182 patents
Utility
Network Security Techniques Comparing Observed Distributions to Baseline Distributions
18 Jan 24
A method described herein involves various operations directed toward network security.
Matthew Lewis JONES
Filed: 27 Sep 23
Utility
Secure online access control to prevent identification information misuse
16 Jan 24
In some aspects, a computing system can control access of a user computing device to a resource.
Rajkumar Bondugula, Piyush Patel, Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage
Filed: 14 Apr 22
Utility
Techniques for Clickstream Tracking Across Browser Tabs
11 Jan 24
System and methods track events associated with web browser activity along with corresponding browser tab identifiers.
Arthur Jacob PUTNAM, Nathan Daniel MONNIG
Filed: 10 Nov 21
Utility
Machine-learning techniques for monotonic neural networks
9 Jan 24
In some aspects, a computing system can generate and optimize a neural network for risk assessment.
Matthew Turner, Lewis Jordan, Allan Joshua
Filed: 31 Aug 22
Utility
Facilitating Entity Resolution, Keying, and Search Match without Transmitting Personally Identifiable Information In the Clear
4 Jan 24
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean JONES, Marek Ludomir CYZIO, Amy Michelle WORRELL
Filed: 18 Sep 23
Utility
Explainable Machine-learning Modeling Using Wavelet Predictor Variable Data
4 Jan 24
A host computing system determines a wavelet transform that represents time-series values of predictor data samples.
Jeffery DUGGER, Terry WOODFORD, Howard H. Hamilton, Michael MCBURNETT, Stephen MILLER
Filed: 11 Nov 21
Utility
Constructing Executable Program Code Based on Sequence Codes
28 Dec 23
Methods described herein generate executable program code based on sequence codes, such that the executable program code is executable by a computer processor.
Jih-Shiang CHERN, Bo YAN
Filed: 22 Nov 21
Utility
Verification of Access to Secured Electronic Resources
23 Nov 23
Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources.
Kenneth ALLEN
Filed: 3 Aug 23
Utility
Machine-learning System for Servicing Queries for Digital Content
16 Nov 23
In some aspects, a content-extraction system can receive a query from a client device and generate a result set of digital content responsive to the query.
Steven HICKLIN, Noushin Rezapour ASHEGHI
Filed: 26 Jul 23
Utility
Facilitating queries of encrypted sensitive data via encrypted variant data objects
14 Nov 23
Various aspects of this disclosure provide digital data processing systems for using encrypted variant data objects to facilitate queries of sensitive data.
Yuvaraj Sankaran, Vijay Nagarajan
Filed: 22 Mar 19
Utility
Multi-stage Machine-learning Techniques for Risk Assessment
26 Oct 23
Certain embodiments involve providing explainable risk assessment via multi-stage machine-learning techniques.
Yuvaraj SANKARAN, Benjamin OBANDO, Danilo BUSTOS
Filed: 24 Apr 23
Utility
Updating Attribute Data Structures to Indicate Trends In Attribute Data Provided to Automated Modelling Systems
12 Oct 23
Certain aspects involve updating data structures to indicate relationships between attribute trends and response variables used for training automated modeling systems.
Jeffrey Q. OUYANG, Vickey CHANG, Rupesh PATEL, Trevis J. LITHERLAND
Filed: 14 Jun 23
Utility
Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity
10 Oct 23
An online identity can be verified based on data from multiple identity sources stored in a blockchain.
Sri Krishnamacharya, Quang Le, Stan Tigrett, Russ Ayres
Filed: 17 Feb 22
Utility
Device-agnostic Access Control Techniques
5 Oct 23
A system can efficiently control access to an interactive computing environment.
Dilip SINGH, Gary KELLER, Robert BEATTY, Sriram TIRUNELLAYI
Filed: 29 Mar 22
Utility
Facilitating entity resolution, keying, and search match without transmitting personally identifiable information in the clear
3 Oct 23
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean Jones, Marek Ludomir Cyzio, Amy Michelle Worrell
Filed: 8 Jan 19
Utility
Network security techniques comparing observed distributions to baseline distributions
3 Oct 23
A method described herein involves various operations directed toward network security.
Matthew Lewis Jones
Filed: 29 Jul 21
Utility
Machine-learning Techniques for Factor-level Monotonic Neural Networks
21 Sep 23
In some aspects, a computing system can generate and optimize a neural network for risk assessment.
Matthew TURNER, Stephen MILLER
Filed: 14 Jul 21
Utility
Verification of access to secured electronic resources
19 Sep 23
Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources.
Kenneth Allen
Filed: 31 Jan 19
Utility
Controlling access to secured data in multi-system exchange environments
19 Sep 23
An exchange processing system may include multiple exchange components that are respectively included in multiple computing systems.
Sri Krishnamacharya
Filed: 1 Nov 21
Utility
Techniques for Identity Data Characterization for Data Protection
14 Sep 23
Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person.
Nathan Daniel MONNIG, Joshua Michael JOHNSTON
Filed: 29 Jul 21