| 12393563 |
Storage and structured search of historical security data |
Collin Lambert, Ethan Daniel Gaebel, Andrew Chang, Iulia Ion |
2025-08-19 |
| 11295004 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Peter Novotney, Christopher Leonard Walstad |
2022-04-05 |
| 11163737 |
Storage and structured search of historical security data |
Collin Lambert, Ethan Daniel Gaebel, Andrew Chang, Iulia Ion |
2021-11-02 |
| 10915656 |
Rollback protection for login security policy |
Benjamin Nick, Magnus Bo Gustaf Nyström, Peter Novotney, Michael Grass |
2021-02-09 |
| 10713350 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Peter Novotney, Christopher Leonard Walstad |
2020-07-14 |
| 10615967 |
Rapid data protection for storage devices |
Magnus Bo Gustaf Nyström, Niels T. Ferguson, Alex M. Semenko |
2020-04-07 |
| 10078748 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Octavian T. Ureche, Scott R. Shell, Peter Novotney, Christopher Leonard Walstad |
2018-09-18 |
| 9984250 |
Rollback protection for login security policy |
Benjamin Nick, Magnus Bo Gustaf Nyström, Peter Novotney, Michael Grass |
2018-05-29 |
| 9900325 |
Passive encryption of organization data |
Alex M. Semenko, Preston Derek Adam, Narendra S. Acharya, Peter Novotney, Salil Arun Bhagurkar +1 more |
2018-02-20 |
| 9853812 |
Secure key management for roaming protected content |
Yogesh A. Mehta, Octavian T. Ureche, Peter Novotney, Preston Derek Adam, Mugdha Lakhani +3 more |
2017-12-26 |
| 9825945 |
Preserving data protection with policy |
Preston Derek Adam, Narendra S. Acharya, Octavian T. Ureche, Yogesh A. Mehta, Alex M. Semenko |
2017-11-21 |
| 9740639 |
Map-based rapid data encryption policy compliance |
Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. MacIver, Donghui Li |
2017-08-22 |
| 9582513 |
Accessing data in a compressed container through dynamic redirection |
Richard A. Pletcher, Malcolm James Smith, Alain Gefflaut, Alex Bendetov, Andrey Shedel +9 more |
2017-02-28 |
| 9477614 |
Sector map-based rapid data encryption policy compliance |
Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. MacIver, Donghui Li |
2016-10-25 |
| 9430664 |
Data protection for organizations on computing devices |
Preston Derek Adam, Peter Novotney, Nathan J. Ide, Narendra S. Acharya, Octavian T. Ureche +4 more |
2016-08-30 |
| 9286152 |
Securely obtaining memory content after device malfunction |
Alex M. Semenko, Kirsten V. Stark, Kevin Chin, Scott Chao-Chueh Lee |
2016-03-15 |
| 9104857 |
Gesture-based authentication without retained credentialing gestures |
Jeffrey Jay Johnson |
2015-08-11 |
| 8977865 |
Data encryption conversion for independent agents |
David Abzarian, Darren G. Moss, Grigory Borisovich Lyakhovitskiy, Karan Mehra, Octavian T. Ureche |
2015-03-10 |
| 8874935 |
Sector map-based rapid data encryption policy compliance |
Magnus Bo Gustaf Nyström, Alex M. Semenko, Douglas M. MacIver, Donghui Li |
2014-10-28 |
| 8745386 |
Single-use authentication methods for accessing encrypted data |
Octavian T. Ureche, Nils Dussart, Charles G. Jeffries, Cristian M. Ilac, Vijay G. Bharadwaj +2 more |
2014-06-03 |
| 8689279 |
Encrypted chunk-based rapid data encryption policy compliance |
Alex M. Semenko, Dustin L. Green, Magnus Bo Gustaf Nyström |
2014-04-01 |
| 8503674 |
Cryptographic key attack mitigation |
Octavian T. Ureche, Grigory Borisovich Lyakhovitskiy, Stefen Thom |
2013-08-06 |
| 8462955 |
Key protectors based on online keys |
Octavian T. Ureche, Nils Dussart, Michael Halcrow, Charles G. Jeffries, Nathan T. Lewis +3 more |
2013-06-11 |
| 8364598 |
Use of software update policies |
Troy Alan Funk, Octavian T. Ureche |
2013-01-29 |
| 7739220 |
Context snippet generation for book search system |
— |
2010-06-15 |