Issued Patents All Time
Showing 51–75 of 100 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9864858 | Technologies for managing security threats to a computing system utilizing user interactions | John C. Weast, Brian Johnson | 2018-01-09 |
| 9854390 | Context-driven local network services | Rita H. Wouhaybi, Stanley Mo, Steven J. Birkel, Sai P. Balasundaram | 2017-12-26 |
| 9836614 | Detecting, enforcing and controlling access privileges based on sandbox usage | Hong Li, Rita H. Wouhaybi, Alan D. Ross | 2017-12-05 |
| 9817403 | Enabling dynamic sensor discovery in autonomous devices | Ravishankar Iyer, James Jin-koo Kim | 2017-11-14 |
| 9806941 | Systems and methods for the management and distribution of settings | Rita H. Wouhaybi, Stanley Mo, Mubashir A. Mian | 2017-10-31 |
| 9794228 | Security challenge assisted password proxy | Hong Li, Rita H. Wouhaybi | 2017-10-17 |
| 9773422 | Community drone monitoring and information exchange | Rita H. Wouhaybi, Hong Li, Igor Tatourian | 2017-09-26 |
| 9740882 | Sensor privacy mode | Mark E. Scott-Nash, Scott H. Robinson, Howard C. Herbert, Geoffrey S. Strongin, Stephen J. Allen +1 more | 2017-08-22 |
| 9646216 | Multiple user biometric for authentication to secured resources | Jim S. Baca, Arjun M. Karpur, Dhaval R. Patel, Preetham M. Shambhat, Naissa Conde +2 more | 2017-05-09 |
| 9613196 | Protection system including machine learning snapshot evaluation | Igor Tatourian | 2017-04-04 |
| 9582572 | Personalized search library based on continual concept correlation | Stanley Mo, Rita H. Wouhaybi, Mubashir A. Mian, Jim S. Baca | 2017-02-28 |
| 9578037 | Allowing varied device access based on different levels of unlocking mechanisms | Keith L. Shippy, Mubashir A. Mian, Ned M. Smith, Omer Ben-Shalom, Tarun Viswanathan +4 more | 2017-02-21 |
| 9563768 | Methods and apparatus to manage password security | Hong Li, Lawrence Hurst | 2017-02-07 |
| 9547971 | Technologies for determining a threat assessment based on fear responses | John C. Weast, Jennifer A. Healey, Dennis Morgan, Brian Johnson | 2017-01-17 |
| 9544319 | Anomaly detection on web client | Hong Li, Jim S. Baca | 2017-01-10 |
| 9544318 | HTML security gateway | Igor Tatourian, Greeshma Yellareddy, Norman Yee, Sudip S. Chahal, Hong Li | 2017-01-10 |
| 9531863 | System and method for gesture-based management | Mubashir A. Mian, Rita H. Wouhaybi, Stanley Mo, Jim S. Baca, David Stanasolovich | 2016-12-27 |
| 9531888 | Intelligent ringer in smartphones | Robert L. Vaughn, Omer Sezer, Charles Baron | 2016-12-27 |
| 9524297 | Management of collaborative teams | Stanley Mo, Robert Staudinger, Rita H. Wouhaybi, Mubashir A. Mian | 2016-12-20 |
| 9497148 | Context-based automated/intelligent content management | Jim S. Baca, David Stanasolovich | 2016-11-15 |
| 9495967 | Collaborative audio conversation attestation | Dave Paul Singh, Dominic Fulginiti, Mahendra Tadi Tadikonda | 2016-11-15 |
| 9479498 | Providing limited access to a service device via an intermediary | Steven J. Birkel, Rita H. Wouhaybi, Stanley Mo | 2016-10-25 |
| 9449166 | Performing authentication based on user shape manipulation | Jerzy W. Rub | 2016-09-20 |
| 9432506 | Collaborative phone reputation system | Igor Tatourian, Rita H. Wouhaybi, Hong Li | 2016-08-30 |
| 9401902 | Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) | Selim Aissi | 2016-07-26 |