| 11537721 |
Device-based security scoring |
Victoria Ashley Mosby, Bastien Bobe, Katelyn Clifford |
2022-12-27 |
| 11523282 |
Use of geolocation to improve security while protecting privacy |
Jeroen Martijn Wijdogen, Kevin Lam, Varun Shimoga Prakash, Michael Joseph Mole, Pradeep Deepak Phatak +1 more |
2022-12-06 |
| 11520908 |
Self-management of devices using personal mobile device management |
Aaron Cockerill |
2022-12-06 |
| 11496512 |
Detecting realtime phishing from a phished client or at a security server |
Jeremy Boyd Richards |
2022-11-08 |
| 11488084 |
Computer systems and methods to protect user credential against phishing |
Jeremy Boyd Richards |
2022-11-01 |
| 11416938 |
Order entry actions |
— |
2022-08-16 |
| 11394746 |
DNS prefetching based on triggers for increased security |
— |
2022-07-19 |
| 11368369 |
Deployment of passive and active security policies to mobile devices |
David Luke Richardson, Alex Richard Gladd |
2022-06-21 |
| 11356478 |
Phishing protection using cloning detection |
Jeremy Boyd Richards |
2022-06-07 |
| 11354737 |
Trading circles |
Richard Lane, Thomas Jeffrey Weiss, Thurston Woo, Jason Shaffer, Michael Unetich +1 more |
2022-06-07 |
| 11349874 |
Methods and systems for providing a secure connection to a mobile communications device with the level of security based on a context of the communication |
Kevin Patrick Mahaffey, Timothy Strazzere |
2022-05-31 |
| 11341578 |
Dynamic generation of order entry fields on a trading interface |
— |
2022-05-24 |
| 11336684 |
Mobile device security using a secure execution context |
Karina Levitian, Francis Patrick Kelly, Sebastian Krawczuk, Michael Murray |
2022-05-17 |
| 11336458 |
Evaluating authenticity of applications based on assessing user device context for increased security |
Kevin Patrick Mahaffey, Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere +1 more |
2022-05-17 |
| 11301569 |
Quarantine of software based on analysis of updated device data |
Timothy Micheal Wyatt, William Neil Robinson, Alex Richard Gladd |
2022-04-12 |
| 11277373 |
Security during domain name resolution and browsing |
Stephen Woodward Lind, Brian Sullivan |
2022-03-15 |
| 11256329 |
Attention-based trading display for providing user-centric information updates |
— |
2022-02-22 |
| 11259183 |
Determining a security state designation for a computing device based on a source of software |
David Luke Richardson, Ahmed Mohamed Farrakha, William Neil Robinson |
2022-02-22 |
| 11251962 |
Method and system for providing a security component to a mobile communications device in an application |
Marc William Rogers |
2022-02-15 |
| 11240257 |
Domain name and URL visual verification for increased security |
— |
2022-02-01 |
| 11237875 |
Coordinating multiple components |
Matthew John Joseph LaMantia, Stephen J. Edwards, William Neil Robinson |
2022-02-01 |