36 patents
Page 2 of 2
Utility
Fraud Detection with a Stacked Auto Encoder with Embedding
23 Jun 22
An improved apparatus and method for detecting fraud is described using a stacked auto encoder with embedding to encode and decode a transaction to determine fraud.
Valerie Melul, Avital Seraty
Filed: 23 Dec 20
Utility
Matching Non-exact Addresses
2 Jun 22
A two-step algorithm for conducting near real time fuzzy searches of a target on one or more large data sets is described, where the address and the geolocation are included in the match criteria.
Richard A. Baker, JR., Kaiyu Pan
Filed: 18 Feb 22
Utility
Non-exact Matching of Large Datasets
12 May 22
A two-step algorithm for conducting near real-time fuzzy searches of a target on one or more large data sets is described.
Kaiyu Pan, Richard J. Diekema, JR., Mark G. Kane
Filed: 20 Jan 22
Utility
Variable Length Deduplication of Stored Data
17 Mar 22
A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium is described here.
Zenon Buratta, Andy Dobbels
Filed: 29 Nov 21
Utility
Fraud Detection Rule Optimization
10 Feb 22
An improved method and apparatus for determining if a financial transaction is fraudulent is described.
Dalit Amitai, Shahar Cohen, Yulia Mayer, Avital Serfaty
Filed: 5 Aug 20
Utility
System for Communicating with a Financial Institution to Manage Disbursements over a Communication Network
25 Nov 21
Disclosed are a system and a method for communicating with a financial institution over a communication network to manage payments of payee initiated by a sender.
Andrew Scarborough, Phillip Malone, Sean Glerum, Sandhya S. Pillalamarri, Melissa Mikulski, William Cashman
Filed: 4 Aug 21
Utility
Financial Messaging Transformation-as-a-Service
7 Oct 21
A transformation-as-a-service apparatus, system and method are described, where the transformation converts financial messages from one format to another (such as SWIFT format to ISO 20022 format, etc), storing the original and transformed messages for future access by a token.
Edward Ireland, Andy Turner, Ludovic Pourrat
Filed: 2 Apr 20
Utility
Detecting Diverted Drugs
16 Sep 21
A method and apparatus for detecting suspicious activities surrounding the management of controlled substances in a medical facility is described herein, where the activities that may indicate the diversion of controlled drugs are flagged for further review.
Shawn Curtiss, Benjamin Smith, Mark Benoit
Filed: 28 May 21
Utility
Visualization of a Machine Learning Confidence Score
9 Sep 21
A unique user interface for improving machine learning algorithms is described herein.
John Canneto, Flora Kidani, Anne Baron, Jonathan Hewitt, William Cashman, Michael Marcinelli
Filed: 24 May 21
Utility
Two Step Algorithm for Non-exact Matching of Large Datasets
9 Sep 21
A two-step algorithm for conducting near real-time fuzzy searches of a target on one or more large data sets is described.
Mark G. Kane, Richard J. Diekema, JR., Kaiyu Pan
Filed: 20 May 21
Utility
Automated Account Opening Decisioning Using Machine Learning
22 Jul 21
A method for using machine learning techniques to analyze past decisions made by administrators concerning account opening requests and to recommend whether an account opening request should be allowed or denied.
Leonardo Gil, Peter Cousins, Alexey Skosyrskiy
Filed: 9 Apr 21
Utility
international cash management software using machine learning
13 May 21
A method and apparatus for improving the management of cash and liquidity of an organization utilizing a plurality of currency accounts is described.
Edouard Joliveau
Filed: 12 Nov 19
Utility
Variable Length Deduplication of Stored Data
11 Nov 20
A computer-implemented method for providing tenant aware, variable length, deduplication of data stored on a non-transitory computer readable storage medium.
Zenon Buratta, Andy Dobbels
Filed: 26 Jul 20
Utility
Method and System for Automated Account Opening Decisioning
13 May 20
A method for using machine learning techniques to analyze past decisions (made be administrators concerning account opening requests) and to recommend whether an account opening request should be allowed or denied.
Leonardo Gil, Peter Cousins, Alexey Skosyrskiy
Filed: 8 Nov 18
Utility
Securing Electronic Data by Automatically Destroying Misdirected Transmissions
15 Apr 20
A method for securing data by embedding the data in a data structure and utilizing a sensor device to detect transfer of the data structure.
Trevor Ramberg, Fred Ramberg
Filed: 15 Dec 19
Utility
Notification of a Security Breach on a Mobile Device
4 Dec 19
A method and device for providing notification of improper access to secure data on a mobile device.
Alexander Deeb, Durga Nagalla
Filed: 1 Dec 16