182 patents
Page 5 of 10
Utility
Providing identification information to mobile commerce applications
13 Sep 22
Aspects and examples are disclosed for facilitating mobile commerce.
John Burrell, Sekhar Dochibhotla, Anand Krishnaswamy, Robert Clark Fuller, Todd Duncan Hoover
Filed: 28 Sep 18
Utility
Managing verification repositories to facilitate real-time servicing of verification queries
30 Aug 22
In some aspects, a verification exchange system transforms consumer data (e.g., employment or income data) from different contributor computing systems to a standardized format and stores this standardized data in a consumer-status verification repository.
Eric Bloomquist, Chad Whittenberg, Martin Bertolino
Filed: 28 Apr 17
Utility
Detecting synthetic online entities facilitated by primary entities
30 Aug 22
In some aspects, a computing system can generate entity links between a primary entity object identifying a primary entity for multiple accounts and secondary entity objects identifying secondary entities from the accounts.
Chris Brown, Rakesh Patel, John Mullinax, Troy Cole, Julio Farach, Lee Grice, Patrick Wadkins, Erik Strong, Cordell Boynes
Filed: 29 Jun 18
Utility
Controlling access to multi-granularity data
23 Aug 22
According to certain implementations, a permissions gateway receives an access request indicating multiple sets of secured data that include high-granularity data stored on multiple secured data repositories.
Rajkumar Bondugula, Christopher Yasko
Filed: 24 Sep 19
Utility
Secure Resource Management to Prevent Fraudulent Resource Access
18 Aug 22
Systems and methods for secure resource management are provided.
Rajkumar BONDUGULA, Michael MCBURNETT
Filed: 9 Jul 20
Utility
Data processing systems and methods for efficiently transforming entity descriptors in textual data
16 Aug 22
In some aspects, a computing system can receive, from a client device, a request to perform an analytical operation that involves a query regarding a common entity type.
Piyushkumar Patel, Rajkumar Bondugula
Filed: 6 Nov 17
Utility
Secure Online Access Control to Prevent Identification Information Misuse
28 Jul 22
In some aspects, a computing system can control access of a user computing device to a resource.
Rajkumar BONDUGULA, Piyush PATEL, Samiyuru Geethanjana Senarathne MENIK HITIHAMI MUDIYANSELAGE
Filed: 14 Apr 22
Utility
Data Protection Via Attributes-based Aggregation
14 Jul 22
Systems and methods for obfuscating sensitive data by aggregating the data based on data attributes are provided.
Xinyu MIN, Rupesh Ramanlal PATEL
Filed: 13 May 20
Utility
Machine-learning Techniques for Time-delay Neural Networks
30 Jun 22
Various aspects involve time-delay neural networks for risk assessment or other outcome predictions.
Howard Hugh HAMILTON, Jeffrey Don DUGGER
Filed: 22 Dec 21
Utility
Secure online access control to prevent identification information misuse
7 Jun 22
In some aspects, a computing system can control access of a user computing device to a resource.
Rajkumar Bondugula, Piyush Patel, Samiyuru Geethanjana Senarathne Menik Hitihami Mudiyanselage
Filed: 31 Dec 19
Utility
Verifying an Identity Based on Multiple Distributed Data Sources Using a Blockchain to Safeguard the Identity
2 Jun 22
An online identity can be verified based on data from multiple identity sources stored in a blockchain.
Sri KRISHNAMACHARYA, Quang LE, Stan TIGRETT, Russ AYRES
Filed: 17 Feb 22
Utility
Machine-learning Techniques Involving Monotonic Recurrent Neural Networks
12 May 22
Various aspects involve a monotonic recurrent neural network (MRNN) trained for risk assessment or other purposes.
Jonathan BOARDMAN, Xiao HUANG
Filed: 10 Nov 20
Utility
Facilitating entity resolution via secure entity resolution database
10 May 22
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean Jones, Marek Ludomir Cyzio, Amy Michelle Worrell
Filed: 20 May 20
Utility
Predicting Data Tampering Using Augmented Machine Learning Models
31 Mar 22
Certain aspects involve using a set of machine learning modeling models for predicting attempts to tamper with records using a fraudulent dispute.
Cuizhen SHEN, Philip MUNGUIA, Prateek AGRAWAL, Ledao CHEN, Sriram TIRUNELLAYI
Filed: 29 Sep 20
Utility
Verifying an identity based on multiple distributed data sources using a blockchain to safeguard the identity
29 Mar 22
An online identity can be verified based on data from multiple identity sources stored in a blockchain.
Sri Krishnamacharya, Quang Le, Stan Tigrett, Russ Ayres
Filed: 27 Mar 20
Utility
Confirming Authenticity of a User to a Third-party System
3 Mar 22
A telecommunications network server system provides a digital identifier to a user device.
Helcio CANO, Rich HUFFMAN, Ravindra BIJLANI, Richard MICHAELSON, Rob HARRIS, Vivian VAN ZYL, Esther PIGG, Marty ROMAIN
Filed: 10 Nov 21
Utility
Production-ready Attributes Creation and Management for Software Development
3 Mar 22
In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language.
Yuvaraj SANKARAN, Felipe Ernesto Castillo CARVAJAL, Carlos Augusto PINZON PINTO, Gerardo Jorge VILLARROEL GONZALEZ, Pablo Andres MARTINEZ CASTRO
Filed: 30 Dec 19
Utility
Global matching system
1 Mar 22
A global matching system can include a processing device and a memory device on which instructions can be stored.
Lester Anthony Pieniazek, Stephen Leitner, Steven Hicklin
Filed: 26 Apr 17
Utility
Systems and methods for securing data in electronic communications
22 Feb 22
Certain embodiments involve data security.
Tony Spinelli, David Hannigan, Nick Nedostup
Filed: 22 Aug 19
Utility
Controlling Access to Secured Data In Multi-system Exchange Environments
17 Feb 22
An exchange processing system may include multiple exchange components that are respectively included in multiple computing systems.
Sri KRISHNAMACHARYA
Filed: 1 Nov 21