| 10015015 |
Method and apparatus for verifying system log integrity |
Gregory W. Lazar, Peter Puhov, Naizhong Chiu |
2018-07-03 |
| 9910791 |
Managing system-wide encryption keys for data storage systems |
Thomas N. Dibb, Naizhong Chiu, Gregory W. Lazar, Xuan Tang |
2018-03-06 |
| 9870481 |
Associating a data encryption keystore backup with a computer system |
Gregory W. Lazar, Peter Puhov, Naizhong Chiu Qui, Thomas N. Dibb |
2018-01-16 |
| 9231955 |
Multiparty authorization for controlling resource access |
Ruchika Mehresh, Ankita Pawar, Obeahon O. Okaiwele, Xuan Tang |
2016-01-05 |
| 9230121 |
Techniques for persistently toggling a FIPS-140 cryptographic mode of a clustered storage system |
Benjamin Kelley, Mahadevan Vasudevan |
2016-01-05 |
| 8973021 |
Method and system of facilitating Java communication |
Eric S. Lewine, Matthew Lenkeit |
2015-03-03 |
| 8635707 |
Managing object access |
Mark A. Parenti, Stephen J. Todd, Gregory W. Lazar |
2014-01-21 |
| 5859966 |
Security system for computer systems |
Kenneth John Hayman, Michael Donovan Keene, Eric S. Lewine, William J. Meyers, Jon F. Spencer |
1999-01-12 |