Issued Patents All Time
Showing 25 most recent of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11340933 | Method and apparatus for secrets injection into containers for 5G network elements | Michael R. Brown, Akshay Rajesh Baheti, Michael Cameron | 2022-05-24 |
| 10761871 | Method and apparratus for secrets injection into containers | Michael R. Brown, Akshay Rajesh Baheti | 2020-09-01 |
| 10587639 | Assessing trust of components in systems | Debra J. Danielson, Steven L. Greenspan, Prashant Parikh | 2020-03-10 |
| 10572875 | Online account authentication service | Benedicto H. Dominguez, Thomas Manessis | 2020-02-25 |
| 10311171 | Multi-component and mixed-reality simulation environments | Steven L. Greenspan, Debra J. Danielson, John P. Kane, Prashant Parikh | 2019-06-04 |
| 10101244 | Self-learning simulation environments | Serge Mankovskii, Steven L. Greenspan, Debra J. Danielson, Prashant Parikh, Maria C. Velez-Rojas | 2018-10-16 |
| 9881304 | Risk-based control of application interface transactions | Kenneth William Scott Morrison, Thomas E. Hamilton, III | 2018-01-30 |
| 9864993 | Account authentication service with chip card | Kevin Weller, Stephen W. Ryan, Peter R. Hill, Thomas Manessis, Tony D. Lewis +5 more | 2018-01-09 |
| 9787704 | Anomaly detection based on cluster transitions | Debra J. Danielson, Steven L. Greenspan, Prashant Parikh | 2017-10-10 |
| 9769134 | Mobile account authentication service | Benedicto H. Dominguez, Thomas Manessis, Janet T. Roth, Pascal Caillon, Jason Spielman +1 more | 2017-09-19 |
| 9661013 | Manipulating API requests to indicate source computer application trustworthiness | Thomas E. Hamilton, III, Kenneth William Scott Morrison | 2017-05-23 |
| 9639443 | Multi-component and mixed-reality simulation environments | Steven L. Greenspan, Debra J. Danielson, John P. Kane, Prashant Parikh | 2017-05-02 |
| 9628459 | Secure data transmission using multi-channel communication | Steven L. Greenspan, Ralf Saborowski, Charley Chell | 2017-04-18 |
| 9590969 | Identity verification services using private data | — | 2017-03-07 |
| 9462011 | Determining trustworthiness of API requests based on source computer applications' responses to attack messages | Thomas E. Hamilton, III, Kenneth William Scott Morrison | 2016-10-04 |
| 9386078 | Controlling application programming interface transactions based on content of earlier transactions | Thomas E. Hamilton, III, Kenneth William Scott Morrison | 2016-07-05 |
| 9219609 | Method and system for multiple passcode generation | Geoffrey R. Hird, Rammohan Varadarajan | 2015-12-22 |
| 8990553 | Perimeter encryption method and system | Robert Allen | 2015-03-24 |
| 8924529 | Client device identification through cache manipulation | — | 2014-12-30 |
| 8620824 | Pin protection for portable payment devices | — | 2013-12-31 |
| 8613065 | Method and system for multiple passcode generation | Geoffrey R. Hird, Rammohan Varadarajan | 2013-12-17 |
| 8607041 | Perimeter encryption method and system | Robert Allen | 2013-12-10 |
| 8271395 | Online account authentication service | Benedicto H. Dominguez, Thomas Manessis | 2012-09-18 |
| 7991701 | Online payer authentication service | Kevin Weller, Stephen W. Ryan, Peter R. Hill, Thomas Manessis, Tony D. Lewis +2 more | 2011-08-02 |
| 7827115 | Online payer authentication service | Kevin Weller, Stephen W. Ryan, Peter R. Hill, Thomas Manessis, Tony D. Lewis +2 more | 2010-11-02 |