Issued Patents All Time
Showing 76–100 of 523 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11171836 | Providing virtual networking functionality for managed computer networks | Peter John Hill | 2021-11-09 |
| 11159554 | Correlating threat information across sources of distributed computing systems | Alexander Robin Gordon Lucas, Robert Eric Fitzgerald | 2021-10-26 |
| 11146627 | Techniques for utilizing network destination identifiers simultaneously announced from multiple locations | Andrew Bruce Dickinson | 2021-10-12 |
| 11146541 | Hierarchical data access techniques using derived cryptographic material | Gregory Branchek Roth, Marc R. Barbour, Bradley Jeffery Behm, Cristian M. Ilac | 2021-10-12 |
| 11146538 | Resource locators with keys | Gregory Branchek Roth | 2021-10-12 |
| 11108626 | Rewriting communication headers to manage virtual networks of virtual machines | Daniel Cohn, Andrew J. Doane | 2021-08-31 |
| 11106479 | Virtual provisioning with implementation resource boundary awareness | Marvin M. Theimer, Peter N. DeSantis | 2021-08-31 |
| 11102189 | Techniques for delegation of access privileges | Kevin Ross O'Neill, Gregory Branchek Roth, Brian Irl Pratt, Bradley Jeffery Behm, Nathan R. Fitch | 2021-08-24 |
| 11075913 | Enforceable launch configurations | Marvin M. Theimer, Marc John Brooker, David Everard Brown, Christopher Richard Jacques de Kadt | 2021-07-27 |
| 11064017 | Peripheral device enabling virtualized computing service extensions | Anthony Nicholas Liguori | 2021-07-13 |
| 11063819 | Managing use of alternative intermediate destination computing nodes for provided computer networks | Kevin Christopher Miller | 2021-07-13 |
| 11055425 | Service defense techniques | Stephen E. Schmidt | 2021-07-06 |
| 11050844 | User controlled hardware validation | Gregory Alan Rubin, Matthew John Campagna, Matthew Shawn Wilson | 2021-06-29 |
| 11036869 | Data security with a security module | Gregory Branchek Roth, Matthew James Wren, Brian Irl Pratt | 2021-06-15 |
| 11036861 | Host attestation | Matthew John Campagna, Gregory Alan Rubin | 2021-06-15 |
| 11030669 | Best practice analysis, optimized resource use | Mahendra Manshi Chheda, Shawn E. Heidel, Robert B. Jaye, Justin K. Brindley-Koonce, Jesse D. Schoch | 2021-06-08 |
| 11014093 | Secure destruction machine | Shane Drexler, Avirbhav Kalva, Thomas Joseph Lauducci, David Francis Carter, Ruicong Yuan | 2021-05-25 |
| 10951586 | Providing location-specific network access to remote services | Daniel Cohn, Andrew J. Doane | 2021-03-16 |
| 10936730 | Data security using request-supplied keys | Gregory Branchek Roth | 2021-03-02 |
| 10931442 | Authentication through a secret holding proxy | Gregory Branchek Roth, Graeme David Baer, Nathan R. Fitch, Eric D. Crahen | 2021-02-23 |
| 10924482 | Virtual service authorization | Gregory Branchek Roth, Graeme David Baer | 2021-02-16 |
| 10911528 | Managing replication of computing nodes for provided computer networks | Kevin Christopher Miller, Andrew J. Doane | 2021-02-02 |
| 10911428 | Use of metadata for computing resource access | Gregory Branchek Roth, Kevin Ross O'Neill, Brian Irl Pratt, Bradley Jeffery Behm, Nathan R. Fitch | 2021-02-02 |
| 10904268 | Managing virtual computing testing | Donald L. Bailey | 2021-01-26 |
| 10887348 | Detection of network traffic interception | Peter Zachary Bowen | 2021-01-05 |