Patent | Date |
---|
Identifying cyber adversary behavior Grant 11,228,612 - Vajipayajula , et al. January 18, 2 | 2022-01-18 |
Identifying Cyber Adversary Behavior App 20200314141 - Vajipayajula; Sulakshan ;   et al. | 2020-10-01 |
Application-based security rights in cloud environments Grant 10,673,900 - Nagaratnam , et al. | 2020-06-02 |
User state tracking and anomaly detection in software-as-a-service environments Grant 10,673,885 - Muthukrishnan , et al. | 2020-06-02 |
Augmenting gesture based security technology using mobile devices Grant 10,628,682 - Hoy , et al. | 2020-04-21 |
User state tracking and anomaly detection in software-as-a-service environments App 20190173903 - Muthukrishnan; Ravi Krishnan ;   et al. | 2019-06-06 |
Secure application zones for cloud burst environments Grant 10,244,002 - Hoy , et al. | 2019-03-26 |
Using everyday objects as cryptographic keys Grant 10,237,064 - Hoy , et al. | 2019-03-19 |
User state tracking and anomaly detection in software-as-a-service environments Grant 10,200,387 - Muthukrishnan , et al. Fe | 2019-02-05 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 10,142,293 - Hoy , et al. Nov | 2018-11-27 |
Leveraging mobile devices to enforce restricted area security Grant 10,028,139 - Iyer , et al. July 17, 2 | 2018-07-17 |
Secure application zones for cloud burst environments App 20180124119 - Hoy; Jeffrey Robert ;   et al. | 2018-05-03 |
Using everyday objects as cryptographic keys App 20180109380 - Hoy; Jeffrey Robert ;   et al. | 2018-04-19 |
Identity context-based access control Grant 9,916,461 - Kapadia , et al. March 13, 2 | 2018-03-13 |
Using everyday objects as cryptographic keys Grant 9,912,477 - Hoy , et al. March 6, 2 | 2018-03-06 |
Secure application zones for cloud burst environments Grant 9,888,040 - Hoy , et al. February 6, 2 | 2018-02-06 |
Application-based security rights in cloud environments App 20180027022 - Nagaratnam; Nataraj ;   et al. | 2018-01-25 |
Augmenting gesture based security technology for improved classification and learning Grant 9,875,399 - Hoy , et al. January 23, 2 | 2018-01-23 |
Using everyday objects as cryptographic keys App 20170353307 - Hoy; Jeffrey Robert ;   et al. | 2017-12-07 |
Augmenting Gesture Based Security Technology For Improved Classification And Learning App 20170316259 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Augmenting Gesture Based Security Technology For Improved Differentiation App 20170316258 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Augmenting Gesture Based Security Technology Using Mobile Devices App 20170316260 - Hoy; Jeffrey Robert ;   et al. | 2017-11-02 |
Application-based security rights in cloud environments Grant 9,762,616 - Nagaratnam , et al. September 12, 2 | 2017-09-12 |
Leveraging mobile devices to enforce restricted area security Grant 9,756,173 - Iyer , et al. September 5, 2 | 2017-09-05 |
Using everyday objects as cryptographic keys Grant 9,729,318 - Hoy , et al. August 8, 2 | 2017-08-08 |
Dynamically Defined Virtual Private Network Tunnels In Hybrid Cloud Environments App 20170171158 - Hoy; Jeffrey Robert ;   et al. | 2017-06-15 |
User state tracking and anomaly detection in software-as-a-service environments App 20170155672 - Muthukrishnan; Ravi Krishnan ;   et al. | 2017-06-01 |
Using everyday objects as cryptographic keys App 20170099140 - Hoy; Jeffrey Robert ;   et al. | 2017-04-06 |
Application self-service for assured log management in cloud environments Grant 9,578,063 - Iyer , et al. February 21, 2 | 2017-02-21 |
Dynamically defined virtual private network tunnels in hybrid cloud environments Grant 9,571,457 - Hoy , et al. February 14, 2 | 2017-02-14 |
Application-based security rights in cloud environments App 20170041347 - Nagaratnam; Nataraj ;   et al. | 2017-02-09 |
Secure application zones for cloud burst environments App 20170013021 - Hoy; Jeffrey Robert ;   et al. | 2017-01-12 |
Policy-driven approach to managing privileged/shared identity in an enterprise Grant 9,529,993 - Kapadia , et al. December 27, 2 | 2016-12-27 |
Leveraging mobile devices to enforce restricted area security App 20160286034 - Iyer; Sreekanth Ramakrishna ;   et al. | 2016-09-29 |
Leveraging mobile devices to enforce restricted area security App 20160286394 - Iyer; Sreekanth Ramakrishna ;   et al. | 2016-09-29 |
Identity context-based access control App 20140075492 - Kapadia; Kaushal Kiran ;   et al. | 2014-03-13 |
Policy-driven approach to managing privileged/shared identity in an enterprise App 20130232541 - Kapadia; Kaushal Kiran ;   et al. | 2013-09-05 |