| 9477864 |
Systems and methods for scanning a user environment and evaluating data of interest |
William Gates, Pablos Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung +11 more |
2016-10-25 |
| 9471373 |
Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
Andrew F. Glew, Clarence T. Tegreene |
2016-10-18 |
| 9465657 |
Entitlement vector for library usage in managing resource allocation and scheduling based on usage and priority |
Andrew F. Glew, Clarence T. Tegreene |
2016-10-11 |
| 9460290 |
Conditional security response using taint vector monitoring |
Andrew F. Glew, Clarence T. Tegreene |
2016-10-04 |
| 9443085 |
Intrusion detection using taint accumulation |
Andrew F. Glew, Clarence T. Tegreene |
2016-09-13 |
| 9348985 |
Behavioral fingerprint controlled automatic task determination |
Marc E. Davis, Matthew G. Dyor, Xuedong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2016-05-24 |
| 9300994 |
Methods and systems for viewing dynamically customized audio-visual content |
William Gates, Paul Holman, Roderick A. Hyde, Edward K.Y. Jung, Jordin T. Kare +9 more |
2016-03-29 |
| 9298918 |
Taint injection and tracking |
Andrew F. Glew, Clarence T. Tegreene |
2016-03-29 |
| 9298900 |
Behavioral fingerprinting via inferred personal relation |
Marc E. Davis, Matthew G. Dyor, Xeudong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2016-03-29 |
| 9235571 |
Systems and methods for scanning a user environment and evaluating data of interest |
William Gates, Pablos Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung +11 more |
2016-01-12 |
| 9230261 |
Systems and methods for scanning a user environment and evaluating data of interest |
William Gates, Paul Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung +11 more |
2016-01-05 |