| 10819707 |
Systems and methods for validating a user's physical location |
Keith Newstadt |
2020-10-27 |
| 10820137 |
Method to determine whether device location indicates person location |
Keith Newstadt |
2020-10-27 |
| 10812981 |
Systems and methods for certifying geolocation coordinates of computing devices |
Keith Newstadt |
2020-10-20 |
| 10810089 |
Automatically adjusting backup set rules based on anomalous backup activity |
Lei Gu |
2020-10-20 |
| 10810088 |
System and method of dynamic backup policy generation |
Lei Gu |
2020-10-20 |
| 10783261 |
Systems and methods for preventing sensitive information exposure based on a surrounding audience |
Lei Gu |
2020-09-22 |
| 10778839 |
Detecting and preventing phishing phone calls through verified attribute analysis |
Keith Newstadt, Venkadesan Marimuthu |
2020-09-15 |
| 10764060 |
Systems and methods for authenticating a multimedia stream |
Keith Newstadt |
2020-09-01 |
| 10742665 |
Systems and methods for modifying file backups in response to detecting potential ransomware |
Lei Gu |
2020-08-11 |
| 10725870 |
Content-based automatic backup of images |
Lei Gu |
2020-07-28 |
| 10706167 |
Systems and methods for enforcing privacy in cloud security |
Lei Gu, Jason Holler, Tim van der Horst |
2020-07-07 |
| 10657971 |
Systems and methods for detecting suspicious voice calls |
Keith Newstadt |
2020-05-19 |
| 10616214 |
Systems and methods for preventing loss of possession factors |
Kevin Jiang |
2020-04-07 |
| 10609030 |
Systems and methods for identifying untrusted devices in peer-to-peer communication |
Keith Newstadt |
2020-03-31 |
| 10581781 |
Systems and methods for facilitating negotiation and exchange of information between parties |
Keith Newstadt |
2020-03-03 |
| 10573020 |
Location validation through physical surroundings |
Keith Newstadt |
2020-02-25 |