| 11080665 |
Cryptographically concealing amounts and asset types for independently verifiable transactions |
Andrew Poelstra, Gregory Maxwell, Pieter Wuille, Mark Friedenbach |
2021-08-03 |
| 10812274 |
Transferring ledger assets between blockchains via pegged sidechains |
Gregory Maxwell, Matt Corallo, Luke Dashjr, Mark Friedenbach, Andrew Poelstra +2 more |
2020-10-20 |
| 9830271 |
Transparent virtualization of cloud storage |
Thomas A. Phelan, Erik Cota-Robles, David William Barry, II |
2017-11-28 |
| 9673984 |
Session key cache to maintain session keys |
Wei Jiang, John D. Whited, Yordan Rouskov, Ismail Cem Paya, Wei Guo |
2017-06-06 |
| 9203819 |
Methods and systems for pairing devices |
James L. Fenton, Steven T. Kirsch |
2015-12-01 |
| 8751804 |
Controlling access to data within encrypted copies of files using salt parameters |
Magnus Bo Gustaf Nyström, Alina Oprea |
2014-06-10 |
| 8626929 |
Scalable session management using an encrypted session key |
Wei Jiang, Ismail Cem Paya, John D. Whited, Wei Guo, Yordan Rouskov |
2014-01-07 |
| 8510625 |
Multi-site data redundancy |
Patrick E. Bozeman, Zachary Wily |
2013-08-13 |
| 7890634 |
Scalable session management |
Wei Jiang, Ismail Cem Paya, John D. Whited, Wei Guo, Yordan Rouskov |
2011-02-15 |
| 7584362 |
Systems and methods for providing signatures |
Ismail Cem Paya, Peter L. Montgomery |
2009-09-01 |
| 7523499 |
Security attack detection and defense |
Jonathan Wilkins, Gerard Gjonej |
2009-04-21 |
| 7379551 |
Method and system for recovering password protected private data via a communication network without exposing the private data |
Kok Wai Chan, Dafina Toncheva, Baskaran Dharmarajan, Rahul Shrikant Newaskar |
2008-05-27 |