loadpatents
Patent applications and USPTO patent grants for Morris; Cameron Craig.The latest application filed is for "anonymous authentication using backup biometric information".
Patent | Date |
---|---|
Anonymous authentication using backup biometric information Grant 9,213,818 - Morris , et al. December 15, 2 | 2015-12-15 |
Systems and methods for verifying uniqueness in anonymous authentication Grant 9,202,083 - Morris , et al. December 1, 2 | 2015-12-01 |
Anonymous Authentication Using Backup Biometric Information App 20150242607 - Morris; Cameron Craig ;   et al. | 2015-08-27 |
Techniques for personalizing content Grant 9,043,935 - Morris , et al. May 26, 2 | 2015-05-26 |
Techniques for dynamic generation and management of password dictionaries Grant 9,032,216 - Vedula , et al. May 12, 2 | 2015-05-12 |
Representing extensible markup language (XML) as an executable having conditional authentication or policy logic Grant 8,799,770 - Morris , et al. August 5, 2 | 2014-08-05 |
Techniques For Dynamic Generation And Management Of Password Dictionaries App 20140189826 - Vedula; Srinivas ;   et al. | 2014-07-03 |
Techniques for modification of access expiration conditions Grant 8,607,303 - Morris , et al. December 10, 2 | 2013-12-10 |
Encrypting And Storing Biometric Information On A Storage Device App 20130318361 - Erickson; Douglas M. ;   et al. | 2013-11-28 |
Systems And Methods For Verifying Uniqueness In Anonymous Authentication App 20130318359 - Morris; Cameron Craig ;   et al. | 2013-11-28 |
Techniques for local personalization of content Grant 8,490,198 - Morris , et al. July 16, 2 | 2013-07-16 |
Credentials for blinded intended audiences Grant 8,468,359 - Morris , et al. June 18, 2 | 2013-06-18 |
Techniques for credential strength analysis via failed intruder access attempts Grant 8,412,931 - Vedula , et al. April 2, 2 | 2013-04-02 |
Techniques for real-time adaptive password policies Grant 8,332,918 - Vedula , et al. December 11, 2 | 2012-12-11 |
Single sign on with proxy services Grant 8,327,426 - Kinser , et al. December 4, 2 | 2012-12-04 |
Techniques for port hopping Grant 8,301,789 - Morris , et al. October 30, 2 | 2012-10-30 |
Techniques for dynamic generation and management of password dictionaries Grant 8,286,000 - Vedula , et al. October 9, 2 | 2012-10-09 |
Techniques for recognizing multiple patterns within a string Grant 8,131,758 - Morris , et al. March 6, 2 | 2012-03-06 |
Representing Extensible Markup Language (xml) As An Executable Having Conditional Authentication Or Policy Logic App 20120042355 - Morris; Cameron Craig ;   et al. | 2012-02-16 |
Identity validation Grant 8,069,476 - Kinser , et al. November 29, 2 | 2011-11-29 |
Representing extensible markup language (XML) as an executable having conditional authentication or policy logic Grant 8,069,408 - Morris , et al. November 29, 2 | 2011-11-29 |
Techniques for variable security access information Grant 7,845,003 - Morris , et al. November 30, 2 | 2010-11-30 |
Implicit trust of authorship certification Grant 7,822,974 - Kinser , et al. October 26, 2 | 2010-10-26 |
Techniques for attesting to content Grant 7,574,479 - Morris , et al. August 11, 2 | 2009-08-11 |
Techniques For Recognizing Multiple Patterns Within A String App 20090171953 - Morris; Cameron Craig ;   et al. | 2009-07-02 |
Techniques For Credential Strength Analysis Via Failed Intruder Access Attempts App 20090172788 - Vedula; Srinivas ;   et al. | 2009-07-02 |
Techniques For Dynamic Generation And Management Of Password Dictionaries App 20090150971 - Vedula; Srinivas ;   et al. | 2009-06-11 |
Techniques For Real-time Adaptive Password Policies App 20090150677 - Vedula; Srinivas ;   et al. | 2009-06-11 |
Techniques For Port Hopping App 20080313348 - Morris; Cameron Craig ;   et al. | 2008-12-18 |
Techniques For Local Personalization Of Content App 20080289013 - Morris; Cameron Craig ;   et al. | 2008-11-20 |
Techniques For Personalizing Content App 20080289049 - Morris; Cameron Craig ;   et al. | 2008-11-20 |
Representing extensible markup language (XML) as an executable having conditional authentication or policy logic App 20080120689 - Morris; Cameron Craig ;   et al. | 2008-05-22 |
Multiple security access mechanisms for a single identifier App 20080114987 - Morris; Cameron Craig ;   et al. | 2008-05-15 |
Techniques for variable security access information App 20080115223 - Morris; Cameron Craig ;   et al. | 2008-05-15 |
Techniques for modification of access expiration conditions App 20080114986 - Morris; Cameron Craig ;   et al. | 2008-05-15 |
Credentials for blinded intended audiences App 20080005573 - Morris; Cameron Craig ;   et al. | 2008-01-03 |
Single sign on with proxy services App 20070294752 - Kinser; Stephen Hugh ;   et al. | 2007-12-20 |
Identity validation App 20070283424 - Kinser; Stephen Hugh ;   et al. | 2007-12-06 |
Implicit trust of authorship certification App 20070266249 - Kinser; Stephen Hugh ;   et al. | 2007-11-15 |
Registration of peer-to-peer services App 20070226338 - Burch; Lloyd Leon ;   et al. | 2007-09-27 |
Techniques for attesting to content App 20070174406 - Morris; Cameron Craig ;   et al. | 2007-07-26 |
uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.
While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.
All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.