| 11361086 |
Reliable datacenter protection at scale |
Piyush Pramod Joshi, Akil Merchant, Jack Smith Richins, Soumya D. Pani, Asad Yaqoob +3 more |
2022-06-14 |
| 11295004 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher Leonard Walstad |
2022-04-05 |
| 11163908 |
Device state driven encryption key management |
Samarth Sudhanshu Zankharia, Narendra S. Acharya, Alex M. Semenko |
2021-11-02 |
| 11153327 |
Data classification and access control for cloud based data |
Christopher Leonard Walstad, Vishal Agarwal, Narendra S. Acharya, Preston Derek Adam |
2021-10-19 |
| 11055385 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Benjamin Richard Vincent +1 more |
2021-07-06 |
| 10713350 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher Leonard Walstad |
2020-07-14 |
| 10511632 |
Incremental security policy development for an enterprise network |
Michael D. Ward, Preston Derek Adam, Vishal Agarwal, Narendra S. Acharya |
2019-12-17 |
| 10404716 |
Data classification and access control for cloud based data |
Christopher Leonard Walstad, Vishal Agarwal, Narendra S. Acharya, Preston Derek Adam |
2019-09-03 |
| 10268809 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Benjamin Richard Vincent +1 more |
2019-04-23 |
| 10078748 |
Unlock and recovery for encrypted devices |
Yogesh A. Mehta, Scott R. Shell, Innokentiy Basmov, Peter Novotney, Christopher Leonard Walstad |
2018-09-18 |
| 9967244 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Benjamin Richard Vincent +1 more |
2018-05-08 |
| 9900295 |
Roaming content wipe actions across devices |
Yogesh A. Mehta, Preston Derek Adam, Narendra S. Acharya |
2018-02-20 |
| 9853812 |
Secure key management for roaming protected content |
Yogesh A. Mehta, Innokentiy Basmov, Peter Novotney, Preston Derek Adam, Mugdha Lakhani +3 more |
2017-12-26 |
| 9825945 |
Preserving data protection with policy |
Preston Derek Adam, Narendra S. Acharya, Innokentiy Basmov, Yogesh A. Mehta, Alex M. Semenko |
2017-11-21 |
| 9811682 |
Security policy for device data |
Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Michael Grass, Sai Vinayak +1 more |
2017-11-07 |
| 9703586 |
Distribution control and tracking mechanism of virtual machine appliances |
Son VoBa |
2017-07-11 |
| 9531703 |
Single sign-on via application or browser |
Jonathan Schwartz, Karanbir Singh, Christopher Leonard Walstad, Sainath Narendranath Thadkal, Aleksandr Radutskiy +2 more |
2016-12-27 |
| 9507964 |
Regulating access using information regarding a host machine of a portable storage drive |
Preston Derek Adam, Sai Vinayak, Stefan Thom, Himanshu Soni, Nicolae Voicu |
2016-11-29 |
| 9495522 |
Shared session techniques |
Karanbir Singh, Yashar Bahman, John M. Sheehan |
2016-11-15 |
| 9430664 |
Data protection for organizations on computing devices |
Preston Derek Adam, Peter Novotney, Nathan J. Ide, Innokentiy Basmov, Narendra S. Acharya +4 more |
2016-08-30 |
| 9245143 |
Security policy for device data |
Dustin Michael Ingalls, Nathan J. Ide, Christopher R. Macaulay, Michael Grass, Sai Vinayak +1 more |
2016-01-26 |
| 9183415 |
Regulating access using information regarding a host machine of a portable storage drive |
Preston Derek Adam, Sai Vinayak, Stefan Thom, Himanshu Soni, Nicolae Voicu |
2015-11-10 |
| 9058497 |
Cryptographic key management |
Vijay G. Bharadwaj, Niels T. Ferguson, Carl M. Ellison, Magnus Bo Gustaf Nyström, Dayi Zhou +3 more |
2015-06-16 |
| 8977865 |
Data encryption conversion for independent agents |
David Abzarian, Darren G. Moss, Grigory Borisovich Lyakhovitskiy, Karan Mehra, Innokentiy Basmov |
2015-03-10 |
| 8914874 |
Communication channel claim dependent security precautions |
Alex M. Semenko, Sai Vinayak, Carl M. Ellison |
2014-12-16 |