328 patents
Page 12 of 17
Utility
System and Method for Unauthorized Activity Detection
20 May 21
An authorization access system and method of minimizing unauthorized access to a resource are provided.
Nebojsa DJOSIC, Bojan NOKOVIC, Salah SHARIEH, Bingzhou ZHENG
Filed: 20 Nov 20
Utility
Systems and Methods of Data Record Management
6 May 21
A system and method of data record management is provided.
Daniel GREWAL, Tariq PIPERDY
Filed: 30 Oct 20
Utility
System and Method for Machine Learning Architecture with Differential Privacy
6 May 21
Differential private dictionary learning privatizes input data by training an autoencoder to learn a dictionary, the autoencoder including an encoder and a decoder, and weights of channels in a layer in the decoder defining dictionary atoms forming the dictionary; inputting the input data to the trained autoencoder; projecting, using the encoder, the input data on the learned dictionary to generate a sparse representation of the input data, the sparse representation including coefficients for each dictionary atom; adding noise to the sparse representation to generate a noisy sparse representation; and mapping, using the decoder, the noisy sparse representation to a reconstructed differentially private output.
Sayedmasoud Hashemi AMROABADI, Ali FATHI, Layli Sadat GOLDOOZIAN
Filed: 30 Oct 20
Utility
System and Method for Deep Learning Recommender
6 May 21
Recommendations are generated for users by identifying items held by the users defined by a shallow representation and attributes; defining the items based on a deep representation derived from attributes; generating a deep holding matrix identifying the items held by the users based on deep representations; generating a shallow holding matrix identifying the items held by the users based on shallow representations; generating a similarity score matrix between the deep representations; decomposing the shallow holding matrix into a user latent representation and a product feature latent representation; concatenating the product feature latent representation and product information and pass to a first neural network; concatenating the user latent representation and user information and pass to a second neural network; performing a dot product matrix multiplication on the output of the first neural and the output of the second neural network to generate, for every user and every product, a probability.
Omar NADA, Hani ALMOUSLI, Sean SINGH
Filed: 30 Oct 20
Utility
System and method for message recipient verification
4 May 21
An electronic device includes a communication interface and at least one processor configured for: transmitting to or receiving from a second electronic device over proximity-based communication channel an introduction message including a first encryption key; receiving, from a server via the at least one communication interface, a challenge notification providing notification of a challenge to be completed to initiate a data process, the challenge notification including or providing access to at least one data field associated with a verification challenge; identifying, from the at least one data field, an encrypted challenge response value; decrypting the encrypted challenge response value with a key corresponding to the first encryption key; and transmitting the decrypted challenge response value to the server to complete the challenge to initiate the data process.
Alex Tak Kwun Lau, Edison U. Ortiz, Akhil Gupta, Mohit Sharma, Lucas Joseph Manuel, Tian Jou Tendy Su
Filed: 1 Dec 17
Utility
Method for anomaly detection in clustered data structures
27 Apr 21
A method for generating visual representations of financial interests includes: receiving an input data set including one or more data structures storing data fields and data values representative of financial interests; extracting, from the input data, one or more extracted features from the funds, the extracted features collectively indicative of a distance between different funds; generating one or more clusters of funds, based on the extracted features of the funds; determining, based on identified differences between one or more funds relative to at least one other fund in a corresponding cluster of funds, one or more fund anomalies based on the one or more extracted features; generating one or more adjustment recommendations based on the one or more fund anomalies, the one or more adjustment recommendations representing control instruction sets for automatically modifying characteristics of the corresponding fund.
Morteza Mashayekhi, Iman Rezaeian, Jonathan Albert North Anders
Filed: 12 Mar 19
Utility
Methods and Systems for Digital Reward Processing
22 Apr 21
Embodiments generally relate to the field of reward processing, and more particularly, systems, methods, and computer readable media for digital reward processing utilizing distributed ledger technology.
Edison U. ORTIZ, Iustina-Miruna VINTILA
Filed: 23 Dec 20
Utility
Technology incident management platform
13 Apr 21
Embodiments described herein relation to IT incident management that can involve predictive analytics, prescriptive analytics, and descriptive analytics.
Yixian Cai, Amir Ghaderi, Ankit Khirwadkar, Chetana Chavda, Pei Hu
Filed: 10 May 19
Utility
System and Method for Behavioral Pattern Recognition
8 Apr 21
Disclosed are systems, methods, and devices for pattern extraction.
Kostya BELEZKO, Brechann MCGOEY
Filed: 5 Oct 20
Utility
System and Method for Link Prediction with Semantic Analysis
8 Apr 21
A system, non-transitory computer-readable medium, and method are provided.
Kostya BELEZKO, Brechann MCGOEY
Filed: 7 Oct 20
Utility
Systems and Methods of Adaptively Securing Network Communication Channels
25 Mar 21
Systems and methods for monitoring suspicious communication network traffic.
Jamie GAMBLE, Nariman MAMMADLI
Filed: 25 Sep 20
Utility
System and method for secure electronic transaction platform
23 Mar 21
A system for processing data within a Trusted Execution Environment (TEE) of a processor is provided.
Edison U. Ortiz, Arya Pourtabatabaie, Ambica Pawan Khandavilli, Margaret Inez Salter, Jordan Alexander Richards, Iustina-Miruna Vintila
Filed: 28 May 19
Utility
System and Method for Machine Learning Architecture for Interdependence Detection
11 Mar 21
A system for generating predictions associated with interdependence detection between a plurality of data objects, each data object of the plurality of data objects corresponding to an entity name, the system processing, using a natural language processing engine, text strings to extract entity names associated with each of the text string; processing, using a machine learning engine, the text strings to extract estimated economic relationships identified between at least two different entity names.
Roxana ZAMFIR, Atique BADAR-E-MUNIR, Ivana WRIGHT, Mohammadreza DADKHAH, Guhan Pattamadai KASHYAP, Ananya ROY, Diane Elizabeth FENTON, Hang PENG
Filed: 4 Sep 20
Utility
Systems and Methods of Dynamically Presenting Datasets In a Graphical User Interface
11 Mar 21
Systems for dynamically updating a priority queue for scheduling data operations associated with data records.
Kanika VIJ, Vincent Chiu-Hua HUANG, Preet Kanwal SINGH
Filed: 4 Sep 20
Utility
System and Method for Uncertainty-based Advice for Deep Reinforcement Learning Agents
11 Mar 21
Disclosed are systems, methods, and devices for training a learning agent.
Felipe Leno DA SILVA, Pablo Francisco HERNANDEZ LEAL, Bilal KARTAL, Matthew Edmund TAYLOR
Filed: 3 Sep 20
Utility
Virtualization and Secure Processing of Data
4 Mar 21
Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the 5 secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes.
Edison U. ORTIZ, Terry W. LEE, Linda MANTIA
Filed: 26 Oct 20
Utility
System for network incident management
23 Feb 21
A method for dynamic incident management for a computer infrastructure includes: receiving, via a network interface, end-user experience data associated with a plurality of end-user devices; storing the end-user experience data for a corresponding end-user device in an infrastructure database node corresponding to a location of the of the end-user device; upon determining that the end-user experience data for the corresponding end-user device indicates a latency issue at the end-user device, traversing the corresponding infrastructure database node to determine whether a threshold number of latency issues have occurred at the location within a defined time period; when the threshold number of latency issues have occurred, mapping the latency issues to a system performance alert received within a mapping time threshold as a potential root cause; and triggering the execution of response instructions based on the potential root cause.
Phume Ngampornsukswadi, Seyed Shayan Rafizadeh Amirsalami, Jessica Lynn Mallender, Matthew Edward Schembri, Olav Gerhardt Hanrath, Caren Suzanne Elson
Filed: 16 Aug 17
Utility
System and Method for Secure Access Management
18 Feb 21
An access management system and method provisions credentials to access a resource, such as external web user accounts.
Brandon WISSMAN, Thomas JANSZ, Zoe MCLENNAN, Lilly DENG, Dmitri IVTCHENKO
Filed: 14 Aug 20
Utility
Generating and Presenting User Insights In Association with User-to-user Electronic Communication
18 Feb 21
Disclosed are systems, methods, and devices for presenting customer insights in association with an electronic customer relationship management tool.
Anas DESOUKY, Nadia GHOBADIPASHA, Chengxi YANG, Zachary MULLINS, Amit SHARMA, Deepak Prakash ASRANI, Dicken Tak Kuen LEUNG
Filed: 13 Aug 20
Utility
System and Method for Electronic Rental Platform
18 Feb 21
A system, non-transitory computer-readable medium, and method are provided.
Jenny GUAN, Benjamin LABRECQUE, MD Mohaimen Hassan KHAN, Mandy Man-Yang CHEUNG, Ryan HURON
Filed: 14 Aug 20