loadpatents
Patent applications and USPTO patent grants for el Khoury; Paul.The latest application filed is for "progressive authentication security adapter".
Patent | Date |
---|---|
Progressive authentication security adapter Grant 10,887,317 - el Khoury , et al. January 5, 2 | 2021-01-05 |
Progressive Authentication Security Adapter App 20200169561 - el Khoury; Paul ;   et al. | 2020-05-28 |
Threat modeling tool using machine learning Grant 10,523,695 - Fach , et al. Dec | 2019-12-31 |
Threat Modeling Tool Using Machine Learning App 20190028498 - Fach; Peter ;   et al. | 2019-01-24 |
Telecommunication method for authenticating a user Grant 10,055,558 - El Khoury , et al. August 21, 2 | 2018-08-21 |
Behavioral multi-level adaptive authorization mechanisms Grant 10,044,722 - El Khoury , et al. August 7, 2 | 2018-08-07 |
Spoofing protection protocol for network-connected things Grant 9,985,945 - El Khoury , et al. May 29, 2 | 2018-05-29 |
Password recovering for mobile applications Grant 9,760,710 - El Khoury , et al. September 12, 2 | 2017-09-12 |
Spoofing Protection Protocol For Network-connected Things App 20170118187 - EL KHOURY; Paul ;   et al. | 2017-04-27 |
Behavioral Multi-Level Adaptive Authorization Mechanisms App 20160294840 - El Khoury; Paul ;   et al. | 2016-10-06 |
Telecommunication Method For Authenticating A User App 20160239648 - EL KHOURY; Paul ;   et al. | 2016-08-18 |
Secure configuration of mobile application Grant 9,331,995 - Schneider , et al. May 3, 2 | 2016-05-03 |
Password Recovering For Mobile Applications App 20150248552 - El Khoury; Paul ;   et al. | 2015-09-03 |
Secure configuration of mobile applications Grant 9,075,978 - Schneider , et al. July 7, 2 | 2015-07-07 |
Enhancing useability of mobile devices that securely store data Grant 8,935,538 - El Khoury January 13, 2 | 2015-01-13 |
Secure Configuration of Mobile Application App 20140230031 - Schneider; Juergen ;   et al. | 2014-08-14 |
Enhancing Useability Of Mobile Devices That Securely Store Data App 20140173292 - El Khoury; Paul | 2014-06-19 |
Authentication enforcement at resource level Grant 8,640,208 - Benameur , et al. January 28, 2 | 2014-01-28 |
Method for automatically creating a behavior pattern of a computer program for model-based testing techniques Grant 8,527,954 - Benameur , et al. September 3, 2 | 2013-09-03 |
Evaluation of risk of conflict for security solutions integration Grant 8,495,744 - El Khoury , et al. July 23, 2 | 2013-07-23 |
Security Aspects Of Soa App 20100162406 - Benameur; Azzedine ;   et al. | 2010-06-24 |
Method for Automatically Creating a Behavior Pattern of a Computer Program for Model-based Testing Techniques App 20090037884 - Benameur; Azzedine ;   et al. | 2009-02-05 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.