| 12425239 |
Authenticating certificate bundles with asymmetric keys |
Tony Long, Mauruthi Geetha Mohan |
2025-09-23 |
| 12418539 |
Re-executing an authorization process to determine an updated set of authorized actions that may be initiated by a computing entity during a session |
Tony Long, Krishna Sai Veera Reddy, Philip Ramsey, Arsalan Ahmad, Thomas James Andrews |
2025-09-16 |
| 12314675 |
System and method for a cognitive conversation service |
Sreevishnu Somasekharan Nair |
2025-05-27 |
| 12032434 |
Machine learning supplemented storage device inspections |
Abhishek Srivastava, Bernhard E. Knigge |
2024-07-09 |
| 11695750 |
Mutually authenticated voice communications |
Matthew Wayne Williams |
2023-07-04 |
| 11689354 |
Efficient and scalable mechanism to protect integrity and authenticity of large data sets in cloud logging environments |
Saikat Chakrabarti, Pratibha Anjali Dohare |
2023-06-27 |
| 11531582 |
Data storage device dynamically relocating data sectors based on map-out value |
Bernd Lamberts, Remmelt Pit, Abhishek Srivastava, Ammar A. Zayed |
2022-12-20 |
| 10607227 |
System, method, and computer program product for detecting potential money laundering activities |
Morvarid Jamalian, Morhaf Mahrous |
2020-03-31 |