Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12386496 | Data collaboration between different entities | Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more | 2025-08-12 |
| 11868362 | Metadata extraction from big data sources | Andrew Brown, Dale E. Prillaman | 2024-01-09 |
| 11327641 | Data collaboration between different entities | Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more | 2022-05-10 |
| 11321340 | Metadata extraction from big data sources | Andrew Brown, Dale E. Prillaman | 2022-05-03 |
| 11283604 | Sharing encrypted data with enhanced security by removing unencrypted metadata | Muhammed Serdar Soran, Adam Barr, Tolga Acar, Ray S. Wang, Samantha Schumacher | 2022-03-22 |
| 10515208 | Isolation and presentation of untrusted data | Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more | 2019-12-24 |
| 10222965 | Data collaboration between different entities | Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more | 2019-03-05 |
| 10176331 | Enhanced metadata to authentically report the provenance of a file | John M. Sheehan, Vishal Agarwal, Crispin Cowan, Juan-Lee Pang, Greg Domzalski | 2019-01-08 |
| 9946871 | Isolation and presentation of untrusted data | Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more | 2018-04-17 |
| 9857960 | Data collaboration between different entities | Graham Dennis, Timothy Taylor, Kimberley Lear, Jesse Rickard, Dyon Balding +7 more | 2018-01-02 |
| 9613228 | Isolation and presentation of untrusted data | Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more | 2017-04-04 |
| 9298499 | Identifier generation using named objects | Daniel B. Jump, Brian Carver | 2016-03-29 |
| 9003517 | Isolation and presentation of untrusted data | Vikas Malhotra, Benjamin E. Canning, Daniel B. Jump, Benjamen E. Ross, James Campbell +2 more | 2015-04-07 |
| 8892897 | Method for generating and detecting auditable passwords | Matthew Michael Swann | 2014-11-18 |
| 8789159 | System for running potentially malicious code | S. Franklin Williams, Kiran Akella Venkata, Juraj Gottweis, Gareth Howell, Scott A. Field +1 more | 2014-07-22 |
| 8667284 | Detection of invalid escrow keys | Venkataramann Renganathan, Brian Carver, Daniel B. Jump, Samuel Weiss | 2014-03-04 |
| 7912940 | Network system role determination | Pierre-Yves Santerre, Ramsey Dow | 2011-03-22 |
| 7818625 | Techniques for performing memory diagnostics | Steven M. Greenberg, Thomas Scott Coon | 2010-10-19 |
| 7797743 | File conversion in restricted process | Ambrose T. Treacy, Maithili Vijay DANDIGE, Eric Fox, Robert Little, Christopher C. White +2 more | 2010-09-14 |
| 7559082 | Method of assisting an application to traverse a firewall | Dennis Morgan, Alexandru Gavrilescu, Jonathan Lee Burstein, Art Shelest | 2009-07-07 |