182 patents
Page 2 of 10
Utility
Machine-learning Techniques for Detection of Unauthorized Access of Interactive Computing Environment Functions
7 Sep 23
An online security analysis system determines a categorical value in an online activity and also determines conversion factors that are associated with the categorical value.
Joshua Michael JOHNSTON
Filed: 4 Aug 21
Utility
Machine-learning system for servicing queries for digital content
5 Sep 23
In some aspects, a content-extraction system can receive a query from a client device and generate a result set of digital content responsive to the query.
Steven Hicklin, Noushin Rezapour Asheghi
Filed: 18 Jun 18
Utility
Optimizing automated modeling algorithms for risk assessment and generation of explanatory data
22 Aug 23
Certain aspects involve optimizing neural networks or other models for assessing risks and generating explanatory data regarding predictor variables used in the model.
Matthew Turner, Michael McBurnett, Yafei Zhang
Filed: 2 Dec 19
Utility
Data Access Control System Accessible from Third-party Web
17 Aug 23
In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction.
Rajan GUPTA, Justin WHITEHEAD, Josh HANSON
Filed: 21 Apr 23
Utility
Universal Digital Identity Authentication Service
10 Aug 23
The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login.
Richard Huffman, Richard Michaelson, Ravindra Bijlani, Shriram Salem, Rob Harris, Vivian Van Zyl, Helcio Cano, Gaurav R. Khanna, Esther Pigg, Marty Romain
Filed: 10 Apr 23
Utility
Techniques for Efficient Network Security for a Web Server Using Anomaly Detection
10 Aug 23
A method described herein involves various operations directed toward network security.
Joshua Michael JOHNSTON, Matthew Lewis JONES, Nathan Daniel MONNIG, Divyanshu Rohit MURLI
Filed: 17 Apr 23
Utility
Graph-based Techniques for Detecting Synthetic Online Identities
3 Aug 23
In some aspects, a computing system is configured to use graph-based techniques to detect synthetic identities.
Cuizhen SHEN, Arun RANGANATHAN, Rong LIU, Nian YAN, John RAY, Sriram TIRUNELLAYI
Filed: 7 Apr 23
Utility
Updating attribute data structures to indicate trends in attribute data provided to automated modeling systems
1 Aug 23
Certain aspects involve updating data structures to indicate relationships between attribute trends and response variables used for training automated modeling systems.
Jeffrey Q. Ouyang, Vickey Chang, Rupesh Patel, Trevis J. Litherland
Filed: 21 Sep 16
Utility
Confirming Authenticity of a User to a Third-party System
27 Jul 23
A telecommunications network server system provides a digital identifier to a user device.
Helcio Cano, Rich Huffman, Ravindra Bijlani, Richard Michaelson, Rob Harris, Vivian Van Zyl, Esther Pigg, Marty Romain
Filed: 30 Mar 23
Utility
Proof-of-work Techniques for Validating Online Activities
20 Jul 23
Systems and methods for validating online activities through proof-of-work techniques are provided.
Christopher John GALLI, James Gregory DAVIS, Arthur Jacob PUTNAM
Filed: 21 Jul 21
Utility
Production-ready Attributes Creation and Management for Software Development
6 Jul 23
In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language.
Yuvaraj SANKARAN, Felipe Ernesto CASTILLO CARVAJAL, Carlos Augusto PINZON PINTO, Gerardo Jorge VILLARROEL GONZALEZ, Pablo Andres MARTINEZ CASTRO
Filed: 14 Mar 23
Utility
Techniques for Evaluating an Effect of Changes to Machine Learning Models
6 Jul 23
An auditing system executes a first machine learning model on a first computing platform using input data to generate first output data.
Royce ALFRED, Fan YIN
Filed: 29 Dec 22
Utility
Exponentially Smoothed Categorical Encoding to Control Access to a Network Resource
6 Jul 23
In an example of a method described herein, historical events occurring over a network are detected, and at least one of the historical events is associated with an observed value of a categorical variable.
Nathan Daniel MONNIG, Andrew Nader RAFLA, Samuel Ward SCHRADER
Filed: 31 Dec 21
Utility
Building segment-specific executable program code for modeling outputs
4 Jul 23
Certain aspects involve building segment-specific executable program code.
Peter Oburu, Martin O'Connor, Thomas Aliff
Filed: 7 Jun 21
Utility
Machine-learning Techniques for Risk Assessment Based on Multiple Data Sources
29 Jun 23
Systems and methods for using machine-learning techniques to provide risk assessment based on multiple sources of data are described herein.
David GJORVAD, Michael PECEN, Jonathan FENSTERMAKER, Oyenola Ogunyemi-Craig, Deepaa SUNDARAM
Filed: 23 Dec 22
Utility
Machine-learning Techniques for Risk Assessment Based on Clustering
25 May 23
Systems and methods for predicting future risk for a target entity are provided.
Piyush PATEL, Rajkumar BONDUGULA
Filed: 18 Nov 22
Utility
Techniques for efficient network security for a web server using anomaly detection
23 May 23
A method described herein involves various operations directed toward network security.
Joshua Michael Johnston, Matthew Lewis Jones, Nathan Daniel Monnig, Divyanshu Rohit Murli
Filed: 14 Jul 21
Utility
Bayesian Modeling for Risk Assessment Based on Integrating Information from Dynamic Data Sources
18 May 23
Bayesian modeling can be used for risk assessment.
Prakash SHRESTHA, Rajkumar BONDUGULA
Filed: 15 Nov 21
Utility
Data access control system accessible from third-party web server
16 May 23
In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction.
Rajan Gupta, Justin Whitehead, Josh Hanson
Filed: 22 Jan 19
Utility
Universal digital identity authentication service
16 May 23
The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login.
Richard Huffman, Richard Michaelson, Ravindra Bijlani, Shriram Salem, Rob Harris, Vivian Van Zyl, Helcio Cano, Gaurav R. Khanna, Esther Pigg, Marty Romain
Filed: 9 Jul 21