108 patents
Utility
Network Security Techniques Comparing Observed Distributions to Baseline Distributions
18 Jan 24
A method described herein involves various operations directed toward network security.
Matthew Lewis JONES
Filed: 27 Sep 23
Utility
Techniques for Clickstream Tracking Across Browser Tabs
11 Jan 24
System and methods track events associated with web browser activity along with corresponding browser tab identifiers.
Arthur Jacob PUTNAM, Nathan Daniel MONNIG
Filed: 10 Nov 21
Utility
Facilitating Entity Resolution, Keying, and Search Match without Transmitting Personally Identifiable Information In the Clear
4 Jan 24
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean JONES, Marek Ludomir CYZIO, Amy Michelle WORRELL
Filed: 18 Sep 23
Utility
Explainable Machine-learning Modeling Using Wavelet Predictor Variable Data
4 Jan 24
A host computing system determines a wavelet transform that represents time-series values of predictor data samples.
Jeffery DUGGER, Terry WOODFORD, Howard H. Hamilton, Michael MCBURNETT, Stephen MILLER
Filed: 11 Nov 21
Utility
Constructing Executable Program Code Based on Sequence Codes
28 Dec 23
Methods described herein generate executable program code based on sequence codes, such that the executable program code is executable by a computer processor.
Jih-Shiang CHERN, Bo YAN
Filed: 22 Nov 21
Utility
Verification of Access to Secured Electronic Resources
23 Nov 23
Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources.
Kenneth ALLEN
Filed: 3 Aug 23
Utility
Machine-learning System for Servicing Queries for Digital Content
16 Nov 23
In some aspects, a content-extraction system can receive a query from a client device and generate a result set of digital content responsive to the query.
Steven HICKLIN, Noushin Rezapour ASHEGHI
Filed: 26 Jul 23
Utility
Multi-stage Machine-learning Techniques for Risk Assessment
26 Oct 23
Certain embodiments involve providing explainable risk assessment via multi-stage machine-learning techniques.
Yuvaraj SANKARAN, Benjamin OBANDO, Danilo BUSTOS
Filed: 24 Apr 23
Utility
Updating Attribute Data Structures to Indicate Trends In Attribute Data Provided to Automated Modelling Systems
12 Oct 23
Certain aspects involve updating data structures to indicate relationships between attribute trends and response variables used for training automated modeling systems.
Jeffrey Q. OUYANG, Vickey CHANG, Rupesh PATEL, Trevis J. LITHERLAND
Filed: 14 Jun 23
Utility
Device-agnostic Access Control Techniques
5 Oct 23
A system can efficiently control access to an interactive computing environment.
Dilip SINGH, Gary KELLER, Robert BEATTY, Sriram TIRUNELLAYI
Filed: 29 Mar 22
Utility
Machine-learning Techniques for Factor-level Monotonic Neural Networks
21 Sep 23
In some aspects, a computing system can generate and optimize a neural network for risk assessment.
Matthew TURNER, Stephen MILLER
Filed: 14 Jul 21
Utility
Techniques for Identity Data Characterization for Data Protection
14 Sep 23
Certain aspects involve a system, computer-implemented method, and computer-readable medium for identifying attributes associated with a target entity such as a person.
Nathan Daniel MONNIG, Joshua Michael JOHNSTON
Filed: 29 Jul 21
Utility
Machine-learning Techniques for Detection of Unauthorized Access of Interactive Computing Environment Functions
7 Sep 23
An online security analysis system determines a categorical value in an online activity and also determines conversion factors that are associated with the categorical value.
Joshua Michael JOHNSTON
Filed: 4 Aug 21
Utility
Data Access Control System Accessible from Third-party Web
17 Aug 23
In some aspects, a gateway server can unlock or unfreeze access to data about a user by third parties without requiring the user to navigate completely away from a third-party website through which the user is executing an electronic transaction.
Rajan GUPTA, Justin WHITEHEAD, Josh HANSON
Filed: 21 Apr 23
Utility
Universal Digital Identity Authentication Service
10 Aug 23
The present disclosure involves systems and methods for identity authentication across multiple institutions using a trusted mobile device as a proxy for a user login.
Richard Huffman, Richard Michaelson, Ravindra Bijlani, Shriram Salem, Rob Harris, Vivian Van Zyl, Helcio Cano, Gaurav R. Khanna, Esther Pigg, Marty Romain
Filed: 10 Apr 23
Utility
Techniques for Efficient Network Security for a Web Server Using Anomaly Detection
10 Aug 23
A method described herein involves various operations directed toward network security.
Joshua Michael JOHNSTON, Matthew Lewis JONES, Nathan Daniel MONNIG, Divyanshu Rohit MURLI
Filed: 17 Apr 23
Utility
Graph-based Techniques for Detecting Synthetic Online Identities
3 Aug 23
In some aspects, a computing system is configured to use graph-based techniques to detect synthetic identities.
Cuizhen SHEN, Arun RANGANATHAN, Rong LIU, Nian YAN, John RAY, Sriram TIRUNELLAYI
Filed: 7 Apr 23
Utility
Confirming Authenticity of a User to a Third-party System
27 Jul 23
A telecommunications network server system provides a digital identifier to a user device.
Helcio Cano, Rich Huffman, Ravindra Bijlani, Richard Michaelson, Rob Harris, Vivian Van Zyl, Esther Pigg, Marty Romain
Filed: 30 Mar 23
Utility
Proof-of-work Techniques for Validating Online Activities
20 Jul 23
Systems and methods for validating online activities through proof-of-work techniques are provided.
Christopher John GALLI, James Gregory DAVIS, Arthur Jacob PUTNAM
Filed: 21 Jul 21
Utility
Production-ready Attributes Creation and Management for Software Development
6 Jul 23
In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language.
Yuvaraj SANKARAN, Felipe Ernesto CASTILLO CARVAJAL, Carlos Augusto PINZON PINTO, Gerardo Jorge VILLARROEL GONZALEZ, Pablo Andres MARTINEZ CASTRO
Filed: 14 Mar 23