Issued Patents All Time
Showing 126–150 of 200 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8010698 | Network application layer routing | Ravishankar Krishnamurthy, Duraisamy Veeravadivel | 2011-08-30 |
| 7996517 | Transparent network connection takeover | Howard Rollin Davis | 2011-08-09 |
| 7996429 | Mechanisms to persist hierarchical object relations | Lee Edward Lowry, Rajesh Vasudevan, Brent Thurgood, Ryan Cox, Zack Grossbart +2 more | 2011-08-09 |
| 7962889 | Techniques for instantiating and configuring projects | Michel Shane Simpson, Volker Gunnar Scheuber-Heinz, Lee Edward Lowry | 2011-06-14 |
| 7934087 | Techniques for secure event recording and processing | — | 2011-04-26 |
| 7921141 | Mechanism for supporting indexed tagged content in a general purpose data store | Mark D. Ackerman, Nadeem Ahmad Nazeer | 2011-04-05 |
| 7890938 | Heterogeneous normalization of data characteristics | Nathan Blaine Jensen, William Street, Michel Shane Simpson, William Donald Peterson, III, Scott Alan Isaacson | 2011-02-15 |
| 7845003 | Techniques for variable security access information | Cameron Craig Morris, Lloyd Leon Burch | 2010-11-30 |
| 7810139 | Remote authorization for operations | Lloyd Leon Burch | 2010-10-05 |
| 7793101 | Verifiable virtualized storage port assignments for virtual machines | Robert Wipfel | 2010-09-07 |
| 7792693 | Distributed workflow techniques | Jonathan Paul Bultmeyer, Howard Melman, Bjarne Rasmussen, Kasman E. Thomas | 2010-09-07 |
| 7792049 | Techniques for modeling and evaluating protocol interactions | — | 2010-09-07 |
| 7774827 | Techniques for providing role-based security with instance-level granularity | Stephen Kinser, Lloyd Leon Burch | 2010-08-10 |
| 7770204 | Techniques for securing electronic identities | Scott W. Pathakis, David Kent Beus, Michael William Cook, Howard Rollin Davis, Dustin Lance Nielson +2 more | 2010-08-03 |
| 7756890 | Semantic identities | — | 2010-07-13 |
| 7739744 | Methods and systems for multifactor authentication | Lloyd Leon Burch | 2010-06-15 |
| 7735122 | Credential mapping | David Nephi Johnson, Dustin Lance Nielson, Jerry E Griffis, David Kent Beus, Nathan Blaine Jensen +3 more | 2010-06-08 |
| 7734051 | Key distribution | Carolyn B. McClain | 2010-06-08 |
| 7680742 | System and method for controlling access to licensed computing processes via a codified electronic license | Mark D. Ackerman | 2010-03-16 |
| 7681242 | Allocation of network resources | Tammy Anita Green, Lloyd Leon Burch, Douglas Garry Earl | 2010-03-16 |
| 7680897 | Methods and systems for managing network traffic | Robert Drew Major | 2010-03-16 |
| 7680819 | Managing digital identity information | Joseph Andrew Mellmer, Russell T. Young, Arn D. Perkins, John M. Robertson, Jeffrey Neil Sabin +9 more | 2010-03-16 |
| 7672952 | System and method of semantic correlation of rich content | Scott Alan Isaacson | 2010-03-02 |
| 7653530 | Method and mechanism for the creation, maintenance, and comparison of semantic abstracts | Delos C. Jensen, Ronald P. Millett | 2010-01-26 |
| 7647624 | Techniques for preserving and managing identities in an audit log | Lloyd Leon Burch, Douglas Garry Earl | 2010-01-12 |