Loading...
Docoh

Workday (WDAY)

Utility
System and method for blockchain-based device authentication based on a cryptographic challenge
17 May 22
A system for blockchain-based authentication comprises an interface and a processor configured to (i) receive, by a first device, a command from a second device, where the first device is associated with a first trust certificate, (ii) receive a second trust certificate from the second device, (iii) communicate a cryptographic challenge using a public key of the second device to the second device, (iv) receive a response to the cryptographic challenge from the second device, (v) check whether the response matches with a predetermined correct response or not, and (vi) authenticate the second device and execute the commend received from the second device only if the response matches with the predetermined correct response.
Prakash Sundaresan, Lionello G. Lunesu, Antoine Cote
Filed: 20 May 20
Utility
Ledger data verification and sharing system
10 May 22
A system for ledger data includes a block repository, a metadata database, and a processor.
Parvinder Singh Thapar, Bradley Hoyle, Dirk Nicholas Dougherty
Filed: 6 Nov 18
Utility
Systems and methods for improving computational speed of planning by tracking dependencies in hypercubes
22 Mar 22
A system for updating a hypercube includes an interface and a processor.
Ngoc Nguyen, Darren Kermit Lee, Shuyuan Chen, Ritu Jain, Francis Wang
Filed: 29 Apr 19
Utility
Secure access gateway for egress system
8 Mar 22
A system for a secure connection includes an interface and a processor.
Kala Krishna Ramineni, Justin Pratt
Filed: 31 Jul 19
Utility
Methods and systems for visual data manipulation
11 Jan 22
A system for visual modification of data.
Darren Lee, Huned Botee, Ilan Cohen, Mythili Gopalakrishnan, Peter Long, Tim Berston, Adam Smith
Filed: 13 Apr 17
Utility
Spreadsheet with unit parsing
11 Jan 22
A system for parsing units of measure for spreadsheet cell values includes a processor.
Terry M. Olkin, Brian Sean Morris
Filed: 3 Dec 15
Utility
Cloud Platform Access System
30 Dec 21
receive, at an application routing platform, an API call for an application platform comprising a signed tenant token.
Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
Filed: 8 Sep 21
Utility
User action collection for sensitive customer data
28 Dec 21
A secure tenant activity data system for a deployment service includes processor that is configured to decrypt a set of encrypted stream processed monitoring data to recover a set of stream processed monitoring data; determine a transaction identifier associated with the set of stream processed monitoring data; determine whether the transaction identifier has been seen associated with a set of previous data; in response to determining that the transaction identifier has been seen associated with the set of previous data, retrieve the set of previous data; decrypt the set of previous data to recover a set of decrypted previous data; aggregate the set of stream processed monitoring data with the set of decrypted previous data to generate a set of aggregated data; encrypt the set of aggregated data to create a set of encrypted aggregated data; and provide the set of encrypted aggregated data to a safe storage area.
Parag Avinash Namjoshi, Harikrishna Narayanan, Sergei Winitzki, Yury Markovsky, Lakshminarayanan Renganarayana
Filed: 25 Feb 21
Utility
Split Keys for Wallet Recovery
25 Nov 21
A system for split keys for wallet recovery includes an interface configured to receive a request to recover a user private key, and a processor configured to provide a request to a credential issuing authority for a first encrypted recovery key share, wherein the request includes a first identification credential, receive the first encrypted recovery key share from the credential issuing authority, provide a request to a trusted organization for a second encrypted recovery key share, wherein the request includes a second identification credential, receive the second encrypted recovery key share from the trusted organization, combine the first encrypted recovery key share and the second encrypted recovery key share to determine a recovered encryption key, and determine the user private key using the recovered encryption key.
Bjorn Hamel, Prakash Sundaresan
Filed: 21 May 20
Utility
Systems and methods for improving computational speed of planning by caching optimization in hypercubes
9 Nov 21
A system for caching includes an interface to receive a portion of a hypercube to evaluate.
Ngoc Nguyen, Darren Kermit Lee, Shuyuan Chen, Ritu Jain, Francis Wang
Filed: 29 Apr 19
Utility
Ledger Data Generation and Storage for Trusted Recall of Professional Profiles
4 Nov 21
A system for ledger data includes a block repository, a metadata database, and a processor.
Parvinder Singh Thapar, Bradley Hoyle, Dirk Nicholas Dougherty
Filed: 13 Jul 21
Utility
Sharing Credentials
28 Oct 21
A system for providing an application includes an interface and a processor.
Bjorn Hamel, Jonathan David Ruggiero
Filed: 16 Apr 21
Utility
Data Space Scalability for Algorithm Traversal
14 Oct 21
A system for data space limitation includes and interface and a processor.
Viktor Brada, Peter Fedorocko, Filip Dousek, Hynek Walner
Filed: 24 Jun 21
Utility
System and Method for Verifying an Identity of a User Using a Cryptographic Challenge Based on a Cryptographic Operation
7 Oct 21
A processor-implemented system and method for enabling a relying party device associated with a relying party to verify an identity of a user.
Prakash Sundaresan, Lionello G. Lunesu, Antoine Cote
Filed: 22 Jun 21
Utility
Educational learning importation
5 Oct 21
A system for educational learning importation includes an input interface and a processor.
Johan Bosman, Stuart Bowness, Willem Brosz, Alexander Nicholls, Michael Kennedy, Anthony Theocharis, Nathan Wright
Filed: 21 Sep 16
Utility
Cloud platform access system
5 Oct 21
A system includes an interface, a tenant authentication processor, and an application routing processor.
Bjorn Hamel, Dylan Owen, Jonathan David Ruggiero
Filed: 31 Oct 18
Utility
System and method to support identity theft protection as part of a distributed service oriented ecosystem
5 Oct 21
A system and method to support identity theft protection and, in particular, to a system and method for supporting identity theft protection as part of a distributed service oriented ecosystem in Internet protocol (IP) multimedia subsystem (IMS) and non-IMS networks.
Mamdouh Ibrahim, Sri Ramanathan, Tapas K. Som, Matthew B. Trevathan
Filed: 25 May 12
Utility
Sensitive data service access
21 Sep 21
A system for accessing data includes and interface and a processor.
Jonathan David Ruggiero, Bjorn Hamel, Darius Kasad
Filed: 1 Nov 18
Utility
Linked Element Tracking In Documents
26 Aug 21
A system for element tracking in documents includes a memory device, a database, and a processor.
Jay Schultz, Brian Lee Harper, Sayan Chakraborty, Andrew Kershaw, James Casey, Josh Lannin
Filed: 12 May 21
Utility
Ledger data generation and storage for trusted recall of professional profiles
17 Aug 21
A system for ledger data includes a block repository, a metadata database, and a processor.
Parvinder Singh Thapar, Bradley Hoyle, Dirk Nicholas Dougherty
Filed: 6 Nov 18
Patents are sorted by USPTO publication date, most recent first