| 9171546 |
Performing functions based on commands in context of telephonic communication |
— |
2015-10-27 |
| 9116992 |
Providing time series information with search results |
Luigi Semenzato |
2015-08-25 |
| 9026859 |
Safer mechanism for using pointers to code |
— |
2015-05-05 |
| 8875288 |
Taint tracking mechanism for computer security |
Edward N. Leake |
2014-10-28 |
| 8819822 |
Security method for detecting intrusions that exploit misinterpretation of supplied data |
Edward N. Leake |
2014-08-26 |
| 8775748 |
Method and system for tracking data correspondences |
Osten Kit Colbert |
2014-07-08 |
| 8745741 |
Detecting and handling vtable pointer corruption |
Caroline Tice, Ulfar Erlingsson, Lawrence Alan Crowl, Cary A. Coutant, Xinliang David Li +2 more |
2014-06-03 |
| 8621607 |
Computational system including mechanisms for tracking taint |
— |
2013-12-31 |
| 8510827 |
Taint tracking mechanism for computer security |
Edward N. Leake |
2013-08-13 |
| 8468310 |
Method and system for tracking data correspondences |
Osten Kit Colbert |
2013-06-18 |
| 8326836 |
Providing time series information with search results |
Luigi Semenzato |
2012-12-04 |
| 8141163 |
Malicious code detection |
— |
2012-03-20 |
| 7958558 |
Computational system including mechanisms for tracking propagation of information with aging |
Edward N. Leake |
2011-06-07 |
| D322822 |
Toy animal |
David Yardley |
1991-12-31 |