| 8924714 |
Authentication with an untrusted root |
Kristjan E. Hatlelid |
2014-12-30 |
| 8798272 |
Systems and methods for managing multiple keys for file encryption and decryption |
David B. Cross, Duncan G. Bryce, Jianrong Gu, Monica Ene-Pietrosanu |
2014-08-05 |
| 8078960 |
Rendering an HTML electronic form by applying XSLT to XML using a solution |
Jason P. Chalecki, Prakash Sikchi |
2011-12-13 |
| 7925621 |
Installing a solution |
Prakash Sikchi, Arungundram Narendran, Dragos Barac, Miladin Pavlicic, Rajesh J. Jha |
2011-04-12 |
| 7818575 |
Efficient retrieval of cryptographic evidence |
David B. Cross, Philip J. Hallin, Ryan M. Hurst, Vishal Agarwal |
2010-10-19 |
| 7490109 |
System and method for offline editing of data files |
Prakash Sikchi, Arungundram Narendran, Dragos Barac, Miladin Pavlicic, Rajesh K. Jha |
2009-02-10 |
| 7451392 |
Rendering an HTML electronic form by applying XSLT to XML using a solution |
Jason P. Chalecki, Prakash Sikchi |
2008-11-11 |
| 7376673 |
Offline editing of XML files using a solution |
Jason P. Chalecki, Prakash Sikchi |
2008-05-20 |
| 7370066 |
System and method for offline editing of data files |
Prakash Sikchi, Arungundram Narendran, Dragos Barac, Miladin Pavlicic, Rajesh K. Jha |
2008-05-06 |
| 7143165 |
Updating trusted root certificates on a client computer |
Keith R. Vogel, Charlie Chase, Philip J. Hallin, Louis Kelly Thomas |
2006-11-28 |
| 6816900 |
Updating trusted root certificates on a client computer |
Keith R. Vogel, Charlie Chase, Philip J. Hallin, Louis Kelly Thomas |
2004-11-09 |