| 10771736 |
Compositing and transmitting contextual information during an audio or video call |
Kori Inkpen, Sasa Junuzovic, Seungwon Kim, Aaron Hoff, John C. Tang +1 more |
2020-09-08 |
| 10635476 |
Cloud architecture for automated testing |
William R. Blum, Patrice Godefroid |
2020-04-28 |
| 9946354 |
Gesture processing using a domain-specific gesture language |
Benjamin Livshits, Margus Veanes, Loris D'Antoni, Lucas S. Figueiredo |
2018-04-17 |
| 9882923 |
Automatic context-sensitive sanitization |
Benjamin Livshits, Patrice Godefroid, Prateek Saxena |
2018-01-30 |
| 9697365 |
World-driven access control using trusted certificates |
Tadayoshi Kohno, Alexander Moshchuk, Franziska Roesner, Jiahe Helen Wang |
2017-07-04 |
| 9679144 |
Protecting privacy in web-based immersive augmented reality |
John Vilk, Eyal Ofek, Alexander Moshchuk, Jiahe Helen Wang, Ran Gal +4 more |
2017-06-13 |
| 9619654 |
Application monitoring through collective record and replay |
Brendan Dolan-Gavitt, Weidong Cui |
2017-04-11 |
| 9544280 |
Utilization of a protected module to prevent offline dictionary attacks |
Stuart Schechter, Jacob R. Lorch, Barry Bond, Bryan Jeffrey Parno |
2017-01-10 |
| 9424239 |
Managing shared state information produced by applications |
Alan M. Dunn, Tadayoshi Kohno, Alexander Moshchuk, Franziska Roesner, Jiahe Helen Wang |
2016-08-23 |
| 9413784 |
World-driven access control |
Tadayoshi Kohno, Alexander Moshchuk, Franziska Roesner, Jiahe Helen Wang |
2016-08-09 |
| 9355268 |
Managing access by applications to perceptual information |
Loris D'Antoni, Alan M. Dunn, Suman Kumar Jana, Tadayoshi Kohno, Benjamin Livshits +6 more |
2016-05-31 |
| 9326675 |
Virtual vision correction for video display |
Douglas C. Burger |
2016-05-03 |
| 9294281 |
Utilization of a protected module to prevent offline dictionary attacks |
Stuart Schechter, Jacob R. Lorch, Barry Bond, Bryan Jeffrey Parno |
2016-03-22 |
| 9152868 |
Personal identification combining proximity sensing with biometrics |
Christopher Stephen Frederick Smowton, Ronnie Chaiken, Weidong Cui, Oliver H. Foehr, Jacob R. Lorch +3 more |
2015-10-06 |
| 9129058 |
Application monitoring through continuous record and replay |
Weidong Cui, Brendan Dolan-Gavitt |
2015-09-08 |
| 9116880 |
Generating stimuli for use in soliciting grounded linguistic information |
William B. Dolan, Christopher Ian Charla, Christopher Brian Quirk, Christopher John Brockett, Noelle Mallory Sophy +6 more |
2015-08-25 |
| 8955114 |
Application monitoring through collective record and replay |
Brendan Dolan-Gavitt, Weidong Cui |
2015-02-10 |
| 8898776 |
Automatic context-sensitive sanitization |
Benjamin Livshits, Patrice Godefroid, Prateek Saxena |
2014-11-25 |
| 8682957 |
Embedded wireless cloud connector |
Jeremy E. Elson, Jon Howell |
2014-03-25 |
| 8549486 |
Active property checking |
Patrice Godefroid, Michael Y. Levin |
2013-10-01 |
| 8327453 |
Method and apparatus for protecting information and privacy |
Michael O. Rabin, Dennis Shasha, Yossi Beinart, Ramon Caceres, Timir Karia +1 more |
2012-12-04 |
| 7991995 |
Method and apparatus for protecting information and privacy |
Michael O. Rabin, Dennis Shasha, Yossi Beinart, Ramon Caceres, Timir Karia +1 more |
2011-08-02 |
| 7406593 |
Method and apparatus for protecting information and privacy |
Michael O. Rabin, Dennis Shasha, Yossi Beinart, Ramon Caceres, Timir Karia +1 more |
2008-07-29 |
| 7287159 |
Detection and identification methods for software |
Michael O. Rabin, Dennis Shasha, Carleton J. Bosley, Ramon Caceres, Aaron Ingram +2 more |
2007-10-23 |