109 patents
Page 3 of 6
Utility
System and method for carbon emissions exposure determination
5 Apr 22
A system and method may determine the carbon emissions risk to an institution through its lending and investment activities to a plurality of counterparties by, for example, determining carbon emissions data for a number of counterparties and, for each counterparty, determining the carbon emissions risk to the institution.
Fengyi Xie, Margaret Trench, Mahmoud Raya
Filed: 1 Jun 21
Utility
System and method for prefetching instructions and data
29 Mar 22
Systems and methods for prefetching instructions and data run a program in a test environment, execute a tracing application on the program to collect processor trace data, use the processor trace data to extract a plurality of instruction addresses and a single continuous stack range to be prefetched during a run-time of the program, at initialization of the program, load the extracted plurality of instruction addresses and the extracted stack range, relocate the plurality of extracted instruction addresses and the extracted stack range into the program, and at run-time, prefetch one or more of the plurality of extracted instruction addresses and the extracted stack range during idle time of the program.
Jordan Homer
Filed: 4 May 20
Utility
Automated Knowledge Base
24 Mar 22
Domain specific knowledge base (KB) contains all concepts from domain and the semantic relations between concepts.
Nicolas SEYOT, Richard J. HEISE, Ziad GEMAYEL, Mohamed MOUINE
Filed: 5 May 21
Utility
Centralized software issue triage system
11 Jan 22
A system for triage and response to a second system's malfunction is disclosed.
Girish Sharma, Christopher Mann, Alberto Ramos, Kiran Arun Karkhanis, Keith O'Brien, Alberto Cira, Angad Sangha
Filed: 26 Jan 21
Utility
System for tracking transaction data across applications
14 Dec 21
A computer-implemented system and method to track a transaction that is executed by a series of applications in a workflow.
Kumar Vadaparty, Vishal Agrawal, David Testa
Filed: 30 Sep 20
Utility
Dynamic communication
7 Dec 21
The disclosed embodiments relate to provisioning of a service, such as a financial service, to a device, such as a mobile device operative to access the service wirelessly or otherwise, in a manner which efficiently provides a consistent user experience which meets a user's expectations as to the functionality and quality of the service, including the user interface therefore and service delivery, which leverages the available capacities of the devices through which the service is provided so as to maximize the functionality and quality of the provided service without diminishing the experience, i.e. without substantially reducing the quality or functionality.
Sanjib Sahoo
Filed: 30 Apr 20
Utility
Computer systems, methods and user-interfaces for tracking an investor's unique set of social and environmental preferences
30 Nov 21
Computer-based systems and methods produce output graphics and displays for financial advisors following computational discovery, assessment and alignment of a client's (e.g., an investor's) holdings and accounts to the client's unique social and environmental impact preferences.
Kshitija Joshi, Courtney Thompson, James W. Martin
Filed: 31 Jan 20
Utility
System and Method for Prefetching Instructions and Data
4 Nov 21
Systems and methods for prefetching instructions and data run a program in a test environment, execute a tracing application on the program to collect processor trace data, use the processor trace data to extract a plurality of instruction addresses and a single continuous stack range to be prefetched during a run-time of the program, at initialization of the program, load the extracted plurality of instruction addresses and the extracted stack range, relocate the plurality of extracted instruction addresses and the extracted stack range into the program, and at run-time, prefetch one or more of the plurality of extracted instruction addresses and the extracted stack range during idle time of the program.
Jordan Homer
Filed: 4 May 20
Utility
Automated Signature Extraction and Verification
4 Nov 21
A system for extraction and verification of handwritten signatures from arbitrary documents.
Sruthi Sangala, Titash Mandal, Sonil Trivedi, Sujit Eapen
Filed: 15 Jul 21
Utility
Flow Control of Two TCP Streams Between Three Network Nodes
21 Oct 21
A system for forwarding packets between a first endpoint and a second endpoint, comprising one or more processors; a first network interface for communication with the first endpoint and a second network interface for communication with the second endpoint; and non-transitory memory comprising instructions.
Yousin Park, Zhiqin Wang
Filed: 16 Apr 20
Utility
Json to BPMN Conversion System
30 Sep 21
A system for converting a data file in a first format for data serialization into a second format for workflow specification is disclosed.
Sujit Eapen, Sathish Kannan
Filed: 31 Mar 20
Utility
Flow control of two TCP streams between three network nodes
28 Sep 21
A system for forwarding packets between a first endpoint and a second endpoint, comprising one or more processors; a first network interface for communication with the first endpoint and a second network interface for communication with the second endpoint; and non-transitory memory comprising instructions.
Yousin Park, Zhiqin Wang
Filed: 16 Apr 20
Utility
Dynamic Execution
16 Sep 21
The disclosed embodiments relate to provisioning of a service, such as a financial service, to a device, such as a mobile device operative to access the service wirelessly or otherwise, in a manner which efficiently provides a consistent user experience which meets a user's expectations as to the functionality and quality of the service, including the user interface therefore and service delivery, which leverages the available capacities of the devices through which the service is provided so as to maximize the functionality and quality of the provided service without diminishing the experience, i.e. without substantially reducing the quality or functionality.
Sanjib Sahoo
Filed: 27 May 21
Utility
Predictive asset optimization for computer resources
7 Sep 21
Computer-implemented systems and methods forecast network resource and/or infrastructure needs for an enterprise computer system that employs network servers to host resources that are requested by network users.
Reginald W. Martin, Hongbin Zhang, Jian Cao
Filed: 26 Dec 16
Utility
Data provisioning system and method
7 Sep 21
The invention relates to a computer-implemented system and method for provisioning data to data consumers within a business or organization.
Suryakant Brahmbhatt, Nandakumar Rampura
Filed: 4 Dec 19
Utility
Classification Rules Engine and Api Generator
2 Sep 21
A computer-implemented method is disclosed for providing an interface to prioritize classification rules for an unclassified input.
Max Foxell, Pete Brooks
Filed: 18 May 21
Utility
Automated signature extraction and verification
31 Aug 21
A system for extraction and verification of handwritten signatures from arbitrary documents.
Sruthi Sangala, Titash Mandal, Sonil Trivedi, Sujit Eapen
Filed: 9 Sep 19
Utility
Latency prediction and network message microtiming
31 Aug 21
A system for network message microtiming, comprising a central routing device, a first mesh network, and a second mesh network.
Richard Huddleston, Ahmed Jedda, Erhan Senlik
Filed: 6 Jun 19
Utility
Code analytics and publication platform
10 Aug 21
A method of software version management for ensuring stability of published code.
Girish Sharma, Kishore Yerramilli
Filed: 4 Jan 19
Utility
Enterprise-level Security Method and System
29 Jul 21
A method of detecting and responding to anomalous activity within a system involves generating a two-dimensional graphical image of a first dimension and a second dimension, and wherein the first dimension corresponds to a cyclical repeating interval made up of multiple bins, the graphical image having been generated such that a bin of the multiple bins, is the bin having a highest count, and the bin is scaled to the second dimension, and counts of all other bins in the interval are scaled relative to that highest count, graphically comparing the generated graphical image to an immediately preceding graphical image for similarity, and when a result of the comparison fails to satisfy a pre-specified similarity threshold, automatically triggering an appropriate anomaly detection-based follow-on action.
Robert R. Bruno, Luke A. Higgins
Filed: 23 Mar 21