DB

Dominique Imjya Brezinski

AM Amazon: 24 patents #433 of 19,158Top 3%
Overall (All Time): #172,868 of 4,157,543Top 5%
24
Patents All Time

Issued Patents All Time

Patent #TitleCo-InventorsDate
10560338 Event-based data path detection Jon Arron McClintock, Tushaar Sethi, Maarten Van Horenbeeck 2020-02-11
10404683 Strength-based password expiration Jesper Mikael Johansson, Kenneth L. Hamer 2019-09-03
10382461 System for determining anomalies associated with a request Nima Sharifi Mehr, Sunu Aby Mathew 2019-08-13
10187428 Identifying data usage via active data Harsha Ramalingam, Jesper Mikael Johansson, Jon Arron McClintock, James C. Petts 2019-01-22
10002177 Crowdsourced analysis of decontextualized data Jon Arron McClintock, George Nikolaos Stathakopoulos 2018-06-19
9990507 Adapting decoy data present in a network Harsha Ramalingam, Jesper Mikael Johansson, James C. Petts 2018-06-05
9838260 Event-based data path detection Jon Arron McClintock, Tushaar Sethi, Maarten Van Horenbeeck 2017-12-05
9805215 Mapping identifying information Jesper Mikael Johansson, Darren Ernest Canavor, Darin Keith McAdams, Jon Arron McClintock, Brandon William Porter 2017-10-31
9767013 Detecting code alteration based on memory allocation 2017-09-19
9705920 Identifying data usage via active data Harsha Ramalingam, Jesper Mikael Johansson, Jon Arron McClintock, James C. Petts 2017-07-11
9576301 Detection of child frames in web pages Ram Sripracha 2017-02-21
9348742 Detecting code alteration based on memory allocation 2016-05-24
9342796 Learning-based data decontextualization Jon Arron McClintock, George Nikolaos Stathakopoulos 2016-05-17
9225730 Graph based detection of anomalous activity 2015-12-29
9178866 Techniques for user authentication Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue 2015-11-03
9178876 Strength-based password expiration Jesper Mikael Johansson, Kenneth L. Hamer 2015-11-03
9152808 Adapting decoy data present in a network Harsha Ramalingam, Jesper Mikael Johansson, James C. Petts 2015-10-06
9154515 Systems and methods identifying and reacting to potentially malicious activity Francesco Russo, Robert Mahfoud, Martin M. O'Reilly 2015-10-06
9129118 Mapping identifying information Jesper Mikael Johansson, Darren Ernest Canavor, Darin Keith McAdams, Jon Arron McClintock, Brandon William Porter 2015-09-08
8955143 Use of decoy data in a data store Harsha Ramalingam, Timothy Mark Edward Bollefer, Jesper Mikael Johansson, James C. Petts 2015-02-10
8925062 Techniques for user authentication Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue 2014-12-30
8676795 Dynamic visual representation of phrases Cyrus J. Durgin, George Nikolaos Stathakopoulos, Emilia S. Buneci, Martin M. O'Reilly, Lane R. LaRue +1 more 2014-03-18
8613066 Techniques for user authentication Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue 2013-12-17
8548917 Detection of child frames in web pages Ram Sripracha 2013-10-01