| 10621357 |
Off node scanning |
Rebecca Jean Ochs, Amrita Satapathy, Jeffrey Cooperstein, Harini Parthasarathy, Scott A. Field +2 more |
2020-04-14 |
| 9501635 |
Isolation of services or processes using credential managed accounts |
Scott A. Field, Liqiang Zhu, Umit Akkus, Siddharth Bhai, Gopinathan Kannan +5 more |
2016-11-22 |
| 9413740 |
Establishing secure computing devices for virtualization and administration |
Mohamed Rouatbi, Karthik Jaganathan, Venkata K. Anumalasetty, Scott A. Field |
2016-08-09 |
| 9191397 |
Extension model for improved parsing and describing protocols |
Crystal Jing Li, Vladimir Lifliand, Narasimha Rao S. S. Nagampalli |
2015-11-17 |
| 9047477 |
Distributed key encryption in servers |
Fabian Nunez-Tejerina, Jeffrey B. Kay, Robert C. Fruth, Naveen A. Palavalli, Tolga Acar |
2015-06-02 |
| 8789159 |
System for running potentially malicious code |
S. Franklin Williams, Kiran Akella Venkata, David C. LeBlanc, Juraj Gottweis, Gareth Howell +1 more |
2014-07-22 |
| 8230485 |
Method and system for controlling access privileges for trusted network nodes |
Sterling Reasor, Paul J. Leach, John Brezak, Eric Flo |
2012-07-24 |
| 7979865 |
Identifying separate threads executing within a single process |
Narasimha Rao S. S. Nagampalli, Pradeep Bahl |
2011-07-12 |
| 7603708 |
Securing network services using network action control lists |
Pradeep Bahl, Narasimha Rao S. S. Nagampalli, Scott A. Field |
2009-10-13 |