| 10063583 |
System and method of mitigating cyber attack risks |
John P. Watters, Frederick Doyle, Henry Peltokangas |
2018-08-28 |
| 9749343 |
System and method of cyber threat structure mapping and application to cyber threat mitigation |
John P. Watters, Frederick Doyle, Henry Peltokangas |
2017-08-29 |
| 9749344 |
System and method of cyber threat intensity determination and application to cyber threat mitigation |
John P. Watters, Frederick Doyle, Henry Peltokangas |
2017-08-29 |
| 9015846 |
Information system security based on threat vectors |
John P. Watters |
2015-04-21 |
| 8533031 |
Method and system for retaining customer loyalty |
Christopher R. Lefebvre, Christopher James Konen, Sr., Elissa Budischak |
2013-09-10 |
| 8438644 |
Information system security based on threat vectors |
John P. Watters |
2013-05-07 |
| 7831467 |
Method and system for retaining customer loyalty |
Christopher R. Lefebvre, Christopher James Konen, Sr., Elissa Budischak |
2010-11-09 |