| 10154136 |
Call block policy using validated identities and selected attribute sharing |
Keith Newstadt |
2018-12-11 |
| 10148631 |
Systems and methods for preventing session hijacking |
Kevin Jiang |
2018-12-04 |
| 10140187 |
Techniques for system backup |
Leo M. Chan |
2018-11-27 |
| 10140440 |
Systems and methods for securing computing devices that are not in users' physical possessions |
Keith Newstadt |
2018-11-27 |
| 10135868 |
Defeating wireless signal interference hacks by manipulating signal strength |
Keith Newstadt |
2018-11-20 |
| 10116695 |
Systems and methods for verifying that operators are human based on operator gaze |
Keith Newstadt |
2018-10-30 |
| 10115283 |
Systems and methods for providing assistance to users in emergency situations |
Keith Newstadt |
2018-10-30 |
| 10116656 |
Systems and methods for enabling calls to bypass call-blocking functions |
Keith Newstadt |
2018-10-30 |
| 10097560 |
Systems and methods for automatically adjusting user access permissions based on beacon proximity |
Michael Shavell, Kevin Jiang, Lei Gu |
2018-10-09 |
| 10033732 |
Systems and methods for detecting cloning of security tokens |
Kevin Jiang |
2018-07-24 |
| 9888377 |
Using personal computing device analytics as a knowledge based authentication source |
Bruce McCorkendale, Kevin Jiang |
2018-02-06 |
| 9882889 |
Techniques for user authentication |
Lei Gu, Matt Boucher |
2018-01-30 |