WJ

Wilfred E. Plouffe, Jr.

IBM: 20 patents #5,451 of 70,183Top 8%
Overall (All Time): #219,168 of 4,157,543Top 6%
20
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
11645164 Adjusting data backups based on system details Sangeetha Seshadri, Priyaranjan Behera, Paul H. Muench, Umesh Deshpande, Nicholas Linck 2023-05-09
11573848 Identification and/or prediction of failures in a microservice architecture for enabling automatically-repairing solutions Nicholas Linck, Sangeetha Seshadri, Paul H. Muench, Umesh Deshpande, Priyaranjan Behera 2023-02-07
9300465 Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa 2016-03-29
8656178 Method, system and program product for modifying content usage conditions during content distribution Eric M. Foster, Jeffrey Bruce Lotspiech, Dalit Naor, Sigfredo I. Nin, Florian Pestoni +1 more 2014-02-18
8433927 Cryptographically-enabled privileged mode execution Kanna Shimizu 2013-04-30
8422674 Application-specific secret generation Masana Murase, Kanna Shimizu, Vladimir Zbarsky 2013-04-16
8332635 Updateable secure kernel extensions Kanna Shimizu, Vladimir Zbarsky 2012-12-11
8166304 Support for multiple security policies on a unified authentication architecture Masana Murase, Kanna Shimizu, Vladimir Zbarsky 2012-04-24
8010804 Method to protect secrets against encrypted section attack Masana Murase, Kanna Shimizu 2011-08-30
7934063 Invoking externally assisted calls from an isolated environment Masana Murase, Masaharu Sakamoto, Kanna Shimizu, Vladimir Zbarsky 2011-04-26
7886162 Cryptographic secure program overlays Masana Murase, Kanna Shimizu, Masaharu Sakamoto, Vladimir Zbarsky 2011-02-08
7747877 Tamper-resistant trusted Java virtual machine and method of using the same Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin 2010-06-29
7574450 Method for sharing an object between applications 2009-08-11
7516331 Tamper-resistant trusted java virtual machine and method of using the same Hongxia Jin, Donald E. Leake, Jr., Jeffrey Bruce Lotspiech, Sigfredo I. Nin 2009-04-07
7356147 Method, system and program product for attaching a title key to encrypted content for synchronized transmission to a recipient Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa 2008-04-08
7092527 Method, system and program product for managing a size of a key management block during content distribution Eric M. Foster, Jeffrey Bruce Lotspiech, Florian Pestoni, Frank A. Schaffa 2006-08-15
6466979 Adaptive system for optimizing a physical connection in a communication session 2002-10-15
5751926 Function approximation using a centered cubic packing with tetragonal disphenoid extraction James M. Kasson, Sigfredo I. Nin, Duaine Wright Pryor, Jr. 1998-05-12
5432892 Volummetric linear interpolation James L. Hafner 1995-07-11
5390035 Method and means for tetrahedron/octahedron packing and tetrahedron extraction for function approximation James M. Kasson 1995-02-14