24 patents
Utility
Configurable deployment of data science models
9 Jan 24
An example computing platform is configured to (a) cause a client device associated with a user to display an interface for deploying a new data science model, where the interface presents the user with a list of deployment templates, and where each of the deployment templates includes data specifying (i) a respective executable model package and (ii) a respective set of execution instructions for the respective executable model package, (b) receive, from the client device, data indicating (i) a user selection of a given deployment template for use in deploying the new data science model and (ii) a given set of configuration parameters for use in deploying the new data science model, and (c) use the given executable model package, the given set of execution instructions, and the given set of configuration parameters to deploy the new data science model.
Prasad Paravatha, Vivek Mathew, Divya Gone
Filed: 14 Jan 22
Utility
Payments federated directory
12 Dec 23
Embodiments provide a methods and systems for securely providing access to sensitive information for a plurality of entities.
Micah J. Kerr, Alexander Jay Nathan, Julie Malikayil, Michael D. Hansen
Filed: 26 Sep 19
Utility
Computing Systems and Methods for Facilitating Engagement Via Direct Mail
19 Oct 23
A computing platform is configured to: (i) obtain a pool of available words for use in generating four-word passphrases, (ii) generate a candidate batch of four-word passphrases using the pool of available words, (iii) identify one or more duplicate four-word passphrases in the candidate batch and then filter the identified one or more duplicate four-word passphrases out of the candidate set; (iv) based on the filtered candidate batch of four-word passphrases, generate a new batch of four-word passphrases for use on direct mail; and (v) release the new batch of four-word passphrases for use on direct mail.
Tarun Dadoo, Sharif Refaie, Benjamin Wolff, Ian Huntley, Sanjeev Khatri
Filed: 12 Aug 22
Utility
Cross-service Transactions for Peer-to-peer (P2P) Payment Platforms
17 Aug 23
An example computing platform is configured to receive a request from a first user account of a first P2P payment service that a cross-service transaction be initiated with another user account of another P2P payment service.
Purvag Patel, Zizhao Gong, Ashley Kocanda, Eric Hwang, Sanjeev Khatri, Subhrajyoti Mukhopadhyay
Filed: 16 Feb 22
Utility
Cross-service Transactions for Peer-to-peer (P2P) Payment Platforms
17 Aug 23
A first P2P payment service notifies a cross-service transaction platform of a request for a cross-service transaction between a first user account of the first P2P payment service and a second user account of a second P2P payment service.
Ashley Kocanda, Purvag Patel, Zizhao Gong, Eric Hwang, Sanjeev Khatri, Subhrajyoti Mukhopadhyay
Filed: 16 Feb 22
Utility
Trace Context Over File Transfer Communications
3 Aug 23
A first computing system is configured to (i) decide to execute a file transfer of at least one file from the first computing system to a second computing system, where the at least one file comprises data content that is related to a distributed transaction and is stored at the first computing system, (ii) before the file transfer is executed, determine at least one global context identifier for association with the file transfer, (iii) associate the at least one file with a data element that is isolated from the data content and contains the determined global context identifier, and (iv) execute the file transfer by transmitting the at least one file and the associated data element for receipt by the second computing system.
Josh Gavant
Filed: 31 Jan 22
Utility
Computing Systems and Methods for Creating and Executing User-defined Anomaly Detection Rules and Generating Notifications for Detected Anomalies
27 Jul 23
A computing platform may be installed with software technology for creating and executing user-defined anomaly detection rules that configures the computing platform to: (1) receive, from a client device, data defining a given anomaly detection rule that has been created by a user, wherein the given anomaly detection rule comprises at least one anomaly condition that is to be applied to at least one streaming event queue, (2) store a data representation of the given anomaly detection rule in a data store, (3) convert the data representation of the given anomaly detection rule to a streaming query statement, (4) iteratively apply the streaming query statement to the at least one streaming event queue, and (5) while iteratively applying the streaming query statement, make at least one determination that the at least one anomaly condition is satisfied and then cause at least one anomaly notification to be issued to the user.
Dhineshkumar Pachamuthu, Abdul Nafeez Mohammad, Vivek Mathew, Sara Bonefas
Filed: 21 Jan 22
Utility
Configurable Deployment of Data Science Models
20 Jul 23
An example computing platform is configured to (a) cause a client device associated with a user to display an interface for deploying a new data science model, where the interface presents the user with a list of deployment templates, and where each of the deployment templates includes data specifying (i) a respective executable model package and (ii) a respective set of execution instructions for the respective executable model package, (b) receive, from the client device, data indicating (i) a user selection of a given deployment template for use in deploying the new data science model and (ii) a given set of configuration parameters for use in deploying the new data science model, and (c) use the given executable model package, the given set of execution instructions, and the given set of configuration parameters to deploy the new data science model.
Prasad Paravatha, Vivek Mathew, Divya Gone
Filed: 14 Jan 22
Utility
Configurable Deployment of Data Science Environments
20 Jul 23
An example computing platform is configured to (i) cause a client device to display an interface for deploying a new data science environment, where the interface presents (a) a list of data science applications and (b) a set of user-defined configuration parameters, (ii) receive, from the client device, data indicating (a) a user selection of a given data science application from the list and (b) a user selection of one or more user-defined configuration parameters from the set, (iii) based on the user selection of the given data science application, determine a deployment template for use in deploying the new data science environment, the deployment template specifying (a) an executable environment package and (b) a set of predefined configuration parameters, and (iv) use the given executable environment package, the set of predefined configuration parameters, and the one or more user-defined configuration parameters to deploy the new data science environment.
Prasad Paravatha, Abdul Nafeez Mohammad
Filed: 20 Jan 22
Utility
Computer Systems and Methods for Creating and Executing User-customized Workflows Related to Financial Accounts
13 Jul 23
A computing platform may be installed with software technology for creating and executing user-customized workflows that configures the computing platform to: (1) cause a client station to present an interface for building a workflow, (2) receive data defining a given workflow that comprises (i) a user-defined set of information and (ii) a user-defined rule comprising (a) at least one condition and (b) at least one action that is to be carried out when the at least one condition is satisfied, (2) store the given workflow, (3) begin to execute the given workflow by iteratively: (i) obtaining a given snapshot of the user-defined set of information and (ii) applying the user-defined rule to the given snapshot to determine if the at least one condition is satisfied, and (4) when the at least one condition is satisfied, cause the at least one action to be carried out.
Rashim Parmar, Santosh Reddy Kesireddy, Jasleen Bedi, Antonio Gomez
Filed: 13 Jan 22
Utility
Computer Systems and Methods for Creating and Executing User-customized Workflows Related to Financial Accounts
13 Jul 23
A computing platform may be installed with software technology for creating and executing user-customized workflows that configures the computing platform to: (1) cause a client station to present an interface for building a workflow, (2) receive data defining a given workflow that comprises (i) a user-defined set of information and (ii) a user-defined rule comprising (a) at least one condition and (b) at least one action that is to be carried out when the at least one condition is satisfied, (2) store the given workflow, (3) begin to execute the given workflow by iteratively: (i) obtaining a given snapshot of the user-defined set of information and (ii) applying the user-defined rule to the given snapshot to determine if the at least one condition is satisfied, and (4) when the at least one condition is satisfied, cause the at least one action to be carried out.
Rashim Parmar, Santosh Reddy Kesireddy, Jasleen Bedi, Antonio Gomez
Filed: 13 Jan 22
Utility
Building and Executing Deep Learning-based Data Pipelines
6 Jul 23
An example computing platform is configured to receive configuration data that defines a pipeline for building a deep learning model, the configuration data including data defining an input dataset, data type assignments for a set of input data variables included within the dataset, data transformations that are to be applied to the dataset, and a machine learning process that is to be utilized to train the deep learning model.
Kenrick Fernandes, Ryan Franks, Arjun Ravi Kannan
Filed: 31 Dec 21
Utility
Multi-token Provisioning, Online Purchase Transaction Processing, and Card Life Cycle Management Systems and Methods
29 Jun 23
An example method for provisioning tokens in a networked computing environment including merchants participating in payment networks involves (1) receiving a request to provide a merchant with a secondary token for a purchase card having an associated primary account number (PAN), wherein the secondary token (i) is associated with a secondary payment network and is to serve as an alternative to a primary token for the purchase card that is associated with a primary payment network, and (ii) comprises a computer-generated identifier of the purchase card that is available for use in place of the PAN when processing network-based financial transactions involving the purchase card, (2) generating the secondary token for the purchase card, and (3) transmitting the secondary token for the purchase card, wherein the secondary token for the purchase card is thereafter utilized by the merchant to process one or more network-based financial transactions involving the purchase card.
Bryan L. Manka, George Danforth
Filed: 24 Feb 23
Utility
Multi-token Provisioning, Online Purchase Transaction Processing, and Card Life Cycle Management Systems and Methods
11 May 23
An example method for provisioning tokens in a networked computing environment including merchants participating in payment networks involves (1) for a purchase card having an associated primary account number (PAN), (i) transmitting a first request for a primary token comprising a first computer-generated identifier of the purchase card that is available for use in place of the PAN when processing network-based financial transactions involving the purchase card and (ii) transmitting a second request for a secondary token comprising a second computer-generated identifier of the purchase card that is available for use in place of the PAN when processing network-based financial transactions involving the purchase card, (2) receiving and storing at least the requested secondary token for the purchase card; (3) receiving a request to initiate a given network-based financial transaction, and (4) transmitting an authorization request for the given network-based financial transaction that includes the secondary token.
Bryan L. Manka, George Danforth
Filed: 2 Jan 23
Utility
Multi-token Provisioning, Online Purchase Transaction Processing, and Card Life Cycle Management Systems and Methods
11 May 23
An example method for provisioning tokens in a networked computing environment including merchants participating in payment networks involves (1) obtaining a first token for a purchase card with an associated primary account number (PAN), the first token comprising a first identifier available for use in place of the PAN when processing network-based financial transactions involving the purchase card, (2) storing the first token, (3) obtaining a second token for the purchase card comprising a second identifier available for use in place of the PAN when processing network-based financial transactions involving the purchase card, (4) storing the second token, (5) selecting one of the stored first token or the stored second token to use for a given network-based financial transaction involving the purchase card; and (6) transmitting an authorization request for the given network-based financial transaction that includes the selected one of the stored first or second tokens.
Bryan L. Manka, George Danforth
Filed: 2 Jan 23
Utility
Multi-token provisioning, online purchase transaction processing, and card life cycle management systems and methods
3 Jan 23
Systems, methods, and software are disclosed for provisioning tokens in a networked computing environment including merchants participating in payment networks.
Bryan L. Manka, George Danforth
Filed: 26 Apr 19
Utility
Computing System and Method for Creating a Data Science Model Having Reduced Bias
29 Dec 22
A computing platform may be configured to (i) train an initial model object for a data science model using a machine learning process, (ii) determine that the initial model object exhibits a threshold level of bias, and (iii) thereafter produce an updated version of the initial model object having mitigated bias by (a) identifying a subset of the initial model object's set of input variables that are to be replaced by transformations, (b) producing a post-processed model object by replacing each respective input variable in the identified subset with a respective transformation of the respective input variable that has one or more unknown parameters, (c) producing a parameterized family of the post-processed model object, and (d) selecting, from the parameterized family of the post-processed model object, one given version of the post-processed model object to use as the updated version of the initial model object for the data science model.
Alexey Miroshnikov, Konstandinos Kotsiopoulos, Arjun Ravi Kannan, Raghu Kulkarni, Steven Dickerson, Ryan Franks
Filed: 31 Aug 22
Utility
System and Method for Mitigating Bias In Classification Scores Generated by Machine Learning Models
9 Dec 21
A method, system, and computer-readable medium are disclosed for detecting and mitigating bias in a trained machine learning model.
Alexey Miroshnikov, Kostandinos Kotsiopoulos, Arjun Ravi Kannan, Raghu Kulkarni, Steven Dickerson
Filed: 3 Jun 20
Utility
System and Method for Utilizing Grouped Partial Dependence Plots and Game-theoretic Concepts and Their Extensions In the Generation of Adverse Action Reason Codes
9 Dec 21
A framework for interpreting machine learning models is proposed that utilizes interpretability methods to determine the contribution of groups of input variables to the output of the model.
Alexey Miroshnikov, Konstandinos Kotsiopoulos, Arjun Ravi Kannan, Raghu Kulkarni, Steven Dickerson
Filed: 17 May 21
Utility
System and Method for Utilizing Grouped Partial Dependence Plots and Shapley Additive Explanations In the Generation of Adverse Action Reason Codes
11 Nov 21
A framework for interpreting machine learning models is proposed that utilizes interpretability methods to determine the contribution of groups of input variables to the output of the model.
Alexey Miroshnikov, Kostas Kotsiopoulos, Arjun Ravi Kannan, Raghu Kulkarni, Steven Dickerson
Filed: 6 May 20