| 10129341 |
Automated configuration of endpoint security management |
Robert A. May, Jinhai Yang, Kunal Marwah |
2018-11-13 |
| 10104121 |
Application layer-based single sign on |
Wei Wang, Ihab Khalil |
2018-10-16 |
| 10091248 |
Context-aware pattern matching accelerator |
Zhi Guo, Hongbin Lu, Xu Zhou, Lin Huang |
2018-10-02 |
| 10069794 |
Systems and methods for passing network traffic content |
Bing Xie |
2018-09-04 |
| 9965368 |
High-availability cluster architecture and protocol |
Jingyu Liu, Xianfeng Deng |
2018-05-08 |
| 9934112 |
High-availability cluster architecture and protocol |
Jingyu Liu, Xianfeng Deng |
2018-04-03 |
| 9930054 |
Detecting network traffic content |
— |
2018-03-27 |
| 9917814 |
Automated configuration of endpoint security management |
Robert A. May, Jinhai Yang, Kunal Marwah |
2018-03-13 |
| 9916603 |
Network advertising system |
Kunhua Lin |
2018-03-13 |
| 9917813 |
Interface groups for rule-based network security |
Yixin Pan, Hongwei Li |
2018-03-13 |
| 9917842 |
Inheritance based network management |
Langtian Du, Jun Li |
2018-03-13 |
| 9906540 |
Detecting network traffic content |
— |
2018-02-27 |
| 9894034 |
Automated configuration of endpoint security management |
Robert A. May, Jinhai Yang |
2018-02-13 |
| 9892257 |
Efficient data transfer in a virus co-processing system |
Xu Zhou, Lin Huang |
2018-02-13 |
| 9887985 |
Management of certificate authority (CA) certificates |
Jinhai Yang |
2018-02-06 |
| 9859965 |
Telecommunication terminal |
Koroush Akhavan-Saraf |
2018-01-02 |
| 9860215 |
Firewall interface configuration to enable bi-directional VoIP traversal communications |
— |
2018-01-02 |
| 9860211 |
Data leak protection |
Michael D. Nelson |
2018-01-02 |