Issued Patents All Time
Showing 26–50 of 70 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7694022 | Method and system for filtering communications to prevent exploitation of a software vulnerability | Jason Garms, Chuanxiong Guo, Jiahe Helen Wang, Alf Zugenmaier | 2010-04-06 |
| 7676840 | Use of hashing in a secure boot loader | Dinarte R. Morais, Jon Lange, Ling Tony Chen, Josh Benaloh | 2010-03-09 |
| 7669049 | System and method for protecting privacy and anonymity of parties of network communications | Yi-Min Wang, Qixiang Sun, Wilfred Russell | 2010-02-23 |
| 7665126 | Mesh networks with exclusion capability | Paramvir Bahl, Helen Wang | 2010-02-16 |
| 7644275 | Pass-thru for client authentication | David R. Mowers, John A. Banes, Paul J. Leach | 2010-01-05 |
| 7640215 | System and method for evaluating and enhancing source anonymity for encrypted web traffic | Yi-Min Wang, Qixiang Sun, Wilfred Russell, Lili Qiu, Venkata N. Padmanabhan | 2009-12-29 |
| 7634661 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2009-12-15 |
| 7617322 | Secure peer-to-peer cache sharing | Khaja E. Ahmed | 2009-11-10 |
| 7577839 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2009-08-18 |
| 7577840 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2009-08-18 |
| 7574603 | Method of negotiating security parameters and authenticating users interconnected to a network | Brian D. Swander, Sara Bitan, Christian Huitema, Paul G. Mayfield | 2009-08-11 |
| 7549048 | Efficient and secure authentication of computing systems | Trevor W. Freeman, Timothy M. Moore, Bernard Aboba | 2009-06-16 |
| 7549170 | System and method of inkblot authentication | Adam Stubblefield | 2009-06-16 |
| 7529933 | TLS tunneling | Ashwin Palekar, Arun Ayyagari | 2009-05-05 |
| 7489645 | Mesh networks with end device recognition | Paramvir Bahl, Helen Wang | 2009-02-10 |
| 7464265 | Methods for iteratively deriving security keys for communications sessions | Arun Ayyagari, Bernard Aboba, Krishna Ganugapati, Timothy M. Moore, Pradeep Bahl | 2008-12-09 |
| 7370196 | Controlled-content recoverable blinded certificates | — | 2008-05-06 |
| 7305553 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2007-12-04 |
| 7299352 | Controlled-content recoverable blinded certificates | — | 2007-11-20 |
| 7299349 | Secure end-to-end notification | Josh Cohen, Michael Kramer, Bradley M. Hammond, Paul Roberts, Lee Butler +1 more | 2007-11-20 |
| 7284271 | Authorizing a requesting entity to operate upon data structures | Mark Lucovsky, Shaun D. Pierce, Michael G. Burner, Richard B. Ward, Paul J. Leach +4 more | 2007-10-16 |
| 7257707 | Manifest-based trusted agent management in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2007-08-14 |
| 7246374 | Enhancing computer system security via multiple user desktops | Dirk Balfanz | 2007-07-17 |
| 7243230 | Transferring application secrets in a trusted operating system environment | Paul England, Marcus Peinado, Josh Benaloh | 2007-07-10 |
| 7200599 | Automated generator of input-validation filters | Valentin Nikolaev Razmov, Jonathan D. Pincus | 2007-04-03 |