LJ

Linwood H. Overby, Jr.

IBM: 66 patents #1,150 of 70,183Top 2%
📍 Raleigh, NC: #66 of 6,378 inventorsTop 2%
🗺 North Carolina: #342 of 45,564 inventorsTop 1%
Overall (All Time): #31,999 of 4,157,543Top 1%
67
Patents All Time

Issued Patents All Time

Showing 51–67 of 67 patents

Patent #TitleCo-InventorsDate
7146432 Methods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment Mark L. Antes, James Russell Godwin, David Anthony Herr, David J. Wierbowski 2006-12-05
7137144 Technique of defending against network connection flooding attacks Kira Sterling Attwood, Chien-En Sun 2006-11-14
7107350 Methods, systems and computer program products for security processing outbound communications in a cluster computing environment James Russell Godwin 2006-09-12
7076803 Integrated intrusion detection services David Bruton, Patricia Jakubik, Patrick Michael LiVecchi 2006-07-11
6976164 Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Steven W. Pogue 2005-12-13
6941366 Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment Mark L. Antes, James Russell Godwin, David Anthony Herr, David J. Wierbowski 2005-09-06
6934848 Technique for handling subsequent user identification and password requests within a certificate-based host session Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Steven W. Pogue 2005-08-23
6785729 SYSTEM AND METHOD FOR AUTHORIZING A NETWORK USER AS ENTITLED TO ACCESS A COMPUTING NODE WHEREIN AUTHENTICATED CERTIFICATE RECEIVED FROM THE USER IS MAPPED INTO THE USER IDENTIFICATION AND THE USER IS PRESENTED WITH THE OPPRTUNITY TO LOGON TO THE COMPUTING NODE ONLY AFTER THE VERIFICATION IS SUCCESSFUL Patricia Jakubik 2004-08-31
6754832 Security rule database searching in a network security environment James Russell Godwin, Richard Allen Wenklar 2004-06-22
6715081 Security rule database searching in a network security environment Kira Sterling Attwood, James Russell Godwin, Brian Sean Perry, David J. Wierbowski 2004-03-30
6505192 Security rule processing for connectionless protocols James Russell Godwin, David Andrew Jones, Richard Allen Wenklar 2003-01-07
6347376 Security rule database searching in a network security environment Kira Sterling Attwood, James Russell Godwin, Brian Sean Perry, David J. Wierbowski 2002-02-12
6016503 Methods, systems and computer program products for preemptive avoidance of constraints for shared resources Balachandar Rajaraman 2000-01-18
5983259 Systems and methods for transmitting and receiving data in connection with a communications stack in a communications system Scott Allan Campbell, Dale C. Gugliotta, Lynn Douglas Long, Louis F. Menditto, Masashi E. Miyake +2 more 1999-11-09
5920703 Systems and methods for managing the processing of relatively large data objects in a communications stack Scott Allan Campbell, Dale C. Gugliotta, Lynn Douglas Long, Masashi E. Miyake, Bala Rajaraman 1999-07-06
5909553 Systems and methods for controlling the transmission of relatively large data objects in a communications system Scott Allan Campbell, Lynn Douglas Long, Bala Rajaraman 1999-06-01
5813042 Methods and systems for control of memory Scott Allan Campbell, Lynn Douglas Long, Bala Rajaraman 1998-09-22