Issued Patents 2019
Showing 1–14 of 14 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10509910 | Methods and systems for granting access to services based on a security state that varies with the severity of security events | John G. Hering, James David Burgess, Brian James Buck, William Neil Robinson | 2019-12-17 |
| 10509911 | Methods and systems for conditionally granting access to services based on the security state of the device requesting access | James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry, Kyle Barton +7 more | 2019-12-17 |
| RE47757 | System and method for identifying and assessing vulnerabilities on a mobile communications device | John G. Hering, James David Burgess | 2019-12-03 |
| 10489862 | Systems and methods for computing device protection | John G. Hering, Brian James Buck, William Neil Robinson | 2019-11-26 |
| 10469481 | System and method for permitting an action based on verification information and a challenge token | Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more | 2019-11-05 |
| 10452862 | System and method for creating a policy for managing personal data on a mobile communications device | Timothy Micheal Wyatt, David Luke Richardson, Brian James Buck, Marc William Rogers | 2019-10-22 |
| 10419936 | Methods and systems for causing mobile communications devices to emit sounds with encoded information | John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal +3 more | 2019-09-17 |
| 10417432 | Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device | Brian James Buck, William Neil Robinson, John G. Hering, James David Burgess, Timothy Micheal Wyatt +10 more | 2019-09-17 |
| 10419222 | Monitoring for fraudulent or harmful behavior in applications being installed on user devices | Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia +1 more | 2019-09-17 |
| 10360364 | Method for changing mobile communication device functionality based upon receipt of a second code | William Neil Robinson, Brian James Buck | 2019-07-23 |
| 10256979 | Assessing application authenticity and performing an action in response to an evaluation result | Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia +1 more | 2019-04-09 |
| 10243999 | Methods and systems for providing secure network connections to mobile communications devices | Timothy Strazzere, Brian James Buck | 2019-03-26 |
| 10218697 | Use of device risk evaluation to manage access to services | Aaron Cockerill, David Luke Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck | 2019-02-26 |
| 10181118 | Mobile communications device payment method utilizing location information | Ariel Salomon | 2019-01-15 |