| 11956263 |
Detecting security risks on a network |
Matthew John Block, Adam Sheesley, Jon M. Welborn, James Robert Borecky, Jennifer A. Holton |
2024-04-09 |
| 11310263 |
Rogue foothold network defense |
Matthew John Block, Jon M. Welborn, Adam Sheesley, David Huehulani Keene, Jennifer A. Holton |
2022-04-19 |
| 11032296 |
Rogue endpoint detection |
Matthew John Block, Adam Sheesley, Jon M. Welborn, James Robert Borecky, Jennifer A. Holton |
2021-06-08 |
| 10966088 |
Wireless multi-factor authentication with captive portals |
Lawrence T. Belton, Jr., Brian Beaty, Timothy H. Morris, Lynn A. Smith |
2021-03-30 |
| 10666679 |
Rogue foothold network defense |
Matthew John Block, Jon M. Welborn, Adam Sheesley, David Huehulani Keene, Jennifer A. Holton |
2020-05-26 |
| 10321316 |
Wireless multi-factor authentication with captive portals |
Lawrence T. Belton, Jr., Brian Beaty, Timothy H. Morris, Lynn A. Smith |
2019-06-11 |
| 10230743 |
Rogue endpoint detection |
Matthew John Block, Adam Sheesley, Jon M. Welborn, James Robert Borecky, Jennifer A. Holton |
2019-03-12 |
| 10193888 |
Dynamic authentication in alternate operating environment |
Lawrence T. Belton, Jr., Ryan B. Benskin, Jon Gabel, Michael M. Grove, Timothy H. Morris +2 more |
2019-01-29 |
| 9967742 |
Wireless multi-factor authentication with captive portals |
Lawrence T. Belton, Jr., Brian Beaty, Timothy H. Morris, Lynn A. Smith |
2018-05-08 |
| 9742770 |
Dynamic authentication in alternate operating environment |
Lawrence T. Belton, Jr., Ryan B. Benskin, Jon Gabel, Michael M. Grove, Timothy H. Morris +2 more |
2017-08-22 |
| 9088891 |
Wireless multi-factor authentication with captive portals |
Lawrence T. Belton, Jr., Brian Beaty, Timothy H. Morris, Lynn A. Smith |
2015-07-21 |