| 12386496 |
Data collaboration between different entities |
Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more |
2025-08-12 |
| 11868362 |
Metadata extraction from big data sources |
Andrew Brown, Dale E. Prillaman |
2024-01-09 |
| 11327641 |
Data collaboration between different entities |
Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more |
2022-05-10 |
| 11321340 |
Metadata extraction from big data sources |
Andrew Brown, Dale E. Prillaman |
2022-05-03 |
| 11283604 |
Sharing encrypted data with enhanced security by removing unencrypted metadata |
Muhammed Serdar Soran, Adam Barr, Tolga Acar, Ray S. Wang, Samantha Schumacher |
2022-03-22 |
| 10515208 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more |
2019-12-24 |
| 10222965 |
Data collaboration between different entities |
Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more |
2019-03-05 |
| 10176331 |
Enhanced metadata to authentically report the provenance of a file |
John M. Sheehan, Vishal Agarwal, Crispin Cowan, Juan-Lee Pang, Greg Domzalski |
2019-01-08 |
| 9946871 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more |
2018-04-17 |
| 9857960 |
Data collaboration between different entities |
Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more |
2018-01-02 |
| 9613228 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more |
2017-04-04 |
| 9298499 |
Identifier generation using named objects |
Daniel B. Jump, Brian Carver |
2016-03-29 |
| 9003517 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more |
2015-04-07 |
| 8892897 |
Method for generating and detecting auditable passwords |
Matthew Michael Swann |
2014-11-18 |
| 8789159 |
System for running potentially malicious code |
S. Franklin Williams, Kiran Akella Venkata, Juraj Gottweis, Gareth Howell, Scott A. Field +1 more |
2014-07-22 |
| 8667284 |
Detection of invalid escrow keys |
Venkataramann Renganathan, Brian Carver, Daniel B. Jump, Samuel Weiss |
2014-03-04 |
| 7912940 |
Network system role determination |
Pierre-Yves Santerre, Ramsey Dow |
2011-03-22 |
| 7818625 |
Techniques for performing memory diagnostics |
Steven M. Greenberg, Thomas Scott Coon |
2010-10-19 |
| 7797743 |
File conversion in restricted process |
Ambrose T. Treacy, Maithili Vijay DANDIGE, Eric Fox, Robert Little, Christopher C. White +2 more |
2010-09-14 |
| 7559082 |
Method of assisting an application to traverse a firewall |
Dennis Morgan, Alexandru Gavrilescu, Jonathan Lee Burstein, Art Shelest |
2009-07-07 |