Issued Patents All Time
Showing 1–25 of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8413241 | Integrated intrusion deflection, detection and introspection | John E. Weeks | 2013-04-02 |
| 8356285 | Facilitated introspection of virtualized environments | Tim P. Marsland | 2013-01-15 |
| 8341505 | Enforcing network bandwidth partitioning for virtual execution environments with direct access to network hardware | Sunay Tripathi | 2012-12-25 |
| 8260910 | Method and apparatus for monitoring a data stream to detect a pattern of data elements using bloom filters | Hal L. Stern | 2012-09-04 |
| 8260909 | Method and apparatus for monitoring a data stream | Hal L. Stern | 2012-09-04 |
| 8225086 | Method and apparatus for remotely authenticating a command | James P. Hughes | 2012-07-17 |
| 8195980 | Virtual machine snapshotting and damage containment | Tim P. Marsland | 2012-06-05 |
| 8064606 | Method and apparatus for securely registering hardware and/or software components in a computer system | James P. Hughes, Daniel E. Smith | 2011-11-22 |
| 8037279 | Method and system for cross-domain data sharing | John B. Levon | 2011-10-11 |
| 8028336 | Intrusion detection using dynamic tracing | Dwight F. Hare, Hal L. Stern | 2011-09-27 |
| 7865608 | Method and apparatus for fast and scalable matching of structured data streams | Sumantra R. Kundu, Jason Goldschmidt | 2011-01-04 |
| 7765581 | System and method for enabling scalable security in a virtual private network | Germano Caronni, Amit Gupta, Sandeep Kumar, Tom R. Markson, Glenn C. Scott | 2010-07-27 |
| 7760730 | Rule set verification | Jason Goldschmidt, Michael Speer | 2010-07-20 |
| 7685309 | System and method for separating addresses from the delivery scheme in a virtual private network | Germano Caronni, Amit Gupta, Sandeep Kulmar, Tom R. Markson, Glenn C. Scott | 2010-03-23 |
| 7647637 | Computer security technique employing patch with detection and/or characterization mechanism for exploit of patched vulnerability | Dwight F. Hare, Gabriel E. Montenegro | 2010-01-12 |
| 7512071 | Distributed flow enforcement | Jason Goldschmidt, Michael Speer, Benjamin H. Stoltz | 2009-03-31 |
| 7505463 | Rule set conflict resolution | Jason Goldschmidt | 2009-03-17 |
| 7441022 | Resolving conflicts between network service rule sets for network data traffic in a system where rule patterns with longer prefixes match before rule patterns with shorter prefixes | Jason Goldschmidt, Michael Speer | 2008-10-21 |
| 7336790 | Decoupling access control from key management in a network | Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott | 2008-02-26 |
| 6977929 | Method and system for facilitating relocation of devices on a network | Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott | 2005-12-20 |
| 6970941 | System and method for separating addresses from the delivery scheme in a virtual private network | Germano Caronni, Amit Gupta, Sandeep Kulmar, Tom R. Markson, Glenn C. Scott | 2005-11-29 |
| 6944663 | Method and apparatus for using client puzzles to protect against denial-of-service attacks | Erik Guttman | 2005-09-13 |
| 6938169 | Channel-specific file system views in a private network using a public-network infrastructure | Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott | 2005-08-30 |
| 6870842 | Using multicasting to provide ethernet-like communication behavior to selected peers on a network | Germano Caronni, Amit Gupta, Tom R. Markson, Sandeep Kumar, Glenn C. Scott | 2005-03-22 |
| 6798782 | Truly anonymous communications using supernets, with the provision of topology hiding | Germano Caronni, Amit Gupta, Sandeep Kumar, Tom R. Markson, Glenn C. Scott | 2004-09-28 |