328 patents
Page 6 of 17
Utility
Systems and Methods for Dynamic Passphrases
22 Dec 22
A technical validation mechanism is described that includes the use of facial feature recognition and tokenization technology operating in combination with machine learning models can be used such that specific facial or auditory characteristics of how an originating script is effectuated can be used to train the machine learning models, which can then be used to validate a video or a particular dynamically generated passphrase by comparing overlapping phonemes or phoneme transitions between the originating script and the dynamically generated passphrase.
Edison U. ORTIZ, Mohammad Abuzar SHAIKH, Margaret Inez SALTER, Sarah Rachel Waigh Yean WILKINSON, Arya POURTABATABAIE, Iustina-Miruna VINTILA, Steven FERNANDES, Sumit Kumar JHA
Filed: 29 Aug 22
Utility
System and Method for Risk Sensitive Reinforcement Learning Architecture
22 Dec 22
A computer-implemented system and method for training an auomated agent are disclosed.
Pablo Francisco HERNANDEZ-LEAL, Yue GAO, Yik Chau LUI
Filed: 10 Jun 22
Utility
System and method for monitoring machine learning models
20 Dec 22
Systems and methods are provided to monitor performance of a machine learning model, the method may include steps of: receiving or storing one or more model data sets representative of the machine learning model, wherein the machine learning model has being trained with a first set of training data; analyzing the first set of training data based on one or more performance parameters for the machine learning model, to generate one or more performance data sets; and process the one or more performance data sets to determine one or more values representing a performance of the machine learning model.
Leandro Axel Guelman
Filed: 12 Mar 19
Utility
System and Method for Multi-user Session for Coordinated Electronic Transactions
15 Dec 22
Systems, methods, and computer readable media are directed in various embodiments for providing multiuser sessions for coordinated electronic transactions.
Arnold BADAL-BADALIAN, Edison U. ORTIZ, William Kwok Hung CHEUNG, Seung Bong BAEK, Ravi KHANDAVILLI
Filed: 14 Jun 22
Utility
Method for Anomaly Detection In Clustered Data Structures
15 Dec 22
A method for generating visual representations of financial interests includes: receiving an input data set including one or more data structures storing data fields and data values representative of financial interests; extracting, from the input data, one or more extracted features from the funds, the extracted features collectively indicative of a distance between different funds; generating one or more clusters of funds, based on the extracted features of the funds; determining, based on identified differences between one or more funds relative to at least one other fund in a corresponding cluster of funds, one or more fund anomalies based on the one or more extracted features; generating one or more adjustment recommendations based on the one or more fund anomalies, the one or more adjustment recommendations representing control instruction sets for automatically modifying characteristics of the corresponding fund.
Morteza MASHAYEKHI, Iman REZAEIAN, Jonathan Albert North ANDERS
Filed: 27 Jun 22
Utility
System and Method for Location-based Token Transaction Processing
8 Dec 22
Systems, methods, and machine-executable data structures for the processing of data for the secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of electronic payment transactions.
Edison U. ORTIZ, Arnold BADAL-BADALIAN, Ambica Pawan KHANDAVILLI, Rasha KHAYAT, Iustina-Miruna VINTILA, Nikhil Singh SHEKHAWAT
Filed: 6 Jun 22
Utility
System and method for machine learning architecture with adversarial attack defense
6 Dec 22
A platform for training deep neural networks using push-to-corner preprocessing and adversarial training.
Weiguang Ding, Luyu Wang, Ruitong Huang, Xiaomeng Jin, Kry Yik Chau Lui
Filed: 17 May 19
Utility
System and method for machine learning architecture for dynamic market stress platform
6 Dec 22
Systems and methods for responsive stress testing that involve back-end machine learning models that produce enterprise market risk calculations and a front-end interface with graphical elements to visually interact with the machine learning models.
Vincent Lok Man Chiu, Sahejpreet Kaur Johal, Roman Nikolas Heit, Asic Qian Chen, Jan Valentine Varsava
Filed: 14 Aug 20
Utility
System and Method for Anonymous Location Verification
1 Dec 22
A computer implemented system for anonymous electronic verification of location credentials including at least one processor and data storage is described in various embodiments.
Arya POURTABATABAIE, Edison U. ORTIZ, Margaret Inez SALTER
Filed: 6 Jun 22
Utility
System and Method for Adversarial Vulnerability Testing of Machine Learning Models
1 Dec 22
A system and method for adversarial vulnerability testing of machine learning models is proposed that receives as an input, a representation of a non-differentiable machine learning model, transforms the input model into a smoothed model and conducts an adversarial search against the smoothed model to generate an output data value representative of a potential vulnerability to adversarial examples.
Giuseppe Marcello Antonio CASTIGLIONE, Weiguang DING, Sayedmasoud HASHEMI AMROABADI, Ga WU, Christopher Côté SRINIVASA
Filed: 20 May 22
Utility
System and Method for Continuous Dynamics Model from Irregular Time-series Data
1 Dec 22
A system for machine learning architecture for time series data prediction.
Ruizhi DENG, Marcus Anthony BRUBAKER, Gregory Peter MORI, Andreas Steffen Michael LEHRMANN
Filed: 20 May 22
Utility
System and Method for Conditional Marginal Distributions at Flexible Evaluation Horizons
1 Dec 22
The methods and systems are directed to computational approaches for training and using machine learning algorithms to predict the conditional marginal distributions of the position of agents at flexible evaluation horizons and can enables more efficient path planning.
Alexander RADOVIC, Jiawei HE, Janahan Mathuran RAMANAN, Marcus Anthony BRUBAKER, Andreas Steffen Michael LEHRMANN
Filed: 21 May 22
Utility
System and Method for Machine Learning Architecture with Invertible Neural Networks
1 Dec 22
A computer system and method for predicting an output for an input are provided.
Michael PRZYSTUPA, Peter FORSYTH, Daniel RECOSKIE, Andreas Steffen Michael LEHRMANN
Filed: 20 May 22
Utility
System and method for call centre management
22 Nov 22
A system receives data associated with a communication between one or more individuals.
Carolyn Liang, Hannah McIsaac, Jane Lor, Sheldon Ho
Filed: 15 Aug 19
Utility
Systems and methods for quantitative order routing
1 Nov 22
A smart order router for quantitative trading and order routing and corresponding methods and computer readable media are described.
Boston Walker, Shary Mudassir, Meng Ye
Filed: 24 May 19
Utility
Verification of data processes in a network of computing resources
18 Oct 22
A method for managing data processes in a network of computing resources includes: receiving at least one child request being routed from an intermediary device to at least one corresponding destination device, the at least one child request requesting execution of at least one corresponding child data process, each of the at least one child data process for executing at least a portion of the at least one parent data process from an instructor device, and each of the at least one child request including a destination key derived at least in part from the at least one instructor key; storing the at least one child request in at least one storage device; modifying the at least one child request upon receiving a child request modification signal; and generating signals for communicating the child requests to one or more requesting devices.
Walter Michael Pitio, Philip Iannaccone, James Brown, Stephen Arthur Bain
Filed: 1 Nov 21
Utility
System and Method for Probabilistic Forecasting Using Machine Learning with a Reject Option
13 Oct 22
A computer-implemented system and method for training a machine learning model are disclosed, the method includes: maintaining a data set representing a neural network having a plurality of weights; receiving input data comprising a plurality of time series data sets ending with timestamp t−1; generating, using the neural network and based on the input data, a probabilistic forecast distribution prediction at timestamp t and a selection value associated with the probabilistic forecast distribution prediction at timestamp t; computing a loss function based on the selection value; and updating at least one of the plurality of weights of the neural network based on the loss function.
Lili MENG, Xiaobin Chang, Gregory Mori, Frederick Tung
Filed: 7 Apr 22
Utility
System and method for composite cryptographic transactions
11 Oct 22
A composite cryptographic data structure is described, and corresponding methods, systems, and computer readable media.
Karim Talal Hamasni, Stefan Mueller, Atilla Murat Firat, Matthew Thomas Peskett
Filed: 2 Apr 19
Utility
Verification of Data Processes In a Network of Computing Resources
6 Oct 22
In one aspect, a system for managing data processes in a network of computing resources is configured to: receive, from an instructor device, a parent request for execution of at least one parent data process executable by a plurality of computing resources at least one computing resource; generate at least one child request for execution of at least one corresponding child data process for routing to at least one corresponding destination device, each of the at least one child data process for executing at least a portion of the at least one parent data process, and each of the at least one child request including a respective destination key derived from at least one instructor key; and route each of the at least one child request to the at least one corresponding destination device.
Walter Michael PITIO, Philip IANNACCONE, James BROWN, Jeffrey Roy BETTEN, Mitchell Joseph Aiosa MORRIS
Filed: 17 Jun 22
Utility
System and method for duplicating an application state
4 Oct 22
There is provided a computer-implemented method for duplicating an application state, the method including: recording one or more point-in-time characteristics of an original application state of an application, the recording including: parsing underlying code for the application to identify (i) a set of state variables that together define the original application state and (ii) a set of logical breadcrumbs identifying a pre-determined number of past actions that led to the original application state; establishing one or more logical anchor points based on the set of state variables; provisioning memory resources to support a duplicate application state; on the provisioned memory resources, initiating a copy of the application; transferring the one or more point-in-time characteristics to the provisioned memory resources, the transferring including: configuring the copy of the application using the one or more point-in-time characteristics to regenerate the original application state on the copy of the application.
Philip Iannaccone, Walter Michael Pitio, James Brown
Filed: 3 Oct 16