| 12411858 |
Management of connector services and connected artificial intelligence agents for message senders and recipients |
John Marshall, Andrew Morgan, Spencer Reagan, Erich Stuntebeck |
2025-09-09 |
| 12386994 |
Management of connector services and connected artificial intelligence agents for message senders |
John Marshall, Andrew Morgan, Spencer Reagan, Erich Stuntebeck |
2025-08-12 |
| 12387106 |
Adaptation to detected fluctuations in outputs across artificial intelligence models |
Erich Stuntebeck |
2025-08-12 |
| 12236202 |
Adaptation to detected fluctuations in outputs from artificial intelligence models over time |
Erich Stuntebeck |
2025-02-25 |
| 12164667 |
Application privacy scanning systems and related methods |
Kevin Jones, Justin Devenish, Saravanan Pitchaimani, Jonathan Blake Brannon |
2024-12-10 |
| 12099689 |
Remotely restricting client devices |
Kevin McKeithan |
2024-09-24 |
| 11962510 |
Resource watermarking and management |
John Marshall |
2024-04-16 |
| 11334681 |
Application privacy scanning systems and related meihods |
Kevin Jones, Justin Devenish, Saravanan Pitchaimani, Jonathan Blake Brannon |
2022-05-17 |
| 11113416 |
Application privacy scanning systems and related methods |
Kevin Jones, Justin Devenish, Saravanan Pitchaimani, Jonathan Blake Brannon |
2021-09-07 |
| 11079893 |
Remotely restricting client devices |
Kevin McKeithan |
2021-08-03 |
| 11070543 |
Multi-persona management and devices |
Jonathan Blake Brannon, Erich Stuntebeck |
2021-07-20 |
| 10909265 |
Application privacy scanning systems and related methods |
Kevin Jones, Justin Devenish, Saravanan Pitchaimani, Jonathan Blake Brannon |
2021-02-02 |
| 10692386 |
Holding pattern determination |
Leslie Glatt |
2020-06-23 |
| 10129242 |
Multi-persona devices and management |
Jonathan Blake Brannon, Erich Stuntebeck |
2018-11-13 |
| 9900261 |
Shared resource watermarking and management |
John Marshall |
2018-02-20 |
| 9584437 |
Resource watermarking and management |
John Marshall |
2017-02-28 |
| 9401915 |
Secondary device as key for authorizing access to resources |
Erich Stuntebeck |
2016-07-26 |