| 12373730 |
Programmable feature extractor |
Joseph H. Levy, Joshua Daniel Saxe |
2025-07-29 |
| 12361358 |
Enterprise network threat detection |
Beata Ladnai, Mark David Harris, Andrew G. P. Smith, Andrew J. Thomas, Russell Humphries |
2025-07-15 |
| 12354043 |
Computer augmented threat evaluation |
Joshua Daniel Saxe, Andrew J. Thomas, Russell Humphries, Simon Neil Reed, Joseph H. Levy |
2025-07-08 |
| 12348538 |
Intrusion detection using a heartbeat |
— |
2025-07-01 |
| 12309200 |
Detecting phishing attacks |
Andrew J. Thomas, Karl Ackerman, James Douglas Bean, Daniel Stutz |
2025-05-20 |
| 12273382 |
Multi-factor authentication |
Karl Ackerman, John Edward Tyrone Shaw, Craig Paradis, Andrew J. Thomas |
2025-04-08 |
| 12261824 |
Firewall techniques for colored objects on endpoints |
Andrew J. Thomas, Neil Robert Tyndale Watkiss, Daniel Salvatore Schiappa |
2025-03-25 |
| 12244641 |
Application firewall |
Andrew J. Thomas, Karl Ackerman, James Douglas Bean, Daniel Stutz |
2025-03-04 |
| 12218977 |
Managing admission of unrecognized devices onto an enterprise network |
John Edward Tyrone Shaw, Ross McKerchar, Moritz Daniel Grimm, Jan Karl Heinrich Weber, Shail Talati +1 more |
2025-02-04 |