| 10803027 |
Method and system for managing file system access and interaction |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2020-10-13 |
| 10193879 |
Method and system for software application deployment |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2019-01-29 |
| 9906493 |
Method and system for verifying the integrity of computing devices |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2018-02-27 |
| 9686278 |
Method and system for configuring computing devices |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2017-06-20 |
| 9680824 |
Method and system for authentication by intermediaries |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2017-06-13 |
| 9680805 |
Method and system for key management |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2017-06-13 |
| 9584436 |
Method and system for managing class of service in a network |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2017-02-28 |
| 9531677 |
Method and system for managing network access |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2016-12-27 |
| 9531715 |
Method and system for protecting credentials |
Robert Stephen Rodgers, William N. Eatherton, Michael John Beesley, Stefan Dyckerhoff, Philippe Lacroute +8 more |
2016-12-27 |
| 8769129 |
Server initiated secure network connection |
Kent A. Watsen, Simon J. Gerraty, Philip A. Shafer, Darren Christopher Tom |
2014-07-01 |
| 8412803 |
Rescue configuration |
— |
2013-04-02 |