| 9503442 |
Credential-based application programming interface keys |
Daniel V. Bailey |
2016-11-22 |
| 8751827 |
Apparatus for controlling embedded security on a storage platform |
William M. Duane, John S. Harwood, Gregory W. Lazar, Thomas E. Linnell |
2014-06-10 |
| 8726405 |
Techniques for providing security using a mobile wireless communications device having data loss prevention circuitry |
Daniel V. Bailey |
2014-05-13 |
| 8694781 |
Techniques for providing hardware security module operability |
Joshua A. Rosenthol |
2014-04-08 |
| 8655787 |
Automated detection of defined input values and transformation to tokens |
Daniel V. Bailey, Joshua A. Rosenthol |
2014-02-18 |
| 8620882 |
Tokenization of multiple-field records |
Daniel V. Bailey, Joshua A. Rosenthol |
2013-12-31 |
| 8601553 |
Techniques of imposing access control policies |
Daniel V. Bailey, Joshua A. Rosenthol |
2013-12-03 |
| 8498417 |
Automation of coordination of encryption keys in a SAN based environment where an encryption engine, device management, and key management are not co-located |
John S. Harwood, Joshua A. Rosenthol, John T. Fitzgerald, Thomas E. Linnell |
2013-07-30 |
| 8452965 |
Self-identification of tokens |
Daniel V. Bailey, Joshua A. Rosenthol |
2013-05-28 |
| 4949251 |
Exactly-once semantics in a TP queuing system |
James P. Emmond |
1990-08-14 |