Movatterモバイル変換


[0]ホーム

URL:


US20180046801A1 - Malware data item analysis - Google Patents

Malware data item analysis
Download PDF

Info

Publication number
US20180046801A1
US20180046801A1US15/726,917US201715726917AUS2018046801A1US 20180046801 A1US20180046801 A1US 20180046801A1US 201715726917 AUS201715726917 AUS 201715726917AUS 2018046801 A1US2018046801 A1US 2018046801A1
Authority
US
United States
Prior art keywords
data item
analysis
file data
item
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/726,917
Inventor
Matthew Falk
Timothy Yousaf
Joseph Staehle
Lucas Lemanowicz
Sebastien Noury
Robin Lim
Michael Glazer
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Palantir Technologies Inc
Original Assignee
Palantir Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/473,860external-prioritypatent/US9021260B1/en
Application filed by Palantir Technologies IncfiledCriticalPalantir Technologies Inc
Priority to US15/726,917priorityCriticalpatent/US20180046801A1/en
Publication of US20180046801A1publicationCriticalpatent/US20180046801A1/en
Assigned to MORGAN STANLEY SENIOR FUNDING, INC., AS ADMINISTRATIVE AGENTreassignmentMORGAN STANLEY SENIOR FUNDING, INC., AS ADMINISTRATIVE AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Palantir Technologies Inc.
Assigned to ROYAL BANK OF CANADA, AS ADMINISTRATIVE AGENTreassignmentROYAL BANK OF CANADA, AS ADMINISTRATIVE AGENTSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Palantir Technologies Inc.
Assigned to MORGAN STANLEY SENIOR FUNDING, INC.reassignmentMORGAN STANLEY SENIOR FUNDING, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Palantir Technologies Inc.
Assigned to Palantir Technologies Inc.reassignmentPalantir Technologies Inc.RELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: ROYAL BANK OF CANADA
Assigned to Palantir Technologies Inc.reassignmentPalantir Technologies Inc.CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY LISTED PATENT BY REMOVING APPLICATION NO. 16/832267 FROM THE RELEASE OF SECURITY INTEREST PREVIOUSLY RECORDED ON REEL 052856 FRAME 0382. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST.Assignors: ROYAL BANK OF CANADA
Assigned to WELLS FARGO BANK, N.A.reassignmentWELLS FARGO BANK, N.A.ASSIGNMENT OF INTELLECTUAL PROPERTY SECURITY AGREEMENTSAssignors: MORGAN STANLEY SENIOR FUNDING, INC.
Assigned to WELLS FARGO BANK, N.A.reassignmentWELLS FARGO BANK, N.A.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: Palantir Technologies Inc.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Embodiments of the present disclosure relate to a data analysis system that may automatically analyze a suspected malware file, or group of files. Automatic analysis of the suspected malware file(s) may include one or more automatic analysis techniques. Automatic analysis of may include production and gathering of various items of information related to the suspected malware file(s) including, for example, calculated hashes, file properties, academic analysis information, file execution information, third-party analysis information, and/or the like. The analysis information may be automatically associated with the suspected malware file(s), and a user interface may be generated in which the various analysis information items are presented to a human analyst such that the analyst may quickly and efficiently evaluate the suspected malware file(s). For example, the analyst may quickly determine one or more characteristics of the suspected malware file(s), whether or not the file(s) is malware, and/or a threat level of the file(s).

Description

Claims (18)

What is claimed is:
1. A computer network comprising:
a database configured to store file data items; and
one or more hardware computer processors configured to execute computer executable instructions in order to:
receive a first data item including a suspected malware file;
store, in the database, the first data item in association with at least one of:
a date of submission of the first data item, or
an identifier of the person who submitted the first data item;
initiate an internal analysis of the first data item to generate an internal analysis information item;
transmit the first data item to an external analysis provider outside of the computer system for external analysis;
receive, from the external analysis provider, an external analysis information item; and
generate a graphical user interface presenting analysis information items associated with the first data item, the graphical user interface including at least:
a first node representing the first data item, and
a second node representing the internal analysis information item.
2. The computer system ofclaim 1, wherein the graphical user interface further includes a third node representing the external analysis information item, wherein the first, second, and third nodes are linked by edges in a graph or web.
3. The computer system ofclaim 1, wherein the one or more hardware computer processors are further configured to execute computer executable instructions in order to:
search the database for previously submitted data items matching the first data item; and
generate a displayable notification indicating that the first data item was previously submitted.
4. The computer system ofclaim 3, wherein the displayable notification indicates the date that the first data item was previously submitted.
5. The computer system ofclaim 3, wherein the displayable notification indicates an identifier of the person who submitted the first data item.
6. The computer system ofclaim 1, wherein nodes in the graphical user interface are user selectable icons.
7. The computer system ofclaim 1, wherein the one or more hardware computer processors are further configured to execute computer executable instructions in order to:
receive a submission of a second data item representing a suspected malware file; and
generate a fourth node in the graphical user interface, the fourth node indicating the submission of the second data item.
8. The computer system ofclaim 7, wherein the one or more hardware computer processors are further configured to execute computer executable instructions in order to:
compare an analysis information item of the second data item to at least one of the internal analysis information item or the external analysis information item;
determine that the second data item and the first data item match; and
in response to determining that the second data item and the first data item match, associate a second submission event with the first data item.
9. The computer system ofclaim 8, wherein comparing the analysis information item of the second data item to at least one of the internal analysis information item or the external analysis information item includes:
calculating a hash of the second data item; and
comparing the calculated hash to a previously calculated hash of the first data item.
10. The computer system ofclaim 7, the graphical user interface including at least:
the first node representing the first data item,
the second node representing the internal analysis information item,
a third node representing the submission of the first data item, and
a fourth node representing a submission of the second data item.
11. The computer system ofclaim 10, the graphical user interface further including at least:
a fifth node representing the external analysis information item.
12. The computer system ofclaim 11, wherein the graphical visualization further includes edges linking the first node to the second, third, fourth, and fifth nodes.
13. The computer system ofclaim 7, wherein the one or more hardware computer processors are further configured to execute computer executable instructions in order to:
receive a submission of a third data item, the third data item representing another suspected malware file;
compare the third data item with at least one of the first data item or the second data item;
determine that at the third data item and at least one of the first data item or the second data item match;
generate a fifth node in the graphical user interface, the fifth node indicating the submission of the third data item and linked to at least one of the first or third node; and
provide a notification that the third data item was previously received.
14. The computer system ofclaim 1, wherein the internal analysis includes at least calculation of a hash of the data item.
15. The computer system ofclaim 14, wherein the hash is at least one of an MD5 hash of the first data item, a SHA-1 hash of the first data item, a SHA-256 hash of the first data item, an SSDeep hash of the first data item, or a size of the first data item.
16. The computer system ofclaim 15, the external analysis includes analysis performed by at least a second computer system, and wherein the external analysis includes execution of the first data item in a sandboxed environment and analysis of the first data item by a third-party malware analysis service.
17. The computer system ofclaim 16, wherein any payload provided by the first data item after execution of the first data item in the sandboxed environment is indicated as a node in the graphical user interface.
18. The computer system ofclaim 1, wherein the one or more hardware computer processors are further configured to execute computer executable instructions in order to:
share the first data item and associated analysis information items with a second computer system via a third computer system.
US15/726,9172014-07-032017-10-06Malware data item analysisAbandonedUS20180046801A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/726,917US20180046801A1 (en)2014-07-032017-10-06Malware data item analysis

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201462020905P2014-07-032014-07-03
US14/473,860US9021260B1 (en)2014-07-032014-08-29Malware data item analysis
US14/668,833US9785773B2 (en)2014-07-032015-03-25Malware data item analysis
US15/726,917US20180046801A1 (en)2014-07-032017-10-06Malware data item analysis

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US14/668,833ContinuationUS9785773B2 (en)2014-07-032015-03-25Malware data item analysis

Publications (1)

Publication NumberPublication Date
US20180046801A1true US20180046801A1 (en)2018-02-15

Family

ID=53682493

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US14/668,833Active2034-10-13US9785773B2 (en)2014-07-032015-03-25Malware data item analysis
US15/726,917AbandonedUS20180046801A1 (en)2014-07-032017-10-06Malware data item analysis

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US14/668,833Active2034-10-13US9785773B2 (en)2014-07-032015-03-25Malware data item analysis

Country Status (2)

CountryLink
US (2)US9785773B2 (en)
EP (1)EP2963578B1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10121000B1 (en)*2016-06-282018-11-06Fireeye, Inc.System and method to detect premium attacks on electronic networks and electronic devices
US10824749B2 (en)*2018-09-282020-11-03Code 42 Software, Inc.Automatic graph-based detection of unlikely file possession
US10922404B2 (en)2015-08-192021-02-16Palantir Technologies Inc.Checkout system executable code monitoring, and user account compromise determination system
US20210286879A1 (en)*2020-03-132021-09-16International Business Machines CorporationDisplaying Cyber Threat Data in a Narrative
US11503047B2 (en)2020-03-132022-11-15International Business Machines CorporationRelationship-based conversion of cyber threat data into a narrative-like format

Families Citing this family (54)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9335897B2 (en)2013-08-082016-05-10Palantir Technologies Inc.Long click display of a context menu
US8713467B1 (en)*2013-08-092014-04-29Palantir Technologies, Inc.Context-sensitive views
US10764323B1 (en)*2015-12-212020-09-01Amdocs Development LimitedSystem, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack
US10356032B2 (en)2013-12-262019-07-16Palantir Technologies Inc.System and method for detecting confidential information emails
US9338013B2 (en)2013-12-302016-05-10Palantir Technologies Inc.Verifiable redactable audit log
US8832832B1 (en)2014-01-032014-09-09Palantir Technologies Inc.IP reputation
US20160012235A1 (en)*2014-02-102016-01-14Vivo Security Inc.Analysis and display of cybersecurity risks for enterprise data
US9535974B1 (en)2014-06-302017-01-03Palantir Technologies Inc.Systems and methods for identifying key phrase clusters within documents
US9619557B2 (en)2014-06-302017-04-11Palantir Technologies, Inc.Systems and methods for key phrase characterization of documents
US9256664B2 (en)2014-07-032016-02-09Palantir Technologies Inc.System and method for news events detection and visualization
US9419992B2 (en)2014-08-132016-08-16Palantir Technologies Inc.Unwanted tunneling alert system
WO2016064930A1 (en)*2014-10-212016-04-28Proofpoint, Inc.Systems and methods for application security analysis
EP4155984B1 (en)2014-10-312024-08-28Proofpoint, Inc.Systems and methods for privately performing application security analysis
US9043894B1 (en)2014-11-062015-05-26Palantir Technologies Inc.Malicious software detection in a computing system
US9648036B2 (en)2014-12-292017-05-09Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
US9467455B2 (en)2014-12-292016-10-11Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
US9594906B1 (en)*2015-03-312017-03-14Juniper Networks, Inc.Confirming a malware infection on a client device using a remote access connection tool to identify a malicious file based on fuzzy hashes
US9407652B1 (en)2015-06-262016-08-02Palantir Technologies Inc.Network anomaly detection
US9456000B1 (en)2015-08-062016-09-27Palantir Technologies Inc.Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
US9537880B1 (en)2015-08-192017-01-03Palantir Technologies Inc.Anomalous network monitoring, user behavior detection and database system
US10044745B1 (en)2015-10-122018-08-07Palantir Technologies, Inc.Systems for computer network security risk assessment including user compromise analysis associated with a network of devices
RU2634175C2 (en)*2015-12-182017-10-24Акционерное общество "Лаборатория Касперского"Method for implementation of anti-virus checks
WO2017111912A1 (en)*2015-12-212017-06-29Hewlett Packard Enterprise Development LpIdentifying a signature for a data set
US9888039B2 (en)2015-12-282018-02-06Palantir Technologies Inc.Network-based permissioning system
US9916465B1 (en)2015-12-292018-03-13Palantir Technologies Inc.Systems and methods for automatic and customizable data minimization of electronic data stores
US10498711B1 (en)2016-05-202019-12-03Palantir Technologies Inc.Providing a booting key to a remote system
US10084802B1 (en)2016-06-212018-09-25Palantir Technologies Inc.Supervisory control and data acquisition
US10291637B1 (en)2016-07-052019-05-14Palantir Technologies Inc.Network anomaly detection and profiling
US10698927B1 (en)2016-08-302020-06-30Palantir Technologies Inc.Multiple sensor session and log information compression and correlation system
US10728262B1 (en)2016-12-212020-07-28Palantir Technologies Inc.Context-aware network-based malicious activity warning systems
US10754872B2 (en)2016-12-282020-08-25Palantir Technologies Inc.Automatically executing tasks and configuring access control lists in a data transformation system
US10721262B2 (en)2016-12-282020-07-21Palantir Technologies Inc.Resource-centric network cyber attack warning system
EP3839785B1 (en)*2017-03-022023-07-26X Development LLCCharacterizing malware files for similarity searching
US10027551B1 (en)2017-06-292018-07-17Palantir Technologies, Inc.Access controls through node-based effective policy identifiers
US10963465B1 (en)2017-08-252021-03-30Palantir Technologies Inc.Rapid importation of data including temporally tracked object recognition
US10984427B1 (en)2017-09-132021-04-20Palantir Technologies Inc.Approaches for analyzing entity relationships
GB201716170D0 (en)2017-10-042017-11-15Palantir Technologies IncControlling user creation of data resources on a data processing platform
US10079832B1 (en)2017-10-182018-09-18Palantir Technologies Inc.Controlling user creation of data resources on a data processing platform
US10250401B1 (en)2017-11-292019-04-02Palantir Technologies Inc.Systems and methods for providing category-sensitive chat channels
US10657257B2 (en)2017-12-062020-05-19International Business Machines CorporationFeature vector aggregation for malware detection
US11133925B2 (en)2017-12-072021-09-28Palantir Technologies Inc.Selective access to encrypted logs
US10142349B1 (en)2018-02-222018-11-27Palantir Technologies Inc.Verifying network-based permissioning rights
US10878051B1 (en)2018-03-302020-12-29Palantir Technologies Inc.Mapping device identifiers
EP4290400A3 (en)2018-04-032024-03-06Palantir Technologies Inc.Controlling access to computer resources
US10949400B2 (en)2018-05-092021-03-16Palantir Technologies Inc.Systems and methods for tamper-resistant activity logging
US11244063B2 (en)2018-06-112022-02-08Palantir Technologies Inc.Row-level and column-level policy service
US10868887B2 (en)2019-02-082020-12-15Palantir Technologies Inc.Systems and methods for isolating applications associated with multiple tenants within a computing platform
US11704441B2 (en)2019-09-032023-07-18Palantir Technologies Inc.Charter-based access controls for managing computer resources
EP3796165A1 (en)2019-09-182021-03-24Palantir Technologies Inc.Systems and methods for autoscaling instance groups of computing platforms
US11449608B2 (en)2019-10-142022-09-20Microsoft Technology Licensing, LlcComputer security using context triggered piecewise hashing
US10878108B1 (en)*2020-02-032020-12-29Qed-It Systems Ltd.Delegated private set intersection, and applications thereof
US11689567B2 (en)*2020-03-062023-06-27Honeywell International Inc.Mapping an attack tree and attack prediction in industrial control and IIoT environment using hash data analytics
US11755420B2 (en)*2020-09-282023-09-12Druva Inc.Recovery point objective optimized file recovery
US11256607B1 (en)*2021-01-182022-02-22Microsoft Technology Licensing, LlcAdaptive resource management for instantly provisioning test environments via a sandbox service

Citations (53)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4852019A (en)*1986-01-311989-07-25Computer Associates International, Inc.Method and system for retrieval of stored graphs
US5136690A (en)*1989-08-071992-08-04At&T Bell LaboratoriesDynamic graphical analysis of network data
US5835085A (en)*1993-10-221998-11-10Lucent Technologies Inc.Graphical display of relationships
US6108698A (en)*1998-07-292000-08-22Xerox CorporationNode-link data defining a graph and a tree within the graph
US6226789B1 (en)*1996-01-292001-05-01Compaq Computer CorporationMethod and apparatus for data flow analysis
US6714936B1 (en)*1999-05-252004-03-30Nevin, Iii Rocky Harry W.Method and apparatus for displaying data stored in linked nodes
US6856313B2 (en)*2002-05-202005-02-15Xerox CorporationSystem and method for the simultaneous display and manipulation of hierarchical and non-hierarchical data
US20070240067A1 (en)*2006-04-112007-10-11Invensys Systems, Inc.Strategy editor supporting automatic designation of displayed line style based upon a connection data type
US20080263669A1 (en)*2007-04-232008-10-23Secure Computing CorporationSystems, apparatus, and methods for detecting malware
US20090216867A1 (en)*2008-02-152009-08-27!J IncorporatedVendor-independent network configuration tool
US20090282483A1 (en)*2008-05-122009-11-12Bennett James DServer based malware screening
US20090313267A1 (en)*2008-06-122009-12-17Fuji Xerox Co., Ltd.Systems and methods for organizing files in a graph-based layout
US20100014432A1 (en)*2008-07-212010-01-21Palo Alto Research Center IncorporatedMethod for identifying undesirable features among computing nodes
US20100313157A1 (en)*2009-02-102010-12-09Ayasdi, Inc.Systems and Methods for Visualization of Data Analysis
US7895666B1 (en)*2006-09-012011-02-22Hewlett-Packard Development Company, L.P.Data structure representation using hash-based directed acyclic graphs and related method
US20110047620A1 (en)*2008-10-212011-02-24Lookout, Inc., A California CorporationSystem and method for server-coupled malware prevention
US20110145286A1 (en)*2009-12-152011-06-16Chalklabs, LlcDistributed platform for network analysis
US20110145920A1 (en)*2008-10-212011-06-16Lookout, IncSystem and method for adverse mobile application identification
US20120072988A1 (en)*2010-03-262012-03-22Telcordia Technologies, Inc.Detection of global metamorphic malware variants using control and data flow analysis
US20120079596A1 (en)*2010-08-262012-03-29Verisign, Inc.Method and system for automatic detection and analysis of malware
US20120266245A1 (en)*2011-04-152012-10-18Raytheon CompanyMulti-Nodal Malware Analysis
US8302193B1 (en)*2008-05-302012-10-30Symantec CorporationMethods and systems for scanning files for malware
US20120296924A1 (en)*2011-05-202012-11-22International Business Machines CorporationMethod, program, and system for converting part of graph data to data structure as an image of homomorphism
US20120293542A1 (en)*2011-05-202012-11-22International Business Machines CorporationManipulation of an Object as an Image of a Mapping of Graph Data
US8321935B1 (en)*2009-02-262012-11-27Symantec CorporationIdentifying originators of malware
US20120304244A1 (en)*2011-05-242012-11-29Palo Alto Networks, Inc.Malware analysis system
US20120323829A1 (en)*2011-06-172012-12-20Microsoft CorporationGraph-based classification based on file relationships
US8341745B1 (en)*2010-02-222012-12-25Symantec CorporationInferring file and website reputations by belief propagation leveraging machine reputation
US20120330801A1 (en)*2011-06-272012-12-27Raytheon CompanyDistributed Malware Detection
US20130061182A1 (en)*2003-04-082013-03-07Xbranch Technologies GmbhInterface and method for exploring a collection of data
US20130073568A1 (en)*2011-09-212013-03-21Vladimir FederovRanking structured objects and actions on a social networking system
US20130097706A1 (en)*2011-09-162013-04-18Veracode, Inc.Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security
US20130151517A1 (en)*2011-12-072013-06-13Electronics And Telecommunications Research InstituteFile search apparatus and method using tag graph
US20130152202A1 (en)*2011-12-132013-06-13Samsung Electronics Co. Ltd.Apparatus and method for analyzing malware in data analysis system
US20130218899A1 (en)*2012-02-162013-08-22Oracle International CorporationMechanisms for searching enterprise data graphs
US8646080B2 (en)*2005-09-162014-02-04Avg Technologies Cy LimitedMethod and apparatus for removing harmful software
US20140046982A1 (en)*2012-08-132014-02-13Magnet Systems Inc.Managing cross-correlated data
US20140059684A1 (en)*2012-08-232014-02-27Raytheon Bbn Technologies Corp.System and method for computer inspection of information objects for shared malware components
US20140123279A1 (en)*2012-10-292014-05-01Michael G. BishopDynamic quarantining for malware detection
US20140129936A1 (en)*2012-11-052014-05-08Palantir Technologies, Inc.System and method for sharing investigation results
US20140172914A1 (en)*2012-12-142014-06-19Microsoft CorporationGraph query processing using plurality of engines
US20140245443A1 (en)*2013-02-272014-08-28Sayan ChakrabortyCyber Defense Systems And Methods
US8898093B1 (en)*2012-06-252014-11-25The Boeing CompanySystems and methods for analyzing data using deep belief networks (DBN) and identifying a pattern in a graph
US20140351261A1 (en)*2013-05-242014-11-27Sap AgRepresenting enterprise data in a knowledge graph
US20150100605A1 (en)*2013-10-092015-04-09Google Inc.Determining collection membership in a data graph
US20150244734A1 (en)*2014-02-252015-08-27Verisign, Inc.Automated intelligence graph construction and countermeasure deployment
US9185119B1 (en)*2014-05-082015-11-10Symantec CorporationSystems and methods for detecting malware using file clustering
US9202052B1 (en)*2013-06-212015-12-01Emc CorporationDynamic graph anomaly detection framework and scalable system architecture
US9225730B1 (en)*2014-03-192015-12-29Amazon Technologies, Inc.Graph based detection of anomalous activity
US20160063106A1 (en)*2012-08-082016-03-03Google Inc.Related Entity Search
US9323863B2 (en)*2013-02-012016-04-26Microsoft Technology Licensing, LlcHighlighting of time series data on force directed graph
US9323924B1 (en)*2014-05-092016-04-26Symantec CorporationSystems and methods for establishing reputations of files
US9361353B1 (en)*2013-06-272016-06-07Amazon Technologies, Inc.Crowd sourced digital content processing

Family Cites Families (513)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5109399A (en)1989-08-181992-04-28Alamo City Technologies, Inc.Emergency call locating system
FR2684214B1 (en)1991-11-221997-04-04Sepro Robotique INDEXING CARD FOR GEOGRAPHIC INFORMATION SYSTEM AND SYSTEM INCLUDING APPLICATION.
US5632009A (en)1993-09-171997-05-20Xerox CorporationMethod and system for producing a table image showing indirect data representations
US5670987A (en)1993-09-211997-09-23Kabushiki Kaisha ToshibaVirtual manipulating apparatus and method
US5548749A (en)1993-10-291996-08-20Wall Data IncorporatedSemantic orbject modeling system for creating relational database schemas
US6877137B1 (en)1998-04-092005-04-05Rose Blush Software LlcSystem, method and computer program product for mediating notes and note sub-notes linked or otherwise associated with stored or networked web pages
US5777549A (en)1995-03-291998-07-07Cabletron Systems, Inc.Method and apparatus for policy-based alarm notification in a distributed network management environment
EP0823092A1 (en)1995-04-241998-02-11Aspect Development, Inc.Modeling of object-oriented database structures, translation to relational database structures, and dynamic searches thereon
US5708828A (en)1995-05-251998-01-13Reliant Data SystemsSystem for converting data from input data environment using first format to output data environment using second format by executing the associations between their fields
US6366933B1 (en)1995-10-272002-04-02At&T Corp.Method and apparatus for tracking and viewing changes on the web
US5765171A (en)1995-12-291998-06-09Lucent Technologies Inc.Maintaining consistency of database replicas
US6098078A (en)1995-12-292000-08-01Lucent Technologies Inc.Maintaining consistency of database replicas
US5845300A (en)1996-06-051998-12-01Microsoft CorporationMethod and apparatus for suggesting completions for a partially entered data item based on previously-entered, associated data items
US5727145A (en)1996-06-261998-03-10Sun Microsystems, Inc.Mechanism for locating objects in a secure fashion
CA2187704C (en)1996-10-111999-05-04Darcy Kim RossmoExpert system method of performing crime site analysis
US5870559A (en)1996-10-151999-02-09Mercury InteractiveSoftware system and associated methods for facilitating the analysis and management of web sites
US5974572A (en)1996-10-151999-10-26Mercury Interactive CorporationSoftware system and methods for generating a load test using a server access log
US6202085B1 (en)1996-12-062001-03-13Microsoft CorportionSystem and method for incremental change synchronization between multiple copies of data
US5870761A (en)1996-12-191999-02-09Oracle CorporationParallel queue propagation
US6026233A (en)1997-05-272000-02-15Microsoft CorporationMethod and apparatus for presenting and selecting options to modify a programming language statement
US6091956A (en)1997-06-122000-07-18Hollenberg; Dennis D.Situation information system
US6216140B1 (en)1997-09-172001-04-10Hewlett-Packard CompanyMethodology for the efficient management of hierarchically organized information
JP3636272B2 (en)1998-02-092005-04-06富士通株式会社 Icon display method, apparatus thereof, and recording medium
US6247019B1 (en)1998-03-172001-06-12Prc Public Sector, Inc.Object-based geographic information system (GIS)
DE19817911A1 (en)1998-04-221999-10-28Novibra GmbhFootstep bearing housing for shaft of open end spinning rotor
US8396824B2 (en)1998-05-282013-03-12Qps Tech. Limited Liability CompanyAutomatic data categorization with optimally spaced semantic seed terms
US7168039B2 (en)1998-06-022007-01-23International Business Machines CorporationMethod and system for reducing the horizontal space required for displaying a column containing text data
US6742003B2 (en)2001-04-302004-05-25Microsoft CorporationApparatus and accompanying methods for visualizing clusters of data and hierarchical cluster classifications
US6317754B1 (en)1998-07-032001-11-13Mitsubishi Electric Research Laboratories, IncSystem for user control of version /Synchronization in mobile computing
US6577304B1 (en)1998-08-142003-06-10I2 Technologies Us, Inc.System and method for visually representing a supply chain
US6161098A (en)1998-09-142000-12-12Folio (Fn), Inc.Method and apparatus for enabling small investors with a portfolio of securities to manage taxable events within the portfolio
US6232971B1 (en)1998-09-232001-05-15International Business Machines CorporationVariable modality child windows
US6279018B1 (en)1998-12-212001-08-21Kudrollis Software Inventions Pvt. Ltd.Abbreviating and compacting text to cope with display space constraint in computer software
US6631496B1 (en)1999-03-222003-10-07Nec CorporationSystem for personalizing, organizing and managing web information
US6539381B1 (en)1999-04-212003-03-25Novell, Inc.System and method for synchronizing database information
AU5273100A (en)1999-05-172000-12-05Foxboro Company, TheMethods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects
US6369835B1 (en)1999-05-182002-04-09Microsoft CorporationMethod and system for generating a movie file from a slide show presentation
US6307573B1 (en)1999-07-222001-10-23Barbara L. BarrosGraphic-information flow method and system for visually analyzing patterns and relationships
US7039863B1 (en)1999-07-232006-05-02Adobe Systems IncorporatedComputer generation of documents using layout elements and content elements
US7373592B2 (en)1999-07-302008-05-13Microsoft CorporationModeless child windows for application programs
US6560620B1 (en)1999-08-032003-05-06Aplix Research, Inc.Hierarchical document comparison system and method
US6976210B1 (en)1999-08-312005-12-13Lucent Technologies Inc.Method and apparatus for web-site-independent personalization from multiple sites having user-determined extraction functionality
US20020174201A1 (en)1999-09-302002-11-21Ramer Jon E.Dynamic configuration of context-sensitive personal sites and membership channels
US7716077B1 (en)1999-11-222010-05-11Accenture Global Services GmbhScheduling and planning maintenance and service in a network-based supply chain environment
FR2806183B1 (en)1999-12-012006-09-01Cartesis S A DEVICE AND METHOD FOR INSTANT CONSOLIDATION, ENRICHMENT AND "REPORTING" OR BACKGROUND OF INFORMATION IN A MULTIDIMENSIONAL DATABASE
US7194680B1 (en)1999-12-072007-03-20Adobe Systems IncorporatedFormatting content by example
US6567936B1 (en)2000-02-082003-05-20Microsoft CorporationData clustering using error-tolerant frequent item sets
CN1439139A (en)2000-03-242003-08-27通达商业集团国际公司System and method for detecting fraudulent transactions
US6456997B1 (en)2000-04-122002-09-24International Business Machines CorporationSystem and method for dynamically generating an invisible hierarchy in a planning system
US7660830B2 (en)2000-04-172010-02-09Avaya Inc.System for integrating diverse database and maintaining their consistency
JP4325075B2 (en)2000-04-212009-09-02ソニー株式会社 Data object management device
US6642945B1 (en)2000-05-042003-11-04Microsoft CorporationMethod and system for optimizing a visual display for handheld computer systems
US7269786B1 (en)2000-05-042007-09-11International Business Machines CorporationNavigating an index to access a subject multi-dimensional database
US6915289B1 (en)2000-05-042005-07-05International Business Machines CorporationUsing an index to access a subject multi-dimensional database
US6594672B1 (en)2000-06-012003-07-15Hyperion Solutions CorporationGenerating multidimensional output using meta-models and meta-outlines
US6839745B1 (en)2000-07-192005-01-04Verizon Corporate Services Group Inc.System and method for generating reports in a telecommunication system
US7278105B1 (en)2000-08-212007-10-02Vignette CorporationVisualization and analysis of user clickpaths
US6807569B1 (en)2000-09-122004-10-19Science Applications International CorporationTrusted and anonymous system and method for sharing threat data to industry assets
US20020065708A1 (en)2000-09-222002-05-30Hikmet SenayMethod and system for interactive visual analyses of organizational interactions
AUPR033800A0 (en)2000-09-252000-10-19Telstra R & D Management Pty LtdA document categorisation system
US7430717B1 (en)2000-09-262008-09-30International Business Machines CorporationMethod for adapting a K-means text clustering to emerging data
US6829621B2 (en)2000-10-062004-12-07International Business Machines CorporationAutomatic determination of OLAP cube dimensions
US8707185B2 (en)2000-10-102014-04-22Addnclick, Inc.Dynamic information management system and method for content delivery and sharing in content-, metadata- and viewer-based, live social networking among users concurrently engaged in the same and/or similar content
US8117281B2 (en)2006-11-022012-02-14Addnclick, Inc.Using internet content as a means to establish live social networks by linking internet users to each other who are simultaneously engaged in the same and/or similar content
JP2002123530A (en)2000-10-122002-04-26Hitachi Ltd Method and apparatus for visualizing multidimensional data
US6816941B1 (en)2000-10-232004-11-09International Business Machines CorporationMethod and system for efficiently importing/exporting removable storage volumes between virtual storage systems
US6738770B2 (en)2000-11-042004-05-18Deep Sky Software, Inc.System and method for filtering and sorting data
US9053222B2 (en)2002-05-172015-06-09Lawrence A. LynnPatient safety processor
US6516268B2 (en)2001-02-162003-02-04Wizeguides.Com Inc.Bundled map guide
US6985950B1 (en)2001-03-062006-01-10Microsoft CorporationSystem for creating a space-efficient document categorizer for training and testing of automatic categorization engines
US7043702B2 (en)2001-03-152006-05-09Xerox CorporationMethod for visualizing user path through a web site and a path's associated information scent
US9256356B2 (en)2001-03-292016-02-09International Business Machines CorporationMethod and system for providing feedback for docking a content pane in a host window
US6775675B1 (en)2001-04-042004-08-10Sagemetrics CorporationMethods for abstracting data from various data structures and managing the presentation of the data
ATE476702T1 (en)2001-05-112010-08-15Computer Ass Think Inc METHOD AND SYSTEM FOR CONVERTING LEGACY SOFTWARE APPLICATIONS INTO MODERN, OBJECT-ORIENTED SYSTEMS
US6980984B1 (en)2001-05-162005-12-27Kanisa, Inc.Content provider systems and methods using structured data
US7877421B2 (en)2001-05-252011-01-25International Business Machines CorporationMethod and system for mapping enterprise data assets to a semantic information model
US6828920B2 (en)2001-06-042004-12-07Lockheed Martin Orincon CorporationSystem and method for classifying vehicles
US8001465B2 (en)2001-06-262011-08-16Kudrollis Software Inventions Pvt. Ltd.Compacting an information array display to cope with two dimensional display space constraint
US7072911B1 (en)2001-07-272006-07-04Novell, Inc.System and method for incremental replication of changes in a state based distributed database
US20030039948A1 (en)2001-08-092003-02-27Donahue Steven J.Voice enabled tutorial system and method
US20040205524A1 (en)2001-08-152004-10-14F1F9Spreadsheet data processing system
US8660869B2 (en)2001-10-112014-02-25Adobe Systems IncorporatedSystem, method, and computer program product for processing and visualization of information
CA2466107C (en)2001-11-012013-01-08Verisign, Inc.Transactional memory manager
US20030088654A1 (en)2001-11-022003-05-08Gordon GoodDirectory server schema replication
US7611602B2 (en)2001-12-132009-11-03Urban Mapping, LlcMethod of producing maps and other objects configured for presentation of spatially-related layers of data
US20070203771A1 (en)2001-12-172007-08-30Caballero Richard JSystem and method for processing complex orders
US7970240B1 (en)2001-12-172011-06-28Google Inc.Method and apparatus for archiving and visualizing digital images
CA2472268A1 (en)2001-12-312003-07-17Citadel Security Software Inc.Automated computer vulnerability resolution system
US7139800B2 (en)2002-01-162006-11-21Xerox CorporationUser interface for a message-based system having embedded information management capabilities
US7454466B2 (en)2002-01-162008-11-18Xerox CorporationMethod and system for flexible workflow management
US7546245B2 (en)2002-01-172009-06-09Amsapplied Medical Software, Inc.Method and system for gainsharing of physician services
US7640173B2 (en)2002-01-172009-12-29Applied Medical Software, Inc.Method and system for evaluating a physician's economic performance and gainsharing of physician services
US7096498B2 (en)2002-03-082006-08-22Cipher Trust, Inc.Systems and methods for message threat management
US6993539B2 (en)2002-03-192006-01-31Network Appliance, Inc.System and method for determining changes in two snapshots and for transmitting changes to destination snapshot
US20030187932A1 (en)*2002-03-282003-10-02Kennedy Bruce C.Network project development system and method
US7162475B2 (en)2002-04-172007-01-09Ackerman David MMethod for user verification and authentication and multimedia processing for interactive database management and method for viewing the multimedia
US7606881B2 (en)2002-04-252009-10-20Oracle International CorporationSystem and method for synchronization of version annotated objects
US20040126840A1 (en)2002-12-232004-07-01Affymetrix, Inc.Method, system and computer software for providing genomic ontological data
US7171427B2 (en)2002-04-262007-01-30Oracle International CorporationMethods of navigating a cube that is implemented as a relational object
US20040012633A1 (en)2002-04-262004-01-22Affymetrix, Inc., A Corporation Organized Under The Laws Of DelawareSystem, method, and computer program product for dynamic display, and analysis of biological sequence data
US7703021B1 (en)2002-05-242010-04-20Sparta Systems, Inc.Defining user access in highly-configurable systems
JP2003345810A (en)2002-05-282003-12-05Hitachi Ltd Document search method, document search system, and document search result indicating system
US20030229848A1 (en)2002-06-052003-12-11Udo ArendTable filtering in a computer user interface
US7437664B2 (en)2002-06-182008-10-14Microsoft CorporationComparing hierarchically-structured documents
US7103854B2 (en)2002-06-272006-09-05Tele Atlas North America, Inc.System and method for associating text and graphical views of map information
CA2398103A1 (en)2002-08-142004-02-14March Networks CorporationMulti-dimensional table filtering system
US7127352B2 (en)2002-09-302006-10-24Lucent Technologies Inc.System and method for providing accurate local maps for a central service
AU2003284118A1 (en)2002-10-142004-05-04Battelle Memorial InstituteInformation reservoir
US20040143602A1 (en)2002-10-182004-07-22Antonio RuizApparatus, system and method for automated and adaptive digital image/video surveillance for events and configurations using a rich multimedia relational database
US20040085318A1 (en)2002-10-312004-05-06Philipp HasslerGraphics generation and integration
US7870078B2 (en)2002-11-012011-01-11Id Insight IncorporatedSystem, method and computer program product for assessing risk of identity theft
US7162501B2 (en)2002-11-262007-01-09Microsoft CorporationHierarchical differential document representative of changes between versions of hierarchical document
US7739240B2 (en)2002-12-092010-06-15Hewlett-Packard Development Company, L.P.Replication and replica management in a wide area file system
US8589273B2 (en)2002-12-232013-11-19Ge Corporate Financial Services, Inc.Methods and systems for managing risk management information
WO2013126281A1 (en)2012-02-242013-08-29Lexisnexis Risk Solutions Fl Inc.Systems and methods for putative cluster analysis
US20040153418A1 (en)2003-02-052004-08-05Hanweck Gerald AlfredSystem and method for providing access to data from proprietary tools
DE10308725A1 (en)2003-02-282004-09-09Abb Research Ltd. System and method for managing and exchanging data of a technical project, a technical system and individual system components
US7627552B2 (en)2003-03-272009-12-01Microsoft CorporationSystem and method for filtering and organizing items based on common elements
US7676788B1 (en)2003-03-252010-03-09Electric Cloud, Inc.Architecture and method for executing program builds
US7818297B2 (en)2003-03-312010-10-19Hewlett-Packard Development Company, L.P.System and method for refreshing a table using epochs
US7280038B2 (en)2003-04-092007-10-09John RobinsonEmergency response data transmission system
US7681235B2 (en)2003-05-192010-03-16Radware Ltd.Dynamic network protection
US9607092B2 (en)2003-05-202017-03-28Excalibur Ip, LlcMapping method and system
US20050027705A1 (en)2003-05-202005-02-03Pasha SadriMapping method and system
US8065725B2 (en)2003-05-302011-11-22Yuliang ZhengSystems and methods for enhanced network security
US7620648B2 (en)2003-06-202009-11-17International Business Machines CorporationUniversal annotation configuration and deployment
US7055110B2 (en)2003-07-282006-05-30Sig G KupkaCommon on-screen zone for menu activation and stroke input
US7373669B2 (en)2003-08-132008-05-13The 41St Parameter, Inc.Method and system for determining presence of probable error or fraud in a data set by linking common data values or elements
US7334195B2 (en)2003-10-142008-02-19Microsoft CorporationSystem and process for presenting search results in a histogram/cluster format
US7584172B2 (en)2003-10-162009-09-01Sap AgControl for selecting data query and visual configuration
US20050125715A1 (en)2003-12-042005-06-09Fabrizio Di FrancoMethod of saving data in a graphical user interface
US7818658B2 (en)2003-12-092010-10-19Yi-Chih ChenMultimedia presentation system
US7917376B2 (en)2003-12-292011-03-29Montefiore Medical CenterSystem and method for monitoring patient care
US7872669B2 (en)2004-01-222011-01-18Massachusetts Institute Of TechnologyPhoto-based mobile deixis system and related techniques
US7343552B2 (en)2004-02-122008-03-11Fuji Xerox Co., Ltd.Systems and methods for freeform annotations
US20050180330A1 (en)2004-02-172005-08-18Touchgraph LlcMethod of animating transitions and stabilizing node motion during dynamic graph navigation
US20050182793A1 (en)2004-02-182005-08-18Keenan Viktor M.Map structure and method for producing
US7596285B2 (en)2004-02-262009-09-29International Business Machines CorporationProviding a portion of an electronic mail message at a reduced resolution
US8688634B2 (en)2004-02-272014-04-01International Business Machines CorporationAsynchronous peer-to-peer data replication
US7599790B2 (en)2004-03-232009-10-06Google Inc.Generating and serving tiles in a digital mapping system
US7865301B2 (en)2004-03-232011-01-04Google Inc.Secondary map in digital mapping system
WO2005104039A2 (en)2004-03-232005-11-03Google, Inc.A digital mapping system
US20060026120A1 (en)2004-03-242006-02-02Update Publications LpMethod and system for collecting, processing, and distributing residential property data
US7269801B2 (en)2004-03-302007-09-11Autodesk, Inc.System for managing the navigational usability of an interactive map
US8898788B1 (en)*2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US20050222928A1 (en)2004-04-062005-10-06Pricewaterhousecoopers LlpSystems and methods for investigation of financial reporting information
WO2005104736A2 (en)2004-04-262005-11-10Right90, Inc.Forecasting data with real-time updates
US20050246327A1 (en)2004-04-302005-11-03Yeung Simon DUser interfaces and methods of using the same
US7225468B2 (en)2004-05-072007-05-29Digital Security Networks, LlcMethods and apparatus for computer network security using intrusion detection and prevention
US20050251786A1 (en)2004-05-072005-11-10International Business Machines CorporationSystem and method for dynamic software installation instructions
US8885894B2 (en)2004-06-142014-11-11Michael John RowenReduction of transaction fraud through the use of automatic centralized signature/sign verification combined with credit and fraud scoring during real-time payment card authorization processes
US7739303B2 (en)*2004-07-222010-06-15International Business Machines CorporationMethod, system and program product for verifying access to a data object
US8289390B2 (en)2004-07-282012-10-16Sri InternationalMethod and apparatus for total situational awareness and monitoring
US7290698B2 (en)2004-08-252007-11-06Sony CorporationProgress bar with multiple portions
US7617232B2 (en)2004-09-022009-11-10Microsoft CorporationCentralized terminology and glossary development
US7933862B2 (en)2004-09-272011-04-26Microsoft CorporationOne click conditional formatting method and system for software programs
US7712049B2 (en)2004-09-302010-05-04Microsoft CorporationTwo-dimensional radial user interface for computer software applications
US20060074881A1 (en)2004-10-022006-04-06Adventnet, Inc.Structure independent searching in disparate databases
US7284198B2 (en)2004-10-072007-10-16International Business Machines CorporationMethod and system for document draft reminder based on inactivity
US7797197B2 (en)2004-11-122010-09-14Amazon Technologies, Inc.Method and system for analyzing the performance of affiliate sites
US7620628B2 (en)2004-12-062009-11-17Yahoo! Inc.Search processing with automatic categorization of queries
US20060129746A1 (en)2004-12-142006-06-15Ithink, Inc.Method and graphic interface for storing, moving, sending or printing electronic data to two or more locations, in two or more formats with a single save function
US7451397B2 (en)2004-12-152008-11-11Microsoft CorporationSystem and method for automatically completing spreadsheet formulas
US7849395B2 (en)2004-12-152010-12-07Microsoft CorporationFilter and sort by color
US7660823B2 (en)2004-12-302010-02-09Sas Institute Inc.Computer-implemented system and method for visualizing OLAP and multidimensional data in a calendar format
US7509354B2 (en)2005-01-072009-03-24International Business Machines CorporationSystem, method, and computer program product for multi-master replication conflict resolution
US8316060B1 (en)2005-01-262012-11-2021st Century TechnologiesSegment matching search system and method
US9436945B2 (en)2005-02-012016-09-06Redfin CorporationInteractive map-based search and advertising
US8271436B2 (en)2005-02-072012-09-18Mimosa Systems, Inc.Retro-fitting synthetic full copies of data
US7614006B2 (en)2005-02-112009-11-03International Business Machines CorporationMethods and apparatus for implementing inline controls for transposing rows and columns of computer-based tables
US8214353B2 (en)2005-02-182012-07-03International Business Machines CorporationSupport for schema evolution in a multi-node peer-to-peer replication environment
US20060242630A1 (en)2005-03-092006-10-26Maxis Co., Ltd.Process for preparing design procedure document and apparatus for the same
US7676845B2 (en)2005-03-242010-03-09Microsoft CorporationSystem and method of selectively scanning a file on a computing device for malware
US7426654B2 (en)2005-04-142008-09-16Verizon Business Global LlcMethod and system for providing customer controlled notifications in a managed network services system
US7525422B2 (en)2005-04-142009-04-28Verizon Business Global LlcMethod and system for providing alarm reporting in a managed network services environment
US20060242040A1 (en)2005-04-202006-10-26Aim Holdings LlcMethod and system for conducting sentiment analysis for securities research
US8639757B1 (en)2011-08-122014-01-28Sprint Communications Company L.P.User localization using friend location information
US8082172B2 (en)2005-04-262011-12-20The Advisory Board CompanySystem and method for peer-profiling individual performance
US7958120B2 (en)2005-05-102011-06-07Netseer, Inc.Method and apparatus for distributed community finding
US7672968B2 (en)2005-05-122010-03-02Apple Inc.Displaying a tooltip associated with a concurrently displayed database object
US8024778B2 (en)2005-05-242011-09-20CRIF CorporationSystem and method for defining attributes, decision rules, or both, for remote execution, claim set I
US8825370B2 (en)2005-05-272014-09-02Yahoo! Inc.Interactive map-based travel guide
US8161122B2 (en)2005-06-032012-04-17Messagemind, Inc.System and method of dynamically prioritized electronic mail graphical user interface, and measuring email productivity and collaboration trends
US7693958B2 (en)2005-06-202010-04-06Microsoft CorporationInstant messaging with data sharing
AU2006263703A1 (en)2005-06-282007-01-04Nokia CorporationUser interface for geographic search
US20070016363A1 (en)2005-07-152007-01-18Oracle International CorporationInteractive map-based user interface for transportation planning
US20070026373A1 (en)2005-07-262007-02-01Microsoft CorporationResource replication service protocol
WO2007015548A1 (en)2005-08-042007-02-08Matsushita Electric Industrial Co., Ltd.Search object estimation device and method, and server for search object estimation device
US7376516B2 (en)2005-08-232008-05-20R.A. Smith NationalHigh accuracy survey grade GIS system
US7917841B2 (en)2005-08-292011-03-29Edgar Online, Inc.System and method for rendering data
JP2007079641A (en)2005-09-092007-03-29Canon Inc Information processing apparatus, information processing method, program, and storage medium
US8095866B2 (en)2005-09-092012-01-10Microsoft CorporationFiltering user interface for a data summary table
US7716226B2 (en)2005-09-272010-05-11Patentratings, LlcMethod and system for probabilistically quantifying and visualizing relevance between two or more citationally or contextually related data objects
US20070078832A1 (en)2005-09-302007-04-05Yahoo! Inc.Method and system for using smart tags and a recommendation engine using smart tags
US7574428B2 (en)2005-10-112009-08-11Telmap LtdGeometry-based search engine for navigation systems
US7933897B2 (en)2005-10-122011-04-26Google Inc.Entity display priority in a distributed geographic information system
US7487139B2 (en)2005-10-122009-02-03International Business Machines CorporationMethod and system for filtering a table
US7627812B2 (en)2005-10-272009-12-01Microsoft CorporationVariable formatting of cells
US7536419B2 (en)2005-11-152009-05-19Microsoft CorporationSlave replica member
US20100198858A1 (en)2005-11-212010-08-05Anti-Gang Enforcement Networking Technology, Inc.System and Methods for Linking Multiple Events Involving Firearms and Gang Related Activities
US7788223B2 (en)2005-12-052010-08-31Microsoft CorporationResource freshness and replication
US7814102B2 (en)2005-12-072010-10-12Lexisnexis, A Division Of Reed Elsevier Inc.Method and system for linking documents with multiple topics to related documents
US7730082B2 (en)2005-12-122010-06-01Google Inc.Remote module incorporation into a container document
US8185819B2 (en)2005-12-122012-05-22Google Inc.Module specification for a module to be incorporated into a container document
US7730109B2 (en)2005-12-122010-06-01Google, Inc.Message catalogs for remote modules
CN100481077C (en)2006-01-122009-04-22国际商业机器公司Visual method and device for strengthening search result guide
US7634717B2 (en)2006-01-232009-12-15Microsoft CorporationMultiple conditional formatting
US7770100B2 (en)2006-02-272010-08-03Microsoft CorporationDynamic thresholds for conditional formats
US7552148B2 (en)2006-02-282009-06-23Microsoft CorporationShutdown recovery
US7620721B2 (en)2006-02-282009-11-17Microsoft CorporationPre-existing content replication
US20070208498A1 (en)2006-03-032007-09-06Inrix, Inc.Displaying road traffic condition information and user controls
US7579965B2 (en)2006-03-032009-08-25Andrew BucholzVehicle data collection and processing system
US7899611B2 (en)2006-03-032011-03-01Inrix, Inc.Detecting anomalous road traffic conditions
US20080052142A1 (en)2006-03-132008-02-28Bailey Maurice G TSystem and method for real-time display of emergencies, resources and personnel
US7912773B1 (en)2006-03-242011-03-22Sas Institute Inc.Computer-implemented data storage systems and methods for use with predictive model systems
US8397171B2 (en)2006-03-312013-03-12Reaearch In Motion LimitedUser interface methods and apparatus for controlling the visual display of maps having selectable map elements in mobile communication devices
US20070240062A1 (en)2006-04-072007-10-11Christena Jennifer YMethod and System for Restricting User Operations in a Graphical User Inerface Window
US8739278B2 (en)2006-04-282014-05-27Oracle International CorporationTechniques for fraud monitoring and detection using application fingerprinting
US7891003B2 (en)2006-06-142011-02-15Microsoft CorporationEnterprise threat modeling
US7657626B1 (en)2006-09-192010-02-02Enquisite, Inc.Click fraud detection
US7468662B2 (en)2006-06-162008-12-23International Business Machines CorporationMethod for spatio-temporal event detection using composite definitions for camera systems
US7953710B2 (en)2006-06-232011-05-31Microsoft CorporationMulti-master database synchronization without loss of convergence
US8290943B2 (en)2006-07-142012-10-16Raytheon CompanyGeographical information display system and method
WO2008011728A1 (en)2006-07-282008-01-31Pattern Intelligence Inc.System and method for detecting and analyzing pattern relationships
US7558791B2 (en)2006-07-312009-07-07Informed Control IncSystem and method for ontology-based translation between directory schemas
DE102006036584B4 (en)2006-08-042018-07-26Siemens Healthcare Gmbh Manage differently versioned configuration files of a medical facility
NZ574850A (en)2006-08-102011-02-25Univ Loma Linda MedAdvanced emergency geographical information system
US20130150004A1 (en)2006-08-112013-06-13Michael RosenMethod and apparatus for reducing mobile phone usage while driving
US20080040684A1 (en)2006-08-142008-02-14Richard CrumpIntelligent Pop-Up Window Method and Apparatus
US20080077597A1 (en)2006-08-242008-03-27Lance ButlerSystems and methods for photograph mapping
US20080051989A1 (en)2006-08-252008-02-28Microsoft CorporationFiltering of data layered on mapping applications
JP4778865B2 (en)2006-08-302011-09-21株式会社ソニー・コンピュータエンタテインメント Image viewer, image display method and program
US7725547B2 (en)2006-09-062010-05-25International Business Machines CorporationInforming a user of gestures made by others out of the user's line of sight
US8271429B2 (en)2006-09-112012-09-18Wiredset LlcSystem and method for collecting and processing data
US9207933B2 (en)2006-10-102015-12-08International Business Machines CorporationIdentifying authors of changes between multiple versions of a file
US7698336B2 (en)2006-10-262010-04-13Microsoft CorporationAssociating geographic-related information with objects
US7792868B2 (en)2006-11-102010-09-07Microsoft CorporationData object linking and browsing tool
US20140006109A1 (en)2006-11-132014-01-02Vendavo, Inc.System and Methods for Generating Price Sensitivity
US8515912B2 (en)2010-07-152013-08-20Palantir Technologies, Inc.Sharing and deconflicting data changes in a multimaster database system
US7962495B2 (en)2006-11-202011-06-14Palantir Technologies, Inc.Creating data in a data store using a dynamic ontology
US8688749B1 (en)2011-03-312014-04-01Palantir Technologies, Inc.Cross-ontology multi-master replication
US7599945B2 (en)2006-11-302009-10-06Yahoo! Inc.Dynamic cluster visualization
US7680939B2 (en)2006-12-202010-03-16Yahoo! Inc.Graphical user interface to manipulate syndication data feeds
US7809703B2 (en)2006-12-222010-10-05International Business Machines CorporationUsage of development context in search operations
US20080162616A1 (en)2006-12-292008-07-03Sap AgSkip relation pattern for graph structures
US7812717B1 (en)2007-02-022010-10-12Resource Consortium LimitedSituational network
US8368695B2 (en)2007-02-082013-02-05Microsoft CorporationTransforming offline maps into interactive online maps
US8196184B2 (en)2007-02-162012-06-05Microsoft CorporationEfficient data structures for multi-dimensional security
US7920963B2 (en)2007-02-222011-04-05Iac Search & Media, Inc.Map interface with a movable marker
US8352881B2 (en)2007-03-082013-01-08International Business Machines CorporationMethod, apparatus and program storage device for providing customizable, immediate and radiating menus for accessing applications and actions
US8959568B2 (en)2007-03-142015-02-17Microsoft CorporationEnterprise security assessment sharing
US7925629B2 (en)2007-03-282011-04-12Netapp, Inc.Write ordering style asynchronous replication utilizing a loosely-accurate global clock
JP5268274B2 (en)2007-03-302013-08-21キヤノン株式会社 Search device, method, and program
US20090018940A1 (en)2007-03-302009-01-15Liang WangEnhanced Fraud Detection With Terminal Transaction-Sequence Processing
US8229458B2 (en)2007-04-082012-07-24Enhanced Geographic LlcSystems and methods to determine the name of a location visited by a user of a wireless device
US20080255973A1 (en)2007-04-102008-10-16Robert El WadeSales transaction analysis tool and associated method of use
AU2008242910A1 (en)2007-04-172008-10-30Emd Millipore CorporationGraphical user interface for analysis and comparison of location-specific multiparameter data sets
US20080267107A1 (en)2007-04-272008-10-30Outland Research, LlcAttraction wait-time inquiry apparatus, system and method
DE102008010419A1 (en)2007-05-032008-11-13Navigon Ag Apparatus and method for creating a text object
US8090603B2 (en)2007-05-112012-01-03Fansnap, Inc.System and method for selecting event tickets
US10769290B2 (en)2007-05-112020-09-08Fair Isaac CorporationSystems and methods for fraud detection via interactive link analysis
US8515207B2 (en)2007-05-252013-08-20Google Inc.Annotations in panoramic images, and applications thereof
WO2009038822A2 (en)2007-05-252009-03-26The Research Foundation Of State University Of New YorkSpectral clustering for multi-type relational data
US7809785B2 (en)2007-05-282010-10-05Google Inc.System using router in a web browser for inter-domain communication
US8739123B2 (en)2007-05-282014-05-27Google Inc.Incorporating gadget functionality on webpages
US9009829B2 (en)2007-06-122015-04-14The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for baiting inside attackers
US20120084866A1 (en)2007-06-122012-04-05Stolfo Salvatore JMethods, systems, and media for measuring computer security
US7783658B1 (en)2007-06-182010-08-24Seisint, Inc.Multi-entity ontology weighting systems and methods
US8505065B2 (en)2007-06-202013-08-06Microsoft CorporationAccess control policy in a weakly-coherent distributed collection
US20090027418A1 (en)2007-07-242009-01-29Maru Nimit HMap-based interfaces for storing and locating information about geographical areas
US8234298B2 (en)2007-07-252012-07-31International Business Machines CorporationSystem and method for determining driving factor in a data cube
US8600872B1 (en)2007-07-272013-12-03Wells Fargo Bank, N.A.System and method for detecting account compromises
US9740731B2 (en)2007-08-142017-08-22John Nicholas and Kristen Gross TrustEvent based document sorter and method
US20090055251A1 (en)2007-08-202009-02-26Weblistic, Inc., A California CorporationDirected online advertising system and method
US8695097B1 (en)2007-08-282014-04-08Wells Fargo Bank, N.A.System and method for detection and prevention of computer fraud
US20130066673A1 (en)2007-09-062013-03-14Digg, Inc.Adapting thresholds
US9060012B2 (en)2007-09-262015-06-16The 41St Parameter, Inc.Methods and apparatus for detecting fraud with time based computer tags
US20090088964A1 (en)2007-09-282009-04-02Dave SchaafMap scrolling method and apparatus for navigation system for selectively displaying icons
FR2921779B1 (en)2007-09-282011-02-18Alcatel Lucent COMMUNICATION OF RISK INFORMATION IN A MULTI-DOMAIN NETWORK
US20090125369A1 (en)2007-10-262009-05-14Crowe Horwath LlpSystem and method for analyzing and dispositioning money laundering suspicious activity alerts
US8200618B2 (en)2007-11-022012-06-12International Business Machines CorporationSystem and method for analyzing data in a report
WO2009061501A1 (en)2007-11-092009-05-14Telecommunication Systems, Inc.Points-of-interest panning on a displayed map with a persistent search on a wireless phone
US8019709B2 (en)2007-11-092011-09-13Vantrix CorporationMethod and system for rule-based content filtering
US8145703B2 (en)2007-11-162012-03-27Iac Search & Media, Inc.User interface and method in a local search system with related search results
KR20090050577A (en)2007-11-162009-05-20삼성전자주식회사 User interface for displaying and playing multimedia contents, apparatus and control method thereof
US20090132953A1 (en)2007-11-162009-05-21Iac Search & Media, Inc.User interface and method in local search system with vertical search results and an interactive map
US20090199090A1 (en)2007-11-232009-08-06Timothy PostonMethod and system for digital file flow management
US20090144262A1 (en)2007-12-042009-06-04Microsoft CorporationSearch query transformation using direct manipulation
US8001482B2 (en)2007-12-212011-08-16International Business Machines CorporationMethod of displaying tab titles
US8230333B2 (en)2007-12-262012-07-24Vistracks, Inc.Analysis of time-based geospatial mashups using AD HOC visual queries
SG153705A1 (en)*2007-12-272009-07-29Aberdeen Asset Man Asia LtdApparatus and methods for analysing securities data
US7865308B2 (en)2007-12-282011-01-04Yahoo! Inc.User-generated activity maps
US8010886B2 (en)2008-01-042011-08-30Microsoft CorporationIntelligently representing files in a view
US7805457B1 (en)2008-02-142010-09-28Securus Technologies, Inc.System and method for identifying members of a gang or security threat group
WO2009115921A2 (en)2008-02-222009-09-24Ipath Technologies Private LimitedTechniques for enterprise resource mobilization
US20090222760A1 (en)2008-02-292009-09-03Halverson Steven GMethod, System and Computer Program Product for Automating the Selection and Ordering of Column Data in a Table for a User
WO2009111581A1 (en)2008-03-042009-09-11NextbioCategorization and filtering of scientific data
US20090234720A1 (en)2008-03-152009-09-17GridbyteMethod and System for Tracking and Coaching Service Professionals
US9830366B2 (en)2008-03-222017-11-28Thomson Reuters Global ResourcesOnline analytic processing cube with time stamping
WO2009132106A2 (en)2008-04-222009-10-29Oxford J CraigSystem and method for interactive map, database, and social networking engine
US8266168B2 (en)2008-04-242012-09-11Lexisnexis Risk & Information Analytics Group Inc.Database systems and methods for linking records and entity representations with sufficiently high confidence
US8199966B2 (en)*2008-05-142012-06-12International Business Machines CorporationSystem and method for providing contemporaneous product information with animated virtual representations
US8620641B2 (en)2008-05-162013-12-31Blackberry LimitedIntelligent elision
WO2010011411A1 (en)2008-05-272010-01-28The Trustees Of Columbia University In The City Of New YorkSystems, methods, and media for detecting network anomalies
US8219555B1 (en)2008-06-132012-07-10Ustringer LLCMethod and apparatus for distributing content
US8301904B1 (en)2008-06-242012-10-30Mcafee, Inc.System, method, and computer program product for automatically identifying potentially unwanted data as unwanted
US8689335B2 (en)2008-06-252014-04-01Microsoft CorporationMapping between users and machines in an enterprise security assessment sharing system
WO2010000014A1 (en)2008-07-022010-01-07Pacific Knowledge Systems Pty. Ltd.Method and system for generating text
US8364698B2 (en)2008-07-112013-01-29Videosurf, Inc.Apparatus and software system for and method of performing a visual-relevance-rank subsequent search
GB2461771A (en)2008-07-112010-01-20Icyte Pty LtdAnnotation of electronic documents with preservation of document as originally annotated
US8301464B1 (en)2008-07-182012-10-30Cave Consulting Group, Inc.Method and system for producing statistical analysis of medical care information
KR20110056502A (en)2008-08-042011-05-30퀴드, 아이엔씨. Enterprise performance analysis engine
US9411864B2 (en)2008-08-262016-08-09Zeewise, Inc.Systems and methods for collection and consolidation of heterogeneous remote business data using dynamic data handling
US8010545B2 (en)2008-08-282011-08-30Palo Alto Research Center IncorporatedSystem and method for providing a topic-directed search
US20110078055A1 (en)2008-09-052011-03-31Claude FaribaultMethods and systems for facilitating selecting and/or purchasing of items
US8984390B2 (en)2008-09-152015-03-17Palantir Technologies, Inc.One-click sharing for screenshots and related documents
US8041714B2 (en)2008-09-152011-10-18Palantir Technologies, Inc.Filter chains with associated views for exploring large data sets
US8387110B1 (en)2010-02-102013-02-26Socialware, Inc.Method, system and computer program product for tagging content on uncontrolled web application
US8667583B2 (en)2008-09-222014-03-04Microsoft CorporationCollecting and analyzing malware data
US8214361B1 (en)2008-09-302012-07-03Google Inc.Organizing search results in a topic hierarchy
US8554579B2 (en)2008-10-132013-10-08Fht, Inc.Management, reporting and benchmarking of medication preparation
US8015151B2 (en)2008-10-132011-09-06Sap AgMethod and system for managing and modifying time dependent data structures
US20100114887A1 (en)2008-10-172010-05-06Google Inc.Textual Disambiguation Using Social Connections
US8108933B2 (en)2008-10-212012-01-31Lookout, Inc.System and method for attack and malware prevention
US8411046B2 (en)2008-10-232013-04-02Microsoft CorporationColumn organization of content
US9818118B2 (en)2008-11-192017-11-14Visa International Service AssociationTransaction aggregator
US20100131457A1 (en)2008-11-262010-05-27Microsoft CorporationFlattening multi-dimensional data sets into de-normalized form
US8204859B2 (en)2008-12-102012-06-19Commvault Systems, Inc.Systems and methods for managing replicated database data
CN101414375A (en)2008-12-152009-04-22阿里巴巴集团控股有限公司System and method for networking trading using intermediate platform
US8762869B2 (en)2008-12-232014-06-24Intel CorporationReduced complexity user interface
US8073877B2 (en)2009-01-202011-12-06Yahoo! Inc.Scalable semi-structured named entity detection
US20100262688A1 (en)2009-01-212010-10-14Daniar HussainSystems, methods, and devices for detecting security vulnerabilities in ip networks
US20100191563A1 (en)2009-01-232010-07-29Doctors' Administrative Solutions, LlcPhysician Practice Optimization Tracking
US8601401B2 (en)2009-01-302013-12-03Navico Holding AsMethod, apparatus and computer program product for synchronizing cursor events
US9177264B2 (en)2009-03-062015-11-03Chiaramail, Corp.Managing message categories in a network
US20100235915A1 (en)2009-03-122010-09-16Nasir MemonUsing host symptoms, host roles, and/or host reputation for detection of host infection
CN101729531B (en)2009-03-162016-04-13中兴通讯股份有限公司Network security policy distribution method, Apparatus and system
US9112850B1 (en)2009-03-252015-08-18The 41St Parameter, Inc.Systems and methods of sharing information through a tag-based consortium
US8447722B1 (en)2009-03-252013-05-21Mcafee, Inc.System and method for data mining and security policy management
IL197961A0 (en)2009-04-052009-12-24Guy ShakedMethods for effective processing of time series
US8239668B1 (en)2009-04-152012-08-07Trend Micro IncorporatedComputer security threat data collection and aggregation with user privacy protection
US9767427B2 (en)2009-04-302017-09-19Hewlett Packard Enterprise Development LpModeling multi-dimensional sequence data over streams
US8719249B2 (en)2009-05-122014-05-06Microsoft CorporationQuery classification
US8856691B2 (en)2009-05-292014-10-07Microsoft CorporationGesture tool
US20100306029A1 (en)2009-06-012010-12-02Ryan JolleyCardholder Clusters
US20100321399A1 (en)2009-06-182010-12-23Patrik EllrenMaps from Sparse Geospatial Data Tiles
US8251844B2 (en)*2009-06-192012-08-28Boa Athletics, LlcGoalkeeper stick with angled shaft
KR101076887B1 (en)2009-06-262011-10-25주식회사 하이닉스반도체Method of fabricating landing plug in semiconductor device
US8832131B2 (en)2009-07-082014-09-09International Business Machines CorporationSystem, method, and apparatus for replicating a portion of a content repository using behavioral patterns
US8321943B1 (en)2009-07-302012-11-27Symantec CorporationProgrammatic communication in the event of host malware infection
MX2012001497A (en)2009-08-142012-06-19Telogis IncReal time map rendering with data clustering and expansion and overlay.
US8560548B2 (en)2009-08-192013-10-15International Business Machines CorporationSystem, method, and apparatus for multidimensional exploration of content items in a content store
US8334773B2 (en)2009-08-282012-12-18Deal Magic, Inc.Asset monitoring and tracking system
JP5431235B2 (en)2009-08-282014-03-05株式会社日立製作所 Equipment condition monitoring method and apparatus
US9280777B2 (en)2009-09-082016-03-08Target Brands, Inc.Operations dashboard
US8756489B2 (en)2009-09-172014-06-17Adobe Systems IncorporatedMethod and system for dynamic assembly of form fragments
US8347398B1 (en)2009-09-232013-01-01Savvystuff Property TrustSelected text obfuscation and encryption in a local, network and cloud computing environment
US20110074811A1 (en)2009-09-252011-03-31Apple Inc.Map Layout for Print Production
US20110078173A1 (en)2009-09-302011-03-31Avaya Inc.Social Network User Interface
US20110087519A1 (en)2009-10-092011-04-14Visa U.S.A. Inc.Systems and Methods for Panel Enhancement with Transaction Data
US8554699B2 (en)2009-10-202013-10-08Google Inc.Method and system for detecting anomalies in time series data
US8312367B2 (en)2009-10-302012-11-13Synopsys, Inc.Technique for dynamically sizing columns in a table
US8539583B2 (en)*2009-11-032013-09-17Mcafee, Inc.Rollback feature
CA2780811A1 (en)2009-11-132011-05-19Zoll Medical CorporationCommunity-based response system
US11122009B2 (en)2009-12-012021-09-14Apple Inc.Systems and methods for identifying geographic locations of social media content collected over social networks
US8484259B1 (en)2009-12-082013-07-09Netapp, Inc.Metadata subsystem for a distributed object store in a network storage system
US20110153384A1 (en)2009-12-172011-06-23Matthew Donald HorneVisual comps builder
US8676597B2 (en)2009-12-282014-03-18General Electric CompanyMethods and systems for mapping healthcare services analytics for volume and trends
CN102906686A (en)2010-01-112013-01-30潘吉瓦公司Evaluating public records of supply transactions for financial investment decisions
US8564596B2 (en)2010-01-122013-10-22Palantir Technologies, Inc.Techniques for density mapping
US8571919B2 (en)2010-01-202013-10-29American Express Travel Related Services Company, Inc.System and method for identifying attributes of a population using spend level data
US8380659B2 (en)2010-02-092013-02-19Google Inc.Method and system for efficiently replicating data in non-relational databases
US20110218934A1 (en)2010-03-032011-09-08Jeremy ElserSystem and methods for comparing real properties for purchase and for generating heat maps to aid in identifying price anomalies of such real properties
US8863279B2 (en)*2010-03-082014-10-14Raytheon CompanySystem and method for malware detection
US20110231296A1 (en)2010-03-162011-09-22UberMedia, Inc.Systems and methods for interacting with messages, authors, and followers
US8738418B2 (en)2010-03-192014-05-27Visa U.S.A. Inc.Systems and methods to enhance search data with transaction based data
US8577911B1 (en)2010-03-232013-11-05Google Inc.Presenting search term refinements
US8572023B2 (en)2010-04-142013-10-29Bank Of America CorporationData services framework workflow processing
WO2011127581A1 (en)2010-04-152011-10-20Mxi Technologies Ltd.Method and system for deployed operations support
US8489331B2 (en)2010-04-292013-07-16Microsoft CorporationDestination maps user interface
US8799812B2 (en)2010-04-292014-08-05Cheryl ParkerSystem and method for geographic based data visualization and extraction
US8473415B2 (en)2010-05-042013-06-25Kevin Paul SiegelSystem and method for identifying a point of compromise in a payment transaction processing system
US8723679B2 (en)2010-05-252014-05-13Public Engines, Inc.Systems and methods for transmitting alert messages relating to events that occur within a pre-defined area
US8756224B2 (en)2010-06-162014-06-17Rallyverse, Inc.Methods, systems, and media for content ranking using real-time data
US20110310005A1 (en)2010-06-172011-12-22Qualcomm IncorporatedMethods and apparatus for contactless gesture recognition
BR112012032949A2 (en)2010-06-232016-11-22Koninkl Philips Nv system for providing interoperability between a plurality of digital data protection systems, workstation, method of providing interoperability between a plurality of computer implemented digital data protection systems and computer program product
US8844039B2 (en)*2010-06-302014-09-23F-Secure CorporationMalware image recognition
WO2012003504A2 (en)2010-07-022012-01-05Air Computing, Inc.A system and method for cloud file management
US8489641B1 (en)2010-07-082013-07-16Google Inc.Displaying layers of search results on a map
US20120019559A1 (en)2010-07-202012-01-26Siler Lucas CMethods and Apparatus for Interactive Display of Images and Measurements
DE102010036906A1 (en)2010-08-062012-02-09Tavendo Gmbh Configurable pie menu
US20120036013A1 (en)2010-08-092012-02-09Brent Lee NeuhausSystem and method for determining a consumer's location code from payment transaction data
US9495264B2 (en)2010-08-092016-11-15Veritas Technologies LlcData replication techniques using incremental checkpoints
US8661335B2 (en)2010-09-202014-02-25Blackberry LimitedMethods and systems for identifying content elements
US9215548B2 (en)2010-09-222015-12-15Ncc Group Security Services, Inc.Methods and systems for rating privacy risk of applications for smart phones and other mobile platforms
US8463036B1 (en)2010-09-302013-06-11A9.Com, Inc.Shape-based search of a collection of content
US20120084135A1 (en)2010-10-012012-04-05Smartslips Inc.System and method for tracking transaction records in a network
EP2444134A1 (en)2010-10-192012-04-25Travian Games GmbHMethods, server system and browser clients for providing a game map of a browser-based online multi-player game
KR101425107B1 (en)2010-10-292014-08-01한국전자통신연구원Apparatus for sharing security information among network domains and method for the same
US8781169B2 (en)2010-11-032014-07-15Endeavoring, LlcVehicle tracking and locating system
US8316030B2 (en)2010-11-052012-11-20Nextgen Datacom, Inc.Method and system for document classification or search using discrete words
JP5706137B2 (en)2010-11-222015-04-22インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Method and computer program for displaying a plurality of posts (groups of data) on a computer screen in real time along a plurality of axes
US20130251233A1 (en)2010-11-262013-09-26Guoliang YangMethod for creating a report from radiological images using electronic report templates
US8839133B2 (en)2010-12-022014-09-16Microsoft CorporationData visualizations including interactive time line representations
US9141405B2 (en)2010-12-152015-09-22International Business Machines CorporationUser interface construction
US9378294B2 (en)2010-12-172016-06-28Microsoft Technology Licensing, LlcPresenting source regions of rendered source web pages in target regions of target web pages
US20120159399A1 (en)2010-12-172012-06-21International Business Machines CorporationSystem for organizing and navigating data within a table
US9881257B2 (en)2010-12-292018-01-30Tickr, Inc.Multi-dimensional visualization of temporal information
KR101217709B1 (en)*2010-12-312013-01-02주식회사 안랩Apparatus and Method for Detecting Malicious Code
US8621634B2 (en)*2011-01-132013-12-31F-Secure OyjMalware detection based on a predetermined criterion
AU2012211053A1 (en)2011-01-272013-08-22L-3 Communications CorporationInternet isolation for avoiding internet security threats
US8447263B2 (en)2011-01-282013-05-21Don ReichEmergency call analysis system
US8437731B2 (en)2011-01-282013-05-07Don ReichEmergency call analysis system
US20120260304A1 (en)*2011-02-152012-10-11Webroot Inc.Methods and apparatus for agent-based malware management
US20120215898A1 (en)2011-02-172012-08-23Nitin Jayant ShahApplications of a Network-Centric Information Distribution Platform on the Internet
EP2678774A4 (en)2011-02-242015-04-08Lexisnexis Division Of Reed Elsevier IncMethods for electronic document searching and graphically representing electronic document searches
US20120246148A1 (en)2011-03-222012-09-27Intergraph Technologies CompanyContextual Display and Scrolling of Search Results in Graphical Environment
US9449010B2 (en)2011-04-022016-09-20Open Invention Network, LlcSystem and method for managing sensitive data using intelligent mobile agents on a network
US10395256B2 (en)2011-06-022019-08-27Visa International Service AssociationReputation management in a transaction processing system
US10380585B2 (en)2011-06-022019-08-13Visa International Service AssociationLocal usage of electronic tokens in a transaction processing system
US9104765B2 (en)2011-06-172015-08-11Robert Osann, Jr.Automatic webpage characterization and search results annotation
US20130006725A1 (en)2011-06-302013-01-03Accenture Global Services LimitedTolling integration technology
US8584242B2 (en)2011-07-122013-11-12At&T Intellectual Property I, L.P.Remote-assisted malware detection
US9240011B2 (en)2011-07-132016-01-19Visa International Service AssociationSystems and methods to communicate with transaction terminals
US9026944B2 (en)2011-07-142015-05-05Microsoft Technology Licensing, LlcManaging content through actions on context based menus
US8726379B1 (en)2011-07-152014-05-13Norse CorporationSystems and methods for dynamic protection from electronic attacks
US8447674B2 (en)2011-07-212013-05-21Bank Of America CorporationMulti-stage filtering for fraud detection with customer history filters
US8666919B2 (en)2011-07-292014-03-04Accenture Global Services LimitedData quality management for profiling, linking, cleansing and migrating data
US9087071B2 (en)2011-08-032015-07-21Amazon Technologies, Inc.Gathering transaction data associated with locally stored data files
US8627404B2 (en)*2011-08-242014-01-07Raytheon CompanyDetecting addition of a file to a computer system and initiating remote analysis of the file for malware
US8533204B2 (en)2011-09-022013-09-10Xerox CorporationText-based searching of image data
US10031646B2 (en)2011-09-072018-07-24Mcafee, LlcComputer system security dashboard
US10140620B2 (en)2011-09-152018-11-27Stephan HEATHMobile device system and method providing combined delivery system using 3D geo-target location-based mobile commerce searching/purchases, discounts/coupons products, goods, and services, or service providers-geomapping-company/local and socially-conscious information/social networking (“PS-GM-C/LandSC/I-SN”)
US8903355B2 (en)2011-09-262014-12-02Solacom Technologies Inc.Answering or releasing emergency calls from a map display for an emergency services platform
US20130097482A1 (en)2011-10-132013-04-18Microsoft CorporationSearch result entry truncation using pixel-based approximation
US20130101159A1 (en)2011-10-212013-04-25Qualcomm IncorporatedImage and video based pedestrian traffic estimation
US9411797B2 (en)2011-10-312016-08-09Microsoft Technology Licensing, LlcSlicer elements for filtering tabular data
US9053083B2 (en)2011-11-042015-06-09Microsoft Technology Licensing, LlcInteraction between web gadgets and spreadsheets
US8498984B1 (en)2011-11-212013-07-30Google Inc.Categorization of search results
KR101575282B1 (en)2011-11-282015-12-09한국전자통신연구원Agent device and method for sharing security information based on anonymous identifier between security management domains
US8776242B2 (en)*2011-11-292014-07-08Raytheon CompanyProviding a malware analysis using a secure malware detection process
US8510841B2 (en)*2011-12-062013-08-13Raytheon CompanyDetecting malware using patterns
US9026364B2 (en)2011-12-122015-05-05Toyota Jidosha Kabushiki KaishaPlace affinity estimation
US20130157234A1 (en)2011-12-142013-06-20Microsoft CorporationStoryline visualization
US20130160120A1 (en)2011-12-202013-06-20Yahoo! Inc.Protecting end users from malware using advertising virtual machine
US9367687B1 (en)*2011-12-222016-06-14Emc CorporationMethod for malware detection using deep inspection and data discovery agents
US9189556B2 (en)2012-01-062015-11-17Google Inc.System and method for displaying information local to a selected area
WO2013102892A1 (en)2012-01-062013-07-11Technologies Of Voice Interface LtdA system and method for generating personalized sensor-based activation of software
US9116994B2 (en)2012-01-092015-08-25Brightedge Technologies, Inc.Search engine optimization for category specific search results
US8782004B2 (en)2012-01-232014-07-15Palantir Technologies, Inc.Cross-ACL multi-master replication
CA2838068A1 (en)2012-02-242013-06-24Jerry WolfeSystem and method for providing flavor advisement and enhancement
US20130232045A1 (en)2012-03-042013-09-05Oracle International CorporationAutomatic Detection Of Fraud And Error Using A Vector-Cluster Model
US8787939B2 (en)2012-03-272014-07-22Facebook, Inc.Dynamic geographic beacons for geographic-positioning-capable devices
US20130263019A1 (en)2012-03-302013-10-03Maria G. CastellanosAnalyzing social media
US8738665B2 (en)2012-04-022014-05-27Apple Inc.Smart progress indicator
US8983936B2 (en)2012-04-042015-03-17Microsoft CorporationIncremental visualization for structured data in an enterprise-level data store
US8792677B2 (en)2012-04-192014-07-29Intelligence Based Integrated Security Systems, Inc.Large venue security method
US9298856B2 (en)2012-04-232016-03-29Sap SeInteractive data exploration and visualization tool
US9043710B2 (en)2012-04-262015-05-26Sap SeSwitch control in report generation
US8742934B1 (en)2012-04-292014-06-03Intel-Based Solutions, LLCSystem and method for facilitating the execution of law enforcement duties and enhancing anti-terrorism and counter-terrorism capabilities
US20140040714A1 (en)2012-04-302014-02-06Louis J. SiegelInformation Management System and Method
US10304036B2 (en)2012-05-072019-05-28Nasdaq, Inc.Social media profiling for one or more authors using one or more social media platforms
US20140032506A1 (en)2012-06-122014-01-30Quality Attributes Software, Inc.System and methods for real-time detection, correction, and transformation of time series data
US8966441B2 (en)2012-07-122015-02-24Oracle International CorporationDynamic scripts to extend static applications
US8836788B2 (en)2012-08-062014-09-16Cloudparc, Inc.Controlling use of parking spaces and restricted locations using multiple cameras
US8554875B1 (en)2012-08-132013-10-08Ribbon Labs, Inc.Communicating future locations in a social network
US10311062B2 (en)2012-08-212019-06-04Microsoft Technology Licensing, LlcFiltering structured data using inexact, culture-dependent terms
US8925082B2 (en)2012-08-222014-12-30International Business Machines CorporationCooperative intrusion detection ecosystem for IP reputation-based security
US20140068487A1 (en)2012-09-052014-03-06Roche Diagnostics Operations, Inc.Computer Implemented Methods For Visualizing Correlations Between Blood Glucose Data And Events And Apparatuses Thereof
US20140095509A1 (en)2012-10-022014-04-03Banjo, Inc.Method of tagging content lacking geotags with a location
US8806625B1 (en)*2012-10-022014-08-12Symantec CorporationSystems and methods for performing security scans
US9513780B2 (en)2012-10-082016-12-06Fisher-Rosemount Systems, Inc.Distribution policy for propagation of changes to process control objects
US9104786B2 (en)2012-10-122015-08-11International Business Machines CorporationIterative refinement of cohorts using visual exploration and data analytics
US20140108068A1 (en)2012-10-172014-04-17Jonathan A. WilliamsSystem and Method for Scheduling Tee Time
US9081975B2 (en)2012-10-222015-07-14Palantir Technologies, Inc.Sharing information between nexuses that use different classification schemes for information access control
US20140143009A1 (en)2012-11-162014-05-22International Business Machines CorporationRisk reward estimation for company-country pairs
US20140157172A1 (en)2012-11-302014-06-05DrillmapGeographic layout of petroleum drilling data and methods for processing data
US20140156527A1 (en)2012-11-302014-06-05Bank Of America CorporationPre-payment authorization categorization
US9497289B2 (en)2012-12-072016-11-15Genesys Telecommunications Laboratories, Inc.System and method for social message classification based on influence
US9294576B2 (en)2013-01-022016-03-22Microsoft Technology Licensing, LlcSocial media impact assessment
US20140195515A1 (en)2013-01-102014-07-10I3 AnalyticsMethods and systems for querying and displaying data using interactive three-dimensional representations
US9311479B1 (en)*2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack
US8868486B2 (en)2013-03-152014-10-21Palantir Technologies Inc.Time-sensitive cube
US8937619B2 (en)2013-03-152015-01-20Palantir Technologies Inc.Generating an object time series from data objects
US8917274B2 (en)2013-03-152014-12-23Palantir Technologies Inc.Event matrix based on integrated data
US8818892B1 (en)2013-03-152014-08-26Palantir Technologies, Inc.Prioritizing data clusters with customizable scoring strategies
US9740369B2 (en)2013-03-152017-08-22Palantir Technologies Inc.Systems and methods for providing a tagging interface for external content
US9501202B2 (en)2013-03-152016-11-22Palantir Technologies, Inc.Computer graphical user interface with genomic workflow
CN103281301B (en)2013-04-282017-02-08上海海事大学System and method for judging cloud safety malicious program
US8799799B1 (en)2013-05-072014-08-05Palantir Technologies Inc.Interactive geospatial map
GB2542517B (en)2013-05-072018-01-24Palantir Technologies IncInteractive Geospatial map
US20150019394A1 (en)2013-07-112015-01-15Mastercard International IncorporatedMerchant information correction through transaction history or detail
US8620790B2 (en)2013-07-112013-12-31ScvngrSystems and methods for dynamic transaction-payment routing
US9223773B2 (en)2013-08-082015-12-29Palatir Technologies Inc.Template system for custom document generation
US9335897B2 (en)2013-08-082016-05-10Palantir Technologies Inc.Long click display of a context menu
US9477372B2 (en)2013-08-082016-10-25Palantir Technologies Inc.Cable reader snippets and postboard
US9565152B2 (en)2013-08-082017-02-07Palantir Technologies Inc.Cable reader labeling
GB2518745A (en)2013-08-082015-04-01Palantir Technologies IncTemplate system for custom document generation
US8713467B1 (en)2013-08-092014-04-29Palantir Technologies, Inc.Context-sensitive views
US9336389B1 (en)*2013-08-192016-05-10Amazon Technologies, Inc.Rapid malware inspection of mobile applications
US9027140B1 (en)*2013-08-222015-05-05Appthority, Inc.Application malware filtering for advertising networks
US9244679B1 (en)*2013-09-122016-01-26Symantec CorporationSystems and methods for automatically identifying changes in deliverable files
US8689108B1 (en)2013-09-242014-04-01Palantir Technologies, Inc.Presentation and analysis of user interaction data
US9785317B2 (en)2013-09-242017-10-10Palantir Technologies Inc.Presentation and analysis of user interaction data
US9628507B2 (en)*2013-09-302017-04-18Fireeye, Inc.Advanced persistent threat (APT) detection center
US8938686B1 (en)2013-10-032015-01-20Palantir Technologies Inc.Systems and methods for analyzing performance of an entity
US8812960B1 (en)2013-10-072014-08-19Palantir Technologies Inc.Cohort-based presentation of user interaction data
US8924872B1 (en)2013-10-182014-12-30Palantir Technologies Inc.Overview user interface of emergency call data of a law enforcement agency
US8832594B1 (en)2013-11-042014-09-09Palantir Technologies Inc.Space-optimized display of multi-column tables with selective text truncation based on a combined text width
US8868537B1 (en)2013-11-112014-10-21Palantir Technologies, Inc.Simple web search
US8832832B1 (en)2014-01-032014-09-09Palantir Technologies Inc.IP reputation
US20160300216A1 (en)2015-04-132016-10-13Paypal, Inc.Wireless beacon devices for preventing fraud using loyalty information for a user
US10102369B2 (en)2015-08-192018-10-16Palantir Technologies Inc.Checkout system executable code monitoring, and user account compromise determination system

Patent Citations (54)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4852019A (en)*1986-01-311989-07-25Computer Associates International, Inc.Method and system for retrieval of stored graphs
US5136690A (en)*1989-08-071992-08-04At&T Bell LaboratoriesDynamic graphical analysis of network data
US5835085A (en)*1993-10-221998-11-10Lucent Technologies Inc.Graphical display of relationships
US6226789B1 (en)*1996-01-292001-05-01Compaq Computer CorporationMethod and apparatus for data flow analysis
US6108698A (en)*1998-07-292000-08-22Xerox CorporationNode-link data defining a graph and a tree within the graph
US6714936B1 (en)*1999-05-252004-03-30Nevin, Iii Rocky Harry W.Method and apparatus for displaying data stored in linked nodes
US6856313B2 (en)*2002-05-202005-02-15Xerox CorporationSystem and method for the simultaneous display and manipulation of hierarchical and non-hierarchical data
US20130061182A1 (en)*2003-04-082013-03-07Xbranch Technologies GmbhInterface and method for exploring a collection of data
US8646080B2 (en)*2005-09-162014-02-04Avg Technologies Cy LimitedMethod and apparatus for removing harmful software
US20070240067A1 (en)*2006-04-112007-10-11Invensys Systems, Inc.Strategy editor supporting automatic designation of displayed line style based upon a connection data type
US7895666B1 (en)*2006-09-012011-02-22Hewlett-Packard Development Company, L.P.Data structure representation using hash-based directed acyclic graphs and related method
US20080263669A1 (en)*2007-04-232008-10-23Secure Computing CorporationSystems, apparatus, and methods for detecting malware
US20090216867A1 (en)*2008-02-152009-08-27!J IncorporatedVendor-independent network configuration tool
US20090282483A1 (en)*2008-05-122009-11-12Bennett James DServer based malware screening
US8302193B1 (en)*2008-05-302012-10-30Symantec CorporationMethods and systems for scanning files for malware
US20090313267A1 (en)*2008-06-122009-12-17Fuji Xerox Co., Ltd.Systems and methods for organizing files in a graph-based layout
US20100014432A1 (en)*2008-07-212010-01-21Palo Alto Research Center IncorporatedMethod for identifying undesirable features among computing nodes
US20110047620A1 (en)*2008-10-212011-02-24Lookout, Inc., A California CorporationSystem and method for server-coupled malware prevention
US20110145920A1 (en)*2008-10-212011-06-16Lookout, IncSystem and method for adverse mobile application identification
US20100313157A1 (en)*2009-02-102010-12-09Ayasdi, Inc.Systems and Methods for Visualization of Data Analysis
US8321935B1 (en)*2009-02-262012-11-27Symantec CorporationIdentifying originators of malware
US20110145286A1 (en)*2009-12-152011-06-16Chalklabs, LlcDistributed platform for network analysis
US8341745B1 (en)*2010-02-222012-12-25Symantec CorporationInferring file and website reputations by belief propagation leveraging machine reputation
US8701190B1 (en)*2010-02-222014-04-15Symantec CorporationInferring file and website reputations by belief propagation leveraging machine reputation
US20120072988A1 (en)*2010-03-262012-03-22Telcordia Technologies, Inc.Detection of global metamorphic malware variants using control and data flow analysis
US20120079596A1 (en)*2010-08-262012-03-29Verisign, Inc.Method and system for automatic detection and analysis of malware
US20120266245A1 (en)*2011-04-152012-10-18Raytheon CompanyMulti-Nodal Malware Analysis
US20120293542A1 (en)*2011-05-202012-11-22International Business Machines CorporationManipulation of an Object as an Image of a Mapping of Graph Data
US20120296924A1 (en)*2011-05-202012-11-22International Business Machines CorporationMethod, program, and system for converting part of graph data to data structure as an image of homomorphism
US20120304244A1 (en)*2011-05-242012-11-29Palo Alto Networks, Inc.Malware analysis system
US20120323829A1 (en)*2011-06-172012-12-20Microsoft CorporationGraph-based classification based on file relationships
US20120330801A1 (en)*2011-06-272012-12-27Raytheon CompanyDistributed Malware Detection
US20130097706A1 (en)*2011-09-162013-04-18Veracode, Inc.Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security
US20130073568A1 (en)*2011-09-212013-03-21Vladimir FederovRanking structured objects and actions on a social networking system
US20130151517A1 (en)*2011-12-072013-06-13Electronics And Telecommunications Research InstituteFile search apparatus and method using tag graph
US20130152202A1 (en)*2011-12-132013-06-13Samsung Electronics Co. Ltd.Apparatus and method for analyzing malware in data analysis system
US20130218899A1 (en)*2012-02-162013-08-22Oracle International CorporationMechanisms for searching enterprise data graphs
US8898093B1 (en)*2012-06-252014-11-25The Boeing CompanySystems and methods for analyzing data using deep belief networks (DBN) and identifying a pattern in a graph
US20160063106A1 (en)*2012-08-082016-03-03Google Inc.Related Entity Search
US20140046982A1 (en)*2012-08-132014-02-13Magnet Systems Inc.Managing cross-correlated data
US20140059684A1 (en)*2012-08-232014-02-27Raytheon Bbn Technologies Corp.System and method for computer inspection of information objects for shared malware components
US20140123279A1 (en)*2012-10-292014-05-01Michael G. BishopDynamic quarantining for malware detection
US20140129936A1 (en)*2012-11-052014-05-08Palantir Technologies, Inc.System and method for sharing investigation results
US20140172914A1 (en)*2012-12-142014-06-19Microsoft CorporationGraph query processing using plurality of engines
US9323863B2 (en)*2013-02-012016-04-26Microsoft Technology Licensing, LlcHighlighting of time series data on force directed graph
US20140245443A1 (en)*2013-02-272014-08-28Sayan ChakrabortyCyber Defense Systems And Methods
US20140351261A1 (en)*2013-05-242014-11-27Sap AgRepresenting enterprise data in a knowledge graph
US9202052B1 (en)*2013-06-212015-12-01Emc CorporationDynamic graph anomaly detection framework and scalable system architecture
US9361353B1 (en)*2013-06-272016-06-07Amazon Technologies, Inc.Crowd sourced digital content processing
US20150100605A1 (en)*2013-10-092015-04-09Google Inc.Determining collection membership in a data graph
US20150244734A1 (en)*2014-02-252015-08-27Verisign, Inc.Automated intelligence graph construction and countermeasure deployment
US9225730B1 (en)*2014-03-192015-12-29Amazon Technologies, Inc.Graph based detection of anomalous activity
US9185119B1 (en)*2014-05-082015-11-10Symantec CorporationSystems and methods for detecting malware using file clustering
US9323924B1 (en)*2014-05-092016-04-26Symantec CorporationSystems and methods for establishing reputations of files

Cited By (8)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10922404B2 (en)2015-08-192021-02-16Palantir Technologies Inc.Checkout system executable code monitoring, and user account compromise determination system
US10121000B1 (en)*2016-06-282018-11-06Fireeye, Inc.System and method to detect premium attacks on electronic networks and electronic devices
US10824749B2 (en)*2018-09-282020-11-03Code 42 Software, Inc.Automatic graph-based detection of unlikely file possession
US11372989B2 (en)*2018-09-282022-06-28Code 42 Software, Inc.Automatic graph-based detection of unlikely file possession
US20210286879A1 (en)*2020-03-132021-09-16International Business Machines CorporationDisplaying Cyber Threat Data in a Narrative
US11503047B2 (en)2020-03-132022-11-15International Business Machines CorporationRelationship-based conversion of cyber threat data into a narrative-like format
US11991193B2 (en)2020-03-132024-05-21International Business Machines CorporationRelationship-based conversion of cyber threat data into a narrative-like format
US12086261B2 (en)*2020-03-132024-09-10International Business Machines CorporationDisplaying cyber threat data in a narrative-like format

Also Published As

Publication numberPublication date
EP2963578B1 (en)2020-11-11
EP2963578A1 (en)2016-01-06
US20160004864A1 (en)2016-01-07
US9785773B2 (en)2017-10-10

Similar Documents

PublicationPublication DateTitle
US9785773B2 (en)Malware data item analysis
US9021260B1 (en)Malware data item analysis
US11580680B2 (en)Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items
US10552998B2 (en)System and method of generating data points from one or more data stores of data items for chart creation and manipulation
US12147295B2 (en)Linking related events for various devices and services in computer log files on a centralized server
US12229154B2 (en)Focused probabilistic entity resolution from multiple data sources
US9965937B2 (en)External malware data item clustering and analysis
US12093159B2 (en)Audit logging database system and user interface
US20160006749A1 (en)Internal malware data item clustering and analysis
US12026810B2 (en)Ontology-backed automatic chart creation
US10552615B2 (en)Threat response systems and methods
US12367310B2 (en)Data security

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

ASAssignment

Owner name:ROYAL BANK OF CANADA, AS ADMINISTRATIVE AGENT, CANADA

Free format text:SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:051709/0471

Effective date:20200127

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., AS ADMINISTRATIVE AGENT, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:051713/0149

Effective date:20200127

ASAssignment

Owner name:PALANTIR TECHNOLOGIES INC., CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:ROYAL BANK OF CANADA;REEL/FRAME:052856/0382

Effective date:20200604

Owner name:MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:052856/0817

Effective date:20200604

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:PALANTIR TECHNOLOGIES INC., CALIFORNIA

Free format text:CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY LISTED PATENT BY REMOVING APPLICATION NO. 16/832267 FROM THE RELEASE OF SECURITY INTEREST PREVIOUSLY RECORDED ON REEL 052856 FRAME 0382. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST;ASSIGNOR:ROYAL BANK OF CANADA;REEL/FRAME:057335/0753

Effective date:20200604

ASAssignment

Owner name:WELLS FARGO BANK, N.A., NORTH CAROLINA

Free format text:ASSIGNMENT OF INTELLECTUAL PROPERTY SECURITY AGREEMENTS;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:060572/0640

Effective date:20220701

Owner name:WELLS FARGO BANK, N.A., NORTH CAROLINA

Free format text:SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:060572/0506

Effective date:20220701


[8]ページ先頭

©2009-2025 Movatter.jp