Issued Patents All Time
Showing 26–50 of 59 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8176564 | Special PC mode entered upon detection of undesired state | Curt A. Steeb, Isaac P. Ahdout, James Duffus, Martin H. Hall, Nicholas Temple +3 more | 2012-05-08 |
| 8170020 | Leveraging active firewalls for network intrusion detection and retardation of attack | Robert Ian Oliver | 2012-05-01 |
| 8112798 | Hardware-aided software code measurement | Curt A. Steeb, Zhangwei Xu | 2012-02-07 |
| 8073442 | Binding a device to a provider | Bohdan Raciborski, James Duffus, Jeffrey Alan Herold, Martin H. Hall, Paul C. Sutton +1 more | 2011-12-06 |
| 8016751 | Optical instrument | Martin Weigel | 2011-09-13 |
| 7979721 | Enhanced packaging for PC security | William J. Westerinen, Todd L. Carpenter, Shon Schmidt, Stephen Richard Drake, David Foster +1 more | 2011-07-12 |
| 7844808 | Computer compliance enforcement | William J. Westerinen, Todd L. Carpenter, Shon Schmidt, Stephen Richard Drake | 2010-11-30 |
| 7814543 | System and method for securing a computer system connected to a network from attacks | Thomas G. Phillips, Adrian Chandley, Christopher Schoppa, William J. Westerinen | 2010-10-12 |
| 7770205 | Binding a device to a computer | — | 2010-08-03 |
| 7756893 | Independent computation environment and data protection | — | 2010-07-13 |
| 7751340 | Management of incoming information | Scott C. Forbes, Shai Guday, Miller Thomas Abel, Johannes Klein, William J. Westerinen | 2010-07-06 |
| 7716727 | Network security device and method for protecting a computing device in a networked environment | Thomas G. Phillips, Christopher Schoppa, Mark Light, Wiliam Jefferson Westerinen | 2010-05-11 |
| 7716726 | System and method for protecting a computing device from computer exploits delivered over a networked environment in a secured communication | Thomas G. Phillips | 2010-05-11 |
| 7703131 | Secured distributed impersonation | Neta Amit | 2010-04-20 |
| 7669056 | Method and apparatus for measuring presentation data exposure | James Duffus | 2010-02-23 |
| 7669048 | Computing device limiting mechanism | William J. Westerinen, Curt A. Steeb, Zhangwei Xu | 2010-02-23 |
| 7657450 | Reliable, secure and scalable infrastructure for event registration and propagation in a distributed enterprise | Neta Amit | 2010-02-02 |
| 7610631 | Method and apparatus for provisioning software | Curt A. Steeb, James Duffus, Mark Light, Martin Holladay, Paul C. Sutton +3 more | 2009-10-27 |
| 7603385 | Device constellation management | Ruston Panabaker, Eric J. Horvitz, Gregory Baribault, Michael J. Sinclair, Scott C. Forbes | 2009-10-13 |
| 7603716 | Distributed network security service | James Duffus, Thomas G. Phillips | 2009-10-13 |
| 7596671 | Pre-paid computer monitoring hardware | Jack Creasey, Nicholas Temple, Thomas Phillips, William J. Westerinen, Zhangwei Xu | 2009-09-29 |
| 7562220 | System and method for programming an isolated computing environment | Thomas G. Phillps | 2009-07-14 |
| 7421413 | Delicate metering of computer usage | Thomas G. Phillips, George V. Reilly | 2008-09-02 |
| 7406446 | System and method for trustworthy metering and deactivation | William J. Westerinen | 2008-07-29 |
| 7392429 | System and method for maintaining persistent state data | Mark Light, William J. Westerinen | 2008-06-24 |