Issued Patents All Time
Showing 25 most recent of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12395492 | Network model utilizing property sets | Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Saunders, Robert Buckwalter +3 more | 2025-08-19 |
| 12225017 | Method of creating secure endpoints on a network | Jared Poetter, Michael C. Leap, Diane E. Schaefer, Michael J. Saunders, Robert Buckwalter +3 more | 2025-02-11 |
| 12124563 | Virtual relay device for providing a secure connection to a remote device | Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand | 2024-10-22 |
| 11729004 | Certificate-based remote dynamic isolation of IOT devices using distributed ledger technologies | Sanket Panchamia, Kanupriya Pandey, Mehdi Entezari, Sachin B Patil, Amith Kk | 2023-08-15 |
| 11153348 | Third party integration with enterprise security management tool | Michael J DiDomenico, Michael C. Leap, Emily M. Shoup, Richard W. Phelps, Philippe Jolly +1 more | 2021-10-19 |
| 11063982 | Object scope definition for enterprise security management tool | Michael J. Di Domenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps, Emily M. Shoup | 2021-07-13 |
| D924883 | Electronic display with a graphical user interface | Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps | 2021-07-13 |
| 11030305 | Virtual relay device for providing a secure connection to a remote device | Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand | 2021-06-08 |
| 10979455 | Solution definition for enterprise security management | Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps | 2021-04-13 |
| 10880332 | Enterprise security management tool | Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps | 2020-12-29 |
| 10841340 | Custom node and profile classifications for enterprise security management tool | Michael C. Leap, Michael J. Di Domenico, Richard W. Phelps, Philippe Jolly, Emily M. Shoup | 2020-11-17 |
| 10652280 | User interface features for enterprise security management | Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps | 2020-05-12 |
| 10454890 | Negotiation of security protocols and protocol attributes in secure communications environment | Kathleen Wild, Sarah K. Inforzato, Ted Hinaman | 2019-10-22 |
| 10454931 | Secure remote access for secured enterprise communications | Ted Hinaman, Steven J Rajcan, Matthew Mohr, William Gunn, Sarah K. Inforzato +2 more | 2019-10-22 |
| 10248442 | Automated provisioning of virtual machines | David Dodgson, Ralph Farina, James Albert Fontana, David Maw, Anthony Narisi | 2019-04-02 |
| 10158674 | Multi-level affinitization for enterprise security management | Michael J DiDomenico, Philippe Jolly, Michael C. Leap, Richard W. Phelps | 2018-12-18 |
| 9912663 | Enabling secure network mobile device communications | James Trocki, Mark K Vallevand, Steven L. Rajcan, Ted Hinaman | 2018-03-06 |
| 9817968 | Secure connection for a remote device through a mobile application | Ralph Farina, Ted Hinaman, Steven L. Rajcan, James Trocki, Mark K Vallevand | 2017-11-14 |
| 9819658 | Virtual gateways for isolating virtual machines | David Dodgson, Ralph Farina, James Albert Fontana, David Maw, Anthony Narisi | 2017-11-14 |
| 9794225 | Secure network communications in a mobile device over IPsec | James Trocki, Mark K Vallevand, Steven L. Rajcan, Ted Hinaman | 2017-10-17 |
| 9794237 | Secured networks and endpoints applying internet protocol security | Sarah K. Inforzato | 2017-10-17 |
| 9716589 | Secured communications arrangement applying internet protocol security | Kathleen Wild, Sarah K. Inforzato, Ted Hinaman | 2017-07-25 |
| 9596077 | Community of interest-based secured communications over IPsec | Kathleen Wild, Sarah K. Inforzato, Ted Hinaman | 2017-03-14 |
| 9571455 | Remote credential management for hybrid clouds with enterprise networks | Mark Steven Brandt, Christopher A. Byrd, Kathy Y Jaing | 2017-02-14 |
| 9525666 | Methods and systems for managing concurrent unsecured and cryptographically secure communications across unsecured networks | Sarah K. Inforzato, Ted Hinaman | 2016-12-20 |