| 12393726 |
Technologies for presenting public and private images |
John C. Weast |
2025-08-19 |
| 11853458 |
Technologies for presenting public and private images |
John C. Weast |
2023-12-26 |
| 10380375 |
Technologies for presenting public and private images |
John C. Weast |
2019-08-13 |
| 10181052 |
Notification of contact status of remote user |
Hong Li, Sharad K. Garg, Mark D. Yarvis |
2019-01-15 |
| 10121122 |
Tracking transactions by confluences and sequences of RFID signals |
Ryan Scott Russell, Wesley Scott Lauka, Ned Lecky |
2018-11-06 |
| 10055784 |
In-stream pivoting search results |
Kristopher William Bell, Wesley Scott Lauka |
2018-08-21 |
| 10042445 |
Adaptive display of user interface elements based on proximity sensing |
— |
2018-08-07 |
| 9928413 |
Techniques for user authentication on a computing device via pattern recognition |
Jim S. Baca, David Stanasolovich, Mark H. Price, Tobias M. Kohlenberg |
2018-03-27 |
| 9898143 |
Predicting touch events to improve touchscreen usage accuracy |
Geoff Schreiber, Mark E. Sprenger, Paul J. Gwin |
2018-02-20 |
| 9798000 |
System and method for indoor geolocation and mapping |
Paul J. Gwin, Ayeshwarya B. Mahajan, Geoff Schreiber, Mark E. Sprenger |
2017-10-24 |
| 9690334 |
Adaptive visual output based on change in distance of a mobile device to a user |
Don G. Myers, Sudip S. Chahal, David Stanasolovich |
2017-06-27 |
| 9628585 |
Systems and methods for cross-layer secure connection set up |
Michelle X. Gong |
2017-04-18 |
| 9626270 |
Link retraining based on runtime performance characteristics |
Duane Heller |
2017-04-18 |
| 9521126 |
Processing data privately in the cloud |
Mark D. Yarvis, Sharad K. Garg, Hong Li |
2016-12-13 |
| D774033 |
Keypad |
Kimberly Anne Lewis, Thomas Matthew Ryle, Ryan Scott Russell, Justin David Kelly, Michael Keith Lemmon +2 more |
2016-12-13 |
| 9494680 |
Radar based interpretation of 3D codes |
Geoff Schreiber, Paul J. Gwin, Mark E. Sprenger |
2016-11-15 |
| 9461927 |
Method, device, and system for delaying packets during a network-triggered wake of a computing device |
— |
2016-10-04 |
| 9449295 |
Tracking transactions by confluences and sequences of RFID signals |
Ryan Scott Russell, Wesley Scott Lauka, Ned Lecky |
2016-09-20 |
| 9450961 |
Mechanism for facilitating dynamic adjustments to computing device characteristics in response to changes in user viewing patterns |
David Stanasolovich, Don G. Meyers, Sudip S. Chahai |
2016-09-20 |
| D757068 |
Display screen having a graphical user interface for packing items |
Kimberly Anne Lewis, Jamie Marie Holland, Justin David Kelly, Ryan Scott Russell, Kathryn Storm |
2016-05-24 |
| 9177173 |
Handling repeated requests for the same user data |
Lily Kolle, Don G. Meyers, David Stanasolovich, Sudip S. Chahal |
2015-11-03 |
| 9117382 |
Device and method for automatic viewing perspective correction |
Don G. Meyers, David Stanasolovich, Sudip S. Chahal |
2015-08-25 |
| 9015523 |
Memory allocation for virtual machines using memory map |
Sudip S. Chahal, Mohan J. Kumar, Don G. Meyers, David Stanasolovich |
2015-04-21 |
| 8955746 |
Providing a locking technique for electronic displays |
Don G. Meyers, David Stanasolovich, Sudip S. Chahal |
2015-02-17 |
| 8347285 |
Embedded agent for self-healing software |
Robert A. Branch |
2013-01-01 |