| 12218931 |
Collaboration application integration for user-identity verification |
Thomas Szigeti, Stefano Giorcelli, David John Zacks |
2025-02-04 |
| 12212575 |
User role-driven metadata layers in a data mesh |
Peshan Sampath Kalu Marakkala |
2025-01-28 |
| 12170612 |
Data requesting and routing protocol in a data mesh |
Peshan Sampath Kalu Marakkala |
2024-12-17 |
| 12107854 |
Continuous multifactor authentication system integration with corporate security systems |
Thomas Szigeti, Alan Robert Lynn, David John Zacks |
2024-10-01 |
| 11824866 |
Peripheral landscape and context monitoring for user-identify verification |
Thomas Szigeti, David John Zacks, Carlos M. Pignataro |
2023-11-21 |
| 11799857 |
Software posture for zero trust access |
Peshan Sampath Kalu Marakkala |
2023-10-24 |
| 11706214 |
Continuous multifactor authentication system integration with corporate security systems |
Thomas Szigeti, Alan Robert Lynn, David John Zacks |
2023-07-18 |
| 11444941 |
Multifactor derived identification |
Alan Robert Lynn, Carlos M. Pignataro, Rajiv Asati |
2022-09-13 |
| 11388011 |
Accountable identities on the internet |
Ram Abhinav Somaraju, Marcelo Yannuzzi Sanchez, Alan Robert Lynn |
2022-07-12 |
| 9953144 |
Constellation based device binding |
Peter Maria Franciscus Rombouts, Philippe Teuwen |
2018-04-24 |
| 9693224 |
Restricting software to authorized wireless environments |
Philippe Teuwen, Peter Maria Franciscus Rombouts |
2017-06-27 |
| 9584514 |
Binding mobile device secure software components to the SIM |
Peter Maria Franciscus Rombouts, Philippe Teuwen |
2017-02-28 |
| 9563754 |
Method of generating a structure and corresponding structure |
Vincent Cedric Colnot, Peter Maria Franciscus Rombouts, Philippe Teuwen |
2017-02-07 |
| 9264899 |
Binding mobile device secure software components to the SIM |
Peter Maria Franciscus Rombouts, Philippe Teuwen |
2016-02-16 |
| 7017832 |
Piercing hose nozzle |
Wesley Nelson |
2006-03-28 |