| 11025612 |
Intelligent certificate discovery in physical and virtualized networks |
Thomas H. Benjamin, Steven E. T. Hikida, Bruce Arland Rich, Richard L. Robinson |
2021-06-01 |
| 10523424 |
Optimizing use of hardware security modules |
Krishna K. Yellepeddy, Kristin Marie Hazlewood, John A. Morganti |
2019-12-31 |
| 10284542 |
Intelligent certificate discovery in physical and virtualized networks |
Thomas H. Benjamin, Steven E. T. Hikida, Bruce Arland Rich, Richard L. Robinson |
2019-05-07 |
| 9881173 |
Managing keys used for encrypting data |
Kristin Marie Hazlewood, Krishna K. Yellepeddy |
2018-01-30 |
| 9794063 |
Optimizing use of hardware security modules |
Krishna K. Yellepeddy, Kristin Marie Hazlewood, John A. Morganti |
2017-10-17 |
| 9594920 |
Managing keys used for encrypting data |
Kristin Marie Hazlewood, Krishna K. Yellepeddy |
2017-03-14 |
| 9553720 |
Using key material protocol services transparently |
Bruce Arland Rich, Gordon K. Arnold, Thomas H. Benjamin |
2017-01-24 |
| 9378388 |
Managing keys used for encrypting data |
Kristin Marie Hazlewood, Krishna K. Yellepeddy |
2016-06-28 |
| 8798273 |
Extending credential type to group Key Management Interoperability Protocol (KMIP) clients |
Bruce Arland Rich, Gordon K. Arnold |
2014-08-05 |
| 8724817 |
Secure management of keys in a key repository |
Bruce Arland Rich, Thomas H. Benjamin |
2014-05-13 |
| 8683222 |
Optimizing use of hardware security modules |
Krishna K. Yellepeddy, Kristin Marie Hazlewood, John A. Morganti |
2014-03-25 |
| 8675875 |
Optimizing use of hardware security modules |
Krishna K. Yellepeddy, Kristin Marie Hazlewood, John A. Morganti |
2014-03-18 |
| 8630418 |
Secure management of keys in a key repository |
Bruce Arland Rich, Thomas H. Benjamin |
2014-01-14 |
| 8422686 |
Automated validation and execution of cryptographic key and certificate deployment and distribution |
Christian Cachin, Robert Haas, Timothy J. Hahn, Xiaoyu Hu, Ilias Iliadis +1 more |
2013-04-16 |