Issued Patents All Time
Showing 76–100 of 101 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9344889 | Methods, systems and apparatus to pair medical devices to an in-body network | Steven A. Mancini, Igor Tatourian, Robert L. Vaughn, Tobias M. Kohlenberg, Jesse Walker +3 more | 2016-05-17 |
| 9292683 | Computing device security | Gyan Prakash, Shahrokh Shahidzadeh, Venkatesh Ramamurthy, Mohan J. Kumar | 2016-03-22 |
| 9264499 | Cloud data storage location monitoring | John B. Vicente, Mark D. Yarvis, James R. Blakley | 2016-02-16 |
| 9258304 | Methods and apparatus for using keys conveyed via physical contact | Tobias M. Kohlenberg, Rita H. Wouhaybi, Igor Tatourian | 2016-02-09 |
| 9245144 | Secure data container for web applications | Rita H. Wouhaybi, Tobias M. Kohlenberg, Alan D. Ross | 2016-01-26 |
| 9223950 | Security challenge assisted password proxy | Rita H. Wouhaybi, Tobias M. Kohlenberg | 2015-12-29 |
| 9226150 | Tracking device status with respect to other devices and zones of a virtual geo-fence | Rita H. Wouhaybi, Rahul C. Shah, Chieh-Yih Wan, Douglas Bogia | 2015-12-29 |
| 9213827 | Security data aggregation and business intelligence for web applications | Alan D. Ross, Rita H. Wouhaybi, Tobias M. Kohlenberg | 2015-12-15 |
| 9130939 | Ad hoc decentralized cloud infrastructure | John B. Vicente, Mark D. Yarvis, James R. Blakley | 2015-09-08 |
| 9092617 | Protecting systems from unauthorized access to system resources using browser independent web page technology | Dewan Prashant, David M. Durham | 2015-07-28 |
| 9088605 | Proactive network attack demand management | Robert Carpenter | 2015-07-21 |
| 9081940 | Method and service for user transparent certificate verifications for web mashups and other composite applications | Brian Scott Trevor, Joseph Doolittle | 2015-07-14 |
| 8972713 | Cloud transformable device | John B. Vicente, Mark D. Yarvis, James R. Blakley | 2015-03-03 |
| 8924569 | Cloud federation as a service | — | 2014-12-30 |
| 8918837 | Web application container for client-level runtime control | Prashant Dewan | 2014-12-23 |
| 8863138 | Application service performance in cloud computing | Jeffrey C. Sedayao, Vishwa Hassan, Cindy A. Smith, Terry H. Yoshii, David W. Stone +1 more | 2014-10-14 |
| 8856864 | Detecting, enforcing and controlling access privileges based on sandbox usage | Tobias M. Kohlenberg, Rita H. Wouhaybi, Alan D. Ross | 2014-10-07 |
| 8843618 | Cloud service information overlay | — | 2014-09-23 |
| 8578445 | Micro and macro trust in a decentralized environment | Rita H. Wouhaybi, John B. Vicente | 2013-11-05 |
| 8495145 | Controlling receipt of undesired electronic mail | Don G. Meyers, Robert J. Johnson | 2013-07-23 |
| 8341226 | Techniques to control electronic mail delivery | Don G. Meyers | 2012-12-25 |
| 8255975 | Method and apparatus for a community-based trust | Rita H. Wouhaybi | 2012-08-28 |
| 8250639 | Micro and macro trust in a decentralized environment | Rita H. Wouhaybi, John B. Vicente | 2012-08-21 |
| 8086718 | Automated process and apparatus for providing integrated management and control of computer networks | John B. Vicente, Richard Robak | 2011-12-27 |
| 7734649 | Deriving and using data access control information to determine whether to permit derivations of data elements | Sigal Louchheim | 2010-06-08 |