loadpatents
Patent applications and USPTO patent grants for Wray; Michael John.The latest application filed is for "system call policies for containers".
Patent | Date |
---|---|
Comparing structural information of a snapshot of system memory Grant 10,783,246 - Edwards , et al. Sept | 2020-09-22 |
System call policies for containers Grant 10,650,138 - D'Errico , et al. | 2020-05-12 |
Determining whether process is infected with malware Grant 10,372,909 - Wray , et al. | 2019-08-06 |
System Call Policies For Containers App 20180218148 - D'Errico; Michela ;   et al. | 2018-08-02 |
Comparing Structural Information Of A Snapshot Of System Memory App 20180218153 - Edwards; Nigel ;   et al. | 2018-08-02 |
Determining Whether Process Is Infected With Malware App 20180052997 - Wray; Michael John ;   et al. | 2018-02-22 |
Delegation Within A Computing Environment App 20140007197 - Wray; Michael John | 2014-01-02 |
Security policy in trusted computing systems Grant 8,612,755 - Wray , et al. December 17, 2 | 2013-12-17 |
Mapping discovery for virtual network Grant 8,274,912 - Wray , et al. September 25, 2 | 2012-09-25 |
Network virtualization Grant 8,223,770 - Wray , et al. July 17, 2 | 2012-07-17 |
Virtual network interface Grant 8,213,429 - Wray , et al. July 3, 2 | 2012-07-03 |
Security attributes in trusted computing systems Grant 7,600,261 - Wray October 6, 2 | 2009-10-06 |
Security attributes of nodes in trusted computing systems Grant 7,552,328 - Wray June 23, 2 | 2009-06-23 |
Virtual Network Interface App 20090129385 - Wray; Michael John ;   et al. | 2009-05-21 |
Mapping Discovery for Virtual Network App 20080225875 - Wray; Michael John ;   et al. | 2008-09-18 |
Network Virtualization App 20070280243 - Wray; Michael John ;   et al. | 2007-12-06 |
Security attributes of nodes in trusted computing systems App 20050039003 - Wray, Michael John | 2005-02-17 |
Security attributes in trusted computing systems App 20050028003 - Wray, Michael John | 2005-02-03 |
Security policy in trusted computing systems App 20040250110 - Wray, Michael John ;   et al. | 2004-12-09 |
Method of performing a data processing operation App 20030065936 - Wray, Michael John | 2003-04-03 |
Method of establishing a secure data connection App 20030028646 - Wray, Michael John | 2003-02-06 |
Method of establishing a secure data connection App 20030023879 - Wray, Michael John | 2003-01-30 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.