| 11328086 |
Privacy disclosure |
Steven J. Ball, Jeffrey Thomas Sakowicz |
2022-05-10 |
| 11228594 |
Automatic reduction of permissions for client applications |
Jeffrey Thomas Sakowicz |
2022-01-18 |
| 11194601 |
Dynamic integration checklist for development platform |
Lesia Nalepa, Arielle Dorothy Crowe, Jeffrey Thomas Sakowicz |
2021-12-07 |
| 11055385 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Octavian T. Ureche +1 more |
2021-07-06 |
| 10924578 |
Late binding of social identity in invitation management systems |
Ariel Gordon, Ankur Patel |
2021-02-16 |
| 10898811 |
Methods for provisioning and management of gamer accounts for E-tournaments |
Ariel Gordon, Sarat Chandra Subramaniam |
2021-01-26 |
| 10749875 |
Security configuration lifecycle account protection for minors |
Ariel Gordon |
2020-08-18 |
| 10693882 |
Resource-based selection of identity provider |
Ariel Gordon, Sarat Chandra Subramaniam, Yordan Rouskov, Paul Garner |
2020-06-23 |
| 10397199 |
Integrated consent system |
Ariel Gordon, Stuart L. S. Kwan |
2019-08-27 |
| 10389706 |
Authentication based on telephone number recycling |
Li Qing Xia |
2019-08-20 |
| 10320844 |
Restricting access to public cloud SaaS applications to a single organization |
Ross Peter Adams, Ariel Gordon, Konstantin Ryvkin |
2019-06-11 |
| 10284492 |
Control of casting to a media renderer |
Ariel Gordon, Steven J. Ball |
2019-05-07 |
| 10268809 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Octavian T. Ureche +1 more |
2019-04-23 |
| 9967244 |
Multi-factor user authentication framework using asymmetric key |
Anooshiravan Saboori, Nelly Porter, Vijay G. Bharadwaj, Alexander T. Weinert, Octavian T. Ureche +1 more |
2018-05-08 |
| 9942223 |
Automated device discovery of pairing-eligible devices for authentication |
Venkatesh Gopalakrishnan, Jay Fluegel |
2018-04-10 |
| 9787654 |
Resolving authenticating issues with a second device |
Adrian Frei, James Shang Kai Chou |
2017-10-10 |
| 9706401 |
User-authentication-based approval of a first device via communication with a second device |
Tarek B. Kamel, Sparky Toews, Dejan Subotic, Peter E. Zenzerovich, James Shang Kai Chou |
2017-07-11 |
| 9690924 |
Transparent two-factor authentication via mobile communication device |
Marc McClure, Ran Michaely, Geir Olsen |
2017-06-27 |
| 9648002 |
Location-based user disambiguation |
Narender Chauhan, Tarek B. Kamel, Daniel Castro |
2017-05-09 |