| 12250314 |
Attribute based encryption key based third party data access authorization |
Patrick A. Tamborski |
2025-03-11 |
| 11863669 |
Session resumption with derived key |
— |
2024-01-02 |
| 11750397 |
Attribute-based encryption keys as key material for key-hash message authentication code user authentication and authorization |
— |
2023-09-05 |
| 11558399 |
Network transmission path verification |
Amit H. Lamba, Jason K. Resch |
2023-01-17 |
| 11418327 |
Automatic provisioning of key material rotation information to services |
Karunakar Bojjireddy, Erlander Lo |
2022-08-16 |
| 11163457 |
Authorizing modification of resources |
Amit H. Lamba, Akila Srinivasan |
2021-11-02 |
| 11163458 |
Authorizing modification of resources |
Amit H. Lamba, Akila Srinivasan |
2021-11-02 |
| 10963341 |
Isolating the introduction of software defects in a dispersed storage network |
Teague S. Algie, Andrew G. Peake, Ilya Volvovski |
2021-03-30 |
| 10924267 |
Validating keys derived from an oblivious pseudorandom function |
Jason K. Resch, Hugo M. Krawczyk |
2021-02-16 |
| 10915253 |
Temporary enrollment in anonymously obtained credentials |
Jason K. Resch, Ilya Volvovski |
2021-02-09 |
| 10901650 |
Using a master encryption key to sanitize a dispersed storage network memory |
Alan M. Frazier, Scott M. Horan, Shibhani Rai, Jason K. Resch |
2021-01-26 |
| 10887088 |
Virtualizing a key hierarchy using a partially-oblivious pseudorandom function (P-OPRF) |
Jason K. Resch, Hugo M. Krawczyk, Martin Schmatz, Patricia M. Sagmeister |
2021-01-05 |
| 10887293 |
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) |
Jason K. Resch, Hugo M. Krawczyk, Nataraj Nagaratnam, Erlander Lo |
2021-01-05 |
| 10841080 |
Oblivious pseudorandom function in a key management system |
Jason K. Resch, Hugo M. Krawczyk |
2020-11-17 |
| 10841081 |
Threshold oblivious pseudorandom function in a key management system |
Jason K. Resch, Hugo M. Krawczyk, Patricia M. Sagmeister, Martin Schmatz |
2020-11-17 |
| 10693640 |
Use of key metadata during write and read operations in a dispersed storage network memory |
Adam M. Gray, Harsha Hegde, Wesley B. Leggette, Manish Motwani, Jason K. Resch +3 more |
2020-06-23 |
| 10581807 |
Using dispersal techniques to securely store cryptographic resources and respond to attacks |
Jason K. Resch |
2020-03-03 |
| 10491386 |
Slice-level keyed encryption with support for efficient rekeying |
Adam M. Gray, Wesley B. Leggette, Jason K. Resch |
2019-11-26 |
| 10379778 |
Using a master encryption key to sanitize a dispersed storage network memory |
Alan M. Frazier, Scott M. Horan, Shibhani Rai, Jason K. Resch |
2019-08-13 |
| 10372380 |
Asserting integrity with a verifiable codec |
Jason K. Resch |
2019-08-06 |
| 10360391 |
Verifiable keyed all-or-nothing transform |
Jason K. Resch |
2019-07-23 |
| 10326740 |
Efficient secret-key encrypted secure slice |
Jason K. Resch, Ilya Volvovski |
2019-06-18 |
| 10255133 |
Isolating the introduction of software defects in a dispersed storage network |
Teague S. Algie, Andrew G. Peake, Ilya Volvovski |
2019-04-09 |
| 10241697 |
Temporary enrollment in anonymously obtained credentials |
Jason K. Resch, Ilya Volvovski |
2019-03-26 |