| 9825967 |
Behavioral fingerprinting via social networking interaction |
Marc E. Davis, Matthew G. Dyor, Xuedong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2017-11-21 |
| 9813445 |
Taint injection and tracking |
Andrew F. Glew, Clarence T. Tegreene |
2017-11-07 |
| 9798873 |
Processor operable to ensure code integrity |
Andrew F. Glew, Clarence T. Tegreene |
2017-10-24 |
| 9794544 |
Unauthorized viewer detection system and method |
Alistair K. Chan, William D. Duncan, William Gates, Pablos Holman, Roderick A. Hyde +10 more |
2017-10-17 |
| 9734369 |
Systems and methods for scanning a user environment and evaluating data of interest |
William Gates, Pablos Holman, Roderick A. Hyde, Muriel Y. Ishikawa, Edward K.Y. Jung +11 more |
2017-08-15 |
| 9729549 |
Behavioral fingerprinting with adaptive development |
Marc E. Davis, Matthew G. Dyor, Xeudong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2017-08-08 |
| 9621404 |
Behavioral fingerprinting with social networking |
Marc E. Davis, Matthew G. Dyor, Xeudong Huang, Roderick A. Hyde, Royce A. Levien +5 more |
2017-04-11 |
| 9575903 |
Security perimeter |
Andrew F. Glew, Clarence T. Tegreene |
2017-02-21 |
| 9558034 |
Entitlement vector for managing resource allocation |
Andrew F. Glew, Clarence T. Tegreene |
2017-01-31 |