Patent | Date |
---|
Security Compliance For A Secure Landing Zone App 20220300603 - Geiger; Adam Robert ;   et al. | 2022-09-22 |
Optimized performance through leveraging appropriate disk sectors for defragmentation in an erasure coded heterogeneous object storage cloud Grant 11,119,655 - Baldwin , et al. September 14, 2 | 2021-09-14 |
Leveraging social relationships to enhance computer security Grant 11,095,654 - Nagaratnam , et al. August 17, 2 | 2021-08-17 |
Context aware recertification Grant 11,082,414 - Dharmarajan , et al. August 3, 2 | 2021-08-03 |
Trusted statement verification for data privacy Grant 10,984,457 - Byrd , et al. April 20, 2 | 2021-04-20 |
Key identifiers in an obliviousness pseudorandom function (OPRF)-based key management service (KMS) Grant 10,887,293 - Resch , et al. January 5, 2 | 2021-01-05 |
Enhanced security using wearable device with authentication system Grant 10,841,315 - Nagaratnam , et al. November 17, 2 | 2020-11-17 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 10,834,100 - Hoy , et al. November 10, 2 | 2020-11-10 |
Secure trust based distribution of digital certificates Grant 10,819,527 - Bojjireddy , et al. October 27, 2 | 2020-10-27 |
Secure trust based distribution of digital certificates Grant 10,812,276 - Bojjireddy , et al. October 20, 2 | 2020-10-20 |
Facilitating build and deploy runtime memory encrypted cloud applications and containers Grant 10,776,459 - Bojjireddy , et al. Sept | 2020-09-15 |
High-efficiency deduplication module of a database-management system Grant 10,754,835 - Dolph , et al. A | 2020-08-25 |
Enforcing security policies for software containers Grant 10,713,031 - Iyer , et al. | 2020-07-14 |
Tier based data file management Grant 10,671,285 - Dolph , et al. | 2020-06-02 |
Application-based security rights in cloud environments Grant 10,673,900 - Nagaratnam , et al. | 2020-06-02 |
User state tracking and anomaly detection in software-as-a-service environments Grant 10,673,885 - Muthukrishnan , et al. | 2020-06-02 |
Augmenting gesture based security technology using mobile devices Grant 10,628,682 - Hoy , et al. | 2020-04-21 |
Cognitive psychology authentication in multi-factor authentication systems Grant 10,587,423 - Nagaratnam , et al. | 2020-03-10 |
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments App 20200067877 - Hoy; Jeffrey R. ;   et al. | 2020-02-27 |
Optimized performance through leveraging appropriate disk sectors for defragmentation in an erasure coded heterogeneous object storage cloud Grant 10,528,261 - Baldwin , et al. J | 2020-01-07 |
Context-driven on-device data protection Grant 10,528,748 - Nagaratnam , et al. J | 2020-01-07 |
Optimized Performance Through Leveraging Appropriate Disk Sectors For Defragmentation In An Erasure Coded Heterogeneous Object S App 20190377499 - Baldwin; Duane ;   et al. | 2019-12-12 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 10,505,904 - Hoy , et al. Dec | 2019-12-10 |
Secure Trust Based Distribution of Digital Certificates App 20190372785 - Bojjireddy; Karunakar ;   et al. | 2019-12-05 |
Key Identifiers In An Obliviousness Pseudorandom Function (oprf)-based Key Management Service (kms) App 20190297064 - Resch; Jason K. ;   et al. | 2019-09-26 |
Secure Trust Based Distribution Of Digital Certificates App 20190268166 - Bojjireddy; Karunakar ;   et al. | 2019-08-29 |
Leveraging Social Relationships to Enhance Computer Security App 20190260756 - Nagaratnam; Nataraj ;   et al. | 2019-08-22 |
Enhance computer security by utilizing an authorized user set Grant 10,389,725 - Nagaratnam , et al. A | 2019-08-20 |
Facilitating Build And Deploy Runtime Memory Encrypted Cloud Applications And Containers App 20190180006 - Bojjireddy; Karunakar ;   et al. | 2019-06-13 |
Optimized Performance Through Leveraging Appropriate Disk Sectors For Defragmentation In An Erasure Coded Heterogeneous Object S App 20190171369 - Baldwin; Duane ;   et al. | 2019-06-06 |
User state tracking and anomaly detection in software-as-a-service environments App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al. | 2019-06-06 |
Enhanced Security Using Wearable Device with Authentication System App 20190166130 - Nagaratnam; Nataraj ;   et al. | 2019-05-30 |
Cognitive Psychology Authentication In Multi-factor Authentication Systems App 20190158477 - Nagaratnam; Nataraj ;   et al. | 2019-05-23 |
Enforcing Security Policies For Software Containers App 20190114161 - Iyer; Sreekanth R. ;   et al. | 2019-04-18 |
Enforcing security policies for software containers Grant 10,255,054 - Iyer , et al. | 2019-04-09 |
Enhanced security using wearable device with authentication system Grant 10,243,961 - Nagaratnam , et al. | 2019-03-26 |
Secure application zones for cloud burst environments Grant 10,244,002 - Hoy , et al. | 2019-03-26 |
Using everyday objects as cryptographic keys Grant 10,237,064 - Hoy , et al. | 2019-03-19 |
Context-based cloud security assurance system Grant 10,212,190 - Nagaratnam , et al. Feb | 2019-02-19 |
Tier Based Data File Management App 20190050150 - Dolph; Blaine H. ;   et al. | 2019-02-14 |
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments App 20190052601 - Hoy; Jeffrey R ;   et al. | 2019-02-14 |
User state tracking and anomaly detection in software-as-a-service environments Grant 10,200,387 - Muthukrishnan , et al. Fe | 2019-02-05 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 10,142,293 - Hoy , et al. Nov | 2018-11-27 |
Tier based data file management Grant 10,133,484 - Dolph , et al. November 20, 2 | 2018-11-20 |
Leveraging mobile devices to enforce restricted area security Grant 10,028,139 - Iyer , et al. July 17, 2 | 2018-07-17 |
Secure application zones for cloud burst environments App 20180124119 - Hoy; Jeffrey Robert ;   et al. | 2018-05-03 |
Using everyday objects as cryptographic keys App 20180109380 - Hoy; Jeffrey Robert ;   et al. | 2018-04-19 |
Context-based cloud security assurance system App 20180103067 - Nagaratnam; Nataraj ;   et al. | 2018-04-12 |
Identity context-based access control Grant 9,916,461 - Kapadia , et al. March 13, 2 | 2018-03-13 |
Using everyday objects as cryptographic keys Grant 9,912,477 - Hoy , et al. March 6, 2 | 2018-03-06 |
Administration of a context-based cloud security assurance system Grant 9,912,701 - Nagaratnam , et al. March 6, 2 | 2018-03-06 |
Tier Based Data File Management App 20180059949 - Dolph; Blaine H. ;   et al. | 2018-03-01 |
Enhanced Security Using Wearable Device with Authentication System App 20180063149 - Nagaratnam; Nataraj ;   et al. | 2018-03-01 |
Tier based data file management Grant 9,891,830 - Dolph , et al. February 13, 2 | 2018-02-13 |
Secure application zones for cloud burst environments Grant 9,888,040 - Hoy , et al. February 6, 2 | 2018-02-06 |
Application-based security rights in cloud environments App 20180027022 - Nagaratnam; Nataraj ;   et al. | 2018-01-25 |
Augmenting gesture based security technology for improved classification and learning Grant 9,875,399 - Hoy , et al. January 23, 2 | 2018-01-23 |
Administration of a context-based cloud security assurance system Grant 9,876,822 - Nagaratnam , et al. January 23, 2 | 2018-01-23 |
High-efficiency Deduplication Module Of A Database-management System App 20180018354 - Dolph; Blaine H. ;   et al. | 2018-01-18 |
Deployment using a context-based cloud security assurance system Grant 9,871,822 - Nagaratnam , et al. January 16, 2 | 2018-01-16 |
Leveraging Social Relationships to Enhance Computer Security App 20180007056 - Nagaratnam; Nataraj ;   et al. | 2018-01-04 |
Using everyday objects as cryptographic keys App 20170353307 - Hoy; Jeffrey Robert ;   et al. | 2017-12-07 |
Context-based cloud security assurance system Grant 9,838,431 - Nagaratnam , et al. December 5, 2 | 2017-12-05 |
Optimizing database deduplication Grant 9,830,342 - Dolph , et al. November 28, 2 | 2017-11-28 |
Augmenting Gesture Based Security Technology For Improved Classification And Learning App 20170316259 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Augmenting Gesture Based Security Technology Using Mobile Devices App 20170316260 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Augmenting Gesture Based Security Technology For Improved Differentiation App 20170316258 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Context-Driven On-Device Data Protection App 20170308713 - Nagaratnam; Nataraj ;   et al. | 2017-10-26 |
Enforcing Security Policies For Software Containers App 20170300697 - Iyer; Sreekanth R. ;   et al. | 2017-10-19 |
Managing service access through social context Grant 9,792,293 - Cherian , et al. October 17, 2 | 2017-10-17 |
Context aware data protection Grant 9,767,301 - Jandhyala , et al. September 19, 2 | 2017-09-19 |
Application-based security rights in cloud environments Grant 9,762,616 - Nagaratnam , et al. September 12, 2 | 2017-09-12 |
Leveraging mobile devices to enforce restricted area security Grant 9,756,173 - Iyer , et al. September 5, 2 | 2017-09-05 |
Manufacturing and distribution to avoid counterfeit products Grant 9,727,899 - Kesavan , et al. August 8, 2 | 2017-08-08 |
Mitigating distribution and consumption of counterfeit products Grant 9,727,902 - Kesavan , et al. August 8, 2 | 2017-08-08 |
Using everyday objects as cryptographic keys Grant 9,729,318 - Hoy , et al. August 8, 2 | 2017-08-08 |
Tier Based Data File Management App 20170206014 - Dolph; Blaine H. ;   et al. | 2017-07-20 |
Pre and post purchase identification of counterfeit products Grant 9,710,834 - Kesavan , et al. July 18, 2 | 2017-07-18 |
Context Aware Recertification App 20170201505 - Dharmarajan; Manjeri R. ;   et al. | 2017-07-13 |
Cost-based configuration using a context-based cloud security assurance system Grant 9,699,213 - Nagaratnam , et al. July 4, 2 | 2017-07-04 |
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments App 20170171158 - Hoy; Jeffrey Robert ;   et al. | 2017-06-15 |
User state tracking and anomaly detection in software-as-a-service environments App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al. | 2017-06-01 |
Controlling enterprise data on mobile device via the use of a tag index Grant 9,665,576 - Kapoor , et al. May 30, 2 | 2017-05-30 |
Controlling enterprise data on mobile device via the use of a tag index Grant 9,665,577 - Kapoor , et al. May 30, 2 | 2017-05-30 |
Tier based data file management Grant 9,658,781 - Dolph , et al. May 23, 2 | 2017-05-23 |
Mobile-optimized Captcha System Based On Multi-modal Gesture Challenge And Mobile Orientation App 20170104740 - Hoy; Jeffrey R. ;   et al. | 2017-04-13 |
System and method for software defined deployment of security appliances using policy templates Grant 9,621,592 - Ashley , et al. April 11, 2 | 2017-04-11 |
Using everyday objects as cryptographic keys App 20170099140 - Hoy; Jeffrey Robert ;   et al. | 2017-04-06 |
System and method for software defined deployment of security appliances using policy templates Grant 9,609,023 - Ashley , et al. March 28, 2 | 2017-03-28 |
Context aware recertification Grant 9,607,142 - Dharmarajan , et al. March 28, 2 | 2017-03-28 |
Application self-service for assured log management in cloud environments Grant 9,578,063 - Iyer , et al. February 21, 2 | 2017-02-21 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 9,571,457 - Hoy , et al. February 14, 2 | 2017-02-14 |
Application-based security rights in cloud environments App 20170041347 - Nagaratnam; Nataraj ;   et al. | 2017-02-09 |
Secure application zones for cloud burst environments App 20170013021 - Hoy; Jeffrey Robert ;   et al. | 2017-01-12 |
Leveraging mobile devices to enforce restricted area security App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al. | 2016-09-29 |
Leveraging mobile devices to enforce restricted area security App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al. | 2016-09-29 |
Providing context-based visibility of cloud resources in a multi-tenant environment Grant 9,444,820 - Muppidi , et al. September 13, 2 | 2016-09-13 |
Providing context-based visibility of cloud resources in a multi-tenant environment Grant 9,444,819 - Muppidi , et al. September 13, 2 | 2016-09-13 |
Automatic reconfiguration of network parameters during file system failover Grant 9,426,023 - Chennamsetty , et al. August 23, 2 | 2016-08-23 |
System And Method For Software Defined Deployment Of Security Appliances Using Policy Templates App 20160234224 - ASHLEY; Paul Anthony ;   et al. | 2016-08-11 |
System And Method For Software Defined Deployment Of Security Appliances Using Policy Templates App 20160234250 - ASHLEY; Paul Anthony ;   et al. | 2016-08-11 |
Administration of a context-based cloud security assurance system App 20160212175 - Nagaratnam; Nataraj ;   et al. | 2016-07-21 |
Techniques for information protection in a solid-state device based storage pool Grant 9,389,950 - Chennamsetty , et al. July 12, 2 | 2016-07-12 |
Cost-based configuration using a context-based cloud security assurance system App 20160156663 - Nagaratnam; Nataraj ;   et al. | 2016-06-02 |
Deployment using a context-based cloud security assurance system App 20160156662 - Nagaratnam; Nataraj ;   et al. | 2016-06-02 |
Administration of a context-based cloud security assurance system App 20160156664 - Nagaratnam; Nataraj ;   et al. | 2016-06-02 |
Context-based cloud security assurance system App 20160156661 - Nagaratnam; Nataraj ;   et al. | 2016-06-02 |
Optimizing Database Deduplication App 20160147797 - Dolph; Blaine H. ;   et al. | 2016-05-26 |
Tier Based Data File Management App 20160139821 - Dolph; Blaine H. ;   et al. | 2016-05-19 |
Techniques For Information Protection In A Solid-state Device Based Storage Pool App 20160139981 - CHENNAMSETTY; RAMAMOHAN ;   et al. | 2016-05-19 |
Dynamic Password-less User Verification App 20160142909 - Allen; Corville O. ;   et al. | 2016-05-19 |
Dynamic password-less user verification Grant 9,338,652 - Allen , et al. May 10, 2 | 2016-05-10 |
Declarative instance based access control for application resources with persisted attributes and state Grant 9,292,305 - Poddar , et al. March 22, 2 | 2016-03-22 |
Automatic Reconfiguration Of Network Parameters During File System Failover App 20160043894 - Chennamsetty; Ramamohan ;   et al. | 2016-02-11 |
Database authorization rules and component logic authorization rules aggregation Grant 9,160,752 - Goldszmidt , et al. October 13, 2 | 2015-10-13 |
Managing Service Access Through Social Context App 20150254269 - Cherian; Alex ;   et al. | 2015-09-10 |
Providing context-based visibility of cloud resources in a multi-tenant environment App 20150200958 - Muppidi; Sridhar R. ;   et al. | 2015-07-16 |
Providing context-based visibility of cloud resources in a multi-tenant environment App 20150200941 - Muppidi; Sridhar R. ;   et al. | 2015-07-16 |
Security management for an integrated console for applications associated with multiple user registries Grant 8,745,387 - Choudhary , et al. June 3, 2 | 2014-06-03 |
Federating policies from multiple policy providers Grant 8,683,545 - Nadalin , et al. March 25, 2 | 2014-03-25 |
Identity context-based access control App 20140075492 - Kapadia; Kaushal Kiran ;   et al. | 2014-03-13 |
Controlling Enterprise Data On Mobile Device Via The Use Of A Tag Index App 20130305058 - Kapoor; Shalini ;   et al. | 2013-11-14 |
Controlling Enterprise Data On Mobile Device Via The Use Of A Tag Index App 20130304702 - Kapoor; Shalini ;   et al. | 2013-11-14 |
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable program Grant 8,560,857 - Munetoh , et al. October 15, 2 | 2013-10-15 |
Context Aware Recertification App 20130067538 - Dharmarajan; Manjeri R. ;   et al. | 2013-03-14 |
Type independent permission based access control Grant 8,387,111 - Koved , et al. February 26, 2 | 2013-02-26 |
Trust and identity in secure calendar sharing collaboration Grant 8,261,329 - Gurney , et al. September 4, 2 | 2012-09-04 |
Security management for an integrated console for applications associated with multiple user registries Grant 8,261,331 - Choudhary , et al. September 4, 2 | 2012-09-04 |
Security Management For An Integrated Console For Applications Associated With Multiple User Registries App 20120210419 - CHOUDHARY; SAMAR ;   et al. | 2012-08-16 |
Information Processing Apparatus, A Server Apparatus, A Method Of An Information Processing Apparatus, A Method Of A Server Apparatus, And An Apparatus Executable Program App 20120185694 - MUNETOH; SEIJI ;   et al. | 2012-07-19 |
Context Aware Data Protection App 20120185952 - Jandhyala; Srinivas ;   et al. | 2012-07-19 |
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process Grant 8,171,295 - Munetoh , et al. May 1, 2 | 2012-05-01 |
Classification and policy management for software components Grant 8,112,370 - Muppidi , et al. February 7, 2 | 2012-02-07 |
Pre And Post Purchase Identification Of Counterfeit Products App 20110302095 - Kesavan; Sanjay Mecheri ;   et al. | 2011-12-08 |
Mitigating Distribution And Consumption Of Counterfeit Products App 20110302093 - Kesavan; Sanjay Mecheri ;   et al. | 2011-12-08 |
Manufacturing And Distribution To Avoid Counterfeit Products App 20110302094 - Kesavan; Sanjay Mecheri ;   et al. | 2011-12-08 |
Context Aware Data Protection App 20110296430 - Jandhyala; Srinivas ;   et al. | 2011-12-01 |
Discovery And Management Of Context-based Entitlements Across Loosely-coupled Environments App 20110162034 - NAGARATNAM; NATARAJ ;   et al. | 2011-06-30 |
Trust And Identity In Secure Calendar Sharing Collaboration App 20100306824 - Gurney; Daniel C. ;   et al. | 2010-12-02 |
Classification And Policy Management For Software Components App 20100076914 - Muppidi; Sridhar R. ;   et al. | 2010-03-25 |
Role-based access control management for multiple heterogeneous application components Grant 7,676,831 - Britton , et al. March 9, 2 | 2010-03-09 |
Federating Policies From Multiple Policy Providers App 20100043050 - Nadalin; Anthony J. ;   et al. | 2010-02-18 |
Method and system for implementing authorization policies for web services Grant 7,657,924 - Hondo , et al. February 2, 2 | 2010-02-02 |
Declarative Instance Based Access Control For Application Resources With Persisted Attributes And State App 20090183184 - Nadalin; Anthony J. ;   et al. | 2009-07-16 |
Identity Data Model Broker App 20090171989 - Byrd; Gregory T. ;   et al. | 2009-07-02 |
Database Authorization Rules And Component Logic Authorization Rules Aggregation App 20090064272 - Goldszmidt; German S. ;   et al. | 2009-03-05 |
Trusted Statement Verification For Data Privacy App 20090063289 - Byrd; Gregory T. ;   et al. | 2009-03-05 |
Pluggable trust adapter architecture, method and program product for processing communications Grant 7,475,239 - Fulkerson, Jr. , et al. January 6, 2 | 2009-01-06 |
Role-based Authorization Using Conditional Permissions App 20080168528 - Lin; Dah-Haur ;   et al. | 2008-07-10 |
Method and system for variable scale time management for simulation environments App 20080154559 - Ram; Chethan ;   et al. | 2008-06-26 |
Method, System, And Program Product For Controlling Access To Personal Attributes Across Enterprise Domains App 20080027939 - Chalasani; Nanchariah R. ;   et al. | 2008-01-31 |
Method, apparatus, and program for automated trust zone partitioning Grant 7,272,714 - Nagaratnam , et al. September 18, 2 | 2007-09-18 |
Security management for an integrated console for applications associated with multiple user registries App 20070180498 - Choudhary; Samar ;   et al. | 2007-08-02 |
Role-based access control management for multiple heterogeneous application components App 20070056026 - Britton; Kathryn H. ;   et al. | 2007-03-08 |
Secure data communications in web services App 20060294383 - Austel; Paula ;   et al. | 2006-12-28 |
Role-permission model for security policy administration and enforcement Grant 7,124,192 - High, Jr. , et al. October 17, 2 | 2006-10-17 |
Method And System For Implementing Authorization Policies For Web Services App 20060230430 - Hondo; Maryann ;   et al. | 2006-10-12 |
Securing non-EJB corba objects using an EJB security mechanism Grant 7,076,798 - Chang , et al. July 11, 2 | 2006-07-11 |
Securing cached data in enterprise environments Grant 7,051,201 - Cuomo , et al. May 23, 2 | 2006-05-23 |
Method and apparatus for securing session information of users in a web application server environment Grant 7,043,455 - Cuomo , et al. May 9, 2 | 2006-05-09 |
Method and apparatus for processing requests in a network data processing system based on a trust association between servers Grant 6,965,939 - Cuomo , et al. November 15, 2 | 2005-11-15 |
Declarative trust model between reverse proxy server and websphere application server App 20050154886 - Birk, Peter Daniel ;   et al. | 2005-07-14 |
Information processing apparatus, a server apparatus, a method of an information processing apparatus, a method of a server apparatus, and an apparatus executable process App 20050120219 - Munetoh, Seiji ;   et al. | 2005-06-02 |
Security context maintenance within a distributed environment App 20040250125 - Janson, Philippe A. ;   et al. | 2004-12-09 |
Pluggable trust adapter architecture, method and program product for processing communications App 20040059931 - Fulkerson, Carroll Eugene JR. ;   et al. | 2004-03-25 |
Method, apparatus, and program for automated trust zone partitioning App 20030233543 - Nagaratnam, Nataraj ;   et al. | 2003-12-18 |
Securing cached data in enterprise environments App 20030177386 - Cuomo, Gennaro A. ;   et al. | 2003-09-18 |
Securing non-EJB corba objects using an EJB security mechanism App 20030149893 - Chang, David Yu ;   et al. | 2003-08-07 |
Method and apparatus for implementing permission based access control through permission type inheritance App 20030084325 - Koved, Lawrence ;   et al. | 2003-05-01 |
Method and apparatus for type independent permission based access control App 20030084324 - Koved, Lawrence ;   et al. | 2003-05-01 |
Role-permission model for security policy administration and enforcement App 20030046576 - High, Robert Howard JR. ;   et al. | 2003-03-06 |
Method and apparatus for enforcing security policies in Java applications App 20030018909 - Cuomo, Gennaro A. ;   et al. | 2003-01-23 |
Method and apparatus for processing requests in a network data processing system based on a trust association between servers App 20020091757 - Cuomo, Gennaro A. ;   et al. | 2002-07-11 |
Method and apparatus for controlling software access to system resources Grant 6,317,742 - Nagaratnam , et al. November 13, 2 | 2001-11-13 |