Issued Patents All Time
Showing 1–11 of 11 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10341194 | System and method for building, optimizing, and enforcing infrastructure on a cloud based computing environment | Josha Stella, Emily Dresner-Thornber, Denison Wright, Wayne Crissman, Matthew Brinkman +8 more | 2019-07-02 |
| 10310828 | System and method for providing and executing a domain-specific language for cloud services infrastructure | Josha Stella, Alex Schoof, Jared Tobin, Jasper VAN DER JEUGT, Maciej WOS +4 more | 2019-06-04 |
| 9847878 | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet | Josha Stella, Matthew Brinkman | 2017-12-19 |
| 9508095 | System and method for optimizing the selection of cloud services based on price and performance | Josha Stella, Matthew Brinkman, Andrew Wright, Tyler Drombosky | 2016-11-29 |
| 9461823 | System and method for limiting exploitable or potentially exploitable sub-components in software components | Josha Stella, Matthew Brinkman | 2016-10-04 |
| 9385866 | System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised | Josha Stella, Matthew Brinkman | 2016-07-05 |
| 9014373 | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet | Josha Stella, Matthew Brinkman | 2015-04-21 |
| 9003525 | System and method for limiting exploitable or potentially exploitable sub-components in software components | Josha Stella, Matthew Brinkman | 2015-04-07 |
| 9003372 | System and method for replacing software components with corresponding known-good software components without regard to whether the software components have been compromised or potentially compromised | Joshua Stella, Matthew Brinkman | 2015-04-07 |
| 8819836 | System and method for limiting exploitable of potentially exploitable sub-components in software components | Josha Stella, Matthew Brinkman | 2014-08-26 |
| 8755522 | System and method for interleaving information into slices of a data packet, differentially encrypting the slices, and obfuscating information in the data packet | Josha Stella, Matthew Brinkman | 2014-06-17 |