Issued Patents All Time
Showing 26–50 of 96 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10706167 | Systems and methods for enforcing privacy in cloud security | Lei Gu, Jason Holler, Tim van der Horst | 2020-07-07 |
| 10657971 | Systems and methods for detecting suspicious voice calls | Keith Newstadt | 2020-05-19 |
| 10616214 | Systems and methods for preventing loss of possession factors | Kevin Jiang | 2020-04-07 |
| 10609030 | Systems and methods for identifying untrusted devices in peer-to-peer communication | Keith Newstadt | 2020-03-31 |
| 10581781 | Systems and methods for facilitating negotiation and exchange of information between parties | Keith Newstadt | 2020-03-03 |
| 10573020 | Location validation through physical surroundings | Keith Newstadt | 2020-02-25 |
| 10523715 | Analyzing requests from authenticated computing devices to detect and estimate the size of network address translation systems | Kevin Jiang, Rickey Ray | 2019-12-31 |
| 10492072 | Systems and methods for evaluating wireless network connection security | Gopi Bhagavathula, Ning Chai, Keith Newstadt | 2019-11-26 |
| 10482223 | Systems and methods for selecting questions for knowledge-based authentication based on social entropy | Kevin Jiang, Bruce McCorkendale | 2019-11-19 |
| 10469457 | Systems and methods for securely sharing cloud-service credentials within a network of computing devices | Keith Newstadt | 2019-11-05 |
| 10462184 | Systems and methods for enforcing access-control policies in an arbitrary physical space | Lei Gu, Bruce McCorkendale | 2019-10-29 |
| 10447736 | Systems and methods for providing security in smart buildings | Kevin Jiang, Lei Gu, Michael Shavell | 2019-10-15 |
| 10445481 | Systems and methods for performing human-verification procedures | Keith Newstadt | 2019-10-15 |
| 10438000 | Using recognized backup images for recovery after a ransomware attack | Lei Gu | 2019-10-08 |
| 10437988 | Smart cover components for security policy enforcement | Keith Newstadt | 2019-10-08 |
| 10432720 | Systems and methods for strong information about transmission control protocol connections | Michael Shavell | 2019-10-01 |
| 10419375 | Systems and methods for analyzing emotional responses to online interactions | Keith Newstadt | 2019-09-17 |
| 10404697 | Systems and methods for using vehicles as information sources for knowledge-based authentication | Kevin Jiang, Bruce McCorkendale | 2019-09-03 |
| 10382416 | Techniques for detecting shared devices | Kevin Jiang | 2019-08-13 |
| 10375114 | Systems and methods for enforcing access-control policies | Lei Gu, Bruce McCorkendale | 2019-08-06 |
| 10375077 | Systems and methods for mediating information requests | Keith Newstadt | 2019-08-06 |
| 10367643 | Systems and methods for managing encryption keys for single-sign-on applications | Keith Newstadt | 2019-07-30 |
| 10339340 | Anonymous reputation requests | Ronald Frederick, Mark Kennedy | 2019-07-02 |
| 10339304 | Systems and methods for generating tripwire files | Lei Gu, Matt Boucher | 2019-07-02 |
| 10331879 | Systems and methods for automatically generating passwords that comply with password restrictions | Kevin Jiang | 2019-06-25 |