CS

Christoph L. Schuba

Oracle: 27 patents #267 of 14,854Top 2%
PF Purdue Research Foundation: 1 patents #1,409 of 3,174Top 45%
📍 Mountain View, CA: #663 of 11,022 inventorsTop 7%
🗺 California: #18,844 of 386,348 inventorsTop 5%
Overall (All Time): #139,539 of 4,157,543Top 4%
28
Patents All Time

Issued Patents All Time

Showing 1–25 of 28 patents

Patent #TitleCo-InventorsDate
8413241 Integrated intrusion deflection, detection and introspection John E. Weeks 2013-04-02
8356285 Facilitated introspection of virtualized environments Tim P. Marsland 2013-01-15
8341505 Enforcing network bandwidth partitioning for virtual execution environments with direct access to network hardware Sunay Tripathi 2012-12-25
8260910 Method and apparatus for monitoring a data stream to detect a pattern of data elements using bloom filters Hal L. Stern 2012-09-04
8260909 Method and apparatus for monitoring a data stream Hal L. Stern 2012-09-04
8225086 Method and apparatus for remotely authenticating a command James P. Hughes 2012-07-17
8195980 Virtual machine snapshotting and damage containment Tim P. Marsland 2012-06-05
8064606 Method and apparatus for securely registering hardware and/or software components in a computer system James P. Hughes, Daniel E. Smith 2011-11-22
8037279 Method and system for cross-domain data sharing John B. Levon 2011-10-11
8028336 Intrusion detection using dynamic tracing Dwight F. Hare, Hal L. Stern 2011-09-27
7865608 Method and apparatus for fast and scalable matching of structured data streams Sumantra R. Kundu, Jason Goldschmidt 2011-01-04
7765581 System and method for enabling scalable security in a virtual private network Germano Caronni, Amit Gupta, Sandeep Kumar, Tom R. Markson, Glenn C. Scott 2010-07-27
7760730 Rule set verification Jason Goldschmidt, Michael Speer 2010-07-20
7685309 System and method for separating addresses from the delivery scheme in a virtual private network Germano Caronni, Amit Gupta, Sandeep Kulmar, Tom R. Markson, Glenn C. Scott 2010-03-23
7647637 Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability Dwight F. Hare, Gabriel E. Montenegro 2010-01-12
7512071 Distributed flow enforcement Jason Goldschmidt, Michael Speer, Benjamin H. Stoltz 2009-03-31
7505463 Rule set conflict resolution Jason Goldschmidt 2009-03-17
7441022 Resolving conflicts between network service rule sets for network data traffic in a system where rule patterns with longer prefixes match before rule patterns with shorter prefixes Jason Goldschmidt, Michael Speer 2008-10-21
7336790 Decoupling access control from key management in a network Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott 2008-02-26
6977929 Method and system for facilitating relocation of devices on a network Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott 2005-12-20
6970941 System and method for separating addresses from the delivery scheme in a virtual private network Germano Caronni, Amit Gupta, Sandeep Kulmar, Tom R. Markson, Glenn C. Scott 2005-11-29
6944663 Method and apparatus for using client puzzles to protect against denial-of-service attacks Erik Guttman 2005-09-13
6938169 Channel-specific file system views in a private network using a public-network infrastructure Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott 2005-08-30
6870842 Using multicasting to provide ethernet-like communication behavior to selected peers on a network Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott 2005-03-22
6798782 Truly anonymous communications using supernets, with the provision of topology hiding Germano Caronni, Amit Gupta, Sandeep Kumar, Tom R. Markson, Glenn C. Scott 2004-09-28