| 11050780 |
Methods and systems for managing security in computing networks |
Steven Lingafelt, Gary Thornton, Amir Khan |
2021-06-29 |
| 10958672 |
Cognitive offense analysis using contextual data and knowledge graphs |
William A. Bird, Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Josyula R. Rao +1 more |
2021-03-23 |
| 10542015 |
Cognitive offense analysis using contextual data and knowledge graphs |
William A. Bird, Jiyong Jang, Dhilung Hang Kirat, Youngja Park, Josyula R. Rao +1 more |
2020-01-21 |
| 10395331 |
Selective retention of forensic information |
Amir Khan, Charles S. Lingafelt, Gary Thornton |
2019-08-27 |
| 9626495 |
Authenticating a device based on availability of other authentication methods |
Francis J. Hildenbrand, Jr., Garreth Jeremiah, Amir Khan, C. Steven Lingafelt |
2017-04-18 |
| 9286557 |
Optimizing quick response code capacity using gray luminance |
Grant D. Miller, Nader M. Nassar, Richard J. Newhook |
2016-03-15 |
| 9147379 |
Positional context determination with multi marker confidence ranking |
Richard J. Newhook |
2015-09-29 |
| 8872852 |
Positional context determination with multi marker confidence ranking |
Richard J. Newhook |
2014-10-28 |
| 8773467 |
Enhanced asset management and planning system |
Mark Chen-Quee, Neil A. Katz, Brian M. O'Connell |
2014-07-08 |
| 8531453 |
Augmenting virtual worlds simulation with enhanced assets |
Sean L. Dague, Michael C. Pitman |
2013-09-10 |
| 8521503 |
Providing compartmentalized security in product reviews |
Boas Betzler |
2013-08-27 |
| 8363051 |
Non-real-time enhanced image snapshot in a virtual world system |
— |
2013-01-29 |
| 6243097 |
Bounding volume for 3D graphic primitives |
Daniel Alan Brokenshire, Gordon Clyde Fossum, Barry L. Minor |
2001-06-05 |