Issued Patents All Time
Showing 1–15 of 15 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12407682 | System, device, and method for performing secured operations | George Albero, Olga Kocharyan, Maharaj Mukherjee, Karen Davis, Lisa Pugh +5 more | 2025-09-02 |
| 12380189 | Fingerprint authentication-related indicators for controlling device access and/or functionality | George Albero, Edward Lee Traywick, Jake Michael Yara | 2025-08-05 |
| 12333043 | Event based network micro-segmentation modeling for user authenticated access to distributed network system segments | George Albero, Michael Robert Young | 2025-06-17 |
| 12197587 | Multi-computer system for performing vulnerability analysis and alert generation | Kayla Ashley Rux, Viswanathan Venkatasubramanian, Ramkumar Korlepara, Sanjay Lohar, Eric Eugene Sifford +2 more | 2025-01-14 |
| 12160422 | Device manipulation system for counteracting facial recognition authentication security malfeasance | George Albero, Edward Lee Traywick, Ariel Fontaine Hill, Jake Michael Yara | 2024-12-03 |
| 12147538 | Steganographic modification detection and mitigation for enhanced enterprise security | Matthew Murray, Garrett Botkin | 2024-11-19 |
| 12107925 | Data processing transactions between disparate systems using a universal processor | Jinna Kim, Robert Nyeland Huggins, Pratap Dande, George Albero | 2024-10-01 |
| 12056112 | Data feed meta detail categorization for confidence | Matthew K. Bryant, Colin Murphy | 2024-08-06 |
| 12050587 | Data feed meta detail categorization for confidence | Matthew K. Bryant, Colin Murphy | 2024-07-30 |
| 11974206 | Short-range wireless-enabled mobile communication device leash for controlling device and application access | — | 2024-04-30 |
| 11880461 | Application interface based system for isolated access and analysis of suspicious code in a computing environment | Jon Codispoti | 2024-01-23 |
| 11797669 | System for isolated access and analysis of suspicious code in a computing environment | Jon Codispoti, Kyle Mayers | 2023-10-24 |
| 11636203 | System for isolated access and analysis of suspicious code in a disposable computing environment | Kyle Mayers, George Albero, Jon Codispoti, Jinna Kim | 2023-04-25 |
| 11574056 | System for identifying suspicious code embedded in a file in an isolated computing environment | George Albero, Jinna Kim | 2023-02-07 |
| 11269991 | System for identifying suspicious code in an isolated computing environment based on code characteristics | George Albero, Jinna Kim | 2022-03-08 |