| 10791147 |
Device authentication based upon tunnel client network requests |
Jonathan Blake Brannon, Kabir A. Barday, Ashish Jain |
2020-09-29 |
| 10785196 |
Encryption key management of client devices and endpoints within a protected network |
Ramani Panchapakesan, Suman Aluvala, Niranjan Paramashivaiah, Mahesh Ashok Kavatage, Pavan Rajkumar Rangain |
2020-09-22 |
| 10740109 |
Configuring a computing device using managed operating system images |
Jason Roszak, Shravan Shantharam, Varun Murthy, Kalyan Regula, Blake Watts |
2020-08-11 |
| 10725756 |
Method and system for facilitating replacement of function calls |
Manish Jawa, Haim Tebeka |
2020-07-28 |
| 10708656 |
Provisioning work environments using virtual phone images |
Stephen Deasy, Emil Sit, Paul Wisner, David Furodet, Viktor Gyuris +2 more |
2020-07-07 |
| 10635819 |
Persistent enrollment of a computing device based on a temporary user |
Jason Roszak, Shravan Shantharam, Varun Murthy, Kalyan Regula, Blake Watts |
2020-04-28 |
| 10620965 |
Internet recovery of a windows configuration |
Jason Roszak, Shravan Shantharam, Varun Murthy, Kalyan Regula, Blake Watts |
2020-04-14 |