Issued Patents All Time
Showing 25 most recent of 76 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9495190 | Entropy pools for virtual machines | Scott A. Field, Brandon S. Baker | 2016-11-15 |
| 9305156 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2016-04-05 |
| 9253195 | Transformation of sequential access control lists utilizing certificates | Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman | 2016-02-02 |
| 9106629 | Distributed algorithm for changing a shared value | Larry Zhu, Tore Sundelin, Gleb Kholodov | 2015-08-11 |
| 9075980 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2015-07-07 |
| 9058497 | Cryptographic key management | Vijay G. Bharadwaj, Niels T. Ferguson, Magnus Bo Gustaf Nyström, Dayi Zhou, Denis Issoupov +3 more | 2015-06-16 |
| 9037620 | File system active symbolic link | Charles G. Jeffries | 2015-05-19 |
| 9026571 | Random number generation failure detection and entropy estimation | — | 2015-05-05 |
| 8966269 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2015-02-24 |
| 8914874 | Communication channel claim dependent security precautions | Octavian T. Ureche, Alex M. Semenko, Sai Vinayak | 2014-12-16 |
| 8904509 | Resource access based on multiple credentials | Marc R. Barbour, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman | 2014-12-02 |
| 8875258 | Constraining a login to a subset of access rights | John R. Michener, Niels T. Ferguson, Josh Benaloh, Brian A. LaMacchia | 2014-10-28 |
| 8838981 | Communication channel access based on channel identifier and use policy | Octavian T. Ureche, Alex M. Semenko, Sai Vinayak | 2014-09-16 |
| 8689015 | Portable secure data files | Charles G. Jeffries, Vijay G. Bharadwaj, Michael Grass, Matthew C. Setzer, Gaurav Sinha | 2014-04-01 |
| 8588421 | Cryptographic key containers on a USB token | Tolga Acar | 2013-11-19 |
| 8504838 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2013-08-06 |
| 8495374 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2013-07-23 |
| 8468579 | Transformation of sequential access control lists utilizing certificates | Paul J. Leach, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman | 2013-06-18 |
| 8423774 | Integrity protected smart card transaction | Stefan Thom, Erik Holt, Shivaram H. Mysore, Valerie Kathleen Bays | 2013-04-16 |
| 8418237 | Resource access based on multiple credentials | Marc R. Barbour, Kristjan E. Hatlelid, Janet L. Schneider, Pieter Kasselman | 2013-04-09 |
| 8381279 | Constraining a login to a subset of access rights | John R. Michener, Niels T. Ferguson, Josh Benaloh, Brian A. LaMacchia | 2013-02-19 |
| 8364984 | Portable secure data files | Charles G. Jeffries, Vijay G. Bharadwaj, Michael Grass, Matthew C. Setzer, Gaurav Sinha | 2013-01-29 |
| 8325924 | Managing group keys | Tolga Acar, Josh Benaloh, Niels T. Ferguson, Mira Belenkiy, Duy Lan Nguyen | 2012-12-04 |
| 8296564 | Communication channel access based on channel identifier and use policy | Octavian T. Ureche, Alex M. Semenko, Sai Vinayak | 2012-10-23 |
| 8208637 | Migration of computer secrets | — | 2012-06-26 |