| 10977149 |
Offline simulation system for optimizing content pages |
Giovanni Zappella, Cedric Philippe Archambeau, Michael Brueckner, Borys Marchenko, Martin Milicic +2 more |
2021-04-13 |
| 10977264 |
Selecting supplemental content for inclusion in a network page |
Thomas Jay Hoover, Alexander Michael Spinelli |
2021-04-13 |
| 10049163 |
Connected phrase search queries and titles |
Luis Antonio Diniz Fernandes de Morais Sarmento, Sean P. Forde, Paul Daniel Jaye, Zheshen Wang, Gareth Charles Farrington +2 more |
2018-08-14 |
| 10044763 |
Protecting content from third party using client-side security protection |
Frank Byrum, Mayerber L. Carvalho Neto, James R. Knibb, Palash Biswas, Christopher Barnes |
2018-08-07 |
| 9881065 |
Selecting supplemental content for inclusion in a search results page |
Thomas Jay Hoover, Alexander Michael Spinelli |
2018-01-30 |
| 9852402 |
Performing operations on deleted items using deleted property information |
Selvaraj Nalliah |
2017-12-26 |
| 9756080 |
Protecting content from third party using client-side security protection |
Frank Byrum, Mayerber L. Carvalho Neto, James R. Knibb, Palash Biswas, Christopher Barnes |
2017-09-05 |
| 9741019 |
Restoring deleted items with context |
Selvaraj Nalliah |
2017-08-22 |
| 9547532 |
Techniques to provide proxies for web services |
Michael Patrick Loughry, Elroy J. Dyksen, Robert Congdon, Kumarswamy Valegerepura, Ilya Smirnov +2 more |
2017-01-17 |
| 9536227 |
Restoring deleted items with context |
Selvaraj Nalliah |
2017-01-03 |
| 9418244 |
Protecting content from third party using client-side security protection |
Frank Byrum, Mayerber L. Carvalho Neto, James R. Knibb, Palash Biswas, Christopher Barnes |
2016-08-16 |
| 9367627 |
Selecting supplemental content for inclusion in a search results page |
Thomas Jay Hoover, Alexander Michael Spinelli |
2016-06-14 |
| 8978091 |
Protecting content from third party using client-side security protection |
Frank Byrum, Mayerber L. Carvalho Neto, James R. Knibb, Palash Biswas, Christopher Barnes |
2015-03-10 |
| 8447976 |
Business to business secure mail |
Chandresh K. Jain, Mayank Mehta, Frank Byrum, Ayse Yesim Koman, James R. Knibb +11 more |
2013-05-21 |
| 8448228 |
Separating authorization identity from policy enforcement identity |
Yuhui Zhong, Gregory Kostal, Tejas D. Patel, Scott C. Cottrille, Vladimir Yarmolenko +5 more |
2013-05-21 |