Issued Patents All Time
Showing 1–18 of 18 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10784602 | Module mount interposer | Huaping Peng, Shamei Shi, William Wang, Frank Flens, Henricus Jozef Vergeest | 2020-09-22 |
| 10551579 | Ferrule-to-lens latch mechanism | Yandong Mao, Shamei Shi, William Wang | 2020-02-04 |
| 10333986 | Conditional declarative policies | Anthony Paterra, Marc Woolward | 2019-06-25 |
| 10218098 | Module mount interposer | Huaping Peng, Shamei Shi, William Wang, Frank Flens, Henricus Jozef Vergeest | 2019-02-26 |
| 10158672 | Context aware microsegmentation | Choung-Yaw Shieh, Yi Sun, Meng Xu | 2018-12-18 |
| 10110636 | Segmented networks that implement scanning | Colin Ross, Choung-Yaw Shieh, Meng Xu, Yi Sun | 2018-10-23 |
| 10084753 | Delivering security functions to distributed networks | Marc Woolward, Choung-Yaw Shieh | 2018-09-25 |
| 10009381 | System and method for threat-driven security policy controls | Anthony Paterra, Marc Woolward | 2018-06-26 |
| 9621595 | Conditional declarative policies | Anthony Paterra, Marc Woolward | 2017-04-11 |
| 9609026 | Segmented networks that implement scanning | Colin Ross, Choung-Yaw Shieh, Meng Xu, Yi Sun | 2017-03-28 |
| 9525697 | Delivering security functions to distributed networks | Marc Woolward, Choung-Yaw Shieh | 2016-12-20 |
| 9467476 | Context aware microsegmentation | Choung-Yaw Shieh, Yi Sun, Meng Xu | 2016-10-11 |
| 9438634 | Microsegmented networks that implement vulnerability scanning | Colin Ross, Choung-Yaw Shieh, Meng Xu, Yi Sun | 2016-09-06 |
| 9380027 | Conditional declarative policies | Anthony Paterra, Marc Woolward | 2016-06-28 |
| 9294442 | System and method for threat-driven security policy controls | Anthony Paterra, Marc Woolward | 2016-03-22 |
| 9258275 | System and method for dynamic security insertion in network virtualization | Yi Sun, Meng Xu, Choung-Yaw Shieh | 2016-02-09 |
| 8955093 | Cooperative network security inspection | Choung-Yaw Shieh, Meng Xu, Yi Sun | 2015-02-10 |
| 8813169 | Virtual security boundary for physical or virtual network devices | Choung-Yaw Shieh | 2014-08-19 |