Issued Patents All Time
Showing 101–125 of 153 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9699202 | Intrusion detection to prevent impersonation attacks in computer networks | Titouan Rigoudy | 2017-07-04 |
| 9674204 | Compact and efficient communication security through combining anti-replay with encryption | John Foley | 2017-06-06 |
| 9306936 | Techniques to classify virtual private network traffic based on identity | Kunal Patel, Yixin Sun, Puneet Gupta, Vinod Arjun | 2016-04-05 |
| 9294270 | Detection of stale encryption policy by group members | Warren Scott Wainner, Sheela Rowles, Brian Weis, Scott Fluhrer, Kavitha Kamarthy | 2016-03-22 |
| 9294462 | Redirect to inspection proxy using single-sign-on bootstrapping | Vincent E. Parla, Andrzej Kielbasinski | 2016-03-22 |
| 9288186 | Network security using encrypted subfields | — | 2016-03-15 |
| 9237015 | Compact and efficient communication security through combining anti-replay with encryption | John Foley | 2016-01-12 |
| 9178697 | Security for remote access VPN | Philip John Steuart Gladstone | 2015-11-03 |
| 8990582 | Virtual machine memory compartmentalization in multi-core architectures | Fabio R. Maino, Pere Monclus | 2015-03-24 |
| 8983066 | Private pairwise key management for groups | Johannes Petrus Kruys, Max Pritikin, Joseph Salowey, Brian Weis | 2015-03-17 |
| 8909918 | Techniques to classify virtual private network traffic based on identity | Kunal Patel, Yixin Sun, Puneet Gupta, Vinod Arjun | 2014-12-09 |
| 8891770 | Pair-wise keying for tunneled virtual private networks | Brian E. Weiss | 2014-11-18 |
| 8886837 | Flow-based compression management | Todd Short | 2014-11-11 |
| 8867747 | Key generation for networks | Brian Weis | 2014-10-21 |
| 8855301 | Coordinating compression information for unreliable encrypted streams through key establishment protocols | — | 2014-10-07 |
| 8856504 | Secure virtual machine bootstrap in untrusted cloud infrastructures | Fabio R. Maino, Pere Monclus, Robert T. Bell, Steven Joseph Rich | 2014-10-07 |
| 8806609 | Security for remote access VPN | Philip John Steuart Gladstone | 2014-08-12 |
| 8806572 | Authentication via monitoring | Sandeep Rao | 2014-08-12 |
| 8788805 | Application-level service access to encrypted data streams | Michael Herne | 2014-07-22 |
| 8745384 | Security management in a group based environment | Andrew Persaud, Kavitha Kamarthy, Shree Murthy, Scott Fanning, Thirunavukkarasu Suresh | 2014-06-03 |
| 8548171 | Pair-wise keying for tunneled virtual private networks | Brian Weis | 2013-10-01 |
| 8539247 | Password checking | Andrew Persaud | 2013-09-17 |
| 8503681 | Method and system to securely transport data encryption keys | Flemming Stig Andreason | 2013-08-06 |
| 8473757 | Protecting digital data such as images on a device with image acquisition capabilities | Philip John Steuart Gladstone | 2013-06-25 |
| 8363836 | Using authentication tokens to authorize a firewall to open a pinhole | Daniel G. Wing, Cullen Jennings, Eric Vyncke | 2013-01-29 |