144 patents
Page 6 of 8
Utility
Secure authentication and network access management for mobile computing devices
12 Oct 20
Methods and apparatuses are described for secure authentication and network access management for mobile computing devices.
Rohith Ashok, Stein Eriksen
Filed: 18 Feb 18
Utility
Generation of cryptographic authentication keys using a defined sequence of security questions
5 Oct 20
Methods and apparatuses are described for generating a cryptographic authentication key.
Peter McCormack, Frank Friel, Simon Brown, Thomas McGuire
Filed: 2 Apr 20
Utility
Seed splitting and firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems
14 Sep 20
The Seed Splitting and Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms transaction signing request, key backup request, key recovery request inputs via SFTSP components into transaction signing response, key backup response, key recovery response outputs.
Gang Cheng, Vladimir Tsitrin, Thomas Stephen McGuire
Filed: 17 May 18
Utility
Automated execution of computer software based upon determined empathy of a communication participant
24 Aug 20
Methods and apparatuses are described for automated execution of computer software based upon determined empathy of a communication participant.
Samir Kakkar, Hilary Lex, Neha Dave, Richa Srivastava
Filed: 16 Oct 18
Utility
Systems and methods for mobile automation testing by emulating human behaviors
17 Aug 20
A computerized method of testing a mobile application stored on a mobile test device includes executing, by a computing device, a test script stored in memory of the computing device; running, by the computing device, according to the test script, a human behavior simulation module; retrieving, by the computing device, an event list stored in a server, the event list including one or more electronic human behavior simulations; receiving, by the computing device an electronic human behavior simulation from the event list; providing, by the computing device, selected data of the electronic human behavior simulation to memory of the server for recordation; executing, by the computing device, the electronic human behavior simulation on a mobile test device in electronic communication with the computing device; and executing, by the computing device, according to the test script, a test case stored in memory of the computing device on the mobile test device.
Ke Yang, Hongbing Gu, Yanyu Xu, Pengrui Sun
Filed: 26 Nov 18
Utility
Automated secure software development management, risk assessment, and risk remediation
10 Aug 20
Methods and apparatuses are described for automated secure software development management, risk assessment and risk remediation.
Erkang Zheng, Jason Kao, Bingrong He
Filed: 27 Dec 17
Utility
Automated analysis, categorization, and behavior prediction of computer scripts using rules-based pattern matching
13 Jul 20
Methods and apparatuses are described for automated analysis, categorization, and behavior prediction of computer scripts using rules-based pattern matching.
Romy Sreedharan, Celeste Dupuis
Filed: 13 May 19
Utility
Time-series database user authentication and access control
13 Jul 20
Methods and apparatuses are described for time-series database user authentication and access control.
Edward Colletta, Mrinal Vala
Filed: 29 Aug 19
Utility
Detecting vulnerabilities associated with a software application build
22 Jun 20
Methods and apparatuses are described for detecting vulnerabilities associated with a software application build.
Jon Augustine Freitag, Joseph Scott Yarman, Stuart Te-Hui Shih
Filed: 15 Sep 19
Utility
Classifying unstructured computer text for complaint-specific interactions using rules-based and machine learning modeling
22 Jun 20
Methods and apparatuses are described for analyzing unstructured computer text for identification and classification of complaint-specific interactions.
Aravind Chandramouli, Nitin Hardeniya, Sunil Kumar
Filed: 6 Feb 17
Utility
Automatic authentication switching in online live chat applications
22 Jun 20
Methods and apparatuses are described for automatic authentication switching in online chat sessions.
Richard Elliott Cox, Jr., Robert S. Campbell, Ryan Hightower, Ramakrishnan Balachandran, Mena Gerges
Filed: 7 Aug 17
Utility
Automated computer text classification and routing using artificial intelligence transfer learning
8 Jun 20
Methods and apparatuses are described for automated computer text classification and routing using artificial intelligence transfer learning.
Pu Li, Chuanlu Yu, Hua Hao, Yu Zhang, Dong Han
Filed: 30 May 18
Utility
Automated log analysis and problem solving using intelligent operation and deep learning
11 May 20
A computer-implemented method of training, using a computer log file, an application error prediction engine to identify one or more application errors includes parsing the computer log file into a plurality of data sets.
Pu Li, Maohua Sun, Hua Hao, Junmei Liu, Yuanjun Liu, Yucai Yang
Filed: 28 Aug 17
Utility
Computer systems and methods for securing access to content provided by virtual assistants
11 May 20
A computerized method of authenticating a user includes receiving, by a computing device, first biometric data from the user via a first biometric input device; extracting one or more first features from the first biometric data; generating a first vector based on the first features; computing a first similarity score reflecting a geometric distance between the first vector and a first reference vector stored in memory; receiving second biometric data from the user via a second biometric input device; extracting one or more second features from the second biometric data; generating a second vector based on the second features; computing a second similarity score reflecting a geometric distance between the second vector and a second reference vector stored in memory; computing a confidence score based on the first and second similarity scores; and determining a right of the user to access restricted information based on the confidence score.
Shanthan Kesharaju, Pranab Mohanty
Filed: 9 May 19
Utility
Firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems
4 May 20
The Firmware Extension for Secure Cryptocurrency Key Backup, Restore, and Transaction Signing Platform Apparatuses, Methods and Systems (“SFTSP”) transforms transaction signing request, key backup request, key recovery request inputs via SFTSP components into transaction signing response, key backup response, key recovery response outputs.
Gang Cheng, Vladimir Tsitrin, Thomas Stephen McGuire
Filed: 14 Feb 18
Utility
Domain-specific stopword removal from unstructured computer text using a neural network
20 Apr 20
Methods and apparatuses are described for analyzing unstructured computer text for domain-specific stopword identification and removal.
Aravind Chandramouli
Filed: 6 Feb 17
Utility
Protection of data in a zero user interface environment
20 Apr 20
Described herein are methods and systems for secure communication of private audio data in a zero user interface computing environment.
Michael Quinn, Adam Schouela, Adrian Ronayne, Emily Elwell, Aaron Montford
Filed: 14 May 18
Utility
Generating and deploying customized software containers
20 Apr 20
Methods and apparatuses are described for generating and deploying customized application software containers.
Boris Kalinichenko, Lonergan Harrington, Thomas Trogele
Filed: 13 Feb 18
Utility
Data classification with social profile data
20 Apr 20
A method of processing data by one or more data processing systems for classification of the processed data into one or more predefined classifications, the method comprising: receiving by one or more data processing systems social profile data; binding by the one or more data processing systems based on the input social profile data, values of one or more attributes included in the social profile data to one or more parameters of a classifier executing on the one or more data processing systems; classifying data representing the user into one or more predefined classifications; for one of the predefined classifications into which the data representing the user is classified, identifying by the one or more data processing systems a candidate action included in the predefined classification and unassociated with the user; and transmitting an alert to notify the user of the candidate action.
Travis Kosarek, Morgan Boushka, Carolyn Manis Sorensen
Filed: 2 Jun 16
Utility
Systems and methods for user authentication using pattern-based risk assessment and adjustment
23 Mar 20
A computer-implemented method is provided for authenticating an identity of a user requesting access to a computerized resource via a client computing device.
Jason Kao, Erkang Zheng
Filed: 23 Feb 17