Validity Report
Basic Report
US7765399B2 — Computer architecture for a handheld electronic device
Priority Date: 2006-02-22, Publication Date: 2010-07-27, Current Assignee: Speir Technologies LtdReport Generated: 2023-01-10

Preview Results

Patent Id
Score
Title
Patent Type
Publication Date
Priority Date
Search Efficiency
Original Assignee
Current Assignee
EP0649546A1●●●●●TRUSTED PATH SUBSYSTEM FOR WORKSTATIONSGRANT1995-04-261992-07-10GreatSecure Computing LLCSecure Computing LLC
EP1576762B1●●●●●System and method for securing portable dataGRANT2014-09-032002-12-18GreatSanDisk IL LtdWestern Digital Israel Ltd
EP1430374A2●●●●●METHOD AND APPARATUS FOR A SECURE VIRTUAL MACHINEGRANT2004-06-232001-05-30GreatSun Microsystems IncD'Crypt Pte Ltd, Sun Microsystems Inc, D'Crypt Pte Ltd
US7636858B2●●●●●Management of a trusted cryptographic processorGRANT2009-12-222003-12-11GreatIntel CorpIntel Corp
EP1280315B1●●●●●Apparatus and method for providing network securityGRANT2007-08-291992-07-31GreatMicron Technology IncMicron Technology Inc
US7734933B1●●●●●System for providing secure and trusted computing environments through a secure computing moduleGRANT2010-06-082005-06-17GreatRockwell Collins IncRockwell Collins Inc
US8751818B2●●●●●Method and apparatus for a trust processorGRANT2014-06-102003-12-11GreatIntel CorpIntel Corp
US7716720B1●●●●●System for providing secure and trusted computing environmentsGRANT2010-05-112005-06-17GreatRockwell Collins IncRockwell Collins Inc
US7363491B2●●●●●Resource management in security enhanced processorsGRANT2008-04-222004-03-31GreatIntel CorpIntel Corp
US8347104B2●●●●●Security interface for a mobile deviceGRANT2013-01-012001-12-26GreatResearch in Motion LtdBlackBerry Ltd
EP1788507A2●●●●●Electronic transaction terminal capable of operating in secure and non-secure mode  and method adapted to the deviceGRANT2007-05-232005-11-16GreatCompagnie Industrielle et Financiere dIngenierie Ingenico SAIngenico Group SA
EP1592193B1●●●●●Wireless communication device with securely added randomness and related methodGRANT2008-12-242004-04-30GreatResearch in Motion LtdBlackBerry Ltd
EP1413157B1●●●●●Method and system for verifying data integrityGRANT2013-11-202001-07-16GreatCerticom CorpCerticom Corp
EP1512057B1●●●●●TRUSTED USER INTERFACE FOR A SECURE MOBILE WIRELESS DEVICEGRANT2010-01-062002-05-28GreatNokia OyjNokia Oyj
EP0735718B1●●●●●Method and apparatus for high bandwidth encryption/decryption using a low bandwidth cryptographic moduleGRANT1999-11-031995-03-31GreatAT&T Corp, AT&T IPM CorpAT&T Corp
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●Great●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.

Predictive Analytics

Composite Research Score (1-10)
7
  MODERATE
Art VolumeMEDIUM
Tech ComplexityINTRICATE
Priority DateMID
Tech DiversityAVERAGE
Expert Services Estimate$3,750 — $4,200
There is where a graph would go if the browser supported it.
There is where a graph would go if the browser supported it.

Preview CPC Technology Profile

Possible Classes
877
Recommended Classes
220
Government Assigned Classes
5
CPC
Title
Score
H04L9/00Cryptographic mechanisms or cryptographic|  arrangements for secret or secure communication | network architectures or network communication protocols for network security | (ref: H04L63/00)|  or for wireless network security | (ref: H04W12/00)| | security arrangements for protecting computers or computer systems against unauthorized activity | (ref: G06F21/00)●●●●●
G06F21/53by executing in a restricted environment  e.g. sandbox or secure virtual machine●●●●●
G06F12/1491in a hierarchical protection system  e.g. privilege levels  memory rings●●●●●
G06F21/64Protecting data integrity  e.g. using checksums  certificates or signatures●●●●●
G06F21/6218to a system of files or objects  e.g. local or distributed file system or database●●●●●
G06F21/35communicating wirelessly●●●●●
G06F21/71to assure secure computing or processing of information●●●●●
G06F21/62Protecting access to data via a platform  e.g. using keys or access control rules●●●●●
H04L63/04for providing a confidential data exchange among entities communicating through data packet networks●●●●●
G06F21/602Providing cryptographic facilities or services●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
●●●●●●●●●●●●●●●
Keep up the Momentum with full ranked/tiered results. One-time price.
Terms of Service | Privacy Policy | Contact | COPYRIGHT 2020. TECHSON IP, LLC. LIMESTONE, TECHSON, AND INTELLIGENT PROPERTY ARE REGISTERED TRADEMARKS. TECHSON IP IS NOT A LAW FIRM AND DOES NOT PROVIDE LEGAL OPINIONS OR LEGAL ADVICE.