Issued Patents All Time
Showing 25 most recent of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12346267 | Systems and methods of supporting deduplication and compression of encrypted storage volumes | Charles W. Kaufman, Xuan Tang, George B. Papadopoulos, Vasu Subramanian, Jamie Pocas +1 more | 2025-07-01 |
| 11954239 | Data storage system using selective encryption and port identification in communications with drive subsystem | — | 2024-04-09 |
| 11841964 | System and method for authorizing secure snapshot deletion | Lee M. McColgan, Michael Zeldich, Nagasimha G. Haravu | 2023-12-12 |
| 11836352 | Detecting an abnormal event while data storage equipment is in transit | Girish Sheelvant, Natasha Gaurav, Himabindu Tummala, Scott E. Joyce | 2023-12-05 |
| 11831634 | Managing trusted communications between server and clients | Dmitry Tylik, Charles W. Kaufman, Marco Abela, Jingyan Zhao | 2023-11-28 |
| 11321443 | Password resetting system and method | Jackson Brandon Myers, Charles W. Kaufman | 2022-05-03 |
| 11227058 | System and method for shredding a forum of secrets | Naizhong Chiu, Grace L. Heard | 2022-01-18 |
| 10860226 | Systems and methods of synchronizing configuration information in a clustered storage environment | Ping Zhang, Charles W. Kaufman, Xuan Tang, Yi Fang, Xiongfei Chen | 2020-12-08 |
| 10771261 | Extensible unified multi-service certificate and certificate revocation list management | Yi Fang, Gerald Jones, Juhi Asthana, Jingyan Zhao, Mahadevan Vasudevan | 2020-09-08 |
| 10592846 | Electronically monitoring data storage equipment while the data storage equipment is in transit | Natasha Gaurav, Scott E. Joyce, Girish Sheelvant, Himabindu Tummala | 2020-03-17 |
| 10439804 | Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes | Ping Zhang, Charlie Kaufman, Yi Fang, Xuan Tang | 2019-10-08 |
| 10013364 | Securing data using per tenant encryption keys | Walter A. O'Brien, III, Thomas N. Dibb | 2018-07-03 |
| 10015015 | Method and apparatus for verifying system log integrity | Peter Puhov, Millard C. Taylor, II, Naizhong Chiu | 2018-07-03 |
| 9990190 | Secured virtual storage appliance installation image | Michael L. Burriss, Weixing Wang, Benjamin Kelley, Jochen F. De Smet | 2018-06-05 |
| 9910791 | Managing system-wide encryption keys for data storage systems | Thomas N. Dibb, Naizhong Chiu, Xuan Tang, Millard C. Taylor, II | 2018-03-06 |
| 9870481 | Associating a data encryption keystore backup with a computer system | Peter Puhov, Millard C. Taylor, II, Naizhong Chiu Qui, Thomas N. Dibb | 2018-01-16 |
| 9697351 | Providing a high security password from an initial character string of lowercase letter and numbers, and inclusion of one or more other characters | Mahadevan Vasudevan | 2017-07-04 |
| 9229850 | Mapping data storage and virtual machines | Yidong Wang, Neil F. Schutzman, Russell R. Laporte, Deene A. Dafoe, Feng Zhou | 2016-01-05 |
| 9143504 | Secure communication infrastructure | Mingjiang Shi, Meiling Ge, Tianming Zhang | 2015-09-22 |
| 9026667 | Techniques for resource validation | Scott E. Joyce, Donald E. Labaj | 2015-05-05 |
| 8904146 | Techniques for data storage array virtualization | — | 2014-12-02 |
| 8892750 | Transparent HBA replacement | Sriram Krishnan, Andreas Bauer, Russell R. Laporte | 2014-11-18 |
| 8751827 | Apparatus for controlling embedded security on a storage platform | William M. Duane, Robert W. Griffin, John S. Harwood, Thomas E. Linnell | 2014-06-10 |
| 8635707 | Managing object access | Mark A. Parenti, Stephen J. Todd, Millard C. Taylor, II | 2014-01-21 |
| 8631114 | Information roll-up in distributed environments | Andreas Bauer, Russell R. Laporte, Brian R. Gruttadauria | 2014-01-14 |