Issued Patents All Time
Showing 25 most recent of 41 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11228457 | Priority-arbitrated access to a set of one or more computational engines | Silvio Dragone, Tamas Visegrady, William Santiago-Fernandez | 2022-01-18 |
| 11165588 | Key attribute verification | Tamas Visegrady, Silvio Dragone, Elaine R. Palmer | 2021-11-02 |
| 11068411 | Reducing impact of context switches through dynamic memory-mapping overallocation | Elaine R. Palmer, Tamas Visegrady, Silvio Dragone | 2021-07-20 |
| 10903979 | Batched execution of encryption operations | Michael J. Jordan, Tamas Visegrady, John C. Dayka | 2021-01-26 |
| 10896140 | Controlling operation of multiple computational engines | William Santiago-Fernandez, Tamas Visegrady, Silvio Dragone | 2021-01-19 |
| 10616186 | Data tokenization | Anja Lehmann, Marcus Oestreicher | 2020-04-07 |
| 10614128 | Methods and systems for starting computerized system modules | Elaine R. Palmer, Tamas Visegrady | 2020-04-07 |
| 10609000 | Data tokenization | Anja Lehmann, Marcus Oestreicher | 2020-03-31 |
| 10397008 | Management of secret data items used for server authentication | Michael Baentsch, Harold D. Dykeman, Tamas Visegrady | 2019-08-27 |
| 10389727 | Multi-level security enforcement utilizing data typing | John C. Dayka, Tamas Visegrady | 2019-08-20 |
| 10389728 | Multi-level security enforcement utilizing data typing | John C. Dayka, Tamas Visegrady | 2019-08-20 |
| 10296765 | Multi-level security enforcement | Silvio Dragone, Tamas Visegrady | 2019-05-21 |
| 10282125 | Distributed content deduplication using hash-trees with adaptive resource utilization in distributed file systems | Mark Korondi, Daniel Kovacs, Tamas Visegrady | 2019-05-07 |
| 10110611 | Multi-level security enforcement utilizing data typing | John C. Dayka, Tamas Visegrady | 2018-10-23 |
| 10097355 | Tamper resistance of distributed hardware systems | Silvio Dragone, Tamas Visegrady | 2018-10-09 |
| 9998288 | Management of secret data items used for server authentication | Michael Baentsch, Harold D. Dykeman, Tamas Visegrady | 2018-06-12 |
| 9973480 | Multi-level security enforcement utilizing data typing | John C. Dayka, Tamas Visegrady | 2018-05-15 |
| 9967102 | Managing transfer of device ownership | Elaine R. Palmer, Tamas Visegrady | 2018-05-08 |
| 9760729 | Method, secure device, system and computer program product for securely managing user access to a file system | Michael Baentsch, Harold D. Dykeman, Reto Hermann, Thorsten Kramp, Michael Peter Kuyper-Hammond +1 more | 2017-09-12 |
| 9747129 | Methods and systems for starting computerized system modules | Elaine R. Palmer, Tamas Visegrady | 2017-08-29 |
| 9641325 | Server systems for distributed cryptographic protocols | Jan L. Camenisch, Mark Korondi, Daniel Kovacs | 2017-05-02 |
| 9225746 | Timestamp systems and methods | James W. Sweeny, Tamas Visegrady | 2015-12-29 |
| 9152815 | Method, secure device, system and computer program product for securely managing user access to a file system | Michael Baentsch, Harold D. Dykeman, Reto Hermann, Thorsten Kramp, Michael Peter Kuyper-Hammond +1 more | 2015-10-06 |
| 8990912 | Authentication of data communications | Michael Baentsch, Peter Buhler, Thomas Eirich, Thorsten Kramp, Michael Peter Kuyper-Hammond +1 more | 2015-03-24 |
| 8914637 | System for enabling digital signature auditing | Tamas Visegrady | 2014-12-16 |