2 patents
Utility
Monitoring information-security coverage to identify an exploitable weakness in the information-security coverage
16 Feb 21
Systems and methods are provided for monitoring information-security coverage to identify a vulnerability or risk in the information-security coverage.
Stuart Sloan, Aleksey Vladimirovich Rogozhin, Glenn Bernstein, Jesse Daniel Bikman
Filed: 27 Jul 18
Utility
In-line verification of transactions
28 Dec 20
A transaction system can include a notary system and an interceptor for providing security in connection with processing a transaction.
Amy Rose, David Stone, Scott Travis Leith, William Mark Connolly
Filed: 12 May 19
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first