| 12167236 |
Remote management of hardware security modules |
Garry J. Sullivan, Michael J. Jordan, Michael J. Young, Jessica P. Doherty, Christopher V. DeRobertis |
2024-12-10 |
| 11764972 |
Generating a hybrid security certificate using multiple cryptosystems |
Jonathan William Edwards, David Wayne Glass, David Howard Evans, Clifford L. Hansen, Richard V. Kisley |
2023-09-19 |
| 11012231 |
Authenticated copying of encryption keys between secure zones |
Michael J. Miele, Garry J. Sullivan |
2021-05-18 |
| 10594478 |
Authenticated copying of encryption keys between secure zones |
Michael J. Miele, Garry J. Sullivan |
2020-03-17 |
| 9607135 |
Asset protection based on redundantly associated trusted entitlement verification |
Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang, Victor M. Lourenco +3 more |
2017-03-28 |
| 9424406 |
Asset protection based on redundantly associated trusted entitlement verification |
Richard J. Gusefski, Franz Hardt, Roger D. Krsnak, Jakob C. Lang, Victor M. Lourenco +3 more |
2016-08-23 |
| 8582778 |
Integrated key server |
Edward W. Chencinski, John C. Dayka, Steven G. Glassen, Richard J. Gusefski, Michael J. Jordan +5 more |
2013-11-12 |
| 7719976 |
Variable dynamic throttling of network traffic for intrusion prevention |
David A. Christenson, Christopher Thomas Gloe, Daniel P. Kolz, Scott D. McCreadie, Timothy R. Seeger +1 more |
2010-05-18 |
| 7093132 |
Method and apparatus for protecting ongoing system integrity of a software product using digital signatures |
Michael E. Aho, Harold Olaf Romo |
2006-08-15 |
| 5367674 |
Data stream optimizer utilizing difference coding between a current state buffer and a next state buffer |
Jody E. Berk, Paul Reuben Day, Peter J. Heyrman, David L. Johnson |
1994-11-22 |