| 12015636 |
Automated modeling and analysis of security attacks and attack surfaces for an information system or computing device |
— |
2024-06-18 |
| 10068064 |
Software protection using an installation product having an entitlement file |
Timothy J. Hahn, Bernard P. Palmer, Jr., Michael Waidner |
2018-09-04 |
| 9946848 |
Software protection using an installation product having an entitlement file |
Timothy J. Hahn, Bernard P. Palmer, Jr., Michael Waidner |
2018-04-17 |
| 9911093 |
Intelligent service management and process control using policy-based automation and predefined task templates |
— |
2018-03-06 |
| 9898587 |
Software protection using an installation product having an entitlement file |
Timothy J. Hahn, Bernard P. Palmer, Jr., Michael Waidner |
2018-02-20 |
| 9436921 |
Intelligent service management and process control using policy-based automation and predefined task templates |
— |
2016-09-06 |
| 9009472 |
Providing consistent cryptographic operations |
Julian Ariel Cerruti, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto |
2015-04-14 |
| 9009473 |
Providing consistent cryptographic operations across several applications |
Patricio M. Reyna Almandos, Eduardo M. Coria, Mariela Claudia Lanza, Guillermo Manzato, Mariano Alejandro Prediletto |
2015-04-14 |
| 8725521 |
System and method for designing secure business solutions using patterns |
— |
2014-05-13 |
| 8161525 |
Method and system for architecting a secure solution |
Arthur M. Gilbert |
2012-04-17 |
| 8150717 |
Automated risk assessments using a contextual data model that correlates physical and logical assets |
— |
2012-04-03 |
| 7251831 |
Method and system for architecting a secure solution |
Arthur M. Gilbert |
2007-07-31 |