109 patents
Page 4 of 6
Utility
Systems and methods for providing online content in braille
27 Jul 21
A method and system for providing online content in braille is provided.
Devanshu Sen, Sumanth Sampath, Pravin Patil, Mohit Pal, Kranthi Darapu, Merav Pepere
Filed: 6 Jul 20
Utility
Characterizing client-server connection configurations according to communication layer attributes
27 Jul 21
A system and method for characterizing a connection configuration of a client connecting to a computer system.
Karl E. Anderson, William R. Schnieders
Filed: 31 Dec 18
Utility
System and method for carbon emissions exposure determination
20 Jul 21
A system and method may determine the carbon emissions risk to an institution through its lending and investment activities to a plurality of counterparties by, for example, determining carbon emissions data for a number of counterparties and, for each counterparty, determining the carbon emissions risk to the institution.
Fengyi Xie, Margaret Trench, Mahmoud Raya
Filed: 1 Oct 20
Utility
File indexing and retrospective malware detection system
13 Jul 21
A computer-implemented method for indexing a stream of files is disclosed.
Joseph Edmonds
Filed: 1 Jul 20
Utility
Simulated Change of Immutable Objects During Execution Runtime
8 Jul 21
A system for executing software, wherein a computing device stores instructions for a code execution module such that, when the instructions are executed, the computing device will: receive, for execution by the code execution module, software; create one or more immutable software nodes described in the software; determine that the software comprise an instruction to begin a simulated change at runtime of the one or more immutable software nodes; store the simulated change in a simulated change apparatus; using the simulated change apparatus, perform one or more operations of the software as if the one or more immutable software nodes had been changed in memory, during a period of time where each of the one or more immutable software nodes is guaranteed to retain logical immutability; and output results of the one or more operations.
Dmitry Zaslavsky
Filed: 25 Mar 21
Utility
Multi-level low-latency hashing scheme
29 Jun 21
A system for storing and looking up values via hash table is disclosed.
Changhoan Kim, Sunghyun Park
Filed: 31 Jan 20
Utility
System and method for improving performance in an enterprise computing environment
29 Jun 21
A system for improving performance in an enterprise computing environment is disclosed and involves a change registry vault, including a machine learning model that analyzes whether or not implementation of a change will result in adverse operation of a component of the enterprise computing environment if the change is released, and takes different actions depending upon a result of that analysis.
Radhika Aasoori, Kranthi Darapu
Filed: 4 Jun 19
Utility
Classification rules engine and API generator
15 Jun 21
A system is disclosed, comprising data storage and one or more computing devices.
Max Foxell, Pete Brooks
Filed: 5 Aug 19
Utility
Network of computing nodes and a method of operating the computing nodes to effectuate real-time bank account-to-bank account money transfer
15 Jun 21
A network of computing nodes and a method of operating the computing nodes effectuate, in real-time, an international, money transfer from the bank account of a first person (the payer) in a first country to the bank account of a second person (the beneficiary) in a second, different, country.
Uma Kapoor, Olga Zeltser, Chris Thurber
Filed: 31 Jul 19
Utility
Data Provisioning System and Method
10 Jun 21
The invention relates to a computer-implemented system and method for provisioning data to data consumers within a business or organization.
Suryakant BRAHMBHATT, Nandakumar Rampura
Filed: 4 Dec 19
Utility
Systems and Methods for Intelligent and Quick Masking
3 Jun 21
A method and system for masking private data (e.g., personally identifiable information (PII)) is provided.
Christopher J. MANN, Kishore YERRAMILLI, Vasantha KUMAR, Richard VIANA, Joanki JIMENEZ, That Hung TON
Filed: 3 Dec 19
Utility
Chaotic System Anomaly Response by Artificial Intelligence
6 May 21
A system for detecting and responding to an anomaly in a chaotic environment, comprising one or more autonomous agent devices and a central server comprising a processor and non-transitory memory.
Kesavanand Muraleedhara, Ahmed Jedda, Paulo Pinto
Filed: 16 Dec 20
Utility
Simulated change of immutable objects during execution runtime
27 Apr 21
A system for executing software, wherein a computing device stores first software instructions for a code execution module such that, when the first software instructions are executed, the computing device will: receive, for execution by the code execution module, second software instructions; create one or more immutable software nodes described in the second software instructions; determine that the second software instructions comprise an instruction to begin a simulated change at runtime of the one or more immutable software nodes; store the simulated change in a simulated change apparatus; using the simulated change apparatus, perform one or more operations of the second software instructions as if the one or more immutable software nodes had been changed in memory, during a period of time where each of the one or more immutable software nodes is guaranteed to retain logical immutability; and output results of the one or more operations.
Dmitry Zaslavsky
Filed: 8 May 19
Utility
File collection method for subsequent malware detection
27 Apr 21
A computer-implemented method for collecting files transmitted on a network for subsequent malware analysis is disclosed.
Joseph Edmonds, Patrick St. John
Filed: 1 Jul 20
Utility
Enterprise-level security method and system
27 Apr 21
A method of detecting and responding to anomalous activity within a system involves, based upon pivot feature information, for a snapshot interval, generating a frequency structure interrelating a pivot feature, a binning feature and counts, using the frequency structure, generating a graphical image of a pre-specified width and height in pixels, and wherein the pre-specified width corresponds to a cyclical repeating interval made up of multiple bins, the graphical image having been generated such that a bin of the multiple bins, is the bin having a highest count, and the bin is scaled to the pre-specified height, and counts of all other bins in the interval are scaled relative to that highest count, graphically comparing the generated graphical image to an immediately preceding graphical image for similarity, and if a result of the comparison fails to satisfy a pre-specified similarity threshold, automatically triggering an appropriate anomaly detection-based follow-on action.
Robert R. Bruno, Luke A. Higgins
Filed: 4 Sep 19
Utility
Mainframe service request orchestrator and multiplexer
16 Mar 21
Efficient, reusable, extensible light weight framework orchestrates discrete mainframe service calls as a single composite service call.
Kumar Vadaparty, Vishal Agrawal, Alex Suprun, Arun Maroli, Vilas Mhatre
Filed: 9 Apr 19
Utility
Automated Signature Extraction and Verification
11 Mar 21
A system for extraction and verification of handwritten signatures from arbitrary documents.
Sruthi Sangala, Titash Mandal, Sonil Trivedi, Sujit Eapen
Filed: 9 Sep 19
Utility
Functional Programming Interactive Visualization
4 Mar 21
A computer-implemented method for code analysis and visualization.
Stephen Goldbaum, Attila Mihaly
Filed: 3 Sep 19
Utility
Enterprise-level Security Method and System
4 Mar 21
A method of detecting and responding to anomalous activity within a system involves, based upon pivot feature information, for a snapshot interval, generating a frequency structure interrelating a pivot feature, a binning feature and counts, using the frequency structure, generating a graphical image of a pre-specified width and height in pixels, and wherein the pre-specified width corresponds to a cyclical repeating interval made up of multiple bins, the graphical image having been generated such that a bin of the multiple bins, is the bin having a highest count, and the bin is scaled to the pre-specified height, and counts of all other bins in the interval are scaled relative to that highest count, graphically comparing the generated graphical image to an immediately preceding graphical image for similarity, and if a result of the comparison fails to satisfy a pre-specified similarity threshold, automatically triggering an appropriate anomaly detection-based follow-on action.
Robert R. Bruno, Luke A. Higgins
Filed: 4 Sep 19
Utility
Named Entity Extraction In Automated Chat Assistant
25 Feb 21
A system for providing responses to natural language queries or commands is disclosed.
Rama Raman, Amit Kumar Singh
Filed: 19 Aug 19