Issued Patents All Time
Showing 26–50 of 120 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8949325 | Dynamic discovery and utilization of current context information | William E. Sobel, Luigi Mercone | 2015-02-03 |
| 8887273 | Evaluating relying parties | Sourabh Satish | 2014-11-11 |
| 8886802 | Transport agnostic network access control | Roelof Jonkman | 2014-11-11 |
| 8881253 | Method and apparatus for accepting a digital identity of a user based on transitive trust among parties | Sourabh Satish | 2014-11-04 |
| 8868719 | Identity and reputation monitoring | Sourabh Satish | 2014-10-21 |
| 8862730 | Enabling NAC reassessment based on fingerprint change | Sourabh Satish | 2014-10-14 |
| 8844041 | Detecting network devices and mapping topology using network introspection by collaborating endpoints | Darrell Kienzle, William Gauvin, Matthew Elder, Robert Walters, Adam Schepis | 2014-09-23 |
| 8819413 | Method and apparatus for collaborative claim verification | Sourabh Satish | 2014-08-26 |
| 8806046 | Application streaming and network file system optimization via integration with identity management solutions | Sourabh Satish, Zulfikar Ramzan | 2014-08-12 |
| 8799494 | Application streaming proactive failover | Zulfikar Ramzan, Sourabh Satish | 2014-08-05 |
| 8788836 | Method and apparatus for providing identity claim validation | Sourabh Satish, Timothy G. Brown | 2014-07-22 |
| 8782403 | Method and apparatus for securing confidential data for a user in a computer | Sourabh Satish | 2014-07-15 |
| 8775716 | Methods and systems for defragmenting virtual machine prefetch data on physical storage | Randall R. Cook, Sourabh Satish, William E. Sobel | 2014-07-08 |
| 8763096 | Methods and systems for managing authentication | Shaun Cooley | 2014-06-24 |
| 8763076 | Endpoint management using trust rating data | Sourabh Satish | 2014-06-24 |
| 8762229 | Parental policy based online wish lists | Bruce McCorkendale, Shaun Cooley | 2014-06-24 |
| 8689001 | Method and system for protecting user identification information | Sourabh Satish | 2014-04-01 |
| 8661250 | Remote activation of covert service channels | Thomas Lofgren, Jeremy Bennett | 2014-02-25 |
| 8566401 | Method and apparatus for enabling e-mail routing and filtering based on dynamic identities | Sourabh Satish | 2013-10-22 |
| 8561181 | Detecting man-in-the-middle attacks via security transitions | William E. Sobel | 2013-10-15 |
| 8549401 | Systems and methods for automatically generating computer-assistance videos | William E. Sobel | 2013-10-01 |
| 8528080 | Short-range mobile honeypot for sampling and tracking threats | Bruce McCorkendale, John Patrick Kelly, III | 2013-09-03 |
| 8522343 | Removing an active application from a remote device | — | 2013-08-27 |
| 8504680 | Automatically adjusting polling intervals based on remote administrative activity | William E. Sobel | 2013-08-06 |
| 8495660 | Methods and systems for handling instant messages and notifications based on the state of a computing device | — | 2013-07-23 |