| 10482223 |
Systems and methods for selecting questions for knowledge-based authentication based on social entropy |
Ilya Sokolov, Kevin Jiang |
2019-11-19 |
| 10462184 |
Systems and methods for enforcing access-control policies in an arbitrary physical space |
Lei Gu, Ilya Sokolov |
2019-10-29 |
| 10462672 |
Systems and methods for managing wireless-network deauthentication attacks |
Ramakrishnan Meenakshi Sundaram, Justin Harmon, Srini Chillappa |
2019-10-29 |
| 10404697 |
Systems and methods for using vehicles as information sources for knowledge-based authentication |
Kevin Jiang, Ilya Sokolov |
2019-09-03 |
| 10375114 |
Systems and methods for enforcing access-control policies |
Lei Gu, Ilya Sokolov |
2019-08-06 |
| 10338818 |
Systems and methods for enabling safe memory de-duplication in shared-computing environments |
William E. Sobel |
2019-07-02 |
| 10210347 |
Techniques for managing privacy of a network communication |
William E. Sobel |
2019-02-19 |
| 10169577 |
Systems and methods for detecting modification attacks on shared physical memory |
William E. Sobel |
2019-01-01 |