Issued Patents All Time
Showing 76–100 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11693898 | System and method for determining a file for an interaction with a wearable device based on utility indicators | Kyle Mayers, Jinna Kim, Maharaj Mukherjee | 2023-07-04 |
| 11647026 | Automatically executing responsive actions based on a verification of an account lineage chain | Edward Lee Traywick, Scot Lincoln Daniels | 2023-05-09 |
| 11637870 | User responses to cyber security threats | Michael Beveridge, Edward Lee Traywick, Elizabeth R. Liuzzo, Caleb G. Mann, David J. Walsh +3 more | 2023-04-25 |
| 11636203 | System for isolated access and analysis of suspicious code in a disposable computing environment | Kyle Mayers, Jon Codispoti, Jinna Kim, Dustin Paul Stocks | 2023-04-25 |
| 11630889 | User monitoring and access control based on physiological measurements | Elizabeth R. Liuzzo, Edward Lee Traywick, Elijah Clark | 2023-04-18 |
| 11627152 | Real-time classification of content in a data transmission | Gulsen Saffel | 2023-04-11 |
| 11616794 | Data management system | Edward Lee Traywick, Elijah Clark, Caleb G. Mann, Michael Beveridge | 2023-03-28 |
| 11582250 | Scanning of content in weblink | Keaton Drake, Marci Landy, Cody Searl | 2023-02-14 |
| 11574056 | System for identifying suspicious code embedded in a file in an isolated computing environment | Jinna Kim, Dustin Paul Stocks | 2023-02-07 |
| 11568614 | Adaptive augmented reality system for dynamic processing of spatial component parameters based on detecting accommodation factors in real time | Olga Kocharyan, Deborah Mayers, Maharaj Mukherjee | 2023-01-31 |
| 11556873 | Cognitive automation based compliance management system | Jinna Kim, Richard S. Scot, Elena Kvochko, Monika Kapur, Michael Ogrinz | 2023-01-17 |
| 11550885 | Security enabled false desktop computing environment | Daniel Horne, Robert Lang | 2023-01-10 |
| 11528276 | System for prevention of unauthorized access using authorized environment hash outputs | Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall +1 more | 2022-12-13 |
| 11522994 | Voice analysis platform for voiceprint tracking and anomaly detection | Charlene L. Ramsue, Thomas G. Frost, Youshika C. Scott, Brian H. Corr, Scott Nielsen | 2022-12-06 |
| 11481484 | Virtual environment system for secure execution of program code using cryptographic hashes | Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark +1 more | 2022-10-25 |
| 11482049 | Media verification system | Elena Kvochko, Daniel Joseph Serna, Michael Ogrinz | 2022-10-25 |
| 11463443 | Real-time management of access controls | Elijah Clark | 2022-10-04 |
| 11423160 | System for analysis and authorization for use of executable environment data in a computing system using hash outputs | Emanuel David Guller, Edward Lee Traywick, Scot Lincoln Daniels, Rick Wayne Sumrall, Elijah Clark +2 more | 2022-08-23 |
| 11425123 | System for network isolation of affected computing systems using environment hash outputs | Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall +2 more | 2022-08-23 |
| 11381591 | Information security system based on multidimensional disparate user data | Stephen C. Brown, John Scott Alston, Olga Kocharyan, Edward Lee Traywick, Keaton Drake +1 more | 2022-07-05 |
| 11372982 | Centralized network environment for processing validated executable data based on authorized hash outputs | Jake Michael Yara, Edward Lee Traywick, Konata Stinson, Emanuel David Guller, Scot Lincoln Daniels +2 more | 2022-06-28 |
| 11348121 | Multi-source anomaly detection and automated dynamic resolution system | Elijah Clark | 2022-05-31 |
| 11329987 | Protecting enterprise computing resources by implementing an optical air gap system | Michael Beveridge, Jeffrey K. Johnson, Elizabeth R. Liuzzo | 2022-05-10 |
| 11297085 | Real-time validation of data transmissions based on security profiles | Gulsen Saffel | 2022-04-05 |
| 11269991 | System for identifying suspicious code in an isolated computing environment based on code characteristics | Dustin Paul Stocks, Jinna Kim | 2022-03-08 |