Issued Patents All Time
Showing 25 most recent of 40 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12380208 | Malware detection and mitigation system and method therefor | Ahmed Abusnaina, Yizhen Wang, Ke Wang, Mihai Christodorescu | 2025-08-05 |
| 12333887 | System, method, and computer program product for authenticating identification documents | Kim R. Wagner | 2025-06-17 |
| 12335392 | Secure data exchange matching across identity providers | Gaven James Watson, Srinivasan Raghuraman, Kim R. Wagner, Jason Lightman | 2025-06-17 |
| 12323401 | Privacy-preserving data deduplication | Saikrishna Badrinarayanan, Sikhar Patranabis, Srinivasan Raghuraman, Kim R. Wagner, Gaven James Watson | 2025-06-03 |
| 12293365 | Authentication based on biometric identification parameter of an individual for payment transaction | Elianna Starr, Dennis Franklin Olson, Amy Dawson, Andres Jimenez, Jiayun He +10 more | 2025-05-06 |
| 12289409 | Privacy preserving identity data exchange based on hybrid encryption | Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim R. Wagner, Gaven James Watson | 2025-04-29 |
| 12282539 | Delegated biometric authentication | Maliheh Shirvanian | 2025-04-22 |
| 12124947 | System, method, and computer program product for determining adversarial examples | Yuhang Wu, Yanhong Wu, Hao Yang | 2024-10-22 |
| 12069047 | Using an enrolled biometric dataset to detect adversarial examples in biometrics-based authentication system | Yuhang Wu, Hao Yang | 2024-08-20 |
| 12028455 | Privacy-preserving identity attribute verification using policy tokens | Kim R. Wagner, Gaven James Watson, Mihai Christodorescu, Shashank Agrawal | 2024-07-02 |
| 12028370 | Replay spoofing detection for automatic speaker verification system | Mengjun Leng, Kim R. Wagner | 2024-07-02 |
| 12015720 | Integrating identity tokens and privacy-preserving identity attribute attestations into interactions | Kim R. Wagner, Brian Sullivan, Dinah Sloan, Hao Ngo, Gaven James Watson +2 more | 2024-06-18 |
| 11978299 | System, method, and computer program product for authenticating identification documents | Kim R. Wagner | 2024-05-07 |
| 11956359 | Privacy preserving identity data exchange based on hybrid encryption | Saikrishna Badrinarayanan, Srinivasan Raghuraman, Kim R. Wagner, Gaven James Watson | 2024-04-09 |
| 11943363 | Server-assisted privacy protecting biometric comparison | John F. Sheets, Kim R. Wagner, Lacey Best-Rowden, Chunxi Jiang | 2024-03-26 |
| 11811761 | Dynamic learning system for intelligent authentication | Kim R. Wagner, John F. Sheets, Lacey Best-Rowden | 2023-11-07 |
| 11792012 | Distributed biometric comparison framework | Lacey Best-Rowden, Kim R. Wagner | 2023-10-17 |
| 11783030 | Defense mechanism against component-wise hill climbing using synthetic face generators | Kim R. Wagner, Saman Sarraf | 2023-10-10 |
| 11783336 | Camera device enabled identification and disambiguation system and method | Lacey Best-Rowden, Kim R. Wagner, Saman Sarraf | 2023-10-10 |
| 11777736 | Use of biometrics and privacy preserving methods to authenticate account holders online | Jason P. Blackhurst, Kim R. Wagner, John F. Sheets, Chunxi Jiang | 2023-10-03 |
| 11716328 | Method of constructing a table for determining match values | Kim R. Wagner, Lacey Best-Rowden | 2023-08-01 |
| 11676610 | Acoustic signatures for voice-enabled computer systems | Yangyong Zhang, Mastooreh Salajegheh, Maliheh Shirvanian | 2023-06-13 |
| 11620657 | System, method, and computer program product for authenticating identification documents | Kim R. Wagner | 2023-04-04 |
| 11620854 | Evaluating the security of a facial recognition system using light projections | Luan Nguyen, Yuhang Wu, Hao Yang | 2023-04-04 |
| 11593809 | Authentication based on biometric identification parameter of an individual for payment transaction | Elianna Starr, Dennis Franklin Olson, Amy Dawson, Andres Jimenez, Jiayun He +10 more | 2023-02-28 |