| 10133752 |
Dynamic glyph-based search |
Lee Begeja, David Crawford Gibbon, Steven Tischer |
2018-11-20 |
| 9692758 |
Authentication techniques utilizing a computing device |
Ilija Zeljkovic, Jerry Birkes, Alton W. Drake, II, Juan A. Garay, Brian M. Novack +4 more |
2017-06-27 |
| 9026614 |
System and methods for remotely recovering and purging data from a wireless device in a communications network |
Robert Koch |
2015-05-05 |
| 9021565 |
Authentication techniques utilizing a computing device |
Brian M. Novack, Jerry Birkes, James Whitescarver, Alton W. Drake, II, Gary A. Toretti +4 more |
2015-04-28 |
| 8924890 |
Dynamic glyph-based search |
Lee Begeja, David Crawford Gibbon, Steven Tischer |
2014-12-30 |
| 8180859 |
System and methods for remotely recovering and purging data from a wireless device in a communications network |
Robert Koch |
2012-05-15 |
| 7849161 |
System and methods for remotely recovering and purging data from a wireless device in a communications network |
Robert Koch |
2010-12-07 |
| 7627767 |
Methods and systems for remotely securing data in a wireless device in a communications network |
Stephen Sherman, Robert Koch |
2009-12-01 |