Issued Patents All Time
Showing 26–45 of 45 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9639333 | Method and system for model driven development | Shao M. Geng, David L. Kaminsky, Ying Liu, David M. Ogle, Xi Ning Wang +1 more | 2017-05-02 |
| 9087120 | Development tooling enablement for audit event generation | Heather M. Hinton | 2015-07-21 |
| 8422686 | Automated validation and execution of cryptographic key and certificate deployment and distribution | Christian Cachin, Robert Haas, Xiaoyu Hu, Ilias Iliadis, Rene A. Pawlitzek +1 more | 2013-04-16 |
| 8370796 | Development tooling enablement for audit event generation | Heather M. Hinton | 2013-02-05 |
| 8230228 | Support of tamper detection for a log of records | Heather M. Hinton | 2012-07-24 |
| 8220034 | User authentication based on authentication credentials and location information | Heather M. Hinton | 2012-07-10 |
| 8136146 | Secure audit log access for federation compliance | Heather M. Hinton, Patrick R. Wardrop | 2012-03-13 |
| 7953978 | Key generation and retrieval using key servers | Paul M. Greco, Glen Alan Jaquette | 2011-05-31 |
| 7822980 | Authenticated identity propagation and translation within a multiple computing unit environment | Patrick S. Botz, John C. Dayka, Donna N. Dillenberger, Richard Henry Guski, Margaret K. LaBelle +1 more | 2010-10-26 |
| 7752463 | Automatically filling a drive table | Glen Alan Jaquette | 2010-07-06 |
| 7676831 | Role-based access control management for multiple heterogeneous application components | Kathryn H. Britton, Dieter Buehler, Ching-Yun Chao, Anthony Joseph Nadalin, Nataraj Nagaratnam +2 more | 2010-03-09 |
| 7500264 | Use of packet hashes to prevent TCP retransmit overwrite attacks | Nicholas Read Leavy, Michael L. Hall, Mohit Jaggi | 2009-03-03 |
| 7117221 | Replication of changed information in a multi-master environment | John Ryan McGarvey | 2006-10-03 |
| 7076795 | System and method for granting access to resources | — | 2006-07-11 |
| 6981043 | Apparatus and method for managing multiple user identities on a networked computer system | Patrick S. Botz, Patrick Fleming | 2005-12-27 |
| 6732269 | Methods, systems and computer program products for enhanced security identity utilizing an SSL proxy | Michael E. Baskey, Dilip Dinkar Kandlur, David G. Kuehr-McLaren | 2004-05-04 |
| 6711679 | Public key infrastructure delegation | Richard Henry Guski | 2004-03-23 |
| 6553384 | Transactional name service | Jeffrey A. Frey, David A. Booz, Theodore R. Maeurer | 2003-04-22 |
| 6505210 | Federation of naming contexts across multiple and/or diverse underlying directory technologies | Jeffrey A. Frey, Theodore R. Maeurer, Gary S. Puchkoff | 2003-01-07 |
| 6209036 | Management of and access to information and other material via the world wide web in an LDAP environment | Barry Keith Aldred, Charles S. Brown, Ellen J. Stokes | 2001-03-27 |