Issued Patents All Time
Showing 1–25 of 43 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10915656 | Rollback protection for login security policy | Benjamin Nick, Innokentiy Basmov, Peter Novotney, Michael Grass | 2021-02-09 |
| 10615967 | Rapid data protection for storage devices | Innokentiy Basmov, Niels T. Ferguson, Alex M. Semenko | 2020-04-07 |
| 10419216 | Keying infrastructure | Niels T. Ferguson, Dave M. McPherson, Paul England, Mark F. Novak | 2019-09-17 |
| 9984250 | Rollback protection for login security policy | Benjamin Nick, Innokentiy Basmov, Peter Novotney, Michael Grass | 2018-05-29 |
| 9740639 | Map-based rapid data encryption policy compliance | Innokentiy Basmov, Alex M. Semenko, Douglas M. MacIver, Donghui Li | 2017-08-22 |
| 9674177 | Dynamic knowledge-based user authentication without need for presentation of predetermined credential | — | 2017-06-06 |
| 9633210 | Keying infrastructure | Niels T. Ferguson, Dave M. McPherson, Paul England, Mark F. Novak | 2017-04-25 |
| 9614835 | Automatic provisioning of a device to access an account | Anooshiravan Saboori, Himanshu Soni, Peter Dawoud, Jonathan Schwartz, Dayi Zhou | 2017-04-04 |
| 9519498 | Virtual machine assurances | Stefan Thom | 2016-12-13 |
| 9489512 | Trustzone-based integrity measurements and verification using a software-based trusted platform module | Stefan Thom, Jeremiah Cox, David J. Linsley, Himanshu Raj, David Robinson +3 more | 2016-11-08 |
| 9477614 | Sector map-based rapid data encryption policy compliance | Innokentiy Basmov, Alex M. Semenko, Douglas M. MacIver, Donghui Li | 2016-10-25 |
| 9430649 | Automatic strong identity generation for cluster nodes | Nathan J. Ide | 2016-08-30 |
| 9424431 | Protecting operating system configuration values using a policy identifying operating system configuration settings | Scott D. Anderson, David J. Linsley, Douglas M. MacIver, Robert Karl Spiger | 2016-08-23 |
| 9281948 | Revocation information for revocable items | Philip J. Hallin, Yogesh A. Mehta, Violet Anna Barhudarian | 2016-03-08 |
| 9268492 | Network based management of protected data sets | Mark F. Novak, Andrew Layman, Stefan Thom | 2016-02-23 |
| 9256750 | Secure credential unlock using trusted execution environments | Stefan Thom, Robert Karl Spiger, Himanshu Soni, Marc R. Barbour, Nick Voicu +2 more | 2016-02-09 |
| 9256745 | Protecting operating system configuration values using a policy identifying operating system configuration settings | Scott D. Anderson, David J. Linsley, Douglas M. MacIver, Robert Karl Spiger | 2016-02-09 |
| 9203620 | System, method and apparatus for secure use of cryptographic credentials in mobile devices | — | 2015-12-01 |
| 9189653 | Software-based trusted platform module | Stefan Thom, Jeremiah Cox, David J. Linsley, Himanshu Raj, David Robinson +3 more | 2015-11-17 |
| 9071439 | Method and apparatus for remote administration of cryptographic devices | William M. Duane, James Townsend | 2015-06-30 |
| 9058497 | Cryptographic key management | Vijay G. Bharadwaj, Niels T. Ferguson, Carl M. Ellison, Dayi Zhou, Denis Issoupov +3 more | 2015-06-16 |
| 9015490 | Secure credential unlock using trusted execution environments | Stefan Thom, Robert Karl Spiger, Himanshu Soni, Marc R. Barbour, Nick Voicu +2 more | 2015-04-21 |
| 8984597 | Protecting user credentials using an intermediary component | Kristjan E. Hatlelid, Marc R. Barbour | 2015-03-17 |
| 8954965 | Trusted execution environment virtual machine cloning | Mark F. Novak, Andrew Layman, Stefan Thom | 2015-02-10 |
| 8924737 | Digital signing authority dependent platform secret | Stefan Thom, Robert Karl Spiger, David R. Wooten, Jr. | 2014-12-30 |