| 10834051 |
Proxy server-based malware detection |
Jesper Mikael Johansson, Andrew Jay Roths |
2020-11-10 |
| 10803164 |
Validating sign-out implementation for identity federation |
David Scott Cleckley, Jr., Robert E. Lee, Annabelle Richard Backman |
2020-10-13 |
| 10785261 |
Techniques for secure session reestablishment |
Jesper Mikael Johansson, Darren Ernest Canavor, Gregory Branchek Roth, Gregory Alan Rubin, Nima Sharifi Mehr |
2020-09-22 |
| 10728272 |
Risk scoring in a connected graph |
Danial Muhammad Ranjha, Tushaar Sethi, Maarten Van Horenbeeck |
2020-07-28 |
| 10713655 |
Migrating user accounts from assisted to self-managed |
Mayur Sharma |
2020-07-14 |
| 10608997 |
Context-based data access control |
Tushaar Sethi |
2020-03-31 |
| 10600293 |
Activation of security mechanisms through accelerometer-based dead reckoning |
— |
2020-03-24 |
| 10587617 |
Broadcast-based trust establishment |
Darren Ernest Canavor, George Nikolaos Stathakopoulos |
2020-03-10 |
| 10587594 |
Media based authentication |
Darren Ernest Canavor, Jesper Mikael Johansson, George Nikolaos Stathakopoulos |
2020-03-10 |
| 10574697 |
Providing a honeypot environment in response to incorrect credentials |
Darren Ernest Canavor, George Nikolaos Stathakopoulos |
2020-02-25 |
| 10560435 |
Enforcing restrictions on third-party accounts |
Jesper Mikael Johansson, Darren Ernest Canavor |
2020-02-11 |
| 10560338 |
Event-based data path detection |
Dominique Imjya Brezinski, Tushaar Sethi, Maarten Van Horenbeeck |
2020-02-11 |
| 10528743 |
Identifying characteristics of problematic developers of software |
Alun Jones, Narasimha Rao Lakkakula |
2020-01-07 |