| 12047110 |
Wearable article with multi-frequency wireless communication |
Holli Pheil, Drew McLain Skeels, Allison Walters |
2024-07-23 |
| 11689236 |
Wearable article with multi-frequency wireless communication |
Holli Pheil, Drew McLain Skeels, Allison Walters |
2023-06-27 |
| 11206053 |
Wearable article with multi-frequency wireless communication |
Holli Pheil, Drew McLain Skeels, Allison Walters |
2021-12-21 |
| 10862522 |
Wearable article with multi-frequency wireless communication |
Holli Pheil, Drew McLain Skeels, Allison Walters |
2020-12-08 |
| 10341341 |
RFID authentication architecture and methods for RFID authentication |
John Fairbanks, Jun Liu |
2019-07-02 |
| 10211870 |
Wearable article with multi-frequency wireless communication |
Holli Pheil, Drew McLain Skeels, Allison Walters |
2019-02-19 |
| 9843580 |
RFID authentication architecture and methods for RFID authentication |
John Fairbanks, Jun Liu |
2017-12-12 |
| 9231947 |
RFID authentication architecture and methods for RFID authentication |
John Fairbanks, Jun Liu |
2016-01-05 |
| 8681987 |
RFID authentication architecture and methods for RFID authentication |
John Fairbanks, Jun Liu |
2014-03-25 |
| 8578490 |
System and method for using timestamps to detect attacks |
— |
2013-11-05 |
| 7203962 |
System and method for using timestamps to detect attacks |
— |
2007-04-10 |
| 7085936 |
System and method for using login correlations to detect intrusions |
— |
2006-08-01 |
| 7065657 |
Extensible intrusion detection system |
— |
2006-06-20 |
| 7032114 |
System and method for using signatures to detect computer intrusions |
— |
2006-04-18 |
| 6996843 |
System and method for detecting computer intrusions |
— |
2006-02-07 |
| 6859931 |
Extensible software-based architecture for communication and cooperation within and between communities of distributed agents and distributed objects |
Adam Cheyer, David L. Martin, William S. Mark |
2005-02-22 |
| 6826697 |
System and method for detecting buffer overflow attacks |
— |
2004-11-30 |
| 6647400 |
System and method for analyzing filesystems to detect intrusions |
— |
2003-11-11 |