| 10148688 |
Systems and methods for detecting illegitimate devices on wireless networks |
Matt Boucher, Christopher Robichaud |
2018-12-04 |
| 10097560 |
Systems and methods for automatically adjusting user access permissions based on beacon proximity |
Kevin Jiang, Ilya Sokolov, Lei Gu |
2018-10-09 |
| 10068089 |
Systems and methods for network security |
Matt Boucher, Kevin Jiang |
2018-09-04 |
| 10044835 |
Reducing redundant transmissions by polling clients |
Keith Newstadt |
2018-08-07 |
| 10015266 |
Live migration of massive numbers of network connections, including long lived connections |
Keith Newstadt |
2018-07-03 |
| 10009425 |
Synchronization of transactions utilizing multiple distributed cloud-based services |
Jason Holler |
2018-06-26 |
| 10004986 |
Monitoring video game activity by wireless scanning |
Kevin Jiang, Matt Boucher |
2018-06-26 |
| 10009316 |
Method or mechanism for detecting network intrusion with gateway IP geolocation |
Keith Newstadt |
2018-06-26 |
| 9948651 |
Automatic shared personal image privacy level detection and management |
Matthew J. Boucher |
2018-04-17 |
| 9918224 |
Systems and methods for preventing computing devices from sending wireless probe packets |
Kevin Jiang |
2018-03-13 |
| 9876872 |
Method or mechanism for self notification avoidance |
John Brockway |
2018-01-23 |