Issued Patents All Time
Showing 1–14 of 14 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10013569 | Privacy-preserving data collection, publication, and analysis | Samuel Wu | 2018-07-03 |
| 8842690 | System, method, and media for network traffic measurement on high-speed routers | Jih-Kwon Peir, Myungkeun Yoon, Tao Li | 2014-09-23 |
| 8001475 | Method and apparatus for creating a network topograph that includes all select objects that are in a network | Branimir Liker, Partha Bhattacharya, Imin Lee | 2011-08-16 |
| 7636937 | Method and apparatus for comparing access control lists for configuring a security policy on a network | Partha Bhattacharya | 2009-12-22 |
| 7516475 | Method and apparatus for managing security policies on a network | Liman Wei | 2009-04-07 |
| 7464409 | Perimeter-based defense against data flooding in a data communication network | — | 2008-12-09 |
| 7143283 | Simplifying the selection of network paths for implementing and managing security policies on a network | Bo Zou | 2006-11-28 |
| 7107613 | Method and apparatus for reducing the number of tunnels used to implement a security policy on a network | Partha Bhattacharya, Susan Hinrichs | 2006-09-12 |
| 7096356 | Method and apparatus for negotiating Diffie-Hellman keys among multiple parties using a distributed recursion approach | Liman Wei | 2006-08-22 |
| 7093283 | Method and apparatus for deploying configuration instructions to security devices in order to implement a security policy on a network | Partha Bhattacharya | 2006-08-15 |
| 7082531 | Method and apparatus for determining enforcement security devices in a network topology | Partha Bhattacharya, Liman Wei | 2006-07-25 |
| 7036119 | Method and apparatus for creating a network topograph that includes all select objects that are in a network | Branimir Liker, Partha Bhattacharya, Imin Lee | 2006-04-25 |
| 7007032 | Method and apparatus for removing redundancies from a list of data structures | Partha Bhattacharya, Liman Wei | 2006-02-28 |
| 7000006 | Implementing network management policies using topology reduction | — | 2006-02-14 |