1
Steven Jobs
Steve Jobs, Anthony M Fadell, Jonathan P Ive: Highly portable media device. Apple, Beyer Law Group, September 22, 2009: US07593782 (63 worldwide citation)

An improved portable media device and methods for operating a media device are disclosed. According to one aspect, the portable media device can also function as a solid-state drive for data storage. The form factor of the portable media device can be hand-held or smaller, such that it is highly por ...


2
Steven Jobs
Steve Jobs, Anthony M Fadell, Jonathan P Ive: Highly portable media device. Apple, Beyer Law Group, February 15, 2011: US07889497 (4 worldwide citation)

An improved portable media device and methods for operating a media device are disclosed. According to one aspect, the portable media device can also function as a solid-state drive for data storage. The form factor of the portable media device can be hand-held or smaller, such that it is highly por ...


3
Yung Chang Liang, Yi Fen Chen: Network isolation techniques suitable for virus protection. Trend Micro, Beyer Law Group, June 10, 2008: US07386888 (173 worldwide citation)

In a distributed network having a number of server computers and associated client devices, method of isolating infected client devices from uninfected client devices is described. The method is carried out by correlating network related virus infection information, determining if a virus outbreak h ...


4
Eva Chen, Jimmy Sun, Terrence Chou, Steven Deutsch, Mark Havran: Tracking and reporting of computer virus information. Trend Micro, Beyer Law Group, February 24, 2009: US07496960 (160 worldwide citation)

An apparatus and method for providing real-time tracking of virus information as reported from various computers on a distributed computer network. Each client computer on the distributed network contacts an anti-virus scanning site. The site provides a small program or applet that resides in tempor ...


5
Chris McKillop, Chris Wiebe: Automated pairing of wireless accessories with host devices. Apple, Beyer Law Group, October 12, 2010: US07813715 (130 worldwide citation)

Techniques that facilitate pairing of wireless accessory devices with wireless host devices are disclosed. Advantageously, the improved techniques permit pairing of wireless devices without requiring user entry of pin codes. In one embodiment, a wireless accessory device, such as a headset or earpho ...


6
Wei Yan, Handong Wu: Packet threshold-mix batching dispatcher to counter traffic analysis. Trend Micro, Beyer Law Group, May 15, 2012: US08180917 (128 worldwide citation)

An antivirus agent located on a user computer, local area network or standalone hardware device includes a statistical module, a control unit, a timeslot generator and a dispatcher. The statistical module calculates statistics for incoming request packets including the burstiness degree H. A number ...


7
Teodor Dabov, HuiLeng Lim, Kyle Yeates, Stephen Brian Lynch: Handheld computing device. Apple, Beyer Law Group, April 13, 2010: US07697281 (122 worldwide citation)

A minimum Z height handheld electronic device and methods of assembly is described. The electronic device includes a single seamless housing having a front opening and a cover disposed within the front opening and attached to the seamless housing without a bezel.


8
Yung Chang Liang, Yi Fen Chen: Automatic registration of a virus/worm monitor in a distributed network. Trend Micro, Beyer Law Group, July 21, 2009: US07565550 (121 worldwide citation)

A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The system includes a network virus sensor self registration module coupled to a network virus/worm sensor arr ...


9
Yung Chang Liang, Yi Fen Chen: Virus monitor and methods of use thereof. Trend Micro Incorporated, Beyer Law Group, April 21, 2009: US07523493 (120 worldwide citation)

A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The monitoring provides an early warning of a virus attack thereby facilitating quarantine procedures directed ...


10
Vinod K Bhardwaj, Scott England, Dean Whitlock: Speech controlled services and devices using internet. FoneWeb, Beyer Law Group, October 4, 2011: US08032383 (111 worldwide citation)

A speech service, including a speech-to-text engine and a text-to-speech engine, creates and maintains user profiles at a central location accessible over the Internet. A user connects to a software application over a mobile telephone and delivers a voice command. The speech service transcribes the ...