108 patents
Page 5 of 6
Utility
Embedded Third-party Application Programming Interface to Prevent Transmission of Sensitive Data
16 Dec 20
Aspects and examples are disclosed for improving security of authentication elements for validating a user of a user device.
Hrishi TALWAR
Filed: 12 Dec 18
Utility
Synchronizing Data-entry Fields with Corresponding Image Regions
16 Dec 20
According to certain implementations, a data-entry system synchronizes a region of an image with a data-entry field.
Marcin BANASZAK, Telmo PESTANA, Niall FALLON, Georgia KLONTZA
Filed: 27 Aug 20
Utility
Facilitating Entity Resolution, Keying, and Search Match without Transmitting Personally Identifiable Information In the Clear
9 Dec 20
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean JONES, Marek Ludomir CYZIO, Amy Michelle WORRELL
Filed: 7 Jan 19
Utility
Training Tree-based Machine-learning Modeling Algorithms for Predicting Outputs and Generating Explanatory Data
9 Dec 20
Certain aspects involve training tree-based machine-learning models for computing predicted responses and generating explanatory data for the models.
Lewis JORDAN, Matthew TURNER, Finto ANTONY
Filed: 29 Oct 17
Utility
Verification of Access to Secured Electronic Resources
2 Dec 20
Aspects and examples are disclosed for improving multi-factor authentication techniques to control access to secured electronic resources.
Kenneth ALLEN
Filed: 30 Jan 19
Utility
Building Segment-specific Executable Program Code for Modeling Outputs
25 Nov 20
Certain aspects involve building segment-specific executable program code.
Peter OBURU, Martin O'CONNOR, Thomas ALIFF
Filed: 12 Nov 18
Utility
Facilitating Entity Resolution Via Secure Entity Resolution Database
2 Sep 20
In some aspects, an entity-resolution computing system for entity resolution is provided.
Gregory Dean JONES, Marek Ludomir CYZIO, Amy Michelle WORRELL
Filed: 19 May 20
Utility
Data Processing Systems and Methods for Efficiently Transforming Entity Descriptors In Textual Data
19 Aug 20
In some aspects, a computing system can receive, from a client device, a request to perform an analytical operation that involves a query regarding a common entity type.
Piyushkumar PATEL, Rajkumar BONDUGULA
Filed: 5 Nov 17
Utility
Data Protection Via Aggregation-based Obfuscation
19 Aug 20
In some aspects, a computing system can obfuscate sensitive data based on data aggregation.
Rongrong DONG, Michael MCBURNETT, Nikhil PARADKAR
Filed: 27 Oct 18
Utility
Verifying an Identity Based on Multiple Distributed Data Sources Using a Blockchain to Safeguard the Identity
15 Jul 20
An online identity can be verified based on data from multiple identity sources stored in a blockchain.
Sri KRISHNAMACHARYA, Quang LE, Stan TIGRETT, Russ AYRES
Filed: 26 Mar 20
Utility
Interactive Model Performance Monitoring
8 Jul 20
Certain aspects involve providing automated performance monitoring of statistical models.
Yujun CHEN, Zhenyu WANG, Vickey CHANG, Jeffrey FENG
Filed: 14 Aug 17
Utility
Third-party Authorization Support for Interactive Computing Environment Functions
24 Jun 20
In some aspects, a computing system can obtain, from a host server, a data network identifier that identifies a mobile device involved in an online transaction within an interactive computing environment provided by the host server.
Hrishi TALWAR
Filed: 27 Jun 18
Utility
Synchronizing Data-entry Fields with Corresponding Image Regions
20 May 20
According to certain implementations, a data-entry system synchronizes a region of an image with a data-entry field.
Marcin BANASZAK, Telmo PESTANA, Niall FALLON, Georgia KLONTZA
Filed: 25 Sep 18
Utility
Integrating Sensitive Data from a Data Provider into Instances of Third-party Applications Executed on User Devices
20 May 20
Certain aspects involve facilitating the integration of sensitive data from a data provider into an instance of a web-based, third-party application.
Timothy G. POSCHEL, Ryan PETERSEN, Josh HANSON
Filed: 22 Jan 20
Utility
Detecting Synthetic Online Entities Facilitated by Primary Entities
6 May 20
In some aspects, a computing system can generate entity links between a primary entity object identifying a primary entity for multiple accounts and secondary entity objects identifying secondary entities from the accounts.
Chris BROWN, Rakesh PATEL, John MULLINAX, Troy COLE, Julio FARACH, Lee GRICE, Patrick WADKINS, Erik STRONG, Cordell BOYNES
Filed: 28 Jun 18
Utility
Evaluation of Modeling Algorithms with Continuous Outputs
29 Apr 20
Certain aspects involve evaluating modeling algorithms whose outputs can impact machine-implemented operating environments.
Lefei LIU, Peter LIU, Jiawei LIU, Peter GAO, Vickey CHANG
Filed: 30 Oct 19
Utility
Machine-learning Techniques for Monotonic Neural Networks
29 Apr 20
In some aspects, a computing system can generate and optimize a neural network for risk assessment.
Matthew Turner, Lewis Jordan, Allan Joshua
Filed: 23 Oct 18
Utility
Managing Verification Repositories to Facilitate Real-time Servicing of Verification Queries
29 Apr 20
In some aspects, a verification exchange system transforms consumer data (e.g., employment or income data) from different contributor computing systems to a standardized format and stores this standardized data in a consumer-status verification repository.
Eric BLOOMQUIST, Chad WHITTENBERG, Martin BERTOLINO
Filed: 27 Apr 17
Utility
Optimizing Automated Modeling Algorithms for Risk Assessment and Generation of Explanatory Data
1 Apr 20
Certain aspects involve optimizing neural networks or other models for assessing risks and generating explanatory data regarding predictor variables used in the model.
Matthew TURNER, Michael MCBURNETT, Yafei ZHANG
Filed: 1 Dec 19
Utility
Confirming Authenticity of a User to a Third-party System
18 Mar 20
A telecommunications network server system provides a digital identifier to a user device.
Helcio CANO, Rich HUFFMAN, Ravindra BIJLANI, Richard MICHAELSON, Rob HARRIS, Vivian VAN ZYL, Esther PIGG, Marty ROMAIN
Filed: 4 Jan 18