Issued Patents All Time
Showing 1–25 of 47 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9848006 | Detecting past intrusions and attacks based on historical network traffic information | Clifford E. Kahn | 2017-12-19 |
| 9658872 | Maintaining user identity associated with access to network resources using virtual machines | — | 2017-05-23 |
| 9485262 | Detecting past intrusions and attacks based on historical network traffic information | Clifford E. Kahn | 2016-11-01 |
| 9479538 | Combining network endpoint policy results | Roger A. Chickering, Paul Funk, Panagiotis Kougiouris, Paul J. Kirner | 2016-10-25 |
| 8661505 | Policy evaluation in controlled environment | Panagiotis Kougiouris, Roger A. Chickering, Paul J. Kirner | 2014-02-25 |
| 8644167 | Combining network endpoint policy results | Roger A. Chickering, Paul Funk, Panagiotis Kougiouris, Paul J. Kirner | 2014-02-04 |
| 8458462 | Verifying integrity of network devices for secure multicast communications | — | 2013-06-04 |
| 8369224 | Combining network endpoint policy results | Roger A. Chickering, Paul Funk, Panagiotis Kouriouris, Paul J. Kirner | 2013-02-05 |
| 8352998 | Policy evaluation in controlled environment | Panagiotis Kougiouris, Roger A. Chickering, Paul J. Kirner | 2013-01-08 |
| 8103909 | Automatic hardware-based recovery of a compromised computer | — | 2012-01-24 |
| 8104073 | Exchange of network access control information using tightly-constrained network access control protocols | — | 2012-01-24 |
| 7996713 | Server-to-server integrity checking | — | 2011-08-09 |
| 7982595 | Network policy evaluation | Roger A. Chickering | 2011-07-19 |
| 7592906 | Network policy evaluation | Roger A. Chickering | 2009-09-22 |
| 7395549 | Method and apparatus for providing a key distribution center without storing long-term server secrets | Radia J. Perlman | 2008-07-01 |
| 7213262 | Method and system for proving membership in a nested group using chains of credentials | Yassir K. Elley, Anne H. Anderson, Sean J. Mullan, Radia J. Perlman | 2007-05-01 |
| 7178021 | Method and apparatus for using non-secure file servers for secure information storage | Radia J. Perlman | 2007-02-13 |
| 7085925 | Trust ratings in group credentials | Anne H. Anderson, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan | 2006-08-01 |
| 7058798 | Method ans system for pro-active credential refreshing | Yassir K. Elley, Anne H. Anderson, Sean J. Mullan, Radia J. Perlman | 2006-06-06 |
| 7054905 | Replacing an email attachment with an address specifying where the attachment is stored | David C. Douglas, Yassir K. Elley, Radia J. Perlman, Sean J. Mullan, Anne H. Anderson | 2006-05-30 |
| 7010690 | Extensible system for building and evaluating credentials | Anne H. Anderson, Yassir K. Elley | 2006-03-07 |
| 6996712 | Data authentication system employing encrypted integrity blocks | Radia J. Perlman | 2006-02-07 |
| 6973569 | Inexpensive secure on-line certification authority system and method | Anne H. Anderson | 2005-12-06 |
| 6912656 | Method and apparatus for sending encrypted electronic mail through a distribution list exploder | Radia J. Perlman | 2005-06-28 |
| 6883100 | Method and system for dynamic issuance of group certificates | Yassir K. Elley, Anne H. Anderson, Sean J. Mullan, Radia J. Perlman | 2005-04-19 |