| 10069839 |
Determine approximate current time on a client using secure protocol metadata |
Sarath Madakasira |
2018-09-04 |
| 9660817 |
Advising clients about certificate authority trust |
Anooshiravan Saboori, Muhammad Umar Janjua, Nelly Porter, Haitao Li, Xiaohong Su +4 more |
2017-05-23 |
| 9553730 |
Certificating authority trust evaluation |
Anooshiravan Saboor, Muhammad Umar Janjua, Nelly Porter, Haitao Li, Xiaohong Su +2 more |
2017-01-24 |
| 9553732 |
Certificate evaluation for certificate authority reputation advising |
Anooshiravan Saboori, Muhammad Umar Janjua, Nelly Porter, Haitao Li, Xiaohong Su +2 more |
2017-01-24 |
| 9477832 |
Digital identity management |
David B. Cross, Matthew W. Thomlinson, Thomas C. Jones |
2016-10-25 |
| 9281948 |
Revocation information for revocable items |
Yogesh A. Mehta, Violet Anna Barhudarian, Magnus Bo Gustaf Nyström |
2016-03-08 |
| 9183361 |
Resource access authorization |
Oludare Obasanjo, Stephen R. Gordon, Aleksandr Radutskiy, Atanas D. Oskov, Jeremy D. Viegas +1 more |
2015-11-10 |
| 8819797 |
Digital identity management |
David B. Cross, Matthew W. Thomlinson, Thomas C. Jones |
2014-08-26 |
| 8151332 |
Digital identity management |
David B. Cross, Matthew W. Thomlinson, Thomas C. Jones |
2012-04-03 |
| 7984488 |
Credential roaming in electronic computing systems |
David B. Cross, Xiaohong Su, Hao Zhuang |
2011-07-19 |
| 7818575 |
Efficient retrieval of cryptographic evidence |
David B. Cross, Kelvin S. Yiu, Ryan M. Hurst, Vishal Agarwal |
2010-10-19 |
| 7703128 |
Digital identity management |
David B. Cross, Matthew W. Thomlinson, Thomas C. Jones |
2010-04-20 |
| 7577848 |
Systems and methods for validating executable file integrity using partial image hashes |
Jonathan Schwartz, Yu Lin Sie |
2009-08-18 |
| 7240194 |
Systems and methods for distributing trusted certification authorities |
John J. Lambert, Klaus Schutz, Sunil Pai |
2007-07-03 |
| 7143165 |
Updating trusted root certificates on a client computer |
Keith R. Vogel, Charlie Chase, Kelvin S. Yiu, Louis Kelly Thomas |
2006-11-28 |
| 6816900 |
Updating trusted root certificates on a client computer |
Keith R. Vogel, Charlie Chase, Kelvin S. Yiu, Louis Kelly Thomas |
2004-11-09 |
| 6754661 |
Hierarchical storage systems for holding evidentiary objects and methods of creating and operating upon hierarchical storage systems |
Keith R. Vogel, Kirt Debique |
2004-06-22 |