Issued Patents All Time
Showing 1–16 of 16 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11677846 | Privacy-preserving first-party tracking | Winston Howes, Marcel M. Moti Yung, Bennet S. Yee | 2023-06-13 |
| 10140370 | Systems and methods for maintaining encrypted search indexes on third-party storage systems | Haibin Zhang, Scott Schneider, Walter Bogorad | 2018-11-27 |
| 9825986 | Systems and methods for generating contextually meaningful animated visualizations of computer security events | Sandeep Bhatkar, Kevin Roundy, David Luz Silva | 2017-11-21 |
| 9679160 | Systems and methods for maintaining encrypted search indexes on third-party storage systems | Haibin Zhang, Scott Schneider, Walter Bogorad | 2017-06-13 |
| 9628471 | Protecting user identity at a cloud using a distributed user identity system | Robert Koeten | 2017-04-18 |
| 9571479 | Role-based access control using dynamically shared cloud accounts | Sanjay Sawhney, Robert Koeten | 2017-02-14 |
| 9342705 | Systems and methods for searching shared encrypted files on third-party storage systems | Scott Schneider, Walter Bogorad, Haibin Zhang | 2016-05-17 |
| 9305007 | Discovering relationships using deduplication metadata to provide a value-added service | Petros Efstathopoulos | 2016-04-05 |
| 9298808 | Encrypted search acceleration | Scott Schneider | 2016-03-29 |
| 9258122 | Systems and methods for securing data at third-party storage services | Haibin Zhang, Scott Schneider, Walter Bogorad | 2016-02-09 |
| 9104858 | Protecting user identity at a cloud using a distributed user identity system | Robert Koeten | 2015-08-11 |
| 8931061 | Techniques for providing access to data in dynamic shared accounts | Robert Koeten | 2015-01-06 |
| 8874528 | Systems and methods for detecting cloud-based data leaks | Deb Banerjee, Sanjay Sawhney | 2014-10-28 |
| 8869244 | Techniques for providing role-based access control using dynamic shared accounts | Sanjay Sawhney, Robert Koeten | 2014-10-21 |
| 8762512 | Providing dynamically shared cloud accounts | Sanjay Sawhney, Robert Koeten | 2014-06-24 |
| 8631498 | Techniques for identifying potential malware domain names | Michael Hart, Jeffrey Wilhelm | 2014-01-14 |