Issued Patents All Time
Showing 25 most recent of 42 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12223079 | Provisioning federated computation on distributed private data | Prakash Narayana Moorthy, Patrick Foley, Clair Bowman, G. Anthony Reina, Jason Martin +1 more | 2025-02-11 |
| 12169584 | Methods and apparatus for distributed use of a machine learning model | Cory Cornelius | 2024-12-17 |
| 11657162 | Adversarial training of neural networks using information about activation path differentials | Michael E. Kounavis, Antonios Papadimitriou, Anindya Paul, Li Chen, Cory Cornelius +1 more | 2023-05-23 |
| 11556730 | Methods and apparatus for distributed use of a machine learning model | Cory Cornelius | 2023-01-17 |
| 11526745 | Methods and apparatus for federated training of a neural network using trusted edge devices | Cory Cornelius, Jason Martin, Yonghong Huang, Shih-Han Wang | 2022-12-13 |
| 11501001 | Techniques to detect perturbation attacks with an actor-critic framework | Shih-Han Wang, Yonghong Huang, Cory Cornelius | 2022-11-15 |
| 11283873 | IoT sensor fusion | Bradley W. Corrion, Jeffrey C. Sedayao | 2022-03-22 |
| 10749863 | System, apparatus and method for providing contextual data in a biometric authentication system | Cory Cornelius, Jason Martin, Ramune Nagisetty, Thao W. Xiong, Reese Bowes | 2020-08-18 |
| 10726134 | Techniques to detect perturbation attacks with an actor-critic framework | Shih-Han Wang, Yonghong Huang, Cory Cornelius | 2020-07-28 |
| 10511600 | Maintaining user authentications with common trusted devices | Yonghong Huang, Narjala Bhasker, Jason Martin, Cory Cornelius | 2019-12-17 |
| 10237682 | Multi-signal geometric location sensing for access control | Ned M. Smith, Nathan Heldt-Sheller | 2019-03-19 |
| 10218716 | Technologies for analyzing uniform resource locators | Yonghong Huang, Jason Martin, Cory Cornelius, Shih-Han Wang | 2019-02-26 |
| 10187389 | Technologies for supporting multiple digital rights management protocols on a client device | Ned M. Smith, Nathan Heldt-Sheller, Reshma Lal, Matthew E. Hoekstra | 2019-01-22 |
| 10114935 | Technologies for login pattern based multi-factor authentication | Barnan Das, Abhilasha Bhargav-Spantzel, Narayan Biswal, Ned M. Smith, Hormuzd M. Khosravi | 2018-10-30 |
| 10097350 | Privacy enhanced key management for a web service provider using a converged security engine | Ned M. Smith, Conor P. Cahill, Victoria C. Moore, Jason Martin | 2018-10-09 |
| 10083304 | Technologies for enhanced user authentication using advanced sensor monitoring | Jasmeet Chhabra, Ned M. Smith, Nathan Heldt-Sheller | 2018-09-25 |
| 10069868 | Systems and methods to facilitate multi-factor authentication policy enforcement using one or more policy handlers | Ned M. Smith, Abhilasha Bhargav-Spantzel | 2018-09-04 |
| 10055556 | Technologies for authenticating a user of a computing device based on authentication context state | Ned M. Smith, Nathan Heldt-Sheller, Kevin C. Wells, Hannah L. Scurfield, Nathaniel J. Goss +2 more | 2018-08-21 |
| 10009327 | Technologies for secure storage and use of biometric authentication information | Ned M. Smith, Conor P. Cahill, Jason Martin | 2018-06-26 |
| 9996690 | Binary translation of a trusted binary with input tagging | Ned M. Smith, Dmitri Rubakha, Samir Vasantbhai Shah, Jason Martin, Somnath Chakrabarti +1 more | 2018-06-12 |
| 9990479 | Technologies for authenticating a user of a computing device based on authentication context state | Ned M. Smith, Nathan Heldt-Sheller, Kevin C. Wells, Hannah L. Scurfield, Nathaniel J. Goss +2 more | 2018-06-05 |
| 9934372 | Technologies for performing orientation-independent bioimpedance-based user authentication | Cory Cornelius, Jason Martin | 2018-04-03 |
| 9922194 | Provisioning location-based security policy | Nathaniel J. Goss, Nathan Heldt-Sheller, Kevin C. Wells, Sindhu Pandian, Ned M. Smith +1 more | 2018-03-20 |
| 9871779 | Continuous authentication confidence module | Conor P. Cahill, Jason Martin, Ned M. Smith, Brandon Baker | 2018-01-16 |
| 9866555 | Maintaining user authentications with common trusted devices | Yonghong Huang, Narjala Bhasker, Jason Martin, Cory Cornelius | 2018-01-09 |