Issued Patents All Time
Showing 25 most recent of 93 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9819666 | Pass-thru for client authentication | David R. Mowers, John A. Banes, Daniel R. Simon | 2017-11-14 |
| 9407617 | Pass-thru for client authentication | David R. Mowers, John A. Banes, Daniel R. Simon | 2016-08-02 |
| 9253195 | Transformation of sequential access control lists utilizing certificates | Carl M. Ellison, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman | 2016-02-02 |
| 9208332 | Scoped resource authorization policies | David McPherson, Vishal Agarwal, Mark F. Novak, Ming Tang, Ramaswamy Ranganathan +4 more | 2015-12-08 |
| 9118672 | Back-end constrained delegation model | Mark F. Novak, Liqiang Zhu, Paul J. Miller, Alexandru Hanganu, Yi Zeng +2 more | 2015-08-25 |
| 9058467 | Distributed computer systems with time-dependent credentials | Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan | 2015-06-16 |
| 9055107 | Authentication delegation based on re-verification of cryptographic evidence | Gennady Medvinsky, Nir Nice, Tomer Shiran, Alexander Teplitsky, John Neystadt | 2015-06-09 |
| 9032492 | Distributed computer systems with time-dependent credentials | Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan | 2015-05-12 |
| 8996866 | Unobtrusive assurance of authentic user intent | Crispin Cowan, Matthew Z. Tamayo-Rios, Tanmoy Dutta, John J. Lambert, Scott A. Field +1 more | 2015-03-31 |
| 8984624 | Resource access based on multiple scope levels | Raja Pazhanivel Perumal, Jeffrey B. Hamblin | 2015-03-17 |
| 8863291 | Reputation checking of executable programs | Daniel Oliver, Anshul Rawat, Xiang Zheng Tu, Ryan Colvin, James H. Dooley +7 more | 2014-10-14 |
| 8813170 | Testing access policies | Mark F. Novak, Vishal Agarwal, David McPherson, Sunil P. Gottumukkala, Jignesh Shah +4 more | 2014-08-19 |
| 8640210 | Distributed computer systems with time-dependent credentials | Mark F. Novak, Yi Zeng, Saurav Sinha, K Michiko Short, Gopinathan Kannan | 2014-01-28 |
| 8640256 | File system operation and digital rights management (DRM) | David B. Cross | 2014-01-28 |
| 8627440 | PassThru for client authentication | David R. Mowers, Daniel R. Simon, John A. Banes | 2014-01-07 |
| 8621561 | Selective authorization based on authentication input attributes | David B. Cross, Mark F. Novak, Oded Ye Shekel, Andreas K. Luther, Thomas C. Jones | 2013-12-31 |
| 8555069 | Fast-reconnection of negotiable authentication network clients | Liqiang Zhu, Kevin Thomas Damour, David McPherson, Tanmoy Dutta | 2013-10-08 |
| 8468579 | Transformation of sequential access control lists utilizing certificates | Carl M. Ellison, Butler W. Lampson, Melissa W. Dunn, Ravindra Nath Pandya, Charles W. Kaufman | 2013-06-18 |
| 8464319 | Resource access based on multiple scope levels | Raja Pazhanivel Perumal, Jeffrey B. Hamblin | 2013-06-11 |
| 8381306 | Translating role-based access control policy to resource authorization policy | Dave M. McPherson, Muthukrishnan Paramasivam | 2013-02-19 |
| 8302149 | Virtual distributed security system | Giovanni M. Della-Libera, Christopher G. Kaler, Scott A. Konersmann, Butler W. Lampson, Bradford H. Lovering +4 more | 2012-10-30 |
| 8266680 | Predictive HTTP authentication mode negotiation | Rick T. James, Jonathan A. Silvera, Matthew R. Cox, Anil K. Ruia, Anish Desai | 2012-09-11 |
| 8230485 | Method and system for controlling access privileges for trusted network nodes | Sterling Reasor, Ramesh Chinta, John Brezak, Eric Flo | 2012-07-24 |
| 8225390 | Licensing protected content to application sets | Kenneth D. Ray, Pankaj Mohan Kamat, Charles W. Kaufman, William R. Tipton, Andrew Herron +5 more | 2012-07-17 |
| 8214641 | File access in multi-protocol environment | Scott A. Field, Roopesh C. Battepati, Michael C. Johnson | 2012-07-03 |