1
William J Gauvin, Raymond Cheung, Kevin P Brosnan, Edward J Taranto: Client application program mobilizer. Digital Equipment Corporation, Dirk Brinkman, August 4, 1998: US05790800 (156 worldwide citation)

In a distributed computer environment, an apparatus enables a client application of a mobile client processor to communicate with a server application of a server processor. The client application generates a request to communicate with the server processor. The client processor includes transport p ...


2
William J Gauvin: Method and apparatus for securing documents using a position dependent file system. Symantec Corporation, McKay and Hodgson, Serge J Hodgson, Sean P Lewis, November 13, 2012: US08312064 (123 worldwide citation)

Access to information or a document is secured by a central global positioning authority that evaluates access requests in accordance with predefined policies. One component of an access request includes location information regarding at least one of the requesting entity and location of the request ...


3
William J Gauvin: Systems and methods for determining a power cycle of a power source of a mobile device. Symantec Corporation, Holland & Hart, October 30, 2012: US08301432 (10 worldwide citation)

A computer-implemented method for determining a power cycle of a power source of a mobile device is described. An execution of one or more components on the mobile device is simulated. An amount of power drawn by the one or more components from the power source is estimated during the simulated exec ...


4
William J Gauvin: Techniques for sensor based attack reflection. Symantec Corporation, Wilmer Cutler Pickering Hale and Dorr, November 10, 2015: US09185132

Techniques for sensor based attack reflection are disclosed. In one particular exemplary embodiment, the techniques may be realized as a method for sensor based attack reflection comprising detecting an attack at a sensor, identifying a portion of memory associated with the attack, redirecting at le ...


5
Keith G Newstadt, David T Lin, William J Gauvin: Distributed traffic scanning through data stream security tagging. Symantec, Finnegan Henderson Farabow Garrett & Dunner, July 13, 2006: US20060156401-A1

Methods and systems for providing data security scanning in a network. A network device ascertains, based on a network's security policy, security technologies that are should or must be applied to the network traffic. The network device applies the not yet applied security technologies, based on a ...