| 12432205 |
Systems and methods for endpoint management |
Jon Oberheide, Adam Goodman, Michael Hanley, Peter E. Johnson, James Barclay |
2025-09-30 |
| 12003512 |
Limiting discovery of a protected resource in a zero trust access model |
Sharif Mufid-Sharif Anani, Christopher Carl Cassell, Marc Neuberger, David Steven Gross, Luis Daniel Mendez |
2024-06-04 |
| 11831642 |
Systems and methods for endpoint management |
Jon Oberheide, Adam Goodman, Michael Hanley, Peter E. Johnson, James Barclay |
2023-11-28 |
| 11341475 |
System and method of notifying mobile devices to complete transactions after additional agent verification |
Jon Oberheide, Boyang Zhu |
2022-05-24 |
| 11019057 |
Systems and methods for endpoint management |
Jon Oberheide, Adam Goodman, Michael Hanley, Peter E. Johnson, James Barclay |
2021-05-25 |
| 10820194 |
Systems and methods for securing access to computing resources by an endpoint device |
Geoff Keyes, Kyle Mills, Harold T. Chapman, Peter E. Johnson, Trevor Hough |
2020-10-27 |
| 10706421 |
System and method of notifying mobile devices to complete transactions after additional agent verification |
Jon Oberheide, Boyang Zhu |
2020-07-07 |
| 10594692 |
Systems and methods for endpoint management classification |
Jon Oberheide, Adam Goodman, Michael Hanley, Peter E. Johnson, James Barclay |
2020-03-17 |
| 10445732 |
System and method of notifying mobile devices to complete transactions after additional agent verification |
Jon Oberheide, Boyang Zhu |
2019-10-15 |
| 10009344 |
Systems and methods for endpoint management classification |
Jon Oberheide, Adam Goodman, Michael Hanley, Peter E. Johnson, James Barclay |
2018-06-26 |
| 9532222 |
System and method of notifying mobile devices to complete transactions after additional agent verification |
Jon Oberheide, Boyang Zhu |
2016-12-27 |