| 11228615 |
Transparent enforcement of data policies |
Scott Daniel Wisniewski, David Lucey, Xiongjian Fu |
2022-01-18 |
| 11057359 |
Key encryption key rotation |
Scott Daniel Wisniewski, Xiongjian Fu, Harish Krishnamurthy |
2021-07-06 |
| 10956600 |
Highly available encryption framework for multiple different computing environments |
Lei Ye, Vineet Chaudhary, Xiongjian Fu |
2021-03-23 |
| 10673520 |
Cellular command, control and application platform for unmanned aerial vehicles |
Warren Westrup, Joe Cozzarelli, Eric T. Ringer, Derek Wade Ohlarik, Mauricio Pati Caldeira De Andrada +1 more |
2020-06-02 |
| 9883435 |
Soft handover for a voice over internet protocol service |
Derek Wade Ohlarik, Mauricio Pati Caldeira de Andrada |
2018-01-30 |
| 9712410 |
Local metrics in a service provider environment |
Hanson Char, Wade A. Matveyenko, Jason Fulghum, Manikandan Subramanian |
2017-07-18 |
| 9668140 |
Devaluation of lost and stolen devices |
Marlene Kay Enright, Balaji L. Raghavachari, Erel Tal |
2017-05-30 |
| 9338404 |
Communication in a virtual reality environment |
Christian Egeler |
2016-05-10 |
| 9198024 |
Remote device activation |
Mohammad Raheel Khalid, Samir S. Vaidya, Marlene Kay Enright, Shiva Narayanabhatla, Rosemary McNally +8 more |
2015-11-24 |
| 8406761 |
Initializing and provisioning user equipment having multi-network connectivity |
David William Buehler, Daniel Murphy, Lipsa S. Goswamy, Phillip A. Ritter |
2013-03-26 |
| 8135934 |
Dynamically allocating limited system memory for DMA among multiple adapters |
Colin R. Devilbiss, Wayne Gustav Holm, Kristopher C. Whitney |
2012-03-13 |
| 7600676 |
Two factor authentications for financial transactions |
Steven R. Rados, Renato J. Delatorre, Jess Germansky, Steven Werden, Hasan Dossal |
2009-10-13 |
| 4272273 |
Plunger mechanism for glassware forming machine |
Albert J. Trahan, Bruce R. Beckwith |
1981-06-09 |