Issued Patents All Time
Showing 25 most recent of 39 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11475147 | Implementing policy-based container-level encryption | Cecilia Carranza Lewis, Wayne Erwin Rhoten, Eric D. Rossman, Mark A. Nelson | 2022-10-18 |
| 11095652 | Implementing a separation of duties for container security | Cecilia Carranza Lewis, Wayne Erwin Rhoten, Eric D. Rossman, Mark A. Nelson | 2021-08-17 |
| 10903979 | Batched execution of encryption operations | Michael J. Jordan, Tamas Visegrady, Michael Charles Osborne | 2021-01-26 |
| 10904226 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2021-01-26 |
| 10652244 | Cross-site request forgery (CSRF) prevention | Michael Page Kasper, Eysha S. Powers | 2020-05-12 |
| 10547596 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2020-01-28 |
| 10523640 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2019-12-31 |
| 10389727 | Multi-level security enforcement utilizing data typing | Michael Charles Osborne, Tamas Visegrady | 2019-08-20 |
| 10389728 | Multi-level security enforcement utilizing data typing | Michael Charles Osborne, Tamas Visegrady | 2019-08-20 |
| 10298545 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2019-05-21 |
| 10229151 | Establishing a chain of trust in a system log | Mark A. Nelson, Kevin H. Peters | 2019-03-12 |
| 10158607 | Secure processing environment for protecting sensitive information | Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more | 2018-12-18 |
| 10110611 | Multi-level security enforcement utilizing data typing | Michael Charles Osborne, Tamas Visegrady | 2018-10-23 |
| 9998459 | End-to end protection for shrouded virtual servers | Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more | 2018-06-12 |
| 9973480 | Multi-level security enforcement utilizing data typing | Michael Charles Osborne, Tamas Visegrady | 2018-05-15 |
| 9922069 | Establishing a chain of trust in a system log | Mark A. Nelson, Kevin H. Peters | 2018-03-20 |
| 9906517 | Cross-site request forgery (CSRF) prevention | Michael Page Kasper, Eysha S. Powers | 2018-02-27 |
| 9906531 | Cross-site request forgery (CSRF) prevention | Michael Page Kasper, Eysha S. Powers | 2018-02-27 |
| 9882901 | End-to-end protection for shrouded virtual servers | Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more | 2018-01-30 |
| 9858436 | Secure format-preserving encryption of data fields | Todd W. Arnold, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny | 2018-01-02 |
| 9798893 | Secure format-preserving encryption of data fields | Todd W. Arnold, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny | 2017-10-24 |
| 9729327 | Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services | Anthony T. Sofia | 2017-08-08 |
| 9722797 | Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services | Anthony T. Sofia | 2017-08-01 |
| 9471119 | Detection of deleted records in a secure record management environment | Mark A. Nelson, Donald W. Schmidt, Anthony T. Sofia | 2016-10-18 |
| 9268952 | Scalable precomputation system for host-opaque processing of encrypted databases | Elaine R. Palmer, Tamas Visegrady | 2016-02-23 |