| 11171995 |
Identifying and mitigating risks of cryptographic obsolescence |
Eric Young |
2021-11-09 |
| 11171949 |
Generating authentication information utilizing linear feedback shift registers |
Piers Bowness |
2021-11-09 |
| 11139982 |
Communication-efficient device delegation |
Salah Machani |
2021-10-05 |
| 11128638 |
Location assurance using location indicators modified by shared secrets |
Brian Mullins |
2021-09-21 |
| 11025658 |
Generating summaries of messages associated with assets in an enterprise system |
Sashka T. Davis, Kevin J. Arunski, Scott E. Moore, Abram Thielke, Ed G. Quackenbush +1 more |
2021-06-01 |
| 10999311 |
Risk score generation for assets of an enterprise system utilizing user authentication activity |
Sashka T. Davis, Zohar Duchin, Gregory A. Gerber, JR., Mark Gergely, Steve G. Schlarman |
2021-05-04 |
| 10938847 |
Automated determination of relative asset importance in an enterprise system |
Sashka T. Davis, Kevin T. Douglas |
2021-03-02 |