Issued Patents All Time
Showing 25 most recent of 118 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12216797 | Using fake personal data to create a policy to protect personal information on client computing devices | Timothy Micheal Wyatt, David Luke Richardson, Brian James Buck, Marc William Rogers | 2025-02-04 |
| 12081540 | Configuring access to a network service based on a security state of a mobile device | Aaron Cockerill, David Luke Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck | 2024-09-03 |
| 12061683 | Methods for managing user access to computing devices based on evaluation of authentication and maintenance of user control | Brian James Buck | 2024-08-13 |
| 11934509 | Methods for maintaining user access to computing devices based on determining user control | Brian James Buck | 2024-03-19 |
| 11924230 | Individual device response options from the monitoring of multiple devices | Timothy Micheal Wyatt, Brian James Buck, John G. Hering, Amit Gupta, Alex Cameron Abey | 2024-03-05 |
| 11902274 | System and computer readable media enabling methods for permitting a request after verifying knowledge of first and second secrets | Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more | 2024-02-13 |
| 11886232 | Providing a mobile communications device with access to a provider service conditioned upon a device security level determination | John G. Hering, James David Burgess, Brian James Buck, William Neil Robinson | 2024-01-30 |
| RE49634 | System and method for determining the risk of vulnerabilities on a mobile communications device | John G. Hering, James David Burgess | 2023-08-29 |
| 11720652 | Monitoring a computing device to automatically obtain data in response to detecting background activity | David Luke Richardson, Jonathan Grubb | 2023-08-08 |
| 11641583 | Methods and systems for addressing unreported theft or loss of mobile communications devices | John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal +3 more | 2023-05-02 |
| 11637823 | System and method for permitting a request after verifying knowledge of first and second secrets | Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more | 2023-04-25 |
| 11587060 | System and method for pushing messages to a mobile communications device | Ariel Salomon | 2023-02-21 |
| 11349874 | Methods and systems for providing a secure connection to a mobile communications device with the level of security based on a context of the communication | Timothy Strazzere, Brian James Buck | 2022-05-31 |
| 11336458 | Evaluating authenticity of applications based on assessing user device context for increased security | Timothy Micheal Wyatt, Daniel Lee Evans, Emil Barker Ong, Timothy Strazzere, Matthew John Joseph LaMantia +1 more | 2022-05-17 |
| 11122433 | Methods and systems for enhancing electronic device security by intercepting and analyzing a communication | David Luke Richardson, Ayan Mandal, Cherry Mangat, Vance Grkov | 2021-09-14 |
| RE48669 | System and method for identifying and [assessing] remediating vulnerabilities on a mobile communications device | John G. Hering, James David Burgess | 2021-08-03 |
| 11080407 | Methods and systems for analyzing data after initial analyses by known good and known bad security components | — | 2021-08-03 |
| 11050736 | System and method for processing a command based on verification information and a challenge token | Timothy Micheal Wyatt, Brian James Buck, Matthew Robert Baker, Danielle Hewson Kingsley, Elaine P. Teoh +1 more | 2021-06-29 |
| 11038876 | Managing access to services based on fingerprint matching | Aaron Cockerill, David Luke Richardson, Daniel Thanos, William Neil Robinson, Brian James Buck | 2021-06-15 |
| 11017069 | Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device | William Neil Robinson, Brian James Buck | 2021-05-25 |
| 10990696 | Methods and systems for detecting attempts to access personal information on mobile communications devices | Timothy Micheal Wyatt, David Luke Richardson, Brian James Buck, Marc William Rogers | 2021-04-27 |
| 10742676 | Distributed monitoring and evaluation of multiple devices | Timothy Micheal Wyatt, Brian James Buck, John G. Hering, Amit Gupta, Alex Cameron Abey | 2020-08-11 |
| 10701183 | Configuring a computing device to automatically obtain data in response to a predetermined event | David Luke Richardson, Jonathan Grubb | 2020-06-30 |
| 10699273 | System and method for authorizing payment transaction based on device locations | Brian James Buck | 2020-06-30 |
| 10623960 | Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices | John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson, Ayan Mandal +3 more | 2020-04-14 |