| 11716151 |
Routing methods for quantum communication paths across a mesh quantum network |
Luca Della Chiesa, Louis Gwyn Samuel, Paul Anthony Polakos, Santanu Ganguly |
2023-08-01 |
| 11394536 |
Session key distribution independent of third parties |
Lionel Florit, Amjad Inamdar, David McGrew |
2022-07-19 |
| 11018866 |
Dynamic second factor authentication for cookie-based authentication |
James Anil Pramod Kotwal, Christopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew |
2021-05-25 |
| 10985847 |
Security over optical transport network beyond 100G |
Gilberto Loprieno, Emanuele Umberto Giacometti |
2021-04-20 |
| 10404588 |
Path maximum transmission unit handling for virtual private networks |
Thamilarasu Kandasamy, Lewis Chen, Brian Weis |
2019-09-03 |
| 10243928 |
Detection of stale encryption policy by group members |
Warren Scott Wainner, Sheela Rowles, Brian Weis, David McGrew, Kavitha Kamarthy |
2019-03-26 |
| 10158487 |
Dynamic second factor authentication for cookie-based authentication |
James Anil Pramod Kotwal, Christopher Blayne Dreier, David Aaron Wyde, Kellen Mac Arb, David McGrew |
2018-12-18 |
| 10104050 |
Authenticated group context in transitive IP network domains |
Warren Scott Wainner, Brian Weis, Paul Quinn |
2018-10-16 |
| 9912480 |
Network service packet header security |
Paul Quinn, Jim Guichard, Tirumaleswar Reddy, Prashanth Patil, David Delano Ward |
2018-03-06 |
| 9832175 |
Group member recovery techniques |
Lewis Chen, Warren Scott Wainner, Brian Weis |
2017-11-28 |
| 9621520 |
Network service packet header security |
Paul Quinn, Jim Guichard, Tirumaleswar Reddy, Prashanth Patil, David Delano Ward |
2017-04-11 |
| 9461914 |
Path maximum transmission unit handling for virtual private networks |
Thamilarasu Kandasamy, Lewis Chen, Brian Weis |
2016-10-04 |
| 9444796 |
Group member recovery techniques |
Lewis Chen, Warren Scott Wainner, Brian Weis |
2016-09-13 |
| 9294270 |
Detection of stale encryption policy by group members |
Warren Scott Wainner, Sheela Rowles, Brian Weis, David McGrew, Kavitha Kamarthy |
2016-03-22 |
| 8705348 |
Use of metadata for time based anti-replay |
Lingyan Huang, Brian Weis, Sheela Rowles |
2014-04-22 |
| 8625599 |
Method and system for dynamic secured group communication |
Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Niazi +1 more |
2014-01-07 |
| 8160255 |
System and method for encrypted group network communication with point-to-point privacy |
— |
2012-04-17 |
| 8036221 |
Method and system for dynamic secured group communication |
Warren Scott Wainner, Sheela Rowles, Kavitha Kamarthy, Mohamed Khalid, Haseeb Naizi +1 more |
2011-10-11 |
| 7962743 |
System and method for protected spoke to spoke communication using an unprotected computer network |
— |
2011-06-14 |
| 7748034 |
Strong anti-replay protection for IP traffic sent point to point or multi-cast to large groups |
Brian Weis |
2010-06-29 |
| 7664789 |
Method and apparatus to minimize database exchange in OSPF by using a SHA-1 digest value |
Sina Mirtorabi, Abhay Roy, Brian Weis |
2010-02-16 |
| 7418100 |
Enciphering method |
David McGrew |
2008-08-26 |
| 7207063 |
Method and apparatus for determining secure endpoints of tunnels in a network that uses internet security protocol |
— |
2007-04-17 |
| 6862354 |
Stream cipher encryption method and apparatus that can efficiently seek to arbitrary locations in a key stream |
David McGrew |
2005-03-01 |