Issued Patents All Time
Showing 76–100 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11423163 | System for controlling computing process execution by users with elevated access privilege | — | 2022-08-23 |
| 11394733 | System for generation and implementation of resiliency controls for securing technology resources | Lydia Lambright, Regina Yee Cadavid, Gloria Joo | 2022-07-19 |
| 11343097 | Dynamic segmentation of network traffic by use of pre-shared keys | Regina Yee Cadavid, Gloria Joo, Jinyoung Kim, Nia Mack | 2022-05-24 |
| 11334662 | Tamper-evident travel devices equipped with secure re-image file (s) | Vijaya L. Vemireddy, Harvey Summers, Eileen D. Bridges | 2022-05-17 |
| 11307952 | System for computing system configuration file state mirroring on peer computing devices | — | 2022-04-19 |
| 11290475 | System for technology resource centric rapid resiliency modeling | Lydia Lambright, Regina Yee Cadavid, Gloria Joo | 2022-03-29 |
| 11271919 | Network security system for rogue devices | Regina Yee Cadavid, Gloria Joo, Jinyoung Kim, Nia Mack | 2022-03-08 |
| 11265255 | Secure communication routing for remote devices | Regina Yee Cadavid, Gloria Joo, Jinyoung Kim, Nia Mack | 2022-03-01 |
| 11252255 | Data aggregation via an edge computing system | Ryan Davis, Crystal M. Sundaramoorthy, Kevin A. Delson | 2022-02-15 |
| 11245705 | Intuitive resource management platform | Lydia Lambright | 2022-02-08 |
| 11240636 | Digital passport with verified data provenance | Aarron Gull, Harvey Summers, Gilbert Gatchalian, Vijaya L. Vemireddy | 2022-02-01 |
| 11163889 | System and method for analyzing and remediating computer application vulnerabilities via multidimensional correlation and prioritization | Brian Diederich | 2021-11-02 |
| 11165787 | System for authorization of electronic data access and processing functions within a distributed server network | Lydia Lambright | 2021-11-02 |
| 11165587 | System for authorizing resource requests based on cryptographic computations and federated hash verifications | Wendell Allen Jenkins | 2021-11-02 |
| 11151575 | Trusted pair authentication with edge-computing devices | Monika Kapur, Kevin A. Delson, Siten Sanghvi, Albena N. Fairchild, John Ryan Bowling | 2021-10-19 |
| 11133935 | System for integrity validation of authorization data using cryptographic hashes | — | 2021-09-28 |
| 11122059 | Integrated resource landscape system | Rachel Yun Kim Bierner, Mark Earl Brubaker, Regina Yee Cadavid, John Costello, Cora Yan Quon | 2021-09-14 |
| 11087323 | Exposure based secure access system | Michael Thomas Malarkey, John Costello, Brian Diederich | 2021-08-10 |
| 11023812 | Event prediction and impact mitigation system | John Costello | 2021-06-01 |
| 10986097 | System for using a distributed ledger to manage user entitlements to computing resources | Brian Diederich, John Howard Kling | 2021-04-20 |
| 10877443 | System for generation and execution of improved control effectiveness | — | 2020-12-29 |
| 10824754 | Vertically integrated access control system for identifying and remediating flagged combinations of capabilities resulting from user entitlements to computing resources | John Howard Kling, Regina Yee Cadavid, Rachel Yun Kim Bierner, Ronald James Kuhlmeier | 2020-11-03 |
| 10810006 | Indicator regression and modeling for implementing system changes to improve control effectiveness | John Costello, Brian Diederich | 2020-10-20 |
| 10812590 | System for generating distributed cloud data storage on disparate devices | Brian Diederich | 2020-10-20 |
| 10779165 | Systems and methods for pre-authenticating a user on a mobile device | Monika Kapur, Crystal M. Sundaramoorthy, Ryan Davis, Kevin A. Delson | 2020-09-15 |