| 12174792 |
Reliable detection of deleted assets in data stores |
Guoyu Hao, Khaled Mohamed Morssi Ibrahim, Justin R. Dellamore, Steve P. Herbert |
2024-12-24 |
| 11755529 |
Compliance violation detection |
Michael Aksionkin, Saikat Guha, Leena Jain Sheth, Rithesh Baradi, Alisson Sol |
2023-09-12 |
| 11755564 |
Compute-efficient effective tag determination for data assets |
Saikat Guha, Justin R. Dellamore |
2023-09-12 |
| 11481377 |
Compute-efficient effective tag determination for data assets |
Saikat Guha, Justin R. Dellamore |
2022-10-25 |
| 11151165 |
Data classification using data flow analysis |
Saikat Guha, Guoyu Hao, Steven P. Herbert |
2021-10-19 |
| 11132400 |
Data classification using probabilistic data structures |
Aditya Gupta, Saikat Guha, Steven P. Herbert |
2021-09-28 |
| 11042506 |
Compliance violation detection |
Michael Aksionkin, Saikat Guha, Leena Jain Sheth, Rithesh Baradi, Alisson Sol |
2021-06-22 |
| 10419568 |
Manipulation of browser DOM on server |
Vitaly L. Rubtsov, Michael Aksionkin |
2019-09-17 |
| 9213846 |
Using flash storage device to prevent unauthorized use of software |
— |
2015-12-15 |
| 9170782 |
Extensible mechanism for providing suggestions in a source code editor |
Jonathan Preston Carter, Fiona Fung |
2015-10-27 |
| 8938727 |
Method for preventing software reverse engineering, unauthorized modification, and runtime data interception |
Keren Asipov |
2015-01-20 |
| 8862893 |
Techniques for performing symmetric cryptography |
— |
2014-10-14 |
| 8528109 |
Optimizing amount of data passed during software license activation |
Aidan T. Hughes |
2013-09-03 |
| 8452967 |
Using flash storage device to prevent unauthorized use of software |
— |
2013-05-28 |
| 8352929 |
Method for preventing software reverse engineering, unauthorized modification, and runtime data interception |
Keren Asipov |
2013-01-08 |