| 11671425 |
Cross-region requests |
Srikanth Mandadi, Khaled Sedky, Slavka Praus |
2023-06-06 |
| 11146541 |
Hierarchical data access techniques using derived cryptographic material |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2021-10-12 |
| 10951618 |
Refresh token for credential renewal |
Graeme David Baer, Dmitry Frenkel |
2021-03-16 |
| 10701071 |
Cross-region requests |
Srikanth Mandadi, Khaled Sedky, Slavka Praus |
2020-06-30 |
| 10680827 |
Asymmetric session credentials |
Khaled Sedky, Srikanth Mandadi, Slavka Praus |
2020-06-09 |
| 10567381 |
Refresh token for credential renewal |
Graeme David Baer, Dmitry Frenkel |
2020-02-18 |
| 10536436 |
Client authentication utilizing shared secrets to encrypt one-time passwords |
Ruchith Udayanga Fernando |
2020-01-14 |
| 10425223 |
Multiple authority key derivation |
Gregory Branchek Roth, Bradley Jeffrey Behm, Cristian M. Ilac, Eric Jason Brandwine |
2019-09-24 |
| 10356062 |
Data access control utilizing key restriction |
Gregory Branchek Roth, Bradley Jeffrey Behm, Cristian M. Ilac, Eric Jason Brandwine |
2019-07-16 |
| 10277569 |
Cross-region cache of regional sessions |
Khaled Sedky, Slavka Praus, Srikanth Mandadi |
2019-04-30 |
| 10182044 |
Personalizing global session identifiers |
Slavka Praus, Khaled Sedky, Srikanth Mandadi |
2019-01-15 |
| 10044503 |
Multiple authority key derivation |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2018-08-07 |
| 9900160 |
Asymmetric session credentials |
Khaled Sedky, Srikanth Mandadi, Slavka Praus |
2018-02-20 |
| 9894067 |
Cross-region roles |
Srikanth Mandadi, Khaled Sedky, Slavka Praus |
2018-02-13 |
| 9872067 |
Source identification for unauthorized copies of content |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2018-01-16 |
| 9305177 |
Source identification for unauthorized copies of content |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2016-04-05 |
| 9256750 |
Secure credential unlock using trusted execution environments |
Stefan Thom, Robert Karl Spiger, Magnus Bo Gustaf Nyström, Himanshu Soni, Nick Voicu +2 more |
2016-02-09 |
| 9215076 |
Key generation for hierarchical data access |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2015-12-15 |
| 9015490 |
Secure credential unlock using trusted execution environments |
Stefan Thom, Robert Karl Spiger, Magnus Bo Gustaf Nyström, Himanshu Soni, Nick Voicu +2 more |
2015-04-21 |
| 8984597 |
Protecting user credentials using an intermediary component |
Kristjan E. Hatlelid, Magnus Bo Gustaf Nyström |
2015-03-17 |
| 8904509 |
Resource access based on multiple credentials |
Carl M. Ellison, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman |
2014-12-02 |
| 8892865 |
Multiple authority key derivation |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2014-11-18 |
| 8739308 |
Source identification for unauthorized copies of content |
Gregory Branchek Roth, Bradley Jeffery Behm, Cristian M. Ilac, Eric Jason Brandwine |
2014-05-27 |
| 8612766 |
Secure credential unlock using trusted execution environments |
Stefan Thom, Robert Karl Spiger, Magnus Bo Gustaf Nyström, Himanshu Soni, Nick Voicu +2 more |
2013-12-17 |
| 8418237 |
Resource access based on multiple credentials |
Carl M. Ellison, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman |
2013-04-09 |