150 patents
Page 6 of 8
Utility
Systems and methods for interest-driven data visualization systems utilizing visualization image data and trellised visualizations
26 Oct 20
Systems and methods for interest-driven data visualization systems are illustrated.
Prithvi Prabhu, James Mulholland, Hans-Frederick Brown, Benjamin Mark Werther, Kevin Scott Beyer, John Glenn Eshleman
Filed: 22 Feb 18
Utility
Compensation modeling using plan collections
26 Oct 20
A system for compensation modeling includes an interface and a processor.
Scott Colner, Peter Ryan
Filed: 28 Apr 16
Utility
Data flow view for a spreadsheet
19 Oct 20
The system includes an input interface and a processor.
Terry M. Olkin
Filed: 16 Dec 18
Utility
Metadata driven catalog definition
12 Oct 20
A system for a metadata driven catalog definition includes an interface and a processor.
Denis Gulsen, Erol Guney, Eric James Ranstrom, Amir Ali Afghani, Chandni K. Dhanjal
Filed: 31 Aug 17
Utility
User interface for region and cell sharing
28 Sep 20
A system for spreadsheet region and cell sharing includes an interface and a processor.
Leonard Karpel, Brian Sean Morris, Terry M. Olkin, Sayan Chakraborty
Filed: 11 Aug 15
Utility
Adaptive user interface
21 Sep 20
A system for determining display information comprises an interface and a processor.
Omer Mahmood, Khurram Mahmood, Daniel Beaulne, Brent Velthoen, Matthew Grippo
Filed: 23 Jul 17
Utility
Automated process performance determination
14 Sep 20
A system for automated process performance determination includes an interface and a processor.
Lynn Christensen, Amitesh Sinha
Filed: 9 Nov 17
Utility
Platform class creation
7 Sep 20
A system for class deployment includes an ancillary class storage device and a processor.
Norrie Quinn, Kashif Qayyum
Filed: 14 Feb 19
Utility
Security system for benchmark access
7 Sep 20
A system for analytics security includes an interface and a processor.
Denis Gulsen, Erol Guney, Amir Ali Afghani, Eric James Ranstrom, Thomas Monir Ghali, Kayla Marie Kimura
Filed: 31 Aug 17
Utility
Predictive model-based intelligent system for automatically scaling and managing provisioned computing resources
31 Aug 20
A system for automatically scaling provisioned resources includes an input interface and a processor.
Montiago Xavier LaBute, Teng Qu, James Michael Stratton, Xiaoqun Joyce Duan, Alex James Boyd
Filed: 1 Feb 18
Utility
Reporting using archived data
17 Aug 20
A system for reporting using archived data includes an active memory, an archive memory, an interface, and a processor.
Seamus Donohue, Sergio Mendiola Cruz, Ken Pugsley, John Levey, Gerald Green, Iacopo Pace
Filed: 14 Dec 15
Utility
Updating objects for archived objects
17 Aug 20
A system for updating archived data includes an active memory, an archive memory, an interface, and a processor.
Seamus Donohue, Sergio Mendiola Cruz, Ken Pugsley, John Levey, Gerald Green, Iacopo Pace
Filed: 14 Dec 15
Utility
Multitenant based query plan
10 Aug 20
A system for determining a query ordering includes an input interface and a processor.
Amir Ali Afghani, Erol Guney
Filed: 17 Dec 17
Utility
Indexing structured data with security information
3 Aug 20
A system for indexing and searching includes an input interface and a processor.
Michael Wilson, Philip Monroe, Darius Kasad, Tejas Mandke, David Vieira, Vladimir Giverts
Filed: 29 Jul 15
Utility
Fast entity linking in noisy text environments
3 Aug 20
A system for disambiguation of noisy text includes an interface and processor.
Samir Mavji Shah, Michael David Conover, Peter Nicholas Skomoroch, Matthew Terence Hayes, Scott Mitchell Blackburn
Filed: 23 May 18
Utility
Blockchain-based secure credential and token management across multiple devices
3 Aug 20
An embodiment herein provides a processor implemented method for blockchain-based secure credential and token management for open identity management that enables a first device to provision at least one additional device to present tokens issued to the first device, that includes i) creating, using a hardware-based cryptographic processor on a first device associated with an end user, a first set of credentials; ii) obtaining and caching at least one attestation token from one or attestation issuing parties, the at least one attestation token is restricted by default to be unusable from any device other than the first device; (iii) providing the at least one attestation token to at least one relying party that is interested in receiving attestations about the end user; and iv) signing a trust record on the blockchain using the first device associated with the end user.
Prakash Sundaresan, Lionello G. Lunesu, Antoine Cote
Filed: 23 Apr 18
Utility
Updating web resources
13 Jul 20
Updating web resources includes extracting web resources from the application to local files, and querying an external server for web resource updates specific to at least one operating condition of the client device.
Anton Aleksandrov, Amit Ben-Sheffer, Raanan Avidor, Yoav Bodor, Ishai Borovoy, Yaron Goldberg, Todd Eric Kaplinger, Iddo Levin, Ran Enriko Magen, Ron Perry, Artem Spector
Filed: 10 Sep 18
Utility
Managing data using archiving
13 Jul 20
A system for archiving includes an active memory, an archive memory, an interface, and a processor.
Seamus Donohue, Sergio Mendiola Cruz, Ken Pugsley, John Levey, Gerald Green, Iacopo Pace
Filed: 14 Dec 15
Utility
System and method for blockchain-based device authentication based on a cryptographic challenge
13 Jul 20
Blockchain-based device authentication by a user device to enable a second device is disclosed to perform an action on a first device on behalf of a user linked to the user device, based on a command received from the second device.
Prakash Sundaresan, Lionello G. Lunesu, Antoine Cote
Filed: 6 May 18
Utility
System and method for blockchain-based user authentication based on a cryptographic challenge
13 Jul 20
An embodiment herein provides a processor implemented method for blockchain-based authentication of a user using a user device, that includes (i) obtaining an identify information associated with an identity document of the user; (ii) storing the identity information, and a set of credentials, with a blockchain to link the identity information with the set of credentials for the user; (iii) obtaining a cryptographic challenge from a relying party device when a record that includes a user identity information of the user and the set of credentials associated with the user identity information for the user device is found to be stored with the blockchain; and (iv) transmitting a response to the cryptographic challenge to the relying party device.
Prakash Sundaresan, Lionello G. Lunesu, Antoine Cote
Filed: 6 May 18