Issued Patents 2019
Showing 25 most recent of 27 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10521860 | Order entry actions | — | 2019-12-31 |
| 10523706 | Phishing protection using cloning detection | Jeremy Boyd Richards | 2019-12-31 |
| 10511442 | Method and system for responding to an unauthorized action on a mobile communications device | Marc William Rogers | 2019-12-17 |
| 10509911 | Methods and systems for conditionally granting access to services based on the security state of the device requesting access | Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry +7 more | 2019-12-17 |
| 10509910 | Methods and systems for granting access to services based on a security state that varies with the severity of security events | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, William Neil Robinson | 2019-12-17 |
| 10511628 | Detecting realtime phishing from a phished client or at a security server | Jeremy Boyd Richards | 2019-12-17 |
| 10491603 | Software component substitution based on rule compliance for computing device context | William Neil Robinson | 2019-11-26 |
| 10489862 | Systems and methods for computing device protection | John G. Hering, Kevin Patrick Mahaffey, William Neil Robinson | 2019-11-26 |
| 10469481 | System and method for permitting an action based on verification information and a challenge token | Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more | 2019-11-05 |
| 10467784 | Graphical display with integrated recent period zoom and historical period context data | — | 2019-11-05 |
| 10467691 | User definable prioritization of market information | Scott F. Singer | 2019-11-05 |
| 10460387 | Dynamic information configuration and display | Scott F. Singer | 2019-10-29 |
| 10452862 | System and method for creating a policy for managing personal data on a mobile communications device | Timothy Micheal Wyatt, Kevin Patrick Mahaffey, David Luke Richardson, Marc William Rogers | 2019-10-22 |
| 10452447 | Coordinating multiple security components | Matthew John Joseph LaMantia, Stephen J. Edwards, William Neil Robinson | 2019-10-22 |
| 10453017 | Computer systems and methods to protect user credential against phishing | Jeremy Boyd Richards | 2019-10-22 |
| 10440053 | Methods and systems for detecting and preventing network connection compromise | Timothy Micheal Wyatt, David William Cowden, Nitin Desai, Prasad M. Deshpande, Robert Blaine Elwell | 2019-10-08 |
| 10424017 | Dynamically activating and deactivating one or more elements of a trading tool | Mark Triplett | 2019-09-24 |
| 10419936 | Methods and systems for causing mobile communications devices to emit sounds with encoded information | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson +3 more | 2019-09-17 |
| 10419222 | Monitoring for fraudulent or harmful behavior in applications being installed on user devices | Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere +1 more | 2019-09-17 |
| 10417432 | Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device | Kevin Patrick Mahaffey, William Neil Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt +10 more | 2019-09-17 |
| 10360364 | Method for changing mobile communication device functionality based upon receipt of a second code | William Neil Robinson, Kevin Patrick Mahaffey | 2019-07-23 |
| 10304134 | Charting multiple markets | Michael J. Burns, Douglas R. Duquette | 2019-05-28 |
| 10275913 | Graphical display with integrated recent period zoom and historical period context data | — | 2019-04-30 |
| 10256979 | Assessing application authenticity and performing an action in response to an evaluation result | Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere +1 more | 2019-04-09 |
| 10243999 | Methods and systems for providing secure network connections to mobile communications devices | Kevin Patrick Mahaffey, Timothy Strazzere | 2019-03-26 |