| 12415542 |
Become an AV test operator as a passenger |
Matthew Owen Pugh, Miles Avery Bowman, Moorissa Meritseba Tjokro, Adam Chase |
2025-09-16 |
| 12271841 |
Rideshare service fleet optimization using vehicle sensor data |
Nikola John Linn Noxon, Devina Jain, Curt Harrington, Kelan Fitzgerald Stoy, Edward Henry Forscher +1 more |
2025-04-08 |
| 12223559 |
Natural language processing analysis of legal requirements |
Brent Valle, Ruixin Ge |
2025-02-11 |
| 12175247 |
Apparatuses, methods, and systems for instructions for a hardware assisted heterogeneous instruction set architecture dispatcher |
Balaji Masanamuthu Chinnathurai, Brian L. Vajda |
2024-12-24 |
| 12026640 |
Autonomous vehicle seat reservation |
Curt Harrington, Wei Lu, Devina Jain, Nikola John Linn Noxon |
2024-07-02 |
| 11977630 |
Detecting ransomware |
Sherin M. Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King |
2024-05-07 |
| 11847215 |
Model development and application to identify and halt malware |
Celeste R. Fralick, Jonathan B. King, Carl D. Woodward, ANDREW V. HOLTZMANN, Sherin M. Mathews |
2023-12-19 |
| 11644322 |
Updating a pick-up or drop-off location for a passenger of an autonomous vehicle |
Curt Harrington, Wei Lu, Devina Jain, Nikola John Linn Noxon |
2023-05-09 |
| 11392695 |
Detecting ransomware |
Sherin M. Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King |
2022-07-19 |
| 11341405 |
Semantic signatures |
Amanda da Silveira Kuhn, Era Johal, Yingwei Xin, Shuo Li, Siyu Liao |
2022-05-24 |
| 11204998 |
Detection and mitigation of fileless security threats |
German Lancioni, Cedric Cochin |
2021-12-21 |
| 11184373 |
Cryptojacking detection |
German Lancioni, Carl D. Woodward |
2021-11-23 |
| 11066663 |
Multiplexed deterministic assembly of DNA libraries |
Erik Jedediah Dean, Kedar Patel, Aaron Miller, Philip Weyman |
2021-07-20 |
| 11063978 |
Protecting personally identifiable information from electronic user devices |
Ryan Durand, Carl D. Woodward, Lynda M. Grindstaff |
2021-07-13 |
| 10956568 |
Model development and application to identify and halt malware |
Celeste R. Fralick, Jonathan B. King, Carl D. Woodward, ANDREW V. HOLTZMANN, Sherin M. Mathews |
2021-03-23 |
| 10909236 |
Detection of malicious invocation of application program interface calls |
Balbir Singh, Rajbir Bhattacharjee |
2021-02-02 |
| 10909638 |
Verified social media content |
Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt |
2021-02-02 |
| 10902123 |
Remediation of flush reload attacks |
Carl D. Woodward |
2021-01-26 |
| 10825111 |
Verified social media content |
Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt |
2020-11-03 |
| 10795700 |
Video-integrated user interfaces |
David Nguyen, Allison Youngdahl, Shawn D. Meyer, Ziqiu Li, Rob W. Honts +3 more |
2020-10-06 |
| 10795994 |
Detecting ransomware |
Sherin M. Mathews, Carl D. Woodward, Celeste R. Fralick, Jonathan B. King |
2020-10-06 |
| 10375109 |
Protecting personally identifiable information from electronic user devices |
Ryan Durand, Carl D. Woodward, Lynda M. Grindstaff |
2019-08-06 |
| 10339303 |
Detection of malicious invocation of application program interface calls |
Balbir Singh, Rajbir Bhattacharjee |
2019-07-02 |
| 10204384 |
Data loss prevention of social media content |
Carl D. Woodward, Steven Grobman, Ryan Durand, Simon Hunt |
2019-02-12 |
| 10140164 |
Computer resource allocation to workloads in an information technology environment |
David M. Klimek, Farah Lalani, Justin Melde, Kate Wilson, Brian Svehaug |
2018-11-27 |