| 11165590 |
Decentralized biometric signing of digital contracts |
Ghada Dulaim, Victor Usobiaga |
2021-11-02 |
| 10834289 |
Detection of steganography on the perimeter |
Dusty Boshoff |
2020-11-10 |
| 10785026 |
Executing electronic contract on NFC enabled mobile devices |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2020-09-22 |
| 10541818 |
Decentralized biometric signing of digital contracts |
Ghada Dulaim, Victor Usobiaga |
2020-01-21 |
| 10032240 |
Executing electronic contract on NFC enabled mobile devices |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2018-07-24 |
| 10033530 |
Executing electronic contract on NFC enabled mobile devices |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2018-07-24 |
| 9626528 |
Data leak prevention enforcement based on learned document classification |
— |
2017-04-18 |
| 9535731 |
Dynamic security sandboxing based on intruder intent |
Paul Ashley, Ghada M. ElKeissi, Leny Veliyathuparambil |
2017-01-03 |
| 9301132 |
Managing distribution of software updates in near field communication (NFC) mobile devices |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2016-03-29 |
| 9198031 |
Managing distribution of software updates in near field communication (NFC) mobile devices |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2015-11-24 |
| 9088409 |
Accessing local applications when roaming using a NFC mobile device |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2015-07-21 |
| 9088410 |
Accessing local applications when roaming using a NFC mobile device |
Paul Ashley, Ravi Kothari, Yu-Chen Lin |
2015-07-21 |
| 6480725 |
Telephone |
Brian Charles Cassidy, Ian Ray, Jonathan Marsters, Peter Scudamore, Paul Edwards |
2002-11-12 |