US2012252490A1
|
|
Location Discovery
|
US2011154434A1
|
|
Utilizing location information to minimize user interaction required for authentication on a device
|
US2011154491A1
|
|
Removing an active application from a remote device
|
US8131846B1
|
|
Global, location-aware computer security
|
US8549401B1
|
|
Systems and methods for automatically generating computer-assistance videos
|
US8468608B1
|
|
Enforcing digital rights management in a heterogeneous environment
|
US8763096B1
|
|
Methods and systems for managing authentication
|
US8504680B1
|
|
Automatically adjusting polling intervals based on remote administrative activity
|
US8561181B1
|
|
Detecting man-in-the-middle attacks via security transitions
|
US8424007B1
|
|
Prioritizing tasks from virtual machines
|
US8214878B1
|
|
Policy control of virtual environments
|
US2009328224A1
|
|
Calculating domain registrar reputation by analysis of hosted domains
|
US8108536B1
|
|
Systems and methods for determining the trustworthiness of a server in a streaming environment
|
US8341734B1
|
|
Method and system to audit physical copy data leakage
|
US8181028B1
|
|
Method for secure system shutdown
|
US9077748B1
|
|
Embedded object binding and validation
|
US8281363B1
|
|
Methods and systems for enforcing network access control in a virtual environment
|
US9158558B1
|
|
Methods and systems for providing application manifest information
|
US8495660B1
|
|
Methods and systems for handling instant messages and notifications based on the state of a computing device
|
US8176562B1
|
|
Privacy protection during remote administration
|