Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11645164 | Adjusting data backups based on system details | Sangeetha Seshadri, Priyaranjan Behera, Paul H. Muench, Umesh Deshpande, Nicholas Linck | 2023-05-09 |
| 11573848 | Identification and/or prediction of failures in a microservice architecture for enabling automatically-repairing solutions | Nicholas Linck, Sangeetha Seshadri, Paul H. Muench, Umesh Deshpande, Priyaranjan Behera | 2023-02-07 |
| 9300465 | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient | Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa | 2016-03-29 |
| 8656178 | Method, system and program product for modifying content usage conditions during content distribution | Eric M. Foster, Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo I. Nin, Florian Pestoni +1 more | 2014-02-18 |
| 8433927 | Cryptographically-enabled privileged mode execution | Kanna Shimizu | 2013-04-30 |
| 8422674 | Application-specific secret generation | Masana Murase, Kanna Shimizu, Vladimir Zbarsky | 2013-04-16 |
| 8332635 | Updateable secure kernel extensions | Kanna Shimizu, Vladimir Zbarsky | 2012-12-11 |
| 8166304 | Support for multiple security policies on a unified authentication architecture | Masana Murase, Kanna Shimizu, Vladimir Zbarsky | 2012-04-24 |
| 8010804 | Method to protect secrets against encrypted section attack | Masana Murase, Kanna Shimizu | 2011-08-30 |
| 7934063 | Invoking externally assisted calls from an isolated environment | Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky | 2011-04-26 |
| 7886162 | Cryptographic secure program overlays | Masana Murase, Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky | 2011-02-08 |
| 7747877 | Tamper-resistant trusted Java virtual machine and method of using the same | Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin | 2010-06-29 |
| 7574450 | Method for sharing an object between applications | — | 2009-08-11 |
| 7516331 | Tamper-resistant trusted java virtual machine and method of using the same | Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin | 2009-04-07 |
| 7356147 | Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient | Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa | 2008-04-08 |
| 7092527 | Method, system and program product for managing a size of a key management block during content distribution | Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa | 2006-08-15 |
| 6466979 | Adaptive system for optimizing a physical connection in a communication session | — | 2002-10-15 |
| 5751926 | Function approximation using a centered cubic packing with tetragonal disphenoid extraction | James M. Kasson, Sigfredo I. Nin, Duaine Wright Pryor, Jr. | 1998-05-12 |
| 5432892 | Volummetric linear interpolation | James L. Hafner | 1995-07-11 |
| 5390035 | Method and means for tetrahedron/octahedron packing and tetrahedron extraction for function approximation | James M. Kasson | 1995-02-14 |