Issued Patents All Time
Showing 1–25 of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11095676 | Identifying and remediating malware-compromised devices | Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang | 2021-08-17 |
| 10977620 | Calendaring dependencies | David Bruce Kumhyr | 2021-04-13 |
| 10623375 | Auto-detection of web-based application characteristics for reverse proxy enablement | Richard Jay Cohen, Anne Louise Bolgert, Randolph Michael Forlenza, Miguel Sang | 2020-04-14 |
| 10530804 | Identifying and remediating malware-compromised devices | Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang | 2020-01-07 |
| 10523424 | Optimizing use of hardware security modules | John T. Peck, Kristin Marie Hazlewood, John A. Morganti | 2019-12-31 |
| 10389527 | Event-driven, asset-centric key management in a smart grid | Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix | 2019-08-20 |
| 10164998 | Identifying and remediating malware-compromised devices | Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang | 2018-12-25 |
| 10122693 | Protocol based key management | Bruce Arland Rich, Xiaoyan Zhang | 2018-11-06 |
| 9881173 | Managing keys used for encrypting data | Kristin Marie Hazlewood, John T. Peck | 2018-01-30 |
| 9848010 | Identifying and remediating malware-compromised devices | Anne Louise Bolgert, Richard Jay Cohen, Miguel Sang | 2017-12-19 |
| 9794063 | Optimizing use of hardware security modules | John T. Peck, Kristin Marie Hazlewood, John A. Morganti | 2017-10-17 |
| 9594920 | Managing keys used for encrypting data | Kristin Marie Hazlewood, John T. Peck | 2017-03-14 |
| 9584314 | Event-driven, asset-centric key management in a smart grid | Sadanand Rajaram Bajekal, Jai Singh Arun, Michael Delaine Nix | 2017-02-28 |
| 9378388 | Managing keys used for encrypting data | Kristin Marie Hazlewood, John T. Peck | 2016-06-28 |
| 8683222 | Optimizing use of hardware security modules | John T. Peck, Kristin Marie Hazlewood, John A. Morganti | 2014-03-25 |
| 8675875 | Optimizing use of hardware security modules | John T. Peck, Kristin Marie Hazlewood, John A. Morganti | 2014-03-18 |
| 8645182 | Integrated calendar and task scheduler | Conrad James Johnson, James Ealem Shewbert, Perry Lee Statham, Sandra Lee Tipton | 2014-02-04 |
| 8091138 | Method and apparatus for controlling the presentation of confidential content | Conrad James Johnson, Helen McKinstry, Perry Lee Statham, Sandra Lee Tipton | 2012-01-03 |
| 7971069 | Security system for replicated storage devices on computer networks | — | 2011-06-28 |
| 7865721 | Method and system for configuring highly available online certificate status protocol | — | 2011-01-04 |
| 7717326 | Method and system for protecting data | David Bruce Kumhyr, Pamela A. Nesbitt, Lorin Evan Ullmann | 2010-05-18 |
| 7318155 | Method and system for configuring highly available online certificate status protocol responders | — | 2008-01-08 |
| 7236465 | System and method for gathering multicast content receiver data | Dwip N. Banerjee, Rabindranath Dutta, Kumar Ravi | 2007-06-26 |
| 7191192 | Metadirectory agents having extensible functions | Rod Mancisidor | 2007-03-13 |
| 7146499 | Security system for replicated storage devices on computer networks | — | 2006-12-05 |