| 11909769 |
Technologies for privacy-preserving security policy evaluation |
Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod K. Sharma, Arthur S. Zeigler +2 more |
2024-02-20 |
| 11902388 |
Service-oriented architecture |
Christopher Smith |
2024-02-13 |
| 11863470 |
Systems and methods for delivery using a message queue |
Senthil K. Venkatesan, Arthur S. Zeigler, Anders Swanson |
2024-01-02 |
| 11354417 |
Enhanced secure boot |
Jiewen Yao, Rangasai V. Chaganty, Xiang Ma, Ravi Poovalur Rangarajan, Rajesh Poornachandran +5 more |
2022-06-07 |
| 11076003 |
Service-oriented architecture |
Christopher Smith |
2021-07-27 |
| 10911496 |
Technologies for privacy-preserving security policy evaluation |
Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod K. Sharma, Arthur S. Zeigler +2 more |
2021-02-02 |
| 10885199 |
Enhanced secure boot |
Jiewen Yao, Rangasai V. Chaganty, Xiang Ma, Ravi Poovalur Rangarajan, Rajesh Poornachandran +5 more |
2021-01-05 |
| 10447714 |
Context-aware network on a data exchange layer |
Hemang Satish Nadkarni |
2019-10-15 |
| 10382489 |
Technologies for privacy-preserving security policy evaluation |
Rajesh Poornachandran, Ned M. Smith, Vincent J. Zimmer, Pramod K. Sharma, Arthur S. Zeigler +2 more |
2019-08-13 |
| 10205798 |
Merging multiple system trees over a data exchange layer |
Don R. Hanson, II |
2019-02-12 |
| 10171594 |
Service-oriented architecture |
Christopher Smith |
2019-01-01 |
| 10135845 |
Context-aware network on a data exchange layer |
Hemang Satish Nadkarni |
2018-11-20 |
| 10114952 |
System, apparatus and method for performing secure memory training and management in a trusted environment |
Atul Khare, Karunakara Kotary, Rajesh Poornachandran, Vincent J. Zimmer |
2018-10-30 |
| 9596257 |
Detection and prevention of installation of malicious mobile applications |
Jayasankar Divakarla, Pramod K. Sharma |
2017-03-14 |
| 9536057 |
Premises aware security |
Pramod K. Sharma, Sumant Vashisth |
2017-01-03 |
| 9152784 |
Detection and prevention of installation of malicious mobile applications |
Jayasankar Divakarla, Pramod K. Sharma |
2015-10-06 |
| 8862752 |
System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof |
Sameer Shashikant Paranjape, Pramod K. Sharma |
2014-10-14 |
| 8411684 |
System, method, and computer program product for determining a hop count between network devices utilizing a binary search |
Anil Z. Chakravarthy, Sameer Shashikant Paranjape |
2013-04-02 |