Issued Patents All Time
Showing 176–200 of 214 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 8719605 | Method for detecting a trigger to a program not actively being reviewed by the user and performing a power saving action without placing the device as a whole into a sleep state | Al Chakra, Liam Harpur, John Rice | 2014-05-06 |
| 8656124 | Managing backup relationships in a data storage system | Amir Sasson, Eli Malul, Shachar Fienblit | 2014-02-18 |
| 8607330 | Orderly change between new and old passwords | Rhonda L. Childress, Julianne Frances Haugh | 2013-12-10 |
| 8589882 | Analyzing computer code development actions and process | Moran Shochat, Aviad Zlotnick, Shmuel Ur | 2013-11-19 |
| 8572137 | Data de-duplication in a distributed network | Shachar Fienblit, Evgeny Schmeilin, Aviad Zlotnick | 2013-10-29 |
| 8473294 | Skipping radio/television program segments | Hagai Aronowitz, Ron Hoory | 2013-06-25 |
| 8392516 | Displaying email messages based on response time trends | Lisa Seacat DeLuca, Ohad Greenshpan, Boaz Mizrachi | 2013-03-05 |
| 8392966 | Limiting the availability of computational resources to a device to stimulate a user of the device to apply necessary updates | Nicholas D. Fifer, Ilan Gayda, Boaz Mizrachi, Uri Silbershtein | 2013-03-05 |
| 8375093 | Retaining email response time trends | Lisa Seacat DeLuca, Ohad Greenshpan, Boaz Mizrachi | 2013-02-12 |
| 8370925 | User policy manageable strength-based password aging | Rhonda L. Childress, Moriel Lechtman, Yotam Medini | 2013-02-05 |
| 8365245 | Previous password based authentication | Rhonda L. Childress, David Bruce Kumhyr, Moriel Lechtman | 2013-01-29 |
| 8326999 | Creating context-sensitive webpage time-out intervals | Channing W. Fell, Jr., Julianne Frances Haugh | 2012-12-04 |
| 8312089 | Apparatus, system, and method for email response time estimation based on a set of recipients | Lisa Seacat DeLuca, Ohad Greenshpan, Boaz Mizrachi | 2012-11-13 |
| 8296376 | Utilizing E-mail response time statistics for more efficient and effective user communication | Bruce A. Kahn, Boaz Mizrachi, Michael R. O'Brien | 2012-10-23 |
| 8260333 | Consolidating international short message service messages destined to multiple recipients | Miron Horodi, Ruthie D. Lyle, Kenneth Nagin, Gilad Sharaby | 2012-09-04 |
| 8249872 | Skipping radio/television program segments | Hagai Aronowitz, Ron Hoory | 2012-08-21 |
| 8214442 | Facilitating an extended IM session in a secure way | Barbara Finkelstein, Boaz Mizrachi, Vladimir Soroka | 2012-07-03 |
| 8196046 | Parallel visual radio station selection | Barbara Finkelstein, Ron Hoory, Boaz Mizrachi | 2012-06-05 |
| 8181173 | Determining priority for installing a patch into multiple patch recipients of a network | Rhonda L. Childress, David Bruce Kumhyr, Stephen James Watt | 2012-05-15 |
| 8181068 | Apparatus for and method of life-time test coverage for executable code | Daniel Citron, Moshe Klausner, Marcel Zalmanovici | 2012-05-15 |
| 8171530 | Computer access security | — | 2012-05-01 |
| 8095569 | Customized context menu for files based on their content | Ohad Greenshpan, Jonathan Mamou, Shmuel Ben-Yehuda | 2012-01-10 |
| 8019845 | Service delivery using profile based management | Rhonda L. Childress, Lorraine M. Herger, Ziv Rafalovich, Ramakrishnan Rajamony, Eric Van Hensbergen +1 more | 2011-09-13 |
| 7971200 | Transparent recovery of self-sustained code-upgrade | Ilan Gayda, Kenneth Nagin, Nicholas D. Fifer | 2011-06-28 |
| 7930754 | Method for concealing user identities on computer systems through the use of temporary aliases | Julianne Frances Haugh | 2011-04-19 |