| 9401898 |
System and method for wireless data protection |
Vrajesh Bhavsar, Kenneth B. McNeil, Thomas Brogan Duffy, Jr., Michael Brouwer, Matthew J. Byom +2 more |
2016-07-26 |
| 8948729 |
Secure device configuration profiles |
Mitchell D. Adler, Curtis C. Galloway, Christophe Allie, Dallas B. De Atley, Dieter Siegmund +5 more |
2015-02-03 |
| 8886963 |
Secure relocation of encrypted files |
Daniel J. Post, Eric B. Tamura, Matthew J. Byom, Puja Gupta |
2014-11-11 |
| 8873747 |
Key management using security enclave processor |
R. Stephen Polzin, Fabrice L. Gautier, Mitchell D. Adler, Michael Brouwer |
2014-10-28 |
| 8739292 |
Trust exception management |
Mitchell D. Adler, Michael Brouwer |
2014-05-27 |
| 8681976 |
System and method for device dependent and rate limited key generation |
Joseph P. Bratt, Joshua P. de Cesare, Timothy J. Millet, Weihua Mao |
2014-03-25 |
| 8510552 |
System and method for file-level data protection |
Dallas B. De Atley, Gordon J. Freedman, Thomas Brogan Duffy, Jr., John Andrew Wright, Vrajesh Bhavsar +6 more |
2013-08-13 |
| 8208900 |
Secure device configuration profiles |
Mitchell D. Adler, Curtis C. Galloway, Christophe Allie, Dallas B. De Atley, Dieter Siegmund +5 more |
2012-06-26 |