| 12341781 |
Internet protocol (IP) curator |
Upul D. Hanwella, Shawna K. Murphy Butterworth, Bryan D. Hall, James Condron Hudson, Christian Tobias Sorensen +4 more |
2025-06-24 |
| 12218943 |
Login and authentication methods and systems |
Mark David Castonguay, Upul D. Hanwella, Bryan D. Hall, David Lerner |
2025-02-04 |
| 12126646 |
Systems and methods for using machine learning for geographic analysis of access attempts |
Bryan D. Hall, Richard Joseph Schroeder |
2024-10-22 |
| 12058137 |
Internet protocol (IP) curator |
Upul D. Hanwella, Shawna K. Murphy Butterworth, Bryan D. Hall, James Condron Hudson, Christian Tobias Sorensen +4 more |
2024-08-06 |
| 12021834 |
Cumulative sum model for IP deny lists |
Bryan D. Hall, Richard Joseph Schroeder |
2024-06-25 |
| 11914719 |
Systems and methods for cyberthreat-risk education and awareness |
Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser +3 more |
2024-02-27 |
| 11855989 |
System and method for graduated deny list |
Bryan D. Hall, Richard Joseph Schroeder |
2023-12-26 |
| 11848943 |
Centralized threat intelligence |
Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser +3 more |
2023-12-19 |
| 11831648 |
Login and authentication methods and systems |
Mark David Castonguay, Upul D. Hanwella, Bryan D. Hall, David Lerner |
2023-11-28 |
| 11722459 |
Cumulative sum model for IP deny lists |
Bryan D. Hall, Richard Joseph Schroeder |
2023-08-08 |
| 11601435 |
System and method for graduated deny lists |
Bryan D. Hall, Richard Joseph Schroeder |
2023-03-07 |
| 11528277 |
Login and authentication methods and systems |
Mark David Castonguay, Upul D. Hanwella, Bryan D. Hall, David Lerner |
2022-12-13 |
| 11394766 |
Systems and methods for establishing, using, and recovering universal digital identifiers |
Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser +3 more |
2022-07-19 |
| 11388179 |
Centralized threat intelligence |
Chad E. Adams, Daniel Robert Caricato, Kahlidah B. Covington, Ashley Brook Godfrey, Christopher Wayne Howser +3 more |
2022-07-12 |
| 11356472 |
Systems and methods for using machine learning for geographic analysis of access attempts |
Bryan D. Hall, Richard Joseph Schroeder |
2022-06-07 |
| 11038862 |
Systems and methods for enhanced security based on user vulnerability |
Chemere Davis, Andrew J. Garner, IV, Bryan D. Hall, H. Brock Kolls, Ximing Zhao |
2021-06-15 |
| 10965683 |
Login and authentication methods and systems |
Mark David Castonguay, Upul D. Hanwella, Bryan D. Hall, David Lerner |
2021-03-30 |
| 10523643 |
Systems and methods for enhanced security based on user vulnerability |
Chemere Davis, Andrew J. Garner, IV, Bryan D. Hall, H. Brock Kolls, Ximing Zhao |
2019-12-31 |