| 9256765 |
System and method for identifying software changes |
Christopher Smith |
2016-02-09 |
| 8429412 |
Method to control access between network endpoints based on trust scores calculated from information system component analysis |
William Wyatt Starnes, Bradley Douglas Andersen |
2013-04-23 |
| 8327131 |
Method and system to issue trust score certificates for networked devices using a trust scoring service |
Thomas P. Hardjono, William Wyatt Starnes, Bradley Douglas Andersen |
2012-12-04 |
| 8266676 |
Method to verify the integrity of components on a trusted platform using integrity database services |
Thomas P. Hardjono, William Wyatt Starnes, Bradley Douglas Andersen |
2012-09-11 |
| 8139588 |
Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain |
Thomas P. Hardjono, William Wyatt Starnes, Bradley Douglas Andersen |
2012-03-20 |
| 7904727 |
Method to control access between network endpoints based on trust scores calculated from information system component analysis |
William Wyatt Starnes, Bradley Douglas Andersen |
2011-03-08 |
| 7733804 |
Method and apparatus to establish routes based on the trust scores of routers within an IP routing domain |
Thomas P. Hardjono, William Wyatt Starnes, Bradley Douglas Andersen |
2010-06-08 |
| 7487358 |
Method to control access between network endpoints based on trust scores calculated from information system component analysis |
William Wyatt Starnes, Bradley Douglas Andersen |
2009-02-03 |
| 7272719 |
Method to control access between network endpoints based on trust scores calculated from information system component analysis |
William Wyatt Starnes, Bradley Douglas Andersen |
2007-09-18 |