182 patents
Page 4 of 10
Utility
Continuous Risk Assessment of Individual Elements of a System
8 Dec 22
Systems and methods for continuously assessing risks associated with individual elements or entities of a system are provided.
Thomas Alan LATIMER, Michael Shawn DOOLEY, Michael John REITH, Michael Dale MCBURNETT
Filed: 7 Jun 21
Utility
Evaluation of modeling algorithms with continuous outputs
6 Dec 22
Certain aspects involve evaluating modeling algorithms whose outputs can impact machine-implemented operating environments.
Lefei Liu, Peter Liu, Jiawei Liu, Peter Gao, Vickey Chang
Filed: 31 Oct 19
Utility
Techniques for Efficient Network Security for a Web Server Using Anomaly Detection
24 Nov 22
A method described herein involves various operations directed toward network security.
Joshua Michael JOHNSTON, Matthew Lewis JONES, Nathan Daniel MONNIG, Divyanshu Rohit MURLI
Filed: 14 Jul 21
Utility
Interactive model performance monitoring
22 Nov 22
Certain aspects involve providing automated performance monitoring of statistical models.
Zhenyu Wang, Vickey Chang, Jeffrey Feng
Filed: 15 Aug 17
Utility
Detecting Synthetic Online Entities Facilitated by Primary Entities
17 Nov 22
In some aspects, a computing system can generate entity links between a primary entity object identifying a primary entity for multiple accounts and secondary entity objects identifying secondary entities from the accounts.
Chris BROWN, Rakesh PATEL, John MULLINAX, Troy COLE, Julio FARACH, Lee GRICE, Patrick WADKINS, Erik STRONG, Cordell BOYNES
Filed: 22 Jul 22
Utility
Model integration tool
8 Nov 22
Certain aspects involve models for generating code executed on data-processing platforms.
Rajesh Indurthivenkata, Lalithadevi Venkataramani, Aparna Somaka, Xingjun Zhang, Matthew Turner, Bhawana Koshyari, Vijay Nagarajan, James Reid, Nandita Thakur
Filed: 2 Feb 21
Utility
Managing Verification Repositories to Facilitate Real-time Servicing of Verification Queries
3 Nov 22
In some aspects, a verification exchange system transforms consumer data (e.g., employment or income data) from different contributor computing systems to a standardized format and stores this standardized data in a consumer-status verification repository.
Eric BLOOMQUIST, Chad WHITTENBERG, Martin BERTOLINO
Filed: 19 Jul 22
Utility
Generating and processing obfuscated sensitive information
1 Nov 22
In some aspects, a computing system can receive a request for a processing operation that involves a query.
Lester Anthony Pieniazek, Stephen Leitner, Steven Hicklin
Filed: 28 Nov 17
Utility
Controlling access to secured data via timed filtering of data
1 Nov 22
According to certain implementations, an access control system controls access to secured data that is stored on a secured source.
Rajkumar Bondugula, Christopher Yasko
Filed: 16 May 19
Utility
Third-party Access-control Support Using Role History Analysis
27 Oct 22
Various aspects of the present disclosure involve computing environments that provide third-party access-control support.
John ALDEN, Janice JOHNSON, Jeffrey WAGNER
Filed: 30 Sep 20
Utility
Automated Path-based Recommendation for Risk Mitigation
20 Oct 22
Systems and methods for automated path-based recommendation for risk mitigation are provided.
Stephen MILLER, Lewis JORDAN, Matthew TURNER, Mark DAY, Allan JOSHUA
Filed: 19 Aug 20
Utility
Clustering techniques for machine learning models
18 Oct 22
In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided.
Rajkumar Bondugula, Piyush Patel
Filed: 15 May 20
Utility
Secure Resource Management to Prevent Resource Abuse
13 Oct 22
Systems and methods for secure resource management are provided.
Ligaj PRADHAN, Piyush PATEL, Rajkumar BONDUGULA
Filed: 3 Sep 20
Utility
Data protection via aggregation-based obfuscation
11 Oct 22
In some aspects, a computing system can obfuscate sensitive data based on data aggregation.
Rongrong Dong, Michael McBurnett, Nikhil Paradkar
Filed: 28 Oct 18
Utility
Machine-learning techniques for monotonic neural networks
11 Oct 22
In some aspects, a computing system can generate and optimize a neural network for risk assessment.
Matthew Turner, Lewis Jordan, Allan Joshua
Filed: 24 Oct 18
Utility
Techniques for Prediction Models Using Time Series Data
6 Oct 22
Various aspects involve a lagged prediction model trained for risk assessment or other purposes.
Xiao HUANG, Yan WANG
Filed: 31 Mar 21
Utility
Location-based detection of unauthorized use of interactive computing environment functions
4 Oct 22
In some aspects, a computing system can obtain, via a first communication channel with a host server, a data network identifier that identifies a mobile device accessing an interactive computing environment provide by a host server.
Hrishi Talwar, Prasad Shetty
Filed: 13 Apr 18
Utility
Dual deep learning architecture for machine-learning systems
4 Oct 22
Certain aspects involve a machine-learning query system that uses a dual deep learning network to service queries and other requests.
Ying Xie, Linh Le
Filed: 25 Sep 18
Utility
Continuous and anonymous risk evaluation
27 Sep 22
Techniques for risk evaluation include receiving, from a requesting entity, a request for monitoring target entities specifying a first identifier associated with each target entity and target entity information.
Michael McBurnett, Michael Reith, Terry Woodford, Patricia Bassetti, Abhinav Sinha
Filed: 20 Apr 20
Utility
Embedded third-party application programming interface to prevent transmission of sensitive data
20 Sep 22
Aspects and examples are disclosed for improving security of authentication elements for validating a user of a user device.
Hrishi Talwar
Filed: 13 Dec 18