| 8505068 |
Deriving express rights in protected content |
Tejas D. Patel, Gregory Kostal, Vladimir Yarmolenko, Pankaj Mohan Kamat, Krassimir Emilov Karamfilov |
2013-08-06 |
| 8448228 |
Separating authorization identity from policy enforcement identity |
Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko, Pankaj Mohan Kamat +5 more |
2013-05-21 |
| 8447976 |
Business to business secure mail |
Chandresh K. Jain, Mayank Mehta, Frank Byrum, Edward Thomas Banti, Ayse Yesim Koman +11 more |
2013-05-21 |
| 8156538 |
Distribution of information protection policies to client machines |
Abhijat Kanade, Rushmi U. Malaviarachchi, Peter David Waxman, Gregory Kostal, Scott C. Cottrille +4 more |
2012-04-10 |
| 7987496 |
Automatic application of information protection policies |
Duncan G. Bryce, Scott C. Cottrille, Pankaj Mohan Kamat, Krassimir Emilov Karamfilov, Gregory Kostal +2 more |
2011-07-26 |
| 7882035 |
Pre-performing operations for accessing protected content |
Scott C. Cottrille, Gregory Kostal, Rushmi U. Malaviarachchi, Jeffrey M. Brown, Umesh R. Dhond +5 more |
2011-02-01 |
| 7509489 |
Format-agnostic system and method for issuing certificates |
Gregory Kostal, Muthukrishnan Paramasivam, Ravindra Nath Pandya, Scott C. Cottrille, Vasantha Ravula +2 more |
2009-03-24 |
| 7500097 |
Extendable data-driven system and method for issuing certificates |
Gregory Kostal, Muthukrishnan Paramasivam, Ravindra Nath Pandya, Scott C. Cottrille, Vasantha Ravula +2 more |
2009-03-03 |