| 10164993 |
Distributed split browser content inspection and analysis |
Leon Robert Warman, Kurt Kufeld, Peter S. Vosshall, Kyle Bradley Peterson, Peter F. Hill |
2018-12-25 |
| 10157362 |
Systems and methods for delivering items |
Shalini Pothuru, Brad Ruppert |
2018-12-18 |
| 10142301 |
Encrypted data delivery without intervening decryption |
Nima Sharifi Mehr, Darren Ernest Canavor, Jon Arron McClintock, Gregory Branchek Roth, Gregory Alan Rubin |
2018-11-27 |
| 10140611 |
Electronic device with light-generating sources to illuminate an indicium |
Michael Carr |
2018-11-27 |
| 10135813 |
Computing device with integrated authentication token |
Darren Ernest Canavor, Matthew Ryan Jezorek, Brian Lee |
2018-11-20 |
| 10129299 |
Network beacon management of security policies |
Jon Arron McClintock, Darren Ernest Canavor |
2018-11-13 |
| 10122727 |
Social networking behavior-based identity system |
George Nikolaos Stathakopoulos, Darren Ernest Canavor |
2018-11-06 |
| 10110385 |
Duress signatures |
Dylan Harris Rush, Darren Ernest Canavor, Daniel Wade Hitchcock, Jon Arron McClintock |
2018-10-23 |
| 10063592 |
Network authentication beacon |
Jon Arron McClintock, Darren Ernest Canavor |
2018-08-28 |
| 10057251 |
Provisioning account credentials via a trusted channel |
William Alexander Strand, Luan Khai Nguyen |
2018-08-21 |
| 10050787 |
Authentication objects with attestation |
Gregory Branchek Roth, David Matthew Platz, Rajendra Kumar Vippagunta |
2018-08-14 |
| 10049202 |
Strong authentication using authentication objects |
Gregory Branchek Roth, David Matthew Platz, Rajendra Kumar Vippagunta |
2018-08-14 |
| 10038729 |
Cooperative network access |
Harsha Ramalingam, Bhavnish H. Lathia |
2018-07-31 |
| 10013500 |
Behavior based optimization for content presentation |
Jon Arron McClintock |
2018-07-03 |
| 10009355 |
Bootstrapping user authentication on devices |
Harsha Ramalingam, Bharath Kumar Bhimanaik |
2018-06-26 |
| 9998444 |
Chaining of use case-specific entity identifiers |
Darren Ernest Canavor, Daniel Wade Hitchcock, Bharath Kumar Bhimanaik, Jon Arron McClintock |
2018-06-12 |
| 9990507 |
Adapting decoy data present in a network |
Harsha Ramalingam, James C. Petts, Dominique Imjya Brezinski |
2018-06-05 |
| 9990481 |
Behavior-based identity system |
George Nikolaos Stathakopoulos |
2018-06-05 |
| 9986324 |
Earphones with activity controlled output |
Sammy Pergament, Victor Påsse, Iman Habib, Amir Adlouni |
2018-05-29 |
| 9973495 |
Bootstrapping user authentication |
Harsha Ramalingam, Bharath Kumar Bhimanaik |
2018-05-15 |
| 9967250 |
Confidence-based authentication |
Darren Ernest Canavor, Daniel Wade Hitchcock, Chandra Sekhar Venkata Bhanu Vijyapurpu |
2018-05-08 |
| 9961055 |
Inaccessibility of data to server involved in secure communication |
Darren Ernest Canavor, Jon Arron McClintock, Gregory Branchek Roth, Gregory Alan Rubin, Nima Sharifi Mehr |
2018-05-01 |
| 9954867 |
Verification of credential reset |
Max Harwell Funderburk, Mian Zainulabadin Khurrum, Kripa Shankar Karukurichi Subramanian |
2018-04-24 |
| 9946867 |
Input mirroring |
Harsha Ramalingam, Zachary Damen Wolfe, Darren Ernest Canavor, Brian Nhu Dang, Max Harwell Funderburk +3 more |
2018-04-17 |
| 9942257 |
Trustworthy indication of software integrity |
Daniel Wade Hitchcock, Darren Ernest Canavor, Bharath Kumar Bhimanaik, Andrew Jay Roths |
2018-04-10 |