1321 patents
Utility
Processing techniques for database transaction requests with operations defined by different ORM libraries
16 Jan 24
Techniques are disclosed relating to processing database transactions that include application operations defined by different object relational mapping (ORM) libraries.
Rajasudharsan Adhikesavan, Jaykumar Patel, Nikhil Sharma, Alwin Joseph
Filed: 12 Sep 22
Utility
Multi-factor authentication utilizing non-centralized key creation with physical randomness
16 Jan 24
Methods and systems are provided for a multi-factor authentication technique that includes inputs of a physical key possessed by the user as a factor.
Joshua Buck Powers
Filed: 29 Oct 21
Utility
Self-executing bot based on cached user data
16 Jan 24
Cached data is obtained from a device.
Pankaj Sarin
Filed: 13 Jan 22
Utility
Initiating mobile transactions via gestures
16 Jan 24
Aspects of the present disclosure involve systems, methods, devices, and the like for processing a transaction.
Rahul Nair
Filed: 30 Nov 21
Utility
Easy creation of mobile code
16 Jan 24
A user is presented with a first display with certain parties and a second display on the same screen, where the user can drag and drop the parties on the first screen to the second screen to create a desired network flow.
Ken Reddy, Saulius Zukauskas
Filed: 30 Jul 21
Utility
Dynamic authentication through user information and intent
16 Jan 24
There are provided systems and methods for dynamic authentication through user information and intent.
Sumeet Ahuja
Filed: 11 May 21
Utility
Image-based financial processing
16 Jan 24
Image-based processing of sources of financial information for financial transactions is provided.
Michael Mettler, Josh Bleecher Snyder
Filed: 3 Sep 19
Utility
Updating counters distributed across a plurality of nodes
9 Jan 24
Techniques are disclosed relating to methods that include initializing, by a computer in a computer system, an event counter that includes a plurality of sub-counter groups, each plurality of sub-counter groups including at least two sub-counters located on different nodes of a plurality of nodes in the computer system.
Eric Leu
Filed: 23 Jun 21
Utility
Compute platform for machine learning model roll-out
9 Jan 24
There are provided systems and methods for a compute platform for machine leaning model roll-out.
Sudhindra Murthy, Divakar Viswanathan, Vishal Sood
Filed: 10 Aug 21
Utility
Systems, methods, and computer program products providing push payments
9 Jan 24
In electronic financial transactions a receiver, or targeted recipient of funds, provides account information to a transmitter, or sender of funds.
Sandra Lynn Godsey
Filed: 24 Aug 20
Utility
White label merchant stored value account peer linking and funding system
9 Jan 24
A white label merchant stored value account peer linking/funding system includes a payment service provider database storing associations between different merchants and respective groups of white label merchant stored value accounts.
Patrick Babcock, Prashant Jamkhedkar, Aravindan Ranganathan
Filed: 10 Jul 22
Utility
Multi-tenants payment refresh tokens
9 Jan 24
Methods and systems are presented for facilitating sharing of tokens among different funding accounts linked to a digital wallet application to improve the computer resource efficiency of the mobile device.
Pankaj Sarin
Filed: 26 Aug 20
Utility
Card authentication technique selection via machine learning
9 Jan 24
Systems and techniques for facilitating card authentication technique selection via machine learning are provided.
Aditya Jain, Piyush Neupane, Yogesh Krishna Kandlur
Filed: 28 Oct 21
Utility
Protecting computer system end-points using activators
9 Jan 24
Techniques are disclosed for mitigating network-based attacks, brute-force attacks, enumeration account takeover type attacks, and generally attacks that might result in unauthorized access to user accounts, denial-of-service, loss of functionality to users, etc.
George Chen Kaidi
Filed: 27 Jan 21
Utility
Scanning for information according to scan objectives
2 Jan 24
Techniques are discussed for preparing and executing scanning plans for particular types of information, including personally identifiable information.
Gaoyuan Wang, Jie Huang, Zelin Yan, Fuyuan Kang
Filed: 28 May 21
Utility
Emulator detection through user interactions
2 Jan 24
Methods and systems are provided to determine when a first electronic device is emulating a second electronic device.
Yotam Perkal, Yuri Shafet, Eli Straznik
Filed: 30 Aug 21
Utility
Dynamically routing network traffic between defense layers
2 Jan 24
Techniques are disclosed relating to dynamically routing network traffic between defense layers.
George Chen Kaidi
Filed: 12 Feb 21
Utility
Systems and methods for authenticating a user based on a biometric model associated with the user
2 Jan 24
Systems and methods as provided herein may create a biometric model associated with a user.
Bjorn Markus Jakobsson
Filed: 12 Apr 22
Utility
Public ledger authentication system
2 Jan 24
Systems and methods for public ledger authentication includes receiving a first previous authentication public ledger address and a first current authentication public ledger address from a user.
Srivathsan Narasimhan, Yashovardhana Samethanahalli Kote
Filed: 1 Mar 21
Utility
System and method for understanding influencer reach within an augmented media intelligence ecosystem
2 Jan 24
Aspects of the present disclosure involve systems, methods, devices, and the like for augmented media intelligence using Artificial Intelligence (AI), Machine Learning (ML), Natural Language Processing (NLP), data analytics and data visualization.
Anita P. Rao, Babji Nagireddi, Srujan Jha, Rajkumar Perumal, Lenin Kumar Babu Pothabattula
Filed: 31 May 22