Issued Patents 2017
Showing 1–14 of 14 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 9832199 | Protecting access to hardware devices through use of a secure processor | Richard H. Boivie, James R. Kraemer, Jeb R. Linton | 2017-11-28 |
| 9819653 | Protecting access to resources through use of a secure processor | Richard H. Boivie, James R. Kraemer, Jeb R. Linton | 2017-11-14 |
| 9811683 | Context-based security screening for accessing data | Samuel S. Adams, James R. Kraemer, Jeb R. Linton | 2017-11-07 |
| 9785373 | Optimizing fine grained context addressability in highly dimensional environments using TCAM hybrid memory and storage architectures | Samuel S. Adams, Suparna Bhattacharya, James R. Kraemer | 2017-10-10 |
| 9741138 | Node cluster relationships in a graph database | James R. Kraemer, Jeb R. Linton | 2017-08-22 |
| 9703894 | Stored data with temporal proximity analysis for very large scale data with very low built in latency | Samuel S. Adams, Suparna Bhattacharya, James R. Kraemer | 2017-07-11 |
| 9697898 | Content addressable memory with an ordered sequence | Samuel S. Adams, Suparna Bhattacharya, James R. Kraemer | 2017-07-04 |
| 9697240 | Contextual state of changed data structures | James R. Kraemer, Harold L. Ossher, David M. Ungar | 2017-07-04 |
| 9646271 | Generating candidate inclusion/exclusion cohorts for a multiply constrained group | German Goldszmidt, James R. Kraemer, Robin Lougee, Kirill Osipov | 2017-05-09 |
| 9619580 | Generation of synthetic context objects | Samuel S. Adams, James R. Kraemer | 2017-04-11 |
| 9619468 | Generation of synthetic context frameworks for dimensionally constrained hierarchical synthetic context-based objects | Samuel S. Adams, James R. Kraemer, Jeb R. Linton | 2017-04-11 |
| 9607048 | Generation of synthetic context frameworks for dimensionally constrained hierarchical synthetic context-based objects | Samuel S. Adams, James R. Kraemer, Jeb R. Linton | 2017-03-28 |
| 9560052 | Installing virtual machines within different communication pathways to access protected resources | Timothy Durniak, James R. Kraemer, Jeb R. Linton | 2017-01-31 |
| 9553877 | Installing virtual machines within different communication pathways to access protected resources | Timothy Durniak, James R. Kraemer, Jeb R. Linton | 2017-01-24 |