| 9251317 |
Network video messaging |
Zhangwei Xu, Mark J. McNulty, Guruprakash Bangalore Rao, Xiaofeng Gao, Fei Chen +2 more |
2016-02-02 |
| 8781870 |
Personal information management with location functionality |
Bradley W. Ward, David Benjamin Lee, Mark J. McNulty |
2014-07-15 |
| 8751293 |
Delivering contextual advertising to a vehicle |
Ali Khan, Mark J. McNulty, Zhangwei Xu |
2014-06-10 |
| 8713091 |
Network based JIT on a priori knowledge of a set of disparate clients |
Thomas G. Phillips, Zhangwei Xu, Dana Lu Silverstein, Shawn Amelia Prenzlow, Martin Holladay |
2014-04-29 |
| 8656473 |
Linking web identity and access to devices |
Ali Khan, Mark J. McNulty, Zhangwei Xu |
2014-02-18 |
| 8522043 |
Hardware-based computer theft deterrence |
James Duffus, Curt A. Steeb, Thomas G. Phillips, Jeffrey Alan Herold, William Poole +1 more |
2013-08-27 |
| 8464348 |
Isolated computing environment anchored into CPU and motherboard |
Alexander Frank, Thomas G. Phillips |
2013-06-11 |
| 8311732 |
Navigation communication with self-identifying elements |
Ali Khan, Zhangwei Xu, Alexander T. Bussmann, Dhiresh Kumar, Gaurav Singhal +1 more |
2012-11-13 |
| 8176564 |
Special PC mode entered upon detection of undesired state |
Alexander Frank, Curt A. Steeb, Isaac P. Ahdout, James Duffus, Nicholas Temple +3 more |
2012-05-08 |
| 8073442 |
Binding a device to a provider |
Alexander Frank, Bohdan Raciborski, James Duffus, Jeffrey Alan Herold, Paul C. Sutton +1 more |
2011-12-06 |
| 7694153 |
Changing product behavior in accordance with license |
Isaac P. Ahdout, Zhangwei Xu |
2010-04-06 |
| 7539647 |
Using power state to enforce software metering state |
Zhangwei Xu, Isaac P. Ahdout |
2009-05-26 |
| 7359807 |
Maintaining and managing metering data for a subsidized computer |
Alexander Frank, Mark Light |
2008-04-15 |