| 12289690 |
Interference reduction for wireless communications using interference cancellation and selective power control |
Amer A. Hassan |
2025-04-29 |
| 12035147 |
Anomalous access point detection |
Amer A. Hassan, Michael J. Davis |
2024-07-09 |
| 11777710 |
Cryptography using varying sized symbol sets |
Amer A. Hassan, Whitney J Giaimo |
2023-10-03 |
| 11751070 |
Anomalous access point detection |
Amer A. Hassan, Michael J. Davis |
2023-09-05 |
| 11496289 |
Cryptography using varying sized symbol sets |
Amer A. Hassan, Whitney J Giaimo |
2022-11-08 |
| 11122441 |
Anomalous access point detection |
Amer A. Hassan, Michael J. Davis |
2021-09-14 |
| 11086719 |
Use of error correction codes to prevent errors in neighboring storage |
Amer A. Hassan, David Anthony Lickorish |
2021-08-10 |
| 11075656 |
Bit error reduction of communication systems using error correction |
Amer A. Hassan |
2021-07-27 |
| 10560264 |
Cryptographic key creation using optical parameters |
Amer A. Hassan |
2020-02-11 |
| 10255328 |
Location source ranking for determining device location |
Amer A. Hassan, Neil A. Deason, Carl S. Olivier |
2019-04-09 |
| 9918209 |
Policies for selecting sources for resource strings |
Neil A. Deason, Amer A. Hassan, Carl S. Olivier |
2018-03-13 |
| 9456345 |
Device authentication techniques |
Rui Maximo, Dawson Yee, Gurdeep S. Pall |
2016-09-27 |
| 8831189 |
Device authentication techniques |
Rui Maximo, Dawson Yee, Gurdeep S. Pall |
2014-09-09 |
| 8817777 |
Hybrid unified communications deployment between cloud and on-premise |
Vijay Manian, Russell Andrew Penar, Mahendra D. Sekaran, Danny Levin, Sankaran Narayanan |
2014-08-26 |
| 8307071 |
Fine-grained location determination of networked computers |
Austin Donnelly, Bernard Aboba, Gabriel E. Montenegro, Noor-E-Gagan Singh, Tim Moore |
2012-11-06 |
| 8122491 |
Techniques for physical presence detection for a communications device |
Dawson Yee |
2012-02-21 |