Issued Patents All Time
Showing 26–40 of 40 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8255995 | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing | Andrew Zawadowskiy | 2012-08-28 |
| 8225373 | Protection of computer resources | — | 2012-07-17 |
| 7979889 | Methods and apparatus providing security to computer systems and networks | Philip J. S. Gladstone | 2011-07-12 |
| 7882560 | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing | Andrew Zawadowskiy | 2011-02-01 |
| 7832008 | Protection of computer resources | — | 2010-11-09 |
| 7774498 | Methods and apparatus for trusted application centric QoS provisioning | David J. McCowan, Kerry E. Lynn, Philip J. S. Gladstone | 2010-08-10 |
| 7716473 | Methods and apparatus providing a reference monitor simulator | Philip J. S. Gladstone, Alan J. Kirby, Mikhail Cherepov | 2010-05-11 |
| 7681226 | Methods and apparatus providing security for multiple operational states of a computerized device | Debra Malver | 2010-03-16 |
| 7607041 | Methods and apparatus providing recovery from computer and network security attacks | Andrew Zawadowskiy, Boris Ruchansky | 2009-10-20 |
| 7596097 | Methods and apparatus to prevent network mapping | David J. McCowan | 2009-09-29 |
| 7516476 | Methods and apparatus for automated creation of security policy | Brian Costello, Dan L. Grecu, Venkat Rangamani, Philip J. S. Gladstone, Alan J. Kirby | 2009-04-07 |
| 7290266 | Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy | Philip J. S. Gladstone | 2007-10-30 |
| 5898784 | Transferring encrypted packets over a public network | Alan J. Kirby, Ashok P. Nadkarni | 1999-04-27 |
| 5825891 | Key management for network communication | Roger Levesque, Ashok P. Nadkarni | 1998-10-20 |
| 5798706 | Detecting unauthorized network communication | Alan J. Kirby, David C. Waterman | 1998-08-25 |