| 12190316 |
Code transparency system operation |
Mark Eugene Russinovich, Sylvan Clebsch, Kahren Tevosyan, Antoine Jean Denis Delignat-Lavaud, Cedric Fournet +1 more |
2025-01-07 |
| 12143499 |
Bootstrapping a code transparency system |
Mark Eugene Russinovich, Sylvan Clebsch, Kahren Tevosyan, Antoine Jean Denis Delignat-Lavaud, Cedric Fournet +1 more |
2024-11-12 |
| 10084705 |
Location identification of prior network message processor |
Stephen T. Dispensa |
2018-09-25 |
| 9130926 |
Authorization messaging with integral delegation data |
Vijayavani Nori, Caleb G. Baker, Gregory C. Johnson, Murli Satagopan, Igor Sakhnov +1 more |
2015-09-08 |
| 8910257 |
Representing security identities using claims |
Jan Alexander, Christopher G. Kaler, Charles R. Reeves |
2014-12-09 |
| 8763093 |
Access control management |
David E. Langworthy, Qian Wang, Andrew Layman, John P. Shewchuk, Shiung-Vei Yong +2 more |
2014-06-24 |
| 8479006 |
Digitally signing documents using identity context information |
Tariq Sharif, Arun K. Nanda, Craig Wittenberg, Lucas R. Melton, Richard Randall +1 more |
2013-07-02 |
| 8250230 |
Optimizing communication using scalable peer groups |
Christopher G. Kaler, Gopala Krishna R. Kakivaya, Richard Hasha |
2012-08-21 |
| 8087072 |
Provisioning of digital identity representations |
Vijay K. Gajjala, Colin Harrison Brace, Derek T. Del Conte, Kim Cameron, Arun K. Nanda +3 more |
2011-12-27 |
| 8078870 |
HTTP-based authentication |
Arun K. Nanda |
2011-12-13 |
| 8051469 |
Securely roaming digital identities |
John P. Shewchuk, Arun K. Nanda, Donald F. Box, Douglas A. Walter |
2011-11-01 |
| 8005901 |
Mapping policies to messages |
Keith W. Ballinger, Vick B. Mukherjee |
2011-08-23 |
| 7746250 |
Message encoding/decoding using templated parameters |
Arun K. Nanda, John P. Shewchuk, Christopher G. Kaler |
2010-06-29 |
| 7730138 |
Policy processing model |
Keith W. Ballinger, Vick B. Mukherjee |
2010-06-01 |
| 7665120 |
Visual summary of a web service policy document |
Govindaraj Ramanathan, Keith W. Ballinger, Vick B. Mukherjee |
2010-02-16 |
| 7661124 |
Rule-driven specification of web service policy |
Govindaraj Ramanathan, Keith W. Ballinger, Vick B. Mukherjee |
2010-02-09 |
| 7657932 |
Extendible security token management architecture and secure message handling methods |
Keith W. Ballinger, HongMei Ge, Vick B. Mukherjee |
2010-02-02 |
| 7640579 |
Securely roaming digital identities |
John P. Shewchuk, Arun K. Nanda, Donald F. Box, Douglas A. Walter |
2009-12-29 |
| 7640299 |
Optimizing communication using scaleable peer groups |
Christopher G. Kaler, Gopala Krishna R. Kakivaya, Richard Hasha |
2009-12-29 |
| 7533264 |
Custom security tokens |
Keith W. Ballinger, HongMei Ge, Vick B. Mukherjee |
2009-05-12 |
| 7533265 |
Establishment of security context |
Keith W. Ballinger, HongMei Ge, Vick B. Mukherjee |
2009-05-12 |
| 7496602 |
Optimizing communication using scalable peer groups |
Christopher G. Kaler, Gopala Krishna R. Kakivaya, Richard Hasha |
2009-02-24 |
| 7434252 |
Role-based authorization of network services using diversified security tokens |
Keith W. Ballinger, HongMei Ge, Vick B. Mukherjee |
2008-10-07 |
| 7165118 |
Layered message processing model |
Keith W. Ballinger |
2007-01-16 |