Issued Patents All Time
Showing 1–25 of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12265610 | Telemetry data | Daniel Ellam, Nelson Liang An Chang | 2025-04-01 |
| 11914713 | Access to firmware settings with asymmetric cryptography | Jeffrey Kevin Jeansonne, Valiuddin Y. Ali, Richard Bramley, Joshua Serratelli Schiffman | 2024-02-27 |
| 11657138 | Signed change requests to remotely configure settings | Richard Bramley, Dallas M. Barlow, Patrick L. Gibbons, Tevin Jaupaul Richards, Robert Stephen Craig +2 more | 2023-05-23 |
| 11586730 | Ransomware attack monitoring | Daniel Ellam, Remy Husson | 2023-02-21 |
| 11568050 | Regulating execution | Daniel Ellam, Jonathan Griffin | 2023-01-31 |
| 11496317 | Software validation for untrusted computing systems | Chris Tofts, Brian Quentin Monahan | 2022-11-08 |
| 11475107 | Hardware security | James Robert Waldron, Mike Provencher | 2022-10-18 |
| 11392435 | Evaluation of a performance parameter of a monitoring service | Jonathan Griffin, Daniel Ellam | 2022-07-19 |
| 11356268 | Digital composition hashing | Helen Balinsky, Scott White, Robert B. Taylor, Jonathan Griffin | 2022-06-07 |
| 11347454 | Controller for a fulfilment service operation | Nassir Mohammad, Joshua Serratelli Schiffman | 2022-05-31 |
| 11328055 | Process verification | Maugan Villatel, Gaetan Wattiau | 2022-05-10 |
| 11321494 | Platform configurations | James Robert Waldron, David Plaquin | 2022-05-03 |
| 11223602 | IP address access based on security level and access history | Daniel Ellam, Jonathan Griffin | 2022-01-11 |
| 11216561 | Executing processes in sequence | Remy Husson, Daniel Ellam | 2022-01-04 |
| 11200314 | Ransomware attack monitoring | Daniel Ellam, Remy Husson | 2021-12-14 |
| 10896085 | Mitigating actions | Ronny Chevalier, David Plaquin, Guillaume Hiet | 2021-01-19 |
| 10878123 | Application approval | Jonathan Griffin | 2020-12-29 |
| 10867037 | Security mitigation action selection based on device usage | Jonathan Griffin | 2020-12-15 |
| 10664593 | Checking a security value calculated for a part of a program code | Jonathan Griffin | 2020-05-26 |
| 10572672 | Modification of data elements using a semantic relationship | Patrick Goldsack, Brian Quentin Monahan, Philipp Reinecke | 2020-02-25 |
| 10380025 | Accessing objects via object references | Patrick Goldsack, James Salter | 2019-08-13 |
| 9596239 | Controlling virtual overlay infrastructure | Nigel Edwards, Patrick Goldsack, Antonio Lain | 2017-03-14 |
| 9559842 | Trusted key management for virtualized platforms | Chris I. Dalton | 2017-01-31 |
| 9083748 | Modelling network to assess security properties | Brian Quentin Monahan, Simon Kai-Ying Shiu | 2015-07-14 |
| 8544002 | Managing virtual overlay infrastructures | Nigel Edwards, Patrick Goldsack, Antonio Lain | 2013-09-24 |