Validity Report
Basic Report
US7779252B2 — Computer architecture for a handheld electronic device with a shared human-machine interface
Priority Date: 2006-03-21, Publication Date: 2010-08-17, Current Assignee: Speir Technologies LtdReport Generated: 2022-01-26

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
US7765399B2●●●●●Computer architecture for a handheld electronic deviceGRANT2010-07-272006-02-22GreatHarris CorpSpeir Technologies Ltd
US7636858B2●●●●●Management of a trusted cryptographic processorGRANT2009-12-222003-12-11GreatIntel CorpIntel Corp
US7802111B1●●●●●System and method for limiting exposure of cryptographic keys protected by a trusted platform moduleGRANT2010-09-212005-04-27GreatOracle America IncOracle America Inc
EP0649546A1●●●●●TRUSTED PATH SUBSYSTEM FOR WORKSTATIONSGRANT1995-04-261992-07-10GreatSecure Computing LLCSecure Computing LLC
US8751818B2●●●●●Method and apparatus for a trust processorGRANT2014-06-102003-12-11GreatIntel CorpIntel Corp
WO2001044899A1●●●●●CRYPTOGRAPHIC TOKEN AND SECURITY SYSTEMAPPLICATION2001-06-211999-12-13Great
EP0732657B1●●●●●Method and apparatus for enciphering and deciphering informationGRANT2002-02-061995-03-14GreatUtimaco Safeware AGUtimaco Safeware AG
EP1230777B1●●●●●METHOD AND APPARATUS FOR PROVIDING REDUNDANT AND RESILIENT CRYPTOGRAPHIC SERVICESGRANT2008-10-221999-11-10GreatUnisys CorpUnisys Corp
US20050132226A1●●●●●Trusted mobile platform architectureAPPLICATION2005-06-162003-12-11GreatIntel CorpIntel Corp
EP1218841A2●●●●●ELECTRONIC COMMERCE WITH CRYPTOGRAPHIC AUTHENTICATIONGRANT2002-07-031999-09-20GreatEthentica IncEthentica Inc
EP1280315B1●●●●●Apparatus and method for providing network securityGRANT2007-08-291992-07-31GreatMicron Technology IncMicron Technology Inc
EP1580922A2●●●●●Methods and modular cryptographic davice with enhanched communication controlGRANT2005-09-282004-03-23GreatHarris CorpHarris Corp
EP1473869B1●●●●●Universal secure messaging for cryptographic modulesGRANT2006-08-302003-04-29GreatActivIdentity IncActivIdentity Inc
EP1825412A1●●●●●SECURE DATA PARSER METHOD AND SYSTEMGRANT2007-08-292004-10-25GreatSecurity First CorpSecurity First Corp
EP1639743A2●●●●●SECURE DATA PARSER METHOD AND SYSTEMGRANT2006-03-292003-06-11GreatSecurity First CorpSecurity First Corp
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
816
Recommended Classes
204
Government Assigned Classes
3
CPC
Title
Score
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine●●●●●
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)●●●●●
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings●●●●●
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures●●●●●
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database●●●●●
G06F21/71to assure secure computing or processing of information●●●●●
G06F21/445by mutual authentication  e.g. between devices or programs●●●●●
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks●●●●●
H04W12/02Protecting privacy or anonymity●●●●●
G06F21/74operating in dual or compartmented mode  i.e. at least one secure mode●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.