| 10979449 |
Key throttling to mitigate unauthorized file access |
Russell Humphries, Kenneth D. Ray, Harald Schütz |
2021-04-13 |
| 10834061 |
Perimeter enforcement of encryption rules |
Russell Humphries, Gordon Sullivan, Kenneth D. Ray, Harald Schütz, Andreas Berger |
2020-11-10 |
| 10691824 |
Behavioral-based control of access to encrypted content by a process |
Kenneth D. Ray, Andrew J. Thomas, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-06-23 |
| 10686827 |
Intermediate encryption for exposed content |
Harald Schütz, Kenneth D. Ray, Andreas Berger |
2020-06-16 |
| 10681078 |
Key throttling to mitigate unauthorized file access |
Russell Humphries, Kenneth D. Ray, Harald Schütz |
2020-06-09 |
| 10657277 |
Behavioral-based control of access to encrypted content by a process |
Kenneth D. Ray, Andrew J. Thomas, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-05-19 |
| 10650154 |
Process-level control of encrypted content |
Kenneth D. Ray, Andrew J. Thomas, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2020-05-12 |
| 10628597 |
Just-in-time encryption |
Andreas Berger, Harald Schütz, Kenneth D. Ray, Norbert Gruber, Markus Hein +2 more |
2020-04-21 |
| 10558800 |
Labeling objects on an endpoint for encryption management |
Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more |
2020-02-11 |
| 10263966 |
Perimeter enforcement of encryption rules |
Russell Humphries, Gordon Sullivan, Kenneth D. Ray, Harald Schütz, Andreas Berger |
2019-04-16 |
| 9984248 |
Behavioral-based control of access to encrypted content by a process |
Kenneth D. Ray, Andrew J. Thomas, Harald Schütz, Andreas Berger, John Edward Tyrone Shaw |
2018-05-29 |
| 9965627 |
Labeling objects on an endpoint for encryption management |
Kenneth D. Ray, Daniel Salvatore Schiappa, Simon Neil Reed, Mark David Harris, Neil Robert Tyndale Watkiss +4 more |
2018-05-08 |