1
Jose Caldera, Kieran Sherlock, Garrett Gafke: Systems and methods to authenticate users and/or control access made by users on a computer network using identity services. IDM GLOBAL, Greenberg Traurig, February 6, 2018: US09888007 (2 worldwide citation)

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of ...


2
Jose Caldera: Systems and methods for sanction screening. IDM GLOBAL, Greenberg Traurig, December 26, 2017: US09852427 (2 worldwide citation)

In some examples, a computerized sanction screening system may include an automated system for collection of sanction information, and a routine for analyzing additional available data related to sanction information entities. The system may also include an automated analysis summary routine for cre ...


3
Jose Caldera: Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud. IDM GLOBAL, Greenberg Traurig, November 14, 2017: US09818116 (2 worldwide citation)

An example merchant fraud system may include an automated system for collecting contextual relationship information, plus a routine for analyzing additional data related to sanctions. The system may also include an automated analysis summary routine for creating condensed information subsets or grap ...


4
Derek Patton Pearcy, Jose Caldera: System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device. McAfee, Patent Capital Group PC, May 21, 2013: US08448221 (1 worldwide citation)

A system, method, and computer program product are provided for displaying network events in terms of objects managed by at least one of a security appliance and a routing device. In use, network events are received. Furthermore, the network events are displayed in terms of objects being managed by ...


5
Jose Caldera, Kieran Sherlock, Neal Jared Reiter: Systems and methods to authenticate users and/or control access made by users on a computer network based on scanning elements for inspection according to changes made in a relation graph. IDM GLOBAL, Greenberg Traurig, January 22, 2019: US10187369

A controller for user authentication and access control, configured to: store data representing a graph having: nodes representing data elements associated with accesses made using an access token; and links among the nodes representing connections between the data elements identified in details of ...


6
Jose Caldera: Systems and methods for detecting relations between unknown merchants and merchants with a known connection to fraud. IDM GLOBAL, Greenberg Traurig, July 31, 2018: US10037533

An example merchant fraud system may include an automated system for collecting contextual relationship information, plus a routine for analyzing additional data related to sanctions. The system may also include an automated analysis summary routine for creating condensed information subsets or grap ...


7
Derek Patton Pearcy, Jose Caldera: System, method, and computer program product for displaying network events in terms of objects managed by a security appliance and/or a routing device. September 15, 2011: US20110225622-A1

A system, method, and computer program product are provided for displaying network events in terms of objects managed by at least one of a security appliance and a routing device. In use, network events are received. Furthermore, the network events are displayed in terms of objects being managed by ...