Hotspot


Archive | 2010

System and method for file-level data protection

Dallas De Atley; Gordon J. Freedman; Thomas Brogan Duffy; John Andrew Wright; Vrajesh Rajesh Bhavsar; Lucia Ballard; Michael Brouwer; Conrad Sauerwald; Mitchell D. Adler; Eric Brandon Tamura; David Rahardja; Carsten Guenther


Archive | 2012

System and method for wireless data protection

Conrad Sauerwald; Vrajesh Rajesh Bhavsar; Kenneth B. McNeil; Thomas Brogan Duffy; Michael Brouwer; Matthew J. Byom; Mitchell D. Adler; Eric Brandon Tamura


Archive | 2015

Context Based Data Access Control

Andrew R. Whalley; Wade Benson; Conrad Sauerwald


Archive | 2014

Key management using security enclave processor

R. Stephen Polzin; Fabrice L. Gautier; Mitchell D. Adler; Conrad Sauerwald; Michael Brouwer


Archive | 2014

Efficient secure instant messaging

Mitchell D. Adler; Michael Brouwer; Conrad Sauerwald


Archive | 2013

Securing in-app purchases

Thomas Alsina; Scott T. Boyd; Michael Kuohao Chu; Augustine J. Farrugia; Gianpaolo Fasoli; Patrice Gautier; Sean B. Kelly; Payam Mirrashidi; Pedraum R. Pardehpoosh; Conrad Sauerwald; Kenneth W. Scott; Rajit Shinh; Braden Thomas; Andrew R. Whalley


Archive | 2011

System and method for device dependent and rate limited key generation

Conrad Sauerwald; Joseph P. Bratt; Joshua de Cesare; Timothy J. Millet; Weihua Mao


Archive | 2008

Trust exception management

Mitchell D. Adler; Michael Brouwer; Conrad Sauerwald


Archive | 2011

Secure relocation of encrypted files

Conrad Sauerwald; Daniel J. Post; Eric Brandon Tamura; Matthew J. Byom; Puja Dilip Gupta


Archive | 2016

METHOD OF USING ONE DEVICE TO UNLOCK ANOTHER DEVICE

Conrad Sauerwald; Alexander Ledwith; John J. Iarocci; Marc J. Krochmal; Wade Benson; Gregory Novick; Noah A. Witherspoon

Researchain Logo
Decentralizing Knowledge