| 10382490 |
Enforcing a centralized, cryptographic network policy for various traffic at a host |
Constantinos Kassimis, Christopher Meyer, Linwood H. Overby, Jr. |
2019-08-13 |
| 10348681 |
Centralized secure offload of security services for distributed security enforcement points |
Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. |
2019-07-09 |
| 9954821 |
Internet protocol security (IPSEC) packet processing for multiple clients sharing a single network address |
Linwood H. Overby, Jr., Joyce Anne Porter |
2018-04-24 |
| 9253146 |
Preventing duplicate sources from clients served by a network address port translator |
Patricia Jakubik, Linwood H. Overby, Jr., Joyce Anne Porter |
2016-02-02 |
| 9137203 |
Centralized secure offload of cryptographic security services for distributed security enforcement points |
Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. |
2015-09-15 |
| 8787393 |
Preventing duplicate sources from clients served by a network address port translator |
Patricia Jakubik, Linwood H. Overby, Jr., Joyce Anne Porter |
2014-07-22 |
| 8250229 |
Internet protocol security (IPSEC) packet processing for multiple clients sharing a single network address |
Linwood H. Overby, Jr., Joyce Anne Porter |
2012-08-21 |
| 8141126 |
Selective IPsec security association recovery |
Curtis M. Gearhart, Christopher Meyer, Linwood H. Overby, Jr. |
2012-03-20 |
| 7962652 |
Detecting network topology when negotiating IPsec security associations that involve network address translation |
Wuchieh J. Jong, Linwood H. Overby, Jr., Joyce Anne Porter |
2011-06-14 |
| 7656795 |
Preventing duplicate sources from clients served by a network address port translator |
Patricia Jakubik, Linwood H. Overby, Jr., Joyce Anne Porter |
2010-02-02 |
| 7146432 |
Methods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment |
Mark L. Antes, James Russell Godwin, David Anthony Herr, Linwood H. Overby, Jr. |
2006-12-05 |
| 6941366 |
Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment |
Mark L. Antes, James Russell Godwin, David Anthony Herr, Linwood H. Overby, Jr. |
2005-09-06 |
| 6715081 |
Security rule database searching in a network security environment |
Kira Sterling Attwood, James Russell Godwin, Linwood H. Overby, Jr., Brian Sean Perry |
2004-03-30 |
| 6347376 |
Security rule database searching in a network security environment |
Kira Sterling Attwood, James Russell Godwin, Linwood H. Overby, Jr., Brian Sean Perry |
2002-02-12 |
| 6223200 |
System and method for reducing research time through a lock wait matrix |
Cherie C. Barnes |
2001-04-24 |