| 9529986 |
Utilizing multiple computing devices to verify identity |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-12-27 |
| 9491313 |
Optimizing storage between mobile devices and cloud storage providers |
James W. Murray, James T. Swantek, James S. Worley |
2016-11-08 |
| 9424736 |
Asset-based weather and event alerts |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-08-23 |
| 9413786 |
Dynamic enterprise security control based on user risk factors |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-08-09 |
| 9392019 |
Managing cyber attacks through change of network address |
James W. Murray, James T. Swantek, James S. Worley |
2016-07-12 |
| 9363158 |
Reduce size of IPV6 routing tables by using a bypass tunnel |
James W. Murray, James T. Swantek, James S. Worley |
2016-06-07 |
| 9350754 |
Mitigating a cyber-security attack by changing a network address of a system under attack |
James W. Murray, James T. Swantek, James S. Worley |
2016-05-24 |
| 9298901 |
Credential validation using multiple computing devices |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-03-29 |
| 9292891 |
Recovery of time due to an unplanned event on a reserved route |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-03-22 |
| 9270523 |
Reconfiguring interrelationships between components of virtual computing networks |
James W. Murray, James T. Swantek, James S. Worley |
2016-02-23 |
| 9246973 |
Identifying and transitioning to an improved VoIP session |
Martinianus B. Hadinata, Laurent Hayem, John E. Moore, Jr. |
2016-01-26 |
| 9231958 |
Visually representing and managing access control of resources |
Gregory J. Boss, Andrew R. Jones, Kevin C. McConnell, John E. Moore, Jr. |
2016-01-05 |