N Zuk, W Xu, Y Mao - US Patent 8,769,664, 2014 - Google Patents
Methods, systems, and apparatus, including computer program products, featuring receiving at a first security device a packet. The first security device determines that the packet is …
M Blatt, L Liptz - US Patent 11,989,113, 2024 - Google Patents
A device, system and method for debugging a homomorphically encrypted (HE) program. The HE program comprising real ciphertext data and encrypted operations in the HE space …
K Ramachandran, V Anand, N Yadav… - US Patent …, 2022 - Google Patents
H04L69/40—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass for recovering from a failure …
WR Schmieder, TL Wynn, NY Abdo… - US Patent 9,225,784, 2015 - Google Patents
In various embodiments, remote presentation encoding techniques may be modified in such a way that the data can be transmitted over transports without guaranteed packet delivery. In …
BL Mouttet - US Patent 9,965,251, 2018 - Google Patents
A processor includes a crossbar array including row wires and column wires wherein bit patterns representative of numerical values are stored in a plurality of columns of the …
K Ramachandran, V Anand, N Yadav… - US Patent …, 2024 - Google Patents
Various techniques for dynamic path selection and data flow forwarding are disclosed. For example, various systems, processes, and computer program products for dynamic path …
MD Kleinpeter, RV Kolluru - US Patent 11,831,684, 2023 - Google Patents
Abstract Systems and methods to rotate security assets used to for secure communications are disclosed. The system includes initiating a communication session between two servers …
E Stuntebeck - US Patent App. 17/357,336, 2021 - Google Patents
A cryptographic proxy service may be provided. Upon determining that data associated with a network destination comprises at least some sensitive data, a cryptographic service may …
S Coady, L Griffin - US Patent 11,423,141, 2022 - Google Patents
Intruder detection using quantum key distribution is disclosed. A request for a first key for use with a first application configured to execute on a computing device is received by a …