2626 patents
Page 91 of 132
Utility
Device identification systems
12 Jan 21
Methods and systems for a device identification system may be provided.
Zahid Nasiruddin Shaikh, Srivathsan Narasimhan
Filed: 11 Nov 19
Utility
Automated detection of phishing campaigns via social media
12 Jan 21
Methods and systems for automatically detecting and responding to phishing campaigns are described herein.
Jakub Burgis
Filed: 21 Oct 19
Utility
gu6ud0qh3dpquddl4if9u3ecb0u7m7disgv2ug2w35
12 Jan 21
Methods and systems for using cloned accounts to track attacks on user accounts are described.
Raoul Christopher Johnson, Ran Sun
Filed: 17 Aug 18
Utility
38d0jbk87c3h7pe0ggusuja s5fa9jib3y9wdftiy1t11n7ymazyw
12 Jan 21
Embedding of digital tokens within a digital video can occur cryptographically using a public key in some embodiments.
Braden Christopher Ericson, Sam Pourcyrous, Fun-Chen Jou, Kaili An
Filed: 27 Dec 17
Utility
ncb9jeohycxcr5zg1g0xk3ehyi kp6hhd6l23ljlfbvy0fmq8xcxy1goxu
12 Jan 21
Aspects of the present disclosure involve systems, methods, devices, and the like for generating an unobtrusive and discrete barcode used for debugging.
Sherman Chen, Derek Anderson, Siddharth Reddy Malkireddy
Filed: 2 Jul 18
Utility
yxhc8fpxrg3fnbdo8lzwqsn2t8bvg cpod
12 Jan 21
A method and system to verify active content at a server system include receiving, at the server system a communication (e.g., an e-mail message or e-commerce listing) that includes active content that is to be made accessible via the server system.
Chris Lalonde, Andrew Millard Brown, Mathew Gene Henley, Quang D. Pham, Kevin Black
Filed: 12 Feb 19
Utility
pkwd30aptp6yny3kv4b5mn 9dy0kv58g4ys1yx0ad95nb4
12 Jan 21
A point of sale (POS) security system includes a POS device including a non-transitory memory, one or more hardware processors, and one or more environment sensors.
Timothy C. Nichols, Ramaneek Khanna, Geoffrey W. Chatterton
Filed: 24 Apr 17
Utility
u2vmvuz932igrc1 gd0r85pjpjnx5aoxsmwc9brjuc2axjyqfc1k0mc
12 Jan 21
Methods and systems are presented for providing a framework to generate computer models for detecting fraudulent electronic transactions.
Lior Ebel, Shir Fiszman
Filed: 10 Dec 18
Utility
9pcd9dqem7tuxcntfngu2o2woa79s9b963bj
6 Jan 21
A method and system for detecting slow page load is provided.
J. Thomas Monk, IV, Hemal Doshi
Filed: 9 Aug 20
Utility
pht3p3juhskljlk2afa2c1ntkt5dqm3ixyw007nm3w
6 Jan 21
There are provided systems and methods for detection of fraudulent displayable code data during device capture.
Michael Charles Todasco, Fun-Chen Jou, Adhish Vyas, Megan Marie O'Neill, Yona Ju, Shao-Fei Moy, Haidan Huang
Filed: 30 Jun 19
Utility
5b7tl7tcyjn8wctepxdzxbn2ce2 x0xzkz7
6 Jan 21
There are provided systems and methods for local digital token transfer during device communication limitations.
Michael Charles Todasco, Cheng Tian
Filed: 8 Jun 20
Utility
suc8m8ap5crk684ql4ao1zwobg1hwgocd3
6 Jan 21
Various methods and systems are provided to capture a unique product code, such as QR code, on a mobile device, process the information contained in the code, provide the user with options of making a purchase, including purchasing a plurality of selected products from different captured codes, and processing the payment via the user's mobile device.
Aalap D. Parikh
Filed: 10 Aug 20
Utility
rie10up5ol 3cby20xptp42pt58eztjwl6hqqv12v4xzxkc32rsttjpzxsx
6 Jan 21
Methods and systems are presented for providing dynamic and interactive content in an online chat session.
Ramakrishna Rosanuru, Ragunath Jayabalakrishnan
Filed: 26 Jul 20
Utility
p3il600ijn1vt9jid23vznqlkoxsnyiaimrk8t
6 Jan 21
A uniform resource locator (URL) shortener relies on client-side support to embed links to websites into, for example, text messages, emails, tweets, or other forms of microblogging, and that provides additional capabilities.
Norihiro Edwin Aoki
Filed: 27 Jul 20
Utility
or5rcymsinzzybko6oh0phzm0 lxa6pmetxm
4 Jan 21
There are provided systems and methods for user interface customization based on facial recognition.
Timothy Resudek
Filed: 16 Oct 17
Utility
cp8omfmnduukbp43b 5g84a5u
4 Jan 21
Systems and techniques for providing a low latency gateway for an asynchronous orchestration engine using direct memory are presented.
Veera Saka, Jian Wan, Rama Prasad Bodepu
Filed: 15 Apr 19
Utility
ojra 9f56o7ggcqehwg77wnkdzq2af11ol5hr66
4 Jan 21
Techniques are disclosed relating to detecting that a client system is an emulated computer system based on its computational performance of one or more challenge problems.
Bradley Wardman, Blake Butler
Filed: 20 Dec 18
Utility
22f0oyna3iohjncmcz0d9j1v2uvebeem5ru1kuspkcil7l6g98ll14ntqgb
4 Jan 21
A system to reduce the number of factors that need to be considered in generating a prediction function includes an access module and a function generator module.
Rogene Eichler West, Stephen Severance
Filed: 26 Apr 16
Utility
s1kd6s8n2j1gizmb8sxn3ggfbk5tas58fp
4 Jan 21
A system and methods for third-party access to a network-based system for providing location-based upcoming event information are described.
Ashley Gibson, Cass Patrick Costello, Conny Wu
Filed: 23 Apr 18
Utility
duxsizt1ej9cxg v9fi12h8
4 Jan 21
A method for reconfiguring disbursement signals at a payment system is discussed.
Norihiro Aoki, Aarti Bharathan, Anthony Shakrala Allen, Arjun Abraham Mathew
Filed: 30 Oct 16