Issued Patents All Time
Showing 1–24 of 24 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11934463 | Identification of potentially sensitive information in data strings | Bradley R. Caldwell | 2024-03-19 |
| 11704672 | Systems and methods employing searches for known identifiers of sensitive information to identify sensitive information in data | — | 2023-07-18 |
| 11170052 | Identification of potentially sensitive information in data strings | Bradley R. Caldwell | 2021-11-09 |
| 10679218 | Systems and methods employing searches for known identifiers of sensitive information to identify sensitive information in data | — | 2020-06-09 |
| 10417283 | Identification of potentially sensitive information in data strings | Bradley R. Caldwell | 2019-09-17 |
| 9137780 | Synchronizing multicast data distribution on a computing device | Gregory P. Olsen | 2015-09-15 |
| 9083541 | Retransmitting lost packets for multicast data distribution | Gregory P. Olsen | 2015-07-14 |
| 8706849 | Systems and methods for increasing the scalability in a client/server environment | Peter E. Johnson, Mark E. Howarth, Plinio Pimentel, Anthony Nicholas Sarra | 2014-04-22 |
| 8616443 | Systems and methods employing delimiter searches to identify sensitive information in data | Nathan K. Stocks | 2013-12-31 |
| 8608063 | Systems and methods employing intermittent scanning techniques to identify sensitive information in data | Nathan K. Stocks | 2013-12-17 |
| 8341708 | Systems and methods for authenticating credentials for management of a client | David A. Eatough | 2012-12-25 |
| 8185945 | Systems and methods for selectively requesting certificates during initiation of secure communication sessions | David A. Eatough | 2012-05-22 |
| 8166177 | Systems and methods for managing requests for connections to services on a computer system | David A. Eatough | 2012-04-24 |
| 8095961 | Systems and methods for quarantining a node from other nodes in a network | David B. Morley, Monte Sharp | 2012-01-10 |
| 7827263 | Systems and methods for managing a computer over a network | Mark E. Howarth, Peter E. Johnson, David A. Eatough | 2010-11-02 |
| 7565544 | Systems and methods for verifying the trustworthiness of a file comprising computer instructions | David A. Eatough | 2009-07-21 |
| 7433942 | Network management | Gregory P. Olsen, Richard R. Winterton, David A. Eatough | 2008-10-07 |
| 7127607 | PKI-based client/server authentication | Jin Su, Paul Byron Hillyard | 2006-10-24 |
| 7032110 | PKI-based client/server authentication | Jin Su, Paul Byron Hillyard | 2006-04-18 |
| 6928051 | Application based bandwidth limiting proxies | David A. Eatough, Tony Sarra | 2005-08-09 |
| 6754829 | Certificate-based authentication system for heterogeneous environments | Paul Byron Hillyard, Jin Su | 2004-06-22 |
| 6728964 | Monitoring function | — | 2004-04-27 |
| 6101528 | Method and apparatus for discovering server applications by a client application in a network of computer systems | — | 2000-08-08 |
| 5968116 | Method and apparatus for facilitating the management of networked devices | Michael Day, Stephen W. Belisle, Richard R. Winterton | 1999-10-19 |