| 11775673 |
Using physiological cues to measure data sensitivity and implement security on a user device |
Saurabh Shintre |
2023-10-03 |
| 10958666 |
Systems and methods for verifying connection integrity |
Brian Witten, Qing Li, Ronald Frederick, Roelof Nico du Toit, Susanta K. Nanda +1 more |
2021-03-23 |
| 10142213 |
Techniques for providing event driven notifications |
Michael John Beems Hart |
2018-11-27 |
| 9754109 |
Systems and methods for managing access |
Aleatha Parker-Wood, Michael Hart, Chetan Verma |
2017-09-05 |
| 9141790 |
Systems and methods for using event-correlation graphs to detect attacks on computing systems |
Kevin Roundy, Fanglu Guo, Sandeep Bhatkar, Tao Cheng, Jie Fu +4 more |
2015-09-22 |
| 9009459 |
Systems and methods for neutralizing file-format-specific exploits included within files contained within electronic communications |
Carey Nachenberg, Fanglu Guo, Susanta K. Nanda, Sandeep Bhatkar, Marc Dacier |
2015-04-14 |
| 8925037 |
Systems and methods for enforcing data-loss-prevention policies using mobile sensors |
Daniel Marino, Bruce McCorkendale |
2014-12-30 |
| 8549643 |
Using decoys by a data loss prevention system to protect against unscripted activity |
— |
2013-10-01 |
| 7346892 |
Prediction and pre-selection of an element in syntax completion |
Randy S. Kimmerly, Josefa Michael George Nalewabau |
2008-03-18 |