| 12375459 |
Systems, methods, and applications for transcoding data into media files |
Edwin Zargarian, Eric Bravick, Sean Montgomery, Hovannes Demirtshyan |
2025-07-29 |
| 12113792 |
Authenticator centralization and protection including selection of authenticator type based on authentication policy |
Alan Dundas, Gregory Slowiak |
2024-10-08 |
| 12022282 |
Anonymous authentication and remote wireless token access |
— |
2024-06-25 |
| 11991175 |
User authentication based on device identifier further identifying software agent |
Alan Dundas, Gregory Slowiak |
2024-05-21 |
| 11966484 |
Computing device compatible encryption and decryption |
Edwin Zargarian |
2024-04-23 |
| 11615198 |
Computing device compatible encryption and decryption |
Edwin Zargarian |
2023-03-28 |
| 11610010 |
Computing device compatible encryption and decryption |
Edwin Zargarian |
2023-03-21 |
| 11223948 |
Anonymous authentication and remote wireless token access |
— |
2022-01-11 |
| 11218480 |
Authenticator centralization and protection based on authenticator type and authentication policy |
Alan Dundas, Gregory Slowiak |
2022-01-04 |
| 10616222 |
Authenticator centralization and protection based on authenticator type and authentication policy |
Alan Dundas, Gregory Slowiak |
2020-04-07 |
| 10397780 |
Anonymous authentication and remote wireless token access |
— |
2019-08-27 |
| 10250602 |
Authenticator centralization and protection |
Alan Dundas, Gregory Slowiak |
2019-04-02 |
| 10084782 |
Authenticator centralization and protection |
Alan Dundas, Gregory Slowiak |
2018-09-25 |
| 10033701 |
Enhanced 2CHK authentication security with information conversion based on user-selected persona |
— |
2018-07-24 |
| 10025920 |
Enterprise triggered 2CHK association |
Peter George Tapling, Ravi Ganesan |
2018-07-17 |
| 9716691 |
Enhanced 2CHK authentication security with query transactions |
Peter George Tapling, Ravi Ganesan, Sally Sheward |
2017-07-25 |
| 9614845 |
Anonymous authentication and remote wireless token access |
— |
2017-04-04 |
| 8769784 |
Secure and efficient authentication using plug-in hardware compatible with desktops, laptops and/or smart mobile communication devices such as iPhones |
Ravi Ganesan, Peter George Tapling |
2014-07-08 |
| 7461258 |
Use of public switched telephone network for capturing electronic signatures in on-line transactions |
— |
2008-12-02 |
| 7383572 |
Use of public switched telephone network for authentication and authorization in on-line transactions |
— |
2008-06-03 |
| 6199052 |
Secure electronic transactions using a trusted intermediary with archive and verification request services |
Todd Jay Mitty, Douglas Scott Shoupp, Michael Robert Cantone |
2001-03-06 |