| 11050573 |
Determining trustworthiness of a cryptographic certificate |
Juan Galiana Lara, Mark Alexander McGloin, Olgierd Stanislaw Pieczul |
2021-06-29 |
| 10447485 |
Determining trustworthiness of a cryptographic certificate |
Juan Galiana Lara, Mark Alexander McGloin, Olgierd Stanislaw Pieczul |
2019-10-15 |
| 9699168 |
Method and system for authenticating a rich client to a web or cloud application |
Olgierd Stanislaw Pieczul, Mark Alexander McGloin, Mary Ellen Zurko, Brent Allan Hepburn |
2017-07-04 |
| 9690920 |
Secure configuration catalog of trusted identity providers |
Jane B. Marcus, Alan D. Eldridge, Michael J. Kerrigan, Patrick Charles Mancuso, Robert John Paganetti |
2017-06-27 |
| 9462068 |
Cross-domain inactivity tracking for integrated web applications |
Olgierd Stanislaw Pieczul, Brent Allan Hepburn, Mark Alexander McGloin, Mark Lawrence Rovelli |
2016-10-04 |
| 9094194 |
Method and system for automating the recovery of a credential store when a user has forgotten their password using a temporary key pair created based on a new password provided by the user |
Shiu F. Poon, Robert John Paganetti |
2015-07-28 |
| 8995653 |
Generating a secret key from an asymmetric private key |
Alan D. Eldridge |
2015-03-31 |
| 8984616 |
Efficient routing for reverse proxies and content-based routers |
Daniel M. Jamrog, Jason D. LaVoie, Chester E. Ryder, III |
2015-03-17 |
| 8296827 |
Method for enabling an administrator to configure a recovery password |
Robert John Paganetti |
2012-10-23 |
| 8195959 |
Encrypting a credential store with a lockbox |
Alan D. Eldridge |
2012-06-05 |
| 8166072 |
System and method for normalizing and merging credential stores |
Richard Francis Annicchiarico, Nancy Ellen Kho, Robert John Paganetti |
2012-04-24 |