RJ

Robert A. Johnson

UN Unisys: 42 patents #4 of 2,015Top 1%
SA Siemens Building Technologies Ag: 2 patents #20 of 170Top 15%
CM Canadian Marconi: 1 patents #7 of 20Top 35%
IN Intel: 1 patents #18,218 of 30,777Top 60%
Overall (All Time): #61,653 of 4,157,543Top 2%
46
Patents All Time

Issued Patents All Time

Showing 25 most recent of 46 patents

Patent #TitleCo-InventorsDate
12395492 Network model utilizing property sets Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Saunders, Robert Buckwalter +3 more 2025-08-19
12225017 Method of creating secure endpoints on a network Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Saunders, Robert Buckwalter +3 more 2025-02-11
12124563 Virtual relay device for providing a secure connection to a remote device Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand 2024-10-22
11729004 Certificate-based remote dynamic isolation of IOT devices using distributed ledger technologies Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk 2023-08-15
11153348 Third party integration with enterprise security management tool Michael J DiDomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Philippe Jolly +1 more 2021-10-19
11063982 Object scope definition for enterprise security management tool Michael J. Di Domenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup 2021-07-13
D924883 Electronic display with a graphical user interface Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps 2021-07-13
11030305 Virtual relay device for providing a secure connection to a remote device Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand 2021-06-08
10979455 Solution definition for enterprise security management Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps 2021-04-13
10880332 Enterprise security management tool Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps 2020-12-29
10841340 Custom node and profile classifications for enterprise security management tool Michael C. Leap, Michael J. Di Domenico, Richard W. Phelps, Philippe Jolly, Emily M. Shoup 2020-11-17
10652280 User interface features for enterprise security management Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps 2020-05-12
10454890 Negotiation of security protocols and protocol attributes in secure communications environment Kathleen Wild, Sarah K. Inforzato, Ted Hinaman 2019-10-22
10454931 Secure remote access for secured enterprise communications Ted Hinaman, Steven J Rajcan, Matthew Mohr, William Gunn, Sarah K. Inforzato +2 more 2019-10-22
10248442 Automated provisioning of virtual machines David Dodgson, Ralph Farina, James Albert Fontana, David Maw, Anthony Narisi 2019-04-02
10158674 Multi-level affinitization for enterprise security management Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps 2018-12-18
9912663 Enabling secure network mobile device communications James Trocki, Mark K Vallevand, Steven L. Rajcan, Ted Hinaman 2018-03-06
9817968 Secure connection for a remote device through a mobile application Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand 2017-11-14
9819658 Virtual gateways for isolating virtual machines David Dodgson, Ralph Farina, James Albert Fontana, David Maw, Anthony Narisi 2017-11-14
9794225 Secure network communications in a mobile device over IPsec James Trocki, Mark K Vallevand, Steven L. Rajcan, Ted Hinaman 2017-10-17
9794237 Secured networks and endpoints applying internet protocol security Sarah K. Inforzato 2017-10-17
9716589 Secured communications arrangement applying internet protocol security Kathleen Wild, Sarah K. Inforzato, Ted Hinaman 2017-07-25
9596077 Community of interest-based secured communications over IPsec Kathleen Wild, Sarah K. Inforzato, Ted Hinaman 2017-03-14
9571455 Remote credential management for hybrid clouds with enterprise networks Mark Steven Brandt, Christopher A. Byrd, Kathy Y Jaing 2017-02-14
9525666 Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks Sarah K. Inforzato, Ted Hinaman 2016-12-20