109 patents
Page 5 of 6
Utility
System and method for creating and validating software development life cycle (SDLC) digital artifacts
16 Feb 21
Systems and methods for creating and validating software development life cycle (“SDLC”) digital artifacts are disclosed.
Girish C. Sharma, Alberto Cira
Filed: 10 Apr 19
Utility
Classification Rules Engine and Api Generator
11 Feb 21
A system is disclosed, comprising data storage and one or more computing devices.
Max Foxell, Pete Brooks
Filed: 5 Aug 19
Utility
Network of Computing Nodes and a Method of Operating the Computing Nodes to Effectuate Real-time Bank Account-to-bank Account Money Transfer
4 Feb 21
A network of computing nodes and a method of operating the computing nodes effectuate, in real-time, an international, money transfer from the bank account of a first person (the payer) in a first country to the bank account of a second person (the beneficiary) in a second, different, country.
Uma Kapoor, Olga Zeltser, Chris Thurber
Filed: 31 Jul 19
Utility
Chaotic system anomaly response by artificial intelligence
26 Jan 21
A system for detecting and responding to an anomaly in a chaotic environment, comprising one or more autonomous agent devices and a central server comprising a processor and non-transitory memory.
Kesavanand Muraleedhara, Ahmed Jedda, Paulo Pinto
Filed: 31 Jan 19
Utility
System and method for carbon footprint determination
26 Jan 21
A system and method may determine or display the carbon emissions impact for transactions, by for example receiving from transaction data sources data items describing transactions, each transaction associated with a user, a merchant, and an amount; for each transaction receiving or creating carbon emissions impact data for the merchant associated with the transaction; and deriving from the amount associated with the transaction and the carbon emissions impact data for the merchant associated with the transaction a carbon emission value associated with the transaction.
Merav Pepere, Kranthi Darapu, Nandhini Viruthagiri, Shinyou Hwang
Filed: 3 Jul 20
Utility
Optically Analyzing Text Strings Such As Domain Names
6 Jan 21
Systems and methods determine whether domain names are potentially maliciously registered variants of a set of monitored domain names.
William R. Schnieders
Filed: 20 Sep 20
Utility
Faulty Distributed System Component Identification
23 Dec 20
A system for detecting a communications computer network node malfunction by analysis of network traffic output by the network node.
Richard Huddleston, Ahmed Jedda
Filed: 3 Sep 20
Utility
Metadata driven orchestration engine
14 Dec 20
An efficient reusable, extensible light weight framework statelessly orchestrates system activities in any application which involves a series of sequential or parallel set of activities involving computational logic, data retrieval and persistence services.
Kumar Vadaparty, Vishal Agrawal, Arun Maroli, Martin Leduc
Filed: 4 Aug 19
Utility
Metadata-driven rules processing engine for order management system
14 Dec 20
An efficient, light weight framework executes business rules for an asset class-agnostic order management system.
Kumar Vadaparty, Vishal Agrawal
Filed: 17 May 20
Utility
System and Method for Improving Performance In an Enterprise Computing Environment
9 Dec 20
A system for improving performance in an enterprise computing environment is disclosed and involves a change registry vault, including a machine learning model that analyzes whether or not implementation of a change will result in adverse operation of a component of the enterprise computing environment if the change is released, and takes different actions depending upon a result of that analysis.
Radhika Aasoori, Kranthi Darapu
Filed: 3 Jun 19
Utility
Latency Prediction and Network Message Microtiming
9 Dec 20
A system for network message microtiming, comprising a central routing device, a first mesh network, and a second mesh network.
Richard Huddleston, Ahmed Jedda, Erhan Senlik
Filed: 5 Jun 19
Utility
Distributed system for file analysis and malware detection
7 Dec 20
A system for receiving and indexing files transmitted on a network, comprising one or more intermediate agents, each connecting a network sensor to a source collection subsystem, an analysis subsystem, an indexing subsystem, and one or more databases.
Joseph Edmonds
Filed: 30 Jun 20
Utility
Fault resistant 24×7 topology for business process management ecosystem
16 Nov 20
A system and computer-implemented method for providing a load-balanced server architecture to end users and allowing software on the server architecture to be updated without downtime during a transition to the new software version.
Sujit Eapen, Sonil Trivedi
Filed: 17 Jul 19
Utility
Simulated Change of Immutable Objects During Execution Runtime
11 Nov 20
A system for executing software, wherein a computing device stores first software instructions for a code execution module such that, when the first software instructions are executed, the computing device will: receive, for execution by the code execution module, second software instructions; create one or more immutable software nodes described in the second software instructions; determine that the second software instructions comprise an instruction to begin a simulated change at runtime of the one or more immutable software nodes; store the simulated change in a simulated change apparatus; using the simulated change apparatus, perform one or more operations of the second software instructions as if the one or more immutable software nodes had been changed in memory, during a period of time where each of the one or more immutable software nodes is guaranteed to retain logical immutability; and output results of the one or more operations.
Dmitry Zaslavsky
Filed: 7 May 19
Utility
System for tracking transaction data across applications
12 Oct 20
A computer-implemented system and method to track a transaction that is executed by a series of applications in a workflow.
Kumar Vadaparty, Vishal Agrawal, David Testa
Filed: 6 May 19
Utility
Trading anomaly kill switch
5 Oct 20
A system that can detect when abnormal trading activity is occurring and take action to halt the detected abnormal trading activity without human intervention using a computer-implemented anomaly detection and action stage computer that performs an exponential weighted averaging of trade order flow, on a per symbol basis within a sliding volume based window and a volume based exponential weighted averaging, on a per symbol basis, on trade update messages received during the sliding volume based window and checks for an inflection in covariance between them.
Aditya Damodaran, Richard Huddleston, Joseph Edward Pendergast, Jr.
Filed: 23 Dec 18
Utility
Faulty distributed system component identification
5 Oct 20
A system for detecting a communications computer network node malfunction by analysis of network traffic output by the network node.
Richard Huddleston, Ahmed Jedda
Filed: 22 Aug 18
Utility
Optically analyzing domain names
21 Sep 20
Systems and methods determine whether domain names are potentially maliciously registered variants of a set of monitored domain names.
William R. Schnieders
Filed: 8 Aug 18
Utility
Metadata driven orchestration engine
7 Sep 20
An efficient reusable, extensible light weight framework statelessly orchestrates system activities in any application which involves a series of sequential or parallel set of activities involving computational logic, data retrieval and persistence services.
Kumar Vadaparty, Vishal Agrawal, Arun Maroli, Martin Leduc
Filed: 20 Nov 19
Utility
Exposure Minimization Response by Artificial Intelligence
5 Aug 20
An artificial-intelligence system for manipulating resources to minimize exposure harm in a chaotic environment, comprising autonomous agent devices, remote electronic sensors, and a central server.
Kesavanand Muraleedhara, Ahmed Jedda, Paulo Pinto
Filed: 30 Jan 19