Issued Patents All Time
Showing 76–100 of 100 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10031682 | Methods for improved data store migrations and devices thereof | Tijin George, Cheryl Marie Thompson | 2018-07-24 |
| 9965195 | Methods and systems for efficiently storing data at a plurality of storage tiers using a transfer data structure | Cheryl Marie Thompson, Sunitha Sunil Sankar | 2018-05-08 |
| 9959056 | Methods and systems for efficiently storing data at a plurality of storage tiers using a transfer data structure | Cheryl Marie Thompson, Sunitha Sunil Sankar | 2018-05-01 |
| 9811259 | Read I/O completions outside file operating system domain | Manish Katiyar, Ravikanth Dronamraju | 2017-11-07 |
| 9792043 | Methods and systems for efficiently storing data | Anil Paul Thoppil, Sunitha Sunil Sankar, Cheryl Marie Thompson | 2017-10-17 |
| 9715348 | Systems, methods and devices for block sharing across volumes in data storage systems | Subramaniam Periyagaram, Manish Katiyar | 2017-07-25 |
| 9395929 | Network storage server with integrated encryption, compression and deduplication capability | Hristo Bojinov | 2016-07-19 |
| 9043287 | Deduplication in an extent-based architecture | Subramaniam Periyagaram, Sandeep Yadav, Blake H. Lewis, Rickard E. Faith, Ashish Prakash +1 more | 2015-05-26 |
| 9043614 | Discarding sensitive data from persistent point-in-time image | — | 2015-05-26 |
| 8898206 | Mechanism for distributed inode to path traversal in a striped volume system | Tianyu Jiang, Richard P. Jernigan, IV, Wesley R. Witte | 2014-11-25 |
| 8824686 | Cluster key synchronization | Hiroshi Ishii, Hristo Bojinov | 2014-09-02 |
| 8611542 | Peer to peer key synchronization | Hiroshi Ishii, Hristo Bojinov | 2013-12-17 |
| 8607046 | System and method for signing a message to provide one-time approval to a plurality of parties | Joshua Silberman, Fumiaki Okushi | 2013-12-10 |
| 8600949 | Deduplication in an extent-based architecture | Subramaniam Periyagaram, Sandeep Yadav, Blake H. Lewis, Rickard E. Faith, Ashish Prakash +1 more | 2013-12-03 |
| 8589697 | Discarding sensitive data from persistent point-in-time image | — | 2013-11-19 |
| 8397083 | System and method for efficiently deleting a file from secure storage served by a storage system | Robert Jan Sussland, Lawrence Wen-Hao Chang | 2013-03-12 |
| 8364985 | Buffer-caches for caching encrypted data via copy-on-encrypt | Zi-Bin Yang | 2013-01-29 |
| 8285993 | System and method for establishing a shared secret among nodes of a security appliance | Robert Jan Sussland, Lawrence Wen-Hao Chang | 2012-10-09 |
| 8245050 | System and method for initial key establishment using a split knowledge protocol | Lawrence Wen-Hao Chang | 2012-08-14 |
| 8196182 | Distributed management of crypto module white lists | Robert Jan Sussland, Joshua Silberman, Lawrence Wen-Hao Chang | 2012-06-05 |
| 8190905 | Authorizing administrative operations using a split knowledge protocol | Lawrence Wen-Hao Chang | 2012-05-29 |
| 8116455 | System and method for securely initializing and booting a security appliance | Robert Jan Sussland, Lawrence Wen-Hao Chang | 2012-02-14 |
| 8042155 | System and method for generating a single use password based on a challenge/response protocol | Lawrence Wen-Hao Chang | 2011-10-18 |
| 7971234 | Method and apparatus for offline cryptographic key establishment | Robert Jan Sussland, Lawrence Wen-Hao Chang, Joshua Silberman | 2011-06-28 |
| 7958356 | System and method for establishing a shared secret among nodes of a security appliance | Robert Jan Sussland, Lawrence Wen-Hao Chang | 2011-06-07 |