| 11741197 |
Obfuscating programs using different instruction set architectures |
Kevin Gibbons |
2023-08-29 |
| 11647036 |
Advanced interstitial techniques for web security |
Tim Disney, Nitish Khadke |
2023-05-09 |
| 11349816 |
Obfuscating source code sent, from a server computer, to a browser on a client computer |
Kevin Gibbons, Tim Disney |
2022-05-31 |
| 11329999 |
Determining environment parameter values using rendered emoji analysis |
Kevin Gibbons |
2022-05-10 |
| 11103205 |
Bedside dynamic imaging |
Dennis J. O'Dea, Xiaohui Wang, Samuel Richard, Joseph E. Stagnitto, Michael C. Lalena +1 more |
2021-08-31 |
| 10855696 |
Variable runtime transpilation |
Jarrod Overson, Ariya Hidayat, Bei Zhang, Justin D. Call |
2020-12-01 |
| 10834101 |
Applying bytecode obfuscation techniques to programs written in an interpreted language |
Kevin Gibbons |
2020-11-10 |
| 10567363 |
Deterministic reproduction of system state using seeded pseudo-random number generators |
— |
2020-02-18 |
| 10212173 |
Deterministic reproduction of client/server computer state or output sent to one or more client computers |
— |
2019-02-19 |
| 9917850 |
Deterministic reproduction of client/server computer state or output sent to one or more client computers |
— |
2018-03-13 |