| 12432197 |
Filtering passwords based on a plurality of criteria |
Alen Puzic, Edward Ross |
2025-09-30 |
| 12166794 |
Detecting use of compromised security credentials in private enterprise networks |
Alen Puzic, Edward Ross |
2024-12-10 |
| 12093375 |
Generating and monitoring fictitious data entries to detect breaches |
Alen Puzic, Edward Ross |
2024-09-17 |
| 11888843 |
Filtering passwords based on a plurality of criteria |
Alen Puzic, Edward Ross |
2024-01-30 |
| 11750645 |
Detecting use of compromised security credentials in private enterprise networks |
Alen Puzic, Edward Ross |
2023-09-05 |
| 11558409 |
Detecting use of passwords that appear in a repository of breached credentials |
Alen Puzic, Edward Ross |
2023-01-17 |
| 11461458 |
Measuring data-breach propensity |
Alen Puzic, Edward Ross |
2022-10-04 |
| 11438360 |
Determining the intersection of a set of compromised credentials with a set of active credentials with data structures and architectures that expedite comparisons |
Alen Puzic, Edward Ross |
2022-09-06 |
| 11399021 |
Filtering passwords based on a plurality of criteria |
Alen Puzic, Edward Ross |
2022-07-26 |
| 11283832 |
Detecting use of compromised security credentials in private enterprise networks |
— |
2022-03-22 |
| 8812832 |
Method and system of using a non-native operating system for scanning and modifying system configuration data of a native operating system |
Pedram Amini, Rohit Dhamankar |
2014-08-19 |