2626 patents
Page 97 of 132
Utility
Service level agreement based storage access
16 Nov 20
A method and a system implementing a service level agreement based storage access system.
Yuri Finkelstein, Kumar Rethinakaleeswaran, John Helm, Zheng Peter Xu
Filed: 23 Jan 17
Utility
Distributed Autonomous Patching System
11 Nov 20
There are provided systems and methods for a distributed autonomous patching system.
Suresh Mathew, Arvind Sugumar, Krishnakanth Batta, Vaibhav Desai, Benjamin Thomas, Ramakrishnan Sumesh Vadassery, Shankar Jothi
Filed: 30 Dec 19
Utility
c7ldehr761qizw6cemy0r01nn9
11 Nov 20
Systems and methods for integrated multi-factor multi-label analysis include using one or more deep learning systems, such as neural networks, to analyze how well one or more entities are likely to benefit from a targeted action.
Yaqin Yang, Nitin Sharma, Fransisco Kurniadi, Yang Wu
Filed: 9 May 19
Utility
xzmcl498j0il1n9xixjpd4 hddw1n7mlrlnon5
11 Nov 20
A wearable device receives authentication information from a user.
Guhan Senguttuvan, Satish Govindarajan, Carlos Rivas, Gordon Lo, Anantharaj Uruthiralingam, Alan Jeung, Tinyen Shih
Filed: 6 May 19
Utility
i71k9mhndge6v5mxumk30ofga6chzkuxd bh4ajt
11 Nov 20
Methods and systems are presented for reducing false positives in detecting profiles that are connected to an entity within a list of entities.
Ramnarayan Vijapur Gopinath Rao, Rajkumar Baskaran
Filed: 6 May 19
Utility
3725isgl11bht4qbhk99lc3bjvbbq6ckhoxgwmucuuciirq4vbdj7
11 Nov 20
In response to detecting that a user of a service provider requires assistance, a computer system determines a predicted user intent associated with the user based on monitoring activity associated with the user, and further determines that a first communication channel corresponds to the determined predicted user intent and causes a communication to be initiated with the user utilizing the first communication channel.
Shivam Pandey, Ajay Bose Anchalassery Chandrabose, Satheeskumar S
Filed: 9 May 19
Utility
nmlm8cxy1socxzqoyxj66njysv3wn4kc69tt5nah0rya6gryp4dik
11 Nov 20
Methods and systems for automatically providing dynamic content for facilitating a transaction are described herein.
Hugo Olliphant, Ray Tanaka, Alan Tien, Roy Vella
Filed: 25 May 20
Design
unsl4izmb6p08m3pn qmg3p8mm5a8k6oarrkpt5yl
9 Nov 20
Guhan Senguttuvan, Carlos Manuel Rivas, Anantharaj Uruthiralingam, Tinyen Hwang Shih, Satish Govindarajan
Filed: 24 Apr 19
Utility
grs 42n75kht19ckahq0oxlnvn0fmyn1638adh
9 Nov 20
Embodiments relate to transactions using image based MMS solutions over a communication device.
Eduardo Alfonso Batlle
Filed: 9 Mar 15
Utility
idezizcjk3b86s1tppvgbnd6m7
9 Nov 20
A system or method is provided to allow users to share or donate a portion of their credit line to others.
Rahul Nair
Filed: 20 Aug 17
Utility
5q8f962xzpccpehawqv62drsrtezba49ka5h8sm57r2vag604zfrl 0o94
4 Nov 20
A fraud detection model is used by a computer system to evaluate whether to grant a request to access a secure electronic resource.
Yanfei Dong
Filed: 29 Apr 19
Utility
itmpnr3q6y7rkup4wb158s rkni52tx1mb4au5dghv8y8j3gtkhbe2
4 Nov 20
A fraud detection model is used by a computer system to evaluate whether to grant a request to access a secure electronic resource.
Yuan Deng, Yanfei Dong
Filed: 30 Dec 19
Utility
hc17xwwg9eji27 62eeg
4 Nov 20
A computer system detects that a first user has selected an element corresponding to accessing a checkout page of a merchant.
Noam MARIANNE
Filed: 29 Apr 19
Utility
mv18e81wikzmiop04ezqnahx1la438feafal6iq93sa
4 Nov 20
Systems and methods of authenticating voice data using a ledger (blockchain).
Meethil Vijay Yadav, Bradley Wardman, Braden Christopher Ericson
Filed: 29 Apr 19
Utility
cxanlh43u4rnk88yk2dbj
4 Nov 20
Apparatus, systems, and methods are disclosed that operate to receiving an authentication request at a server associated with an authenticating entity from a requesting party responsive to a request being provided to the requesting party by a client terminal associated with an unauthenticated individual purporting to be an individual account owner previously authenticated with the authenticating entity.
Rene M. Pelegero, Girish Balasubramanian, Rohan Mahadevan
Filed: 17 May 20
Utility
4fqhd5vujz1dbas3yqcgcd z55d1ssqo
4 Nov 20
Systems and methods that determine an anomaly in a network are provided.
Shlomi BOUTNARU
Filed: 17 May 20
Utility
0zazrkgiwpw1x4lhxgw3o04gz8w0h7qfi7yeyi
4 Nov 20
There are provided systems and methods for a proxy and navigation code injection to prevent malicious messaging attacks.
George Chen Kaidi
Filed: 29 Apr 19
Utility
tq2qkiw1k89t6rlc0m096jqjdcz8z9jbvmuyi6 uexpy96lq7ma43v
2 Nov 20
A computer system identifies that a first portion of markup language, extracted from a markup language document of a website, corresponds to a first actionable element, wherein the first portion of markup language is a variable length representation.
Yarden Raiskin
Filed: 7 Apr 19
Utility
0km4c5zz6mdrwx27xevov4by s3
2 Nov 20
A user enables a communication, such as through a tap, between an NFC-enabled payment or funding card and a mobile device.
Ali Minaei Moghadam
Filed: 15 Apr 19
Utility
t48xjrir4tb6vqmdblzxf8opehmpoll34o0s5p8v11q670t8b
28 Oct 20
A method may include allocating a number of public keys, where each respective public key is allocated to a respective entity of a number of entities; storing a number of private keys, where each respective private corresponds to a respective public key; storing one or more decryption algorithms, where each respective decryption algorithm is configured to decrypt data previously encrypted using at least one encryption algorithm of the encryption algorithms.
Daniel Manges
Filed: 2 Mar 20