| 9367706 |
Computation to gain access to service |
Geoffrey J. Hulten, John L. Scarrow |
2016-06-14 |
| 8627475 |
Early detection of potential malware |
John J. Lambert, Darren Ernest Canavor, Ryan Colvin |
2014-01-07 |
| 8429743 |
Online risk mitigation |
Geoffrey J. Hulten, Elliott Jeb Haber, John L. Scarrow |
2013-04-23 |
| 8406399 |
Distributed conference bridge and voice authentication for access to networked computer resources |
— |
2013-03-26 |
| 7493130 |
Synchronizing over a number of synchronization mechanisms using flexible rules |
— |
2009-02-17 |
| 7412257 |
Extending mobile phone networks |
— |
2008-08-12 |
| 7308255 |
Extending mobile phone networks |
— |
2007-12-11 |
| 7287058 |
Methods, systems and computer program products for performing document-inclusion operations over a network |
Rex A. Foxford |
2007-10-23 |
| 7076797 |
Granular authorization for network user sessions |
— |
2006-07-11 |
| 7054819 |
Voice print access to computer resources |
— |
2006-05-30 |
| 7024214 |
Synchronizing over a number of synchronization mechanisms using flexible rules |
— |
2006-04-04 |
| 6895558 |
Multi-access mode electronic personal assistant |
— |
2005-05-17 |
| 6782413 |
Distributed conference bridge |
— |
2004-08-24 |
| 6650735 |
Integrated voice access to a variety of personal information services |
David Burton, Gayle Ayers Elam, Simonie Justine Hodges Becker |
2003-11-18 |