Issued Patents All Time
Showing 1–25 of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9372815 | Estimating processor load using peripheral adapter queue behavior | Vaijayanthimala K. Anand, Janice M. Girouard | 2016-06-21 |
| 9146722 | Reinstalling a computer based on frequency of application utilization | Charisse Lu, Johnny Meng-Han Shieh | 2015-09-29 |
| 8799447 | Notarizing packet traces | Daniel H. Jones, Thomas Girard Lendacky | 2014-08-05 |
| 8627494 | Classification separation router | Daniel H. Jones, Thomas Girard Lendacky, George C. Wilson | 2014-01-07 |
| 8302151 | Improving comprehension of information in a security enhanced environment by representing the information in audio form | Daniel H. Jones, Thomas Girard Lendacky, George C. Wilson | 2012-10-30 |
| 8112555 | Peripheral adapter interrupt frequency control by estimating processor load at the peripheral adapter | Vaijayanthimala K. Anand, Janice M. Girouard | 2012-02-07 |
| 8108491 | Method and system for control of access to global computer networks | Howard N. Anglin, Kandagatla Chaitanya, Elizabeth Silva, Yvonne M. Young | 2012-01-31 |
| 8086852 | Providing a trusted platform module in a hypervisor environment | Steven A. Bade, Ryan Catherman, James Hoff, Nia Letise Kelley | 2011-12-27 |
| 8024807 | Probabilistic mechanism to determine level of security for a software package | Kylene Jo Hall, Dustin Kirkland | 2011-09-20 |
| 7962749 | Method and system for creating a non-repudiable chat log | Daniel H. Jones, Thomas Girard Lendacky | 2011-06-14 |
| 7890766 | Method and apparatus for a proximity warning system | Janice M. Girouard, Mark Joseph Hamzy | 2011-02-15 |
| 7886154 | Method and apparatus for a proximity warning system | Janice M. Girouard, Mark Joseph Hamzy | 2011-02-08 |
| 7870208 | Dynamic reader-instigated categorization and distribution restriction of mailing list threads | Michael Halcrow, Dustin Kirkland | 2011-01-11 |
| 7845006 | Mitigating malicious exploitation of a vulnerability in a software application by selectively trapping execution along a code path | Prasadarao Akulavenkatavara, Janice M. Girouard | 2010-11-30 |
| 7818576 | User controlled anonymity when evaluating into a role | Michael Halcrow, Dustin Kirkland | 2010-10-19 |
| 7813482 | Internet telephone voice mail management | Janice M. Girouard, Dustin Kirkland, Kimberly DaShawn Simon | 2010-10-12 |
| 7793114 | Method for forecasting risks associated with software packages | Michael Halcrow, Kylene Jo Hall, Dustin Kirkland | 2010-09-07 |
| 7707411 | Method and system for providing a trusted platform module in a hypervisor environment | Steven A. Bade, Ryan Catherman, James Hoff, Nia Letise Kelley | 2010-04-27 |
| 7634589 | Method for controlling peripheral adapter interrupt frequency by estimating processor load in the peripheral adapter | Vaijayanthimala K. Anand, Janice M. Girouard | 2009-12-15 |
| 7596607 | Apparatus for managing email messages | Janice M. Girouard | 2009-09-29 |
| 7548953 | Method and system for dynamic reader-instigated categorization and distribution restriction on mailing list threads | Michael Halcrow, Dustin Kirkland | 2009-06-16 |
| 7519658 | Automatic blogging during media viewing | Howard N. Anglin, Yvonne M. Young, Elizabeth Silvia, Chaitanya Kandagatla | 2009-04-14 |
| 7487545 | Probabilistic mechanism to determine level of security for a software package | Kylene Jo Hall, Dustin Kirkland | 2009-02-03 |
| 7484099 | Method, apparatus, and product for asserting physical presence with a trusted platform module in a hypervisor environment | Steven A. Bade, Ryan Catherman, James Hoff, Nia Letise Kelley | 2009-01-27 |
| 7484091 | Method and system for providing a trusted platform module in a hypervisor environment | Steven A. Bade, Ryan Catherman, James Hoff, Nia Letise Kelley | 2009-01-27 |