Issued Patents All Time
Showing 26–50 of 64 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9658866 | System and method for providing virtual desktop extensions on a client desktop | Michael John Jorgensen, Michael Fairbanks, Nathaniel Brent Kranendonk, Kal A. Larsen | 2017-05-23 |
| 9619262 | Techniques for security auditing of cloud resources | Michael John Jorgensen, Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen +2 more | 2017-04-11 |
| 9519777 | Techniques for controlling authentication | Jeremy Ray Brown, Lloyd Leon Burch, Douglas Garry Earl | 2016-12-13 |
| 9479338 | Method and system for certificate discovery and ranking certificate authorities | — | 2016-10-25 |
| 9454406 | Techniques for cloud bursting | Stephen R. Carter, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen, Jeremy Ray Brown | 2016-09-27 |
| 9348631 | File mapping and converting for dynamic disk personalization for multiple platforms | Nathaniel Brent Kranendonk, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen | 2016-05-24 |
| 9350536 | Cloud key management system | — | 2016-05-24 |
| 9317407 | Techniques for validating services for deployment in an intelligent workload management system | Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen, Stephen R. Carter | 2016-04-19 |
| 9298488 | Techniques for dynamic disk personalization | Lloyd Leon Burch, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen | 2016-03-29 |
| 9246934 | Method and system of attack surface detection | Paul Tiemann | 2016-01-26 |
| 9246985 | Techniques for prevent information disclosure via dynamic secure cloud resources | Jeremy Ray Brown, Lloyd Leon Burch | 2016-01-26 |
| 9208350 | Certificate information verification system | Richard Jeremy Rowley | 2015-12-08 |
| 9088480 | Techniques for auditing and controlling network services | Lloyd Leon Burch, Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Michael Fairbanks +2 more | 2015-07-21 |
| 8977775 | Techniques for identity and policy based routing | Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Stephen R. Carter | 2015-03-10 |
| 8949505 | Techniques for dynamic disk personalization | Lloyd Leon Burch, Kal A. Larsen, Nathaniel Brent Kranendonk, Michael John Jorgensen | 2015-02-03 |
| 8949832 | Techniques for workload toxic mapping | Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Matthew Holt +3 more | 2015-02-03 |
| 8948399 | Dynamic key management | Michael John Jorgensen | 2015-02-03 |
| 8943320 | Techniques for authentication via a mobile device | Jeremy Ray Brown, Lloyd Leon Burch | 2015-01-27 |
| 8832775 | Techniques for workload spawning | Jeremy Ray Brown, Lloyd Leon Burch, Michael John Jorgensen | 2014-09-09 |
| 8812766 | File mapping and converting for dynamic disk personalization for multiple platforms | Nathaniel Brent Kranendonk, Lloyd Leon Burch, Jeremy Ray Brown, Kal A. Larsen, Michael John Jorgensen | 2014-08-19 |
| 8813197 | Techniques for network process identity enablement | Jeremy Ray Brown, Daniel Robert Timpson | 2014-08-19 |
| 8806014 | Techniques for intelligent service deployment | Stephen R. Carter, Michael John Jorgensen, Nathaniel Brent Kranendonk, Kal A. Larsen | 2014-08-12 |
| 8789179 | Cloud protection techniques | — | 2014-07-22 |
| 8639926 | Techniques for mobile device authentication | Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch | 2014-01-28 |
| 8620851 | System and method for determining fuzzy cause and effect relationships in an intelligent workload management system | Jeremy Ray Brown, Nathaniel Brent Kranendonk, Kal A. Larsen, Lloyd Leon Burch, Michael Fairbanks +2 more | 2013-12-31 |