| 12244733 |
Authorizing secure connections responsive to certificates bound to logical identifiers |
Christopher Anthony Grant Hillier, Ludovic Emmanuel Paul Noel Jacquin, Thomas M. Laffey |
2025-03-04 |
| 11294699 |
Dynamically scaled hyperconverged system establishing minimum supported interoperable communication protocol between clusters in a cluster group |
Bradford B. Glade, Peter F. Corbett, Michael W. Healey, Jr. |
2022-04-05 |
| 11226867 |
Backups of file system instances of encrypted data objects |
Glenn S. Watkins, John Michael Czerkowicz |
2022-01-18 |
| 11113408 |
Providing a secure object store using a hierarchical key system |
Michael W. Healey, Jr. |
2021-09-07 |
| 11100235 |
Backups of file system instances with root object encrypted by metadata encryption key |
Glenn S. Watkins, John Michael Czerkowicz |
2021-08-24 |
| 9860059 |
Distributing token records |
Christopher Duane, Robert S. Philpott, William M. Duane |
2018-01-02 |
| 9667611 |
Situationally aware authentication |
Lawrence N. Friedman, Yedidya Dotan, Daniel V. Bailey, William M. Duane, John Brainard |
2017-05-30 |
| 9613201 |
Access control by a mobile device using an image |
Yedidya Dotan, Lawrence N. Friedman, Daniel V. Bailey |
2017-04-04 |
| 9515996 |
Distributed password-based authentication in a public key cryptography authentication system |
Ari Juels |
2016-12-06 |
| 9454648 |
Distributing token records in a market environment |
Robert S. Philpott, William M. Duane, Christopher Duane |
2016-09-27 |
| 9455972 |
Provisioning a mobile device with a security application on the fly |
Yedidya Dotan, Lawrence N. Friedman |
2016-09-27 |
| 9430634 |
Authentication using gesture passwords |
Yedidya Dotan, Daniel V. Bailey, Lawrence N. Friedman |
2016-08-30 |
| 9397992 |
Authentication using color-shape pairings |
Yedidya Dotan, Daniel V. Bailey, Lawrence N. Friedman |
2016-07-19 |
| 9332433 |
Distributing access and identification tokens in a mobile environment |
Yedidya Dotan, Lawrence N. Friedman, Riaz Zolfonoon, Guoying Luo |
2016-05-03 |
| 9305161 |
Password hardening system using password shares distributed across multiple servers |
Ari Juels, Kenneth D. Ray |
2016-04-05 |
| 9021271 |
Injecting code decrypted by a hardware decryption module into Java applications |
Lawrence N. Friedman, Alexander Volanis, Yedidya Dotan |
2015-04-28 |
| 8978122 |
Secure cross-tenancy federation in software-as-a-service system |
Riaz Zolfonoon, Nirav Bipinchandra Mehta |
2015-03-10 |
| 8959650 |
Validating association of client devices with sessions |
Yedidya Dotan, Riaz Zolfonoon, Gregory Dicovitsky |
2015-02-17 |
| 8819803 |
Validating association of client devices with authenticated clients |
Yedidya Dotan, Lawrence N. Friedman |
2014-08-26 |
| 8601531 |
System authorization based upon content sensitivity |
Riaz Zolfonoon |
2013-12-03 |