Issued Patents All Time
Showing 1–22 of 22 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12341809 | Defending against volumetric attacks | Jian Liu, Victor Pavlov, Srinivas Kavuri, John Chanak | 2025-06-24 |
| 11930036 | Detecting attacks and quarantining malware infected devices | Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran | 2024-03-12 |
| 11483339 | Detecting attacks and quarantining malware infected devices | Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran | 2022-10-25 |
| 11477028 | Preventing account lockout through request throttling | Siva Kumar K, Brett Littrell | 2022-10-18 |
| 10075432 | Updating stored passwords | Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. | 2018-09-11 |
| 9848006 | Detecting past intrusions and attacks based on historical network traffic information | Stephen R. Hanna | 2017-12-19 |
| 9485262 | Detecting past intrusions and attacks based on historical network traffic information | Stephen R. Hanna | 2016-11-01 |
| 9401913 | Updating stored passwords | Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. | 2016-07-26 |
| 9001999 | Updating stored passwords | Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. | 2015-04-07 |
| 8478797 | Atomic deletion of database data categories | Roger A. Chickering | 2013-07-02 |
| 8312540 | System for slowing password attacks | Jeffrey C. Venable, Sr., Roger A. Chickering | 2012-11-13 |
| 8290991 | Atomic deletion of database data categories | Roger A. Chickering | 2012-10-16 |
| 8214411 | Atomic deletion of database data categories | Roger A. Chickering | 2012-07-03 |
| 8094812 | Updating stored passwords | Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. | 2012-01-10 |
| 7185192 | Methods and apparatus for controlling access to a resource | — | 2007-02-27 |
| 7036022 | Verification of trusted-path commands | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more | 2006-04-25 |
| 7032186 | Methods and apparatus for representing resources in a computing system environment | Morrie Gasser | 2006-04-18 |
| 6871283 | Processing trusted commands in trusted and untrusted environments | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more | 2005-03-22 |
| 6507909 | Method for executing trusted-path commands | Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more | 2003-01-14 |
| 5826254 | System for selectively browsing a large, distributed directory tree using authentication links | — | 1998-10-20 |
| 5339449 | System and method for reducing storage channels in disk systems | Paul A. Karger, Andrew H. Mason, John Clay Richard Wray, Paul T. Robinson, Anthony L. Priborsky +1 more | 1994-08-16 |
| 5220661 | System and method for reducing timing channels in digital data processing systems | Wei-Ming Hu, Paul A. Karger, Andrew H. Mason, Paul T. Robinson, John Clay Richard Wray | 1993-06-15 |