| 11210701 |
Dynamic content item creation |
Karen Yao, Nam Hoang Mai, Shu Niu, Beverly Yang Wong |
2021-12-28 |
| 10776435 |
Canonicalized online document sitelink generation |
Vaibhav Vaish, Venky Ramachandran, David Philip Sisson, Ramakrishnan Kandhan, Pramod Adiddam +1 more |
2020-09-15 |
| 10735552 |
Secondary transmissions of packetized data |
Vaibhav Vaish, Venky Ramachandran, David Philip Sisson, Ramakrishnan Kandhan, Pramod Adiddam +3 more |
2020-08-04 |
| 10678807 |
Generating real-time search results |
Brendan D. Burns, Lorenz Huelsbergen, Jeremy Hylton, Laramie Leavitt, Addy Ngan +3 more |
2020-06-09 |
| 10650066 |
Enhancing sitelinks with creative content |
Vaibhav Vaish, Venky Ramachandran, David Philip Sisson, Ramakrishnan Kandhan, Pramod Adiddam +1 more |
2020-05-12 |
| 9792336 |
Generating real-time search results |
Brendan D. Burns, Lorenz Huelsbergen, Jeremy Hylton, Laramie Leavitt, Addy Ngan +3 more |
2017-10-17 |
| 9507826 |
Generating real-time search results |
Brendan D. Burns, Lorenz Huelsbergen, Jeremy Hylton, Laramie Leavitt, Addy Ngan +3 more |
2016-11-29 |
| 9043319 |
Generating real-time search results |
Brendan D. Burns, Lorenz Huelsbergen, Jeremy Hylton, Laramie Leavitt, Addy Ngan +3 more |
2015-05-26 |
| 8244720 |
Ranking blog documents |
Andriy Bihun, Jason D. Goldman, Alex Khesin, Eduardo Morales, Jeff Reynar |
2012-08-14 |
| 7765209 |
Indexing and retrieval of blogs |
Alex Khesin, Andriy Bihun, Eduardo Morales, Jason D. Goldman, Jeff Reynar |
2010-07-27 |
| 6615263 |
Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access |
Dharmender Dulai, Benjamin F. Vitale, Bruce Alexander Zenel |
2003-09-02 |
| 6256739 |
Method and apparatus to determine user identity and limit access to a communications network |
Peter Skopp, Benjamin F. Vitale, Clifford S.C. Tse, Dharmender Dulai |
2001-07-03 |
| 6205479 |
Two-tier authentication system where clients first authenticate with independent service providers and then automatically exchange messages with a client controller to gain network access |
Dharmender Dulai, Benjamin F. Vitale, Bruce Alexander Zenel |
2001-03-20 |