Issued Patents All Time
Showing 25 most recent of 29 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 10582256 | Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform | Ramesh Pendakur, Walter C. Gintz, Daniel Nemiroff | 2020-03-03 |
| 10028010 | Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform | Ramesh Pendakur, Walter C. Gintz, Daniel Nemiroff | 2018-07-17 |
| 9990473 | Method and apparatus for policy-based content sharing in a peer to peer manner using a hardware based root of trust | Mojtaba Mirashrafi, Ramesh Pendakur, Daniel Nemiroff | 2018-06-05 |
| 9614827 | Secure user presence detection and authentication | Mojtaba Mirashrafi, Gyan Prakash | 2017-04-04 |
| 9590848 | Cloud based virtual mobile device | Gyan Prakash, Mojtaba Mirashrafi, Jiphun C. Satapathy | 2017-03-07 |
| 9337999 | Application usage continuum across platforms | Naveed Iqbal, Jiphun C. Satapathy, Mojtaba Mirashrafi, Walter C. Gintz | 2016-05-10 |
| 8850220 | Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices | Gyan Prakash, Selim Aissi, Jasmeet Chhabra | 2014-09-30 |
| 8782398 | Secure user presence detection and authentication | Mojtaba Mirashrafi, Gyan Prakash | 2014-07-15 |
| 8682750 | Method and apparatus for enabling purchase of or information requests for objects in digital content | Mojtaba Mirashrafi, Ramesh Pendakur | 2014-03-25 |
| 8625788 | Method and apparatus for building a hardware root of trust and providing protected content processing within an open computing platform | Ramesh Pendakur, Walter C. Gintz, Daniel Nemiroff | 2014-01-07 |
| 8566610 | Methods and apparatus for restoration of an anti-theft platform | Gyan Prakash, Saurabh Dadu, Mojtaba Mirashrafi, Duncan Glendinning | 2013-10-22 |
| 8555044 | System and method to lock electronic device | Gyan Prakash, Duncan Glendinning, Saurabh Dadu, Mojtaba Mirashrafi, Carol A. Bell | 2013-10-08 |
| 8490189 | Using chipset-based protected firmware for host software tamper detection and protection | Gyan Prakash, Saurabh Dadu, Hormuzd M. Khosravi | 2013-07-16 |
| 8403998 | Method and apparatus for connection—and network—network-independent on-line and off-line theft-management protocol and service for processor based devices | Gyan Prakash, Carol A. Bell, Selim Aissi | 2013-03-26 |
| 8346305 | Theft deterrent techniques and secure mobile platform subscription for wirelessly enabled mobile devices | Duncan Glendinning, Mojtaba Mirashrafi, Saurabh Dadu, Gyan Prakash, Carol A. Bell | 2013-01-01 |
| 8296554 | Pre-boot recovery of a locked computer system | Mojtaba Mirashrafi, Gyan Prakash, Saurabh Dadu | 2012-10-23 |
| 8181032 | Method and apparatus with chipset-based protection for local and remote authentication of booting from peripheral devices | Gyan Prakash, Selim Aissi, Jasmeet Chhabra | 2012-05-15 |
| 8140087 | Techniques for always on always connected operation of mobile platforms using network interface cards | Liuyang Yang, Marc Jalfon, Mandar Joshi, James Tsai, Carol A. Bell +1 more | 2012-03-20 |
| 8085695 | Bootstrapping devices using automatic configuration services | Nandakishore Kushalnagar, Jasmeet Chharba, Lakshman Krishnamurthy | 2011-12-27 |
| 7869809 | Radio resource measurement and estimation | Emily H. Qi, W. Steven Conner | 2011-01-11 |
| 7733772 | Dynamic selection of communication links in a mixed network | Pravin Mane, Rik Logan | 2010-06-08 |
| 7676231 | Methods and apparatus for selecting communication channels based on channel load information | Mustafa Demirhan, Hsin-Yuo Liu, Nandakishore Kushalnagar | 2010-03-09 |
| 7594007 | Distributed service management for distributed networks | Nandakishore Kushalnagar | 2009-09-22 |
| 7580364 | Apparatus, system and method capable of recovering from disjoint clusters in an mesh network | Mustafa Demirhan, Nandakishore Kushalnagar | 2009-08-25 |
| 7574176 | Channel selection in a wireless network | Nandakishore Kushalnagar, Mustafa Demirhan, Jasmeet Chhabra | 2009-08-11 |