| 9197409 |
Key derivation techniques |
Gregory Branchek Roth, Bradley Jeffery Behm, Eric D. Crahen, Nathan R. Fitch, Eric Jason Brandwine +1 more |
2015-11-24 |
| 9178701 |
Parameter based key derivation |
Gregory Branchek Roth, Bradley Jeffery Behm, Eric D. Crahen, Nathan R. Fitch, Eric Jason Brandwine +1 more |
2015-11-03 |
| 9106405 |
Multi-user secret decay |
Gregory Branchek Roth |
2015-08-11 |
| 9058497 |
Cryptographic key management |
Vijay G. Bharadwaj, Niels T. Ferguson, Carl M. Ellison, Magnus Bo Gustaf Nyström, Dayi Zhou +3 more |
2015-06-16 |
| 9038148 |
Secret variation for network sessions |
Gregory Branchek Roth, Nicholas Alexander Allen |
2015-05-19 |
| 9032500 |
Integrating operating systems with content offered by web based entities |
Girish Chander, Tanmoy Dutta, Bronislav Kavsan, Ziquian Li, Andreas K. Luther +2 more |
2015-05-12 |
| 8996860 |
Tolerance factor-based secret decay |
Gregory Branchek Roth, Nicholas Alexander Allen |
2015-03-31 |
| 8892865 |
Multiple authority key derivation |
Gregory Branchek Roth, Marc R. Barbour, Bradley Jeffery Behm, Eric Jason Brandwine |
2014-11-18 |
| 8885833 |
One-time recovery credentials for encrypted data access |
Benjamin Nick, Magnus Bo Gustaf Nyström, Niels T. Ferguson, Nils Dussart |
2014-11-11 |
| 8881256 |
Portable access to auditing information |
Gregory Branchek Roth, James E. Scharf, Jr., Nathan R. Fitch, Graeme David Baer, Brian Irl Pratt +1 more |
2014-11-04 |
| 8856957 |
Federated identity broker |
Gregory Branchek Roth, Kevin Ross O'Neill, Eric Jason Brandwine, Eric D. Crahen |
2014-10-07 |
| 8799630 |
Advanced security negotiation protocol |
Dave M. McPherson, Tanmoy Dutta, Liqiang Zhu |
2014-08-05 |
| 8745710 |
Automated secret renegotiation |
Gregory Branchek Roth |
2014-06-03 |
| 8745386 |
Single-use authentication methods for accessing encrypted data |
Octavian T. Ureche, Nils Dussart, Charles G. Jeffries, Vijay G. Bharadwaj, Innokentiy Basmov +2 more |
2014-06-03 |
| 8739308 |
Source identification for unauthorized copies of content |
Gregory Branchek Roth, Marc R. Barbour, Bradley Jeffery Behm, Eric Jason Brandwine |
2014-05-27 |
| 8572716 |
Integrating operating systems with content offered by web based entities |
Girish Chander, Tanmoy Dutta, Bronislav Kavsan, Ziquan Li, Andreas K. Luther +2 more |
2013-10-29 |
| 8528058 |
Native use of web service protocols and claims in server authentication |
Liqiang Zhu, Gennady Medvinsky, Tanmoy Dutta, Andreas K. Luther, John P. Shewchuk |
2013-09-03 |
| 8490162 |
System and method for recognizing malicious credential guessing attacks |
Stefan Popoveniuc, Gregory Branchek Roth, Eric Jason Brandwine |
2013-07-16 |
| 8462955 |
Key protectors based on online keys |
Octavian T. Ureche, Nils Dussart, Michael Halcrow, Charles G. Jeffries, Nathan T. Lewis +3 more |
2013-06-11 |
| 8281368 |
Communicating a password securely |
Raghavendra Malpani, Tanmoy Dutta, Klaus Schultz |
2012-10-02 |
| 8250379 |
Secure storage of temporary secrets |
Stefan Thom |
2012-08-21 |
| 8132246 |
Kerberos ticket virtualization for network load balancers |
Paul J. Leach, Tarek B. Kamel, Liqiang Zhu |
2012-03-06 |
| 7913084 |
Policy driven, credential delegation for single sign on and secure access to network resources |
Gennady Medvinsky, Costin Hagiu, John E. Parsons, Mohamed Emad El Din Fathalla, Paul J. Leach +1 more |
2011-03-22 |
| 7895590 |
Update at shutdown |
Gary Henderson, David A. Switzer, Chung Yiu Chow, Cathelijne Bertels, Richard Swaney |
2011-02-22 |
| 7810143 |
Credential interface |
David M. Ruzyski, James H. Hong, Brian K. McNeil, Chris Guzak, Brian D. Wentz +7 more |
2010-10-05 |