| 9626495 |
Authenticating a device based on availability of other authentication methods |
Suzanne C. Deffeyes, Francis J. Hildenbrand, Jr., Amir Khan, C. Steven Lingafelt |
2017-04-18 |
| 9053344 |
Securing sensitive data for cloud computing |
Omkharan Arasaratnam |
2015-06-09 |
| 9038171 |
Visual display of website trustworthiness to a user |
— |
2015-05-19 |
| 8539597 |
Securing sensitive data for cloud computing |
Omkharan Arasaratnam |
2013-09-17 |
| 8478831 |
System, method and program to limit rate of transferring messages from suspected spammers |
John Fred Davis, Kevin D. Himberger, Clark Debs Jeffries |
2013-07-02 |
| 8468208 |
System, method and computer program to block spam |
John Fred Davis, Kevin D. Himberger, Clark Debs Jeffries |
2013-06-18 |
| 8311969 |
Method and system for reducing false positives in the classification of data |
— |
2012-11-13 |
| 8176126 |
System, method and program to limit rate of transferring messages from suspected spammers |
John Fred Davis, Kevin D. Himberger, Clark Debs Jeffries |
2012-05-08 |
| 7617526 |
Blocking of spam e-mail at a firewall |
John Fred Davis, Kevin D. Himberger, Clark Debs Jeffries |
2009-11-10 |