| 12167236 |
Remote management of hardware security modules |
James R. Coon, Michael J. Jordan, Michael J. Young, Jessica P. Doherty, Christopher V. DeRobertis |
2024-12-10 |
| 12095917 |
Securely transporting a root key using a privately/public key pair for user-controlled authentication of nodes in a hardware security module cluster |
David N. Nguyen, Marco Pavone, Clifford L. Hansen, Ross Martin Heninger |
2024-09-17 |
| 11012231 |
Authenticated copying of encryption keys between secure zones |
James R. Coon, Michael J. Miele |
2021-05-18 |
| 10594478 |
Authenticated copying of encryption keys between secure zones |
James R. Coon, Michael J. Miele |
2020-03-17 |
| 9607135 |
Asset protection based on redundantly associated trusted entitlement verification |
James R. Coon, Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang +3 more |
2017-03-28 |
| 9424406 |
Asset protection based on redundantly associated trusted entitlement verification |
James R. Coon, Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang +3 more |
2016-08-23 |
| 8582778 |
Integrated key server |
Edward W. Chencinski, James R. Coon, John C. Dayka, Steven G. Glassen, Richard J. Gusefski +5 more |
2013-11-12 |
| 8261328 |
Trusted electronic communication through shared vulnerability |
David Christopher Hinkemeyer, Daniel P. Kolz, Taylor L. Schreck, Rainieri Ventura |
2012-09-04 |
| 7612655 |
Alarm system for hearing impaired individuals having hearing assistive implanted devices |
Daniel P. Kolz |
2009-11-03 |