Issued Patents All Time
Showing 376–400 of 523 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9240929 | Techniques for network replication | Swaminathan Sivasubramanian, Bradley E. Marshall, Tate Andrew Certain | 2016-01-19 |
| 9235714 | Preventing persistent storage of cryptographic information using signaling | Todd Lawrence Cignetti, Robert Eric Fitzgerald, Andrew J. Doane | 2016-01-12 |
| 9237019 | Resource locators with keys | Gregory Branchek Roth | 2016-01-12 |
| 9235401 | Deploying updates to an application during periods of off-peak demand | Joseph E. Fitzgerald, Marvin M. Theimer, Benjamin Warren Mercier | 2016-01-12 |
| 9231923 | Secure data destruction in a distributed environment using key protection mechanisms | Todd Lawrence Cignetti, Andrew J. Doane, Robert Eric Fitzgerald | 2016-01-05 |
| 9231963 | Detecting anomalous behavior patterns in an electronic environment | Aaron Douglas Dokey, Ian Roger Searle | 2016-01-05 |
| 9231930 | Virtual endpoints for request authentication | Gregory Branchek Roth, Graeme David Baer | 2016-01-05 |
| 9225744 | Constrained credentialed impersonation | Bradley Jeffery Behm, Gregory Branchek Roth, Matthew Allen Estes, Patrick J. Ward | 2015-12-29 |
| 9223790 | Managing deletion of data in a data storage system | — | 2015-12-29 |
| 9219648 | Best practice analysis, automatic remediation | Mahendra Manshi Chheda, Shawn E. Heidel, Robert B. Jaye, Justin K. Brindley-Koonce | 2015-12-22 |
| 9219679 | Using virtual networking devices to manage routing cost information | Kevin Christopher Miller, Andrew J. Doane | 2015-12-22 |
| 9215076 | Key generation for hierarchical data access | Gregory Branchek Roth, Marc R. Barbour, Bradley Jeffery Behm, Cristian M. Ilac | 2015-12-15 |
| 9210041 | Using virtual networking devices to manage network configuration | Kevin Christopher Miller, Andrew J. Doane | 2015-12-08 |
| 9203747 | Providing virtual networking device functionality for managed computer networks | Kevin Christopher Miller, Andrew J. Doane | 2015-12-01 |
| 9203613 | Techniques for client constructed sessions | Gregory Branchek Roth, Nathan R. Fitch, Cristian M. Ilac, Eric D. Crahen | 2015-12-01 |
| 9197409 | Key derivation techniques | Gregory Branchek Roth, Bradley Jeffery Behm, Eric D. Crahen, Cristian M. Ilac, Nathan R. Fitch +1 more | 2015-11-24 |
| 9197502 | Best practice analysis, migration advisor | Mahendra Manshi Chheda, Shawn E. Heidel, Robert B. Jaye, Justin K. Brindley-Koonce | 2015-11-24 |
| 9197610 | Packet authentication and encryption in virtual networks | Ian Roger Searle | 2015-11-24 |
| 9195805 | Adaptive responses to trickle-type denial of service attacks | — | 2015-11-24 |
| 9189343 | Frequent data set captures for volume forensics | — | 2015-11-17 |
| 9183028 | Managing virtual computing nodes | Don Johnson, Marvin M. Theimer | 2015-11-10 |
| 9178701 | Parameter based key derivation | Gregory Branchek Roth, Bradley Jeffery Behm, Eric D. Crahen, Cristian M. Ilac, Nathan R. Fitch +1 more | 2015-11-03 |
| 9165120 | Service manifests | Don Johnson, Marvin M. Theimer | 2015-10-20 |
| 9166992 | Methods and apparatus for providing network traffic monitoring services | Thomas Charles Stickle | 2015-10-20 |
| 9147086 | Trusted computing host | Nachiketh Rao Potlapally, Michael David Marr, Donald L. Bailey | 2015-09-29 |