| 10834133 |
Mobile device security policy based on authorized scopes |
David P. Moore, Shane Bradley Weeden, Stephen Viselli |
2020-11-10 |
| 9742757 |
Identifying and destroying potentially misappropriated access tokens |
Pranam C. Sreedhar, Patrick R. Wardrop, Shane Bradley Weeden |
2017-08-22 |
| 9722991 |
Confidence-based authentication discovery for an outbound proxy |
Simon Gee, Shane Bradley Weeden |
2017-08-01 |
| 9374689 |
Apparatus and method for supporting telephonic synthetic identities |
Paul Ashley, Steve Shillingford, Greg Clark, Tim Bartley, Neil I. Readshaw |
2016-06-21 |
| 9264436 |
Policy-based automated consent |
Shane Bradley Weeden, Codur S. Pranam |
2016-02-16 |
| 9246907 |
Confidence-based authentication discovery for an outbound proxy |
Simon Gee, Shane Bradley Weeden |
2016-01-26 |
| 9203922 |
Method and apparatus for single sign-off using cookie tracking in a proxy |
Scott Anthony Exton, Neil I. Readshaw |
2015-12-01 |
| 9172694 |
Propagating delegated authorized credentials through legacy systems |
Neil I. Readshaw, Stephen Viselli, Shane Bradley Weeden |
2015-10-27 |
| 8832857 |
Unsecured asset detection via correlated authentication anomalies |
John William Court, Simon Gee, Shane Bradley Weeden |
2014-09-09 |
| 8769018 |
Formation of special interest groups |
Craig Robert William Forster, Neil I. Readshaw |
2014-07-01 |
| 8738692 |
Selectively processing cookies in a proxy |
Scott Anthony Exton, Neil I. Readshaw |
2014-05-27 |
| 8701163 |
Method and system for automatic generation of cache directives for security policy |
Christopher J. Hockings, Scott Anthony Exton, Neil I. Readshaw |
2014-04-15 |
| 8650249 |
Selectively processing cookies in a proxy |
Scott Anthony Exton, Neil I. Readshaw |
2014-02-11 |
| 8346866 |
Formation of special interest groups |
Craig Robert William Forster, Neil I. Readshaw |
2013-01-01 |
| 8276184 |
User-centric resource architecture |
Peter J. K. Tuton |
2012-09-25 |