JD

John C. Dayka

IBM: 39 patents #2,420 of 70,183Top 4%
Overall (All Time): #82,641 of 4,157,543Top 2%
39
Patents All Time

Issued Patents All Time

Showing 25 most recent of 39 patents

Patent #TitleCo-InventorsDate
11475147 Implementing policy-based container-level encryption Cecilia Carranza Lewis, Wayne Erwin Rhoten, Eric D. Rossman, Mark A. Nelson 2022-10-18
11095652 Implementing a separation of duties for container security Cecilia Carranza Lewis, Wayne Erwin Rhoten, Eric D. Rossman, Mark A. Nelson 2021-08-17
10903979 Batched execution of encryption operations Michael J. Jordan, Tamas Visegrady, Michael Charles Osborne 2021-01-26
10904226 Secure processing environment for protecting sensitive information Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2021-01-26
10652244 Cross-site request forgery (CSRF) prevention Michael Page Kasper, Eysha S. Powers 2020-05-12
10547596 Secure processing environment for protecting sensitive information Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2020-01-28
10523640 Secure processing environment for protecting sensitive information Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2019-12-31
10389727 Multi-level security enforcement utilizing data typing Michael Charles Osborne, Tamas Visegrady 2019-08-20
10389728 Multi-level security enforcement utilizing data typing Michael Charles Osborne, Tamas Visegrady 2019-08-20
10298545 Secure processing environment for protecting sensitive information Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2019-05-21
10229151 Establishing a chain of trust in a system log Mark A. Nelson, Kevin H. Peters 2019-03-12
10158607 Secure processing environment for protecting sensitive information Richard H. Boivie, Alyson Comer, Donna N. Dillenberger, Kenneth A. Goldman, Mohit Kapur +4 more 2018-12-18
10110611 Multi-level security enforcement utilizing data typing Michael Charles Osborne, Tamas Visegrady 2018-10-23
9998459 End-to end protection for shrouded virtual servers Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more 2018-06-12
9973480 Multi-level security enforcement utilizing data typing Michael Charles Osborne, Tamas Visegrady 2018-05-15
9922069 Establishing a chain of trust in a system log Mark A. Nelson, Kevin H. Peters 2018-03-20
9906517 Cross-site request forgery (CSRF) prevention Michael Page Kasper, Eysha S. Powers 2018-02-27
9906531 Cross-site request forgery (CSRF) prevention Michael Page Kasper, Eysha S. Powers 2018-02-27
9882901 End-to-end protection for shrouded virtual servers Khary J. Alexander, Utz Bacher, Reinhard T. Buendgen, Patrick J. Callaghan, Thomas B. Mathias +9 more 2018-01-30
9858436 Secure format-preserving encryption of data fields Todd W. Arnold, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny 2018-01-02
9798893 Secure format-preserving encryption of data fields Todd W. Arnold, Steven R. Hart, Geoffrey G. Jackson, Eysha S. Powers, James W. Sweeny 2017-10-24
9729327 Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services Anthony T. Sofia 2017-08-08
9722797 Computer-based optimization of digital signature generation for records based on eventual selection criteria for products and services Anthony T. Sofia 2017-08-01
9471119 Detection of deleted records in a secure record management environment Mark A. Nelson, Donald W. Schmidt, Anthony T. Sofia 2016-10-18
9268952 Scalable precomputation system for host-opaque processing of encrypted databases Elaine R. Palmer, Tamas Visegrady 2016-02-23