| 12235954 |
Ransomware detection using multiple security threat detection processes |
Andrew Kutner, Ronald Karr, Patrick D. Lee, David Huskisson, Brian Carpenter +1 more |
2025-02-25 |
| 11941116 |
Ransomware-based data protection parameter modification |
Andrew Kutner, Ronald Karr, Patrick D. Lee, David Huskisson, Brian Carpenter +1 more |
2024-03-26 |
| 11893126 |
Data deletion for a multi-tenant environment |
Reena Gupta |
2024-02-06 |
| 11675898 |
Recovery dataset management for security threat monitoring |
Andrew Kutner, Ronald Karr, Patrick D. Lee, David Huskisson, Brian Carpenter |
2023-06-13 |
| 11657146 |
Compressibility metric-based detection of a ransomware threat to a storage system |
Ronald Karr, Andrew Kutner, Patrick D. Lee, David Huskisson, John Colgrove +1 more |
2023-05-23 |
| 11645162 |
Recovery point determination for data restoration in a storage system |
David Huskisson, Ronald Karr, Andrew Kutner, Patrick D. Lee, Cynthia Dote |
2023-05-09 |
| 11620690 |
Using transaction data to identify computing devices capable of performing transactions subject to transaction parameters |
Justin Mehta, Scott C. Harris |
2023-04-04 |
| 11615185 |
Multi-layer security threat detection for a storage system |
Patrick D. Lee, Ronald Karr, Andrew Kutner, David Huskisson |
2023-03-28 |
| 11341236 |
Traffic-based detection of a security threat to a storage system |
Ronald Karr, Andrew Kutner, Patrick D. Lee, David Huskisson, John Colgrove +1 more |
2022-05-24 |
| 10997652 |
Systems for using transaction data to generate optimized event templates based on a requested event type |
Justin Mehta, Scott C. Harris |
2021-05-04 |
| 10896450 |
System and methods for using transaction data to identify computing devices capable of performing transactions subject to transaction parameters |
Justin Mehta, Scott C. Harris |
2021-01-19 |
| 10740832 |
Computer-implemented method and systems for using transaction data to generate optimized event templates based on a requested event type |
Justin Mehta, Scott C. Harris |
2020-08-11 |
| 9342808 |
Load balancing technique implemented in a data network device utilizing a data cache |
Jack Dee Menendez, Ajit Ramachandra Mayya |
2016-05-17 |
| 8880428 |
Restricted purchase of regulated items over a network |
Franklin Goodhue Woodward, James Connell Mills, Randolph A. Hodge, Joyo Wijaya |
2014-11-04 |
| 8010411 |
Restricted purchase of regulated items over a network |
Franklin Goodhue Woodward, James Connell Mills, Randolph A. Hodge, Joyo Wijaya |
2011-08-30 |
| 7930416 |
Load balancing technique implemented in a data network device utilizing a data cache |
Jack Dee Menendez, Ajit Ramachandra Mayya |
2011-04-19 |
| 7801772 |
Method and apparatus for facilitating online purchase of regulated products over a data network |
Franklin Goodhue Woodward, James Connell Mills, Randolph A. Hodge, Joyo Wijaya |
2010-09-21 |
| 7509407 |
Load balancing technique implemented in a data network device utilizing a data cache |
Jack Dee Menendez, Ajit Ramachandra Mayya |
2009-03-24 |
| 7308423 |
Technique for handling sales of regulated items implemented over a data network |
Franklin Goodhue Woodward, James Connell Mills, Randolph A. Hodge, Joyo Wijaya |
2007-12-11 |
| 7197547 |
Load balancing technique implemented in a data network device utilizing a data cache |
Jack Dee Menendez, Ajit Ramachandra Mayya |
2007-03-27 |