| 11163458 |
Authorizing modification of resources |
Amit H. Lamba, Akila Srinivasan |
2021-11-02 |
| 11163457 |
Authorizing modification of resources |
Amit H. Lamba, Akila Srinivasan |
2021-11-02 |
| 10963341 |
Isolating the introduction of software defects in a dispersed storage network |
Teague S. Algie, Andrew G. Peake, Ilya Volvovski |
2021-03-30 |
| 10924267 |
Validating keys derived from an oblivious pseudorandom function |
Jason K. Resch, Hugo M. Krawczyk |
2021-02-16 |
| 10915253 |
Temporary enrollment in anonymously obtained credentials |
Jason K. Resch, Ilya Volvovski |
2021-02-09 |
| 10901650 |
Using a master encryption key to sanitize a dispersed storage network memory |
Alan M. Frazier, Scott M. Horan, Shibhani Rai, Jason K. Resch |
2021-01-26 |
| 10887088 |
Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) |
Jason K. Resch, Hugo M. Krawczyk, Martin Schmatz, Patricia M. Sagmeister |
2021-01-05 |
| 10887293 |
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) |
Jason K. Resch, Hugo M. Krawczyk, Nataraj Nagaratnam, Erlander Lo |
2021-01-05 |