| 12341809 |
Defending against volumetric attacks |
Jian Liu, Victor Pavlov, Srinivas Kavuri, John Chanak |
2025-06-24 |
| 11930036 |
Detecting attacks and quarantining malware infected devices |
Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran |
2024-03-12 |
| 11483339 |
Detecting attacks and quarantining malware infected devices |
Biju Ramachandra Kaimal, Bandam Radha Shravan, Thiyagu Rajendran |
2022-10-25 |
| 11477028 |
Preventing account lockout through request throttling |
Siva Kumar K, Brett Littrell |
2022-10-18 |
| 10075432 |
Updating stored passwords |
Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. |
2018-09-11 |
| 9848006 |
Detecting past intrusions and attacks based on historical network traffic information |
Stephen R. Hanna |
2017-12-19 |
| 9485262 |
Detecting past intrusions and attacks based on historical network traffic information |
Stephen R. Hanna |
2016-11-01 |
| 9401913 |
Updating stored passwords |
Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. |
2016-07-26 |
| 9001999 |
Updating stored passwords |
Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. |
2015-04-07 |
| 8478797 |
Atomic deletion of database data categories |
Roger A. Chickering |
2013-07-02 |
| 8312540 |
System for slowing password attacks |
Jeffrey C. Venable, Sr., Roger A. Chickering |
2012-11-13 |
| 8290991 |
Atomic deletion of database data categories |
Roger A. Chickering |
2012-10-16 |
| 8214411 |
Atomic deletion of database data categories |
Roger A. Chickering |
2012-07-03 |
| 8094812 |
Updating stored passwords |
Andy Tsang, Roger A. Chickering, Jeffrey C. Venable, Sr. |
2012-01-10 |
| 7185192 |
Methods and apparatus for controlling access to a resource |
— |
2007-02-27 |
| 7036022 |
Verification of trusted-path commands |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more |
2006-04-25 |
| 7032186 |
Methods and apparatus for representing resources in a computing system environment |
Morrie Gasser |
2006-04-18 |
| 6871283 |
Processing trusted commands in trusted and untrusted environments |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more |
2005-03-22 |
| 6507909 |
Method for executing trusted-path commands |
Mary Ellen Zurko, Thomas Andrew Casey, Jr., Morrie Gasser, Judith Shelhorse Hall, Andrew H. Mason +3 more |
2003-01-14 |
| 5826254 |
System for selectively browsing a large, distributed directory tree using authentication links |
— |
1998-10-20 |
| 5339449 |
System and method for reducing storage channels in disk systems |
Paul A. Karger, Andrew H. Mason, John Clay Richard Wray, Paul T. Robinson, Anthony L. Priborsky +1 more |
1994-08-16 |
| 5220661 |
System and method for reducing timing channels in digital data processing systems |
Wei-Ming Hu, Paul A. Karger, Andrew H. Mason, Paul T. Robinson, John Clay Richard Wray |
1993-06-15 |