 | |
8712728 Method and device for monitoring and analyzing signals | 0 | 2013 | |
9639717 Methods, systems and devices for packet watermarking and efficient provisioning of bandwidth | 0 | 2013 | |
9191205 Multiple transform utilization and application for secure digital watermarking | 0 | 2014 | |
9191206 Multiple transform utilization and application for secure digital watermarking | 0 | 2014 | |
9270859 Utilizing data reduction in steganographic and cryptographic systems | 0 | 2014 | |
9258116 System and methods for permitting open access to data objects and for securing data within the data objects | 0 | 2014 | |
9171136 Data protection method and device | 0 | 2014 | |
9830600 Systems, methods and devices for trusted transactions | 0 | 2015 | |
9710669 Secure personal content server | 0 | 2015 | |
9843445 System and methods for permitting open access to data objects and for securing data within the data objects | 0 | 2015 | |
|
|||
7320073 Secure method for roaming keys and certificates | 13 | 2003 | |
* 2004/0199,774 Secure method for roaming keys and certificates | 3 | 2003 | |
|
|||
* 5313521 Key distribution protocol for file transfer in the local area network | 107 | 1992 | |
|
|||
* 5371794 Method and apparatus for privacy and authentication in wireless networks | 404 | 1993 | |
* RE36946 Method and apparatus for privacy and authentication in wireless networks | 92 | 1996 | |
|
|||
* 4827507 Duplex analog scrambler | 21 | 1987 | |
|
|||
6820202 Account authority digital signature (AADS) system | 109 | 1998 | |
8620814 Three party account authority digital signature (AADS) system | 0 | 2001 | |
* 2002/0112,160 Three Party Account Authority Digital Signature (AADS) System | 27 | 2001 | |
7558965 Entity authentication in electronic communications by providing verification status of device | 55 | 2001 | |
7552333 Trusted authentication digital signature (tads) system | 33 | 2001 | |
7500272 Manufacturing unique devices that generate digital signatures | 15 | 2001 | |
7200749 Method and system for using electronic communications for an electronic contract | 27 | 2001 | |
7047416 Account-based digital signature (ABDS) system | 23 | 2001 | |
6983368 Linking public key of device to information during manufacture | 10 | 2001 | |
6978369 Person-centric account-based digital signature system | 106 | 2001 | |
* 2002/0026,575 Account-based digital signature (ABDS) system | 102 | 2001 | |
* 2002/0023,217 Manufacturing unique devices that generate digital signatures | 46 | 2001 | |
* 2002/0016,913 Modifying message data and generating random number digital signature within computer chip | 45 | 2001 | |
6981154 Account authority digital signature (AADS) accounts | 12 | 2001 | |
6820199 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | 26 | 2002 | |
* 2002/0116,608 Sending electronic transaction message, digital signature derived therefrom, and sender identity information in AADS system | 4 | 2002 | |
* 2002/0129,248 Account-based digital signature (ABDS) system | 26 | 2002 | |
* 2003/0014,372 Trusted authentication digital signature (tads) system | 78 | 2002 | |
* 2003/0177,361 Method and system for using electronic communications for an electronic contract | 42 | 2002 | |
7010691 ABDS system utilizing security information in authenticating entity access | 23 | 2003 | |
6950940 ABDS method utilizing security information in authenticating entity access | 42 | 2003 | |
6938156 ABDS system and verification status for authenticating entity access | 112 | 2003 | |
6851054 Account-Based digital signature (ABDS) system for authenticating entity access to controlled resource | 84 | 2003 | |
* 2003/0131,235 ABDS Method Utilizing Security Information in Authenticating Entity Access | 7 | 2003 | |
* 2003/0131,234 Account-Based Digital Signature (ABDS) System for Authenticating Entity Access to Controlled Resource | 0 | 2003 | |
* 2003/0126,439 ABDS System Utilizing Security Information in Authenticating Entity Access | 6 | 2003 | |
* 2003/0126,438 ABDS System and Verification Status for Authenticating Entity Access | 4 | 2003 | |
7096354 Central key authority database in an ABDS system | 85 | 2003 | |
7082533 Gauging risk in electronic communications regarding accounts in ABDS system | 9 | 2003 | |
7047414 Managing database for reliably identifying information of device generating digital signatures | 40 | 2003 | |
7028185 Managing database for identifying to recipients security features of devices generating digital signatures | 27 | 2003 | |
6959381 Central key authority (CKA) database for user accounts in ABDS system | 25 | 2003 | |
6957336 Establishing initial PuK-linked account database | 15 | 2003 | |
6952773 Requesting execution of instructions on accounts in ABDS system | 11 | 2003 | |
6915430 Reliably identifying information of device generating digital signatures | 19 | 2003 | |
6892302 Incorporating security certificate during manufacture of device generating digital signatures | 20 | 2003 | |
6789189 Managing account database in ABDS system | 37 | 2003 | |
* 2003/0115,463 Requesting Execution of Instructions on Accounts in ABDS System | 5 | 2003 | |
* 2003/0101,344 Establishing Initial PuK-Linked Account Database | 22 | 2003 | |
* 2003/0101,136 Managing Account Database in ABDS System | 11 | 2003 | |
* 2003/0097,562 Managing Database for Reliably Identifying Information of Device Generating Digital Signatures | 5 | 2003 | |
* 2003/0097,561 Gauging Risk in Electronic Communications Regarding Accounts in ABDS System | 10 | 2003 | |
* 2003/0097,573 Central Key Authority Database in an ABDS System | 9 | 2003 | |
* 2003/0097,570 Managing Database for Identifying to Recipients Security Features of Devices Generating Digital Signatures | 3 | 2003 | |
* 2004/0128,508 Method and apparatus for access authentication entity | 38 | 2003 | |
* 2004/0030,901 Linking public key of device to information during manufacture | 14 | 2003 | |
* 2004/0005,051 Entity authentication in eletronic communications by providing verification status of device | 43 | 2003 | |
* 2003/0115,151 Person-centric account-based digital signature system | 21 | 2003 | |
7257228 Account authority digital signature (AADS) system using encoded information | 13 | 2004 | |
* 2005/0044,373 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM USING ENCODED INFORMATION | 1 | 2004 | |
7549050 Sending electronic transaction message for entity information account, digital signature derived therefrom, and sender identity information in AADS system | 1 | 2004 | |
7519821 Account authority digital signature (AADS) system | 1 | 2004 | |
* 2005/0005,123 ACCOUNT AUTHORITY DIGITAL SIGNATURE (AADS) SYSTEM | 11 | 2004 | |
7936869 Verifying digital signature based on shared knowledge | 1 | 2005 | |
7869593 Software for providing based on shared knowledge public keys having same private key | 5 | 2005 | |
7693277 Generating digital signatures using ephemeral cryptographic key | 2 | 2005 | |
7593527 Providing digital signature and public key based on shared knowledge | 9 | 2005 | |
7490239 Facilitating digital signature based on ephemeral private key | 5 | 2005 | |
* 2006/0156,013 DIGITAL SIGNATURE SOFTWARE USING EPHEMERAL PRIVATE KEY AND SYSTEM | 3 | 2005 | |
* 2006/0156,012 FACILITATING DIGITAL SIGNATURE BASED ON EPHEMERAL PRIVATE KEY | 3 | 2005 | |
* 2006/0153,370 GENERATING PUBLIC-PRIVATE KEY PAIR BASED ON USER INPUT DATA | 10 | 2005 | |
* 2006/0153,366 VERIFYING DIGITAL SIGNATURE BASED ON SHARED KNOWLEDGE | 3 | 2005 | |
* 2006/0153,371 GENERATING DIGITAL SIGNATURES USING EPHEMERAL CRYPTOGRAPHIC KEY | 3 | 2005 | |
* 2006/0153,365 PROVIDING DIGITAL SIGNATURE AND PUBLIC KEY BASED ON SHARED KNOWLEDGE | 4 | 2005 | |
* 2006/0153,368 SOFTWARE FOR PROVIDING BASED ON SHARED KNOWLEDGE PUBLIC KEYS HAVING SAME PRIVATE KEY | 22 | 2005 | |
* 2006/0153,364 ASYMMETRIC KEY CRYPTOSYSTEM BASED ON SHARED KNOWLEDGE | 13 | 2005 | |
* 2006/0153,367 DIGITAL SIGNATURE SYSTEM BASED ON SHARED KNOWLEDGE | 2 | 2005 | |
* 2006/0153,369 PROVIDING CRYPTOGRAPHIC KEY BASED ON USER INPUT DATA | 5 | 2005 | |
7784106 Manufacturing unique devices that generate digital signatures | 5 | 2009 | |
* 2009/0158,029 MANUFACTURING UNIQUE DEVICES THAT GENERATE DIGITAL SIGNATURES | 5 | 2009 | |
|
|||
* 6064740 Method and apparatus for masking modulo exponentiation calculations in an integrated circuit | 58 | 1997 | |
|
|||
* 4567600 Method and apparatus for maintaining the privacy of digital messages conveyed by public transmission | 65 | 1982 | |
|
|||
* 6097307 Security system with randomized synchronization code | 7 | 1997 | |
|
|||
7231040 Multiprime RSA public key cryptosystem | 2 | 1998 | |
* RE40530 Public key cryptographic apparatus and method | 0 | 2000 | |
7016494 Multiple cryptographic key precompute and store | 7 | 2001 | |
* 2005/0190,912 MULTIPLE CRYPTOGRAPHIC KEY PRECOMPUTE AND STORE | 33 | 2001 | |
|
|||
* 2003/0012,386 Forward-secure commercial key escrow systems and escrowing methods thereof | 43 | 2001 | |
|
|||
6253323 Object-based digital signatures | 34 | 1996 | |
|
|||
9002018 Encryption key exchange system and method | 30 | 2011 | |
|
|||
8612765 Security based on subliminal and supraliminal channels for data objects | 0 | 2012 | |
|
|||
* 5054066 Error correcting public key cryptographic method and program | 62 | 1988 | |
|
|||
* 5646996 Automatic resynchronization of transmitter in the event of corrupted memory | 15 | 1995 | |
* 5696828 Random number generating system and process based on chaos | 115 | 1995 | |
|
|||
7809767 Architecture for distributed computing system and automated design, deployment, and management of distributed applications | 0 | 2003 | |
7565275 Model and system state synchronization | 0 | 2005 | |
|
|||
* 4964164 RSA computation method for efficient batch processing | 37 | 1989 | |
|
|||
7155578 Method and system for transferring files using file transfer protocol | 2 | 2002 | |
|
|||
* 4944007 Public key diversification method | 36 | 1989 | |
* 4935962 Method and system for authentication | 171 | 1989 | |
|
|||
* 5675649 Process for cryptographic key generation and safekeeping | 75 | 1995 | |
7120248 Multiple prime number generation using a parallel prime number search algorithm | 5 | 2001 | |
* 2002/0186,837 Multiple prime number generation using a parallel prime number search algorithm | 2 | 2001 | |
|
|||
* 4658094 Encryption apparatus and methods for raising a large unsigned integer to a large unsigned integer power modulo a large unsigned integer | 33 | 1985 | |
|
|||
8184803 Hash functions using elliptic curve cryptography | 2 | 2008 | |
8139765 Elliptical polynomial-based message authentication code | 7 | 2008 | |
* 2010/0166,176 Elliptical polynomial-based message authentication code | 7 | 2008 | |
* 2010/0166,174 Hash functions using elliptic curve cryptography | 14 | 2008 | |
8165287 Cryptographic hash functions using elliptic polynomial cryptography | 1 | 2008 | |
* 2010/0169,658 Elliptic curve-based message authentication code | 6 | 2008 | |
* 2010/0166,175 Cryptographic hash functions using elliptic polynomial cryptography | 10 | 2008 | |
8170203 Message authentication code with elliptic polynomial hopping | 2 | 2008 | |
* 2010/0169,644 Message authentication code with elliptic polynomial hopping | 8 | 2008 | |
8189771 Hash functions with elliptic polynomial hopping | 1 | 2009 | |
8385541 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping | 0 | 2010 | |
8351601 Elliptic polynomial cryptography with secret key embedding | 0 | 2010 | |
8331558 Method of cipher block chaining using elliptic curve cryptography | 0 | 2010 | |
8332651 Method of generating a password protocol using elliptic polynomial cryptography | 0 | 2010 | |
8189775 Method of performing cipher block chaining using elliptic polynomial cryptography | 1 | 2010 | |
* 2011/0200,187 Elliptic polynomial cryptography with secret key embedding | 6 | 2010 | |
* 2011/0200,186 Method of cipher block chaining using elliptic curve cryptography | 5 | 2010 | |
* 2011/0200,185 Method of performing elliptic polynomial cryptography with elliptic polynomial hopping | 8 | 2010 | |
8509426 XZ-elliptic curve cryptography system and method | 0 | 2010 | |
8705740 Elliptic curve-based message authentication code system and method | 0 | 2012 | |
|
|||
* 6041317 Postal security device incorporating periodic and automatic self implementation of public/private key pair | 30 | 1997 | |
|
|||
6202150 Auto-escrowable and auto-certifiable cryptosystems | 26 | 1997 | |
6243466 Auto-escrowable and auto-certifiable cryptosystems with fast key generation | 11 | 1997 | |
6389136 Auto-Recoverable and Auto-certifiable cryptosystems with RSA or factoring based keys | 30 | 1997 | |
6282295 Auto-recoverable and auto-certifiable cryptostem using zero-knowledge proofs for key escrow in general exponential ciphers | 58 | 1997 | |
6473508 Auto-recoverable auto-certifiable cryptosystems with unescrowed signature-only keys | 32 | 1998 | |
|
|||
8630942 Method of billing a purchase made over a computer network | 0 | 2008 | |
8229844 Method of billing a purchase made over a computer network | 12 | 2008 | |
8190513 Method of billing a purchase made over a computer network | 11 | 2008 | |
* 2009/0055,315 Method Of Billing A Purchase Made Over A Computer Network | 14 | 2008 | |
* 2009/0048,975 Method Of Billing A Purchase Made Over A Computer Network | 13 | 2008 | |
* 2009/0049,529 Method Of Billing A Purchase Made Over A Computer Network | 15 | 2008 | |
|
|||
8699701 Method of performing XZ-elliptic curve cryptography for use with network security protocols | 0 | 2010 | |
|
|||
* 4759063 Blind signature systems | 209 | 1983 | |
* 4991210 Unpredictable blind signature systems | 86 | 1989 | |
* 4996711 Selected-exponent signature systems | 121 | 1989 | |
|
|||
* 8275716 Method and system for subscription digital rights management | 2 | 2002 | |
* 2002/0198,846 Method and system for subscription digital rights management | 60 | 2002 | |
8468098 Method and system for subscription digital rights management | 0 | 2012 | |
* 2012/0317,654 METHOD AND SYSTEM FOR SUBSCRIPTION DIGITAL RIGHTS MANAGEMENT | 0 | 2012 | |
|
|||
* 5353351 Secure teleconferencing | 81 | 1992 | |
|
|||
* 5745574 Security infrastructure for electronic transactions | 235 | 1995 | |
|
|||
* 5872917 Authentication using random challenges | 63 | 1997 | |
|
|||
7899753 Systems and methods for time variable financial authentication | 13 | 2003 | |
9240089 Systems and methods for time variable financial authentication | 1 | 2009 | |
|
|||
* 2004/0210,623 Virtual network topology generation | 103 | 2003 | |
7636917 Network load balancing with host status information | 30 | 2003 | |
7613822 Network load balancing with session information | 54 | 2003 | |
7590736 Flexible network load balancing | 53 | 2003 | |
* 2004/0267,920 Flexible network load balancing | 110 | 2003 | |
* 2004/0268,358 Network load balancing with host status information | 183 | 2003 | |
7606929 Network load balancing with connection manipulation | 9 | 2003 | |
7567504 Network load balancing with traffic routing | 58 | 2003 | |
* 2005/0055,435 Network load balancing with connection manipulation | 106 | 2003 | |
8122106 Integrating design, deployment, and management phases for systems | 9 | 2003 | |
7890543 Architecture for distributed computing system and automated design, deployment, and management of distributed applications | 39 | 2003 | |
7289629 Primitives for fast secure hash functions and stream ciphers | 1 | 2004 | |
* 2005/0175,176 Primitives for fast secure hash functions and stream ciphers | 1 | 2004 | |
* 7778422 Security associations for devices | 8 | 2004 | |
7497379 Counterfeit and tamper resistant labels with randomly occurring features | 32 | 2004 | |
* 2005/0190,914 Counterfeit and tamper resistant labels with randomly occurring features | 26 | 2004 | |
7886041 Design time validation of systems | 43 | 2004 | |
* 2004/0193,388 Design time validation of systems | 57 | 2004 | |
7577844 Systems and methods for encoding randomly distributed features in an object | 24 | 2004 | |
* 2005/0246,529 Isolated persistent identity storage for authentication of computing devies | 51 | 2004 | |
7669235 Secure domain join for computing devices | 7 | 2004 | |
7305549 Filters to isolate untrusted ports of switches | 33 | 2004 | |
7305561 Establishing computing trust with a staging area | 40 | 2004 | |
7336806 Iris-based biometric identification | 27 | 2004 | |
* 2005/0125,212 System and method for designing a logical model of a distributed computer system and deploying physical resources according to the logical model | 50 | 2004 | |
7792931 Model-based system provisioning | 8 | 2005 | |
8489728 Model-based system monitoring | 4 | 2005 | |
7802144 Model-based system monitoring | 29 | 2005 | |
7797147 Model-based system monitoring | 6 | 2005 | |
8549513 Model-based virtual system provisioning | 14 | 2005 | |
7890951 Model-based provisioning of test environments | 47 | 2005 | |
* 2007/0016,393 Model-based propagation of attributes | 3 | 2005 | |
* 2007/0006,218 Model-based virtual system provisioning | 43 | 2005 | |
* 2006/0037,002 Model-based provisioning of test environments | 46 | 2005 | |
* 2006/0025,985 Model-Based system management | 127 | 2005 | |
7684964 Model and system state synchronization | 5 | 2005 | |
7941309 Modeling IT operations/policies | 2 | 2005 | |
* 2007/0112,847 Modeling IT operations/policies | 62 | 2005 | |
7630877 Architecture for distributed computing system and automated design, deployment, and management of distributed applications | 65 | 2005 | |
* 2006/0271,341 Architecture for distributed computing system and automated design, deployment, and management of distributed applications | 62 | 2005 | |
7574343 System and method for logical modeling of distributed computer systems | 8 | 2006 | |
7689676 Model-based policy application | 27 | 2007 | |
* 2008/0059,214 Model-Based Policy Application | 47 | 2007 | |
8127133 Labeling of data objects to apply and enforce policies | 8 | 2007 | |
* 2008/0184,329 LABELING OF DATA OBJECTS TO APPLY AND ENFORCE POLICIES | 8 | 2007 | |
* 2008/0288,622 Managing Server Farms | 3 | 2007 | |
7444007 Iris-based biometric identification | 12 | 2007 | |
* 2008/0025,575 Iris-Based Biometric Identification | 9 | 2007 | |
7878398 Counterfeit and tamper resistant labels with randomly occurring features | 9 | 2009 | |
9317270 Model-based virtual system provisioning | 1 | 2013 | |
9811368 Model-based virtual system provisioning | 0 | 2015 | |
|
|||
* 5323146 Method for authenticating the user of a data station connected to a computer system | 46 | 1992 | |
|
|||
7991188 Optimization methods for the insertion, protection, and detection of digital watermarks in digital data | 5 | 2007 | |
|
|||
* 2004/0250,073 Protocol for hybrid authenticated key establishment | 9 | 2003 | |
|
|||
* 2004/0133,699 System and method for performing data transfer | 2 | 2002 | |
|
|||
* 5375169 Cryptographic key management method and apparatus | 124 | 1993 | |
|
|||
* 6011847 Cryptographic access and labeling system | 85 | 1995 | |
|
|||
* 5204901 Public key cryptographic mechanism | 24 | 1991 | |
* 5239584 Method and apparatus for encryption/authentication of data in energy metering applications | 63 | 1991 | |
|
|||
* 5557678 System and method for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | 154 | 1994 | |
* 5588061 System and method for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | 53 | 1994 | |
* 5535276 Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography | 379 | 1994 | |
* 5748735 Securing E-mail communications and encrypted file storage using yaksha split private key asymmetric cryptography | 174 | 1996 | |
* 5737419 Computer system for securing communications using split private key asymmetric cryptography | 113 | 1996 | |
* 5838792 Computer system for centralized session key distribution, privacy enhanced messaging and information distribution using a split private key public cryptosystem | 106 | 1996 | |
* 5905799 Programmed computer for identity verification, forming joint signatures and session key agreement in an RSA public cryptosystem | 39 | 1996 | |
|
|||
* 5812669 Method and system for providing secure EDI over an open network | 105 | 1995 | |
|
|||
* 7545932 Secure authenticated channel | 4 | 2004 | |
* 2006/0093,138 Secure authenticated channel | 19 | 2004 | |
|
|||
* 5787172 Apparatus and method for establishing a cryptographic link between elements of a system | 253 | 1994 | |
* 6148400 Apparatus and method for establishing a crytographic link between elements of a system | 48 | 1998 | |
6456716 Apparatus and method for establishing a crytographic link between elements of a system | 27 | 2000 | |
|
|||
* 5499295 Method and apparatus for feature authorization and software copy protection in RF communications devices | 147 | 1993 | |
|
|||
* 5903647 Self-launching encrypted digital information distribution system | 65 | 1995 | |
* 5883954 Self-launching encrypted try before you buy software distribution system | 61 | 1995 | |
* 5883955 On-line try before you buy software distribution system | 148 | 1995 | |
* 5870543 System for preventing unauthorized copying of active software | 94 | 1997 | |
* 5907617 Try before you buy software distribution and marketing system | 96 | 1997 | |
* 5887060 Central database system for automatic software program sales | 37 | 1997 | |
7058597 Apparatus and method for adaptive fraud screening for electronic commerce transactions | 15 | 1999 | |
7617124 Apparatus and method for secure downloading of files | 5 | 2000 | |
7165051 Electronic commerce system and method for detecting fraud | 90 | 2005 | |
* 2005/0154,676 Electronic commerce system method for detecting fraud | 23 | 2005 | |
8271396 Electronic commerce system and method for detecting fraud | 2 | 2006 | |
7881972 Electronic commerce system and method for detecting fraud | 1 | 2006 | |
8050980 Secure downloading of a file from a network system and method | 1 | 2009 | |
* 2010/0017,417 Secure Downloading of a File from a Network System and Method | 3 | 2009 | |
9817650 Scheduling of a file download and search for updates | 0 | 2012 | |
|
|||
7949867 Secure communications | 4 | 2006 | |
* 2008/0022,091 Secure Communications | 1 | 2006 | |
7949869 Establishing relative identity | 4 | 2010 | |
* 2010/0119,063 Establishing Relative Identity | 1 | 2010 | |
|
|||
* 6422461 Method and system for ensuring connection of a module to an electronic apparatus | 0 | 1999 | |
* 6739504 Method and system for ensuring connection of a module to an electronic apparatus | 2 | 2002 | |
|
|||
* 2008/0304,669 RECIPIENT-SIGNED ENCRYPTION CERTIFICATES FOR A PUBLIC KEY INFRASTRUCTURE | 8 | 2007 | |
|
|||
* 4658093 Software distribution system | 897 | 1983 | |
|
|||
* 5159632 Method and apparatus for public key exchange in a cryptographic system | 129 | 1991 | |
* 5271061 Method and apparatus for public key exchange in a cryptographic system | 89 | 1992 | |
|
|||
6574609 Secure electronic content management system | 356 | 1998 | |
6389538 System for tracking end-user electronic content usage | 586 | 1998 | |
6611812 Secure electronic content distribution on CDS and DVDs | 312 | 1999 | |
6389403 Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system | 226 | 1999 | |
6983371 Super-distribution of protected digital content | 187 | 2000 | |
|
|||
* 5369707 Secure network method and apparatus | 214 | 1993 | |
* 5369702 Distributed cryptographic object method | 243 | 1993 | |
* 5717755 Distributed cryptographic object method | 70 | 1994 | |
* 5680452 Distributed cryptographic object method | 119 | 1995 | |
* 5898781 Distributed cryptographic object method | 67 | 1997 | |
6694433 XML encryption scheme | 20 | 1999 | |
7095852 Cryptographic key split binder for use with tagged data elements | 72 | 2001 | |
* 2004/0208,316 Cryptographic key split binder for use with tagged data elements | 5 | 2001 | |
7079653 Cryptographic key split binding process and apparatus | 21 | 2002 | |
* 2003/0039,358 Cryptographic key split binding process and apparatus | 7 | 2002 | |
8077870 Cryptographic key split binder for use with tagged data elements | 9 | 2010 | |
8712046 Cryptographic key split combiner | 0 | 2012 | |
|
|||
* 5189700 Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents | 116 | 1991 | |
|
|||
7606898 System and method for distributed management of shared computers | 13 | 2000 | |
7711121 System and method for distributed management of shared computers | 0 | 2004 | |
* 2005/0091,078 System and method for distributed management of shared computers | 31 | 2004 | |
7739380 System and method for distributed management of shared computers | 1 | 2004 | |
* 2005/0097,097 System and method for distributed management of shared computers | 35 | 2004 | |
|
|||
* 4891781 Modulo arithmetic processor chip | 32 | 1988 | |
* 5210710 Modulo arithmetic processor chip | 33 | 1990 | |
|
|||
* 5124117 Cryptographic key distribution method and system | 96 | 1991 | |
* 5272755 Public key cryptosystem with an elliptic curve | 104 | 1992 | |
* 5351297 Method of privacy communication using elliptic curves | 48 | 1993 | |
* 5442707 Method for generating and verifying electronic signatures and privacy communication using elliptic curves | 98 | 1993 | |
|
|||
8369967 Alarm system controller and a method for controlling an alarm system | 21 | 2011 | |
8364136 Mobile system, a method of operating mobile system and a non-transitory computer readable medium for a programmable control of a mobile system | 49 | 2011 | |
8892495 Adaptive pattern recognition based controller apparatus and method and human-interface therefore | 2 | 2013 | |
9535563 Internet appliance system and method | 0 | 2013 | |
|
|||
* 6058187 Secure telecommunications data transmission | 70 | 1997 | |
|
|||
* 7280663 Encryption system based on crossed inverse quasigroups | 5 | 2000 | |
|
|||
* 6141422 Secure cryptographic multi-exponentiation method and coprocessor subsystem | 14 | 1997 |
Maintenance Fees
Fee | Large entity fee | small entity fee | micro entity fee | due date |
---|
Fee | Large entity fee | small entity fee | micro entity fee |
---|---|---|---|
Surcharge after expiration - Late payment is unavoidable | $700.00 | $350.00 | $175.00 |
Surcharge after expiration - Late payment is unintentional | $1,640.00 | $820.00 | $410.00 |
Full Text

Legal Events

Matter Detail

Renewals Detail

Note
The template below is formatted to ensure compatibility with our system.
Provide tags with | separated like (tags1|tags2).
Maximum length is 128 characters for Customer Application No
Mandatory Fields * - 'MatterType','AppType','Country','Title','SerialNo'.
Acceptable Date Format - 'MM/DD/YYYY'.
Acceptable Filing/App Types -
- Continuation/Divisional
- Original
- Paris Convention
- PCT National
- With Priority
- EP Validation
- Provisional Conversion
- Reissue
- Provisional
- Foreign Extension
Acceptable Status -
- Pending
- Abandoned
- Unfiled
- Expired
- Granted
Acceptable Matter Types -
- Patent
- Utility Model
- Supplemental Protection Certificate
- Design
- Inventor Certificate
- Plant
- Statutory Invention Reg
Advertisement
Advertisement
Advertisement

Advertisement

Advertisement

Recipient Email Address

Recipient Email Address

Comment
Recipient Email Address

Success
E-mail has been sent successfully.
Failure
Some error occured while sending email. Please check e-mail and try again!
PAIR load has been initiated
A preliminary load of cached data will be loaded soon. Current PAIR data will be loaded within twenty four hours.
File History PDF
Thank you for your purchase! The File Wrapper for Patent Number 4424414 will be available within the next 24 hours.
Add to Portfolio(s)
To add this patent to one, or more, of your portfolios, simply click the add button.
This Patent is in these Portfolios:
Add to additional portfolios:

Last Refreshed On:
Changes done successfully
Important Notes on Latency of Status data
Please note there is up to 60 days of latency in this Status indicator for certain status conditions. You can obtain up-to-date Status indicator readings by ordering PAIR for the file.
An application with the status "Published" (which means it is pending) may be recently abandoned, but not yet updated to reflect its abandoned status. However, an application filed less than one year ago is unlikely to be abandoned.
A patent with the status "Granted" may be recently expired, but not yet updated to reflect its expired status. However, it is highly unlikely a patent less than 3.5 years old would be expired.
An application with the status "Abandoned" is almost always current, but there is a small chance it was recently revived and the status not yet updated.
Important Note on Priority Date data
This priority date is an estimated earliest priority date and is purely an estimation. This date should not be taken as legal conclusion. No representations are made as to the accuracy of the date listed. Please consult a legal professional before relying on this date.
We are sorry but your current selection exceeds the maximum number of portfolios (0) for this membership level. Upgrade to our Level for up to -1 portfolios!.