| 10133775 |
Run time prediction for data queries |
Ramanathan Muthiah |
2018-11-20 |
| 10043152 |
Facilitation of lost item return and item inventory |
Ruth Landon Chin, Bhavnish H. Lathia, Austin E. Wilson |
2018-08-07 |
| 10038729 |
Cooperative network access |
Jesper Mikael Johansson, Bhavnish H. Lathia |
2018-07-31 |
| 10007767 |
System and method for securing tenant data on a local appliance prior to delivery to a SaaS data center hosted application service |
Zahid N. Ahmed, Andrew Wilson Homer |
2018-06-26 |
| 10009355 |
Bootstrapping user authentication on devices |
Jesper Mikael Johansson, Bharath Kumar Bhimanaik |
2018-06-26 |
| 9990507 |
Adapting decoy data present in a network |
Jesper Mikael Johansson, James C. Petts, Dominique Imjya Brezinski |
2018-06-05 |
| 9973495 |
Bootstrapping user authentication |
Jesper Mikael Johansson, Bharath Kumar Bhimanaik |
2018-05-15 |
| 9946867 |
Input mirroring |
Zachary Damen Wolfe, Darren Ernest Canavor, Brian Nhu Dang, Max Harwell Funderburk, Jesper Mikael Johansson +3 more |
2018-04-17 |
| 9916608 |
User profile and geolocation for efficient transactions |
Michael Carr, Paul J. Walsh |
2018-03-13 |
| 9912517 |
Optimized deployment and execution of programs in a distributed computing environment |
Bhavnish H. Lathia, Kyle Bradley Peterson, Leon Robert Warman |
2018-03-06 |
| 9876645 |
Tamper detection for hardware devices |
Jesper Mikael Johansson, Jon Arron McClintock |
2018-01-23 |