| 10560338 |
Event-based data path detection |
Jon Arron McClintock, Tushaar Sethi, Maarten Van Horenbeeck |
2020-02-11 |
| 10404683 |
Strength-based password expiration |
Jesper Mikael Johansson, Kenneth L. Hamer |
2019-09-03 |
| 10382461 |
System for determining anomalies associated with a request |
Nima Sharifi Mehr, Sunu Aby Mathew |
2019-08-13 |
| 10187428 |
Identifying data usage via active data |
Harsha Ramalingam, Jesper Mikael Johansson, Jon Arron McClintock, James C. Petts |
2019-01-22 |
| 10002177 |
Crowdsourced analysis of decontextualized data |
Jon Arron McClintock, George Nikolaos Stathakopoulos |
2018-06-19 |
| 9990507 |
Adapting decoy data present in a network |
Harsha Ramalingam, Jesper Mikael Johansson, James C. Petts |
2018-06-05 |
| 9838260 |
Event-based data path detection |
Jon Arron McClintock, Tushaar Sethi, Maarten Van Horenbeeck |
2017-12-05 |
| 9805215 |
Mapping identifying information |
Jesper Mikael Johansson, Darren Ernest Canavor, Darin Keith McAdams, Jon Arron McClintock, Brandon William Porter |
2017-10-31 |
| 9767013 |
Detecting code alteration based on memory allocation |
— |
2017-09-19 |
| 9705920 |
Identifying data usage via active data |
Harsha Ramalingam, Jesper Mikael Johansson, Jon Arron McClintock, James C. Petts |
2017-07-11 |
| 9576301 |
Detection of child frames in web pages |
Ram Sripracha |
2017-02-21 |
| 9348742 |
Detecting code alteration based on memory allocation |
— |
2016-05-24 |
| 9342796 |
Learning-based data decontextualization |
Jon Arron McClintock, George Nikolaos Stathakopoulos |
2016-05-17 |
| 9225730 |
Graph based detection of anomalous activity |
— |
2015-12-29 |
| 9178866 |
Techniques for user authentication |
Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue |
2015-11-03 |
| 9178876 |
Strength-based password expiration |
Jesper Mikael Johansson, Kenneth L. Hamer |
2015-11-03 |
| 9152808 |
Adapting decoy data present in a network |
Harsha Ramalingam, Jesper Mikael Johansson, James C. Petts |
2015-10-06 |
| 9154515 |
Systems and methods identifying and reacting to potentially malicious activity |
Francesco Russo, Robert Mahfoud, Martin M. O'Reilly |
2015-10-06 |
| 9129118 |
Mapping identifying information |
Jesper Mikael Johansson, Darren Ernest Canavor, Darin Keith McAdams, Jon Arron McClintock, Brandon William Porter |
2015-09-08 |
| 8955143 |
Use of decoy data in a data store |
Harsha Ramalingam, Timothy Mark Edward Bollefer, Jesper Mikael Johansson, James C. Petts |
2015-02-10 |
| 8925062 |
Techniques for user authentication |
Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue |
2014-12-30 |
| 8676795 |
Dynamic visual representation of phrases |
Cyrus J. Durgin, George Nikolaos Stathakopoulos, Emilia S. Buneci, Martin M. O'Reilly, Lane R. LaRue +1 more |
2014-03-18 |
| 8613066 |
Techniques for user authentication |
Benjamin S. Kirzhner, Emilia S. Buneci, Martin M. O'Reilly, Cyrus J. Durgin, Lane R. LaRue |
2013-12-17 |
| 8548917 |
Detection of child frames in web pages |
Ram Sripracha |
2013-10-01 |