| 12425416 |
Threat detection and mitigation in a virtualized computing environment |
Anthony Joseph Suarez, Dmitry Petrovich Andreychuk |
2025-09-23 |
| 10382408 |
Computing instance migration |
Diwakar Gupta, Matthew Shawn Wilson |
2019-08-13 |
| 10320813 |
Threat detection and mitigation in a virtualized computing environment |
Anthony Joseph Suarez, Dmitry Petrovich Andreychuk |
2019-06-11 |
| 9712503 |
Computing instance migration |
Diwakar Gupta, Matthew Shawn Wilson |
2017-07-18 |
| 9560068 |
Network intrusion detection with distributed correlation |
Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer LeMond +3 more |
2017-01-31 |
| 9483742 |
Intelligent traffic analysis to detect malicious activity |
— |
2016-11-01 |
| 9111079 |
Trustworthy device claims as a service |
Eugene (John) Neystadt, Daniel Alon, Yair Tor, Mark F. Novak, Yoav Yassour |
2015-08-18 |
| 8881247 |
Federated mobile authentication using a network operator infrastructure |
Meir Mendelovich, John Neystadt |
2014-11-04 |
| 8769277 |
Content retrieval |
Ravi T. Rao, R. Scott Briggs, Sandeep K. Singhal |
2014-07-01 |
| 8543808 |
Trusted intermediary for network data processing |
— |
2013-09-24 |
| 8516576 |
Network intrusion detection with distributed correlation |
Igal Figlin, Arthur Zavalkovsky, Lior Arzi, Efim Hudis, Jennifer LeMond +3 more |
2013-08-20 |
| 8112477 |
Content identification for peer-to-peer content retrieval |
Ravi T. Rao, R. Scott Briggs, Scott Anthony Plant |
2012-02-07 |
| 8019882 |
Content identification for peer-to-peer content retrieval |
Ravi T. Rao, R. Scott Briggs, Scott Anthony Plant |
2011-09-13 |
| 7921173 |
Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles |
Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +3 more |
2011-04-05 |
| 7734924 |
System and method for transparently providing certificate validation and other services within an electronic transaction |
Lawrence R. Miller, Guy S. Tallent, Jr. |
2010-06-08 |
| 7617322 |
Secure peer-to-peer cache sharing |
Daniel R. Simon |
2009-11-10 |
| 7607008 |
Authentication broker service |
John Hal Howard, Daniel Salvatore Schiappa, Kyle S. Young |
2009-10-20 |
| 7552176 |
Reducing unwanted and unsolicited electronic messages by exchanging electronic message transmission policies and solving and verifying solutions to computational puzzles |
Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +3 more |
2009-06-23 |
| 7398315 |
Reducing unwanted and unsolicited electronic messages by preventing connection hijacking and domain spoofing |
Robert G. Atkinson, Joshua T. Goodman, James M. Lyon, Roy Williams, Harry S. Katz +1 more |
2008-07-08 |
| 7240203 |
Method and apparatus for establishing secure sessions |
Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Michael D. Varga |
2007-07-03 |
| 7200573 |
System and method for providing warranties in electronic commerce |
Lawrence R. Miller, Navin Vasanthakumar, Mark A. Robinson, Jeffrey Boyd, Deborah Goldstein +1 more |
2007-04-03 |
| 7167985 |
System and method for providing trusted browser verification |
— |
2007-01-23 |
| 7000105 |
System and method for transparently providing certificate validation and other services within an electronic transaction |
Guy S. Tallent, Jr., Lawrence R. Miller |
2006-02-14 |
| 6789147 |
Interface for a security coprocessor |
Richard E. Kessler, David A. Carlson, Muhammad Raghib Hussain, Robert A. Sanzone, Michael D. Varga |
2004-09-07 |