Patents

Some granted patents from a prior life:

Network service for the detection, analysis and quarantine of malicious and unwanted files
Priority Date: 2007-08-06
[US-8621610-B2]

System and method of notifying mobile devices to complete transactions
Priority Date: 2010-03-03
[US-9544143-B2] [US-9992194-B2] [US-10129250-B2] [US-11172361-B2]

System and method of notifying mobile devices to complete transactions after additional agent verification
Priority Date: 2010-03-03
[US-9532222-B2] [US-10445732-B2] [US-10706421-B2] [US-11341475-B2]

System and method for embedded authentication
Priority Date: 2010-12-02
[US-8510820-B2] [US-8893251-B2]

System and method for digital user authentication
Priority Date: 2010-12-20
[US-9282085-B2]

System and method for delivering a challenge response in an authentication protocol
Priority Date: 2011-08-31
[US-8892885-B2]

System and method for assessing vulnerability of a mobile device
Priority Date: 2011-09-02
[US-9467463-B2] [US-10348756-B2]

System and method for enforcing a policy for an authenticator device
Priority Date: 2011-10-07
[US-8763077-B2] [US-9361451-B2] [US-9524388-B2]

System and method for integrating two-factor authentication in a device
Priority Date: 2013-02-22
[US-9338156-B2] [US-10013548-B2] [US-10223520-B2]

System and method for patching a device through exploitation
Priority Date: 2013-02-22
[US-9607156-B2]

System and method for proxying federated authentication protocols
Priority Date: 2013-02-22
[US-8893230-B2] [US-9491175-B2] [US-10200368-B2] [US-10764286-B2] [US-11323441-B2]

System and method for verifying status of an authentication device
Priority Date: 2013-02-22
[US-9455988-B2] [US-9443073-B2]

System and method for verifying status of an authentication device through a biometric profile
Priority Date: 2013-08-08
[US-9053310-B2] [US-9454656-B2]

System and method for centralized key distribution
Priority Date: 2013-09-10
[US-9608814-B2]

System and method for determining component version compatibility across a device ecosystem
Priority Date: 2013-09-10
[US-9092302-B2] [US-9454365-B2] [US-9996343-B2] [US-10248414-B2]

System and methods for opportunistic cryptographic key management on an electronic device
Priority Date: 2013-10-30
[US-9774448-B2] [US-9998282-B2] [US-10237062-B2]

System and method for an integrity focused authentication service
Priority Date: 2014-04-17
[US-9762590-B2] [US-10021113-B2]

System and method for applying digital fingerprints in multi-factor authentication
Priority Date: 2014-12-09
[US-10440016-B2]

System and method for converting one-time passcodes to app-based authentication
Priority Date: 2015-01-06
[US-9979719-B2]

System and method for automatic service discovery and protection
Priority Date: 2015-03-23
[US-9930025-B2] [US-10594677-B2]

Method for distributed trust authentication
Priority Date: 2015-03-31
[US-9641341-B2] [US-9825765-B2] [US-9942048-B2] [US-10116453-B2]

Method for enforcing endpoint health standards
Priority Date: 2015-06-01
[EP-3304336-B1] [US-9930060-B2] [US-10542030-B2]

Method of applying endpoint health standards
Priority Date: 2015-06-01
[ES-2758755-T3]

Method for key rotation
Priority Date: 2015-07-27
[US-9774579-B2] [US-10063531-B2] [US-10742626-B2]

Methods and systems for implementing a phishing assessment
Priority Date: 2015-10-29
[US-9674213-B2] [US-9935970-B2] [US-9961101-B2] [US-10230754-B2] [US-10505968-B2] [US-11140191-B2]

Method for automatic possession-factor authentication
Priority Date: 2016-06-02
[US-9801066-B1] [US-10708776-B2]

Systems and methods for endpoint management classification
Priority Date: 2016-06-29
[US-10009344-B2] [US-10594692-B2] [US-11019057-B2]

Methods for preventing cyber intrusions and phishing activity
Priority Date: 2016-07-20
[US-10193923-B2]

Methods for identifying compromised credentials and controlling account access
Priority Date: 2016-08-12
[US-10558797-B2]

Method for identifying phishing websites and hindering associated activity
Priority Date: 2016-08-23
[US-10498761-B2] [US-11057427-B2]

Systems and methods for access control to web applications and identification of web browsers
Priority Date: 2017-01-27
[US-10248782-B2]

Systems and methods for intelligently configuring computer security
Priority Date: 2017-12-08
[US-10412113-B2]

Copyright © 2021 - Jon Oberheide