Issued Patents All Time
Showing 1–25 of 77 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12346267 | Systems and methods of supporting deduplication and compression of encrypted storage volumes | Xuan Tang, George B. Papadopoulos, Vasu Subramanian, Jamie Pocas, Naizhong Chiu +1 more | 2025-07-01 |
| 12288214 | Secure, low-cost, privacy-preserving biometric card | Radia J. Perlman | 2025-04-29 |
| 12022003 | Safe use of legacy digital signatures in a post-quantum world | Radia J. Perlman | 2024-06-25 |
| 11831634 | Managing trusted communications between server and clients | Dmitry Tylik, Gregory W. Lazar, Marco Abela, Jingyan Zhao | 2023-11-28 |
| 11720270 | Client-side compression | Senthil Ponnuswamy, Radia J. Perlman | 2023-08-08 |
| 11595190 | Encrypted data storage system | Radia J. Perlman | 2023-02-28 |
| 11550919 | Prioritizing patching of vulnerable components | Danny V. Dhillon, Eric Baize | 2023-01-10 |
| 11436345 | Protection of secret client data in a multiple client data deduplication environment | Radia J. Perlman | 2022-09-06 |
| 11435907 | Ensuring data authenticity using notary as a service | Yossef Saad, Radia J. Perlman | 2022-09-06 |
| 11374769 | Efficient and secure distributed ledger maintenance | Radia J. Perlman | 2022-06-28 |
| 11321443 | Password resetting system and method | Jackson Brandon Myers, Gregory W. Lazar | 2022-05-03 |
| 11290276 | Method and system for a signed document validity service | Radia J. Perlman | 2022-03-29 |
| 11240005 | Method and system for querying a secure database located on an untrusted device | Radia J. Perlman | 2022-02-01 |
| 11153094 | Secure data deduplication with smaller hash values | — | 2021-10-19 |
| 11128460 | Client-side encryption supporting deduplication across single or multiple tenants in a storage system | Radia J. Perlman, Xuan Tang | 2021-09-21 |
| 11019033 | Trust domain secure enclaves in cloud infrastructure | Radia J. Perlman | 2021-05-25 |
| 10860226 | Systems and methods of synchronizing configuration information in a clustered storage environment | Ping Zhang, Gregory W. Lazar, Xuan Tang, Yi Fang, Xiongfei Chen | 2020-12-08 |
| 10764068 | Computer system employing challenge/response protocol with detection of non-unique incorrect responses | Radia J. Perlman, Xuan Tang | 2020-09-01 |
| 10756904 | Efficient and secure distributed ledger maintenance | Radia J. Perlman | 2020-08-25 |
| 10680813 | Crypto-erasure resilient to network outage | — | 2020-06-09 |
| 10394646 | Incremental data validation | Radia J. Perlman | 2019-08-27 |
| 10298551 | Privacy-preserving policy enforcement for messaging | Radia J. Perlman, Xuan Tang | 2019-05-21 |
| 10205594 | Crypto-erasure resilient to network outage | — | 2019-02-12 |
| 9467473 | System and method for compact form exhaustive analysis of security policies | Karthick Jayaraman, Nikolaj S. Bjorner | 2016-10-11 |
| 9253195 | Transformation of sequential access control lists utilizing certificates | Carl M. Ellison, Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya | 2016-02-02 |