$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Method and system for securing a mobile device 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04M-003/16
출원번호 UP-0829711 (2004-04-22)
등록번호 US-7783281 (2010-09-13)
발명자 / 주소
  • Cook, Fred S.
  • Satapathy, Durga
출원인 / 주소
  • Sprint Spectrum L.P.
인용정보 피인용 횟수 : 138  인용 특허 : 9

초록

When the loss or theft of a mobile device is detected, script interpretation logic executes a script to disable one or more functions or the mobile device, such as personal organizer functions in the mobile device. The script may be stored locally on the mobile device, so that the mobile device dete

대표청구항

The invention claimed is: 1. A method of securing a mobile device, comprising: detecting displacement of a mobile device; storing, in a database entry associated with the mobile device, data identifying the mobile device as displaced; receiving a registration message from the mobile device; in resp

이 특허에 인용된 특허 (9)

  1. Isikoff Jeremy M., Device security system.
  2. Kagay, Jr., Howard Edward, Method and apparatus for operating a lost mobile communication device.
  3. Jeong,Ho Joong, Method for preventing illegal use of mobile communication terminal.
  4. Adams,Thomas L.; Schroeder,Timothy P., Network-based services for misplaced cellular mobile stations.
  5. Irvin, David R., Safe zones for portable electronic devices.
  6. Cocita,Keith, Safeguarding user data stored in mobile communications devices.
  7. Chanu Frederic (Montesson FRX) Jouin Christophe (Paris FRX), Self-disabling device for a mobile telephone type portable terminal.
  8. Gough, Corey D., System and method for controlling a wireless device notification alert.
  9. Komsi,Asko, System and method for performing security functions of a mobile station.

이 특허를 인용한 특허 (138)

  1. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., ATM token cash withdrawal.
  2. Mahaffey, Kevin, Analyzing data gathered through different protocols.
  3. Rajan, Rajeev D.; Koenig, Michal James; Kripalani, Vera; Mahmood, Kasim; Miller, Jason; Patwari, Srinivas; Ray, Rajarshi, Apparatus and methods for locating, tracking and/or recovering a wireless communication device.
  4. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing a security state of a mobile communications device to determine access to specific tasks.
  5. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, Assessing an application based on application data associated with the application.
  6. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Assessing application authenticity and performing an action in response to an evaluation result.
  7. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing the security state of a mobile communications device.
  8. Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Authentication level of function bucket based on circumstances.
  9. Wada, Yuuki; Kurosawa, Noriyuki, Communication system and communication device.
  10. Wada, Yuuki; Kurosawa, Noriyuki, Communication system and communication device.
  11. Wyatt, Timothy Micheal; Strazzere, Tim; Mahaffey, Kevin Patrick; Swami, Yogesh, Comparing applications and assessing differences.
  12. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph, Component analysis of software applications on computing devices.
  13. Wyatt, Timothy M.; Strazzere, Tim; Mahaffey, Kevin Patrick; Swami, Yogesh, Crawling multiple markets and correlating.
  14. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software.
  15. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software using signature of authorship.
  16. Votaw, Elizabeth S.; Jones-McFadden, Alicia C.; Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne, Determining user authentication based on user/device interaction.
  17. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements along a continuum based on a current state of the user and/or the attributes related to the function requiring authentication.
  18. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
  19. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements.
  20. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
  21. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E., Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location.
  22. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Distributed monitoring, evaluation, and response for multiple devices.
  23. Nevstruev, Sergey V.; Nevstruev, Oleg V.; Matveev, Andrey V., Efficient securing of data on mobile devices.
  24. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Enforcing security based on a security state assessment of a mobile device.
  25. Lohier, Frantz, Entrusted device localization scheme using ultrasound signatures.
  26. Mahaffey, Kevin Patrick, Evaluating whether data is safe or malicious.
  27. Mahaffey, Kevin; Hering, John G.; Burgess, James, Event-based security state assessment and display for mobile devices.
  28. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph; Richardson, David, Expressing intent to control behavior of application components.
  29. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., Foreign cross-issued token.
  30. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., Foreign exchange token.
  31. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., Formation and funding of a shared token.
  32. Nakano, Toshiya; Matsuoka, Yoshio; Kaneko, Yoshihiro; Uzawa, Hideaki, Information processing device and operation control method.
  33. Jones-McFadden, Alicia C.; Votaw, Elizabeth S., Integrated full and partial shutdown application programming interface.
  34. Madsen, John J., Location-based recovery device and risk management system for portable computing devices and data.
  35. Ranjan, Uma; Kumar, Brajesh; Vikram, Dipu, Message processing apparatus, wireless device and method of storing a message in a wireless device.
  36. Buck, Brian James; Wang, Jinggang, Method and apparatus for auxiliary communications with mobile communications device.
  37. Halliday, Derek; Bergher, Bruno; Mahaffey, Kevin; Buck, Brian; Gupta, Abheek, Method and system for evaluating security for an interactive service operation by a mobile device.
  38. Halferty, Clark D.; Wurtenberger, Andrew M.; Hyde, Caleb S., Method and system for fingerprint scanning and reporting.
  39. Suh, Kyung-Joo; Choi, Sung-Ho, Method and system for managing mobility of an access terminal in a mobile communication system using mobile IP.
  40. Buck, Brian James, Method and system for protecting privacy and enhancing security on an electronic device.
  41. Halferty, Clark D.; Wurtenberger, Andrew M.; Hyde, Caleb S., Method and system for secret fingerprint scanning and reporting.
  42. Grkov, Vance; Richardson, David; Mandal, Ayan; Mangat, Cherry; Mahaffey, Kevin Patrick, Method for detecting a security event on a portable electronic device and establishing audio transmission with a client computer.
  43. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grkov, Vance; Richardson, David Luke; Mandal, Ayan; Mangat, Cherry; Buck, Brian James; Robinson, William, Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such.
  44. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device.
  45. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses between collections of mobile communications devices.
  46. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses to improve the functioning of mobile communications devices.
  47. Jain, Anku; Kumar, Amit; Tu, Guan-Hua, Mobile communication apparatus having anti-theft and auto-notification functions.
  48. Jain, Anku; Kumar, Amit; Tu, Guan-Hua, Mobile communication apparatus having anti-theft and auto-notification functions.
  49. Jain, Anku; Kumar, Amit; Tu, Guan-Hua, Mobile communication apparatus having anti-theft and auto-notification functions.
  50. Salomon, Ariel; Mahaffey, Kevin Patrick, Mobile communications device payment method utilizing location information.
  51. Mahaffey, Kevin Patrick, Mobile device geolocation.
  52. Park, Gun Woo; Hwang, Pyoung Ju; Shin, Kwan Min; Yea, Byoung Suk, Mobile terminal for preventing illegitimate change of identification number by matching authentication information.
  53. Buck, Brian James; Mahaffey, Kevin Patrick, Modifying mobile device settings for resource conservation.
  54. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Monitoring installed applications on user devices.
  55. Mahaffey, Kevin Patrick; Richardson, David Luke; Salomon, Ariel; Croy, R. Tyler; Walker, Samuel Alexander; Buck, Brian James; Marcin Gorrino, Sergio Ivan; Golombek, David, Multi-factor authentication and comprehensive login system for client-server networks.
  56. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., Online banking digital wallet management.
  57. Bondesen, Laura Corinne; Blackhurst, Jason P.; Harkey, Scott Lee; Belchee, William Blakely; Brunswig, Tammy L., Online banking digital wallet management.
  58. Votaw, Elizabeth S.; Jones-McFadden, Alicia C., Passive based security escalation to shut off of application based on rules event triggering.
  59. Votaw, Elizabeth S.; Jones-McFadden, Alicia C., Passive based security escalation to shut off of application based on rules event triggering.
  60. Jones-McFadden, Alicia C.; Votaw, Elizabeth S., Permanently affixed un-decryptable identifier associated with mobile device.
  61. Madsen, John J., Portable computing device with data encryption and destruction.
  62. Madsen, John J., Portable computing device with data encryption and destruction.
  63. Madsen, John J., Portable computing device with data encryption and destruction.
  64. Madsen, John J., Portable computing device with data encryption and destruction.
  65. Madsen, John J., Portable computing device with data encryption and destruction.
  66. Chen, Tsung Yuan; Chang, Yung-Yen, Portable device and method for enabling the same.
  67. Grigg, David M.; Bertanzetti, Peter John; Qaim-Maqami, Hood, Providing authentication using previously-validated authentication credentials.
  68. Grigg, David M.; Bertanzetti, Peter John; Qaim-Maqami, Hood, Providing authentication using previously-validated authentication credentials.
  69. Grigg, David M.; Bertanzetti, Peter John; Qaim-Maqami, Hood, Providing authentication using previously-validated authentication credentials.
  70. Jones, Bryce A., Reducing mobile-phone fraud.
  71. Jones, Bryce A., Reducing mobile-phone fraud.
  72. Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
  73. Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
  74. Votaw, Elizabeth S.; Burrell, Charles Jason; Hanson, Carrie Anne; Jones, Alicia C.; Lynch, Michael Patrick; Qaim-Maqami, Hood, Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device.
  75. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Response generation after distributed monitoring and evaluation of multiple devices.
  76. Natarajan, Shankar; Cox, Jason; Foster, Charles B.; Shah, Hinesh K., Secure control of self-encrypting storage devices.
  77. Hassan, Ahmed E.; Wilson, John F.; Martin, Daryl Joseph, Secure device sharing.
  78. Velusamy, Senthil Kumar Mulluppadi, Secure remote user device unlock.
  79. Velusamy, Senthil Kumar Mulluppadi, Secure remote user device unlock for carrier locked user devices.
  80. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status assessment using mobile device security information database.
  81. Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
  82. Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
  83. Grigg, David M.; Johansen, Joseph Neil; Hanson, Carrie Anne; Burrell, Charles Jason; Votaw, Elizabeth S., Self-selected user access based on specific authentication types.
  84. Mahaffey, Kevin Patrick, Server-assisted analysis of data for a mobile device.
  85. Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
  86. Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
  87. Grigg, David M.; Qaim-Maqami, Hood; Jones, Alicia C.; Votaw, Elizabeth S.; Johansen, Joseph Neil; Burrell, Charles Jason; Hanson, Carrie Anne; Lynch, Michael Patrick, Shutting down access to all user accounts.
  88. Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
  89. Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
  90. Grigg, David M.; Johansen, Joseph Neil; Toth, Michael E.; Carpenter, Daniel Lynn; Qaim-Maqami, Hood; Hanson, Carrie Anne; Votaw, Elizabeth S., Sorting mobile banking functions into authentication buckets.
  91. Wootton, Bruce; Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal, System and method for a scanning API.
  92. Mahaffey, Kevin Patrick; Golombek, David; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Hering, John G., System and method for adverse mobile application identification.
  93. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, System and method for assessing an application based on data from multiple devices.
  94. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for assessing an application to be installed on a mobile communications device.
  95. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for assessing data objects on mobile communications devices.
  96. Mahaffey, Kevin Patrick, System and method for attack and malware prevention.
  97. Mahaffey, Kevin Patrick; Buck, Brian James, System and method for authorizing a payment transaction.
  98. Mahaffey, Kevin Patrick, System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects.
  99. Wyatt, Timothy Micheal; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James; Rogers, Marc William, System and method for creating and assigning a policy for a mobile communications device based on personal data.
  100. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security.
  101. Kenney, Thomas J., System and method for limiting mobile device functionality.
  102. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for mobile communication device application advisement.
  103. Salomon, Ariel; Mahaffey, Kevin Patrick, System and method for mobile device push communications.
  104. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John G, System and method for mobile device replacement.
  105. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for preventing malware on a mobile communication device.
  106. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John Gunther, System and method for providing offers for mobile devices.
  107. Grkov, Vance; Richardson, David; Mandal, Ayan; Mangat, Cherry; Mahaffey, Kevin, System and method for remotely-initiated audio communication.
  108. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, System and method for security data collection and analysis.
  109. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain characterization assessment.
  110. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment.
  111. Buck, Brian James; Mahaffey, Kevin Patrick; Yerra, Kesava Abhinav; LaMantia, Matthew John Joseph, System and method for uploading location information based on device movement.
  112. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for using context models to control operation of a mobile communications device.
  113. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on a comparison of locations.
  114. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on location.
  115. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for device broadcast of location information when battery is low.
  116. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for displaying location information of a device.
  117. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for locking and disabling a device in response to a request.
  118. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for remotely controlling a lost mobile communications device.
  119. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for transmitting a communication based on a device leaving or entering an area.
  120. Schneider, Janet; Wilson, Emily; Sadovsky, Vladimir; Alexander, Robin, Systems for finding a lost transient storage device.
  121. Schneider, Janet; Wilson, Emily; Sadovsky, Vladimir; Alexander, Robin, Systems for finding a lost transient storage device.
  122. Madsen, John J., Telemetric tracking of a portable computing device.
  123. Madsen, John J., Telemetric tracking of a portable computing device.
  124. Gventer, Brian; Nguyen, Ken; Asbury, Kevin; McCarty, Joel; Lowry, Mike, Testing device for removing customer personal information from an electronic device.
  125. Votaw, Elizabeth S.; Jones-McFadden, Alicia C., Tiered identification federated authentication network system.
  126. Votaw, Elizabeth S.; Jones-McFadden, Alicia C., Tiered identification federated authentication network system.
  127. Madsen, John J., Tracking location of portable computing device.
  128. Cockerill, Aaron; Richardson, David; Thanos, Daniel; Robinson, William Neil; Buck, Brian James; Mahaffey, Kevin Patrick, Use of device risk evaluation to manage access to services.
  129. Grigg, David M.; Burrell, Charles Jason; Bertanzetti, Peter John, User authentication based on FOB/indicia scan.
  130. Grigg, David M.; Burrell, Charles Jason; Bertanzetti, Peter John, User authentication based on FOB/indicia scan.
  131. Grigg, David M.; Burrell, Charles Jason; Bertanzetti, Peter John, User authentication based on fob/indicia scan.
  132. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
  133. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
  134. Grigg, David M.; Bertanzetti, Peter John; Toth, Michael E.; Hanson, Carrie Anne; Votaw, Elizabeth S., User authentication based on historical transaction data.
  135. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
  136. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
  137. Grigg, David M.; Bertanzetti, Peter John; Burrell, Charles Jason; Hanson, Carrie Anne; Johansen, Joseph Neil; Toth, Michael E.; Votaw, Elizabeth S., User authentication based on other applications.
  138. Mahaffey, Kevin; Buck, Brian James; Nguyen, Thomson Van, User classification based on data gathered from a computing device.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로