Issued Patents All Time
Showing 1–25 of 46 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12120519 | Determining a security state based on communication with an authenticity server | David Luke Richardson, Ahmed Mohamed Farrakha, Brian James Buck | 2024-10-15 |
| 12081540 | Configuring access to a network service based on a security state of a mobile device | Aaron Cockerill, David Luke Richardson, Daniel Thanos, Brian James Buck, Kevin Patrick Mahaffey | 2024-09-03 |
| 12026261 | Quarantine of software by an evaluation server based on authenticity analysis of user device data | Timothy Micheal Wyatt, Brian James Buck, Alex Richard Gladd | 2024-07-02 |
| 11886232 | Providing a mobile communications device with access to a provider service conditioned upon a device security level determination | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Brian James Buck | 2024-01-30 |
| 11847499 | Coordinating multiple components | Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards | 2023-12-19 |
| 11641583 | Methods and systems for addressing unreported theft or loss of mobile communications devices | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson +3 more | 2023-05-02 |
| 11301569 | Quarantine of software based on analysis of updated device data | Timothy Micheal Wyatt, Brian James Buck, Alex Richard Gladd | 2022-04-12 |
| 11259183 | Determining a security state designation for a computing device based on a source of software | David Luke Richardson, Ahmed Mohamed Farrakha, Brian James Buck | 2022-02-22 |
| 11237875 | Coordinating multiple components | Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards | 2022-02-01 |
| 11038876 | Managing access to services based on fingerprint matching | Aaron Cockerill, David Luke Richardson, Daniel Thanos, Brian James Buck, Kevin Patrick Mahaffey | 2021-06-15 |
| 11017069 | Method for changing mobile communications device functionality based upon receipt of a second code and the location of a key device | Kevin Patrick Mahaffey, Brian James Buck | 2021-05-25 |
| 10749877 | Performing a security action in response to a determination that a computing device is lost or stolen | Brian James Buck | 2020-08-18 |
| 10623960 | Methods and systems for enhancing electronic device security by causing the device to go into a mode for lost or stolen devices | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson +3 more | 2020-04-14 |
| 10540494 | Determining source of side-loaded software using an administrator server | David Luke Richardson, Ahmed Mohamed Farrakha, Brian James Buck | 2020-01-21 |
| 10509910 | Methods and systems for granting access to services based on a security state that varies with the severity of security events | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Brian James Buck | 2019-12-17 |
| 10509911 | Methods and systems for conditionally granting access to services based on the security state of the device requesting access | Kevin Patrick Mahaffey, James David Burgess, David Golombek, Timothy Michael Wyatt, Anthony McKay Lineberry +7 more | 2019-12-17 |
| 10491603 | Software component substitution based on rule compliance for computing device context | Brian James Buck | 2019-11-26 |
| 10489862 | Systems and methods for computing device protection | John G. Hering, Kevin Patrick Mahaffey, Brian James Buck | 2019-11-26 |
| 10452447 | Coordinating multiple security components | Matthew John Joseph LaMantia, Brian James Buck, Stephen J. Edwards | 2019-10-22 |
| 10419936 | Methods and systems for causing mobile communications devices to emit sounds with encoded information | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson +3 more | 2019-09-17 |
| 10417432 | Methods and systems for blocking potentially harmful communications to improve the functioning of an electronic device | Kevin Patrick Mahaffey, Brian James Buck, John G. Hering, James David Burgess, Timothy Micheal Wyatt +10 more | 2019-09-17 |
| 10360364 | Method for changing mobile communication device functionality based upon receipt of a second code | Kevin Patrick Mahaffey, Brian James Buck | 2019-07-23 |
| 10218697 | Use of device risk evaluation to manage access to services | Aaron Cockerill, David Luke Richardson, Daniel Thanos, Brian James Buck, Kevin Patrick Mahaffey | 2019-02-26 |
| 9955352 | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such | Kevin Patrick Mahaffey, John G. Hering, James David Burgess, Vance Grkov, David Luke Richardson +3 more | 2018-04-24 |
| 9940454 | Determining source of side-loaded software using signature of authorship | David Luke Richardson, Ahmed Mohamed Farrakha, Brian James Buck | 2018-04-10 |