| 11233742 |
Network policy architecture |
Samir Dilipkumar Saklikar, Jayaraman Iyer, Robin Martherus, Jyoti Verma |
2022-01-25 |
| 10540507 |
Verified device identity providing context to application |
Steven Richard Stites, Syam Sundar Appala, Prashanth Patil |
2020-01-21 |
| 9356928 |
Mechanisms to use network session identifiers for software-as-a-service authentication |
Nathan Sowatskey, Nancy Cam-Winget, Susan E. Thomson, David M. Jones, Jr., Klaas Wierenga +1 more |
2016-05-31 |
| 9203899 |
Event management |
Stuart M. Bailey |
2015-12-01 |
| 9069774 |
Graphical visualization and management of networks |
Eric Duchene, Etienne M. Liu, Barry Arlen Frew |
2015-06-30 |
| 9063965 |
Maintaining consistency in a database |
Ivan W. Pulleyn, Stuart M. Bailey, Etienne M. Liu, Ulf P. Ekberg, Srinath Gutti |
2015-06-23 |
| 8949938 |
Mechanisms to use network session identifiers for software-as-a-service authentication |
Nathan Sowatskey, Nancy Cam-Winget, Susan E. Thomson, David M. Jones, Jr., Klaas Wierenga +1 more |
2015-02-03 |
| 8498971 |
Maintaining consistency in a database |
Ivan W. Pulleyn, Stuart M. Bailey, Etienne M. Liu, Ulf P. Eckberg, Srinath Gutti |
2013-07-30 |
| 8060534 |
Event management |
Stuart M. Bailey |
2011-11-15 |
| 7865617 |
Maintaining consistency in a database |
Ivan W. Pulleyn, Stuart M. Bailey, Etienne M. Liu, Ulf P. Eckberg, Srinath Gutti |
2011-01-04 |