| 10158607 |
Secure processing environment for protecting sensitive information |
Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more |
2018-12-18 |
| 10110611 |
Multi-level security enforcement utilizing data typing |
Michael Charles Osborne, Tamas Visegrady |
2018-10-23 |
| 9998459 |
End-to end protection for shrouded virtual servers |
Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more |
2018-06-12 |
| 9973480 |
Multi-level security enforcement utilizing data typing |
Michael Charles Osborne, Tamas Visegrady |
2018-05-15 |
| 9922069 |
Establishing a chain of trust in a system log |
Mark A. Nelson, Kevin H. Peters |
2018-03-20 |
| 9906531 |
Cross-site request forgery (CSRF) prevention |
Michael Page Kasper, Eysha S. Powers |
2018-02-27 |
| 9906517 |
Cross-site request forgery (CSRF) prevention |
Michael Page Kasper, Eysha S. Powers |
2018-02-27 |
| 9882901 |
End-to-end protection for shrouded virtual servers |
Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more |
2018-01-30 |
| 9858436 |
Secure format-preserving encryption of data fields |
Todd W. Arnold, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny |
2018-01-02 |