| 12375289 |
Using multi-factor and/or inherence-based authentication to selectively enable performance of an operation prior to or during release of code |
Karen Lowe Dahmen, Eugene W. Hodges, Kadri Tahsildoost, Filip Sebesta |
2025-07-29 |
| 10715338 |
Management of public key certificates within a distributed architecture |
Shawn Valentine Hernan, Shrikant Adhikarla |
2020-07-14 |
| 10204241 |
Theft and tamper resistant data protection |
Scott A. Field, Aravind N. Thoram, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem |
2019-02-12 |
| 10200194 |
Theft and tamper resistant data protection |
Scott A. Field, Aravind N. Thoram, Dayi Zhou, Alex M. Semenko, Avraham Michael Ben-Menahem |
2019-02-05 |
| 8245032 |
Method to authenticate packet payloads |
Christopher J. Donley, Robert R. Gilman, Kurt Haserodt |
2012-08-14 |
| 7653188 |
Telephony extension attack detection, recording, and intelligent prevention |
Michael Kloberdans |
2010-01-26 |