| 10701091 |
System and method for verifying a cyberthreat |
Sean Cunningham, Robert Dana, Joseph Faber, Kevin J. Arunski |
2020-06-30 |
| 10033748 |
System and method employing structured intelligence to verify and contain threats at endpoints |
Sean Cunningham, Robert Dana, Joseph Faber, Kevin J. Arunski |
2018-07-24 |
| 9695078 |
High-temperature roll |
Dwayne Bucko, Douglas Schlack, Ryan Elliott |
2017-07-04 |
| 9413781 |
System and method employing structured intelligence to verify and contain threats at endpoints |
Sean Cunningham, Robert Dana, Joseph Faber, Kevin J. Arunski |
2016-08-09 |
| 9298798 |
Run-time engine implemented on a computing device allowing synchronization of records during application execution |
Larry D. Mason |
2016-03-29 |
| 9158830 |
Run-time engine implemented on a computing device allowing synchronization of records during application execution |
Larry D. Mason |
2015-10-13 |
| 8429303 |
Run-time engine implemented on a computing device allowing synchronization of records during application execution |
Larry D. Mason |
2013-04-23 |
| 7716374 |
Run-time engine implemented on a computing device allowing synchronization of records during application execution |
Larry D. Mason |
2010-05-11 |
| 6535885 |
Multikeyed table implementable on a personal digital assistant |
Larry D. Mason |
2003-03-18 |