| 12430409 |
Third party based pirated copy tracing |
Xian Zhang, Xiaobing Guo, Yang Chen, Zhongxin Guo, Qiufeng Yin +2 more |
2025-09-30 |
| 12327322 |
System and method for workplace safety management |
Wei Wang, Wei Chen |
2025-06-10 |
| 12126523 |
Method for multiplexing HTTP channels and terminal |
Hao Wang, Zheng Hu, Chenren Xu, Xingmin Guo, Xiaojin Harry Li |
2024-10-22 |
| 11736224 |
Data transmission method and electronic device |
Hao Wang, Chenren Xu, Jianfeng QI, Henghui Liang, Xiaojin Harry Li +2 more |
2023-08-22 |
| 11412437 |
Data transmission method and electronic device |
Hao Wang, Fanzhao Wang, Jianfeng QI, Xingmin Guo |
2022-08-09 |
| D875926 |
Portable substance container with applicator |
Tom Lee |
2020-02-18 |
| 10380008 |
Identifying implicit assumptions associated with a software product |
Rui WANG, Yuchen Zhou, Shaz Qadeer, Yuri Gurevich |
2019-08-13 |
| 9825971 |
Anonymous server based user settings protection |
Zhenbin Xu, Boxin Li |
2017-11-21 |
| 9372785 |
Identifying implicit assumptions associated with a software product |
Rui WANG, Yuchen Zhou, Shaz Qadeer, Yuri Gurevich |
2016-06-21 |
| 8782797 |
Lockbox for mitigating same origin policy failures |
Jiahe Helen Wang, Xiaofeng Fan |
2014-07-15 |
| 8700705 |
Sharing of user preferences |
George Danezis, Tuomas Aura, Emre Mehmet Kiciman |
2014-04-15 |
| 8621495 |
Methods and apparatus for securing frames from other frames |
David Andrew Ross, Yi-Min Wang |
2013-12-31 |
| 8539585 |
Systematic approach to uncover visual ambiguity vulnerabilities |
Ralf Sasse, Jiahe Helen Wang, Yi-Min Wang |
2013-09-17 |
| 8156559 |
Systematic approach to uncover GUI logic flaws |
Jose Meseguer, Ralf Sasse, Jiahe Helen Wang, Yi-Min Wang |
2012-04-10 |
| 8125669 |
Systematic approach to uncover GUI logic flaws |
Yi-Min Wang, Jiahe Helen Wang |
2012-02-28 |
| 7784101 |
Identifying dependencies of an application upon a given security context |
Chad Verbowski, John D. Dungan, Yi-Min Wang |
2010-08-24 |
| 7779480 |
Identifying dependencies of an application upon a given security context |
Chad Verbowski, John Dunagan, Yi-Min Wang |
2010-08-17 |
| 7636237 |
Intelligent locking device, removable HDD receiving system with the same and method for preventing the removable HDD from being wrongly ejected therefrom |
KwokChiu Cheung, Shuguang Li, Jianwei Zhu, Yi Wan, ChangLong Deng +4 more |
2009-12-22 |
| 7620995 |
Identifying dependencies of an application upon a given security context |
Chad Verbowski, John Dunagan, Yi-Min Wang |
2009-11-17 |