Issued Patents All Time
Showing 26–50 of 93 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7752442 | Virtual distributed security system | Giovanni M. Della-Libera, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more | 2010-07-06 |
| 7752431 | Virtual distributed security system | Giovanni M. Della-Libera, Scott A. Konersmann, Butler W. Lampson, Paul J. Leach, Bradford H. Lovering +4 more | 2010-07-06 |
| 7746250 | Message encoding/decoding using templated parameters | Arun K. Nanda, John P. Shewchuk, Hervey O. Wilson | 2010-06-29 |
| 7743145 | Verifying measurable aspects associated with a module | John P. Shewchuk, Bradford H. Lovering, Daniel R. Simon | 2010-06-22 |
| 7730094 | Scoped access control metadata element | Giovanni M. Della-Libera, Elliot Waingold | 2010-06-01 |
| 7707637 | Distributed threat management | Giovanni M. Della-Libera, John P. Shewchuk | 2010-04-27 |
| 7702924 | End-to-end reliable messaging with complete acknowledgement | David E. Langworthy, Luis Felipe Cabrera, Patrick James Helland, Steven Lucco, John P. Shewchuk | 2010-04-20 |
| 7694131 | Using rich pointers to reference tokens | Arun K. Nanda | 2010-04-06 |
| 7693807 | Mapping between anonymous modules in a network environment | Richard Hasha | 2010-04-06 |
| 7676586 | Hierarchical federation metadata | Arun K. Nanda | 2010-03-09 |
| 7676540 | Scoped referral statements | Henrik Frystyk Nielsen, Steven Lucco, David Levin, Erik B. Christensen | 2010-03-09 |
| 7664023 | Dynamic protocol construction | David Levin, Erik B. Christensen, Saurab Nog, Donald F. Box, Giovanni M. Della-Libera +2 more | 2010-02-16 |
| 7657745 | Secure electronic transfer without requiring knowledge of secret data | Max G. Morris | 2010-02-02 |
| 7640299 | Optimizing communication using scaleable peer groups | Gopala Krishna R. Kakivaya, Hervey O. Wilson, Richard Hasha | 2009-12-29 |
| 7640260 | Valid transformation expressions for structured data | Donald F. Box, Martin J. Gudgin | 2009-12-29 |
| 7636939 | Endpoint identification and security | Douglas A. Walter, Giovanni M. Della-Libera, Melissa W. Dunn, Richard Hasha, Tomasz Janczuk | 2009-12-22 |
| 7631359 | Hidden proactive replication of data | Luis Felipe Cabrera, Marvin M. Theimer | 2009-12-08 |
| 7631298 | Extensible architecture for project development systems | Martyn S. Lovell, Michael Grier, Bradley Bartz | 2009-12-08 |
| 7627759 | End-to-end reliable messaging with complete acknowledgement | David E. Langworthy, Luis Felipe Cabrera, Patrick James Helland, Steven Lucco, John P. Shewchuk | 2009-12-01 |
| 7613997 | Grouping and nesting hierarchical namespaces | Allen L. Brown, Robert G. Atkinson, Steven Lucco | 2009-11-03 |
| 7610290 | Searching with adaptively configurable user interface and extensible query language | Steven J. Kruy, Kenneth D. Hardy, Jomo Fisher | 2009-10-27 |
| 7610316 | Extensible architecture for versioning APIs | Bradley Bartz, Michael Santoro, Zachary L. Anderson, Christopher D. Reeves | 2009-10-27 |
| 7567586 | Above-transport layer message partial compression | Steven Lucco | 2009-07-28 |
| 7562151 | Peer tunnels and peer group targets | — | 2009-07-14 |
| 7559080 | Automatically generating security policies for web services | Karthikeyan Bhargavan, Cedric Fournet, Andrew D. Gordon | 2009-07-07 |