Issued Patents All Time
Showing 51–75 of 109 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 11991400 | Device for executing audio cryptology in real-time for audio misappropriation prevention | Kyle Mayers, Michael Robert Young | 2024-05-21 |
| 11983710 | Hash-based transaction tagging | William August Stahlhut | 2024-05-14 |
| 11985137 | Real-time management of access controls | Elijah Clark | 2024-05-14 |
| 11979396 | Information security system and method for machine-to-machine (M2M) security and validation | Maharaj Mukherjee | 2024-05-07 |
| 11979423 | Real-time classification of content in a data transmission | Gulsen Saffel | 2024-05-07 |
| 11973762 | System for prevention of unauthorized access using authorized environment hash outputs | Elijah Clark, Scot Lincoln Daniels, Emanuel David Guller, Konata Stinson, Rick Wayne Sumrall +1 more | 2024-04-30 |
| 11966709 | Apparatus and methods to contextually decipher and analyze hidden meaning in communications | Olga Kocharyan | 2024-04-23 |
| 11956633 | Application programming interface (API) for uniform security access on a 5G network | Maharaj Mukherjee, Deborah Mayers, Jinna Kim | 2024-04-09 |
| 11954990 | Artificial intelligence (AI)-based security systems for monitoring and securing physical locations | Nathalie Elizabeth Conley, Elizabeth Jordan Knight, Lauren Thanh Nguyen-Lo, Robert Jon Armstrong | 2024-04-09 |
| 11948157 | Multi-source anomaly detection and automated dynamic resolution system | Elijah Clark | 2024-04-02 |
| 11934554 | Information security by preventing unauthorized data access | Madhavi Mendu | 2024-03-19 |
| 11928135 | Edge computing data reproduction and filtering gatekeeper | Manu Kurian, Maharaj Mukherjee, Morgan S. Allen, Naga Vamsi Krishna Akkapeddi | 2024-03-12 |
| 11914709 | Hybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software | Maharaj Mukherjee | 2024-02-27 |
| 11816231 | Using machine-learning models to determine graduated levels of access to secured data for remote devices | Maharaj Mukherjee, Deborah Mayers, Jinna Kim | 2023-11-14 |
| 11797388 | Systems and methods for lossless network restoration and syncing | Manu Kurian, William August Stahlhut | 2023-10-24 |
| 11797954 | Digital check disbursement using digital chip and distributed ledger methods | Maharaj Mukherjee, Benjamin Moores | 2023-10-24 |
| 11797574 | Hierarchic distributed ledger for data lineage | Maharaj Mukherjee | 2023-10-24 |
| 11785036 | Real-time validation of data transmissions based on security profiles | Guisen Saffel | 2023-10-10 |
| 11777870 | Machine-learning (ML)-based systems and methods for maximizing resource utilization | Naga Vamsi Krishna Akkapeddi, Maharaj Mukherjee, William August Stahlhut, Manu Kurian, Kevin A. Delson | 2023-10-03 |
| 11778048 | Automatically executing responsive actions upon detecting an incomplete account lineage chain | Edward Lee Traywick, Scot Lincoln Daniels | 2023-10-03 |
| 11770392 | Method and system for data communication with anomaly detection | Elijah Clark | 2023-09-26 |
| 11763381 | Dynamic unauthorized activity detection and control system | Youshika C. Scott, Charlene L. Ramsue | 2023-09-19 |
| 11750630 | Real-time validation of application data | Gulsen Saffel | 2023-09-05 |
| 11735017 | Artificial intelligence (AI)-based security systems for monitoring and securing physical locations | Nathalie Elizabeth Conley, Elizabeth Jordan Knight, Lauren Thanh Nguyen-Lo, Robert Jon Armstrong | 2023-08-22 |
| 11711385 | Real-time detection of anomalous content in transmission of textual data | Elijah Clark | 2023-07-25 |