| 11150056 |
System and method for dynamic camouflaging |
Michael Bender, Rhonda L. Childress, Timothy J. Forshee-Lee |
2021-10-19 |
| 11093636 |
Maintaining data protection compliance and data inference from data degradation in cross-boundary data transmission using containers |
Thanh Lam, Daniel S. Riley, Craig M. Trim, Rhonda L. Childress |
2021-08-17 |
| 11023576 |
Detecting malicious activity on a computer system |
Adam Lee Griffin, Christopher David Scott, Craig M. Trim, Rhonda L. Childress |
2021-06-01 |
| 11019064 |
Data security across data residency restriction boundaries |
Karen Cheng, Thanh Lam, Daniel S. Riley, Craig M. Trim |
2021-05-25 |
| 10997193 |
Managing queries in business intelligence platforms |
Arun Balasubramanyan, Yuntao Liu, Pamela K. Prinz, John A. Tobasco |
2021-05-04 |
| 10888777 |
Deep learning from real world and digital exemplars |
Aaron K. Baughman, Venkatesh Ashok Rao Rao |
2021-01-12 |