Issued Patents All Time
Showing 76–100 of 100 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9396384 | User authentication via image manipulation | Dave Paul Singh, Michael S. Richmond, James Jin-koo Kim | 2016-07-19 |
| 9378364 | Technologies for managing security threats to a computing system utilizing user interactions | John C. Weast, Brian Johnson | 2016-06-28 |
| 9380026 | Authenticating to a network via a device-specific one time password | Jim S. Baca, Hong Li, David Stanasolovich, Mark H. Price, Steven J. Birkel +2 more | 2016-06-28 |
| 9351121 | Peer-based collaborative discovery and signaling of another device in limited-signal areas | Stanley Mo, Mubashir A. Mian, Rita H. Wouhaybi | 2016-05-24 |
| 9342974 | Autonomous aggregated search platform and methods using the same | Stanley Mo, Mubashir A. Mian, Rita H. Wouhaybi | 2016-05-17 |
| 9344889 | Methods, systems and apparatus to pair medical devices to an in-body network | Steven A. Mancini, Hong Li, Igor Tatourian, Robert L. Vaughn, Jesse Walker +3 more | 2016-05-17 |
| 9305093 | Systems, methods, and computer program products for gesture-based search and discovery through a touchscreen interface | Stanley Mo, Victor Szilagyi, Rita H. Wouhaybi, Steven J. Birkel | 2016-04-05 |
| 9298911 | Method, apparatus, system, and computer readable medium for providing apparatus security | Gal Chanoch, Eran Birk, Baiju V. Patel, Steven Grobman, Rajeev Gopalakrisha | 2016-03-29 |
| 9258304 | Methods and apparatus for using keys conveyed via physical contact | Hong Li, Rita H. Wouhaybi, Igor Tatourian | 2016-02-09 |
| 9245144 | Secure data container for web applications | Hong Li, Rita H. Wouhaybi, Alan D. Ross | 2016-01-26 |
| 9223952 | Allowing varied device access based on different levels of unlocking mechanisms | Keith L. Shippy, Mubashir A. Mian, Ned M. Smith, Omer Ben-Shalom, Tarun Viswanathan +4 more | 2015-12-29 |
| 9223950 | Security challenge assisted password proxy | Hong Li, Rita H. Wouhaybi | 2015-12-29 |
| 9213827 | Security data aggregation and business intelligence for web applications | Hong Li, Alan D. Ross, Rita H. Wouhaybi | 2015-12-15 |
| 9094700 | Dynamically implementing an image protection policy | Rita H. Wouhaybi, Mubashir A. Mian, Stanley Mo, Jim S. Baca | 2015-07-28 |
| 9058324 | Predictive precaching of data based on context | Rita H. Wouhaybi, Stanley Mo, Mubashir A. Mian | 2015-06-16 |
| 8995976 | Embedding service provider information in a wireless call | Mubashir A. Mian, Rita H. Wouhaybi, Stanley Mo | 2015-03-31 |
| 8955045 | Facilitating varied access based on authentication scoring | Ned M. Smith, Keith L. Shippy, Manish Dave, Omer Ben-Shalom, Mubashir A. Mian | 2015-02-10 |
| 8933778 | Mobile device and key fob pairing for multi-factor security | Steven J. Birkel, Rita H. Wouhaybi, Stanley Mo, Joni D. Stutman | 2015-01-13 |
| 8862104 | System and method for gesture-based management | Mubashir A. Mian, Rita H. Wouhaybi, Stanley Mo, Jim S. Baca, David Stanasolovich | 2014-10-14 |
| 8856864 | Detecting, enforcing and controlling access privileges based on sandbox usage | Hong Li, Rita H. Wouhaybi, Alan D. Ross | 2014-10-07 |
| 8806620 | Method and device for managing security events | Stacy P. Purcell, Alan D. Ross, Jim S. Baca, Selim Aissi, Dennis Morgan | 2014-08-12 |
| 8688986 | Method for exchanging strong encryption keys between devices using alternate input methods in wireless personal area networks (WPAN) | Selim Aissi | 2014-04-01 |
| 8458802 | Method and device for managing digital usage rights of documents | Jim S. Baca, Selim Aissi, Alan D. Ross, Dennis Morgan | 2013-06-04 |
| 8359629 | Method and device for controlling use of context information of a user | Selim Aissi, Dennis Morgan, Alan D. Ross, Jim S. Baca | 2013-01-22 |
| 8024797 | Method, apparatus and system for performing access control and intrusion detection on encrypted data | Ravi L. Sahita | 2011-09-20 |