Issued Patents 2018
Showing 1–20 of 20 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10163320 | Technologies for determining a threat assessment based on fear responses | John C. Weast, Jennifer A. Healey, Dennis Morgan, Brian Johnson | 2018-12-25 |
| 10152336 | Technologies for managing sensor conflicts | Brian Johnson, John C. Weast | 2018-12-11 |
| 10142771 | Virtual sensor apparatus and method | Rita H. Wouhaybi, Stanley Mo | 2018-11-27 |
| 10091332 | Mobile cloud proxy apparatus and method | Michael T. Moran, Stephen Chadwick, Charles Baron | 2018-10-02 |
| 10091216 | Method, apparatus, system, and computer readable medium for providing apparatus security | Gal Chanoch, Eran Birk, Baiju V. Patel, Steven Grobman, Rajeev Gopalakrishna | 2018-10-02 |
| 10085053 | Dynamically implementing an image protection policy | Rita H. Wouhaybi, Mubashir A. Mian, Stanley Mo, Jim S. Baca | 2018-09-25 |
| 10075434 | Authenticating to a network via a device-specific one time password | Jim S. Baca, Hong Li, David Stanasolovich, Mark H. Price, Steven J. Birkel +2 more | 2018-09-11 |
| 10067512 | Enabling dynamic sensor discovery in autonomous devices | Ravishankar Iyer, James Jin-koo Kim | 2018-09-04 |
| 10044700 | Identity attestation of a minor via a parent | Timothy J. Gresham, Ravi L. Sahita, Tracy E. Camp, Harvir Singh, Robert L. Vaughn +2 more | 2018-08-07 |
| 10042999 | Methods and apparatus to manage password security | Hong Li, Lawrence Hurst | 2018-08-07 |
| 10044855 | Collaborative phone reputation system | Igor Tatourian, Rita H. Wouhaybi, Hong Li | 2018-08-07 |
| 10033683 | Sharing user information with proximate devices | Jim S. Baca, Burges M. Karkaria, Dennis Morgan, David Stanasolovich, Selim Aissi +2 more | 2018-07-24 |
| 9998488 | Protection system including machine learning snapshot evaluation | Igor Tatourian | 2018-06-12 |
| 9996733 | User authentication via image manipulation | Dave Paul Singh, Michael S. Richmond, James Jin-koo Kim | 2018-06-12 |
| 9939644 | Technologies for controlling vision correction of a wearable computing device | Michael T. Moran, Casey Baron, Stephen Chadwick | 2018-04-10 |
| 9928413 | Techniques for user authentication on a computing device via pattern recognition | Jim S. Baca, David Stanasolovich, Mark H. Price, Joshua Boelter | 2018-03-27 |
| 9923980 | Apparatus and methods for providing recommendations based on environmental data | Igor Tatourian, Rita H. Wouhaybi, Hong Li | 2018-03-20 |
| 9918191 | Mobile geo-fence system | Jim S. Baca, David Stanasolovich | 2018-03-13 |
| 9871820 | Technologies for managing network privileges based on physical presence | Jennifer A. Healey, Kenneth T. Anderson, John C. Weast | 2018-01-16 |
| 9864858 | Technologies for managing security threats to a computing system utilizing user interactions | John C. Weast, Brian Johnson | 2018-01-09 |