| 12158911 |
Virtual library |
Matthew J. Dickoff, Jessica Aranda, Patrick L. Coffman, Stephen J. Rhee, Nicole R. Ryan +3 more |
2024-12-03 |
| 11620329 |
Virtual photos library |
Matthew J. Dickoff, Jessica Aranda, Patrick L. Coffman, Stephen J. Rhee, Nicole R. Ryan +3 more |
2023-04-04 |
| 11514157 |
Multi-user device |
Andrew S. Terry, Kelly B. Yancey, Pierre-Olivier J. Martel, Timothy P. Hannon, Alastair K. Fettes |
2022-11-29 |
| 11487890 |
Third-party access of end-user device assets |
Gavin B. Thomson, Patrick L. Coffman |
2022-11-01 |
| 11055438 |
Methods for restricting resources used by a program based on entitlements |
Ivan Krstic, Austin G. Jennings |
2021-07-06 |
| 11017109 |
Dynamic sandboxing of user data |
Kelly B. Yancey, Richard James Cooper, Pierre-Olivier J. Martel, David P. Remahl, Jonathan A. Zdziarski |
2021-05-25 |
| 10628580 |
Containers shared by multiple users of a device |
Andrew S. Terry, Kelly B. Yancey, Pierre-Olivier J. Martel, Timothy P. Hannon, Alastair K. Fettes |
2020-04-21 |
| 10216928 |
Methods for restricting resources used by an application based on a base profile and an application specific profile |
Pierre-Olivier J. Martel, Kelly B. Yancey |
2019-02-26 |
| 10019598 |
Dynamic service discovery |
Kevin J. Van Vechten, Damien P. Sorresso, Ivan Krstic |
2018-07-10 |
| 9734327 |
Methods for restricting resources used by an application based on a base profile and an application specific profile |
Pierre-Olivier J. Martel, Kelly B. Yancey |
2017-08-15 |
| 9361454 |
Methods for restricting resources used by an application based on a base profile and an application specific profile |
Pierre-Olivier J. Martel, Kelly B. Yancey |
2016-06-07 |
| 9280644 |
Methods for restricting resources used by a program based on entitlements |
Ivan Krstic, Austin G. Jennings |
2016-03-08 |
| 9189300 |
Dynamic service discovery |
Kevin J. Van Vechten, Damien P. Sorresso, Ivan Krstic |
2015-11-17 |
| 8671416 |
Dynamic service discovery |
Kevin J. Van Vechten, Damien P. Sorresso, Ivan Krstic |
2014-03-11 |
| 8473961 |
Methods to generate security profile for restricting resources used by a program based on entitlements of the program |
Ivan Krstic, Austin G. Jennings |
2013-06-25 |