Issued Patents All Time
Showing 1–16 of 16 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10152611 | Identifying and preventing leaks of sensitive information | Joshua B. Hurwitz, Zhi Fu | 2018-12-11 |
| 9661384 | Trick play user activity reconstruction | Simone Franzini, Loren J. Rittle | 2017-05-23 |
| 9595039 | Stimulus/response-based binding of identifiers across information domains while maintaining confidentiality | Mark A. Gannon, Joshua B. Hurwitz, John Kane, David William Kravitz | 2017-03-14 |
| 9330277 | Privacy manager for restricting correlation of meta-content having protected information based on privacy rules | Joshua B. Hurwitz, Alfonso Martinez Smith, Paul C. Davis, Hiren M. Mandalia, Loren J. Rittle +1 more | 2016-05-03 |
| 9131015 | High availability event log collection in a networked system | Loren J. Rittle, Gregory L. Singer | 2015-09-08 |
| 8959574 | Content rights protection with arbitrary correlation of second content | Paul C. Davis, Joshua B. Hurwitz, Alfonso Martinez Smith, Loren J. Rittle, Krunal S. Shah | 2015-02-17 |
| 8401244 | Method and system for securely authenticating user identity information | Dean H. Vogler, Yi-Qun Li | 2013-03-19 |
| 8364120 | Identity verification using location over time information | Yi-Qun Li, Larry C. Puhl | 2013-01-29 |
| 8311214 | Method for elliptic curve public key cryptographic validation | Ronald Buskey, Barbara Frosik | 2012-11-13 |
| 8249242 | Secure call DTMF signaling | Soren K. Lundsgaard, Yi-Cheng Liu, Edgardo L. Promenzio, Jorge R. Lopez Danieluk | 2012-08-21 |
| 7983451 | Recognition method using hand biometrics with anti-counterfeiting | Boaz J. Super, James E. Crenshaw | 2011-07-19 |
| 7664259 | Encryption and verification using partial public key | Barbara Frosik, Ronald Buskey | 2010-02-16 |
| 7664962 | Multiple-input, automatic recognition method and apparatus | — | 2010-02-16 |
| 7565265 | Method and apparatus for combining outputs of multiple systems | — | 2009-07-21 |
| 7363492 | Method for zero-knowledge authentication of a prover by a verifier providing a user-selectable confidence level and associated application devices | Ezzat A. Dabbish, Larry C. Puhl | 2008-04-22 |
| 7099469 | Method of scrambling and descrambling data in a communication system | Thomas S. Messerges, Timothy J. Collins, David P. Gurney, Stephen L. Kuffner | 2006-08-29 |