| 10095885 |
Privacy-protecting inter-user digital communication message search |
Christopher Edward Perret, Stephen Scalpone |
2018-10-09 |
| 9785798 |
Privacy-protecting inter-user digital communication message search |
Christopher Edward Perret, Stephen Scalpone |
2017-10-10 |
| 9569205 |
Systems and methods for remotely configuring applications |
Bruce McCorkendale |
2017-02-14 |
| 9443067 |
System for the distribution and deployment of applications, with provisions for security and policy conformance |
Christopher Edward Perret |
2016-09-13 |
| 9350761 |
System for the distribution and deployment of applications, with provisions for security and policy conformance |
Christopher Edward Perret |
2016-05-24 |
| 9313203 |
Systems and methods for identifying a secure application when connecting to a network |
Michael Alan Adler, JR., Robert Koeten, Nicolas Popp |
2016-04-12 |
| 9286477 |
Secure app ecosystem with key and data exchange according to enterprise information control policy |
William E. Sobel, Bruce McCorkendale |
2016-03-15 |
| 9143497 |
Systems and methods for securing email in mobile devices |
Bruce McCorkendale |
2015-09-22 |
| 9071611 |
Integration of network admission control functions in network access devices |
Navindra Yadav, Atul Mahamuni, Azim Ozakil, Bora Akyol, Peirong Feng +3 more |
2015-06-30 |
| 9043863 |
Policy enforcing browser |
Christopher Edward Perret, Azim Ozakil, Stephen Scalpone |
2015-05-26 |
| 8955152 |
Systems and methods to manage an application |
Christopher Edward Perret, Azim Ozakil, Stephen Scalpone |
2015-02-10 |
| 8918860 |
Systems and methods for application-policing a VPN |
— |
2014-12-23 |
| 8832855 |
System for the distribution and deployment of applications with provisions for security and policy conformance |
Christopher Edward Perret |
2014-09-09 |
| 7493328 |
Storing and searching a hierarchy of policies and associations thereof of particular use with IP security policies and security associations |
Henry Kin-Chuen Kwok, Ashwath Nagaraj |
2009-02-17 |
| 7434045 |
Method and apparatus for indexing an inbound security association database |
Ashwath Nagaraj, Ramakrishna Rao, Benjamin Kou-An Tseng |
2008-10-07 |
| 7389529 |
Method and apparatus for generating and using nested encapsulation data |
Dario Meluzzi |
2008-06-17 |
| 7240149 |
Multiple branch operations in an associative memory |
Ashwath Nagaraj, Henry Kin-Chuen Kwok, Surya Prakash Jonnavithula, Jiing-Yang Twu |
2007-07-03 |
| 6988106 |
Strong and searching a hierarchy of items of particular use with IP security policies and security associations |
Henry Kin-Chuen Kwok, Ashwath Nagaraj |
2006-01-17 |