| 11689523 |
Facilitating password creation via a secure device |
Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Mauro Marzorati |
2023-06-27 |
| 11288234 |
Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2022-03-29 |
| 10963580 |
Systems and methods for rule based dynamic selection of rendering browsers |
Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt |
2021-03-30 |
| 10635794 |
Determine security access level based on user behavior |
Derek W. Botti, C. Steven Lingafelt, William H. Tworek |
2020-04-28 |
| 10430595 |
Systems and methods for rule based dynamic selection of rendering browsers |
Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt |
2019-10-01 |
| 10303243 |
Controlling devices based on physical gestures |
Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt |
2019-05-28 |
| 10242020 |
Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2019-03-26 |
| 10002048 |
Point-in-time snap copy management in a deduplication environment |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2018-06-19 |
| 9870454 |
Determine security access level based on user behavior |
Derek W. Botti, C. Steven Lingafelt, William H. Tworek |
2018-01-16 |
| 9654514 |
Trust level modifier |
Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-05-16 |
| 9645806 |
Method to convey an application's development environment characteristics to the hosting provider to facilitate selection of hosting environment or the selection of an optimized production operation of the application |
Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-05-09 |
| 9635058 |
Trust level modifier |
Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-04-25 |
| 9565196 |
Trust level modifier |
Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-02-07 |
| 9426023 |
Automatic reconfiguration of network parameters during file system failover |
Vinit Jain, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi |
2016-08-23 |
| 9396342 |
Role based authorization based on product content space |
Senthil Bakthavachalam, Edward B. Boden |
2016-07-19 |
| 9389950 |
Techniques for information protection in a solid-state device based storage pool |
Nataraj Nagaratnam, Sandeep P. Patil, Riyazahamad M. Shiraguppi |
2016-07-12 |
| 9251154 |
Priority based reliability mechanism for archived data |
Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar |
2016-02-02 |
| 9131008 |
Discovery profile based unified credential processing for disparate security domains |
Eric W. Brown, Abraham L. Woldemichael |
2015-09-08 |
| 8676847 |
Visibility control of resources |
Eric W. Brown, Kerry A. Ortega, Aaron D. Sahlin, Andrew J. Streit |
2014-03-18 |
| 8291479 |
Method, hardware product, and computer program product for optimizing security in the context of credential transformation services |
Boas Betzler, Jeffrey A. Frey, Michael D. Williams |
2012-10-16 |