Issued Patents All Time
Showing 25 most recent of 37 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11741251 | System of enclaves | Nelly Porter, Uday Savagaonkar, Brandon S. Baker, Sergey Simakov | 2023-08-29 |
| 11314882 | System of enclaves | Nelly Porter, Uday Savagaonkar, Brandon S. Baker, Sergey Simakov | 2022-04-26 |
| 10776503 | System of enclaves | Nelly Porter, Uday Ramesh Savagsonkar, Brandon S. Baker, Sergey Simakov | 2020-09-15 |
| 10427989 | Anti-fungal seed treatment formulations, treated seeds, and methods | Dale Allan Krolikowski, Eugenia Tang | 2019-10-01 |
| 10233134 | Anti-fungal seed treatment formulations, treated seeds, and methods | Dale Allan Krolikowski, Eugenia Tang | 2019-03-19 |
| 9477832 | Digital identity management | Matthew W. Thomlinson, Philip J. Hallin, Thomas C. Jones | 2016-10-25 |
| 9345733 | Supplement composition for supporting telomere maintenance and protection and method of use | Vincent C. Giampapa | 2016-05-24 |
| 9231964 | Vulnerability detection based on aggregated primitives | Nir Nice | 2016-01-05 |
| 8918782 | Software image distribution | Ian W. Robinson, Andrew T. Mason, Brendan Power | 2014-12-23 |
| 8875285 | Executable code validation in a web browser | Kira Radinsky | 2014-10-28 |
| 8819797 | Digital identity management | Matthew W. Thomlinson, Philip J. Hallin, Thomas C. Jones | 2014-08-26 |
| 8798272 | Systems and methods for managing multiple keys for file encryption and decryption | Duncan G. Bryce, Jianrong Gu, Kelvin S. Yiu, Monica Ene-Pietrosanu | 2014-08-05 |
| 8739250 | Denial of service attack resistant input port | Lee Holmes, Hitesh Raigandhi, Nathan Burkhart, Manoj Kumar Ampalam | 2014-05-27 |
| 8707439 | Selecting security offerings | Vladimir Holostov, Yigal Edery | 2014-04-22 |
| 8640256 | File system operation and digital rights management (DRM) | Paul J. Leach | 2014-01-28 |
| 8621561 | Selective authorization based on authentication input attributes | Mark F. Novak, Oded Ye Shekel, Paul J. Leach, Andreas K. Luther, Thomas C. Jones | 2013-12-31 |
| 8615801 | Software authorization utilizing software reputation | Thekkthalackal Varugis Kurien, Scott A. Field | 2013-12-24 |
| 8495355 | Operating system experience states | Andrew T. Mason, Brendan Power, Ian W. Robinson | 2013-07-23 |
| 8151332 | Digital identity management | Philip J. Hallin, Matthew W. Thomlinson, Thomas C. Jones | 2012-04-03 |
| 8127133 | Labeling of data objects to apply and enforce policies | Satyajit Nath, George Li, Tanmoy Dutta, Sunil P. Gottumukkala | 2012-02-28 |
| 8117666 | File system operation and digital rights management (DRM) | Paul J. Leach | 2012-02-14 |
| 8059820 | Multi-factor content protection | Rushmi U. Malaviarachchi, Mayur Kamat | 2011-11-15 |
| 8045714 | Systems and methods for managing multiple keys for file encryption and decryption | Duncan G. Bryce, Jianrong Gu, Kelvin Yiu, Monica Ene-Pietrosanu | 2011-10-25 |
| 7991902 | Reputation-based authorization decisions | Scott A. Field, Varugis Kurien | 2011-08-02 |
| 7984488 | Credential roaming in electronic computing systems | Xiaohong Su, Hao Zhuang, Philip J. Hallin | 2011-07-19 |