Issued Patents All Time
Showing 26–50 of 122 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7853794 | Efficient method for providing secure remote access | Mohammad Peyravian | 2010-12-14 |
| 7796513 | Packet classification using modified range labels | Claude Basso, Jean Calvignac, Gordon Taylor Davis | 2010-09-14 |
| 7769858 | Method for efficiently hashing packet keys into a firewall connection table | Everett Arthur Corl, Jr., Gordon Taylor Davis, Steven Richard Perrin, Hiroshi Takada, Victoria Sue Thio | 2010-08-03 |
| 7738376 | Managing traffic within a data communication network | Garesh Balakrishnan, John Parker Chalmers, Jitesh Ramachandran Nair, Larry Nicholson, Ravinder K. Sabhikhi +1 more | 2010-06-15 |
| 7734776 | Automatically detecting malicious computer network reconnaissance by updating state codes in a histogram | Alan Boulanger, Robert Danford, Kevin D. Himberger, Raj K. Singh | 2010-06-08 |
| 7719423 | System and method to track inventory using RFID tags | Kevin D. Himberger, Mohammad Peyravian | 2010-05-18 |
| 7711781 | Technique for detecting and blocking unwanted instant messages | John Fred Davis, Kevin D. Himberger, Mohammad Peyravian | 2010-05-04 |
| 7710874 | System and method for automatic management of many computer data processing system pipes | Ganesh Balakrishnan, Everett Arthur Corl, Jr., Ravinder K. Sabhikhi, Michael S. Siegel, Raj K. Singh +1 more | 2010-05-04 |
| 7707633 | Applying blocking measures progressively to malicious network traffic | Robert Danford, Kenneth M. Farmer, Robert Sisk, Michael Walter | 2010-04-27 |
| 7673142 | Efficient method for providing secure remote access | Mohammad Peyravian | 2010-03-02 |
| 7669240 | Apparatus, method and program to detect and control deleterious code (virus) in computer network | Alan Boulanger, Robert Danford, Kevin D. Himberger | 2010-02-23 |
| 7657942 | Method of assuring enterprise security standards compliance | Kevin D. Himberger, Charles S. Lingafelt, Allen Leonid Roginsky, Phillip Singleton | 2010-02-02 |
| 7646709 | Flow control in computer networks | Jitesh Ramachandran Nair, Michael S. Siegel, Rama Mohan Yedavalli | 2010-01-12 |
| 7617526 | Blocking of spam e-mail at a firewall | John Fred Davis, Kevin D. Himberger, Garreth Jeremiah | 2009-11-10 |
| 7594263 | Operating a communication network through use of blocking measures for responding to communication traffic anomalies | Alan Boulanger, Kevin D. Himberger, John Ziraldo | 2009-09-22 |
| 7546281 | Reduction of ternary rules with common priority and actions | Everett Arthur Corl, Jr., Brooks Johnston, Plyush Patel, Jan Van Lunteren | 2009-06-09 |
| 7523494 | Determining blocking measures for processing communication traffic anomalies | Kevin D. Himberger | 2009-04-21 |
| 7523470 | System and method for detecting keyboard logging | Joseph Garvey, Kevin D. Himberger, Mohammad Peyravian | 2009-04-21 |
| 7500012 | Method for controlling dataflow to a central system from distributed systems | Charles S. Lingafelt, Norman C. Strole | 2009-03-03 |
| 7489246 | System and method to record environmental condition on an RFID tag | Kevin D. Himberger, Mohammad Peyravian | 2009-02-10 |
| 7487542 | Intrusion detection using a network processor and a parallel pattern detection engine | Marc A. Boulanger, C. Marcel Kinard, Kerry A. Kravec, Ravinder K. Sabhikhi, Ali Ghassan Saidi +2 more | 2009-02-03 |
| 7478426 | Multi-field classification dynamic rule updates | Everett Arthur Corl, Jr., Gordon Taylor Davis | 2009-01-13 |
| 7474217 | System and method to track inventory using RFID tags | Kevin D. Himberger, Mohammad Peyravian | 2009-01-06 |
| 7475252 | System, method and program to filter out login attempts by unauthorized entities | Mohammad Peyravian | 2009-01-06 |
| 7466687 | Packet classification using modified range labels | Claude Basso, Jean Calvignac, Gordon Taylor Davis | 2008-12-16 |