| 12003505 |
Custom authorization of network connected devices using signed credentials |
Ramkishore Bhattacharyya, Rameez Loladia, William Alexander Stevenson, Ashutosh Thakur, Rodrigo Diaz Martin +1 more |
2024-06-04 |
| 11750653 |
Network intrusion counter-intelligence |
Navindra Yadav, Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen +3 more |
2023-09-05 |
| 11706239 |
Systems and methods for detecting vulnerabilities in network processes during runtime |
Hai Trong Vu, Thanh Nhan Nguyen, Vaishali Palkar, Varun Sagar Malhotra, Shih-Chun Chang |
2023-07-18 |
| 11403200 |
Provisioning resources for monitoring hosts based on defined functionalities of hosts |
Sunil Gupta, Thanh Trung Ngo, Xuan Loc Bui, Hoang Viet Nguyen, Shashi Gandham +1 more |
2022-08-02 |
| 11233821 |
Network intrusion counter-intelligence |
Navindra Yadav, Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen +3 more |
2022-01-25 |
| 10862883 |
Custom authorization of network connected devices using signed credentials |
Ramkishore Bhattacharyya, Rameez Loladia, William Alexander Stevenson, Ashutosh Thakur, Rodrigo Diaz Martin +1 more |
2020-12-08 |
| 10616179 |
Selective routing of domain name system (DNS) requests |
Daniel Lee McCarriar, Andrew Charles Wantuch, Leonardo Lizcano, Steven Hunton Ngo, Kyle Benjamin Schultheiss +4 more |
2020-04-07 |
| 8665753 |
Simultaneous setup of a wireless network adapter and a network host device |
Aaron Averbuch, William Tuttle, Mike Mouawad, Kendra S. Harrington |
2014-03-04 |
| 8316438 |
Network management providing network health information and lockdown security |
Steve Bush, Steve Mooney, John Mevissen, Josh J Hinds, Ron Gery +2 more |
2012-11-20 |