Issued Patents All Time
Showing 1–23 of 23 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10666556 | Application information based network route modification | Charles S. Lingafelt, James W. Murray, James S. Worley | 2020-05-26 |
| 10541910 | Application information based network route modification | Charles S. Lingafelt, James W. Murray, James S. Worley | 2020-01-21 |
| 10528994 | Allocation of application licenses within cloud or infrastructure | Steven Lingafelt, James W. Murray, James S. Worley | 2020-01-07 |
| 10069722 | Application information based network route modification | Charles S. Lingafelt, James W. Murray, James S. Worley | 2018-09-04 |
| 9979636 | Application information based network route modification | Charles S. Lingafelt, James W. Murray, James S. Worley | 2018-05-22 |
| 9781609 | Self-directed mobile wireless access points and wireless endpoints for wireless testing | Rachele Shannon Kurtz, Charles S. Lingafelt, James W. Murray | 2017-10-03 |
| 9734450 | Data loss prevention to remove false positives | Charles S. Lingafelt, James W. Murray, James Steven Worely | 2017-08-15 |
| 9686146 | Reconfiguring interrelationships between components of virtual computing networks | Charles S. Lingafelt, James W. Murray, James S. Worley | 2017-06-20 |
| 9491313 | Optimizing storage between mobile devices and cloud storage providers | Charles S. Lingafelt, James W. Murray, James S. Worley | 2016-11-08 |
| 9392019 | Managing cyber attacks through change of network address | Charles S. Lingafelt, James W. Murray, James S. Worley | 2016-07-12 |
| 9363158 | Reduce size of IPV6 routing tables by using a bypass tunnel | Charles S. Lingafelt, James W. Murray, James S. Worley | 2016-06-07 |
| 9350754 | Mitigating a cyber-security attack by changing a network address of a system under attack | Charles S. Lingafelt, James W. Murray, James S. Worley | 2016-05-24 |
| 9270523 | Reconfiguring interrelationships between components of virtual computing networks | Charles S. Lingafelt, James W. Murray, James S. Worley | 2016-02-23 |
| 9094521 | Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations | Charles S. Lingafelt, James W. Murray | 2015-07-28 |
| 8996647 | Optimizing storage between mobile devices and cloud storage providers | Charles S. Lingafelt, James W. Murray, James S. Worley | 2015-03-31 |
| 8806628 | Tuning of data loss prevention signature effectiveness | Charles S. Lingafelt, James W. Murray, James S. Worley | 2014-08-12 |
| 8769679 | Tuning of data loss prevention signature effectiveness | Charles S. Lingafelt, James W. Murray, James S. Worley | 2014-07-01 |
| 8635683 | Method to improve fraud detection on conference calling systems by detecting re-use of conference moderator passwords | Charles S. Lingafelt, James W. Murray | 2014-01-21 |
| 8494142 | Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations | Charles S. Lingafelt, James W. Murray | 2013-07-23 |
| 8369506 | Informing a teleconference participant that a person-of-interest has become active within the teleconference | Charles S. Lingafelt | 2013-02-05 |
| 8243904 | Methods to improve security of conference calls by observation of attendees' order and time of joining the call | Charles S. Lingafelt, James W. Murray | 2012-08-14 |
| 8103948 | Method for providing both automated and on demand project performance measurements | Gregory F. Cox, Joseph I. Greenbaum, Scott D. Hicks, William R. Kittel, James A. Martin, Jr. +2 more | 2012-01-24 |
| 7315977 | Storing, updating, and reporting on migration data using automated agents | Gregory F. Cox, Joseph I. Greenbaum, Scott D. Hicks, William R. Kittel, James A. Martin, Jr. +2 more | 2008-01-01 |