| 12375475 |
Confining lateral traversal within a computer network |
Jeffrey R. Bacon, Darrin Earl Curtis, Aaron R. Davis, Douglas Anthony Rasler, Elizabeth Anne Phippen +4 more |
2025-07-29 |
| 12149639 |
Securely rotating a server certificate |
Chunsheng Yang, Priyanka Vilas Deo, Elizabeth Anne Phippen, Bradley Turner |
2024-11-19 |
| 11601289 |
Securely rotating a server certificate |
Chunsheng Yang, Priyanka Vilas Deo, Elizabeth Anne Phippen, Bradley Turner |
2023-03-07 |
| 11216514 |
Secure DNS query |
Christopher J. Engdahl, Lee Walker, William Dixon |
2022-01-04 |
| 11063950 |
Secure remote desktop session |
George Ringer, Dayne Allen Thompson |
2021-07-13 |
| 10372484 |
Secured computing system |
Brad Turner, George Ringer, Alexandr Tcherniakhovski |
2019-08-06 |
| 9740781 |
Secure DNS query |
Christopher J. Engdahl, Lee Walker, William Dixon |
2017-08-22 |
| 8935748 |
Secure DNS query |
Christopher J. Engdahl, Lee Walker, William Dixon |
2015-01-13 |
| 8875237 |
Private network access using IPv6 tunneling |
Christopher J. Engdahl |
2014-10-28 |
| 8874693 |
Service access using a service address |
Nir Nice, Samer J. Karim |
2014-10-28 |
| 8635440 |
Proxy with layer 3 security |
— |
2014-01-21 |
| 7895319 |
Variable DNS responses based on client identity |
Christopher J. Engdahl |
2011-02-22 |
| 7346767 |
Method and apparatus for managing resource access in configuring a plurality of computers |
Richard D. Chinn, Jason Robarts, William David Wasserstrum |
2008-03-18 |