| 10855690 |
Management of secrets using stochastic processes |
Gregory Branchek Roth |
2020-12-01 |
| 10785261 |
Techniques for secure session reestablishment |
Jesper Mikael Johansson, Darren Ernest Canavor, Jon Arron McClintock, Gregory Branchek Roth, Nima Sharifi Mehr |
2020-09-22 |
| 10778429 |
Storage of cryptographic information |
Benjamin Philip Grubin |
2020-09-15 |
| 10728041 |
Protecting computer systems using merkle trees as proof of-work |
Matthew John Campagna, Nicholas Alexander Allen |
2020-07-28 |
| 10728031 |
Durable cryptographic keys |
Gregory Branchek Roth |
2020-07-28 |
| 10685119 |
Trusted malware scanning |
Eric Jason Brandwine, Matthew John Campagna |
2020-06-16 |
| 10650003 |
Expiration of elements associated with a probabilistic data structure |
Petr Praus, Benjamin Tillman Farley |
2020-05-12 |
| 10642994 |
Probabilistic data structures for concordance management |
Nicholas Alexander Allen, Peter Zachary Bowen, Matthew John Campagna |
2020-05-05 |
| 10621366 |
Chained security systems |
Matthew John Campagna, Eric Jason Brandwine, Matthew Shawn Wilson, Cristian M. Ilac |
2020-04-14 |
| 10587597 |
Data exfiltration control |
Benjamin Elias Seidenberg |
2020-03-10 |
| 10579831 |
Verification of data set components using digitally signed probabilistic data structures |
Gregory Branchek Roth |
2020-03-03 |
| 10567394 |
Data integrity verification |
Gregory Branchek Roth, Matthew John Campagna, Petr Praus |
2020-02-18 |
| 10560441 |
Data security operations with expectations |
Gregory Branchek Roth |
2020-02-11 |
| 10554392 |
Cryptographic key distribution |
Benjamin Philip Grubin |
2020-02-04 |