18 patents
Utility
Method and system for initial secret delivery for scalable and restart-able collocated containers with shared resources
31 Oct 23
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed.
Ivan Skuliber, Ryan C. O'Hare, Michael A. Bellomo
Filed: 30 Dec 20
Utility
Method and system for location detection of photographs using topographic techniques
24 Oct 23
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed.
Michael Burstein
Filed: 7 Mar 22
Utility
Method and Apparatus for Maximizing a Number of Connections That Can Be Executed from a Mobile Application
3 Nov 22
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed.
Sharana Basava Harvi, Stephen Gurnett
Filed: 13 Jul 22
Utility
Method and System for Location Detection of Photographs Using Topographic Techniques
20 Oct 22
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed.
Michael Burstein
Filed: 7 Mar 22
Utility
Method and apparatus for maximizing a number of connections that can be executed from a mobile application
30 Aug 22
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed.
Sharana Basava Harvi, Stephen Gurnett
Filed: 30 Dec 20
Utility
Method and System for Initial Secret Delivery for Scalable and Restart-able Collocated Containers with Shared Resources
30 Jun 22
A computer implemented method and system for secure initial secret delivery for collocated containers with shared resources techniques is disclosed.
Ivan Skuliber, Ryan C. O'Hare, Michael A. Bellomo
Filed: 30 Dec 20
Utility
Method and Apparatus for Maximizing a Number of Connections That Can Be Executed from a Mobile Application
30 Jun 22
A computer implemented method and system for maximizing a number of connections that can be executed from a mobile application is disclosed.
Sharana Basava Harvi, Stephen Gurnett
Filed: 30 Dec 20
Utility
Method and System for Near Field Communication Authorization Sharing
16 Jun 22
A computer implemented method and system for near field communication authentication sharing techniques is disclosed.
César Augusto Muñoz Quintero
Filed: 16 Dec 20
Utility
Method and system for location detection of photographs using topographic techniques
8 Mar 22
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed.
Michael Burstein
Filed: 31 Dec 19
Utility
Method and System for Location Detection of Photographs Using Topographic Techniques
1 Jul 21
A computer implemented method and system for identifying locations in photographs using topographic techniques is disclosed.
Michael Burstein
Filed: 31 Dec 19
Utility
Method and System for Uniform, Consistent, Stateless and Deterministic Consistent Hashing for Fixed Size Partitions
11 Mar 21
A computer implemented method and system for uniform, consistent, stateless, and deterministic consistent hashing for fixed size partitions.
Ivan Skuliber, Dennis P. Mathew, Michael A. Bellomo
Filed: 11 Sep 19
Utility
Method and System for a Recommendation Engine Utilizing Progressive Labeling and User Content Enrichment
4 Feb 21
A computer implemented method and system for a recommendation engine utilizing progressive labeling and user context enrichment.
Casimir Saternos, Alec Lazarescu
Filed: 31 Jul 19
Utility
Method and System for Optimized Online Presence Tracking
30 Dec 20
A computer implemented method and apparatus for optimized online presence tracking.
Alec Lazarescu
Filed: 27 Jun 19
Utility
Method and System for Blockchain Trust Management to Avoid Online Fraud
30 Dec 20
A computer implemented method and apparatus for optimized online presence blockchain trust management to avoid online fraud.
Luis Campo Giralte, Gian Luigi Romita
Filed: 26 Jun 19
Utility
System and method for proof-of-work based on hash mining for reducing spam attacks
13 Jul 20
A method for providing a proof-of-work challenge based on hash mining for reducing spam attacks comprising: receiving an email message from a client device; determining a level of trustworthiness of the client device; generating a challenge message based on the determined trustworthiness of the client device; transmitting the challenge message to the client device; receiving a response to the challenge message from the client device; and forwarding the email to one or more recipients when the response to the challenge message is correct.
Luis Campo Giralte
Filed: 21 Aug 18
Utility
System and Method for Proof-of-work Based on Hash Mining for Reducing Spam Attacks
26 Feb 20
A method for providing a proof-of-work challenge based on hash mining for reducing spam attacks comprising: receiving an email message from a client device; determining a level of trustworthiness of the client device; generating a challenge message based on the determined trustworthiness of the client device; transmitting the challenge message to the client device; receiving a response to the challenge message from the client device; and forwarding the email to one or more recipients when the response to the challenge message is correct.
Luis Campo Giralte
Filed: 21 Aug 18
Utility
Information rights management offline file access facility
20 Jan 20
Systems and methods for providing secure offline file access utilizing information rights management (IRM) are provided herein.
Alex Negrea, Constantin Miroslav, Ion Andrei Rînea
Filed: 29 Mar 17
Design
Display screen or portion thereof with graphical user interface
13 Jan 20
Andrew J. R. Smith, Daniel Faltyn
Filed: 20 Aug 18
- Prev
- 1
- Next
Patents are sorted by USPTO publication date, most recent first