Issued Patents All Time
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12003485 | Outbound/inbound lateral traffic punting based on process risk | Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li | 2024-06-04 |
| 11616761 | Outbound/inbound lateral traffic punting based on process risk | Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li | 2023-03-28 |
| 11128656 | Selective sinkholing of malware domains by a security device via DNS poisoning | Huagang Xie | 2021-09-21 |
| 10992704 | Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network | Huagang Xie | 2021-04-27 |
| 10931637 | Outbound/inbound lateral traffic punting based on process risk | Ho Yu Lam, Robert Earle Ashley, Paul Theodore Mathison, Qiuming Li | 2021-02-23 |
| 10855656 | Fine-grained firewall policy enforcement using session app ID and endpoint process ID correlation | Robert Earle Ashley, Ho Yu Lam, Robert Tesh, Xuanyu Jin, Paul Theodore Mathison +1 more | 2020-12-01 |
| 10530810 | Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network | Huagang Xie | 2020-01-07 |
| 10425387 | Credentials enforcement using a firewall | Robert Earle Ashley, Ho Yu Lam, Xuanyu Jin, Suiqiang Deng, Robert Tesh | 2019-09-24 |
| 10404661 | Integrating a honey network with a target network to counter IP and peer-checking evasion techniques | Huagang Xie | 2019-09-03 |
| 10298610 | Efficient and secure user credential store for credentials enforcement using a firewall | Robert Earle Ashley, Ho Yu Lam, Xuanyu Jin, Suiqiang Deng, Robert Tesh | 2019-05-21 |
| 10257221 | Selective sinkholing of malware domains by a security device via DNS poisoning | Huagang Xie | 2019-04-09 |
| 10230689 | Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network | Huagang Xie | 2019-03-12 |
| 10051001 | Efficient and secure user credential store for credentials enforcement using a firewall | Robert Earle Ashley, Ho Yu Lam, Xuanyu Jin, Suiqiang Deng, Robert Tesh | 2018-08-14 |
| 10044675 | Integrating a honey network with a target network to counter IP and peer-checking evasion techniques | Huagang Xie | 2018-08-07 |
| 10015198 | Synchronizing a honey network configuration to reflect a target network environment | Huagang Xie | 2018-07-03 |
| 9967236 | Credentials enforcement using a firewall | Robert Earle Ashley, Ho Yu Lam, Xuanyu Jin, Suiqiang Deng, Robert Tesh | 2018-05-08 |
| 9882929 | Dynamic selection and generation of a virtual clone for detonation of suspicious content within a honey network | Huagang Xie | 2018-01-30 |
| 9860208 | Bridging a virtual clone of a target device in a honey network to a suspicious device in an enterprise network | Huagang Xie | 2018-01-02 |
| 9495188 | Synchronizing a honey network configuration to reflect a target network environment | Huagang Xie | 2016-11-15 |
| 9325735 | Selective sinkholing of malware domains by a security device via DNS poisoning | Huagang Xie | 2016-04-26 |