| 11212288 |
Detection and prevention of attempts to access sensitive information in real-time |
Byung Chul Tak |
2021-12-28 |
| 11184402 |
Resource access policy enforcement using a hypergraph |
Joshua F. Payne, Arjun Natarajan, Roger C. Raphael, Scott Schumacher |
2021-11-23 |
| 11178237 |
Geolocation-based activation and de-activation of hardware and software functionalities in the cloud |
Dimitrios Pendarakis |
2021-11-16 |
| 11178151 |
Decentralized database identity management system |
Kapil Kumar Singh, Suresh N. Chari, Sridhar R. Muppidi, Dong Su |
2021-11-16 |
| 11100593 |
Using social network data to detect and quantify unauthorized consumption of content |
Naga A. Ayachitula, Mahesh Gajwani, Abhishek Malvankar |
2021-08-24 |
| 11095528 |
Identity network onboarding based on confidence scores |
Joshua F. Payne, Kapil Kumar Singh, Arjun Natarajan |
2021-08-17 |
| 11091171 |
Controlling driving modes of self-driving vehicles |
Michael S. Gordon, James R. Kozloski, Peter K. Malkin, Clifford A. Pickover |
2021-08-17 |
| 11025640 |
Verification of geolocation of devices in a cloud data center |
Dimitrios Pendarakis, David R. Safford |
2021-06-01 |
| 10995462 |
Autonomous mobile attenuator system |
James R. Kozloski, Michael S. Gordon, Clifford A. Pickover |
2021-05-04 |
| 10979452 |
Blockchain-based malware containment in a network resource |
Abhishek Malvankar, Suresh N. Chari |
2021-04-13 |
| 10967972 |
Vehicular alert system |
Clifford A. Pickover, James R. Kozloski, Justin D. Weisz, Michael S. Gordon |
2021-04-06 |
| 10944560 |
Privacy-preserving identity asset exchange |
Suresh N. Chari, Hasini Gunasinghe, Kapil Kumar Singh, Dong Su |
2021-03-09 |
| 10933528 |
Autonomous robotic monitor for alerting of hazards |
Michael S. Gordon, James R. Kozloski, Clifford A. Pickover |
2021-03-02 |
| 10901918 |
Constructing flexibly-secure systems in a disaggregated environment |
HariGovind V. Ramasamy, Eugen Schenfeld, Valentina Salapura, John A. Bivens, Yaoping Ruan +3 more |
2021-01-26 |
| 10902121 |
Policy-based detection of anomalous control and data flow paths in an application program |
Suresh N. Chari, Ian M. Molloy, Dimitrios Pendarakis |
2021-01-26 |
| 10885080 |
Cognitive ranking of terms used during a conversation |
Maryam Ashoori, Amit Anil Nanavati |
2021-01-05 |