Issued Patents All Time
Showing 25 most recent of 48 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12141247 | Apparatus and method for persistent digital rights management | Steven Harvey McCown, Paul Ashley, John David Mumford, Tim Bartley | 2024-11-12 |
| 11928188 | Apparatus and method for persistent digital rights management | Steven Harvey McCown, Paul Ashley, John David Mumford, Tim Bartley | 2024-03-12 |
| 10657469 | Automated security incident handling in a dynamic environment | Steven A. Bade, Heather M. Hinton, Srinivas B. Tummalapenta | 2020-05-19 |
| 10432666 | Method and apparatus for associating data loss protection (DLP) policies with endpoints | Jayashree Ramanathan, Gavin G. Bray | 2019-10-01 |
| 10178106 | Apparatus and method for identifying and warning of synthetic identity behavior that reduces user privacy | Paul Ashley, Steve Shillingford, Simon Gee, Greg Clark, Phong Le | 2019-01-08 |
| 10033728 | CAPTCHA challenge incorporating obfuscated characters | Michael S. Brown, Carlos F. Franca da Fonseca | 2018-07-24 |
| 10003602 | Determining email authenticity | Christopher J. Hockings | 2018-06-19 |
| 9727733 | Risk-based model for security policy management | Christopher Y. Choi | 2017-08-08 |
| 9699176 | CAPTCHA challenge incorporating obfuscated characters | Michael S. Brown, Carlos F. Franca da Fonseca | 2017-07-04 |
| 9614875 | Scaling a trusted computing model in a globally distributed cloud environment | Venkata R. Jagana, Srinivasa Rao Mangipudi, Karthik Sivakumar | 2017-04-04 |
| 9552480 | Managing software deployment | Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Karthik Sivakumar | 2017-01-24 |
| 9542539 | Managing software deployment | Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Karthik Sivakumar | 2017-01-10 |
| 9525686 | Captcha challenge incorporating obfuscated characters | Michael S. Brown, Carlos F. Franca da Fonseca | 2016-12-20 |
| 9411954 | Managing software deployment | Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Karthik Sivakumar | 2016-08-09 |
| 9401954 | Scaling a trusted computing model in a globally distributed cloud environment | Venkata R. Jagana, Srinivasa Rao Mangipudi, Karthik Sivakumar | 2016-07-26 |
| 9372987 | Apparatus and method for masking a real user controlling synthetic identities | Paul Ashley, Steve Shillingford, Greg Clark, Tim Bartley, Christopher Y. Choi | 2016-06-21 |
| 9374689 | Apparatus and method for supporting telephonic synthetic identities | Paul Ashley, Steve Shillingford, Greg Clark, Simon Gilbert Canning, Tim Bartley | 2016-06-21 |
| 9372974 | CAPTCHA challenge incorporating obfuscated characters | Michael S. Brown, Carlos F. Franca da Fonseca | 2016-06-21 |
| 9338162 | CAPTCHA challenge incorporating obfuscated characters | Michael S. Brown, Carlos F. Franca da Fonseca | 2016-05-10 |
| 9319430 | Managing software deployment | Jerome R. Bell, Jr., Mari F. Heiser, Heather M. Hinton, Karthik Sivakumar | 2016-04-19 |
| 9311495 | Method and apparatus for associating data loss protection (DLP) policies with endpoints | Jayashree Ramanathan, Gavin G. Bray | 2016-04-12 |
| 9203922 | Method and apparatus for single sign-off using cookie tracking in a proxy | Simon Gilbert Canning, Scott Anthony Exton | 2015-12-01 |
| 9203700 | Monitoring client information in a shared environment | Toni U. Basoglu, Heather M. Hinton | 2015-12-01 |
| 9172694 | Propagating delegated authorized credentials through legacy systems | Simon Gilbert Canning, Stephen Viselli, Shane Bradley Weeden | 2015-10-27 |
| 9088543 | Coordinated network security management | William A. Lemke | 2015-07-21 |