Issued Patents All Time
Showing 1–21 of 21 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10558440 | Tightly integrated accelerator functions | John Marshall, Andrew William Keep, Robert Leroy King | 2020-02-11 |
| 10180851 | Detection of unauthorized use of virtual resources | Jeffrey David Haag, James Ronald Holland, Jr. | 2019-01-15 |
| 9654379 | Pseudowire (PW) switching type-length-value (TLV) | Luca Martini, W. Mark Townsley, Christopher Metz | 2017-05-16 |
| 8838829 | Pseudowire (PW) switching type-length-value (TLV) | Luca Martini, W. Mark Townsley, Christopher Metz | 2014-09-16 |
| 8171494 | Providing identity to a portal with a redirect | Jean-Philippe Champagne, Richard M. Pruss | 2012-05-01 |
| 8059527 | Techniques for oversubscribing edge nodes for virtual private networks | William Mark Townsley | 2011-11-15 |
| 8050267 | Simple virtual private network for small local area networks | William Mark Townsley | 2011-11-01 |
| 8001252 | Psuedowire termination directly on a router | James N. Guichard, Mohammed Sayeed, Bertrand Duvivier, Daniel C. Tappan, W. Scott Wainner +3 more | 2011-08-16 |
| 7869351 | Communication techniques and generic layer 3 automatic switching protection | David Delano Ward, Stefano B. Previdi | 2011-01-11 |
| 7778199 | Techniques for customer self-provisioning of edge nodes for a virtual private network | William Mark Townsley, Greg Weber, Wei Luo | 2010-08-17 |
| 7773611 | Method and apparatus for packet loss detection | W. Mark Townsley, Thomas D. Nadeau | 2010-08-10 |
| 7769037 | Techniques for using first sign of life at edge nodes for a virtual private network | William Mark Townsley, Wei Luo, George Wilkie | 2010-08-03 |
| 7593398 | Layer-two interworking applied to L2-L3 pseudowires | W. Scott Wainner, W. Mark Townsley, Christopher Metz | 2009-09-22 |
| 7535856 | Techniques for zero touch provisioning of edge nodes for a virtual private network | William Mark Townsley, Greg Weber, Wei Luo | 2009-05-19 |
| 7516224 | Pseudowire termination directly on a router | James N. Guichard, Mohammed Sayeed, Bertrand Duvivier, Daniel C. Tappan, W. Scott Wainner +3 more | 2009-04-07 |
| 7420933 | Techniques for zero touch provisioning of edge nodes for a virtual private network by pushing configuration from a server | William Mark Townsley, Greg Weber, Wei Luo | 2008-09-02 |
| 7277931 | Representing, configuring, administering, monitoring, and/or modeling connections using catalogs and matrixes | Charles Bruce Dillon, Bret Elliott Harrison, Sanjay D. Kamat, Charles S. Lingafelt, Walter Metz +2 more | 2007-10-02 |
| 6915436 | System and method to verify availability of a back-up secure tunnel | Charles S. Lingafelt, Phuong T. Nguyen, Leo Temoshenko, Xiaogang Wang | 2005-07-05 |
| 6816462 | System and method to determine connectivity of a VPN secure tunnel | Charles S. Lingafelt, Phuong T. Nguyen, Leo Temoshenko, Xiaogang Wang | 2004-11-09 |
| 6668282 | System and method to monitor and determine if an active IPSec tunnel has become disabled | Charles S. Lingafelt, Phuong T. Nguyen, Leo Temoshenko, Xiaogang Wang | 2003-12-23 |
| 5964847 | Mobile client computer interacting with docking device | Brian Ashley Carpenter, Robert Bedford Ferrier, Russell Alan Resnick, William W. Vetter | 1999-10-12 |