370 patents
Page 2 of 19
Utility
Real-time detection and prevention of online new-account creation fraud and abuse
19 Oct 23
A method, apparatus and computer program product for real-time new account fraud detection and prevention.
Nadav George Costa, Ziv Eli
Filed: 19 Apr 22
Utility
Systems and Methods for Electronic Identification of Objects with Privacy Controls
19 Oct 23
A physical object having a programmable, electronically readable tag can be identified and tracked in a given third party system with the aid of an identity services platform.
Mark M. Ingerman
Filed: 14 Apr 22
Utility
Connecting to a fixed network using an extensible drone-based, dynamic network
19 Oct 23
A method for dynamic and extensible creation of an extensible wireless network, using a set of drones that individually support server processes.
Vinay Kanitkar
Filed: 20 Jun 23
Utility
Concurrent transaction processing in a high performance distributed system of record
17 Oct 23
A distributed ledger and transaction computing network fabric over which large numbers of transactions are processed concurrently in a scalable, reliable, secure and efficient manner.
David C. Carver, Leen Khalid A. Al Shenibr, Vladimir Shtokman
Filed: 24 May 21
Utility
Real-time message delivery and update service in a proxy server network
17 Oct 23
This patent document describes technology for providing real-time messaging and entity update services in a distributed proxy server network, such as a CDN.
Matthew J. Stevens, Michael G. Merideth, Nil Alexandrov, Andrew F. Champagne, Brendan Coyle, Timothy Glynn, Mark A. Roman, Xin Xu
Filed: 20 May 22
Utility
Content delivery network (CDN) bot detection using primitive and compound feature sets
3 Oct 23
A method of detecting bots, preferably in an operating environment supported by a content delivery network (CDN) that comprises a shared infrastructure of distributed edge servers from which CDN customer content is delivered to requesting end users (clients).
Venkata Sai Kishore Modalavalasa, Sreenath Kurupati, Tu Vuong
Filed: 29 Mar 22
Utility
Systems and Methods For Content Delivery Acceleration of Virtual Reality and Augmented Reality Web Pages
21 Sep 23
Among other things, this document describes systems, devices, and methods for improving the delivery and performance of web pages authored to produce virtual reality (VR) or augmented reality (AR) experiences.
Utkarsh Goel, Martin T. Flack, Stephen L. Ludin
Filed: 23 Jan 23
Utility
Caching content securely within an edge environment
21 Sep 23
A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a customer desires, while still providing the acceleration and off-loading benefits of the edge network.
Tong Chen
Filed: 23 May 23
Utility
Systems and methods for preventing the caching of rarely requested objects
12 Sep 23
Improved technology for managing the caching of objects that are rarely requested by clients.
Dmitry Sotnikov, Brian Mancuso, Shai Kedem, Omri Guttman, Michael Hakimi
Filed: 9 Sep 22
Utility
Internet caches with object hints
5 Sep 23
Improvements to internet cache protocols are disclosed.
Dmitry Sotnikov, Denis Emelyanov, Dvir Tuberg, Arnon Shoshany, Michael Hakimi, Kfir Zigdon
Filed: 15 Nov 21
Utility
Internet address structure analysis, and applications thereof
22 Aug 23
An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling.
Pawel J. Foremski, Arthur W. Berger, David J. Plonka
Filed: 28 Jul 22
Utility
High performance distributed system of record
22 Aug 23
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner.
David C. Carver, Thomas Houman, Andrew F. Champagne, Vladimir Shtokman, Patrick Alexander Deegan, Ramanath Mallikarjuna
Filed: 6 Apr 21
Utility
Content delivery to physically-proximate devices using a mesh-assisted cache
17 Aug 23
A plurality of WiFi-enabled devices that are physically proximate to one another form an ad hoc mesh network, which is associated with an overlay network, such as a content delivery network.
William R. Law
Filed: 25 Apr 23
Utility
Detection and optimization of content in the payloads of API messages
8 Aug 23
A server in a content delivery network (CDN) can examine API traffic and extract therefrom content that can be optimized before it is served to a client.
Utkarsh Goel, Martin T. Flack
Filed: 17 Jun 22
Utility
High performance distributed system of record with unspent transaction output (UTXO) database snapshot integrity
8 Aug 23
A method operative in association with a set of transaction handling computing elements that comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein presence of a transaction recorded within a data block is verifiable via a cryptographic hash, and wherein Unspent Transaction Output (UTXO) data structures supporting the immutable chain of data blocks are maintained in a UTXO database, wherein a UXTO is an output from a finalized transaction that contains a value.
William R. Sears, Leen AlShenibr, Samuel Erb
Filed: 3 Sep 20
Utility
Multicast overlay network for delivery of real-time video
1 Aug 23
A method of multicasting real-time video is described.
Charles E. Gero, Martin Lohner, Abhijit C. Mehta, Brandon O. Williams
Filed: 15 Mar 21
Utility
High performance distributed system of record with cryptographic service support
27 Jul 23
A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner.
David C. Carver, Andrew F. Champagne, Ramanath Mallikarjuna, Thomas Houman
Filed: 14 Mar 23
Utility
Intermediary handling of identity services to guard against client side attack vectors
4 Jul 23
This document describes, among other things, security hardening techniques that guard against certain client-side attack vectors.
Jason C. Bonci
Filed: 4 Apr 22
Utility
Uniquely identifying and securely communicating with an appliance in an uncontrolled network
29 Jun 23
A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider.
Rupinder Singh Gill, Shravan Kumar Mettu, Seetharama Sarma Ayyadevara
Filed: 21 Feb 23
Utility
Learning-based storage reduction in an overlay network
27 Jun 23
An overlay network is augmented to provide more efficient data storage by processing a dataset of high dimension into an equivalent dataset of lower dimension, wherein the data reduction reduces the amount of actual physical data but not necessarily its informational value.
Indrajit Banerjee
Filed: 20 Jul 21