| 9448840 |
Controlling runtime execution from a host to conserve resources |
Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C.T. Liu +1 more |
2016-09-20 |
| 9060196 |
Constrained execution of background application code on mobile devices |
Peter J. Torr, Abolade Gbadegesin, Shawn Burke, Vijayendra Gopalrao Vasu, Jason William Fuller +6 more |
2015-06-16 |
| 8922564 |
Controlling runtime execution from a host to conserve resources |
Akhilesh Kaza, Gunjan A. Shah, Shawn T. Oster, Jonathan D. Sheller, Alan C.T. Liu +1 more |
2014-12-30 |
| 8640244 |
Declared origin policy |
Matthew G. Lyons, Anil Dhawan |
2014-01-28 |
| 8395643 |
Motion-based data review and zoom |
Seana Seraji, Scott Andrew Borton |
2013-03-12 |
| 8225403 |
Displaying a security element to help detect spoofing |
Diane Curtis, Seana Seraji, Vinoo Cherian, Aaron Filner |
2012-07-17 |
| 7299303 |
System and method for pendant bus for serially chaining multiple portable pendant peripherals |
Michael P. Calligaro, David W. Voth, Roberto Cazzaro |
2007-11-20 |
| 7284056 |
Resolving host name data |
— |
2007-10-16 |
| 7152243 |
Providing a secure hardware identifier (HWID) for use in connection with digital rights management (DRM) system |
Steven Bourne, Vinay Krishnaswamy, Michael P. Calligaro, David Wecker |
2006-12-19 |
| 7017004 |
System and method for updating contents of a flash ROM |
Michael P. Calligaro, Chee H. Chew, Dominique Fortier, Eric Lawrence Albert Lantz |
2006-03-21 |