| 12373823 |
Facilitating cryptocurrency-based transactions with time constraint |
Muhammad Saad, Jakub Burgis |
2025-07-29 |
| 12367400 |
System and method for compact tree representation for machine learning |
Omri Moshe Lahav, Michael Dymshits, David Tolpin |
2025-07-22 |
| 12363161 |
Neutralizing evasion techniques of malicious websites |
Adam Oest, Penghui Zhang |
2025-07-15 |
| 12333545 |
Probabilistic anomaly detection in streaming device data |
Jakub Burgis |
2025-06-17 |
| 12307454 |
Laundering detection in second layer networks |
Muhammad Saad, Jakub Burgis |
2025-05-20 |
| 12182807 |
Interface for constructing smart protocols for execution on blockchain platforms |
Muhammad Saad, Jakub Burgis |
2024-12-31 |
| 11978038 |
Hot wallet protection using a layer-2 blockchain network |
Jakub Burgis, Andrew Marshall, Muhammad Saad |
2024-05-07 |
| 11805129 |
Fictitious account generation on detection of account takeover conditions |
Ran Sun |
2023-10-31 |
| 11700250 |
Voice vector framework for authenticating user interactions |
Meethil Vijay Yadav, Michael Weideman, Eric Nunes |
2023-07-11 |
| 11677781 |
Automated device data retrieval and analysis platform |
Jakub Burgis, Blake Butler |
2023-06-13 |
| 11665199 |
Using cloned accounts to track attacks on user accounts |
Ran Sun |
2023-05-30 |
| 11610206 |
Analysis platform for actionable insight into user interaction data |
Eric Nunes, Meethil Vijay Yadav |
2023-03-21 |
| 11277437 |
Automated device data retrieval and analysis platform |
Jakub Burgis, Blake Butler |
2022-03-15 |
| 11265323 |
Fictitious account generation on detection of account takeover conditions |
Ran Sun |
2022-03-01 |
| 11233820 |
Systems and methods for detecting phishing websites |
Penghui Zhang, Adam Oest, Bradley Wardman |
2022-01-25 |
| 11080388 |
Automatic extraction of information from obfuscated image regions |
Bradley Wardman, Sai Raghavendra Maddhuri Venkata Subramaniya |
2021-08-03 |
| 11049021 |
System and method for compact tree representation for machine learning |
Omri Moshe Lahav, Michael Dymshits, David Tolpin |
2021-06-29 |
| 10893072 |
Using cloned accounts to track attacks on user accounts |
Ran Sun |
2021-01-12 |
| 10699066 |
Identifying and mapping emojis |
Christopher Harkness |
2020-06-30 |
| 10445163 |
Advanced computer system drift detection |
Omri Moshe Lahav, David Tolpin |
2019-10-15 |
| 10057358 |
Identifying and mapping emojis |
Christopher Harkness |
2018-08-21 |