2626 patents
Page 98 of 132
Utility
Targeted multi-dimension data extraction for real-time analysis
26 Oct 20
Methods and systems for extracting targeted data for real-time reporting are discussed.
Ayon Sinha, Rabi Chakraborty
Filed: 24 Apr 17
Utility
Secure expandable advertisements using an API and cross-domain communications
26 Oct 20
A system to present secure expandable advertisements using an API and cross-domain communication.
Francis Smith, Saji Joseph
Filed: 15 Oct 18
Utility
pi9iqu0tgfwip kjo4r5
26 Oct 20
There are provided systems and methods for a network cache of device input for redundancy during device inoperability.
Pankaj Sarin
Filed: 25 Dec 17
Utility
1udepcqucx3877 8h09wv47raokrj6s6fu9gnyou5znqarx
26 Oct 20
Systems and methods for graphically representing a deployment process of a development environment are described.
Trevor Wood, Jason Deleau
Filed: 19 Jun 19
Utility
fd95e58rb7duwaddjy9hi6kvwh7lhpwdk8m8
26 Oct 20
A provisioning machine may receive a request that an application be executed while distributed according to a distribution constraint among various devices.
Alan Honkwan Ngai, Connie W. Yang, Taiping Yu, Timothy Gordon Kimmet, Jean-Christophe Martin, Jian Xu, Xin Li, Jiang Xu, Rami El-Charif
Filed: 7 May 18
Utility
bjdmdmlgo6toor o89nkic2zzaixcpuk407hs9tz878a8nhkni
21 Oct 20
Systems and techniques for providing a low latency gateway for an asynchronous orchestration engine using direct memory are presented.
Veera Saka, Jian Wan, Rama Prasad Bodepu
Filed: 15 Apr 19
Utility
jl42d975majn1msp90g2kiim ul91fu92
21 Oct 20
Methods and systems for using machine learning to determine an origin of an alphanumeric code are presented.
Remo Antony Raymond, Yash Bansal
Filed: 17 Apr 19
Utility
9vjan021cgf6ce88iv2gd6w
21 Oct 20
Techniques are disclosed relating to tuning fraud-detection rules using machine learning.
Ravi Shanker Sandepudi, Ayez Ahmad
Filed: 18 Apr 19
Utility
ohh62grixwwvzttzgoqngova5lvk0ulweb16nauz7t0cf2x05k49
21 Oct 20
Techniques are disclosed relating to detecting anomalous transactions using machine learning.
Siva Surya Teja Vanga, Ritesh Arora
Filed: 21 Apr 19
Utility
bgpmoojuojo4rxx0y0qyc 1q2w5fvlz2e0zr5f
21 Oct 20
Systems and methods for data visualization are disclosed.
Satish Narayan Govindarajan, Gunabalan Babu, Khiem Nguyen Pham, Carlos Manuel Rivas, Guhan Senguttuvan, Anantharaj Uruthiralingam
Filed: 26 Jan 20
Utility
bm1jmd6ccq6i6ts1ew6o3h7jljbrv
21 Oct 20
Systems and techniques for providing fraud trend detection and/or loss mitigation are presented.
Shihao Ren, Yingying Tao, Chao Chen, Huiwen Tao, Fei Wang, Qian Wang
Filed: 15 Apr 19
Utility
7kogjt9trcrdbsvsrkeyjvrpgwax
19 Oct 20
A system and method for investigating trust scores.
Alex Grigoryan, Avinash Gangadharan, Akshay Peshave, Michael Morgan, Rhys Howell
Filed: 3 Feb 19
Utility
8b1nf4ffcz2w86m48m74c7hxjqsv1k0a3wzuzb56e
19 Oct 20
A method and system for forming hybrid cluster to process log files are described.
Chi-Hsien Chiu, Patrick Crane, Alyssa Neckorcuk, Gyanit Singh, Neelakantan Sundaresan
Filed: 7 Aug 17
Utility
uamn5btx hdj1itlphzm1fmkpe09ezibl1tfi6z0jh6m90ton325
19 Oct 20
Methods and systems are presented for providing data consistency in a distributed data storage system using an eventual consistency model.
Junaid Zaheer Jaswal, Dmitry Martyanov
Filed: 19 Sep 18
Utility
x854bur66vimkh2zviis2p0fa2rlv89ix vb0gc8gycifa
19 Oct 20
Systems and methods for device and payment management include detecting, through a first network, that a user device that is associated with a user is located at a trusted location.
Michael Charles Todasco, Cheng Tian
Filed: 12 Oct 16
Utility
5ro21iec46tdi qob2ktq6t4l9ykrc
19 Oct 20
A payer transaction device enables secure offline transactions using a secure element providing a secure payer account database, a secure ledger database, and a wallet application.
Satish Narayan Govindarajan, Anantharaj Uruthiralingam, Carlos Rivas, Srikanth Nandiraju
Filed: 25 Sep 17
Utility
x2ixuwehgm6lwz5h4jpsp2lb2c0
19 Oct 20
A method and apparatus for facilitating payment transactions in multiple currencies between participants is provided.
Giacomo Digrigoli, George Lee
Filed: 18 Jun 18
Utility
4apnkehiqulzmxb0s1z19ivoeuhv8 4wtvcyxqwa43kya4cc1vxrz6
14 Oct 20
Data streaming applications may need to provide high reliability, particularly depending on the nature of the data being streamed.
Siddharth Anand, Anisha Nainani, Jianliang Chen
Filed: 9 Apr 19
Utility
20fkdo1lrff4wm1u9b6zog3wwl6rze2xvtv 5yetdjht9hmj
14 Oct 20
Data streaming applications may need to provide high reliability, particularly depending on the nature of the data being streamed.
Siddharth Anand, Anisha Nainani, Jianliang Chen
Filed: 9 Apr 19
Utility
7xz 42qmspm8menblecas5vx5gu7myc916ycf26o5423uqyuwz6f1lts2
14 Oct 20
A particular machine learning architecture involving a two-part artificial intelligence (AI) model is disclosed, with one portion being trained on first data (e.g. older data) and another portion being trained on second data (e.g. newer data) in various embodiments.
Yanzan Zhou, Shuoyuan Wang, Wei Zhao, Ying Chen
Filed: 7 Nov 17