108 patents
Page 3 of 6
Utility
Continuous Risk Assessment of Individual Elements of a System
8 Dec 22
Systems and methods for continuously assessing risks associated with individual elements or entities of a system are provided.
Thomas Alan LATIMER, Michael Shawn DOOLEY, Michael John REITH, Michael Dale MCBURNETT
Filed: 7 Jun 21
Utility
Techniques for Efficient Network Security for a Web Server Using Anomaly Detection
24 Nov 22
A method described herein involves various operations directed toward network security.
Joshua Michael JOHNSTON, Matthew Lewis JONES, Nathan Daniel MONNIG, Divyanshu Rohit MURLI
Filed: 14 Jul 21
Utility
Detecting Synthetic Online Entities Facilitated by Primary Entities
17 Nov 22
In some aspects, a computing system can generate entity links between a primary entity object identifying a primary entity for multiple accounts and secondary entity objects identifying secondary entities from the accounts.
Chris BROWN, Rakesh PATEL, John MULLINAX, Troy COLE, Julio FARACH, Lee GRICE, Patrick WADKINS, Erik STRONG, Cordell BOYNES
Filed: 22 Jul 22
Utility
Managing Verification Repositories to Facilitate Real-time Servicing of Verification Queries
3 Nov 22
In some aspects, a verification exchange system transforms consumer data (e.g., employment or income data) from different contributor computing systems to a standardized format and stores this standardized data in a consumer-status verification repository.
Eric BLOOMQUIST, Chad WHITTENBERG, Martin BERTOLINO
Filed: 19 Jul 22
Utility
Third-party Access-control Support Using Role History Analysis
27 Oct 22
Various aspects of the present disclosure involve computing environments that provide third-party access-control support.
John ALDEN, Janice JOHNSON, Jeffrey WAGNER
Filed: 30 Sep 20
Utility
Automated Path-based Recommendation for Risk Mitigation
20 Oct 22
Systems and methods for automated path-based recommendation for risk mitigation are provided.
Stephen MILLER, Lewis JORDAN, Matthew TURNER, Mark DAY, Allan JOSHUA
Filed: 19 Aug 20
Utility
Secure Resource Management to Prevent Resource Abuse
13 Oct 22
Systems and methods for secure resource management are provided.
Ligaj PRADHAN, Piyush PATEL, Rajkumar BONDUGULA
Filed: 3 Sep 20
Utility
Techniques for Prediction Models Using Time Series Data
6 Oct 22
Various aspects involve a lagged prediction model trained for risk assessment or other purposes.
Xiao HUANG, Yan WANG
Filed: 31 Mar 21
Utility
Secure Resource Management to Prevent Fraudulent Resource Access
18 Aug 22
Systems and methods for secure resource management are provided.
Rajkumar BONDUGULA, Michael MCBURNETT
Filed: 9 Jul 20
Utility
Secure Online Access Control to Prevent Identification Information Misuse
28 Jul 22
In some aspects, a computing system can control access of a user computing device to a resource.
Rajkumar BONDUGULA, Piyush PATEL, Samiyuru Geethanjana Senarathne MENIK HITIHAMI MUDIYANSELAGE
Filed: 14 Apr 22
Utility
Data Protection Via Attributes-based Aggregation
14 Jul 22
Systems and methods for obfuscating sensitive data by aggregating the data based on data attributes are provided.
Xinyu MIN, Rupesh Ramanlal PATEL
Filed: 13 May 20
Utility
Machine-learning Techniques for Time-delay Neural Networks
30 Jun 22
Various aspects involve time-delay neural networks for risk assessment or other outcome predictions.
Howard Hugh HAMILTON, Jeffrey Don DUGGER
Filed: 22 Dec 21
Utility
Verifying an Identity Based on Multiple Distributed Data Sources Using a Blockchain to Safeguard the Identity
2 Jun 22
An online identity can be verified based on data from multiple identity sources stored in a blockchain.
Sri KRISHNAMACHARYA, Quang LE, Stan TIGRETT, Russ AYRES
Filed: 17 Feb 22
Utility
Machine-learning Techniques Involving Monotonic Recurrent Neural Networks
12 May 22
Various aspects involve a monotonic recurrent neural network (MRNN) trained for risk assessment or other purposes.
Jonathan BOARDMAN, Xiao HUANG
Filed: 10 Nov 20
Utility
Predicting Data Tampering Using Augmented Machine Learning Models
31 Mar 22
Certain aspects involve using a set of machine learning modeling models for predicting attempts to tamper with records using a fraudulent dispute.
Cuizhen SHEN, Philip MUNGUIA, Prateek AGRAWAL, Ledao CHEN, Sriram TIRUNELLAYI
Filed: 29 Sep 20
Utility
Confirming Authenticity of a User to a Third-party System
3 Mar 22
A telecommunications network server system provides a digital identifier to a user device.
Helcio CANO, Rich HUFFMAN, Ravindra BIJLANI, Richard MICHAELSON, Rob HARRIS, Vivian VAN ZYL, Esther PIGG, Marty ROMAIN
Filed: 10 Nov 21
Utility
Production-ready Attributes Creation and Management for Software Development
3 Mar 22
In some aspects, a computing system can determine a set of attributes based on analyzing input data using attribute templates written in a production-ready programming language.
Yuvaraj SANKARAN, Felipe Ernesto Castillo CARVAJAL, Carlos Augusto PINZON PINTO, Gerardo Jorge VILLARROEL GONZALEZ, Pablo Andres MARTINEZ CASTRO
Filed: 30 Dec 19
Utility
Controlling Access to Secured Data In Multi-system Exchange Environments
17 Feb 22
An exchange processing system may include multiple exchange components that are respectively included in multiple computing systems.
Sri KRISHNAMACHARYA
Filed: 1 Nov 21
Utility
Clustering Techniques for Machine Learning Models
18 Nov 21
In some aspects, systems and methods for efficiently clustering a large-scale dataset for improving the construction and training of machine-learning models, such as neural network models, are provided.
Rajkumar BONDUGULA, Piyush PATEL
Filed: 15 May 20
Utility
Verification of Electronic Identity Components
18 Nov 21
A unit-classification system receives a data set with identity data objects corresponding to personal identity components.
Rajkumar BONDUGULA, Piyushkumar PATEL, Sunit SIVARAJ
Filed: 24 Mar 20