| 9880862 |
Method and system for verifying proper operation of a computing device after a system change |
— |
2018-01-30 |
| 9154475 |
User authentication and authorization in distributed security system |
Kailash Kailash, Narinder Paul, Sivaprasad Udupa |
2015-10-06 |
| 9081954 |
Verifying firmware integrity of a device |
— |
2015-07-14 |
| 8984316 |
Fast platform hibernation and resumption of computing systems providing secure storage of context data |
Faraz A. Siddiqi, Lukasz Mielicki, Hao-Chi Wong |
2015-03-17 |
| 8793488 |
Detection of embedded resource location data |
— |
2014-07-29 |
| 8763120 |
Exploitation detection |
— |
2014-06-24 |
| 8656478 |
String based detection of proxy communications |
— |
2014-02-18 |
| 8413239 |
Web security via response injection |
Michael A. Sutton |
2013-04-02 |
| 8286220 |
Browser access control |
— |
2012-10-09 |
| 8230506 |
Proxy communication detection |
— |
2012-07-24 |
| 8055767 |
Proxy communication string data |
— |
2011-11-08 |