| 12353583 |
Secure multi-party encrypted identifier data sharing |
Justin Langseth, Michael Earle Rainey |
2025-07-08 |
| 12353586 |
Secure encrypted identifier data sharing |
Justin Langseth, Michael Earle Rainey |
2025-07-08 |
| 12189822 |
Data clean room |
Rachel Frances Blum, Joshua James Chacona, Christian Kleinerman, Justin Langseth |
2025-01-07 |
| 12013969 |
Data clean room |
Rachel Frances Blum, Joshua James Chacona, Christian Kleinerman, Justin Langseth |
2024-06-18 |
| 11989630 |
Secure multi-user machine learning on a cloud data platform |
Monica J. Holboke, Justin Langseth, Stuart Ozer |
2024-05-21 |
| 11893462 |
Machine learning using secured shared data |
Monica J. Holboke, Justin Langseth, Stuart Ozer |
2024-02-06 |
| 11809600 |
Data clean room |
Rachel Frances Blum, Joshua James Chacona, Christian Kleinerman, Justin Langseth |
2023-11-07 |
| 11501015 |
Secure machine learning using shared data in a distributed database |
Monica J. Holboke, Justin Langseth, Stuart Ozer |
2022-11-15 |
| 11347886 |
Secure multi-party encrypted identifier data sharing |
Justin Langseth, Michael Earle Rainey |
2022-05-31 |
| 11216580 |
Secure machine learning using shared data in a distributed database |
Monica J. Holboke, Justin Langseth, Stuart Ozer |
2022-01-04 |
| 10970419 |
Data clean room |
Rachel Frances Blum, Joshua James Chacona, Christian Kleinerman, Justin Langseth |
2021-04-06 |
| 10744635 |
Elongated hand tool, with end points, to actuate out of reach device |
— |
2020-08-18 |
| 7058932 |
System, computer program product, and methods for emulation of computer programs |
Andrew T. Jennings, G. Lawrence Krablin, Timothy Neilson Fender |
2006-06-06 |
| 6662354 |
Determining destinations of a dynamic branch |
G. Lawrence Krablin, Andrew T. Jennings, Timothy Neilson Fender |
2003-12-09 |
| 6587897 |
Method for enhanced I/O in an emulated computing environment |
Andrew T. Jennings, G. Lawrence Krablin, Timothy Neilson Fender |
2003-07-01 |
| 6442752 |
METHOD, APPARATUS, AND COMPUTER PROGRAM PRODUCT FOR REPLACING A DYNAMIC LINK LIBRARY (DLL) OF A FIRST COMPUTING ENVIRONMENT WITH A DLL OF A SECOND COMPUTING ENVIRONMENT THAT CAN BE INVOKED FROM THE FIRST COMPUTING ENVIRONMENT IN A TRANSPARENT MANNER |
Andrew T. Jennings, G. Lawrence Krablin, Timothy Neilson Fender |
2002-08-27 |
| 4977495 |
System and method for accessing a cache memory which is located in the main memory of a large data processing system |
Carol Wellington |
1990-12-11 |