Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11689523 | Facilitating password creation via a secure device | Cesar Augusto Rodriguez Bravo, Kevin Jimenez Mendez, Mauro Marzorati | 2023-06-27 |
| 11288234 | Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor | Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi | 2022-03-29 |
| 10963580 | Systems and methods for rule based dynamic selection of rendering browsers | Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt | 2021-03-30 |
| 10635794 | Determine security access level based on user behavior | Derek W. Botti, C. Steven Lingafelt, William H. Tworek | 2020-04-28 |
| 10430595 | Systems and methods for rule based dynamic selection of rendering browsers | Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt | 2019-10-01 |
| 10303243 | Controlling devices based on physical gestures | Charles K. Davis, III, Christopher R. Dotson, Charles S. Lingafelt | 2019-05-28 |
| 10242020 | Placement of data fragments generated by an erasure code in distributed computational devices based on a deduplication factor | Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi | 2019-03-26 |
| 10002048 | Point-in-time snap copy management in a deduplication environment | Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi | 2018-06-19 |
| 9870454 | Determine security access level based on user behavior | Derek W. Botti, C. Steven Lingafelt, William H. Tworek | 2018-01-16 |
| 9654514 | Trust level modifier | Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek | 2017-05-16 |
| 9645806 | Method to convey an application's development environment characteristics to the hosting provider to facilitate selection of hosting environment or the selection of an optimized production operation of the application | Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek | 2017-05-09 |
| 9635058 | Trust level modifier | Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek | 2017-04-25 |
| 9565196 | Trust level modifier | Derek W. Botti, Anji Greene, Charles S. Lingafelt, William H. Tworek | 2017-02-07 |
| 9426023 | Automatic reconfiguration of network parameters during file system failover | Vinit Jain, Nataraj Nagaratnam, Sandeep R. Patil, Riyazahamad M. Shiraguppi | 2016-08-23 |
| 9396342 | Role based authorization based on product content space | Senthil Bakthavachalam, Edward B. Boden | 2016-07-19 |
| 9389950 | Techniques for information protection in a solid-state device based storage pool | Nataraj Nagaratnam, Sandeep P. Patil, Riyazahamad M. Shiraguppi | 2016-07-12 |
| 9251154 | Priority based reliability mechanism for archived data | Blaine H. Dolph, Sandeep R. Patil, Riyazahamad M. Shiraguppi, Gandhi Sivakumar | 2016-02-02 |
| 9131008 | Discovery profile based unified credential processing for disparate security domains | Eric W. Brown, Abraham L. Woldemichael | 2015-09-08 |
| 8676847 | Visibility control of resources | Eric W. Brown, Kerry A. Ortega, Aaron D. Sahlin, Andrew J. Streit | 2014-03-18 |
| 8291479 | Method, hardware product, and computer program product for optimizing security in the context of credential transformation services | Boas Betzler, Jeffrey A. Frey, Michael D. Williams | 2012-10-16 |