309 patents
Page 2 of 16
Utility
Decentralized Application Authentication
30 Nov 23
Disclosed are various embodiments for authenticating users of applications using decentralized data models for storing a user's identity.
Andras L. Ferenczi
Filed: 1 Aug 23
Utility
Non-fungible Token Authentication
23 Nov 23
Disclosed are various embodiments for authenticating a user using non-fungible tokens (NFTs).
Andras L. Ferenczi
Filed: 24 Jul 23
Utility
Enhancing Api Access Controls with Markov Chains and Hidden Markov Models
23 Nov 23
Disclosed are various approaches for using Markov chains and hidden Markov Models to enhance API access controls for secure data.
Hiranmayi Palanki
Filed: 20 May 22
Utility
Virtualized Transaction Instruments Using Processing Aliases
23 Nov 23
Disclosed are various embodiments for virtualizing transaction instruments using processing aliases.
Juan Figuera, Yinxuan Liu
Filed: 23 May 22
Utility
Customer behavior predictive modeling
21 Nov 23
A system that enables development and execution of predictive models comprises a centralized data management system, a data extraction tool a model validation tool and a model execution tool.
Narasimha Murthy, Mickey S. Oralevich, Sandeep Sacheti, Deep Thomas
Filed: 4 Oct 18
Utility
Systems and Methods for Distributing Advertisements
16 Nov 23
Systems and methods for distributing social media posts from social media operators is described.
Jonathan J. Carroll, Hans-Jurgen Greiner, Padmaja Kodavanti, Gopinath Kondapally, Kevin H. Ringger, James Jerome Smart-Foster, Arun Swamy
Filed: 24 Jul 23
Utility
Secure Mobile Checkout System
16 Nov 23
Systems and methods for secure mobile checkouts are disclosed.
Adam Forrest COVERSTONE, August John HORVATH, Sai Prajnay MITTA, Jyothi MOHAN, Veerababu MOTAMARRI, Subhani PATTHAN, Marko RODRIGUEZ, Jared Hale TRINKLER, Yan YANG
Filed: 22 Jun 23
Utility
Computer-based systems for management of big data development platforms based on machine learning techniques and methods of use thereof
14 Nov 23
At least some embodiments are directed to a system that receives from an online portal loaded in a computing device, a user request to instantiate a server cluster in a hybrid computer network.
Pratap Singh Rathore, Arindam Chatterjee, Nitish Sharma, Brian Rosenfield, Shourya Roy, Rahul Ghosh, Krishnaprasad Narayanan
Filed: 17 Nov 21
Utility
System and Method for Providing a Micro Registry
9 Nov 23
In various embodiments, a micro registry may be a mobile communication platform that is configured to connect to users and service hosts.
Mike Cahill, Graeme Fordyce, David Yoo
Filed: 4 May 22
Utility
Reward Point Transfers Using Blockchain
2 Nov 23
A reward points transfer method of the present disclosure comprises receiving, by a blockchain node in a blockchain network, an encrypted rewards transfer message from a credit card transaction account issuer system; writing, by the blockchain node, the encrypted rewards transfer message to the blockchain network; initiating, in response to the encrypted rewards transfer message being written to the blockchain network, a transfer of reward points from a first reward loyalty program to a second reward loyalty program, wherein the transferred reward points are subject to being paid back to the first reward loyalty program from the second reward loyalty program; and generating, by the blockchain node, a rewards transfer response message comprising a transfer status, wherein the transfer status indicates a status of the transfer of reward points as being either transfer completed, transfer failed, or transfer pending.
Vasudevan Swamidurai
Filed: 27 Jun 23
Utility
Rigid Transaction Card
2 Nov 23
A transaction card can be manufactured from rigid materials, such as glass, stone, or ceramics.
James Bruce Coleman
Filed: 12 Jul 23
Utility
Programmed Servers with Associated Data Structures to Track and Manage User-related Activity Data
2 Nov 23
At least some embodiments of the present disclosure are directed to an exemplary method comprising transferring, via a batch processing operation, real-time user-related activity data of a user from a cache memory storage of a transaction account issuer into a datastore of the transaction account issuer; retrieving additional real-time user-related activity data from the cache memory storage of the transaction account issuer; determining that the additional real-time user-related activity data specifies an event corresponding to a first fixed activity plan agreed to by the user after the batch processing operation; decreasing a maximum limit on a number allowance for the fixed activity plans based at least in part on the event specified in the additional real-time user-related activity data; and determining that the user is eligible for a second fixed activity plan under the decreased maximum limit on the number allowance.
James N. Berry, Jeffrey A. Chwast, Arvind Dua, Philip B. Hayden, Jahanzeb Jabbar, Sireesh B. Kilaru, Michael L. Sanabria, Jr.
Filed: 3 Jul 23
Utility
Bot factory environment
31 Oct 23
A system for a bot factory environment is disclosed.
Baranidharan Chinnasamy, Manjunath Devadi, Chandler Helmuth, Mitchell Kurman, Vijayakumar Sitha Mohan, Saurabh Pathak, Florian Popescu
Filed: 29 Jan 19
Utility
Peer-to-peer Confidential Document Exchange
26 Oct 23
Systems and methods for peer-to-peer secure document exchange are disclosed.
Jitendra S. DIKHIT, Alaric EBY, Andras L. FERENCZI, Ashish KUMAR
Filed: 27 Jun 23
Utility
Leakage Detection System
26 Oct 23
The present disclosure include an exemplary method comprising receiving a transaction history comprising transaction information associated with a plurality of transactions for an entity, wherein the transaction information involves transactions completed between employees of the entity and one or more merchants; detecting, using a machine learning algorithm, one or more leakage events associated with a transaction, the one or more leakage events comprising a first leakage event, wherein the first leakage event indicates a non-compliance of a spending rule of the entity by a participant in the transaction, wherein the one or more detected leakage events are analyzed as inputs to improve performance of the machine learning algorithm using unsupervised machine learning; and performing an analysis of a compliance level of the entity based on performing the detection of the one or more leakage events for the plurality of transactions.
Ravi Bajpai, Shashank Chauhan, Srikanth Reddy Dorla, Tushar Gupta, Vishal Jain, Khushboo Kumar, Harmeet Sachdeva, Tarun Sehgal, Anshul Sharma, Sonal Surana, Dipti Verma
Filed: 3 Jul 23
Utility
Computer-based systems having computer engines and data structures configured for machine learning data insight prediction and methods of use thereof
24 Oct 23
At least some embodiments are directed to an insights inference system that produces multiple insights associated with an entity.
Varun Agarwal, Krishnaprasad Narayanan, Rahul Ghosh, Swetha P. Srinivasan, Anshul Jain, Bobby Chetal, Ashni Jauhary
Filed: 5 Dec 19
Utility
System and method for providing a micro registry
24 Oct 23
In various embodiments, a micro registry may be a mobile communication platform that is configured to connect to users and service hosts.
Mike Cahill, Graeme Fordyce, David Yoo
Filed: 4 May 22
Utility
Distributed Ledger Based Machine-learning Model Management
19 Oct 23
Disclosed are various approaches for managing the status of machine-learning models using distributed ledgers.
Rares Ioan Almasan, Andras L. Ferenczi, Mohammad N. Nauman, Swatee Singh, Man Chon U
Filed: 27 Jun 23
Utility
Converting a Language Type of a Query
19 Oct 23
The present disclosure involves detecting a first language type of a query configured to access a column in a data table, wherein the query is requested by a user; converting, by the computing device, the query from the first language type to a second language type that conforms with the data storage format of the data table; after converting the query to the second language type, generating, by the computing device, a temporary table including the column and enforcing an access permission by formatting the temporary table to support the second language type and excluding a row from the temporary table for which the user does not have access rights; and executing, by the computing device, the query against the temporary table to generate a query result.
Shubham Arora, Balaji Balaraman, Sandeep Bose, Arindam Chatterjee, Sastry Durvasula, Manoj Kumar Rana, Nitish Sharma
Filed: 22 Jun 23
Utility
Decentralized Messaging Inbox
19 Oct 23
Disclosed are various embodiments for implementing a decentralized messaging system that allows users to exchange messages via an inbox maintained through a distributed ledger.
Alaric M. Eby, Andras L. Ferenczi
Filed: 21 Jun 23