| 10515208 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, David C. LeBlanc, Benjamen E. Ross, James Campbell +2 more |
2019-12-24 |
| 9946871 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, David C. LeBlanc, Benjamen E. Ross, James Campbell +2 more |
2018-04-17 |
| 9613228 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, David C. LeBlanc, Benjamen E. Ross, James Campbell +2 more |
2017-04-04 |
| 9298499 |
Identifier generation using named objects |
Brian Carver, David C. LeBlanc |
2016-03-29 |
| 9135460 |
Techniques to store secret information for global data centers |
Jonathan Birch, Amit Date, Vikas Malhotra, Bradley Albrecht, Ali Deniz Demircioglu |
2015-09-15 |
| 9003517 |
Isolation and presentation of untrusted data |
Vikas Malhotra, Benjamin E. Canning, David C. LeBlanc, Benjamen E. Ross, James Campbell +2 more |
2015-04-07 |
| 8667284 |
Detection of invalid escrow keys |
Venkataramann Renganathan, Brian Carver, David C. LeBlanc, Samuel Weiss |
2014-03-04 |
| 7395269 |
Systems and methods for changing items in a computer file |
Li Hua, Isaac E. Nichols, Joshua Pollock, Ravishankar Shanmugam |
2008-07-01 |
| 7383278 |
Systems and methods for changing items in a computer file |
Li Hua, Isaac E. Nichols, David Ornstein, Joshua Pollock, Ravishankar Shanmugam |
2008-06-03 |