Issued Patents All Time
Showing 25 most recent of 45 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11797661 | Dynamically generating activity prompts to build and refine machine learning authentication models | Hitesh Shah | 2023-10-24 |
| 11790062 | Processing authentication requests to secured information systems based on machine-learned user behavior profiles | Hitesh Shah, Xianhong Zhang | 2023-10-17 |
| 11775623 | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles | Xianhong Zhang, Hitesh Shah, Srinivasa Rao Goriparthi | 2023-10-03 |
| 11528267 | System for automated image authentication and external database verification | Preston Wesley Ports, III, Sangeeta Varma Martinez, Dipika Jain, Melissa K. Van Leuven, Holly J. Martinez +3 more | 2022-12-13 |
| 11314850 | Preventing unauthorized access to secure information systems using advanced biometric authentication techniques | Hitesh Shah | 2022-04-26 |
| 11176230 | Processing authentication requests to secured information systems based on user behavior profiles | Hitesh Shah, Xianhong Zhang | 2021-11-16 |
| 11120109 | Processing authentication requests to secured information systems based on machine-learned event profiles | Hitesh Shah, Xianhong Zhang | 2021-09-14 |
| 11113370 | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles | Xianhong Zhang, Hitesh Shah, Srinivasa Rao Goriparthi | 2021-09-07 |
| 11048793 | Dynamically generating activity prompts to build and refine machine learning authentication models | Hitesh Shah | 2021-06-29 |
| 11050769 | Controlling dynamic user interface functionality using a machine learning control engine | Xianhong Zhang | 2021-06-29 |
| 11036838 | Processing authentication requests to secured information systems using machine-learned user-account behavior profiles | Xianhong Zhang, Hitesh Shah, Srinivasa Rao Goriparthi | 2021-06-15 |
| 10965675 | Preventing unauthorized access to secure information systems using advanced pre-authentication techniques | Xianhong Zhang, Kalyan V. Pasumarthi, Jeffrey Jacoby, Hitesh Shah, Archie Agrawal +1 more | 2021-03-30 |
| 10965662 | Method and system for data communication and frictionless authentication | Ashish Arora, Jothimuthu Palanisamy, Andrew T. Keys, Daniel Lynn Carpenter | 2021-03-30 |
| 10958639 | Preventing unauthorized access to secure information systems using multi-factor, hardware based and/or advanced biometric authentication | Hitesh Shah | 2021-03-23 |
| 10853467 | Data access control using multi-device multifactor authentication | Matthew M. Choiniere, Hitesh Shah | 2020-12-01 |
| 10831878 | Preventing unauthorized access to secure information systems using dynamic, multi-device authentication | Rakesh Juyal, Muniraju Jayaramaiah, Ashish Arora | 2020-11-10 |
| 10803154 | Multicomputer system for user data authentication and processing | Dennis M. Osborne, Daniel Lynn Carpenter, Xianhong Zhang | 2020-10-13 |
| 10728256 | Cross channel authentication elevation via logic repository | Scott Anderson Sims, Kolt Bell, Michael Joseph Carroll, Andrew DongHo Kim, Elliot Piatetsky +4 more | 2020-07-28 |
| 10721246 | System for across rail silo system integration and logic repository | Scott Anderson Sims, Kolt Bell, Michael Joseph Carroll, Andrew DongHo Kim, Elliot Piatetsky +5 more | 2020-07-21 |
| 10698992 | Preventing unauthorized access to secure information systems using advanced biometric authentication techniques | Hitesh Shah | 2020-06-30 |
| 10430569 | Multicomputer system for user data authentication and processing | Dennis M. Osborne, Daniel Lynn Carpenter, Xianhong Zhang | 2019-10-01 |
| 10146919 | Multicomputer system for user data authentication and processing | Dennis M. Osborne, Daniel Lynn Carpenter, Xianhong Zhang | 2018-12-04 |
| 10049195 | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements | David M. Grigg, Peter John Bertanzetti, Charles Jason Burrell, Carrie Anne Hanson, Joseph Neil Johansen | 2018-08-14 |
| 10050962 | Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication | David M. Grigg, Peter John Bertanzetti, Charles Jason Burrell, Carrie Anne Hanson, Joseph Neil Johansen | 2018-08-14 |
| 9971885 | Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements | David M. Grigg, Peter John Bertanzetti, Charles Jason Burrell, Carrie Anne Hanson, Joseph Neil Johansen | 2018-05-15 |