| 10530720 |
Contextual privacy engine for notifications |
Raj Vardhan, Igor Tatourian, Dattatraya Kulkarni, Samrat Chitta, Reji Gopalakrishnan +1 more |
2020-01-07 |
| 9870466 |
Hardware-enforced code paths |
Carl D. Woodward, Jennifer Eligius Mankin |
2018-01-16 |
| 9762591 |
Message sender authenticity validation |
Neeta Srivastava, Yi Zheng |
2017-09-12 |
| 8713306 |
Network decoys |
— |
2014-04-29 |
| 8661250 |
Remote activation of covert service channels |
Brian Hernacki, Thomas Lofgren |
2014-02-25 |
| 8079083 |
Method and system for recording network traffic and predicting potential security events |
Carl A. Adams |
2011-12-13 |
| 7984504 |
Network risk analysis |
Brian Hernacki |
2011-07-19 |
| 7937761 |
Differential threat detection processing |
— |
2011-05-03 |
| 7904940 |
Automated environmental policy awareness |
Brian Hernacki |
2011-03-08 |
| 7848235 |
Detecting network evasion and misinformation |
Brian Hernacki |
2010-12-07 |
| 7836499 |
Dynamic depth inspection |
Brian Hernacki |
2010-11-16 |
| 7765594 |
Dynamic security deputization |
Robert J. Geiger |
2010-07-27 |
| 7725935 |
Detecting worms |
— |
2010-05-25 |
| D596690 |
Golfing aid |
— |
2009-07-21 |
| 7529187 |
Detecting network evasion and misinformation |
Brian Hernacki |
2009-05-05 |
| D587329 |
Golfing aid |
— |
2009-02-24 |
| 7421737 |
Evasion detection |
Brian Hernacki |
2008-09-02 |
| 7409721 |
Network risk analysis |
Brian Hernacki |
2008-08-05 |
| 7380123 |
Remote activation of covert service channels |
Brian Hernacki, Thomas Lofgren |
2008-05-27 |