| 10511631 |
Safe data access through any data channel |
Amar Patel, Mario Goertzel |
2019-12-17 |
| 8984597 |
Protecting user credentials using an intermediary component |
Marc R. Barbour, Magnus Bo Gustaf Nyström |
2015-03-17 |
| 8924714 |
Authentication with an untrusted root |
Kelvin S. Yiu |
2014-12-30 |
| 8904509 |
Resource access based on multiple credentials |
Marc R. Barbour, Carl M. Ellison, Janet L. Schneider, Pieter Kasselman |
2014-12-02 |
| 8418237 |
Resource access based on multiple credentials |
Marc R. Barbour, Carl M. Ellison, Janet L. Schneider, Pieter Kasselman |
2013-04-09 |
| 8380634 |
First computer process and second computer process proxy-executing code on behalf of first process |
Andrey Lilikov, Donald H. Rule, Nir Ben Zvi |
2013-02-19 |
| 8103592 |
First computer process and second computer process proxy-executing code on behalf of first process |
Andrey Lilikov, Donald H. Rule, Nir Ben Zvi |
2012-01-24 |
| 7979911 |
First computer process and second computer process proxy-executing code from third computer process on behalf of first process |
— |
2011-07-12 |
| 7788496 |
First computer process and second computer process proxy-executing code on behalf thereof |
Andrey Lelikov, Caglar Gunyakti |
2010-08-31 |
| 7779478 |
System and method for distributed module authentication |
Lazar Ivanov, Caglar Gunyakti |
2010-08-17 |
| 7607122 |
Post build process to record stack and call tree information |
Uri London, Vladimir Shubin |
2009-10-20 |
| 7426718 |
Overriding constructors to provide notification in order to detect foreign code |
Uri London, Vladimir Shubin |
2008-09-16 |
| 7379918 |
Method and system for single reactivation of software product licenses |
Xiaoxi Tan, Caglar Gunyakti, Ravindra Nath Pandya, Aidan T. Hughes, Yue Liu |
2008-05-27 |
| 7380269 |
Changing code execution path using kernel mode redirection |
Nir Ben Zvi, Andrey Lelikov |
2008-05-27 |
| 7356709 |
Systems and methods for deterring software piracy in a volume license environment |
Caglar Gunyakti, Ning Zhang, Xiaoxi Tan |
2008-04-08 |
| 7331063 |
Method and system for limiting software updates |
Caglar Gunyakti |
2008-02-12 |