Issued Patents 2019
Showing 1–25 of 25 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10523707 | Secure transport channel using multiple cipher suites | Nima Sharifi Mehr, Darren Ernest Canavor, Jesper Mikael Johansson, Gregory Branchek Roth | 2019-12-31 |
| 10515212 | Tracking sensitive data in a distributed computing environment | Matthew J. Parker | 2019-12-24 |
| 10511619 | Techniques for data routing and management using risk classification and data sampling | Maarten Van Horenbeeck, Christopher M. Anderson, Katharine Nicole Harrison, Matthew Ryan Jezorek, Tushaar Sethi | 2019-12-17 |
| 10503575 | Computer systems monitoring using beat frequency analysis | Tushaar Sethi, George Nikolaos Stathakopoulos | 2019-12-10 |
| 10489375 | Pattern-based detection using data injection | Brandon William Porter, Donghui Zhuo | 2019-11-26 |
| 10467423 | Static analysis-based tracking of data in access-controlled systems | Tushaar Sethi, Maarten Van Horenbeeck | 2019-11-05 |
| 10462116 | Detection of data exfiltration | Nima Sharifi Mehr, Darren Ernest Canavor, Jesper Mikael Johansson, Muhammad Wasiq | 2019-10-29 |
| 10445514 | Request processing in a compromised account | Eric Jason Brandwine | 2019-10-15 |
| 10440007 | Symbolic feedback for user input | Harsha Ramalingam, Zachary Damen Wolfe, Darren Ernest Canavor, Brian Nhu Dang, Max Harwell Funderburk +3 more | 2019-10-08 |
| 10409977 | Chained authentication using image transforms | Darren Ernest Canavor, George Nikolaos Stathakopoulos | 2019-09-10 |
| 10387825 | Delivery assistance using unmanned vehicles | Darren Ernest Canavor, Brandon William Porter | 2019-08-20 |
| 10372905 | Preventing unauthorized software execution | Darren Ernest Canavor, George Nikolaos Stathakopoulos | 2019-08-06 |
| 10333937 | Privilege distribution through signed permissions grants | Darren Ernest Canavor, Daniel Wade Hitchcock, Jonathan Kozolchyk | 2019-06-25 |
| 10320632 | Pattern-based detection for services in distributed systems | Melissa Elaine Davis, Anton Vladilenovich Goldberg, Aram Grigoryan, Brandon William Porter, Matthew Paul Wenger +1 more | 2019-06-11 |
| 10313882 | Dynamic unlock mechanisms for mobile devices | Jesper Mikael Johansson, Phivos Costas Aristides, Darren Ernest Canavor, Arnaud Marie Froment, Scott Donald Gregory +4 more | 2019-06-04 |
| 10313339 | Secure activation of authentication devices based on communications received via designated communication channels | Conor Power, Dean H Saxe, Tushaar Sethi | 2019-06-04 |
| 10298598 | Countering service enumeration through imposter-driven response | George Nikolaos Stathakopoulos | 2019-05-21 |
| 10262161 | Secure execution and transformation techniques for computing executables | Darren Ernest Canavor, Harsha Ramalingam, George Nikolaos Stathakopoulos | 2019-04-16 |
| 10248532 | Sensitive data usage detection using static analysis | Muhammad Wasiq | 2019-04-02 |
| 10243747 | Tamper detection for hardware devices | Harsha Ramalingam, Jesper Mikael Johansson | 2019-03-26 |
| 10230705 | Verifying authenticity of machine-readable identifiers | Preyas Joshi, Darren Ernest Canavor, Daniel Wade Hitchcock, Jesper Mikael Johansson, Gregory Branchek Roth | 2019-03-12 |
| 10185924 | Security risk response impact analysis | George Nikolaos Stathakopoulos | 2019-01-22 |
| 10187428 | Identifying data usage via active data | Harsha Ramalingam, Dominique Imjya Brezinski, Jesper Mikael Johansson, James C. Petts | 2019-01-22 |
| 10187362 | Secure streamlined provisioning of remote access terminals | John Clark Coonley Duksta, Katharine Nicole Harrison, Matthew Ryan Jezorek, Brian Lee, Maarten Van Horenbeeck | 2019-01-22 |
| 10180936 | Human readable mechanism for communicating binary data | Darren Ernest Canavor, Jesper Mikael Johansson | 2019-01-15 |