Issued Patents All Time
Showing 25 most recent of 85 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12001486 | Identifying reference data in a source data set | Martin Oberhofer, Joerg Rehr, Sushain Pandit | 2024-06-04 |
| 11677699 | Cognitive pre-loading of referenced content in electronic messages | Sushain Pandit, Martin Oberhofer | 2023-06-13 |
| 11361039 | Autodidactic phenological data collection and verification | Fang Wang, Su Liu, Jeffrey A. Calcaterra | 2022-06-14 |
| 11334757 | Suspect duplicate processing through a feedback-driven learning process | Sushain Pandit, Martin Oberhofer, Joerg Rehr | 2022-05-17 |
| 11333794 | Multimedia derived wind map | Sushain Pandit, Charles D. Wolfson, Su Liu, Fang Wang | 2022-05-17 |
| 11165624 | Sentry for information technology system blueprints | Brian P. Byrne, Martin Oberhofer, Sushain Pandit | 2021-11-02 |
| 11159358 | Sentry for information technology system blueprints | Brian P. Byrne, Martin Oberhofer, Sushain Pandit | 2021-10-26 |
| 10887081 | Audit trail configuration in a blockchain | Martin Oberhofer, Sushain Pandit | 2021-01-05 |
| 10796014 | Data license manager | Martin Oberhofer, Sushain Pandit, Charles D. Wolfson | 2020-10-06 |
| 10452703 | Using ontologies to comprehend regular expressions | Brian P. Byrne, Martin Oberhofer, Sushain Pandit | 2019-10-22 |
| 10341307 | Method and system for secure document exchange | Heather M. Hinton | 2019-07-02 |
| 10311075 | Refactoring of databases to include soft type information | Nicholas Kanellos, Jonathan Limburn, Martin Oberhofer | 2019-06-04 |
| 10262149 | Role access to information assets based on risk model | Martin Oberhofer, Sushain Pandit | 2019-04-16 |
| 10255364 | Analyzing a query and provisioning data to analytics | Brian P. Byrne, Martin Oberhofer, Sushain Pandit | 2019-04-09 |
| 10229203 | Social media bot to representational state transfer (REST) proxy for data systems | Jeff J. Li, Wendi L. Nusbickel | 2019-03-12 |
| 10229202 | Social media bot to representational state transfer (REST) proxy for data systems | Jeff J. Li, Wendi L. Nusbickel | 2019-03-12 |
| 10223432 | Interactive social media access to data systems | Arron J. Harden, Jeff J. Li, Wendi L. Nusbickel | 2019-03-05 |
| 10210226 | Interactive social media access to data systems | Arron J. Harden, Jeff J. Li, Wendi L. Nusbickel | 2019-02-19 |
| 10169723 | Distributed policy distribution for compliance functionality | Heather M. Hinton | 2019-01-01 |
| 10122655 | Personalizing data system components and data sources as chatbots in a group chat session | Jeff J. Li, Wendi L. Nusbickel | 2018-11-06 |
| 10116596 | Personalizing data system components and data sources as chatbots in a group chat session | Jeff J. Li, Wendi L. Nusbickel | 2018-10-30 |
| 10032039 | Role access to information assets based on risk model | Martin Oberhofer, Sushain Pandit | 2018-07-24 |
| 9916140 | Method of generating end-to-end web application from tooling | Jeff J. Li, Wendi L. Nusbickel | 2018-03-13 |
| 9813388 | Method and system for secure document exchange | Heather M. Hinton | 2017-11-07 |
| 9716700 | Code analysis for providing data privacy in ETL systems | Martin Oberhofer, Yannick Saillet | 2017-07-25 |