In some aspects, the techniques described herein relate to a method including: executing a data structure initialization process, wherein the data structure initialization process takes a real-valued array as input and creates a bag data structure for each vector in a set of vectors, and wherein the bag data structure for each vector in a set of vectors includes an index array and a probability array; providing, as input to a primary maximum inner product search process, the set of vectors, a stream of vectors, and the bag data structure for each of the vectors in the set; and determining, by a secondary maximum inner product search process for each vector in the stream of vectors, an index of the set of vectors such that the index has a maximum inner product with the vector from the stream of vectors.
A computing apparatus configured to implement travel control for a carriage of an automated cable runner (ACR) along the pathway of the ACR from a desired start point to a desired end point to deploy cabling into the tray from the start point to the end point, the computing apparatus includes a processor; a memory; and a communication interface coupled to each of the processor and the memory. The processor is configured to: receive a cabling deployment job request; and instruct a carriage with a cabling connected thereto via a cable holder to travel along the pathway from the start point to the end point to deploy the cabling in the tray to fulfill the cabling deployment job request.
H02G 1/08 - Methods or apparatus specially adapted for installing, maintaining, repairing, or dismantling electric cables or lines for laying cables, e.g. laying apparatus on vehicle through tubing or conduit, e.g. rod or draw wire for pushing or pulling
H02G 3/04 - Protective tubing or conduits, e.g. cable ladders or cable troughs
3.
SYSTEMS AND METHODS FOR DETERMINING CAUSAL RELATIONSHIPS AMONG NETWORK ALARMS
In some aspects, the techniques described herein relate to a method including: receiving, at an alarm management service, a plurality of alarms, wherein each of the plurality of alarms includes respective alarm data; clustering the plurality of alarms into an alarm cluster group; generating a plurality of binary time sequences, wherein each of the plurality of binary time sequences corresponds to one of the plurality of alarms; generating an initial alarm graph based on the alarm cluster group and the plurality of binary time sequences; providing, as input to a causal inference process, the initial alarm graph and the plurality of binary time sequences; and generating, by the causal inference process, a causal alarm graph, wherein the causal alarm graph is a partially connected and directed graph.
H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
4.
SYSTEMS AND METHODS FOR MACHINE LEARNING-BASED DATA MATCHING AND RECONCILIATION OF INFORMATION
A method for machine learning-based data matching and reconciliation may include: ingesting a plurality of records from a plurality of data sources; identifying company associated with each of the plurality of records; assigning a unique identifier to each uniquely identified company; matching each of the records to one of the uniquely identified companies using a trained company matching machine learning engine; identifying a primary company record in the matching records and associating other matching records with the primary company record; matching each of the records to a contact using a trained contact matching machine learning engine; identifying a primary contact record in the matching records and associating other matching records with the primary contact record; synchronizing the plurality of records in a graph database using the unique identifier; receiving feedback on the matching companies and/or matching contacts; and updating the trained company matching machine learning engine.
G06F 16/25 - Integrating or interfacing systems involving database management systems
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
5.
System and method for separating or distributing database calls between active and passive databases
Various methods and processes, apparatuses/systems, and media for separating or distributing database calls between active and passive databases are disclosed. A processor establishes a communication link between a passive database and an active database via a communication network; executes real-time syncing of data between the active database and the passive database by implementing a replication algorithm; receives a request from an application user to generate a report corresponding to the application; implements a batch processor, at an application level, to separate read-only operations from read and write operations associated the application; and separates or distributes database calls, at the application level, between the active database and the passive database in a manner such that the read-only operations are directed to the passive database and the read and write operations are directed to the active database.
G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
G06F 16/21 - Design, administration or maintenance of databases
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
6.
SYSTEMS AND METHODS FOR ANOMALY DETECTION IN SOFTWARE-DEFINED NETWORKS FROM OBSERVED HOST METRICS
Systems and methods for anomaly detection in software-defined networks from observed host metrics are disclosed. A method may include: (1) training a random forest model comprising a plurality of trees with historical metrics from a software defined network, the software defined network comprising a plurality of hosts; (2) receiving metrics for a plurality of features from the hosts in the software defined network; (3) providing the metrics to the trained random forest model; (4) receiving, from the trained random forest model, a prediction of an anomalous hosts for one of the hosts; (5) identifying a subset of the plurality of trees that contributed to the prediction; (6) generating feature scores for the feature from the subset of trees; (7) generating an anomaly score for the feature based on the feature scores and an explanation; and (8) executing an automated action in response to the anomaly score.
H04L 41/0895 - Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
H04L 41/0816 - Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
7.
SYSTEMS AND METHODS FOR LEARNING SYSTEM APPROACH TO ARTIFICIAL INTELLIGENCE MODELS
Systems and methods for learning system approach to artificial intelligence models are disclosed. A method may include: (1) receiving, by a computer program executed by an electronic device, a current artificial intelligence (AI) model; (2) providing, by the computer program, input data from a plant to the current AI model; (3) receiving, by the computer program, current AI model predictions from the current AI model; (4) receiving, by the computer program and from subject matter expert electronic device, feedback-based labels for the current AI model predictions; (5) determining, by the computer program, a prediction error between the current AI model predictions and the feedback-based label; and (6) applying, by the computer program, a model reference adaptive control algorithm to the current AI model in response to the prediction error being greater than a threshold.
Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
A method for providing a management framework for distributed event processing is disclosed. The method includes retrieving data from a distributed event streaming platform based on a data fetch size configuration, the data including event messages; submitting a batch of the data to a consumer thread based on a data polling configuration; loading the batch of the data onto a data structure that enables coordination of processing threads, the data structure including a blocking queue; processing each of the event messages in the batch of the data from the data structure based on predefined logics; publishing each of the processed event messages in the batch of the data to a producer buffer based on a selection logic, the producer buffer including a load balancer; and recording an agreement for each of the published event messages in the batch of the data to a shared collection.
Systems and methods for providing an archive of precedents are provided. The archive of precedents includes determining precedent data; parsing a new-event XML file for string data, wherein the string data is related to a new event; generating a vector embedding from the string data; determining a similar embedding in a vector space, wherein the similar embedding is a vector embedding of an instance of precedent data; parsing XML files of the precedent and new event and using parsed data to generate an old-to-new value map; retrieving the corresponding XML file and the corresponding precedent-event document associated with the vector embedding of the instance of precedent data; and providing, as input to a natural language processing model, the list of text strings recovered from the editable form of the document of the precedent event and the old-to-new value map.
In some aspects, the techniques described herein relate to a method including: receiving, at a rollup platform, a transaction request, wherein the transaction request includes an instructional parameter; generating, by the rollup platform, a transaction batch including the transaction request and other transaction requests, each having the same instructional parameter; executing, by a virtual machine of the rollup platform, the transaction batch, wherein the virtual machine is configured to execute a type of transaction indicated by the instructional parameter, and wherein executing the transaction batch generates a rollup block; generating, by the rollup platform, a validity proof for the rollup block; generating, by the rollup platform, a data package including the rollup block, the validity proof, and metadata, wherein the metadata indicates a batch type; and routing the data package to a destination chain based on the batch type for recordation on the destination chain.
In some aspects, the techniques described herein relate to a method including: generating, by a reinforcement learning engine, a plurality of user states within a simulated 3-dimensional environment; generating, by the reinforcement learning engine and for each of the plurality of user states, a plurality of movement actions, wherein each of the plurality of movement actions place a virtual content object in a corresponding position within the simulated 3-dimensional environment; generating, by the reinforcement learning engine and for each corresponding position of the virtual content object, a reward value, wherein the reward value reflects a relative utility of the corresponding position of the virtual content object; and updating, by the reinforcement learning engine, a placement policy based on the reward value for each corresponding position of the virtual content object.
A method may include: a broadcaster computer program generating, for participants in a network in a transaction, a commit, an audit token, and a proof of consistency; the broadcaster computer program broadcasting, the commits, the audit tokens, and the proofs of consistency for each participant to all participants in the network; the participant computer programs generating complimentary commits, complimentary audit tokens, complementary proofs of consistency, proofs of equivalency, and a proof of assets; the broadcaster computer program receiving from each of the participant computer programs, the proof of assets, the complimentary commit, the complimentary audit token, the complementary proof of consistency, and the proof of equivalency; the broadcaster computer program and/or the participant computer programs verifying, the proofs of assets, the proofs of balance, the proofs of consistency, and the proofs of equivalency; and the broadcaster computer program approving the transaction based on the verification.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
15.
METHOD AND SYSTEM FOR MIGRATING DATABASE CONTENT ONTO NEW DATABASE INFRASTRUCTURE
A system configured to: determine an optimal migration cache size; interface with a source database; index each respective entry from among the plurality of database record entries based on their respective database record entry dates; respectively prioritize each entry from among the plurality of database record entries for migration based on their plurality of respective database record entry dates and sizes; queue a queue of unmigrated database record entries for migration based on each respective prioritization; and initiate a migration of each respective entry from among the queue of unmigrated database record entries.
Various methods and processes, apparatuses/systems, and media for constrained and loan pricing are disclosed. An optimization engine provides daily pricing vector for each loan pricing segment. The daily pricing output per segment (“vectors”) flows into an assessment process to determine a profit and loss (PnL) calculation and a constraints score. The resulting vectors (along with the PnL calculation and constraint scores) are stored in a tuple store. A processor updates surrogate parameters with new tuple store data points; evaluates an acquisition function on the surrogate parameters to find the next query subsidy vector; utilizes this expanded set of vectors and runs them back through the PnL calculation and generates constraint scores; and reports sufficiently subsidy vectors to a pricing team for final subsidy selection.
Provided is a system and method for reordering a heat map. A specific row or column of the heat map is selected by a user (a viewer of the heat map). The user also indicates that the map is to be sorted in ascending order or descending order of intensity according to a selected row or selected column. A revised heat map is constructed in video memory by first sorting the selected row (or selected column) in ascending or descending order by intensity. This generates a mapping order for application to cells in other rows (or columns). The other rows (or columns) are then re-ordered according to the mapping. The revised heat map is then presented via the display.
G06F 7/08 - Sorting, i.e. grouping record carriers in numerical or other ordered sequence according to the classification of at least some of the information they carry
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 40/177 - Editing, e.g. inserting or deleting of tablesEditing, e.g. inserting or deleting using ruled lines
18.
SYSTEM AND METHOD FOR PAYMENT DEVICE ISSUANCE, LIFECYCLE MANAGEMENT, AND USE
A method for payment device issuance, lifecycle management, and use may include a financial institution computer program: issuing a numberless, physical first financial instrument that is restricted to in-person transactions having a first primary account number (PAN) stored in a chip to a customer; issuing a digital, second financial instrument to an electronic wallet for the customer having a second PAN that is different from the first PAN; receiving a notification that the first financial instrument or the second financial instrument has been lost or compromised; in response to the first financial instrument being lost/compromised, reissuing the first financial instrument with a third PAN, wherein the second PAN for the second financial instrument is unchanged; and in response to the second financial instrument being lost/compromised, reissuing the second financial instrument with a fourth PAN, wherein the first PAN for the first financial instrument is unchanged.
09 - Scientific and electric apparatus and instruments
Goods & Services
Downloadable software; downloadable financial software; downloadable software, namely virtual currency, digital currency, digital tokens of value, and cryptocurrency; computer programs relating to financial matters; computer software platforms for financial and currency exchange; computer application software for blockchain based platforms; computer software for use in connection with digital currency and cryptocurrency; computer software and computer hardware for use as a cryptocurrency wallet; Downloadable computer software for managing cryptocurrency transactions using blockchain technology; Downloadable computer software for the handling of financial transactions; Downloadable computer programs for managing, verifying, initiating, receiving, and holding transactions and digital assets in financial matters; Downloadable financial exchange software; Downloadable currency exchange software; Downloadable currency trading software; Downloadable software for financial trading; Downloadable computer software for managing, initiating, receiving, and holding digital currency; Downloadable software for managing, initiating, receiving, and holding cryptocurrency; Downloadable software for the purchase, sale, trade, payment, clearing, and deposit of tokens of value.
20.
METHOD AND SYSTEM FOR IMPLEMENTING A VALUES-BASED DECISION-MAKING, DIAGNOSTICS AND REPORTING TOOL
A system for implementing a values-based decision-making, diagnostics, and reporting tool. The system may include a processor and memory that stores instructions that, when executed by the processor, cause the processor to perform operations. The operations may include: identifying at least one first source that provides client data that indicates at least one from among a client preference, a client behavior, and a client profile; obtaining the client data from the at least one first source; utilizing the client data to generate a set of personalized client values that indicates a set of values of a client; and utilizing the set of personalized client values to generate an values-based assessment for the client.
G06Q 10/0637 - Strategic management or analysis, e.g. setting a goal or target of an organisationPlanning actions based on goalsAnalysis or evaluation of effectiveness of goals
G06Q 40/06 - Asset managementFinancial planning or analysis
21.
METHOD AND SYSTEM FOR UTILIZING SYNTHETIC DATA IN ROBUST ADVERSARIAL TRAINING
Systems and methods for generating a distributionally robust counterpart for adversarial training of a machine learning model by adjusting an ambiguity set of the training data with respect to synthetic data are provided. The method includes: receiving a first dataset that includes data used for training a machine learning model, the first dataset having a first true distribution and a first empirical distribution; determining a first ambiguity set that relates to the first empirical distribution; obtaining a second dataset that includes synthetic data used for countering adversity with respect to the first dataset, the second dataset having a second true distribution and a second empirical distribution; determining a second ambiguity set that relates to the second empirical distribution; determining a third ambiguity set by obtaining an intersection between the first and second ambiguity sets; and training the machine learning model by using the third ambiguity set.
Aspects of the subject disclosure may include, for example, identifying source equipment is associated with a group of recipient equipment based on historical financial data, and determining a processing latency between the source equipment and each recipient equipment of the group of recipient equipment based on the historical financial data. Further embodiments can include determining a processing rate for each processing latency, and determining a verification latency to perform security authentication for each recipient equipment. Additional embodiments can include determining a verification rate for each verification latency, determining a service metric based on the processing rates and the verification rates, the service metric being associated with a token service that expediates a transfer of financial data between the source equipment and the group of recipient equipment, and presenting the service metric at the source equipment to enroll in the token service. Other embodiments are disclosed.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
23.
METHOD AND SYSTEM FOR USING IMAGE ANALYSIS FOR TIME-SERIES FORECASTING
A method for using image analysis for time-series forecasting is provided. The method includes: receiving numeric time-series data; converting the numeric time-series data into an image, wherein the image is a time-frequency spectrogram; analyzing the image by applying a vision transformer encoder to the image to learn multi-modal data across time and frequency; forecasting, based on the analyzing of the image, at least one future time-series data point. The method further includes converting of the numeric time-series data into the image by applying a wavelet transform for convoluting wavelets at different scales with the numeric time-series data to calculate a respective signal strength for each of the wavelets and outputting the calculated respective signal strengths as the time-frequency spectrogram.
Aspects of the subject disclosure may include, for example, segregating unique combinations for a portfolio of items into partitions; routing the partitions to an optimization service platform comprising GPUs to apply, via parallel processing by the GPUs, an optimization allocation algorithm according to parameters and analyze each of the combinations of the partitions resulting in optimal outcomes for each of the partitions; and consolidating the optimal outcomes for each of the partitions to determine a suggested portfolio selected from the items. Other embodiments are disclosed.
A method for facilitating automated model evaluation based on question perturbations is disclosed. The method includes receiving, via an application programming interface, inputs that include an inquiry in a natural language format; generating, via a rephrasing model, questions based on the inquiry, each of the questions corresponding to a lexical variant of the inquiry; determine, via response models, an initial response for each of the questions and the inquiry; clustering the initial response for each of the questions and the inquiry into blocks based on shared characteristics; and computing metrics for each of the blocks.
Aspects of the subject disclosure may include, for example, receiving first user-generated input from a first communication device associated with a first user. The user-generated input comprises a prompt that indicates to generate computer code. Further embodiments can include searching a cache comprising a group of computer code based on the prompt, determining that there are no cache search results associated with the computer code in response to the searching of the cache, and generating the computer code utilizing an artificial intelligence software application. Other embodiments are disclosed.
In some aspects, the techniques described herein relate to a method including: determining a first, a second, and a third logical partition separation indicator in a string file, wherein the first logical partition separation indicator is for a first partition level, the second partition separation indicator is for a second level, and the third logical partition separation indicator is also for the first partition level, each in a partition hierarchy; setting a first variable value to a value of the first logical partition separation indicator and a second variable value to a value of the second logical partition separation indicator; writing the first variable value to a data structure and writing the second variable value to the data structure; persisting the data structure to a search index; and clearing the first variable value and the second variable value.
G06F 16/383 - Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using metadata automatically derived from the content
G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
A control system that provides for network-triggered relocation of a subset of active subscribers from one AMF to another AMF allowing for triggering a targeted AMF offload for a subset of active subscribers. The control system provides for indication of a target AMF to which a selected subscriber(s) shall be offloaded to by the source AMF utilizing a 5G-GUTI assigned to UE.
36 - Financial, insurance and real estate services
Goods & Services
(1) Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services.
30.
MANAGING DYNAMIC MESSAGING USING A KAFKA-BASED MONITORING APPLICATION
A method and system performing a method for managing dynamic messaging using a Kafka-based monitoring application deployed within a cloud environment having at least one software application in operation is provided. The Kafka-based monitoring application monitors consumer lag for a specific topic associated with the software application, schedules queries to detect consumer lag for the specific topic at predetermined intervals. detects, via an application programming interface in communication with the Kafka-based monitoring application, any consumer lag and retrieves a list of any affected consumers and associated consumer information; and determines one or more pools of the affected consumers, and performs a scaling operation to scale up or down consumers on the one or more pools based on the consumer lag detected.
H04L 41/5025 - Ensuring fulfilment of SLA by proactively reacting to service quality change, e.g. by reconfiguration after service quality degradation or upgrade
31.
METHOD AND SYSTEM FOR PERFORMING AUTOMATIC SCHEMA-BASED DATA VALIDATION
A method and a system for performing schema-based data validation are disclosed. The method includes receiving a first dataset that comprises a plurality of entries, the first dataset is received from at least one data source. Next, the method includes receiving a second dataset that comprises a predefined set of instructions corresponding to a set of conformity standards for validation of the first dataset. Next, the method includes applying the predefined set of instructions to the received first dataset. Next, the method includes validating each of the plurality of entries of the first dataset based on the applying of the predefined set of instructions. Thereafter, the method includes generating a consolidated assessment report based on the validation, and displaying, using a display unit, the generated consolidated assessment report.
A telecommunications system and method for identifying when a next hop is down by sending a first series of pings from a User Plane (UP) computer to the next hop, for incrementing a Key Performance Indicator (KPI) to count a time for when the next hop is down, and for communicating from the UP computer to a Control Plane (CP) computer that a next hop is down. The system facilitating identification of when the next hop transitions to up by sending a second series of pings from the UP computer to the next hop, for incrementing the KPI at the time when the next hop is up, and for communicating from the UP computer to the CP computer that the next hop is up.
Various methods and processes, apparatuses/systems, and media for performing spatial-aware reading for visual documents are disclosed. A processor implements a language model; modifies existing parameters and architecture of the language model to incorporate new parameters in its architecture by integrating a disentangled spatial attention process to the language model; pretrains the modified model by performing an autoregressive block infilling process on a plurality of document pages thereby training the new parameters and further adjusting the existing parameters; instruction-tunes the pretrained model on data derived from a plurality of visually rich document understanding datasets to teach the pretrained model to follow document-oriented instructions or answer questions about documents by leveraging their content and their spatial layout and outputting a trained model; and performs spatial-aware reading for visual documents by utilizing the trained model.
In some aspects, the techniques described herein relate to a method including: receiving, at a query platform, a query text string; tokenizing, by the query platform, the query text string, wherein the tokenizing generates a query vector embedding; determining, by the query platform, a document vector embedding, wherein the document vector embedding is above a similarity threshold with respect to the query vector embedding; retrieving, by the query platform, textual document data related to the document vector embedding; sending, by the query platform, the query text string and the textual document data to a generative model engine; receiving, by the query platform and from the generative model engine, a natural language response to the query text string; and displaying, by the query platform, the natural language response via an interface.
A system and a method for authenticating user access to a service that is hosted on a public cloud platform are provided. The method includes: receiving an access request from a user that relates to a service that is hosted on a public cloud platform; preliminarily authenticating the access request by using a legacy authentication protocol that is not sufficiently secure for accessing the first service via the public cloud platform; generating and validating, based on a result of the preliminary authentication, a legacy protocol certification; retrieving roles that are associated with the user; obtaining, based on the user roles, a token that is usable for controlling access to the service via the public cloud platform; and augmenting the access request with the token and a signature to facilitate an authentication of the access request by the public cloud platform, while excluding the legacy protocol certification.
A system for predicting system component failures within a computer system that comprises a plurality of hardware components and a plurality of software components. The system may comprise memory storing instructions that, when executed, cause a processor to: obtain performance metrics by monitoring a network interface of the computer system; generate component failure probabilities by processing the performance metrics; determine that a first component failure probability among the component failure probabilities exceeds a risk threshold; determine remedial actions that mitigate a first component failure probability; and mitigate the first component failure probability by initiating an execution of the remedial actions.
36 - Financial, insurance and real estate services
Goods & Services
Providing trading, exchange, transfer, and payment services for digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Issuance of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Payment processing services in the field of digital assets, namely, virtual currency, digital currency, digital tokens, payment tokens, decentralized application tokens, and blockchain enabled currency; Electronic funds transfer services; Electronic funds transfer, namely, electronic transmission of digital currency via electronic communications networks and electronic devices; Electronic transmission of data, namely, digital currency via electronic communication networks and electronic devices; Digital currency trading and exchange services; Currency trading, exchange, and transfer services via distributed ledger technology; Issuance and redemption of digital currency for currency; Electronic financial trading services; Digital asset trading services; Financial securities exchange services; Securities debt settlement services using distributed ledger technology; Securities brokerage services using distributed ledger technology; Financial exchange of digital assets; On-line real-time currency trading; On-line real-time digital token trading; Electronic payment processing services via distributed ledger technology; Financial services, namely, providing electronic transfer of a digital assets for use by members of an online community via a global computer network; Payment and funds verification services; Financial transaction processing services, namely, clearing and reconciling financial transactions via computer and communication networks; Providing an internet website featuring information in the fields of finance, financial transactions, digital financial assets, and currency exchange services; Financial exchange services, namely, providing a financial exchange for trading currency, digital currency, payment tokens, and digital tokens; Financial exchange services, namely, a financial futures exchange for trading currency including digital currency; Financial services, namely, facilitating the deposit, holding, and withdrawal of electronic funds; Clearing and reconciling financial transactions; Financial transactions services, namely, electronic transfer and exchange of digital assets, digital tokens, payment tokens, and digital currency via blockchain; Financial brokerage services for digital asset trading; Financial management of assets via distributed ledger technology; Financial custody services, namely, maintaining possession of financial assets for others for financial management purposes; Financial services, namely, debt settlement; Financial services, namely, providing on-line stored value accounts in an electronic environment; Financial transaction services, namely, providing secure commercial transactions and payment options; Financial investment services, namely, brokerage services on securities exchanges and over-the-counter markets using distributed ledger technology; Providing financial information, namely, account data sharing, payment information sharing, check information sharing, account validation information, currency conversion information, cross-border payment information, fraud data, fraud identification information, federated learning information, and federated intelligence information all via distributed ledger technology; Banking and financial services
45 - Legal and security services; personal services for individuals.
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
Goods & Services
Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members
(2) Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
(3) Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members
40.
SYSTEMS AND METHODS FOR BLOCKCHAIN IDENTITY PROOFING VIA FEDERATION PROTOCOLS FROM TRUSTED PARTIES
Blockchain identity proofing via federation protocols is disclosed. A method may include: receiving, at a digital wallet application for a financial institution on a customer electronic device, a customer login from a customer; receiving, by the digital wallet application and from the customer, a request for an assertion, wherein the request redirects a session with the digital wallet application to a financial institution backend via a financial institution website or a financial institution application using a federation protocol; authenticating, by the financial institution backend, the customer; confirming, by the financial institution backend, the assertion using verified customer information in a verified customer information database; redirecting, by the financial institution backend, the session to the digital wallet application; returning, by the financial institution backend and using the federation protocol, the assertion to the digital wallet application; and writing, by the digital wallet application, the assertion to a distributed ledger.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
41.
SYSTEM CONTROL LANGUAGE FOR PLANNING AND EXECUTION
Provided is a system control planning-execution monitoring architecture, including a planning domain portal configured to analyze planning domain related files received from a user and specify a planning domain; a planning problem portal configured to analyze planning problem related files received from the user the user and specify a planning problem therefrom and a planner module configured to receive outputs from the planning domain portal and the planning problem portal and output a plan including a list of actions for completion by the system. The system also produces an active language (ALA) program responsive to the plan output from the planner including embedded monitoring checkpoints. A syntactic analysis module is configured to receive as an input the ALA program and definition of a syntax of the ALA program and produce an abstract syntax tree (AST) therefrom; and an executive module configured to (i) receive an input from the planning domain portal, (ii) determine how components of ALA should be executed based on the received planning domain input in the components of the ALA.
A method and a system for automatically deploying a low-code no-code model are disclosed. The method includes receiving an input in at least one format. The method includes analyzing, using a trained model, the input to generate at least one recommendation. The method includes selecting at least one service from the service catalog database based on the generated at least one recommendation. The method includes generating an infrastructure script for the selected at least one service using an Infrastructure as Code (IAC) catalog database having a plurality of pre-defined IAC scripts. The method includes generating an application script for the generated infrastructure script using a code catalog database having a plurality of application scripts. The method includes generating an application code for deployment based on an integration of the selected at least one service and the generated application script.
A method and a system for efficient data archiving and retrieval in a distributed search and analytics environment are disclosed. The method includes ingesting a real-time data stream from at least one data source. The method further includes segmenting the ingested data stream into at least one segment and storing each of the at least one segment across a set of nodes in at least one search engine cluster. The method further includes capturing and storing a set of resiliency snapshots of the at least one segment within the at least one search engine cluster after a first predefined time period. Thereafter the method includes creating at least one index snapshot based on the stored set of resiliency snapshots through a clone API after a second predefined time period and mounting the at least one index snapshot onto an archival search engine cluster using a mount option.
A method for extracting key phrases based on extracting both informative and readable phrases from documents. The method includes separating documents into sentences to extract sentence-level phrases and separating the documents into segments of a fixed length to extract segment-level phrases. The method further includes using a PMI and entropy model to also extract readable phrases from the documents. The method includes comparing the sentence-level phrases, the segment-level phrases, and the readable phrases to generate key phrases for the documents.
Systems and methods for generating synthetic datasets having distributions that are close to those used as training sets for a generative model and for which a predefined feature of the dataset is close to a predefined value are provided. The method includes: receiving a first dataset that includes original data; determining an expression of a Schrodinger Bridge problem that corresponds to the first dataset; modifying the expression by introducing a term that relates to a transformation function; optimizing the transformation function with respect to a predetermined feature of the first dataset; and using the optimized transformation function to generate a second dataset that includes synthetic data.
The method includes: receiving a communication that relates to a request for a price quote for at least one equity derivative product; extracting from the communication, attributes of the requested price quote for the at least one equity derivative product; generating based on the extracted attributes, a template request that has a predetermined format for each of the at least one equity derivative product; displaying, via a graphical user interface (GUI), each template request for review by a user, wherein the GUI includes an input mechanism for at least one of accepting and modifying each template request; transmitting each reviewed template request to a pricing system; receiving, from the pricing system, a quote for each of the at least one equity derivative product; and displaying, by the GUI, the price quote.
A method for using a large language model to perform complex table question-answering tasks while preserving data security and privacy with respect to the underlying data included in a table is provided. The method includes: receiving a user query that relates to a table; generating, based on the user query, a prompt that includes a role, at least one instruction, schema, and a question; transmitting the prompt to an external processor that does not have access to the underlying data included in the table; receiving, from the external processor, a set of executable code which has been generated by the external processor in response to the prompt and which is applicable to the table; generating an answer to the user query by executing the set of executable code; and transmitting, to the user, the answer to the user query.
Aspects of the subject disclosure may include, for example, generating a natural language processing model by training an automatic speech recognition (ASR) encoder with manual transcription. The training is performed by correcting and adjusting relevant factors of the ASR encoder based on determined triplet loss, classification loss and Kullback-Leibler divergence loss. In response to an ASR utterance, the trained natural language processing model generates a predicted intent associated with the ASR utterance with improved accuracy. Other embodiments are disclosed.
Aspects of the subject disclosure may include, for example, identifying a number of mixture components of a mixture ensemble of an artificial neural network. The neural network is trained according to a set of features and a corresponding set of output values associated with the set of features. A set of mixture weights and a set of mixture parameters of the mixture ensemble are determined, and a set of posterior probabilities is calculated according to the sets of mixture weights and mixture parameters. The sets of mixture weights and mixture parameters are revised according to an optimization process to obtain a revised set of mixture weights determined according to a sum of the set of posterior probabilities and a revised set of mixture parameters determined according to a solution of a numerical optimization. Other embodiments are disclosed.
A risk classification processing circuit is configured to classify one or more subsets of network elements forming a given managed information technology network. The classification is based on weight values associated with respective ones of a set of classification decision indicators. A risk mitigation processing circuit is configured to cause risk mitigation acts to be carried out on one or more of the network elements forming the given managed information technology network. The risk mitigation processing circuit includes an allocation circuit configured to make processing resources available to process the risk mitigation acts based on the classification by the risk classification processing circuit.
H04L 41/082 - Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality
H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
A method may include: receiving from a user computer program, a selection of a good or service to purchase from a good/service provider using loyalty points and an identification of a date for an event associated with a purchase; determining that the user does not have sufficient loyalty points in a user loyalty point account for the purchase; predicting a predicted number of loyalty points that the user will earn before the date of the event; approving the purchase and borrowing loyalty points necessary for the purchase; conducting the purchase using loyalty points in the user loyalty point account and the borrowed loyalty points; periodically reducing a borrowed loyalty points balance against new loyalty points earned by the user by redeeming the new loyalty points; determining at the date of the event, a final loyalty points deficiency; and executing a transaction to pay for the final loyalty points deficiency.
A method and a system for generating synthetic data that corresponds to an original dataset while maintaining demographic parity are provided. The method includes: receiving a first dataset of original data points, each original data point including a first coordinate that relates to sensitive demographic features, a second coordinate that relates to decision-making features, and a third coordinate that relates to a decision outcome; determining a demographic parity constraint to be applied to the first dataset; generating a second dataset of synthetic data points, each of which includes the first, second, and third coordinates; computing sample-level weights for the synthetic data points; and generating a third dataset by applying the sample-level weights to the second dataset. The computation of the weights includes minimizing the Wasserstein distance between the first dataset and a weighted version of the second dataset while satisfying the demographic parity constraint.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
Systems and methods for visualizing and analyzing operational interactions of microservices are disclosed. A method for visualizing operational interactions of microservices may include: (1) calling, by a source microservice, a target microservice with a request, both the source microservice and the target microservice being in a plurality of microservices; (2) logging, by the source microservice, an event; (3) recording, by a blockchain building program, the event to a blockchain as a table and as an index; (4) receiving, by a microservices tracing computer program, the request; (5) processing, by the target microservice, the request with a tracer; (6) returning, by the target microservice, a microservice identity for the target microservice with requested data; (7) logging, by the microservices tracing computer program, the requested data using the tracer; and (8) generating, by the microservices tracing computer program, a visualization of microservice interactions from the requested data.
Aspects of the subject disclosure may include, for example, comparing a first disparity of an all-feature model with a second disparity of a baseline model, and based on the comparing, performing feature swap-out processing or feature swap-in processing with respect to a baseline feature set associated with the baseline model to derive a model having a third disparity, and performing feature addition processing or feature removal processing with respect to features used to train the model to derive an alternative model that has a determined acceptable performance and a determined acceptable disparity. Other embodiments are disclosed.
Systems and methods for tokenization in the public cloud are disclosed. According to an embodiment, a method for tokenizing data in a public cloud may include: (1) receiving, at a tokenization service in a public cloud and from a client application, source data associated with one of a plurality of namespaces; (2) generating, by the tokenization service, a token for the source data, wherein the token has a token format that is specific to the namespace; (3) encrypting, by the tokenization service, the source data; (4) associating, by the tokenization service, the token with the encrypted source data; (5) persisting, by the tokenization service, the association between the token and the encrypted source data in a token table in the public cloud; and (6) providing, by the tokenization service, the token to the client application.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
H04L 9/06 - Arrangements for secret or secure communicationsNetwork security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
H04L 67/10 - Protocols in which an application is distributed across nodes in the network
59.
SYSTEMS AND METHODS FOR MACHINE LEARNING INTEGRATION IN POINT-OF-SALE DEVICES
In some aspects, the techniques described herein relate to a method including: receiving, at a machine learning engine and as input to the machine learning engine, a digital image file, wherein the digital image file includes an image of a transaction receipt; outputting, by the machine learning engine, text from the digital image file that is recognized by the machine learning engine, wherein the text recognized by the machine learning engine includes a transaction identifier, a transaction amount, and a tip amount; populating, by a point-of-sale device, a transaction finalizing form with the transaction amount and the tip amount; receiving, at the point-of-sale device and via the transaction finalizing form, a command to finalize a transaction associated with the transaction identifier; and initiating, by the point-of-sale device, an update command, wherein the update command updates a record of a datastore associated with the transaction identifier with the tip amount.
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
60.
METHOD AND SYSTEM FOR MULTI-MODAL TIME-SERIES RETRIEVAL THROUGH LATENT SPACE PROJECTIONS
A method and a system for using multi-modal time-series data retrieval through latent space projections to efficiently capture and store time-series data are provided. The method includes: generating a synthetic set of time-series data and a corresponding set of textual descriptions; using the synthetic data to generate a corresponding set of images; using the images to train an image encoder to learn a first multi-modal shared latent space, and using the textual descriptions to train a text encoder to learn the shared latent space; receiving historical time-series data and storing the historical data in a database; generating an index that relates to the shared latent space and is usable for identifying information stored in the database; receiving a user query that relates to a first new set of time-series data; and retrieving, from the database, information that is responsive to the query.
Systems and methods for tokenizing data in a public cloud are disclosed. According to an embodiment, a method may include: (1) receiving, at a tokenization service in a public cloud and from a client application, source data associated with one of a plurality of namespaces; (2) generating, by the tokenization service, a token for the source data according to a token format rule, wherein the token format rule specifies one or more digit in the token format that are reserved; (3) encrypting, by the tokenization service, the source data; (4) associating, by the tokenization service, the token with the encrypted source data; (5) persisting, by the tokenization service, the association between the token and the encrypted source data in a token table in the public cloud; and (6) providing, by the tokenization service, the token to the client application.
Systems and methods for prefetching Payment Card Industry (PCI) data. A method may include a tokenization service in a cloud environment: (1) receiving a request to prefetch a plurality of tokens from a client application; (2) generating the plurality of tokens and a co-relation indicator for each of the plurality of tokens; (3) storing the plurality of tokens and the co-relation indicators in a token vault in the cloud environment; (4) returning the plurality of tokens and the co-relation indicators to the client electronic device; (5) receiving a mapping request comprising a source value and the co-relation indicator for one of the plurality of tokens; (6) identifying the token of the plurality of tokens associated with the co-relation indicator; (7) mapping the token to the source value; and (8) returning a message indicating successful mapping to the client application.
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
Systems and methods for restricting access to tokenization services are disclosed. A method may include: receiving, at a computer program in a public cloud and from a client application for a client executed by an electronic device, onboarding information; setting, by the computer program, entitlements for the client application or the client to access a plurality of services in the public cloud; receiving, by the computer program, a request to access one of the plurality of services in the public cloud from the client application; determining, by the computer program, that the client application or the client is entitled to access the service to execute the request based on the entitlements for the client application or the client; and granting, by the computer program, access to the service to execute the request; wherein the service is configured to execute the request and return data to the client application.
A method may include: storing, by a user device, a token for a financial instrument, wherein an issuing financial institution stores an association between the financial instrument and a partner loyalty identifier or a ticket identifier; communicating, by the user device and as part of an access request, the token to a sensor, wherein the sensor is associated with an access restrictor for an area; communicating the token to the issuing financial institution with a request for information; detokenizing, by the issuing financial institution, the token and retrieving the associated partner loyalty identifier or ticket identifier; receiving, by a facility backend, the associated partner loyalty identifier or ticket identifier and decisioning the access request using the associated partner loyalty identifier or ticket identifier; and controlling, by the facility backend, the access restrictor to grant access in response to the access request being approved.
A method may include: a distributed application on a digital banking and payment platform receiving, via an API, a reserve funds instruction from a first transaction party to hold a balance in a blockchain deposit account, the reserve funds instruction comprising a reserve hold amount; the distributed application validating the reserve funds instruction; the distributed application generating a blockchain transaction payload for the reserve funds instruction; the distributed application submitting the blockchain transaction payload to a smart contract that maintains a distributed ledger, validates that the blockchain deposit account has available funds sufficient for the reserve hold amount, and creates a reserve funds hold on the reserve hold amount in the blockchain deposit account; the distributed application receiving, in response to a successful reserve funds hold, a confirmation event from the smart contract; and the distributed application generating a first reserve identifier for the reserve funds hold.
G06Q 20/06 - Private payment circuits, e.g. involving electronic currency used only among participants of a common payment scheme
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 40/02 - Banking, e.g. interest calculation or account maintenance
66.
METHOD AND SYSTEM FOR AUTOMATED DATA CAPTURE AND MANAGEMENT
A method for facilitating automated data capture and management is disclosed. The method includes detecting an execution of a target application; initializing, based on a result of the detecting, a set of instructions that is associated with the target application; configuring an operational state for the target application based on the set of instructions; capturing, via the target application, user data based on the configured operational state, the user data including information that relates to interaction events between a user and the target application; validating, by using a predetermined data model, the captured user data to generate validated data sets; and classifying, by using the predetermined data model, the validated data sets to generate structured data sets.
A system for registering resource entitlements within different types of access management systems. The system may be configured to: interface with at least one first access management system, define a first set of entitlement details; receive a first request to grant first entitlement to at least one first principal; and utilize the first set of entitlement details to fulfill the first request by provisioning at least one first account, within the at least one first access management system, with the first entitlement. The first set of entitlement details may identify at least one first resource to which the first entitlement permits access, and the at least one first account is accessible by the at least one first principal.
Systems, methods, and devices for integrating a first party service into a second party computer application are disclosed. In one embodiment, in a financial institution comprising at least one computer processor, a method for integrating a financial services payment service into a merchant computer application may include (1) receiving customer electronic device information from a customer electronic device using a first communication channel; (2) transmitting a passcode to the customer electronic device using a second communication channel; (3) receiving the passcode from the customer electronic device over the first communication channel; (4) sending a session identifier to electronic device over first communication channel; (5) receiving the session identifier from a merchant host; and (6) sending an authentication value to a merchant host. The merchant host may provide the authentication value to the customer electronic device.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
A method and a system for pre-processing data for algorithmic fairness via optimal transport in order to reduce disparities in classification datasets without modifying the original data are provided. The method includes: receiving a first dataset that includes a set of samples, each respective sample including a first coordinate that relates to sensitive demographic features, a second coordinate that relates to decision-making features, and a third coordinate that relates to a decision outcome that is generated by a machine learning model; determining a demographic parity constraint to be applied to the first dataset; computing a set of respective sample-level weights that correspond to each sample; and generating a second dataset by applying the set of respective sample-level weights to the first dataset The computation of the sample-level weights includes minimizing a Wasserstein distance between the first dataset and a weighted version thereof while satisfying the demographic parity constraint.
A method for providing a secure aggregation protocol that facilitates federated learning of machine learning models while protecting privacy of individual data sets associated with participants is provided. The method includes: a setup phase by which public key—secret key pairs are used to verify signatures and facilitate secure transmissions of encrypted messages that include datasets to be aggregated; and an aggregation phase by which a random oracle/hash function is used to facilitate the aggregation of newly submitted datasets into the preexisting aggregated dataset.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Various methods and processes, apparatuses/systems, and media for automatically generating robust data driven decisions based on attendance data are disclosed. A processor receives, via a user interface, attendance data and population data. The population data indicates which team a given employee belongs to. The processor implements an AI system that includes an AI module and an AI planner; and causes the AI system to automatically calculate the plurality of teams' attendance on any given date which is present in the attendance data; receives input data from a user indicating whether the user wants to invoke a first process or a second process; invokes the AI module, in response to receiving the input data, that automatically generates a solution according to an AI model and configurable constraints; and causes the AI planner to automatically generate robust data driven decisions report in accordance with the solution.
G06Q 10/04 - Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
G06Q 10/1091 - Recording time for administrative or management purposes
72.
SYSTEMS AND METHODS FOR GENERALIZING ASSET TOKENIZATION AND INTERACTING WITH AND CONTROLLING ON-CHAIN ASSETS USING DISTRIBUTED LEDGER TECHNOLOGY
Systems and methods for generalizing asset tokenization and interacting with and controlling on-chain assets using distributed ledger technology are disclosed. In one embodiment, a method may include (1) receiving, at a balance manager computer program, an instruction from a participant to request a mint or burn of an asset token and a preference for balance manager assistance; (2) assisting, by the balance manager computer program, the participant with the request to mint or burn the asset token in accordance with the preference, resulting a transaction; and (3) sending, by the balance manager computer program, the transaction to an asset token router to call a mint or burn request on an asset token contract for the asset token. The asset token router calls the mint or burn request on the asset token contract.
Aspects of the subject disclosure may include, for example, systems and methods for generating structured datasets for predicting bond price. The systems and methods include constructing a price function of each bond contained in a plurality of bond clusters including a target cluster, training a machine learning model to determine a cause for an erroneous price prediction result, and generating structured datasets based on a feedback from the machine learning model. Other embodiments are disclosed.
Various methods and processes, apparatuses/systems, and media for identifying when to retrain an AI model are disclosed. A processor receives the AI model and a set of target data samples on a predefined time period; implements an artificial intelligence technique to generate a plurality of counterfactuals and corresponding target data samples among the set of target data samples for analyzing performance of the received AI model; computes an average counterfactual distance between closest counterfactuals and corresponding target data samples on the predefined time period; compares the average counterfactual distance to a predefined threshold value; identifies that the AI model needs to be retrained when output data from comparing indicates that the average counterfactual distance is less than the predefined threshold value; and automatically retrains the AI model when it is determined that the average counterfactual distance is less than the predefined threshold value.
Per one example embodiment, a method is provided of shifting an OS (operating system) and associated native application platform from a private network to a cloud-based target environment, where the OS comprises an operating system not configured for web access. An image of the OS is provided that is suitable for installation on a target virtual machine in the cloud-based target platform. In lieu of moving user credentials of numerous current private network-based users of the OS—native application platform to the target environment, a passwordless credential-based OS command level communication brokering service is provided at the cloud-based target environment.
Various methods and processes, apparatuses/systems, and media for generating realistic multi-step recourse paths while preserving privacy of customers are disclosed. A processor trains an ML model by using the at least a first set training data; implements a data distribution sampling algorithm on the first set of training data to generate corresponding sampled data by partitioning the first set of training data into non-overlapping subsets with differentially private clustering; computes a plurality of cluster centers with differential privacy guarantees for each of said plurality of cluster centers; generates a graph that connects each cluster center with different weights between each cluster center; and automatically generates, for a data point that receives a negative outcome from the trained model, a recourse path with privacy guarantees based on a plurality of set points from the graph that provides shortest path to output a positive outcome.
A method for detecting resource allocation mismatch among different nodes in a radio access network (RAN) includes: a radio intelligent controller (RIC) polling a centralized unit control plane (CU-CP), a centralized unit user plane (CU-UP), and a distributed unit (DU) to receive information regarding allocated RAN resources associated with a user equipment (UE); and correlating, by the RIC, the received information regarding the allocated RAN resources associated with the UE to determine whether the CU-CP, CU-UP and DU are in sync with respect to the allocated RAN resources associated with the UE. A discrepancy in the allocated RAN resources among the CU-CP, CU-UP and DU indicates stale RAN resource allocation by at least one of the CU-CP, CU-UP and DU.
Systems and methods for mapping Resource Blocks over antennas for Physical Downlink Control Channel (PDCCH) and Physical Downlink Shared Channel (PDSCH) transmission.
In some aspects, the techniques described herein relate to a method including: receiving a cost function, where the cost function is a function of parameters of a quantum circuit; discretizing the cost function to determine a number of dimensions and a number of elements in each dimension; formulating a landscape tensor, wherein the landscape tensor is formulated based on, and includes, the number of dimensions and the number of elements in each dimension; randomly sampling values of the parameters of the quantum circuit; executing the quantum circuit with the values of the parameters, wherein executing the quantum circuit generates values of the cost function; inserting the values of the cost function as values of corresponding elements in the number of elements included in the landscape tensor; and solving a low-rank tensor completion problem to estimate the values of empty elements in the landscape tensor.
A method may include: receiving a set of retain samples comprising retain features to retain in a pretrained machine learning model, and a set of forget samples comprising forget features to remove from the pretrained machine learning model; providing the set of retain samples to the pretrained machine learning model resulting in a retain output and the set of forget samples to the pretrained machine learning model, resulting in a forget output; generating a set of retain weights and a set of forget weights based on the retain output and the forget output; freezing the set of retain weights; setting each forget weight to an initial state; executing a training epoch using the pretrained machine learning model and the retain samples that retrains the forget weights using the retain samples; combining the retrained forget weights with the retained weights to form an unlearned machine learning model.
A User Plane Function UPF Geographic Redundancy (GR) and Routers on Packet Forwarding Control Protocol Router (PFCP) N4 and General Packet Radio Service Tunneling Protocol (GTPv1) interfaces for a RAN network. A UPF and UPF-GR are connected via a dedicated connection for session and state replication. The UPF-GR is kept in a hot-standby mode, and all the sessions that are created, modified, or deleted at a UPF are also created, modified, and deleted at UPF-GR. The UPF and UPF-GR are also configured with a same N4 IP Address. A Session Management Function (SMF) is connected via a PFCP Router (PFCP-SMF) with PFCP routers of UPF and UPF-GR. A RAN node is connected via a Router (GTPv1-Radio) with GTPv1 routers of UPF and UPF-GR. The UPF and UPF-GR are configured to handle the same GTPv1 Interface IP Address and the same IP Pool from which the User Equipment IPs are allocated.
Point-to-Multipoint (p2mp) delivery of data in a SRv6 network for multicast/p2mp data delivery. Function and Argument bits are encoded Segment Routing (SRv6) as a Last Significant Bit in an IPv6 address. An SRv6 node can be encoded with a Segment ID to tunnel multicast through a node that does not support Bit Index Explicit Replication (BIER) SRv6 forwarding.
A method and a system for managing a set of alerts related to an application workflow are disclosed. The method includes: detecting, by a processor via a build time architecture digitizer (BTAD), request for new infrastructure component provisioning; generating via BTAD, updated architecture model; monitoring, via runtime architecture digitizer (RAD), set of services related to new infrastructure component; generating, via RAD, final architecture model; receiving, at alert enricher module (AEM) from database, set of alerts; mapping, via AEM, alerts with corresponding components of final architecture model; assigning, via AEM, corresponding components from final architecture model to alerts; enriching, via AEM, alerts with relevant metrics and log details; generating, via AEM, set of enriched alerts; and providing, via AEM, enriched alerts to manage set of alerts.
A method and system for visually generating a free-form cloud infrastructure are disclosed. The method includes displaying, on a display, multiple icons corresponding to multiple cloud components and a free-form virtual canvas, receiving a selection of a first icon among the multiple icons, and inputting the selected first icon on the virtual canvas. The method further includes receiving a selection of a second icon among the multiple icons, and determining a connection compatibility between a first cloud component and a second cloud component corresponding to the first and second icons. When the connection compatibility between the first cloud component and the second cloud component is possible, displaying one or more possible connections between the first icon and the second icon and receiving a selection of a target connection, and establishing a connection between the first cloud component and the second cloud component for generating custom serialized canvas data for provisioning a custom cloud infrastructure.
Payment cards with activated information displays are described. In one embodiment, a payment card may include: a first layer; a second layer comprising an elastic material; an actuator; and an information layer between the first layer and the second layer, comprising: a plurality of information voids; and a microfluidic channel that communicates the plurality of information voids with the actuator. A fluid may be provided in the microfluidic channel such that when the actuator is depressed, fluid flows into the information voids making the information voids visible through the second layer, and when the actuator is released, the fluid flows out of the information voids making the information voids substantially invisible through the second layer.
A method may include: accepting, by a data transformation module, an original dataset as input to a first and a second neural network and outputting a transformed dataset; accepting, by a sensitive attribute suppression module, the transformed dataset as input to a third neural network and calculating a sensitive attribute suppression loss; accepting, by an annotated useful attribute preservation module, the transformed dataset as input to a fourth neural network and calculating a useful attribute preservation loss; accepting by a generic feature suppression module, parameters of a distribution of a latent variable from the first neural network and calculating, for an unannotated generic attribute, a generic feature suppression loss; combining the sensitive attribute suppression loss, the useful attribute preservation loss, and the generic feature suppression loss into a total loss; and training the first neural network and the second neural network with the total loss.
Various methods and processes, apparatuses/systems, and media for fraud verification across user identification formats are disclosed. A processor generates a digital image of an identification document presented by a customer; transmits the digital image to a server; calls a first API to read the digital image from the server and requests validation of the digital image with a second API; calls the second API to transmit the digital image to an SaaS; receives, by the second API, an identification validation response from the SaaS using existing data corresponding to the customer; implements an AI/ML model to generate a confidence score based on predefined rules and historical data; determines that the confidence score is equal to or more than a configurable threshold value; and validates the digital image based on determining that the confidence score is equal to or more than the configurable threshold value.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
A method may include: a model registry smart contract on a primary permissioned blockchain-based network receiving template portfolio models; the model registry smart contract deploying an investor portfolio smart contract for an investor portfolio to the primary network; a rebalancer module calculating a subscription order to align the investor portfolio to the selected template portfolio model; the investor portfolio smart contract sending the subscription order to an orchestrator smart contract; the orchestrator smart contract routing the subscription order to a secondary permissioned blockchain-based network via an interoperability service that translates the subscription order for the secondary network, receives a settlement confirmation from the secondary network, and translates the settlement confirmation for the primary network; the orchestrator smart contract recording asset positions based on the settlement confirmation; and the investor portfolio smart contract transferring deposit tokens to a fund manager address for the fund on the primary network.
G06Q 40/06 - Asset managementFinancial planning or analysis
G06Q 20/10 - Payment architectures specially adapted for electronic funds transfer [EFT] systemsPayment architectures specially adapted for home banking systems
G06Q 40/04 - Trading Exchange, e.g. stocks, commodities, derivatives or currency exchange
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
45 - Legal and security services; personal services for individuals.
Goods & Services
(1) Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members
(2) Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
(3) Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members
45 - Legal and security services; personal services for individuals.
39 - Transport, packaging, storage and travel services
43 - Food and drink services, temporary accommodation
Goods & Services
Concierge services for elite members comprising making requested personal arrangements and reservations and providing customer-specific information to meet individual needs for elite members rendered together in an airport lounge; all the foregoing provided to credit card members Airport services, namely, transit lounge facilities for elite passenger relaxation featuring access to the Internet provided by others; providing transit lounge facilities for elite passenger relaxation featuring enhanced and expedited customer service responses for elite passengers; booking and arranging of access to airport lounges for elite passengers; airport services, namely, transit lounge facilities for elite passenger relaxation and also including shower facilities; all the foregoing provided to credit card members Providing premium food and beverage services for elite air travelers in transit lounges; providing bar and cocktail lounges also featuring related amenities being temporary accommodations in the nature of conference rooms, shower facilities, and work stations for relaxation to elite air travelers in transit lounges; and providing conference and meeting room facilities for elite air travelers in transit lounges and airport terminals; all the foregoing provided to credit card members
91.
SYSTEMS AND METHODS FOR PROCESSING AND CLASSIFICATION OF ELECTRONIC MAIL
In some aspects, the techniques described herein relate to a method including: receiving, by a capture module, a reception notification from an email server, wherein the reception notification is triggered by an event handler of the email server and the event handler is configured to generate the reception notification upon receipt of an email in a mailbox of the email server; generating, by the capture module, a reception event including metadata related to the email that is received at the mailbox of the email server; sending, by the capture module, the reception event to an event streaming platform; retrieving, by a workflow engine, email metadata, wherein the email metadata is related to the email that is received at the mailbox of the email server; and providing, by the workflow engine and as input to a rules-based procedure, the email metadata.
A system comprising a processor that may be configured to: monitor an output of a feed that outputs a respective log of each activity that occurs on a source database platform; evaluate the output of the feed against an update session taxonomy to determine whether the respective log indicates a completion of a first update session of first updates to a first source table of a source instance of a live database; when the respective log indicates the completion of the first update session, search a historical database activity repository to detect each respective log that corresponds to the first update session; identify a corresponding data change for each respective log that corresponds to the first update session; and perform a first set of data changes on a copy of the first source table.
A method for performing optimized radio resource management (RRM) in an O-RAN network, includes: performing, at the RRM analytics module, a machine learning-based analysis to determine an optimal resource allocation policy based on at least one performance measurement performed at a distributed unit (DU); receiving, by the DU, the optimal resource allocation policy determined by the RRM; and utilizing, by the DU, the optimal resource allocation policy to one of schedule or not schedule user equipments (UEs). In a given slot and for a given state of the base station, candidate UEs to serve in the slot are selected based on a chosen policy. If the number of selected candidate UEs is higher than the maximum number the base station can serve in that slot, the radio resource management (RRM) module selects, using the chosen policy, the maximum number of UEs, and the selected UEs are allocated resources.
H04W 28/06 - Optimising, e.g. header compression, information sizing
H04B 7/06 - Diversity systemsMulti-antenna systems, i.e. transmission or reception using multiple antennas using two or more spaced independent antennas at the transmitting station
H04W 28/02 - Traffic management, e.g. flow control or congestion control
94.
Systems and methods for secure client-server authentication with key recycling
A method may include: sharing, by a client computer program and a server computer program, a set of identification keys, each identification key associated with a key label, and an authentication key; selecting, by the client computer program and the server computer program, one of the key labels; preparing, by the client computer program, quantum systems using a basis, randomly chosen bit values, and intensities; sending, by the client computer program, the quantum systems to the server computer program over a quantum communication channel, wherein the server computer program may be configured to measure the quantum systems using the basis and to announce quantum systems with photon detection; and generating, by the client computer program, a client tag using a shared keyed hash function executed on the authentication key and chosen bit values from the quantum systems with photon detection, and forwarding the client tag to the server computer program.
H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
Provided is a system and method whereby a bank customer can engage a remote second party in a financial deal which is specific to a specific bank, all within the operational framework of an existing mobile phone messaging application which is other than the Specific Bank app. In certain circumstances, an embodiment of the present system and method entails two related elements: (i) having installed on the bank customer's mobile phone a Specific Bank mobile application which the bank customer normally uses for direct financial dealings with Specific Bank; and also (ii) having a Specific Bank extension application, installed on the mobile phone. The Specific Bank extension application (hereinafter, “extension app”) enables the provision of Specific Bank mobile application services from within the messaging application, so that the bank customer can engage in financial dealings with the second party via the messaging application.
G06F 3/04817 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance using icons
G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
G06Q 20/32 - Payment architectures, schemes or protocols characterised by the use of specific devices using wireless devices
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
96.
SYSTEM AND METHOD FOR OPTIMIZED ASSET ALLOCATION RECOMMENDATIONS BASED ON SOCIO-ECONOMIC TRENDS
A system and method for optimized asset allocation recommendations based on socio-economic trends are disclosed. The method includes receiving first information associated with a set of assets, and a set of beneficiary entities associated with a user. Further, the method includes retrieving second information associated with the set of assets and a testament from at least one external resource. Further, the method includes analyzing, using a recommendation engine, the first information and the second information to determine an optimized allocation of the set of assets to the set of beneficiary entities. Further, the method includes generating a preliminary testament draft based on the optimized asset allocation recommendation. Further, the method includes rendering, via a display, the generated preliminary testament draft to the user to prompt the user to provide a user input. Thereafter, the method includes generating a final testament draft based on the user input.
There are provided systems and methods for generating, configuring, or reconfiguring activity frameworks. For instance, there is provided a method for configuring an activity framework. The method can reside as instructions on a non-transitory computer-readable medium, the instructions being configured to cause a processor to perform certain operations. The operations may include receiving a set of requirements and constructing a set of computational steps required to meet the set of requirements. The operations can further include generating the activity framework and the activity framework can include a workflow of activities. The operations can further include generating a configuration file.
Systems and methods for throttled sharing of personal information are disclosed. A method for throttled sharing of personal information may include: (1) receiving, by a computer program at a trusted entity and from a customer, customer personal information; (2) receiving, by the computer program at the trusted entity and from a third party system, an identification of personal information fields required for a transaction; (3) receiving, by the computer program at the trusted entity and from the third party system, a request for personal information verification for a transaction involving the customer; (4) retrieving, by the computer program, the personal information fields required by the third party system; (5) creating, by the computer program, a payload comprising the customer personal information for the personal information fields required by the third party system; and (6) returning, by the computer program, the payload to the third party system.
G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentialsReview and approval of payers, e.g. check of credit lines or negative lists
G06Q 20/02 - Payment architectures, schemes or protocols involving a neutral third party, e.g. certification authority, notary or trusted third party [TTP]
G06Q 20/42 - Confirmation, e.g. check or permission by the legal debtor of payment
Systems and methods for digital document exchange are disclosed. According to an embodiment, a method for digital document exchange may include: (1) receiving, by a document exchange computer program, a document; (2) ingesting, by the document exchange computer program, the document; (3) identifying, by the document exchange computer program, a folder for the document; (4) storing, by the document exchange computer program, the document in the folder; (5) identifying, by the document exchange computer program, a target for the document; and (6) notifying, by the document exchange computer program, the target that the document was received.
Systems and methods for determining performance-based pricing are disclosed. A method may include: creating a borrower entry based on borrower loans for a borrower and a borrower rating; polling a plurality of rating agencies for agency borrower ratings; receiving agency borrower ratings from the plurality of rating agencies; determining that one of the agency borrower ratings has changed from a previous agency borrower rating; predicting, using a machine learning engine that is trained with historic agency rating changes, a recommended change to a pricing grid for the borrower based on the change in the agency borrower rating; updating the pricing grid for the borrower based on the recommendation; and providing the updated pricing grid to a loan platform. The loan platform is configured to implement the pricing grid, and the implementation of the pricing grid changes a payment for at least one of the plurality of borrower loans.