Issued Patents All Time
Showing 76–100 of 121 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8924957 | Systems and methods for simultaneously installing user-input-dependent software packages on multiple devices | Shaun Cooley | 2014-12-30 |
| 8903986 | Real-time identification of URLs accessed by automated processes | Adam Schepis | 2014-12-02 |
| 8881003 | Online storage aggregation and publishing | Shaun Cooley | 2014-11-04 |
| 8875284 | Personal identifiable information (PII) theft detection and remediation system and method | Shaun Cooley | 2014-10-28 |
| 8832788 | Automated human assisted authentication | Douglas Gibson | 2014-09-09 |
| 8825836 | Systems and methods for managing notification messages generated by one or more applications | Douglas Gibson | 2014-09-02 |
| 8776168 | Applying security policy based on behaviorally-derived user risk profiles | Douglas Gibson | 2014-07-08 |
| 8775678 | Automated wireless synchronization and transformation | Shaun Cooley | 2014-07-08 |
| 8762312 | Using sentiment-based analysis in the filtering of web content | Adam Schepis | 2014-06-24 |
| 8752038 | Reducing boot time by providing quantitative performance cost data within a boot management user interface | Shaun Cooley, Vijay Bhaskar Perumal | 2014-06-10 |
| 8752170 | Verification and validation of externally maintained profile attributes | Timothy G. Brown | 2014-06-10 |
| 8738764 | Methods and systems for controlling communications | Adam Schepis | 2014-05-27 |
| 8688657 | Systems and methods for data loss prevention | Douglas Gibson | 2014-04-01 |
| 8631457 | Method and apparatus for monitoring text-based communications to secure a computer | Adam Schepis, Matt Boucher, Robert Walters | 2014-01-14 |
| 8626714 | Automated separation of corporate and private data for backup and archiving | Douglas Gibson | 2014-01-07 |
| 8578009 | Systems and methods for correlating online aliases with real-world identities | Shaun Cooley | 2013-11-05 |
| 8504671 | Systems and methods for rating a current instance of data based on preceding and succeeding instances of data | Adam Schepis | 2013-08-06 |
| 8495716 | Systems and methods for facilitating online authentication from untrusted computing devices | Shaun Cooley | 2013-07-23 |
| 8453222 | Possession of synchronized data as authentication factor in online services | Pieter Viljoen | 2013-05-28 |
| 8434126 | Methods and systems for aiding parental control policy decisions | Adam Schepis | 2013-04-30 |
| 8429710 | Preventing exposure of private information | Adam Schepis | 2013-04-23 |
| 8407766 | Method and apparatus for monitoring sensitive data on a computer network | Adam Schepis, Shaun Cooley | 2013-03-26 |
| 8364705 | Methods and systems for determining a file set | Shaun Cooley | 2013-01-29 |
| 8281361 | Methods and systems for enforcing parental-control policies on user-generated content | Adam Schepis | 2012-10-02 |
| 8281159 | Systems and methods for managing power usage based on power-management information from a power grid | Shaun Cooley | 2012-10-02 |