Issued Patents All Time
Showing 25 most recent of 28 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9979725 | Two-way authentication using two-dimensional codes | Quentin Liu, Robert Walters | 2018-05-22 |
| 9893970 | Data loss monitoring of partial data streams | — | 2018-02-13 |
| 9886726 | Analyzing social networking groups for detecting social networking spam | — | 2018-02-06 |
| 9811676 | Systems and methods for securely providing information external to documents | — | 2017-11-07 |
| 9455892 | Data loss monitoring of partial data streams | — | 2016-09-27 |
| 9338164 | Two-way authentication using two-dimensional codes | Quentin Liu, Robert Walters | 2016-05-10 |
| 9305170 | Systems and methods for securely providing information external to documents | — | 2016-04-05 |
| 9185132 | Techniques for sensor based attack reflection | — | 2015-11-10 |
| 9081938 | Systems and methods for determining whether profiles associated with social-networking websites have been compromised | — | 2015-07-14 |
| 9026601 | Systems and methods for validating members of social networking groups | — | 2015-05-05 |
| 8844041 | Detecting network devices and mapping topology using network introspection by collaborating endpoints | Darrell Kienzle, Matthew Elder, Robert Walters, Adam Schepis, Brian Hernacki | 2014-09-23 |
| 8825773 | Systems and methods for concealing information relating to a profile provided by a social networking service | — | 2014-09-02 |
| 8805996 | Analysis of communications in social networks | — | 2014-08-12 |
| 8655792 | Deriving the content of a social network private site based on friend analysis | — | 2014-02-18 |
| 8555357 | Techniques for mitigating forgotten password attacks | — | 2013-10-08 |
| 8347381 | Detecting malicious social networking profiles | — | 2013-01-01 |
| 8312064 | Method and apparatus for securing documents using a position dependent file system | — | 2012-11-13 |
| 8301432 | Systems and methods for determining a power cycle of a power source of a mobile device | — | 2012-10-30 |
| 8225396 | Systems and methods for detecting and warning users about hidden sensitive information contained in webpages | — | 2012-07-17 |
| 8150779 | Validating the detection of spam based entities in social networking contexts | — | 2012-04-03 |
| 8104077 | System and method for adaptive end-point compliance | Ed Taranto, Steve Zhou | 2012-01-24 |
| 7930750 | Method to trickle and repair resources scanned using anti-virus technologies on a security gateway | Edward James Taranto, Steve Zhou | 2011-04-19 |
| 7735116 | System and method for unified threat management with a relational rules methodology | — | 2010-06-08 |
| 6883020 | Apparatus and method for filtering downloaded network sites | Edward James Taranto, Ursula Smith, David J. Sullivan, Louise Lemaire | 2005-04-19 |
| 6105028 | Method and apparatus for accessing copies of documents using a web browser request interceptor | David J. Sullivan, Edward James Taranto | 2000-08-15 |