| 9843934 |
Systems and methods for detecting public networks |
Kevin Jiang |
2017-12-12 |
| 9794744 |
Physical presence validation through use of time-restricted secure beacon devices |
Lei Gu |
2017-10-17 |
| 9788153 |
Techniques for mobile geofencing |
Keith Newstadt |
2017-10-10 |
| 9749299 |
Systems and methods for image-based encryption of cloud data |
Lei Gu, Matt Boucher |
2017-08-29 |
| 9740920 |
Systems and methods for securely authenticating users via facial recognition |
Andrew Chang |
2017-08-22 |
| 9743040 |
Systems and methods for facilitating eye contact during video conferences |
Keith Newstadt |
2017-08-22 |
| 9699191 |
Systems and methods for controlling content for child browser users |
Kevin Jiang |
2017-07-04 |
| 9699171 |
Systems and methods for logging out of cloud-based applications managed by single sign-on services |
Keith Newstadt |
2017-07-04 |
| 9697660 |
Systems and methods for verifying user attributes |
Kevin Jiang, Bruce McCorkendale |
2017-07-04 |
| 9674195 |
Use of highly authenticated operations to detect network address translation |
Kevin Jiang |
2017-06-06 |
| 9544287 |
Systems and methods for performing authentication at a network device |
Keith Newstadt |
2017-01-10 |