Issued Patents All Time
Showing 201–225 of 523 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10148675 | Block-level forensics for distributed computing systems | Alexander Robin Gordon Lucas, Robert Eric Fitzgerald | 2018-12-04 |
| 10142290 | Host-based firewall for distributed computer systems | Robert Eric Fitzgerald, Alexander Robin Gordon Lucas | 2018-11-27 |
| 10133591 | Network traffic data in virtualized environments | Aaron Douglas Dokey, Ajith Jayamohan, Ian Roger Searle | 2018-11-20 |
| 10133867 | Trusted malware scanning | Matthew John Campagna, Gregory Alan Rubin | 2018-11-20 |
| 10129034 | Signature delegation | Matthew John Campagna, Gregory Alan Rubin, Nicholas Alexander Allen, Andrew Kyle Driggs | 2018-11-13 |
| 10127389 | Performing operations on intelligent storage with hardened interfaces | Gregory Branchek Roth | 2018-11-13 |
| 10120714 | Customizing computing resources for application workload | Luis Felipe Cabrera, James R. Hamilton, Jonathan A. Jenkins, Matthew D. Klein, Nathan Bartholomew Thomas +1 more | 2018-11-06 |
| 10114668 | Managing private use of program execution capacity | James Alfred Gordon Greenfield | 2018-10-30 |
| 10103875 | Authentication through a secret holding proxy | Gregory Branchek Roth, Graeme David Baer, Nathan R. Fitch, Eric D. Crahen | 2018-10-16 |
| 10104127 | Managing computing resource usage for standards compliance | Stephen E. Schmidt, Luis Felipe Cabrera | 2018-10-16 |
| 10097531 | Techniques for credential generation | Marc John Brooker, Mark Joseph Cavage, David Everard Brown, Kevin Ross O'Neill, Christopher Richard Jacques de Kadt | 2018-10-09 |
| 10084851 | Managing use of intermediate destination hardware devices for provided computer networks | Kevin Christopher Miller | 2018-09-25 |
| 10084818 | Flexibly configurable data modification services | Gregory Branchek Roth, Graeme David Baer | 2018-09-25 |
| 10084784 | Restricting access to computing resources | Matthew Shawn Wilson | 2018-09-25 |
| 10079842 | Transparent volume based intrusion detection | Robert Eric Fitzgerald, Alexander Robin Gordon Lucas | 2018-09-18 |
| 10079681 | Securing service layer on third party hardware | Gregory Branchek Roth, Aaron Douglas Dokey, Nathan Bartholomew Thomas | 2018-09-18 |
| 10078754 | Volume cryptographic key management | Gregory Branchek Roth, Jamie Hunter | 2018-09-18 |
| 10075471 | Data loss prevention techniques | Gregory Branchek Roth, Matthew James Wren | 2018-09-11 |
| 10075305 | Methods and apparatus for remapping public network addresses on a network to an external network via a private communications channel | Andrew Bruce Dickinson | 2018-09-11 |
| 10073740 | Failure resiliency provisioning | Jacob Shannan Carr, Christopher Richard Jacques de Kadt | 2018-09-11 |
| 10070195 | Computing resource service security method | Nathan R. Fitch | 2018-09-04 |
| 10067781 | Service manifests | Don Johnson, Marvin M. Theimer | 2018-09-04 |
| 10063380 | Secure interface for invoking privileged operations | Matthew Shawn Wilson | 2018-08-28 |
| 10061915 | Posture assessment in a secure execution environment | Gregory Branchek Roth, Aaron Douglas Dokey, Nathan Bartholomew Thomas | 2018-08-28 |
| 10055594 | Virtual service provider zones | Gregory Branchek Roth, Matthew James Wren | 2018-08-21 |