Patent | Date |
---|
Extraction Of A Nested Hierarchical Structure From Text Data In An Unstructured Version Of A Document App 20210319039 - Gerber, JR.; Gregory A. ;   et al. | 2021-10-14 |
Methods and apparatus for secret sharing with verifiable reconstruction type Grant 11,115,196 - Triandopoulos , et al. September 7, 2 | 2021-09-07 |
Automatic Assignment of Tasks to Users in Collaborative Projects App 20210241231 - Mullins; Brian C. ;   et al. | 2021-08-05 |
Methods and apparatus for private set membership using aggregation for reduced communications Grant 10,635,824 - Triandopoulos , et al. | 2020-04-28 |
Split-key based cryptography system for data protection and synchronization across multiple computing devices Grant 10,516,527 - Machani , et al. Dec | 2019-12-24 |
Classifying software modules based on fingerprinting code fragments Grant 10,484,419 - Davis , et al. Nov | 2019-11-19 |
Authenticating by labeling Grant 10,263,972 - Bowers , et al. | 2019-04-16 |
Authenticating by labeling Grant 10,229,260 - Bowers , et al. | 2019-03-12 |
Security alerting system with dynamic buffer size adaption Grant 10,129,027 - Juels , et al. November 13, 2 | 2018-11-13 |
Security alerting system with network blockade policy based on alert transmission activity Grant 10,104,104 - Juels , et al. October 16, 2 | 2018-10-16 |
Flexible access management framework based on measuring application usage behavior Grant 10,063,562 - Molina-Markham , et al. August 28, 2 | 2018-08-28 |
Security alerting system with dynamic buffer size adaptation Grant 9,935,770 - Juels , et al. April 3, 2 | 2018-04-03 |
Detection of malicious web activity in enterprise computer networks Grant 9,838,407 - Oprea , et al. December 5, 2 | 2017-12-05 |
Collaborative analytics for independently administered network domains Grant 9,838,355 - Dotan , et al. December 5, 2 | 2017-12-05 |
Access management based on active environment comprising dynamically reconfigurable sets of smart objects Grant 9,817,957 - Molina-Markham , et al. November 14, 2 | 2017-11-14 |
Wireless wearable authenticators using attachment to confirm user possession Grant 9,740,844 - Bowers , et al. August 22, 2 | 2017-08-22 |
Authentication token with controlled release of authentication information based on client attestation Grant 9,659,177 - Juels , et al. May 23, 2 | 2017-05-23 |
Detecting malicious websites Grant 9,621,576 - Oprea , et al. April 11, 2 | 2017-04-11 |
Deauthentication in multi-device user environments Grant 9,614,829 - Molina-Markham , et al. April 4, 2 | 2017-04-04 |
Collaborative analytics for independently administered network domains Grant 9,467,343 - Dotan , et al. October 11, 2 | 2016-10-11 |
System and method for key material protection on devices using a secret sharing scheme Grant 9,461,821 - Machani , et al. October 4, 2 | 2016-10-04 |
Subject notification and consent for captured images Grant 9,430,673 - Bowers , et al. August 30, 2 | 2016-08-30 |
Authentication based on user-selected image overlay effects Grant 9,361,447 - Bowers , et al. June 7, 2 | 2016-06-07 |
Sharing a cryptographic device by partitioning challenge-response space Grant 9,323,909 - Luo , et al. April 26, 2 | 2016-04-26 |
Message encryption and decryption utilizing low-entropy keys Grant 9,325,499 - Juels , et al. April 26, 2 | 2016-04-26 |
Credential recovery with the assistance of trusted entities Grant 9,256,725 - Oprea , et al. February 9, 2 | 2016-02-09 |
Determining instances to maintain on at least one cloud responsive to an evaluation of performance characteristics Grant 9,128,739 - Juels , et al. September 8, 2 | 2015-09-08 |
Credential recovery with the assistance of trusted entities App 20150242616 - Oprea; Alina ;   et al. | 2015-08-27 |
Distributed cryptography using distinct value sets each comprising at least one obscured secret value Grant 9,037,858 - Juels , et al. May 19, 2 | 2015-05-19 |
Cryptographic device operable in a challenge-response mode Grant 9,015,476 - Juels , et al. April 21, 2 | 2015-04-21 |
Distributed storage system with efficient handling of file updates Grant 8,984,384 - Juels , et al. March 17, 2 | 2015-03-17 |
Proof of retrievability for archived files Grant 8,984,363 - Juels , et al. March 17, 2 | 2015-03-17 |
Techniques for detecting malware on a mobile device Grant 8,904,525 - Hodgman , et al. December 2, 2 | 2014-12-02 |
Controlling a soft token running within an electronic apparatus Grant 8,875,263 - van Dijk , et al. October 28, 2 | 2014-10-28 |
View computation and transmission for a set of keys refreshed over multiple epochs in a cryptographic device Grant 8,874,904 - Juels , et al. October 28, 2 | 2014-10-28 |
Managing user access with mobile device posture Grant 8,819,769 - van Dijk , et al. August 26, 2 | 2014-08-26 |
Graph-based approach to deterring persistent security threats Grant 8,813,234 - Bowers , et al. August 19, 2 | 2014-08-19 |
Providing authentication codes which include token codes and biometric factors Grant 8,752,146 - van Dijk , et al. June 10, 2 | 2014-06-10 |
Detecting soft token copies Grant 8,752,156 - van Dijk , et al. June 10, 2 | 2014-06-10 |
Soft token posture assessment Grant 8,683,563 - van Dijk , et al. March 25, 2 | 2014-03-25 |
Scheduling soft token data transmission Grant 8,683,570 - van Dijk , et al. March 25, 2 | 2014-03-25 |
Radio frequency identification enabled mobile device Grant 8,618,913 - Bailey , et al. December 31, 2 | 2013-12-31 |
Personal identification pairs Grant 8,601,552 - Bowers , et al. December 3, 2 | 2013-12-03 |
Proof of retrievability for archived files Grant 8,381,062 - Juels , et al. February 19, 2 | 2013-02-19 |
Distributed storage system with enhanced security Grant 8,132,073 - Bowers , et al. March 6, 2 | 2012-03-06 |