| 11489874 |
Trusted-code generated requests |
Eric Jason Brandwine |
2022-11-01 |
| 11470054 |
Key rotation techniques |
Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt |
2022-10-11 |
| 11451528 |
Two factor authentication with authentication objects |
Jesper Mikael Johansson |
2022-09-20 |
| 11429729 |
Buckets with policy driven forced encryption |
Eric Jason Brandwine |
2022-08-30 |
| 11431757 |
Access control using impersonization |
Matthew James Wren, Brian Irl Pratt |
2022-08-30 |
| 11372993 |
Automatic key rotation |
Matthew James Wren, Eric Jason Brandwine, Brian Irl Pratt |
2022-06-28 |
| 11374916 |
Key export techniques |
Matthew John Campagna |
2022-06-28 |
| 11368300 |
Supporting a fixed transaction rate with a variably-backed logical cryptographic key |
Matthew John Campagna, Benjamin Elias Seidenberg |
2022-06-21 |
| 11361063 |
Access control policy simulation and testing |
Daniel Stephen Popick, Derek Avery Lyon, John Michael Morkel, Graeme David Baer, Ajith Harshana Ranabahu +1 more |
2022-06-14 |
| 11356457 |
Parameter based key derivation |
Eric Jason Brandwine, Nathan R. Fitch, Cristian M. Ilac, Eric D. Crahen |
2022-06-07 |
| 11343260 |
Gradual credential disablement |
Naveen Chand |
2022-05-24 |
| 11323479 |
Data loss prevention techniques |
Eric Jason Brandwine, Matthew James Wren |
2022-05-03 |
| 11290435 |
Authenticated device-based storage operations |
Eric Jason Brandwine |
2022-03-29 |
| 11270006 |
Intelligent storage devices with cryptographic functionality |
Eric Jason Brandwine |
2022-03-08 |
| 11258611 |
Trusted data verification |
Benjamin Elias Seidenberg, Benjamin Tillman Farley |
2022-02-22 |
| 11258769 |
Provisioning network keys to devices to allow them to provide their identity |
Matthew John Campagna, Derek Del Miller, Nachiketh Rao Potlapally |
2022-02-22 |
| 11245681 |
Authentication in a multi-tenant environment |
Eric Jason Brandwine, Bradley Jeffrey Behm |
2022-02-08 |