| Warranty management system and methods of performing the same |
2018-5-04 |
2018-11-08 |
|
| Decision-making system and method based on supervised learning |
2018-4-13 |
2023-6-20 |
2023-6-20 |
| Synchronizing a source, response and comment presentation |
2017-1-19 |
2017-5-11 |
|
| Automated document analysis comprising a user interface based on content types |
2016-8-27 |
2019-8-20 |
2019-8-20 |
| Network monitoring system with remote access |
2016-6-06 |
2017-12-07 |
|
| Membranous waterproof juncture |
2016-6-06 |
2017-11-07 |
2017-11-07 |
| Method of manufacturing and installation of prefabricated shower bench and … |
2015-10-26 |
2016-2-11 |
|
| Table attachment apparatus |
2015-9-28 |
2019-3-26 |
2019-3-26 |
| Shower enclosure design and assembly methods using prefabricated shower benches |
2015-6-08 |
2016-1-21 |
|
| Measuring, categorizing, and/or mitigating malware distribution paths |
2015-3-25 |
2018-3-27 |
2018-3-27 |
| Method and system of assessing and managing risk associated with compromised … |
2015-2-06 |
2015-8-06 |
|
| Preventing unauthorized access to an application server |
2014-11-12 |
2016-2-18 |
|
| User interface operation based on similar spelling of tokens in text |
2014-8-15 |
2018-8-28 |
2018-8-28 |
| User Interface Operation Based on Token Frequency of Use in Text |
2014-8-15 |
2016-2-18 |
|
| Drain Wall for a Prefabricated Shower Module |
2014-7-10 |
2015-1-01 |
|
| Method and system for network-based detecting of malware from behavioral … |
2014-6-27 |
2018-4-17 |
2018-4-17 |
| Presenting a source presentation |
2014-6-25 |
2017-3-07 |
2017-3-07 |
| Systems and methods for traffic classification |
2014-6-16 |
2017-2-14 |
2017-2-14 |
| Dynamically optimized content display |
2014-3-03 |
2019-3-12 |
2019-3-12 |
| System and method to capture an image over the web |
2014-2-13 |
2015-8-13 |
|
| Method and system for detecting malicious domain names at an upper dns … |
2013-12-04 |
2014-6-05 |
|
| Method and system for identifying job candidates |
2013-11-29 |
2014-3-27 |
|
| Molding tools with interchangeable inserts to form a variety of parts with … |
2013-10-18 |
2017-8-24 |
|
| Molding tools with interchangeable inserts to form a variety of parts with … |
2013-10-18 |
2014-6-26 |
|
| Method and system for detecting malware |
2013-9-30 |
2016-12-20 |
2016-12-20 |
| Historical analysis to identify malicious activity |
2013-8-30 |
2017-6-13 |
2017-6-13 |
| Automation discovery to identify malicious activity |
2013-8-30 |
2014-3-13 |
|
| Data mining to identify malicious activity |
2013-8-30 |
2018-2-13 |
2018-2-13 |
| Traffic simulation to identify malicious activity |
2013-8-30 |
2018-9-25 |
2018-9-25 |
| Methods and systems for network flow analysis |
2013-8-26 |
2020-1-28 |
2020-1-28 |
| Enterprise grade metadata and data mapping management application |
2013-2-11 |
2015-10-13 |
2015-10-13 |
| Methods of manufacturing prefabricated shower pans with standard trench drains |
2013-1-28 |
2014-2-06 |
|
| Method and system for detecting DGA-based malware |
2013-1-24 |
2018-3-20 |
2018-3-20 |
| Compression drain with adjustable-height grate |
2012-12-12 |
2014-6-12 |
|
| Shower enclosure design and assembly methods using prefabricated shower benches |
2012-11-12 |
2013-5-23 |
|
| Method and system for source tracking |
2012-8-30 |
2018-10-16 |
2018-10-16 |
| Method and apparatus for analyzing a document |
2012-7-31 |
2014-2-06 |
|
| Method and apparatus for analyzing abbreviations in a document |
2012-6-25 |
2013-7-04 |
|
| System and method for providing automated computer security compromise as a … |
2012-6-05 |
2014-8-21 |
|
| Client Specific Interactions with Enterprise Software Systems |
2012-3-26 |
2013-9-26 |
|
| Method and apparatus for analyzing a document |
2012-1-04 |
2013-7-04 |
|
| Method and system for determining whether domain names are legitimate or … |
2011-8-09 |
2012-2-16 |
|
| Method and system for channel optimization |
2011-6-24 |
2017-11-07 |
2017-11-07 |
| Real-time application of filters based on image attributes |
2011-6-14 |
2012-12-20 |
|
| System and method for electronic lead verification |
2011-5-12 |
2012-11-15 |
|
| Establishing and enforcing security and privacy policies in web-based … |
2010-10-21 |
2012-3-27 |
2012-3-27 |
| System and method for probabilistic attack planning |
2010-9-08 |
2013-7-16 |
2013-7-16 |
| System and method of rendering interior surfaces of 3D volumes to be viewed … |
2010-8-30 |
2014-1-21 |
2014-1-21 |
| System and method for extending automated penetration testing to develop an … |
2010-8-05 |
2013-7-16 |
2013-7-16 |
| System and method for dentition specific image enhancement |
2010-5-07 |
2011-11-10 |
|
| Handicapped accessible shower enclosure with ramp and/or floor pan |
2010-2-17 |
2011-8-18 |
|
| Third party acquisition of images at the direction of an independent imaging … |
2009-12-16 |
2010-5-20 |
|
| Method and system for automatic intra-oral sensor locating for image … |
2009-8-28 |
2010-11-30 |
2010-11-30 |
| Methods of populating a third-party document with digital information content |
2009-8-13 |
2009-12-24 |
|
| Method and system for detecting malicious and/or botnet-related domain names |
2009-8-10 |
2018-7-17 |
2018-7-17 |
| Direct connection single user-interface control of multiple computers and … |
2009-6-22 |
2012-3-13 |
2012-3-13 |
| System and method to adjust medical imaging equipment |
2009-4-22 |
2009-9-24 |
|
| Apparatus and method for virtual flaw removal from X-ray sensitive plates |
2009-4-16 |
2012-9-11 |
2012-9-11 |
| System and method for scoring groups |
2009-2-13 |
2010-8-19 |
|
| System and method for generating sales lead information and user interface for … |
2009-2-13 |
2010-8-19 |
|
| Automatic spatial adjustment of a pan-oral x-ray source in response to the … |
2008-12-23 |
2010-6-24 |
|
| Policy enforcement using ESSO |
2008-12-10 |
2013-12-03 |
2013-12-03 |
| Identity map creation |
2008-10-03 |
2013-9-17 |
2013-9-17 |
| System and method for preparing spatially related medical digital image data … |
2008-8-07 |
2010-2-11 |
|
| Apparatus and methods for full-mouth intraoral image acquisition |
2008-7-24 |
2010-1-28 |
|
| System and method for simulating computer network attacks |
2008-6-26 |
2013-1-15 |
2013-1-15 |
| System and method for providing network penetration testing |
2008-4-14 |
2008-10-16 |
|
| System and Method for Providing Application Penetration Testing |
2008-3-06 |
2008-10-23 |
|
| Auto-distribution of scanned digital images based on standardized identifiers |
2008-2-22 |
2009-8-27 |
|
| Methods of populating a third-party document with digital information content |
2007-7-16 |
2012-1-31 |
2012-1-31 |
| Automated computer system security compromise |
2007-4-16 |
2007-8-30 |
|
| Prefabricated shower pan having varying sidewall heights and method of … |
2007-3-17 |
2008-9-18 |
|
| Method for manufacturing a prefabricated modular shower curb and associated … |
2007-3-17 |
2008-9-18 |
|
| Drain wall for a prefabricated shower module |
2007-3-17 |
2012-5-22 |
2012-5-22 |
| Method for manufacturing a prefabricated shower module |
2007-3-17 |
2008-9-18 |
|
| System and method for sensor device manufacturer oriented calibration |
2005-8-15 |
2007-2-15 |
|
| System and method for the automatic generation of a query to a DICOM server |
2005-5-10 |
2006-11-16 |
|
| System and method for name grabbing via optical character reading |
2005-3-11 |
2006-9-14 |
|
| System and method of capturing images |
2005-3-11 |
2013-5-21 |
2013-5-21 |
| System and method for generating SQL using templates |
2004-7-09 |
2005-6-02 |
|
| Distributed computing using syscall proxying |
2003-7-16 |
2007-10-02 |
2007-10-02 |
| Security framework for protecting rights in computer software |
2003-4-15 |
2003-11-27 |
|
| Prefabricated shower pan with integrally molded curb reinforcements |
2002-10-30 |
2003-11-11 |
2003-11-11 |
| System and method for opening and activating applications, windows or data sets … |
2001-2-15 |
2002-8-15 |
|