| 9832134 |
Automatic adjusting of reputation thresholds in order to change the processing of certain packets |
James William Heary |
2017-11-28 |
| 9246676 |
Secure access for encrypted data |
Venkata Krishna Sashank Dara |
2016-01-26 |
| 9154512 |
Transparently proxying transport protocol connections using an external server |
Diheng Qu, Richard H. Fox |
2015-10-06 |
| 8797866 |
Automatic adjusting of reputation thresholds in order to change the processing of certain packets |
James William Heary |
2014-08-05 |
| 7873731 |
Use of per-flow monotonically decreasing TTLs to prevent IDS circumvention |
Michael L. Hall |
2011-01-18 |
| 7500264 |
Use of packet hashes to prevent TCP retransmit overwrite attacks |
Michael L. Hall, Timothy J. Hahn, Mohit Jaggi |
2009-03-03 |
| 7334035 |
Self modifying state graphs for quality of service classification |
— |
2008-02-19 |
| 7082477 |
Virtual application of features to electronic messages |
Karthik Sadhasivam, Eric M. Trehus, Anders K. Fung, Bin Liang |
2006-07-25 |
| 6912570 |
Self modifying state graphs for quality of service classification |
— |
2005-06-28 |