| 11122433 |
Methods and systems for enhancing electronic device security by intercepting and analyzing a communication |
David Luke Richardson, Ayan Mandal, Cherry Mangat, Vance Grkov |
2021-09-14 |
| 11080407 |
Methods and systems for analyzing data after initial analyses by known good and known bad security components |
— |
2021-08-03 |
| RE48669 |
System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device |
John G. Hering, James David Burgess |
2021-08-03 |
| 11050736 |
System and method for processing a command based on verification information and a challenge token |
Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more |
2021-06-29 |
| 11038876 |
Managing access to services based on fingerprint matching |
Aaron Cockerill, David Luke Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck |
2021-06-15 |
| 11017069 |
Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device |
William Neil Robinson, Brian James Buck |
2021-05-25 |
| 10990696 |
Methods and systems for detecting attempts to access personal information on mobile communications devices |
Timothy Micheal Wyatt, David Luke Richardson, Brian James Buck, Marc William Rogers |
2021-04-27 |