Issued Patents All Time
Showing 25 most recent of 38 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12028461 | Contribution signatures for tagging | Conor P. Cahill, Jeffrey Cicero Canton, Dmitry Frenkel, Harshad Vasant Kulkarni, Colin Watson +1 more | 2024-07-02 |
| 11902436 | Cryptographic key management to prevent data exfiltration | Alexis Lynn Carlough | 2024-02-13 |
| 11711420 | Automated management of resource attributes across network-based services | Jeffrey Cicero Canton | 2023-07-25 |
| 11695569 | Contribution signatures for tagging | Conor P. Cahill, Jeffrey Cicero Canton, Dmitry Frenkel, Harshad Vasant Kulkarni, Colin Watson +1 more | 2023-07-04 |
| 11588855 | Policy approval layer | Nima Sharifi Mehr | 2023-02-21 |
| 11569992 | Cryptographic key management to prevent data exfiltration | Alexis Lynn Carlough | 2023-01-31 |
| 11558388 | Provisional computing resource policy evaluation | Nima Sharifi Mehr | 2023-01-17 |
| 11425140 | Secure and efficient cross-service sharing of subscriber data | Tanya Bansal, Veeraraghavan Vijayaraj, Ravikanth Repaka, Rodolfo Flores Hinojosa, Rajesh Viswanathan | 2022-08-23 |
| 11271949 | Application-based scanning | Ryan Pickren, Guifre Ruiz Utges, Zak Aaron Edwards | 2022-03-08 |
| 11245717 | Automated detection, alarming, and removal of subdomain takeovers | Zak Aaron Edwards, Ryan Pickren, Guifre Ruiz Utges | 2022-02-08 |
| 11120154 | Large-scale authorization data collection and aggregation | Ashish Rangole | 2021-09-14 |
| 10986131 | Access control policy warnings and suggestions | Ashish Rangole | 2021-04-20 |
| 10972288 | Contribution signatures for tagging | Conor P. Cahill, Jeffrey Cicero Canton, Dmitry Frenkel, Harshad Vasant Kulkarni, Colin Watson +1 more | 2021-04-06 |
| 10917240 | Cryptographic key management to prevent data exfiltration | Alexis Lynn Carlough | 2021-02-09 |
| 10909978 | Secure utterance storage | Peter Turk, Panagiotis Thomas | 2021-02-02 |
| 10587653 | Policy approval layer | Nima Sharifi Mehr | 2020-03-10 |
| 10581919 | Access control monitoring through policy management | Bharath Mukkati Prakash, Ashish Rangole, Nima Sharifi Mehr, Jeffrey John Wierer, Kunal Chadha +3 more | 2020-03-03 |
| 10567388 | Automatic account resource and policy decommissioning | Jeffrey John Wierer, Nima Sharifi Mehr, Ashish Rangole, Kunal Chadha, Bharath Mukkati Prakash +4 more | 2020-02-18 |
| 10536277 | Contribution signatures for tagging | Conor P. Cahill, Jeffrey Cicero Canton, Dmitry Frenkel, Harshad Vasant Kulkarni, Colin Watson +1 more | 2020-01-14 |
| 10496840 | Recommending security controls for similar data | Nima Sharifi Mehr | 2019-12-03 |
| 10346607 | Automatic rotation and storage of security credentials | — | 2019-07-09 |
| 10313117 | Cryptographic key management to prevent data exfiltration | Alexis Lynn Carlough | 2019-06-04 |
| 10263995 | Provisional computing resource policy evaluation | Nima Sharifi Mehr | 2019-04-16 |
| 10243945 | Managed identity federation | Bradley Jeffery Behm | 2019-03-26 |
| 10122757 | Self-learning access control policies | Ashish Rangole, James E. Scharf, Jr., Kai Zhao, Jeffrey John Wierer | 2018-11-06 |