| 12238075 |
Messaging based on trust levels and resource limitations in a mesh network |
Darin Byron Johnson, Zoltan Peter Kiss |
2025-02-25 |
| 12212556 |
Efficient transmission of compressed certificates in a low bandwidth mesh environment |
Zoltan Peter Kiss, Darin Byron Johnson |
2025-01-28 |
| 11843939 |
Secure messaging for outage events |
Darin Byron Johnson, Zoltan Peter Kiss |
2023-12-12 |
| 11838429 |
Certificate chain compression to extend node operational lifetime |
Keith Barnes, Garten HAESKA, Howard Neal Brace |
2023-12-05 |
| 11736451 |
Message broadcasting based on trust levels and resource limitations in a mesh network |
Darin Byron Johnson, Zoltan Peter Kiss |
2023-08-22 |
| 9935965 |
Establishing and using a trust level in mobile phones |
Gavin G. Bray, Chia-Le Cheng, Elizabeth M. Hughes |
2018-04-03 |
| 9857949 |
Generating a context for translating strings based on associated application source code and markup |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2018-01-02 |
| 9756054 |
Establishing and using a trust level in mobile phones |
Gavin G. Bray, Chia-Le Cheng, Elizabeth M. Hughes |
2017-09-05 |
| 9747150 |
Two stage log normalization |
Phillip A. J. Cooper, Jevon J. C. Hill, Fiona L. Lam |
2017-08-29 |
| 9720900 |
Automated validation of the appearance of graphical user interfaces |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2017-08-01 |
| 9720908 |
Generating a context for translating strings based on associated application source code and markup |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2017-08-01 |
| 9703770 |
Automated validation of the appearance of graphical user interfaces |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2017-07-11 |
| 9684983 |
Three dimensional visualization of big data |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2017-06-20 |
| 9594618 |
Two stage log normalization |
Phillip A. J. Cooper, Jevon J. C. Hill, Fiona L. Lam |
2017-03-14 |
| 9519535 |
Two stage log normalization |
Phillip A. J. Cooper, Jevon J. C. Hill, Fiona L. Lam |
2016-12-13 |
| 9501471 |
Generating a context for translating strings based on associated application source code and markup |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2016-11-22 |
| 9436679 |
Generating a context for translating strings based on associated application source code and markup |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2016-09-06 |
| 9411672 |
Two stage log normalization |
Phillip A. J. Cooper, Jevon J. C. Hill, Fiona L. Lam |
2016-08-09 |
| 9372725 |
Dynamically adjusting wait periods according to system performance |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2016-06-21 |
| 9317401 |
Prioritizing test cases using multiple variables |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2016-04-19 |
| 9311223 |
Prioritizing test cases using multiple variables |
Timothy S. Bartley, Gavin G. Bray, Elizabeth M. Hughes |
2016-04-12 |
| 9134983 |
Uniquely identifying a machine |
Gavin G. Bray, Elizabeth M. Hughes |
2015-09-15 |
| 8347094 |
Securing wireless body sensor networks using physiological data |
— |
2013-01-01 |
| 8345879 |
Securing wireless body sensor networks using physiological data |
— |
2013-01-01 |
| 8291220 |
Securing wireless body sensor networks using physiological values for nonces |
— |
2012-10-16 |