| 10917394 |
Data operations using a proxy encryption key |
Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor Boyko, Pushkar Vijay Chitnis +2 more |
2021-02-09 |
| 10904231 |
Encryption using multi-level encryption key derivation |
Baskar Sridharan, Victor Boyko, Sriram K. Rajamani |
2021-01-26 |
| 10484352 |
Data operations using a proxy encryption key |
Baskar Sridharan, Raghunath Ramakrishnan, Sriram K. Rajamani, Victor Boyko, Pushkar Vijay Chitnis +2 more |
2019-11-19 |
| 8504349 |
Text prediction with partial selection in a variety of domains |
Jan-Kristian Markiewicz, Bradley A. Music, Brian Haslam |
2013-08-06 |
| 8424072 |
Behavior-based security system |
Jack Pullikottil |
2013-04-16 |
| 7580570 |
Accuracy model for recognition signal processing engines |
Radmila Sarac |
2009-08-25 |
| 7428516 |
Handwriting recognition using neural networks |
James A. Pittman |
2008-09-23 |
| 7110914 |
Flexible variable and execution matrix |
Cristina Manu |
2006-09-19 |
| 7058953 |
Managing a distributed computing system |
Michael J. Willard |
2006-06-06 |