| 10372473 |
Sensor virtualization through cloud storage and retrieval mechanisms |
Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Michael Elton Nidd +1 more |
2019-08-06 |
| 9304511 |
Sensor virtualization through cloud storage and retrieval mechanisms |
Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Michael Elton Nidd +1 more |
2016-04-05 |
| 9256222 |
Sensor virtualization through cloud storage and retrieval mechanisms |
Marion L. Blount, Metin Feridun, Suzanne K. McIntosh, Iqbal I. Mohomed, Michael Elton Nidd +1 more |
2016-02-09 |
| 9250942 |
Hardware emulation using on-the-fly virtualization |
Martim Carbone, Bernhard Jansen, HariGovind V. Ramasamy, Matthias Schunter, Diego M. Zamboni |
2016-02-02 |
| 9170961 |
Location of computing assets within an organization |
Rajarshi Das, Metin Feridun, Canturk Isci, Jonathan Lenchner, Suzanne K. McIntosh +2 more |
2015-10-27 |
| 9170960 |
Location of computing assets within an organization |
Rajarshi Das, Metin Feridun, Canturk Isci, Jonathan Lenchner, Suzanne K. McIntosh +2 more |
2015-10-27 |
| 8875272 |
Firewall for controlling connections between a client machine and a network |
Bernhard Jansen |
2014-10-28 |
| 8689007 |
Integrity protection in data processing systems |
Matthias Schunter, Bernhard Jansen |
2014-04-01 |
| 8516564 |
Secure user interaction using virtualization |
Bernhard Jansen, Matthias Schunter, Diego M. Zamboni |
2013-08-20 |
| 8276201 |
Integrity protection in data processing systems |
Matthias Schunter, Bernhard Jansen |
2012-09-25 |