Issued Patents 2023
Showing 1–24 of 24 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11816231 | Using machine-learning models to determine graduated levels of access to secured data for remote devices | Maharaj Mukherjee, Deborah Mayers, Jinna Kim | 2023-11-14 |
| 11797954 | Digital check disbursement using digital chip and distributed ledger methods | Maharaj Mukherjee, Benjamin Moores | 2023-10-24 |
| 11797574 | Hierarchic distributed ledger for data lineage | Maharaj Mukherjee | 2023-10-24 |
| 11797388 | Systems and methods for lossless network restoration and syncing | Manu Kurian, William August Stahlhut | 2023-10-24 |
| 11785036 | Real-time validation of data transmissions based on security profiles | Guisen Saffel | 2023-10-10 |
| 11778048 | Automatically executing responsive actions upon detecting an incomplete account lineage chain | Edward Lee Traywick, Scot Lincoln Daniels | 2023-10-03 |
| 11777870 | Machine-learning (ML)-based systems and methods for maximizing resource utilization | Naga Vamsi Krishna Akkapeddi, Maharaj Mukherjee, William August Stahlhut, Manu Kurian, Kevin A. Delson | 2023-10-03 |
| 11770392 | Method and system for data communication with anomaly detection | Elijah Clark | 2023-09-26 |
| 11763381 | Dynamic unauthorized activity detection and control system | Youshika C. Scott, Charlene L. Ramsue | 2023-09-19 |
| 11750630 | Real-time validation of application data | Gulsen Saffel | 2023-09-05 |
| 11735017 | Artificial intelligence (AI)-based security systems for monitoring and securing physical locations | Nathalie Elizabeth Conley, Elizabeth Jordan Knight, Lauren Thanh Nguyen-Lo, Robert Jon Armstrong | 2023-08-22 |
| 11711385 | Real-time detection of anomalous content in transmission of textual data | Elijah Clark | 2023-07-25 |
| 11693898 | System and method for determining a file for an interaction with a wearable device based on utility indicators | Kyle Mayers, Jinna Kim, Maharaj Mukherjee | 2023-07-04 |
| 11647026 | Automatically executing responsive actions based on a verification of an account lineage chain | Edward Lee Traywick, Scot Lincoln Daniels | 2023-05-09 |
| 11637870 | User responses to cyber security threats | Michael Beveridge, Edward Lee Traywick, Elizabeth R. Liuzzo, Caleb G. Mann, David J. Walsh +3 more | 2023-04-25 |
| 11636203 | System for isolated access and analysis of suspicious code in a disposable computing environment | Kyle Mayers, Jon Codispoti, Jinna Kim, Dustin Paul Stocks | 2023-04-25 |
| 11630889 | User monitoring and access control based on physiological measurements | Elizabeth R. Liuzzo, Edward Lee Traywick, Elijah Clark | 2023-04-18 |
| 11627152 | Real-time classification of content in a data transmission | Gulsen Saffel | 2023-04-11 |
| 11616794 | Data management system | Edward Lee Traywick, Elijah Clark, Caleb G. Mann, Michael Beveridge | 2023-03-28 |
| 11582250 | Scanning of content in weblink | Keaton Drake, Marci Landy, Cody Searl | 2023-02-14 |
| 11574056 | System for identifying suspicious code embedded in a file in an isolated computing environment | Jinna Kim, Dustin Paul Stocks | 2023-02-07 |
| 11568614 | Adaptive augmented reality system for dynamic processing of spatial component parameters based on detecting accommodation factors in real time | Olga Kocharyan, Deborah Mayers, Maharaj Mukherjee | 2023-01-31 |
| 11556873 | Cognitive automation based compliance management system | Jinna Kim, Richard S. Scot, Elena Kvochko, Monika Kapur, Michael Ogrinz | 2023-01-17 |
| 11550885 | Security enabled false desktop computing environment | Daniel Horne, Robert Lang | 2023-01-10 |