| 9838260 |
Event-based data path detection |
Dominique Imjya Brezinski, Tushaar Sethi, Maarten Van Horenbeeck |
2017-12-05 |
| 9830099 |
Secure erase of storage devices |
Jesper Mikael Johansson |
2017-11-28 |
| 9819673 |
Authentication and authorization of a privilege-constrained application |
Jesper Mikael Johansson |
2017-11-14 |
| 9813908 |
Dynamic unlock mechanisms for mobile devices |
Jesper Mikael Johansson, Phivos Costas Aristides, Darren Ernest Canavor, Arnaud Marie Froment, Scott Donald Gregory +4 more |
2017-11-07 |
| 9805215 |
Mapping identifying information |
Jesper Mikael Johansson, Dominique Imjya Brezinski, Darren Ernest Canavor, Darin Keith McAdams, Brandon William Porter |
2017-10-31 |
| 9792424 |
Chained authentication using musical transforms |
Darren Ernest Canavor, George Nikolaos Stathakopoulos |
2017-10-17 |
| 9778653 |
Systems, devices and methods delivering energy using an uncrewed autonomous vehicle |
Daniel Buchmueller, Varadarajan Gopalakrishnan, Fabian Hensel, Jesper Mikael Johansson, Brandon William Porter +1 more |
2017-10-03 |
| 9747455 |
Data protection using active data |
George Nikolaos Stathakopoulos |
2017-08-29 |
| 9727736 |
Tracking developer behavior with respect to software analysis tools |
Alun Jones, Narasimha Rao Lakkakula |
2017-08-08 |
| 9723003 |
Network beacon based credential store |
Darren Ernest Canavor, Jesper Mikael Johansson |
2017-08-01 |
| 9714088 |
Unmanned vehicle rollback |
Darren Ernest Canavor, Varadarajan Gopalakrishnan, Jesper Mikael Johansson, Brandon William Porter, Andrew Jay Roths |
2017-07-25 |
| 9705920 |
Identifying data usage via active data |
Harsha Ramalingam, Dominique Imjya Brezinski, Jesper Mikael Johansson, James C. Petts |
2017-07-11 |
| 9680829 |
Broadcast-based trust establishment |
Darren Ernest Canavor, George Nikolaos Stathakopoulos |
2017-06-13 |
| 9674194 |
Privilege distribution through signed permissions grants |
Darren Ernest Canavor, Daniel Wade Hitchcock, Jonathan Kozolchyk |
2017-06-06 |
| 9663226 |
Influencing acceptance of messages in unmanned vehicles |
Darren Ernest Canavor, Varadarajan Gopalakrishnan, Jesper Mikael Johansson, Brandon William Porter, Andrew Jay Roths |
2017-05-30 |
| 9661011 |
Techniques for data routing and management using risk classification and data sampling |
Maarten Van Horenbeeck, Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Tushaar Sethi |
2017-05-23 |
| 9633209 |
Chaining of use case-specific entity identifiers |
Jesper Mikael Johansson, Darren Ernest Canavor, Daniel Wade Hitchcock, Bharath Kumar Bhimanaik |
2017-04-25 |
| 9606983 |
Human readable mechanism for communicating binary data |
Darren Ernest Canavor, Jesper Mikael Johansson |
2017-03-28 |
| 9607507 |
User activity-based actions |
Darren Ernest Canavor |
2017-03-28 |
| 9602540 |
Enforcing restrictions on third-party accounts |
Jesper Mikael Johansson, Darren Ernest Canavor |
2017-03-21 |
| 9591023 |
Breach detection-based data inflation |
George Nikolaos Stathakopoulos |
2017-03-07 |
| 9576147 |
Security policy application through data tagging |
John Elias Darrow, Patrick Denton, Assim Deodia, Ketan Deshpande, Kadirvel Chockalingam Vanniarajan |
2017-02-21 |
| 9575979 |
Determining application composition and ownership |
Shailendra Batra, Thibault Candebat, Scott Gerard Carmack, Sachin Purushottam Joglekar, Alun Jones +3 more |
2017-02-21 |
| 9558053 |
Computer systems monitoring using beat frequency analysis |
Tushaar Sethi, George Nikolaos Stathakopoulos |
2017-01-31 |
| 9537888 |
Proxy server-based malware detection |
Jesper Mikael Johansson, Andrew Jay Roths |
2017-01-03 |