Issued Patents All Time
Showing 51–75 of 214 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9122867 | Techniques for presenting password feedback to a computer system user | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2015-09-01 |
| 9111081 | Remote direct memory access authentication of a device | Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2015-08-18 |
| 9098625 | Viral trace | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2015-08-04 |
| 9088609 | Logical partition media access control impostor detector | Susann Marie Koehane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2015-07-21 |
| 9037775 | Network filtering in a virtualized environment | Jeffrey J. Feng, Terry J. Hoffman, Bhargavi B. Reddy | 2015-05-19 |
| 8955125 | Snoop echo response extractor | Tristan A. Brown, Venkat Vankatsubra | 2015-02-10 |
| 8935457 | Network filtering in a virtualized environment | Jeffrey J. Feng, Terry J. Hoffman, Bhargavi B. Reddy | 2015-01-13 |
| 8875133 | Migration of virtual machines | Alan Thomas Joseph Hayward | 2014-10-28 |
| 8856519 | Start method for application cryptographic keystores | Jessica C. Murillo, Johnny Meng-Han Shieh | 2014-10-07 |
| 8850430 | Migration of virtual machines | Alan Thomas Joseph Hayward | 2014-09-30 |
| 8788806 | General purpose distributed encrypted file system | Hussaina N. Begum, Manjunath A. Pattanshetti | 2014-07-22 |
| 8751789 | General purpose distributed encrypted file system | Hussaina N. Begum, Manjunath A. Pattanshetti | 2014-06-10 |
| 8725874 | Dynamic determination of an ideal client-server for a collaborative application network | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2014-05-13 |
| 8626852 | Email thread monitoring and automatic forwarding of related email messages | Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh | 2014-01-07 |
| 8621052 | Performance tuning for software as a performance level service | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2013-12-31 |
| 8607071 | Preventing replay attacks in encrypted file systems | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2013-12-10 |
| 8589698 | Integrity service using regenerated trust integrity gather program | Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2013-11-19 |
| 8515995 | Presenting multiple possible selectable domain names from a URL entry | Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh | 2013-08-20 |
| 8494167 | Method and apparatus for restoring encrypted files to an encrypting file system based on deprecated keystores | Neeta Garimella, Alexei Kojenov, Ravi Shankar, John Viksne | 2013-07-23 |
| 8468209 | Method of rescinding previously transmitted e-mail messages | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2013-06-18 |
| 8458320 | Alerting a user to an occurrence of a specified event | Susann Marie Keohane, Gerald Francis McBrearty, Jessica C. Murillo, Johnny Meng-Han Shieh | 2013-06-04 |
| 8448189 | Identifying intrusions into a network data processing system | Dolapo Martin Falola, Vinit Jain, Shannon Marie MacAlpine, James Tesauro | 2013-05-21 |
| 8424067 | Smart password determination | Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh | 2013-04-16 |
| 8391495 | Secure shell used to open a user's encrypted file system keystore | Tommy L. McLane, Jyoti B. Tenginakai | 2013-03-05 |
| 8379822 | Conference call initialization | Susann Marie Keohane, Gerald Francis McBrearty, Jessica Murillo, Johnny Meng-Han Shieh | 2013-02-19 |