| 10958666 |
Systems and methods for verifying connection integrity |
Qing Li, Ronald Frederick, Roelof Nico du Toit, Susanta K. Nanda, Saurabh Shintre +1 more |
2021-03-23 |
| 10678917 |
Systems and methods for evaluating unfamiliar executables |
Christopher Gates |
2020-06-09 |
| 10560448 |
One-touch secure on-boarding of OOB IoT devices |
Mingliang Pei, Damon Kachur |
2020-02-11 |
| 10534933 |
Encrypting and decrypting sensitive files on a network device |
Kevin Roundy, Yuqiong Sun, Christopher Gates, Michael Hart, Saurabh Shintre |
2020-01-14 |
| 10447663 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Saurabh Shintre, Ronald Frederick +1 more |
2019-10-15 |
| 10044691 |
Decrypting network traffic on a middlebox device using a trusted execution environment |
Yuqiong Sun, Daniel Marino, Susanta K. Nanda, Saurabh Shintre, Ronald Frederick +1 more |
2018-08-07 |
| 9946853 |
Techniques for application code obfuscation |
Gary Chirhart |
2018-04-17 |
| 9569605 |
Systems and methods for enabling biometric authentication options |
Scott Schneider, Ramzi Abi Antoun |
2017-02-14 |
| 9560028 |
Systems and methods for filtering interprocess communications |
Jonathon Salehpour |
2017-01-31 |
| 9003553 |
Viewing content under enterprise digital rights management without a client side access component |
Robert Koeten |
2015-04-07 |
| 8938808 |
Systems and methods for using virtualization to implement information rights management |
Michael Spertus, Denis Serenyi |
2015-01-20 |
| 8261320 |
Systems and methods for securely managing access to data |
Denis Serenyi |
2012-09-04 |
| 8108931 |
Method and apparatus for identifying invariants to detect software tampering |
Matthew Elder |
2012-01-31 |
| 7886034 |
Adaptive liveness management for robust and efficient peer-to-peer storage |
Alfred C. Hartmann, Slava Kritov |
2011-02-08 |