| 11645164 |
Adjusting data backups based on system details |
Sangeetha Seshadri, Priyaranjan Behera, Paul H. Muench, Umesh Deshpande, Nicholas Linck |
2023-05-09 |
| 11573848 |
Identification and/or prediction of failures in a microservice architecture for enabling automatically-repairing solutions |
Nicholas Linck, Sangeetha Seshadri, Paul H. Muench, Umesh Deshpande, Priyaranjan Behera |
2023-02-07 |
| 9300465 |
Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient |
Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa |
2016-03-29 |
| 8656178 |
Method, system and program product for modifying content usage conditions during content distribution |
Eric M. Foster, Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo I. Nin, Florian Pestoni +1 more |
2014-02-18 |
| 8433927 |
Cryptographically-enabled privileged mode execution |
Kanna Shimizu |
2013-04-30 |
| 8422674 |
Application-specific secret generation |
Masana Murase, Kanna Shimizu, Vladimir Zbarsky |
2013-04-16 |
| 8332635 |
Updateable secure kernel extensions |
Kanna Shimizu, Vladimir Zbarsky |
2012-12-11 |
| 8166304 |
Support for multiple security policies on a unified authentication architecture |
Masana Murase, Kanna Shimizu, Vladimir Zbarsky |
2012-04-24 |
| 8010804 |
Method to protect secrets against encrypted section attack |
Masana Murase, Kanna Shimizu |
2011-08-30 |
| 7934063 |
Invoking externally assisted calls from an isolated environment |
Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky |
2011-04-26 |
| 7886162 |
Cryptographic secure program overlays |
Masana Murase, Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky |
2011-02-08 |
| 7747877 |
Tamper-resistant trusted Java virtual machine and method of using the same |
Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin |
2010-06-29 |
| 7574450 |
Method for sharing an object between applications |
— |
2009-08-11 |
| 7516331 |
Tamper-resistant trusted java virtual machine and method of using the same |
Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin |
2009-04-07 |
| 7356147 |
Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient |
Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa |
2008-04-08 |
| 7092527 |
Method, system and program product for managing a size of a key management block during content distribution |
Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa |
2006-08-15 |
| 6466979 |
Adaptive system for optimizing a physical connection in a communication session |
— |
2002-10-15 |
| 5751926 |
Function approximation using a centered cubic packing with tetragonal disphenoid extraction |
James M. Kasson, Sigfredo I. Nin, Duaine Wright Pryor, Jr. |
1998-05-12 |
| 5432892 |
Volummetric linear interpolation |
James L. Hafner |
1995-07-11 |
| 5390035 |
Method and means for tetrahedron/octahedron packing and tetrahedron extraction for function approximation |
James M. Kasson |
1995-02-14 |