| 10523707 |
Secure transport channel using multiple cipher suites |
Nima Sharifi Mehr, Darren Ernest Canavor, Jon Arron McClintock, Gregory Branchek Roth |
2019-12-31 |
| 10521984 |
Challenge-response badge |
Eric Allan MacIntosh, Gregory Branchek Roth |
2019-12-31 |
| 10489838 |
Method for using customer attributes to select a service representative |
Donald L. Kaufman, Joshua Kilpatrick, George Nikolaos Stathakopoulos |
2019-11-26 |
| 10484390 |
Verification of credential reset |
Max Harwell Funderburk, Mian Zainulabadin Khurrum, Kripa Shankar Karukurichi Subramanian |
2019-11-19 |
| 10484372 |
Automatic replacement of passwords with secure claims |
Rami Kawach |
2019-11-19 |
| 10462116 |
Detection of data exfiltration |
Nima Sharifi Mehr, Darren Ernest Canavor, Jon Arron McClintock, Muhammad Wasiq |
2019-10-29 |
| 10440007 |
Symbolic feedback for user input |
Harsha Ramalingam, Zachary Damen Wolfe, Darren Ernest Canavor, Brian Nhu Dang, Max Harwell Funderburk +3 more |
2019-10-08 |
| 10423775 |
Assisted password generation |
David James Kane-Parry, Phivos Costas Aristides, Darren Ernest Canavor, Scott Donald Gregory, Matthew Ryan Jezorek +1 more |
2019-09-24 |
| 10404683 |
Strength-based password expiration |
Dominique Imjya Brezinski, Kenneth L. Hamer |
2019-09-03 |
| 10395243 |
Merchant-specific shadow account numbers |
David H. Hijirida, Peter S. Vosshall, Rajiv Chopra, Terrance Douglas Hanold |
2019-08-27 |
| 10362026 |
Providing multi-factor authentication credentials via device notifications |
Darren Ernest Canavor, Daniel Wade Hitchcock, Bharath Kumar Bhimanaik |
2019-07-23 |
| 10362019 |
Managing security credentials |
Darren Ernest Canavor |
2019-07-23 |
| 10354075 |
Trustworthy indication of software integrity |
Daniel Wade Hitchcock, Darren Ernest Canavor, Bharath Kumar Bhimanaik, Andrew Jay Roths |
2019-07-16 |
| 10356069 |
Two factor authentication with authentication objects |
Gregory Branchek Roth |
2019-07-16 |
| 10348797 |
Network browser configuration |
Joshua Marc Burgin, Kurt Kufeld, Peter S. Vosshall, Arun Sundaram, Peter F. Hill |
2019-07-09 |
| 10341345 |
Network browser configuration |
Peter F. Hill |
2019-07-02 |
| 10334348 |
Earphones with activity controlled output |
Sammy Pergament, Victor Påsse, Iman Habib, Amir Adlouni |
2019-06-25 |
| 10313882 |
Dynamic unlock mechanisms for mobile devices |
Phivos Costas Aristides, Darren Ernest Canavor, Arnaud Marie Froment, Scott Donald Gregory, Cory Adam Johnson +4 more |
2019-06-04 |
| 10243747 |
Tamper detection for hardware devices |
Harsha Ramalingam, Jon Arron McClintock |
2019-03-26 |
| 10230705 |
Verifying authenticity of machine-readable identifiers |
Preyas Joshi, Darren Ernest Canavor, Daniel Wade Hitchcock, Jon Arron McClintock, Gregory Branchek Roth |
2019-03-12 |
| 10223524 |
Compromised authentication information clearing house |
David James Kane-Parry, Darren Ernest Canavor |
2019-03-05 |
| 10218682 |
Secure network protocol cryptographic processing |
Rami Kawach |
2019-02-26 |
| 10193844 |
Secure cloud-based messaging and storage |
Myles Conley, Srikanth Mantha |
2019-01-29 |
| 10187428 |
Identifying data usage via active data |
Harsha Ramalingam, Dominique Imjya Brezinski, Jon Arron McClintock, James C. Petts |
2019-01-22 |
| 10187262 |
Automated multi-user system detection |
Robert James Hanson, Daniel Wade Hitchcock, Darren Ernest Canavor |
2019-01-22 |