loadpatents
name:-0.12893199920654
name:-0.045636177062988
name:-0.014337062835693
Toth; Michael E. Patent Filings

Toth; Michael E.

Patent Applications and Registrations

Patent applications and USPTO patent grants for Toth; Michael E..The latest application filed is for "processing authentication requests to secured information systems based on machine-learned user behavior profiles".

Company Profile
15.33.46
  • Toth; Michael E. - Charlotte NC
*profile and listings may contain filings by different individuals or companies with the same name. Review application materials to confirm ownership/assignment.
Patent Activity
PatentDate
Processing Authentication Requests to Secured Information Systems Based on Machine-Learned User Behavior Profiles
App 20220027441 - Toth; Michael E. ;   et al.
2022-01-27
Processing authentication requests to secured information systems based on user behavior profiles
Grant 11,176,230 - Toth , et al. November 16, 2
2021-11-16
Dynamically Generating Activity Prompts to Build and Refine Machine Learning Authentication Models
App 20210286872 - Toth; Michael E. ;   et al.
2021-09-16
Processing authentication requests to secured information systems based on machine-learned event profiles
Grant 11,120,109 - Toth , et al. September 14, 2
2021-09-14
Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
Grant 11,113,370 - Toth , et al. September 7, 2
2021-09-07
Processing Authentication Requests to Secured Information Systems Using Machine-Learned User-Account Behavior Profiles
App 20210264005 - Toth; Michael E. ;   et al.
2021-08-26
Dynamically generating activity prompts to build and refine machine learning authentication models
Grant 11,048,793 - Toth , et al. June 29, 2
2021-06-29
Processing authentication requests to secured information systems using machine-learned user-account behavior profiles
Grant 11,036,838 - Toth , et al. June 15, 2
2021-06-15
Method and system for data communication and frictionless authentication
Grant 10,965,662 - Arora , et al. March 30, 2
2021-03-30
Preventing unauthorized access to secure information systems using advanced pre-authentication techniques
Grant 10,965,675 - Zhang , et al. March 30, 2
2021-03-30
Data access control using multi-device multifactor authentication
Grant 10,853,467 - Choiniere , et al. December 1, 2
2020-12-01
Cross channel authentication elevation via logic repository
Grant 10,728,256 - Sims , et al.
2020-07-28
System for across rail silo system integration and logic repository
Grant 10,721,246 - Sims , et al.
2020-07-21
Processing Authentication Requests to Secured Information Systems Based on Machine-Learned Event Profiles
App 20200184049 - Toth; Michael E. ;   et al.
2020-06-11
Dynamically Generating Activity Prompts to Build and Refine Machine Learning Authentication Models
App 20200184065 - Toth; Michael E. ;   et al.
2020-06-11
Processing Authentication Requests to Secured Information Systems Using Machine-Learned User-Account Behavior Profiles
App 20200184051 - Toth; Michael E. ;   et al.
2020-06-11
Processing Authentication Requests to Secured Information Systems Using Machine-Learned User-Account Behavior Profiles
App 20200184050 - Toth; Michael E. ;   et al.
2020-06-11
Processing Authentication Requests to Secured Information Systems Based on Machine-Learned User Behavior Profiles
App 20200184048 - Toth; Michael E. ;   et al.
2020-06-11
Method And System For Data Communication And Frictionless Authentication
App 20200007528 - Arora; Ashish ;   et al.
2020-01-02
Data Access Control Using Multi-device Multifactor Authentication
App 20190303553 - Choiniere; Matthew M. ;   et al.
2019-10-03
Preventing Unauthorized Access to Secure Information Systems Using Advanced Pre-Authentication Techniques
App 20190289007 - Zhang; Xianhong ;   et al.
2019-09-19
System For Across Rail Silo System Integration And Logic Repository
App 20190132336 - Sims; Scott Anderson ;   et al.
2019-05-02
Cross Channel Authentication Elevation Via Logic Repository
App 20190132328 - Sims; Scott Anderson ;   et al.
2019-05-02
Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication
Grant 10,050,962 - Grigg , et al. August 14, 2
2018-08-14
Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
Grant 10,049,195 - Grigg , et al. August 14, 2
2018-08-14
Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
Grant 9,971,885 - Grigg , et al. May 15, 2
2018-05-15
Determining user authentication based on user/device interaction
Grant 9,965,606 - Votaw , et al. May 8, 2
2018-05-08
Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
Grant 9,819,680 - Grigg , et al. November 14, 2
2017-11-14
Authentication level of function bucket based on circumstances
Grant 9,647,999 - Grigg , et al. May 9, 2
2017-05-09
Remote control for online banking
Grant 9,646,342 - Calman , et al. May 9, 2
2017-05-09
Knowledge based verification of the identity of a user
Grant 9,633,355 - Dave , et al. April 25, 2
2017-04-25
Sorting mobile banking functions into authentication buckets
Grant 9,595,025 - Grigg , et al. March 14, 2
2017-03-14
Sorting mobile banking functions into authentication buckets
Grant 9,530,124 - Grigg , et al. December 27, 2
2016-12-27
User authentication based on other applications
Grant 9,525,685 - Grigg , et al. December 20, 2
2016-12-20
Restricted access to online banking
Grant 9,519,934 - Calman , et al. December 13, 2
2016-12-13
User authentication based on other applications
Grant 9,509,685 - Grigg , et al. November 29, 2
2016-11-29
User authentication based on historical transaction data
Grant 9,483,766 - Grigg , et al. November 1, 2
2016-11-01
User authentication based on historical transaction data
Grant 9,477,960 - Grigg , et al. October 25, 2
2016-10-25
Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
Grant 9,390,242 - Grigg , et al. July 12, 2
2016-07-12
Offline mobile banking system
Grant 9,384,478 - Calman , et al. July 5, 2
2016-07-05
User Authentication Based On Other Applications
App 20160173484 - Grigg; David M. ;   et al.
2016-06-16
Sorting Mobile Banking Functions Into Authentication Buckets
App 20160171460 - Grigg; David M. ;   et al.
2016-06-16
User Authentication Based On Historical Transaction Data
App 20160162896 - Grigg; David M. ;   et al.
2016-06-09
User Authentication Based On Historical Transaction Data
App 20160164857 - Grigg; David M. ;   et al.
2016-06-09
Determining User Authentication Requirements Based On The Current Location Of The User Being Within A Predetermined Area Requiring Altered Authentication Requirements
App 20160156609 - Grigg; David M. ;   et al.
2016-06-02
Sorting Mobile Banking Functions Into Authentication Buckets
App 20160155189 - Grigg; David M. ;   et al.
2016-06-02
Determining User Authentication Requirements Based On The Current Location Of The User Being Within A Predetermined Area Requiring Altered Authentication Requirements
App 20160156608 - Grigg; David M. ;   et al.
2016-06-02
User Authentication Based On Other Applications
App 20160134614 - Grigg; David M. ;   et al.
2016-05-12
User authentication based on historical transaction data
Grant 9,331,994 - Grigg , et al. May 3, 2
2016-05-03
Sorting mobile banking functions into authentication buckets
Grant 9,305,149 - Grigg , et al. April 5, 2
2016-04-05
Determining User Authentication Based On User/device Interaction
App 20160055326 - Votaw; Elizabeth S. ;   et al.
2016-02-25
Determining User Authentication Requirements Along A Continuum Based On A Current State Of The User And/or The Attributes Related To The Function Requiring Authentication
App 20160057144 - Grigg; David M. ;   et al.
2016-02-25
Determining User Authentication Based On User Patterns Within Application
App 20160055487 - Votaw; Elizabeth S. ;   et al.
2016-02-25
Determining User Authentication Requirements Based On The Current Location Of The User In Comparison To The Users's Normal Boundary Of Location
App 20160026779 - Grigg; David M. ;   et al.
2016-01-28
User authentication based on other applications
Grant 9,223,951 - Grigg , et al. December 29, 2
2015-12-29
Widget For Promoting Payments Via A Person-to-person (p2p) Payment Rail
App 20150363761 - Grigg; David M. ;   et al.
2015-12-17
Person-to-person (p2p) Payments Via A Short-range Wireless Payment Beacon
App 20150363764 - Grigg; David M. ;   et al.
2015-12-17
Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
Grant 9,208,301 - Grigg , et al. December 8, 2
2015-12-08
User authentication by geo-location and proximity to user's close network
Grant 9,185,117 - Grigg , et al. November 10, 2
2015-11-10
User authentication based on historical user behavior
Grant 9,185,101 - Grigg , et al. November 10, 2
2015-11-10
Determining User Authentication Requirements Based On The Current Location Of The User In Comparison To The Users's Normal Boundary Of Location
App 20150227727 - Grigg; David M. ;   et al.
2015-08-13
Determining User Authentication Requirements Based On The Current Location Of The User Being Within A Predetermined Area Requiring Altered Authentication Requirements
App 20150227728 - Grigg; David M. ;   et al.
2015-08-13
Determining User Authentication Requirements Based On The Current Location Of The User In Comparison To A User's Travel Route
App 20150227926 - Grigg; David M. ;   et al.
2015-08-13
Sorting Mobile Banking Functions Into Authentication Buckets
App 20150227724 - Grigg; David M. ;   et al.
2015-08-13
User Authentication Based On Other Applications
App 20150227731 - Grigg; David M. ;   et al.
2015-08-13
User Authentication Based On Historical User Behavior
App 20150229624 - Grigg; David M. ;   et al.
2015-08-13
User Authentication By Geo-location And Proximity To User's Close Network
App 20150229650 - Grigg; David M. ;   et al.
2015-08-13
User Authentication Based On Historical Transaction Data
App 20150229623 - Grigg; David M. ;   et al.
2015-08-13
Authentication Level Of Function Bucket Based On Circumstances
App 20150229625 - Grigg; David M. ;   et al.
2015-08-13
Knowledge Based Verification of the Identity of a User
App 20150193781 - Dave; Apeksh M. ;   et al.
2015-07-09
Offline Mobile Banking System
App 20150026055 - Calman; Matthew A. ;   et al.
2015-01-22
Systems For Managing Account Aggregators Access To Financial Account Information
App 20150026024 - Calman; Matthew A. ;   et al.
2015-01-22
Online Banking Alerts
App 20150026053 - Calman; Matthew A. ;   et al.
2015-01-22
Completing Mobile Banking Transaction With Different Devices
App 20150026057 - Calman; Matthew A. ;   et al.
2015-01-22
Customer-defined Online-banking Access Restrictions
App 20150026054 - Calman; Matthew A. ;   et al.
2015-01-22
Restricted Access To Online Banking
App 20150026026 - Calman; Matthew A. ;   et al.
2015-01-22
Completing Mobile Banking Transaction From Trusted Location
App 20150026056 - Calman; Matthew A. ;   et al.
2015-01-22
Remote Control For Online Banking
App 20150026025 - Calman; Matthew A. ;   et al.
2015-01-22
Online Session Transfer
App 20150026351 - Calman; Matthew A. ;   et al.
2015-01-22

uspto.report is an independent third-party trademark research tool that is not affiliated, endorsed, or sponsored by the United States Patent and Trademark Office (USPTO) or any other governmental organization. The information provided by uspto.report is based on publicly available data at the time of writing and is intended for informational purposes only.

While we strive to provide accurate and up-to-date information, we do not guarantee the accuracy, completeness, reliability, or suitability of the information displayed on this site. The use of this site is at your own risk. Any reliance you place on such information is therefore strictly at your own risk.

All official trademark data, including owner information, should be verified by visiting the official USPTO website at www.uspto.gov. This site is not intended to replace professional legal advice and should not be used as a substitute for consulting with a legal professional who is knowledgeable about trademark law.

© 2025 USPTO.report | Privacy Policy | Resources | RSS Feed of Trademarks | Trademark Filings Twitter Feed