| 12101402 |
Key rotation on a publish-subscribe system |
John G. Rooney, Florian Hermann Froese, Pascal Vetsch |
2024-09-24 |
| 11874010 |
Parallel flow and counterflow insulated preconditioned air delivery and recirculation system |
William Tyler, Joe D Gracey |
2024-01-16 |
| 11228571 |
Policy-based topic-level encryption for message queues |
— |
2022-01-18 |
| 10907850 |
Parallel flow and counterflow insulated preconditioned air delivery system |
William Tyler, Joe D Gracey |
2021-02-02 |
| 10380157 |
Ranking proximity of data sources with authoritative entities in social networks |
John G. Rooney |
2019-08-13 |
| 9881311 |
Determining a lowest price for a dynamically priced product |
John G. Rooney |
2018-01-30 |
| 9154548 |
Auditable distribution of a data file |
John G. Rooney |
2015-10-06 |
| 9087148 |
Automated role adjustment in a computer system |
Maja Vukovic |
2015-07-21 |
| 9009842 |
Using data analytics and crowdsourcing to determine roles for a computer system |
Milton H. Hernandez, Sriram Rajagopal, Maja Vukovic |
2015-04-14 |
| 9003547 |
Using data analytics and crowdsourcing to determine roles for a computer system |
Milton H. Hernandez, Sriram Rajagopal, Maja Vukovic |
2015-04-07 |
| 8990349 |
Identifying a location of a server |
Daniel N. Bauer, John G. Rooney |
2015-03-24 |
| 8863276 |
Automated role adjustment in a computer system |
Maja Vukovic |
2014-10-14 |
| 8782173 |
Auditable distribution of a data file |
John G. Rooney |
2014-07-15 |
| 8688591 |
Anonymous separation of duties with credentials |
Jan L. Camenisch, Thomas R. Gross, Guenter Karjoth |
2014-04-01 |
| 7921462 |
Identifying a distributed denial of service (DDOS) attack within a network and defending against such an attack |
John G. Rooney, Marcel Waldvogel, Paul T. Hurley |
2011-04-05 |