| 9785529 |
Lost computing resource notification |
Jeffrey T. Layton, Neil Horman |
2017-10-10 |
| 9692733 |
Key establishment and management protocol optimizations in view of channel reliability |
Avesh Kumar Agarwal |
2017-06-27 |
| 9641552 |
Extending SELinux policy with enforcement of file name translations |
Daniel J. Walsh |
2017-05-02 |
| 9465943 |
Extension of a platform configuration register with a known value |
Daniel J. Walsh |
2016-10-11 |
| 9268621 |
Reducing latency in multicast traffic reception |
Neil Horman, Jeffrey T. Layton |
2016-02-23 |
| 9158930 |
Facilitating secure file creation |
Daniel J. Walsh |
2015-10-13 |
| 9158690 |
Performing zero-copy sends in a networked file system with cryptographic signing |
Jeffrey T. Layton, Neil Horman, Josef M. Bacik |
2015-10-13 |
| 9111099 |
Centralized kernel module loading |
Neil Horman |
2015-08-18 |
| 9069931 |
Extending SELinux policy with enforcement of file name translation |
Daniel J. Walsh |
2015-06-30 |
| 8954697 |
Access to shared memory segments by multiple application processes |
Neil Horman, Jeffrey T. Layton |
2015-02-10 |
| 8832811 |
Network access control for trusted platforms |
Neil Horman |
2014-09-09 |
| 8677115 |
Methods for verifying system integrity |
Neil Horman |
2014-03-18 |
| 8627451 |
Systems and methods for providing an isolated execution environment for accessing untrusted content |
Daniel J. Walsh |
2014-01-07 |
| 8549609 |
Updating firewall rules |
Neil Horman |
2013-10-01 |
| 8490207 |
Performing zero-copy sends in a networked file system with cryptographic signing |
Jeffrey T. Layton, Neil Horman, Josef M. Bacik |
2013-07-16 |