| 11366903 |
Systems and methods to mitigate stalkerware by rendering it useless |
Arif Mohammed Shaikh |
2022-06-21 |
| 10462091 |
Systems and methods for reporting the attempted transmission of sensitive information |
— |
2019-10-29 |
| 10320940 |
Managing generic data |
James E. Brennan |
2019-06-11 |
| 9692776 |
Systems and methods for evaluating content provided to users via user interfaces |
— |
2017-06-27 |
| 9615193 |
Systems and methods for managing launch activities on a mobile device |
— |
2017-04-04 |
| 9460706 |
Systems and methods for executing anti-theft procedures for a device |
— |
2016-10-04 |
| 9450764 |
Systems and methods for validating self-signed certificates |
— |
2016-09-20 |
| 9323518 |
Systems and methods for modifying applications without user input |
Ming-Yu Chen, Hai Zhao |
2016-04-26 |
| 9311317 |
Injecting custom data into files in zip format containing apps, without unzipping, resigning or re-zipping the files |
— |
2016-04-12 |
| 9313218 |
Systems and methods for providing information identifying the trustworthiness of applications on application distribution platforms |
— |
2016-04-12 |
| 9258318 |
Systems and methods for informing users about applications available for download |
— |
2016-02-09 |
| 9104519 |
Provisioning partner aware apps on sandboxed operating systems |
Keith Newstadt, Petrus Johannes Viljoen |
2015-08-11 |
| 9065845 |
Detecting misuse of trusted seals |
— |
2015-06-23 |
| 9009819 |
Method and system for detecting rogue security software that displays frequent misleading warnings |
— |
2015-04-14 |
| 8959609 |
Out-of-app based partner aware user authentication |
Keith Newstadt, Petrus Johannes Viljoen |
2015-02-17 |
| 8914767 |
Systems and methods for using quick response codes to activate software applications |
Gaurav Chandna, Garret Polk |
2014-12-16 |
| 8732662 |
Adaptive user interface and application features based on user experience level |
— |
2014-05-20 |
| 8646072 |
Detecting misuse of trusted seals |
— |
2014-02-04 |