| 11841936 |
Authentication rules for locked and unlocked states |
Jing Zhang, Anshul Rawat, Craig Thomas McIntyre, Guillermo Enrique Rueda, Peter Gregory Davis +2 more |
2023-12-12 |
| 11301575 |
Secure data synchronization |
Matthew Z. Tamayo-Rios, Saurav Sinha, Ruslan Pavlovich Ovechkin, Gopinathan Kannan, Vijay G. Bharadwaj +3 more |
2022-04-12 |
| 11227044 |
Systems and methods for generating and managing user authentication rules of a computing device |
Jing Zhang, Anshul Rawat, Craig Thomas McIntyre, Guillermo Enrique Rueda, Peter Gregory Davis +2 more |
2022-01-18 |
| 11030298 |
Candidate user profiles for fast, isolated operating system use |
Ibrahim Mohammad Ismail, Robert B. Gilbert, Haitao Wang, Matthew Jonathan Joplin |
2021-06-08 |
| 10121018 |
Secure data synchronization |
Matthew Z. Tamayo-Rios, Saurav Sinha, Ruslan Pavlovich Ovechkin, Gopinathan Kannan, Vijay G. Bharadwaj +3 more |
2018-11-06 |
| 10078747 |
Resumption of logon across reboots |
Tony Ureche, Saurav Sinha, Pranav Kukreja, Ibrahim Mohammad Ismail, Jonathan Schwartz +1 more |
2018-09-18 |
| 9998438 |
Verifying the security of a remote server |
Saurav Sinha, Gopinathan Kannan, Shawn David Corey, Tony Ureche |
2018-06-12 |
| 9811682 |
Security policy for device data |
Dustin Michael Ingalls, Christopher R. Macaulay, Octavian T. Ureche, Michael Grass, Sai Vinayak +1 more |
2017-11-07 |
| 9430649 |
Automatic strong identity generation for cluster nodes |
Magnus Bo Gustaf Nyström |
2016-08-30 |
| 9430664 |
Data protection for organizations on computing devices |
Preston Derek Adam, Peter Novotney, Innokentiy Basmov, Narendra S. Acharya, Octavian T. Ureche +4 more |
2016-08-30 |
| 9424439 |
Secure data synchronization |
Matthew Z. Tamayo-Rios, Saurav Sinha, Ruslan Pavlovich Ovechkin, Gopinathan Kannan, Vijay G. Bharadwaj +3 more |
2016-08-23 |
| 9245143 |
Security policy for device data |
Dustin Michael Ingalls, Christopher R. Macaulay, Octavian T. Ureche, Michael Grass, Sai Vinayak +1 more |
2016-01-26 |
| 8800048 |
Software protection through interdependent parameter cloud constrained software execution |
Matthias H. Wollnik, Andrey Lelikov, John R. McDowell, Aaron Payne Goldsmid, Karan Singh Dhillon |
2014-08-05 |
| 8627464 |
Globally valid measured operating system launch with hibernation support |
Stefan Thom, Scott D. Anderson, Robert Karl Spiger, David J. Linsley, Mark F. Novak +1 more |
2014-01-07 |
| 8522015 |
Authentication of binaries in memory with proxy code execution |
Aaron Payne Goldsmid, Ping Xie, Scott Miller, Nir Ben Zvi, Manoj Mehta |
2013-08-27 |
| 8271803 |
Anti-debugging protection of binaries with proxy code execution |
Aaron Payne Goldsmid, Nir Ben-Zvi, Sekhar Poornananda CHINTALAPATI, Karan Singh Dhillon, David J. Linsley +1 more |
2012-09-18 |
| 8010773 |
Hardware constrained software execution |
Hakki Tunc Bostanci, Matthias H. Wollnik, John R. McDowell, Karan Singh Dhillon, Aaron Payne Goldsmid |
2011-08-30 |