Issued Patents All Time
Showing 51–75 of 96 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10289865 | Systems and methods for providing kinship-based accessibility to securely stored data | Kevin Jiang | 2019-05-14 |
| 10288432 | Systems and methods for guiding users to network-enabled devices | Keith Newstadt, Richard F. Andrews | 2019-05-14 |
| 10284556 | Systems and methods for verifying authentication requests using internet protocol addresses | Kevin Jiang | 2019-05-07 |
| 10262135 | Systems and methods for detecting and addressing suspicious file restore activities | Lei Gu, Haik Mesropian | 2019-04-16 |
| 10257202 | Systems and methods for logging users out of online accounts | Kevin Jiang, Rickey Ray | 2019-04-09 |
| 10248769 | Systems and methods for authenticating users on touchscreen devices | Kevin Jiang | 2019-04-02 |
| 10237304 | Systems and methods of administering computer activities based upon emotional intelligence | Keith Newstadt | 2019-03-19 |
| 10219157 | Secure verified attribute exchange between parties in physical proximity | Kevin Jiang | 2019-02-26 |
| 10206110 | Techniques for network security | Michael Shavell, Lei Gu, Kevin Jiang | 2019-02-12 |
| 10200359 | Systems and methods for creating credential vaults that use multi-factor authentication to automatically authenticate users to online services | Kevin Jiang | 2019-02-05 |
| 10193880 | Systems and methods for registering user accounts with multi-factor authentication schemes used by online services | Kevin Jiang | 2019-01-29 |
| 10154136 | Call block policy using validated identities and selected attribute sharing | Keith Newstadt | 2018-12-11 |
| 10148631 | Systems and methods for preventing session hijacking | Kevin Jiang | 2018-12-04 |
| 10140440 | Systems and methods for securing computing devices that are not in users' physical possessions | Keith Newstadt | 2018-11-27 |
| 10140187 | Techniques for system backup | Leo M. Chan | 2018-11-27 |
| 10135868 | Defeating wireless signal interference hacks by manipulating signal strength | Keith Newstadt | 2018-11-20 |
| 10116695 | Systems and methods for verifying that operators are human based on operator gaze | Keith Newstadt | 2018-10-30 |
| 10115283 | Systems and methods for providing assistance to users in emergency situations | Keith Newstadt | 2018-10-30 |
| 10116656 | Systems and methods for enabling calls to bypass call-blocking functions | Keith Newstadt | 2018-10-30 |
| 10097560 | Systems and methods for automatically adjusting user access permissions based on beacon proximity | Michael Shavell, Kevin Jiang, Lei Gu | 2018-10-09 |
| 10033732 | Systems and methods for detecting cloning of security tokens | Kevin Jiang | 2018-07-24 |
| 9888377 | Using personal computing device analytics as a knowledge based authentication source | Bruce McCorkendale, Kevin Jiang | 2018-02-06 |
| 9882889 | Techniques for user authentication | Lei Gu, Matt Boucher | 2018-01-30 |
| 9843934 | Systems and methods for detecting public networks | Kevin Jiang | 2017-12-12 |
| 9794744 | Physical presence validation through use of time-restricted secure beacon devices | Lei Gu | 2017-10-17 |