Issued Patents All Time
Showing 51–67 of 67 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7146432 | Methods, systems and computer program products for providing failure recovery of network secure communications in a cluster computing environment | Mark L. Antes, James Russell Godwin, David Anthony Herr, David J. Wierbowski | 2006-12-05 |
| 7137144 | Technique of defending against network connection flooding attacks | Kira Sterling Attwood, Chien-En Sun | 2006-11-14 |
| 7107350 | Methods, systems and computer program products for security processing outbound communications in a cluster computing environment | James Russell Godwin | 2006-09-12 |
| 7076803 | Integrated intrusion detection services | David Bruton, Patricia Jakubik, Patrick Michael LiVecchi | 2006-07-11 |
| 6976164 | Technique for handling subsequent user identification and password requests with identity change within a certificate-based host session | Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Steven W. Pogue | 2005-12-13 |
| 6941366 | Methods, systems and computer program products for transferring security processing between processors in a cluster computing environment | Mark L. Antes, James Russell Godwin, David Anthony Herr, David J. Wierbowski | 2005-09-06 |
| 6934848 | Technique for handling subsequent user identification and password requests within a certificate-based host session | Julie H. King, Susan D. Kirkman, Daniel J. Labrecque, Steven W. Pogue | 2005-08-23 |
| 6785729 | SYSTEM AND METHOD FOR AUTHORIZING A NETWORK USER AS ENTITLED TO ACCESS A COMPUTING NODE WHEREIN AUTHENTICATED CERTIFICATE RECEIVED FROM THE USER IS MAPPED INTO THE USER IDENTIFICATION AND THE USER IS PRESENTED WITH THE OPPRTUNITY TO LOGON TO THE COMPUTING NODE ONLY AFTER THE VERIFICATION IS SUCCESSFUL | Patricia Jakubik | 2004-08-31 |
| 6754832 | Security rule database searching in a network security environment | James Russell Godwin, Richard Allen Wenklar | 2004-06-22 |
| 6715081 | Security rule database searching in a network security environment | Kira Sterling Attwood, James Russell Godwin, Brian Sean Perry, David J. Wierbowski | 2004-03-30 |
| 6505192 | Security rule processing for connectionless protocols | James Russell Godwin, David Andrew Jones, Richard Allen Wenklar | 2003-01-07 |
| 6347376 | Security rule database searching in a network security environment | Kira Sterling Attwood, James Russell Godwin, Brian Sean Perry, David J. Wierbowski | 2002-02-12 |
| 6016503 | Methods, systems and computer program products for preemptive avoidance of constraints for shared resources | Balachandar Rajaraman | 2000-01-18 |
| 5983259 | Systems and methods for transmitting and receiving data in connection with a communications stack in a communications system | Scott Allan Campbell, Dale C. Gugliotta, Lynn Douglas Long, Louis F. Menditto, Masashi E. Miyake +2 more | 1999-11-09 |
| 5920703 | Systems and methods for managing the processing of relatively large data objects in a communications stack | Scott Allan Campbell, Dale C. Gugliotta, Lynn Douglas Long, Masashi E. Miyake, Bala Rajaraman | 1999-07-06 |
| 5909553 | Systems and methods for controlling the transmission of relatively large data objects in a communications system | Scott Allan Campbell, Lynn Douglas Long, Bala Rajaraman | 1999-06-01 |
| 5813042 | Methods and systems for control of memory | Scott Allan Campbell, Lynn Douglas Long, Bala Rajaraman | 1998-09-22 |