| 9519756 |
Managing policy and permissions profiles |
Hadas Bitran, Haim Somech, Ho John Lee, Allen Geoffrey Jones, Oded Nahir +1 more |
2016-12-13 |
| 9519717 |
Content customization with security for client preferences |
Gur Kimchi, Matthew G. Dyor, Lili Cheng, Richard Qian, Steven William Macbeth |
2016-12-13 |
| 9507778 |
Summarization of media object collections |
Alexander B. Jaffe, Mor Naaman |
2016-11-29 |
| 9491146 |
Computational systems and methods for encrypting data for anonymous storage |
Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung +12 more |
2016-11-08 |
| 9477969 |
Automatic feed creation for non-feed enabled information objects |
Marco Boerries, Edward Stanley Ott, IV, Keith David Saft, Amit Kumar, Erik Nis Jessen +4 more |
2016-10-25 |
| 9473647 |
Computational systems and methods for identifying a communications partner |
Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung +12 more |
2016-10-18 |
| 9467808 |
Time code validation and correction for proximity-based ad hoc networks |
Joseph O'Sullivan, Christopher T. Paretti, Christopher William Higgins |
2016-10-11 |
| 9432190 |
Computational systems and methods for double-encrypting data for subsequent anonymous storage |
Matthew G. Dyor, William Gates, Xuedong Huang, Roderick A. Hyde, Edward K.Y. Jung +12 more |
2016-08-30 |
| 9400987 |
System and method for deriving income from URL based context queries |
Rahul Nair, Christopher William Higgins, Simon P. King |
2016-07-26 |
| 9390396 |
Bootstrapping social networks using augmented peer to peer distributions of social networking services |
Stig Gustav Viktor Söderström, Carl Olof Daniel Malmkvist, Per Staffan Andreas Nordin |
2016-07-12 |
| 9363361 |
Conduct and context relationships in mobile devices |
Gur Kimchi, Matthew G. Dyor, Eric J. Horvitz |
2016-06-07 |
| 9355185 |
Infinite browse |
Yookyung Kim, Hongjian Zhao, Xin Li, Alexandra Levich, Tom Chi +2 more |
2016-05-31 |
| 9348985 |
Behavioral fingerprint controlled automatic task determination |
Matthew G. Dyor, Daniel A. Gerrity, Xuedong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2016-05-24 |
| 9298900 |
Behavioral fingerprinting via inferred personal relation |
Matthew G. Dyor, Daniel A. Gerrity, Xeudong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2016-03-29 |
| 9270679 |
Dynamic access control lists |
Chris Higgins, Simon P. King |
2016-02-23 |
| 9262764 |
Modification of content representation by a brand engine in a social network |
Robert Carter Trout, Christopher William Higgins, Joseph O'Sullivan, Ronald Martinez |
2016-02-16 |
| 9251252 |
Context server for associating information based on context |
Mor Naaman |
2016-02-02 |