2626 patents
Page 94 of 132
Utility
Using an NP-complete problem to deter malicious clients
21 Dec 20
Methods and systems for using a challenge-response problem to deter malicious clients are described.
John Franco
Filed: 27 Dec 17
Utility
Security Risk Evaluation for User Accounts
16 Dec 20
Techniques are disclosed relating to account security operations based on security risk values that are modified based on one or more security risk criteria.
George Chen Kaidi
Filed: 11 Jun 19
Utility
n447c7gqnai9qjytbftycjpzrnkvoghm5
16 Dec 20
Systems and methods for redirecting control of a process performed on a browser application on a user device accessing a web application to a native application on the user device include receiving, through a web application controlling a process, a request to perform an action (e.g., user authentication).
Kishore Jaladi, Darshan Desai, Abhishek Chhibber
Filed: 8 Jun 20
Utility
aozdo76z pvs7dib68flkl8fzdbf94ks1g6epuafk
16 Dec 20
Aspects of the present disclosure involve systems, methods, devices, and the like for creating an application lifecycle management platform for big data applications.
Meisam Fathi Salmi, Prabhu Kasinathan, Romit Mehta
Filed: 12 Jun 19
Utility
6a0 futsmozladxjsej7zjwdjbymwuxwu62n75kz0r3lo
16 Dec 20
There are provided systems and methods for simulation computing services for testing application functionalities.
Hitendra Manohar Burde
Filed: 13 Jun 19
Utility
s1u9dup8ermv0gk1njljz4p5calr0qyv8egs5imj
16 Dec 20
Techniques are described relating to identifying a country (or other item) associated with an individual based on the individual's name.
Itay Margolin, Shafik Bisharat
Filed: 12 Jun 19
Utility
vpu5o3y8ne3lxu2q9ihsi4boyukov7qr9q9jqcqf2
16 Dec 20
There are provided systems and methods for software development kits for point-of-sale device and mobile device interactive frameworks.
Prashant Jamkhedkar, Haoyu Xue, Jie Leng
Filed: 25 May 20
Utility
whiw19odf05hz6swuifuku2w5jx86vits7s3nsqdha0st kn3w3k
16 Dec 20
A computer system receives a first set of information that describes a set of transactions between pairs of user accounts of a service and a second set of information that specifies attribute values for user accounts of the service that are recipient user accounts within the set of transactions.
Zhe Chen
Filed: 12 Jun 19
Utility
orw12w2yd5io93tl5s7dfii2mc3krb6dowqp6m7wx2gdllg14a3589oq638p
14 Dec 20
Placing an event into a particular cluster can allow various inferences about the event.
Avishay Meron, Xing Wang, Adam Cohen, Chunmao Ran, David Stein
Filed: 28 Aug 17
Utility
geg5zn8978zg00lzob8vtqvo4269p1id1g 78wkxluv72gqmq8xj
14 Dec 20
Illustrated is a system and method to record video mail using a peer to peer network.
Sonya Rongsheng Liang
Filed: 7 Aug 17
Utility
08516e72kdehs5zko3ghamvef36weqy 3x3l
9 Dec 20
Pure machine learning classification approaches can result in a “black box” solution where it is impossible to understand why a classifier reached a decision.
Ravi Shanker Sandepudi, Ayaz Ahmad, Charles Poli, Samira Golsefid
Filed: 8 Sep 19
Utility
zui4aw6uqbeki7oj5ya2kmtl1mfpx4pysoevv4kls54 xwbu38o
9 Dec 20
Based on detecting a selection, by a first user, of a group payment option on a merchant interface, the computer system launches a user selection user interface that includes one or more user selection interface elements that correspond to one or more users associated with the first user.
Deborah Bluestone, Saloni Pujara, Brielle Harrison
Filed: 3 Jun 19
Utility
pix o6ojpbar3bu7slk9miyxqrunwwj7p6o4g6nlzofe3zw7y
9 Dec 20
Systems and methods for authentication and authorization using physical computing cards include receiving from the physical computing card an authorization request, where the request includes a card identifier and an entity location.
Jigar Rajnikant Gosalia
Filed: 3 Jun 19
Utility
5cb7qt9cny5twnn9ylcoj65fhp5wrq8xzftyy1tclcbnckzggc
9 Dec 20
Aspects of the present disclosure involve systems, methods, devices, and the like for emoji mashup generation.
Titus Woo, Wei Ting Kuo, Xueguang Lu, Venkatesh Komma
Filed: 16 Mar 20
Utility
gzgq52awvigbhppm p3vyg2rzon3rkjk870
9 Dec 20
This disclosure includes techniques for using multiple cryptographic certificates for a secure connection.
Srinivasan Rangaraj
Filed: 27 Jul 20
Utility
jk9tv65oahahufuddx0zpau3zu1wx4uu495k06ds vx7e
9 Dec 20
There are provided systems and methods for biometric authentication during voice data transfers.
Rahul Nair
Filed: 3 Jun 19
Utility
qzdy9z2vgbezt6kyxfnm3cnwqvyp29zowexpqhxmhn4x271kaossl7n8xib
9 Dec 20
Methods and systems for assessing and evaluating vulnerabilities of a networked system are presented.
Eric Nunes, Bradley Wardman, Meethil Vijay Yadav, Kevin Tyers, Nicole Harris, Jakub Burgis
Filed: 5 Jun 19
Utility
0drkgubs1b6h9mymvqsepyjne8tv4z14pr5kgj5
9 Dec 20
Methods and systems are provided to determine the legitimacy of a website.
Gregory Anthony Vannoni, Joshua Buck Powers, Harsh Rajesh Vachhani
Filed: 6 Jun 19
Utility
rj9gfytee5s0cr1kztvvqfb7n9ro073qf5j6o
7 Dec 20
Systems and methods are provided which allow for motion-based authentication of a user using magnified motion.
Geoffrey W. Chatterton
Filed: 27 May 19
Utility
pr1wwxwx ndzjudgne07yn9bk5s947n
7 Dec 20
Writing a collaborative email document with hierarchical authorities including establishing a collaborative email document on an administrator's computer, identifying one or more signatories for the document, identifying one or more collaborators who are authorized to view and edit the document, providing to the collaborators copies of the document for viewing and editing, where the collaborators' copies reside on collaborators' computers, updating the copies of the document on collaborators' computers with revisions from the collaborators, and sending the collaborative email document from the administrator's computer to addressees when the document bears valid digital signatures from all signatories.
Kulvir Singh Bhogal, Robert J. Kamper
Filed: 4 Feb 18