| 10684844 |
Making and using functional exploitation information in performing software or firmware updates |
Scott B. Compton, William J. Rooney, Dale F. Riedy, David H. Surman |
2020-06-16 |
| 9710655 |
Controlled delivery and assessing of security vulnerabilities |
Margaret M. Bennett, William E. Spencer |
2017-07-18 |
| 9710656 |
Controlled delivery and assessing of security vulnerabilities |
Margaret M. Bennett, William E. Spencer |
2017-07-18 |
| 9584538 |
Controlled delivery and assessing of security vulnerabilities |
Margaret M. Bennett, William E. Spencer |
2017-02-28 |
| 9531728 |
Controlled delivery and assessing of security vulnerabilities |
Margaret M. Bennett, William E. Spencer |
2016-12-27 |
| 8762783 |
Error identification |
Robert M. Abrams, Donald T. Durand, Ming-Yin Ng |
2014-06-24 |
| 8291382 |
Maintenance assessment management |
Nicole M. Fagen, William E. Spencer |
2012-10-16 |
| 5628023 |
Virtual storage computer system having methods and apparatus for providing token-controlled access to protected pages of memory via a token-accessible view |
Glen E. Garrison, Danny R. Sutherland, Kenneth G. Rubsam |
1997-05-06 |
| 5619671 |
Method and apparatus for providing token controlled access to protected pages of memory |
Glen E. Garrison |
1997-04-08 |