| 10038697 |
Determining similarity between security rules based on weighted comparisons of their rule parameters |
Yedidya Dotan, Daniel Hollingshead, Denis Knjazihhin |
2018-07-31 |
| 9860059 |
Distributing token records |
Robert S. Philpott, William M. Duane, Gareth Richards |
2018-01-02 |
| 9787722 |
Integrated development environment (IDE) for network security configuration files |
Denis Knjazihhin, Yedidya Dotan, Zachary D. Siswick, Daniel Hollingshead |
2017-10-10 |
| 9692751 |
User actuated release of a secret through an audio jack to authenticate the user |
Robert T. Frohman, Michael J. O'Malley |
2017-06-27 |
| 9571524 |
Creation of security policy templates and security policies based on the templates |
Yedidya Dotan, Denis Knjazihhin |
2017-02-14 |
| 9454648 |
Distributing token records in a market environment |
Robert S. Philpott, William M. Duane, Gareth Richards |
2016-09-27 |
| 8453232 |
Virtual smart card through a PC/SC interface |
Gregory R. Gallagher, Bruce F. Emmert, Chen Ho |
2013-05-28 |