| 11120122 |
Augmenting password generation and validation |
Elizabeth Daly, Martin Stephenson, Spyridon Antonatos, Stefano Braghin |
2021-09-14 |
| 10979859 |
Allocation of resources in a networked computing environment based on physical location mapping |
Leon H. Cash, Jr., Robert E. Garza, Richard A. Locke |
2021-04-13 |
| 10635794 |
Determine security access level based on user behavior |
Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek |
2020-04-28 |
| 10582340 |
Allocation of resources in a networked computing environment based on physical location mapping |
Leon H. Cash, Jr., Robert E. Garza, Richard A. Locke |
2020-03-03 |
| 9870454 |
Determine security access level based on user behavior |
Ramamohan Chennamsetty, C. Steven Lingafelt, William H. Tworek |
2018-01-16 |
| 9654514 |
Trust level modifier |
Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-05-16 |
| 9645806 |
Method to convey an application's development environment characteristics to the hosting provider to facilitate selection of hosting environment or the selection of an optimized production operation of the application |
Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-05-09 |
| 9635058 |
Trust level modifier |
Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-04-25 |
| 9565196 |
Trust level modifier |
Ramamohan Chennamsetty, Anji Greene, Charles S. Lingafelt, William H. Tworek |
2017-02-07 |
| 9105071 |
System management of clinical procedures scheduling based on environmental thresholds |
James C. Administrator of the National Aeronautics and Space Fletcher |
2015-08-11 |